Vulnerability Management Jobs

31 to 55 of 226 Vulnerability Management Jobs

Network Security Team Lead

Glen Echo, Maryland, United States
Leidos
or US Person with the ability to obtain a Public Trust Clearance. Responsibilities: Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management … IDS), Network Access Control (NAC), Domain Name Systems (DNS), Remote Access VPN (RA-VPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout Support operations team with cybersecurity guidance … capabilities Demonstrated experience working in large Federal agency preferably in HHS. Possess the knowledge of security best practices, security solutions, and methodologies for risk management Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Network Security Team Lead

Takoma Park, Maryland, United States
Leidos
or US Person with the ability to obtain a Public Trust Clearance. Responsibilities: Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management … IDS), Network Access Control (NAC), Domain Name Systems (DNS), Remote Access VPN (RA-VPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout Support operations team with cybersecurity guidance … capabilities Demonstrated experience working in large Federal agency preferably in HHS. Possess the knowledge of security best practices, security solutions, and methodologies for risk management Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Network Security Team Lead

Chevy Chase, Maryland, United States
Leidos
or US Person with the ability to obtain a Public Trust Clearance. Responsibilities: Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management … IDS), Network Access Control (NAC), Domain Name Systems (DNS), Remote Access VPN (RA-VPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout Support operations team with cybersecurity guidance … capabilities Demonstrated experience working in large Federal agency preferably in HHS. Possess the knowledge of security best practices, security solutions, and methodologies for risk management Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Network Security Team Lead

Silver Spring, Maryland, United States
Leidos
or US Person with the ability to obtain a Public Trust Clearance. Responsibilities: Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management … IDS), Network Access Control (NAC), Domain Name Systems (DNS), Remote Access VPN (RA-VPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout Support operations team with cybersecurity guidance … capabilities Demonstrated experience working in large Federal agency preferably in HHS. Possess the knowledge of security best practices, security solutions, and methodologies for risk management Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Threat and Vulnerability Manager

London Area, United Kingdom
Gresham Hunt
Threat & Vulnerability Manager London – Hybrid Salary: DoE Gresham Hunt is currently partnered with a leading financial services client in the search for an experienced Vulnerability Management professional for their London based team. This is an exciting opportunity to help drive the vulnerability management programme as … part of the global technology team. The successful candidate will have: 8 years experience across different technical disciplines within the Cybersecurity landscape. Experience using vulnerability scanning tools such as Nessus, Qualys, Rapid7, Wiz, OpenVAS, and penetration testing frameworks like Metasploit. Knowledge of security and risk frameworks, plus regulatory compliance … frameworks e.g. NIST, Cobit, ISO 27001. Understanding of OWASP, MITRE, CVSS and other standards/frameworks relevant to application security and vulnerability management. Experience with cloud technologies, preferably Azure and AWS. Familiarity with security methodologies: Attack and Defensive, Threat Hunting, etc. Scripting experience would be beneficial i.e. Python, Shell more »
Posted:

Vulnerability Engineer

London
LA International Computer Consultants Ltd
Vulnerability Management Internal : Operations (metrics, ID & triage/resolution initiation, patching, hardening, verification scans, maintenance, changes) Vulnerability Management External : Operations (metrics. ID & triage/resolution initiation. Track internet endpoints/DNS be this TSB or 3rd party hosted) One FTE as a hands-on engineer LA more »
Employment Type: Contract
Rate: £600 - £800
Posted:

Lead Cyber Security Consultant

Corsham, Wiltshire, United Kingdom
Searchability
clearance Willingness to be on-site in Corsham 5 days per week Experience required: SOC transformations and operations Developing security operation processes and procedures Vulnerability Management - using Tripwire and Tanium Incident Management - using DCC and Elastic Stack Endpoint security - using vSphere, SolarWinds, Trend Intelligence Driven Defence, Cyber … CONSULTANT/CYBER SECURITY/LEAD/LEAD CONSULTANT/LEAD CYBER CONSULTANT/LEAD CYBER SECURITY CONSULTANT/SOC/SOC OPERATIONS/VULNERABILITY MANAGEMENT/INCIDENT MANAGEMENT/NIST/ENDPOINT SECURITY/CORSHAM/BRISTOL/SOUTHWEST/DV/DV CLEARED/DV more »
Employment Type: Permanent
Salary: GBP 103,000 Annual
Posted:

