Vulnerability Management Jobs

1 to 25 of 239 Vulnerability Management Jobs

Infrastructure Engineer, Cirencester £50,000

Cirencester, Gloucestershire, United Kingdom
SR2
I'm on the lookout for an Infrastructure Engineer specialist with a strong background in cloud services and modern IT infrastructure management, specifically within the Microsoft ecosystem to join my client based just outside of Cirencester. and easily commutable from Swindon. Their office is in a beautiful location with … desktop infrastructure. Your skill set should encompass the entire Microsoft 365 Suite and MS Azure, along with a good knowledge of email security platforms, vulnerability management, and IT networking techniques as they currently work towards their Cyber essentials plus certification. They are in the process of upgrading their more »
Employment Type: Permanent
Salary: £40000 - £50000/annum
Posted:

Head of Information Security

Reading, England, United Kingdom
Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
Posted:

SOC Engineer

Doncaster, England, United Kingdom
Lorien
On-Site About Our Client: Our client is an award-winning provider of Security Services, specializing in market-leading Cyber Security Services such as Vulnerability Management, Information Security, PCI-DSS, Penetration Testing, Managed Security Services, and Security Consultancy. With their fully managed Security Operations Centre (SOC), they are more »
Posted:

VP - Information Security

London Area, United Kingdom
Gresham Hunt
and implementing operational policies and standards. Demonstrable experience in a variety of areas such as cloud security, IAM, 3rd party risk, threat assessments and vulnerability management. Strong knowledge of cyber security architecture. Relevant certifications would be beneficial (e.g. TOGAF, SABSA). Ability to interact with and challenge technical teams more »
Posted:

Information Security Lead - Vulnerability Management

London, England, United Kingdom
Hybrid / WFH Options
Starling Bank
from home, that's to be agreed upon between you and your manager. About the Role We are seeking a highly motivated and experienced Vulnerability Manager to lead a growing vulnerability management team. A successful candidate will work with the team to analyse emerging vulnerabilities provided by … threat intelligence sources and penetration testing. The vulnerability manager will collaborate with various technology and engineering teams to share vulnerability findings, provide guidance, and assist through the remediation process. This person will help present this information in a simple digestible format, and coordinate remediation and mitigation efforts with … teams across remote and office locations. There will be opportunities to guide continual improvement of the vulnerability management process. Responsibilities Lead a team of information security professionals to: Assess, investigate and provide guidance on emerging vulnerabilities, incorporating information from threat intelligence sources, internal software and infrastructure scans. Collate more »
Posted:

DevSecOps Engineer

England, United Kingdom
Hybrid / WFH Options
Ada Meher
software and infrastructure security best practices and implementations. You'll also be pivotal in helping gear toward another successful ISO27001 audit and automating security vulnerability management. You'll need demonstrable experience in a similar DevSecOps role; with experience in AWS, Docker/Kubernetes, and Security implementation. Responsibilities Develop DevSecOps … AWS (Accreditations a huge bonus) Demonstrable level of experience with Cyber Security experience (security concepts, practices, and technologies, such as access control, encryption, and vulnerability management) Experience with software security and development practices and implementations Python, Bash, or PowerShell Security certification such as CISSP, CEH, OSCP We understand more »
Posted:

Cyber Security Engineer

Gloucestershire, England, United Kingdom
F5 Consultants
the team on a full time, permanent basis. You will be leading and delivering crucial projects for their clients including Risk Assessments, Security Controls, Vulnerability Management, acting as their Security Subject Matter Expert. Key requirements: 🟢 Previous background working within the Public/Defence sector 🟢 Strong understanding of Network more »
Posted:

Cyber Risk Manager

London Area, United Kingdom
Locke and McCloud
managing cyber risks across our client and their vendors/3rd party suppliers. Our client is looking for candidates who hold strong skills in vulnerability management, vendor relationship management, incident response, and possess a deep understanding of cyber risk. Main Responsibilities: Develop and implement cyber risk management strategies, policies, and procedures. Lead vulnerability management efforts, including identifying, assessing, prioritising, and remediation of vulnerabilities. Establish and maintain strong vendor relationships to ensure third-party vendors comply with cybersecurity requirements and standards. Oversee incident response activities, including incident detection, analysis, containment, eradication, and recovery. Conduct risk … specialist to our client and their vendors. To be considered for this role, you should have: Must have a strong background in cyber risk management, vulnerability management, vendor relationship management, and incident response. Strong understanding of standards such as PCI-DSS, NIST, ISO27001, GDPR, and similar. more »
Posted:

Security Operations Manager

London Area, United Kingdom
Cynexa
Security+, AWS Security or MA Azure Security and ideally CISSP. You will be responsible for: Security Monitoring and Incident Response Threat Intelligence Security Infrastructure Management Documentation and Reporting Candidates who can show hands on experience with security tools across SIEM/EDR and vulnerability Management will be more »
Posted:

Cyber Security Consultant - CISSP, Nessus, Rapid7, Sentinel

London Area, United Kingdom
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
real-world experience. Worked on a Managed Security Service previously. Previous experience of working as a Cyber Security Consultant across multiple customers. Microsoft stack, vulnerability management tools (Nessus and Rapid 7), EDR platforms, SIEMs. Previous experience of delivering security projects, including implementation and post- implementation support, providing guidance … and support to customers throughout. Experience of overseeing and leading remediation of security assessments, technical testing, and vulnerability analysis including Cyber Essentials, Cyber Essentials Plus, and NIST CSF. Responsibilities: Deliver the technical and advisory aspects of our Managed Security Service across the customer base. Join security incident response calls more »
Posted:

