Vulnerability Management Jobs

151 to 175 of 239 Vulnerability Management Jobs

Senior Security Engineer - Onsite - £100K

London Area, United Kingdom
Oliver Bernard
and security assurance testing, as well as configuring and fine tuning cyber security tools and solutions including preventative and detective measures for example firewalls, vulnerability management tools, and EDR. Skills You will have worked as a Cyber Security Engineer or in a similar position. You will have experience … in a broad variety of technology including AWS, Microsoft 365, internet protections, vulnerability management, SIEM, EDR. Experience securing on premises infrastructure and cloud services. Experience working with Systems Engineering teams, DevSecOps, CI/CD Senior Security Engineer - Onsite - £100K more »
Posted:

Vulnerability Analyst

Leeds, England, United Kingdom
Cynexa
Vulnerability Analyst £55,000 Leeds Are you passionate about cybersecurity and ready to make an impact? Join my clients team in Leeds as a Vulnerability Analyst and play a crucial role in fortifying their defences against evolving threats. You will bride the communication gap between technical teams and … senior leadership, ensuring that security protocols remain effective and aligned with business objectives. To succeed in this role, you'll need strong experience in vulnerability analysis or a related role. You must be able to show proficiency in vulnerability scanning tools and technologies, as well as a solid … excellent communication skills to convey technical information to non-technical audiences. Offensive security certifications are a definite plus. This is your chance to expand vulnerability management across new horizons within their business, ensuring that security is not just integrated but ingrained in every facet. Don't miss out more »
Posted:

Security Operations Engineer

Belfast, Northern Ireland, United Kingdom
Hybrid / WFH Options
Idox plc
best practice, quality assurance and governance, as appropriate for each project. The SecOps Engineer will take a proactive approach to security matters and risk management, leading investigations, root cause analysis and vulnerabilities under the guidance of the cloud architecture team. There may be an opportunity to develop a management … Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage … automated scanning tools to ensure continuous security monitoring. Secure Configuration Management: Establish and enforce secure configuration standards for EC2 instances, Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Automate configuration management processes using infrastructure-as-code tools (Terraform). Security Compliance: Ensure AWS infrastructure and applications comply more »
Posted:

Cyber Security Consultant

Reading, England, United Kingdom
Project People
customer trust in a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Experience with information security management frameworks (NIST, PCI, GDPR, ISO, OWASP, ITIL, ISF SoGP, COBIT) is essential. The role will involve supporting project managers in risk and issue management … templates is vital. Expertise and experience in technical domains ie hybrid security, infrastructure and data centre security, network security, application security, identity and access management, and vulnerability management are important. Experience of influencing and negotiating technical outcomes with third parties, including conflict resolution due to changing priorities. … the clients they are supporting or projects they are deliverable in the UK. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture/ more »
Posted:

🌳🌳🌳Head of Information Security Operations – CONTRACT – 6-12 Months – Urgent – Reading/Thames Valley🌳🌳🌳

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
the confidentiality, integrity and availability of information systems are maintained to protect customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Experience 🌳Minimum 5+ years commercial experience more »
Posted:

Enterprise Security Architect

Glasgow, Scotland, United Kingdom
NextTech Recruitment
in projects and operations Work with technical teams baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation and identity and access management (IAM) Work with technical teams develops standards and practices for data encryption and tokenization Draft security procedures and standards to be reviewed and approved … by executive management and/or formally authorised by the chief information security officer (CISO) Threat modelling of services and applications that tie to the risk and data associated with the service or application Key Qualifications: Vast experience in leading/mentoring teams in “secure by design” including a … strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services, identity management, as well as securing CI/CD pipelines. Direct, hands-on experience or a solid working knowledge of relevant security patterns, vulnerability management tools, securing public cloud applications. Full more »
Posted:

Cyber Security and Risk Consultant

London, England, United Kingdom
Pioneer Search
members of the team and fulfil this opportunity? Responsibilities: Provide support and consultation across all elements of Cyber Security including Threat intelligence, cyber risk management, security operations, data loss and fraud preventions, IDAM, vulnerability management and more. Arrange materials for the Cyber Risk and Information Security committee … and manage the Security operations - KPIs/KRIs, threat analysis, ensuring quality of security control operations, develop security tooling etc. Responsible for the risk management and Governance Develop the NIST-based Cyber Security framework to recognise key risks, mitigations, and improvements to the security posture. Conduct risk assessments Required more »
Posted:

Information Security Manager

Crawley, England, United Kingdom
TalentHawk
of the ever-evolving threat landscape. Here's what you'll be doing: Develop and implement a comprehensive information security program: Think risk assessments, vulnerability management, incident response, access control, the whole enchilada. Lead and empower a team of security professionals: Guide, mentor, and inspire your team to more »
Posted:

Cyber Security Consultant

Birmingham, England, United Kingdom
Hybrid / WFH Options
Recruit with Purpose
security principles are applied during project design to reduce risk. Education, Qualifications & Experience Required: proficiency in security technologies such as Microsoft XDR stack and vulnerability management tools. in SIEMS (Azure Sentinel) and Powershell Automation. exposure to enterprise networking and infrastructure technologies. one of more relevant Cyber Security qualification more »
Posted:

IT Support Engineer - 1st & 2nd Line - EC2

London Area, United Kingdom
Intellect Group
Windows 7/10/11 and Office 365 suite ***Active Directory, Group Policy and SharePoint ***Skills in OS builds, SSCM, packaging, configuration and vulnerability management. ***Exchange, SQL, Cisco Call manager Desirable skills: ***Knowledge of finance applications such as Bloomberg & Eikon ***Microsoft Intune or other MDM tools PowerShell or more »
Posted:

DevSecOps Engineer

Greater Bristol Area, United Kingdom
Hybrid / WFH Options
Ada Meher
software and infrastructure security best practices and implementations. You'll also be pivotal in helping gear toward another successful ISO27001 audit and automating security vulnerability management. You'll need demonstrable experience in a similar DevSecOps role; with experience in AWS, Docker/Kubernetes, and Security implementation. Responsibilities Develop DevSecOps … AWS (Accreditations a huge bonus) Demonstrable level of experience with Cyber Security experience (security concepts, practices, and technologies, such as access control, encryption, and vulnerability management) Experience with software security and development practices and implementations Python, Bash, or PowerShell Security certification such as CISSP, CEH, OSCP We understand more »
Posted:

SOC lead

Greater Manchester, England, United Kingdom
Gamma
different data sources and tools for analysis. · Previous experience of mentoring or leading SOC analysts is desirable but not essential. · Experience of risk-based vulnerability management is desirable. What do we offer? 25 days PTO + bank holidays Your birthday off Private Medical Insurance Electric Vehicle (EV) scheme more »
Posted:

Senior Security Engineer - Greenfield - Buy side

London Area, United Kingdom
Vertus Partners
robust controls. Requirements: Deep understanding of security engineering and implementing security controls Hands on experience of SecOps and security systems Understanding of threat detection, Vulnerability management Cloud & network security Scripting experience - Preferably Python Ability to lead projects and resolve complex issues Please note you will need to travel more »
Posted:

Senior Security Engineer

London Area, United Kingdom
Hybrid / WFH Options
Xcede
engineer with deep knowledge of security principles in line with the CISSP CBK domains such as security monitoring, intrusion prevention & detection, network security, endpoint management & protection, identity management, threat detection, vulnerability management. Whilst the position entails significant exposure to vendor products and tooling, the incoming engineer should more »
Posted:

Information Security Manager

Cambridge, England, United Kingdom
Hybrid / WFH Options
Opus Talent Solutions
Compliance (GRC): Lead the development and implementation of robust information security policies, procedures, and controls to ensure compliance with industry standards and regulations. Risk Management: Identify, assess, and mitigate information security risks across all facets of our business operations, with a focus on safeguarding sensitive data and intellectual property. … Security Operations: Oversee the day-to-day management of security systems and protocols, including incident response, threat detection, and vulnerability management. Security Awareness: Develop and deliver comprehensive training programs to promote a culture of security awareness and best practices among employees. Vendor Management: Collaborate with third-party … compliance readiness. Qualifications: Bachelor’s degree in information security, Computer Science, or related field (Master's degree preferred). Proven experience in information security management, preferably within the pharmaceutical or healthcare industry. In-depth knowledge of relevant regulatory frameworks, such as ISO, GDPR, HIPAA, and FDA regulations. Strong understanding more »
Posted:

IT Support Engineer

Kettering, Northamptonshire, United Kingdom
Clinch
to agreed service levels, compliance requirements in line with business needs. Supports shift left initiative – providing supporting documentation for L1 services Provides proactive problem management and engages in continuous improvement. Manages 3rd party warranty contracts and relationships for all end user IT equipment ensuring all incidents be logged with … OKTA, Multi-Factor Authentication Active Directory Services, Group Policy Manager, Enterprise printing and Enterprise Telephony Corporate Security Administration Obligations including AV, VPN, Rapid 7 Vulnerability Mgmt. Mobile device Technologies, Management and encryption, Mobile Iron DESIRABLE ITIL SCRUM RELEVANT CAREER HISTORY/EXPERIENCE NECESSARY TO FULFILL THE JOB ROLE … Demonstrable experience with enterprise class software solutions. DESIRABLE Relevant and most recent professional IT certification is desirable, though not critical. COMPETENCIES (RELATING TO PERFORMANCE MANAGEMENT SCHEME COMPETENCY MODEL) Customer Obsession : With an intense focus on our customers, we will do what is in our power to establish and maintain more »
Posted:

Senior Cyber Security Specialist

United Kingdom
Hybrid / WFH Options
City & Guilds
City & Guilds. In this role you will lead and act as subject matter expert for computer and network threat intelligence, incident responses, investigations and vulnerability assessments that pertain to different types of cyber threats, including malware, data theft, denial of service, and data breaches. You will collaborate with a … infrastructure and systems. You will have extensive experience of technologies including but not limited to Firewalls, IPS & IDS, Active Directory, Windows Server, Linux, AWS, Vulnerability management and SIEM, DRM. We would expect you to have a familiarity with industry security standards such as NIST, Cyber Essentials, ISO27001 and more »
Employment Type: Permanent, Work From Home
Posted:

Information Security Architect / Manager

London
Nexus Jobs Limited
solving, and root-cause analytical (RCA) skills. Good working knowledge of Cisco Meraki and associated technologies. Practical knowledge of Continual Service Improvement (CSI) methodologies. Vulnerability management and assessment. Intrusion detection and prevention analysis/frameworks. Solid exposure to cloud based applications security and provisioning. Experience in writing policy more »
Employment Type: Permanent
Salary: £500 - £550
Posted:

Senior Information Security Analyst

London
Hybrid / WFH Options
Nexus Jobs Limited
computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA more »
Employment Type: Permanent
Salary: £70,000 - £85,000
Posted:

EUC Engineer

City Of London, London
Hybrid / WFH Options
Intec Select
organisation, with a focus on the End-User technologies. This includes, but not limited to; Active Directory, Group Policy, User profiles, VMware Mobile Device Management, SCCM, WDS, Remote Desktop Services, FortiClient EMS, and Jira Service Desk Deliver project work to upgrade and improve upon existing infrastructure Respond to tickets … and manage allocations of project tasks Ensure systems are kept safe and secure by embedding vulnerability management best practises Proactively monitor systems, embed policy compliance across the end-user estate, highlight trends and proposing preventative measures Be available outside of business hours on an ad-hoc basis to … OS images using SCCM or Windows Deployment Services (WDS). Windows Server OS implementation experience across multiple platform roles, including Active Directory, Group Policy management, Remote Desktop Services. WSUS update patch management. Strong scripting ability in the likes of PowerShell or similar languages Strong experience with Mobile Device Management more »
Employment Type: Contract
Rate: £300 - £385
Posted:

Cyber Security Assurance Specialist

Birmingham, West Midlands, United Kingdom
Hays
supplier chain security agreements/contracts/questionnaires and manage completion and disengagement. * Lead reviews of governance practices with appropriate and sufficient independence from management activity. * Develop policies, standards, processes, guidelines for ensuring appropriate security standards are in place and are adhered to. * Ensure architectural security principles are applied … and assessments of product security architectures and designs across a diverse range of complex infrastructure, data and application systems. * Ensure timely and robust incident management resolution, including major incident response coordination and management. * Deputise for the Senior IT Security Manager as and when required. Education, Qualifications & Training * Achieved one … more relevant qualification/certification (i.e. CISSP, CISA, CISM Knowledge & Experience * Expert knowledge of security data tools, information security controls, security best practice and management strategies. * Experience of designing control maturity tests and conducting control maturity assessments. * Experience of overseeing and leading remediation of security assessments, technical testing, and more »
Employment Type: Permanent
Salary: £60,000
Posted:

Physical Embedded and Control Systems Security - Technical

Pensacola, Florida, United States
Department of Homeland Security
Strategy, Policy, and Plans (PLCY), the Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and the Federal Emergency Management Agency (FEMA) . As a DHS Cybersecurity Service employee in the Technical Career Track, you will continually maintain and share your expertise in Physical … and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with other more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Physical Embedded and Control Systems Security - Technical

Idaho Falls, Idaho, United States
Department of Homeland Security
Strategy, Policy, and Plans (PLCY), the Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and the Federal Emergency Management Agency (FEMA) . As a DHS Cybersecurity Service employee in the Technical Career Track, you will continually maintain and share your expertise in Physical … and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with other more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Physical Embedded and Control Systems Security - Technical

Springfield, Virginia, United States
Department of Homeland Security
Strategy, Policy, and Plans (PLCY), the Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and the Federal Emergency Management Agency (FEMA) . As a DHS Cybersecurity Service employee in the Technical Career Track, you will continually maintain and share your expertise in Physical … and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with other more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Physical Embedded and Control Systems Security - Technical

Arlington, Virginia, United States
Department of Homeland Security
Strategy, Policy, and Plans (PLCY), the Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and the Federal Emergency Management Agency (FEMA) . As a DHS Cybersecurity Service employee in the Technical Career Track, you will continually maintain and share your expertise in Physical … and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with other more »
Employment Type: Permanent
Salary: USD Annual
Posted:
Vulnerability Management
10th Percentile
£39,850
25th Percentile
£50,000
Median
£65,000
75th Percentile
£83,438
90th Percentile
£97,500