Senior Threat Intelligence Analyst

London, Broad Street, United Kingdom
Advania UK
operations and forensics. Conduct advanced threat hunting to proactively identify hidden threats within the organisation's network, utilising advanced tools and techniques. Participate in vulnerability management activities, collaborating with the vulnerability management team to prioritise and remediate critical vulnerabilities identified through intelligence gathering and risk assessments. more »
Employment Type: Permanent
Posted:

Lead Vulnerability Analyst

Ashburn, Virginia, United States
Leidos
be leading 5 to 10 VAT members, perform research on current threats and vulnerabilities, will be responsible for authoring security advisories and manage enterprise vulnerability compliance and will conduct vulnerability assessments of IT systems. The VAT Lead will be assisting the government with the Enterprise Information System Vulnerability Management (ISVM) compliance validation, execute Vulnerability Scans and will conduct vulnerability assessments of IT systems. Perform research on current vulnerabilities, support Incident Response and SOC functions as related to vulnerabilities. Will be responsible for authoring security advisories. Basic Qualifications: BS degree Science, Technology, Engineering, Math or … experience may be considered in lieu of a degree. Relevant experience is within one of the following areas pentesting, security technical assessments or supporting vulnerability scanning/management program. Experience managing teams Experience with vulnerability analysis Ability to identify false positives within scan results and work with more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information System Security Officer - Industrial Control Systems

Piketon, Ohio, United States
Leidos
to ensure staff are aware of their responsibilities and can act in a manner that minimizes risk to the organization. Regularly report to senior management about the status of the organization's security posture, regulatory compliance status, audit findings, and any other security-related issues and plans. Regularly review … in the decision-making process to obtain needed information, make the most appropriate decisions, and ensure buy-in and understanding of resulting decisions. Task Management Skills: The candidate is expected to proactively determine project or assignment requirements by breaking them down into tasks and identifying types of equipment, and … Publication (SP) 800-53, Revision 4 or Revision 5 Demonstrated success in achieving project completion in a timely manner. This includes having effective project management skills and correctly assessing the time required to carry out given tasks. Experience using Cyber Security relevant tools, systems, and applications to include but more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Lead

Oxford, Oxfordshire, United Kingdom
Hybrid / WFH Options
Planet Recruitment
installation and configuration of hardware, applications, and software as part of Privacy by Design and Default. Manage and coordinate operational components of security incident management, including detection response and reporting. Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans … and audit requirements. Review, escalate and action any unusual event behaviour identified through the groups information security systems. Create standards in system hardening, change management, documentation. Perform periodic firewall Ensure disaster recovery and data restoration processes work. Ensure appropriate Corrective and Preventative Actions are implemented in line with best … in broad domains of IT infrastructure such as data networks, server and desktop hardware and operating systems, storage and backups, and related monitoring and management systems. Demonstrable experience of applying security controls in one or more of the following areas: Unix/Linux Servers, Windows servers, firewalls, IDS/ more »
Employment Type: Permanent
Salary: £45000 - £59000/annum
Posted:

Senior SOC Analyst

London Area, United Kingdom
Hybrid / WFH Options
CLS Group
and services to ensure that CLS is equipped with appropriate industry best tools and solutions Operational Operate and maintain controls related to SIEM, DLP, Vulnerability Management, DLP, Cyber Threat Intelligence, Endpoint Protection, etc with an emphasis on cloud deployments and implementations. Conduct IT Security risk assessments for all … help design, implement and maintain security Prepare for, identify (hunt) and remediate cyber threats Operate and maintain IT Security controls related to SIEM, DLP, Vulnerability Management, Cyber Threat Intelligence, DLP, Endpoint Protection, etc. Participate in an on-call rotation to act as an escalation point for events requiring … collaborate effectively with others to drive forward key security objectives Strong documentation and report writing skills (to both technical and business audiences) Excellent time management and organizational skills combined with technical IT Security acumen Expert knowledge of Firewalls, TCP/IP, IPS, DLP, proxies, SIEM, & Endpoint Protection software Financial more »
Posted:

Lead Cyber Security Consultant- Contract - Hybrid -Reading

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Project People
reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Should have experience of using common information security management frameworks, such as NIST, PCI, GDPR, ISO Series, OWASP the IT Infrastructure Library (ITIL), the ISF Standards of Good Practice (SoGP) and ISACA's … Control Objectives for Information and related Technology (COBIT) frameworks. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture/design/decision templates … or difficult it will be to exploit these vulnerabilities. Must be well versed in the application of security policies and standards, governance, compliance, risk management and technical assurance practices Must have expertise and experience in one or more of the following technical domains: Cloud/Hybrid security Infrastructure and more »
Employment Type: Contract
Posted:

Senior Cyber Security Engineer

Teddington, London, United Kingdom
Matchtech
career development opportunities. About the Role As a Cyber Security Engineer your primary responsibility will be Security Operations and Incident Response as well as Vulnerability Management and Threat Intelligence. In addition, you will work closely with the Cyber Security Manager and Security Architect to independently resolve complex issues. … security operations centre (SOC) and responding to security alerts. Experience in creating response playbooks and handling escalations. Additional experience in EDR, M365 security, SIEM, Vulnerability management, MITRE attack framework, and Incident response. Strong stakeholder engagement skills and the ability to promote a secure mindset within an organisation. Previous more »
Employment Type: Permanent
Salary: £50,000
Posted:

Senior Security Engineer - Onsite - £100K

London Area, United Kingdom
Oliver Bernard
and security assurance testing, as well as configuring and fine tuning cyber security tools and solutions including preventative and detective measures for example firewalls, vulnerability management tools, and EDR. Skills You will have worked as a Cyber Security Engineer or in a similar position. You will have experience … in a broad variety of technology including AWS, Microsoft 365, internet protections, vulnerability management, SIEM, EDR. Experience securing on premises infrastructure and cloud services. Experience working with Systems Engineering teams, DevSecOps, CI/CD Senior Security Engineer - Onsite - £100K more »
Posted:

Lead Database Engineer - Patch Deployment Team (Remote)

Raleigh, North Carolina, United States
Hybrid / WFH Options
First Citizens Bank
installs, and upgrades systems. Resolves complex, escalated technical issues. Responsible for administration, communication, and documentation throughout technical support activities. Manages technical projects and assists management with other business initiatives. System Testing - Leads testing and monitoring activities that ensure all applications dependent on the infrastructure function without issues. Automates tasks … tests to provide continuous monitoring. Designs solutions that address system weaknesses or common issues and oversees their implementation. Data Security - Responsible for the security, management, and recovery of the Bank's distributed data assets. May lead disaster recovery efforts and other initiatives designed to protect the Bank's assets. … related database infrastructure through ongoing research. Communicates effective and clear technical information to associates and management. Serves as a resource to wider business unit, management, and project teams. Vulnerability Assessment: Conducting vulnerability assessments using Qualys tools. Analyzing and interpreting vulnerability data. • Remediation Strategies: Developing and implementing more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Head of Cyber Security

London Area, United Kingdom
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a “people manager” as well … business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerability management, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and … SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerability management tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials more »
Posted:

Security Assurance Manager

London Area, United Kingdom
La Fosse
assurance capabilities across various platforms and technologies. • Ensure that the IT estate complies with technical standards and the company policies to safeguard company assets. Management oversees directing the required remediation actions and countermeasures to lessen vulnerabilities and weaknesses that have been identified. • Create and enhance a regular penetration testing … programme for the red and purple teams that are in line with industry cyber threats and primary threat intelligence. • Create a Vulnerability Management procedure to guarantee that all security flaws and vulnerabilities that are known to exist are located, evaluated in context, given priority, and tracked for remediation … task requiring cross-partner cooperation at varying degrees of technical security proficiency. • In-depth knowledge and comprehension of operational excellence in programmes related to vulnerability management and cloud security posture management. • A working knowledge of compliance and regulatory frameworks, including GDPR, ISA/IEC 62443, ISO/IEC more »
Posted:

IT Asset Manager

Bradford, West Yorkshire, Yorkshire, United Kingdom
Yorkshire Water
a key part of how we plan to meet the changing expectations of customers and regulators. Where you fit in: As our IT Asset Management Manager you will Develop and mature the IT Asset Management strategy Design and maintain Asset Management policies, procedures and process Ensure our … systems of record and management are maintained and up to to date Provide standard and ad hoc reporting of software and hardware inventory, equipment inventory and other ad hoc reporting of hardware and software estates Monitor and manage software licenses to ensure they comply with license agreements and useage … software harvesting programme, recovering and redeploying unused licences. What skills & qualifications you will need: Considerable experience working in a leadership role in IT Asset Management Demonstratable background knowledge within licence management and software audit management Good understanding of mega vendors including SAP, Oracle, IBM and Microsoft licencing more »
Employment Type: Permanent
Posted:

Technology Manager

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Gen+
strong technical skills and a great customer service approach. You will have a good understanding of platform operations, integrations and surrounding technology (preferably Learning Management Systems), knowledge around cloud hosting and be able to use SQL to create custom reports. What you will be doing LMS/Platform Administration … monitor school sync systems (Includes Glow/RM and Xporter sync systems) Maintain/Develop the platform staging site for testing, demos, etc. Bug Management – Collate information, document, test and raise bugs with the development partner using Jira Maintain progress Reports for the education team – utilising PowerBI Build light … team around Educational technology, LMS/Platform functionality, accessibility and general technology Prepare reports for CEO, COO and wider Gen+ team IT and Security management Maintain the platform DPIA/Risk Assessment process – feeding into the Risk Register DNS record and certificate management relating to platform Manage GitHub more »
Posted:

SC cleared Lead/Tier 3 SOC Analyst

Birmingham, West Midlands
LA International Computer Consultants Ltd
ATT&CK and CIS. * Legal and Regulatory Understanding: Familiarity with laws and regulations related to cybersecurity, such as GDPR, CCPA, or HIPAA. Skills * Personnel Management * In house training of personnel. * Stakeholder engagement * Risk Management * Threat Hunting * Threat Analysis * Use of vulnerability management tools * Malware reverse engineering … Detection rule engineering * Incident Management * Alert Triage * Crisis management Experience * Extensive working experience in a live SOC environment * Line management experience. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to more »
Employment Type: Contract
Rate: £500 - £550
Posted:

System Administrator

Dublin, City of Dublin, Republic of Ireland
Hybrid / WFH Options
The Recruitment Company
network issue resolution Contribute to budget development Monitor spending Your Experience: Windows Server (Apply online only), Windows 10/11, Hyper-V, Active Directory Management, Group Policy Management, SCCM, SQL 2016+, Microsoft 365 and Azure platform administration and security, SharePoint, Endpoint Protection Technologies, Network Access Control (NAC) solutions … Backup methodology and management, Check Point firewall Excellent knowledge of and proven experience in best practice Information Security, e.g. Incident Response, Intrusion mgmt., Attack Monitoring, Network mgmt., Threat and Vulnerability Management, e.g. SIEM, XDR, Firewall, IPS, NAC, Server config controls Excellent knowledge of and proven experience in … netting, Firewalls, routing protocols, encryption standards Proficient in automation tools including PowerShell, Power Automate, Office apps Excellent knowledge of and proven experience in Data Management - including database technologies and methodologies around implementing data privacy and data encryption Proven experience in liaising with an array of external vendors Strong English more »
Employment Type: Permanent
Salary: £60000 - £65000/annum
Posted:

Senior Information Security Analyst

London
Hybrid / WFH Options
Nexus Jobs Limited
computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA more »
Employment Type: Permanent
Salary: £70,000 - £85,000
Posted:

Information Technology Security Specialist

Aberdeen, Scotland, United Kingdom
Hybrid / WFH Options
prosource.it
leads to the creation of high quality, secure by design, project deliveries. Examples of projects: Secure Internet Access Privileged Remote Access VPN consolidation Information Management (Records Management & Data Governance) Infrastructure Road Mapping Security Email Gateway Identifying security related risk from projects and leading risk assessment processes Identify divergences … deliveries Technical Experience: Security Risk Assessment Network Architecture Principles Web & email security technologies Reviewing and assessing security policy configuration within cloud environments (preferably Azure) Vulnerability Management and Security logging and monitoring tools Cloud Virtualisation and Containerisation security assessments and review Edge Security Technology, IAM, PAM Data Security and … governance Network Monitoring Tools and SIEM Technology Risk Management Tools Ability to act proactively, escalating issues as required Strong documentation and communication skills (verbal and written) Excellent problem-solving skills Strong knowledge and experience of IT change management processes and principles Willingness to stay up to date on more »
Posted:

Vulnerability Analyst

Leeds, England, United Kingdom
Cynexa
Vulnerability Analyst £55,000 Leeds Are you passionate about cybersecurity and ready to make an impact? Join my clients team in Leeds as a Vulnerability Analyst and play a crucial role in fortifying their defences against evolving threats. You will bride the communication gap between technical teams and … senior leadership, ensuring that security protocols remain effective and aligned with business objectives. To succeed in this role, you'll need strong experience in vulnerability analysis or a related role. You must be able to show proficiency in vulnerability scanning tools and technologies, as well as a solid … excellent communication skills to convey technical information to non-technical audiences. Offensive security certifications are a definite plus. This is your chance to expand vulnerability management across new horizons within their business, ensuring that security is not just integrated but ingrained in every facet. Don't miss out more »
Posted:
Vulnerability Management
10th Percentile
£39,850
25th Percentile
£50,000
Median
£65,000
75th Percentile
£82,500
90th Percentile
£97,500