Senior Security Engineer

London Area, United Kingdom
Hybrid / WFH Options
Talented Recruitment Group
you do it for? Would like to do this with well recognised eCommerce brand where you get the opportunity to lead programs across across vulnerability management? You could even tell your friends about it and they would at least know exactly who you work for. You'll get more »
Posted:

Security Engineer

London Area, United Kingdom
Marcus Donald People
Office 365, Defender for Cloud, Defender for Cloud Apps (CASB) Preferrable: Defender for Identity, Azure MFA), IBM QROC/QRadar. Desirable: Any experience of Vulnerability Management Optimisation at scale in an enterprise environment. (e.g., Kenna. VM/Cisco Vulnerability Management, Nucleus, Rapid 7, Armis – other similar … Vulnerability Management Optimisation platforms also considered) In addition you must have Prior experience in Security Engineering and track record in carrying out technical security risk assessments. Good understanding for how to assess third-party suppliers of cloud/SaaS based technology platforms. Experience in vulnerability management optimisation (e.g., Kenna. VM/Cisco Vulnerability Management, Nucleus, Rapid 7, Armis – other similar Vulnerability Management Optimisation platforms also accepted). Data Classification and Labelling, Microsoft Purview. Bachelor's degree in a security related field is preferred (i.e., Security Analysis, Penetration Testing, Malware Analysis, Digital more »
Posted:

Senior Cyber Security Operations (SOC Lead)

United Kingdom
Milestone Technologies, Inc
on different aspects such as source/destination addresses, usernames, and process names) Demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerability management A sound understanding of TCP/IP and networking concepts Understanding of network design principles with and knowledge of the OSI model. more »
Posted:

Cyber Security Vulnerability Manager

Cardiff, Wales, United Kingdom
Hybrid / WFH Options
Intaso
Interviews available immediately Intaso’s long standing client are seeking a dynamic individual to join their Security Operations team as the Security Vulnerability Manager, a pivotal role within their organization. This position will focus on identifying, monitoring, analysing, and facilitating the remediation of vulnerabilities across their systems. Key Responsibilities … Develop and document a comprehensive vulnerability management strategy aligned with stakeholder and business need Create intuitive reporting and dashboarding mechanisms to convey threat and risk profiles associated with vulnerabilities to stakeholders Ensure regular vulnerability scans cover all IT and OT assets, maintaining up-to-date coverage. Collaborate … with IT and OT asset owners to execute vulnerability and compliance scans in a controlled manner. Partner with both technical and non-technical stakeholders to devise effective mitigation plans for identified vulnerabilities. Lead cross-functional teams in responding to high-risk or complex vulnerabilities, leveraging technical expertise. Stay informed more »
Posted:

Security & Network Operations Analyst

London Area, United Kingdom
Spencer Scott - Technology Recruitment
changing environments Demonstrable experience SIEM & Network technologies using Sentinel. Detailed experience of log analysis including KQL and SQL queries. An understanding of Threat and Vulnerability Management. Experience with Defender XDR, Defender Endpoint Identity, Defender for Cloud and Cloud Apps. Strong understanding of Azure and M365 Security. Experienced with either more »
Posted:

Senior Security Engineer

London Area, United Kingdom
Caspian One
. Ability to develop and implement strategies for compliance with data protection regulations. Knowledge and experience in security technologies such as EDR, SIEM, and Vulnerability Management is a plus. Relevant security certifications (CISSP, GCIA, CISM, etc.) and/or product certifications (Azure, Windows, AD, etc.) are desirable. This more »
Posted:

Information Technology Security Specialist

Aberdeen, Scotland, United Kingdom
Hybrid / WFH Options
prosource.it
leads to the creation of high quality, secure by design, project deliveries. Examples of projects: Secure Internet Access Privileged Remote Access VPN consolidation Information Management (Records Management & Data Governance) Infrastructure Road Mapping Security Email Gateway Identifying security related risk from projects and leading risk assessment processes Identify divergences … deliveries Technical Experience: Security Risk Assessment Network Architecture Principles Web & email security technologies Reviewing and assessing security policy configuration within cloud environments (preferably Azure) Vulnerability Management and Security logging and monitoring tools Cloud Virtualisation and Containerisation security assessments and review Edge Security Technology, IAM, PAM Data Security and … governance Network Monitoring Tools and SIEM Technology Risk Management Tools Ability to act proactively, escalating issues as required Strong documentation and communication skills (verbal and written) Excellent problem-solving skills Strong knowledge and experience of IT change management processes and principles Willingness to stay up to date on more »
Posted:

Information & Cyber Security Analyst - Financial Services - £50,000-£70,000 + Bonus

London Area, United Kingdom
Hybrid / WFH Options
Hunter Bond
and compliance Detecting any issues or security breaches across global infrastructure Monitoring of devices and infrastructure, including reporting Investigating potential threats and issues Risk management and analysis Utilising tooling such as packet inspection and security forensics to resolve and report issues Security & Best Practice Working with various other Security … Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threat management frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerability management You will advise on Security best practices, and act more »
Posted:

Information Systems Security Officer

Chantilly, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Manassas, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Sterling, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Merrifield, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Burke, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Springfield, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Aldie, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:
Vulnerability Management
10th Percentile
£39,850
25th Percentile
£50,000
Median
£65,000
75th Percentile
£83,438
90th Percentile
£97,500