Vulnerability Management Jobs

51 to 75 of 226 Vulnerability Management Jobs

SC cleared Lead/Tier 3 SOC Analyst

Birmingham, West Midlands
LA International Computer Consultants Ltd
ATT&CK and CIS. * Legal and Regulatory Understanding: Familiarity with laws and regulations related to cybersecurity, such as GDPR, CCPA, or HIPAA. Skills * Personnel Management * In house training of personnel. * Stakeholder engagement * Risk Management * Threat Hunting * Threat Analysis * Use of vulnerability management tools * Malware reverse engineering … Detection rule engineering * Incident Management * Alert Triage * Crisis management Experience * Extensive working experience in a live SOC environment * Line management experience. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to more »
Employment Type: Contract
Rate: £500 - £550
Posted:

System Administrator

Dublin, City of Dublin, Republic of Ireland
Hybrid / WFH Options
The Recruitment Company
network issue resolution Contribute to budget development Monitor spending Your Experience: Windows Server (Apply online only), Windows 10/11, Hyper-V, Active Directory Management, Group Policy Management, SCCM, SQL 2016+, Microsoft 365 and Azure platform administration and security, SharePoint, Endpoint Protection Technologies, Network Access Control (NAC) solutions … Backup methodology and management, Check Point firewall Excellent knowledge of and proven experience in best practice Information Security, e.g. Incident Response, Intrusion mgmt., Attack Monitoring, Network mgmt., Threat and Vulnerability Management, e.g. SIEM, XDR, Firewall, IPS, NAC, Server config controls Excellent knowledge of and proven experience in … netting, Firewalls, routing protocols, encryption standards Proficient in automation tools including PowerShell, Power Automate, Office apps Excellent knowledge of and proven experience in Data Management - including database technologies and methodologies around implementing data privacy and data encryption Proven experience in liaising with an array of external vendors Strong English more »
Employment Type: Permanent
Salary: £60000 - £65000/annum
Posted:

Senior Information Security Analyst

London
Hybrid / WFH Options
Nexus Jobs Limited
computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA more »
Employment Type: Permanent
Salary: £70,000 - £85,000
Posted:

Information Technology Security Specialist

Aberdeen, Scotland, United Kingdom
Hybrid / WFH Options
prosource.it
leads to the creation of high quality, secure by design, project deliveries. Examples of projects: Secure Internet Access Privileged Remote Access VPN consolidation Information Management (Records Management & Data Governance) Infrastructure Road Mapping Security Email Gateway Identifying security related risk from projects and leading risk assessment processes Identify divergences … deliveries Technical Experience: Security Risk Assessment Network Architecture Principles Web & email security technologies Reviewing and assessing security policy configuration within cloud environments (preferably Azure) Vulnerability Management and Security logging and monitoring tools Cloud Virtualisation and Containerisation security assessments and review Edge Security Technology, IAM, PAM Data Security and … governance Network Monitoring Tools and SIEM Technology Risk Management Tools Ability to act proactively, escalating issues as required Strong documentation and communication skills (verbal and written) Excellent problem-solving skills Strong knowledge and experience of IT change management processes and principles Willingness to stay up to date on more »
Posted:

Vulnerability Analyst

Leeds, England, United Kingdom
Cynexa
Vulnerability Analyst £55,000 Leeds Are you passionate about cybersecurity and ready to make an impact? Join my clients team in Leeds as a Vulnerability Analyst and play a crucial role in fortifying their defences against evolving threats. You will bride the communication gap between technical teams and … senior leadership, ensuring that security protocols remain effective and aligned with business objectives. To succeed in this role, you'll need strong experience in vulnerability analysis or a related role. You must be able to show proficiency in vulnerability scanning tools and technologies, as well as a solid … excellent communication skills to convey technical information to non-technical audiences. Offensive security certifications are a definite plus. This is your chance to expand vulnerability management across new horizons within their business, ensuring that security is not just integrated but ingrained in every facet. Don't miss out more »
Posted:

Security Operations Engineer

Belfast, Northern Ireland, United Kingdom
Hybrid / WFH Options
Idox plc
best practice, quality assurance and governance, as appropriate for each project. The SecOps Engineer will take a proactive approach to security matters and risk management, leading investigations, root cause analysis and vulnerabilities under the guidance of the cloud architecture team. There may be an opportunity to develop a management … Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage … automated scanning tools to ensure continuous security monitoring. Secure Configuration Management: Establish and enforce secure configuration standards for EC2 instances, Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Automate configuration management processes using infrastructure-as-code tools (Terraform). Security Compliance: Ensure AWS infrastructure and applications comply more »
Posted:

Cyber Security Consultant

Reading, England, United Kingdom
Project People
customer trust in a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Experience with information security management frameworks (NIST, PCI, GDPR, ISO, OWASP, ITIL, ISF SoGP, COBIT) is essential. The role will involve supporting project managers in risk and issue management … templates is vital. Expertise and experience in technical domains ie hybrid security, infrastructure and data centre security, network security, application security, identity and access management, and vulnerability management are important. Experience of influencing and negotiating technical outcomes with third parties, including conflict resolution due to changing priorities. … the clients they are supporting or projects they are deliverable in the UK. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture/ more »
Posted:

Senior Cyber Security Engineer

Reading, Berkshire, South East, United Kingdom
Hybrid / WFH Options
Proactive Appointments Limited
someone with previous experience in a Cyber Security Engineer role where they have gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. Experience working with cloud hosting providers, managing application testing and working with system owners/developers to improve application … in complex cross-technology environments. Maintain accurate logs of security events and incidents. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetration testing to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security … understanding of Security Infrastructure design, IT Security best practice and hardening standards. Strong understanding of common IT protocols, infrastructure and systems e.g. Networks, Domain management and virtualised infrastructure. Understanding of security operations and keen to learn. Strong communication skills and able to work collaboratively with IT and other stakeholders. more »
Employment Type: Permanent, Work From Home
Salary: £60,000
Posted:

Senior Cyber Security Engineer

Reading, Berkshire, South East, United Kingdom
Focus Resourcing Group
in Reading. For this exciting role we are seeking an engineer who has gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. They are also looking for experience working with cloud hosting providers, managing application testing and working with system owners … to recover service in complex cross-technology environments. Work to defined SLAs & KPIs. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetration testing to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security … understanding of Security Infrastructure design, IT Security best practice and hardening standards Strong understanding of common IT protocols, infrastructure and systems e.g. Networks, Domain management and virtualised infrastructure Understanding of security operations and keen to learn Strong communication skills and able to work collaboratively with IT and other stakeholders more »
Employment Type: Permanent
Posted:

Sr. Cyber Security Engineer

Burke, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. Cyber Security Engineer

Chantilly, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. Cyber Security Engineer

Manassas, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. Cyber Security Engineer

Reston, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. Cyber Security Engineer

Springfield, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. Cyber Security Engineer

Herndon, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. Cyber Security Engineer

Sterling, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. Cyber Security Engineer

Merrifield, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. Cyber Security Engineer

Aldie, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. Cyber Security Engineer

Falls Church, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Technology Security Analyst

London Area, United Kingdom
Hybrid / WFH Options
Intaso
and maintaining the integrity, confidentiality, and availability of our information systems. Your expertise in Microsoft technologies and experience with SIEM (Security Information and Event Management) tools will be instrumental in identifying and mitigating security threats proactively. Responsibilities: 1. Security Monitoring and Incident Response: - Utilize SIEM tools such as Microsoft … analyse root causes, and implement necessary remediation actions. - Develop and maintain incident response procedures to ensure timely and effective handling of security breaches. 2. Vulnerability Management: - Conduct regular vulnerability assessments and penetration tests to identify weaknesses in our systems and infrastructure. - Collaborate with system administrators and developers more »
Posted:

Cyber Security Engineer

Reading, England, United Kingdom
Focus Resourcing Limited
in Reading. For this exciting role we are seeking an engineer who has gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. They are also looking for experience working with cloud hosting providers, managing application testing and working with system owners … to recover service in complex cross-technology environments. Work to defined SLAs & KPIs. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetration testing to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security … understanding of Security Infrastructure design, IT Security best practice and hardening standards Strong understanding of common IT protocols, infrastructure and systems e.g. Networks, Domain management and virtualised infrastructure Understanding of security operations and keen to learn Excellent communication skills and able to work collaboratively with IT and other stakeholders more »
Posted:

Information Technology Security Manager

Birmingham, England, United Kingdom
Hybrid / WFH Options
Crimson
business objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, IT Security Management experience the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response, threat … management, and vulnerability management, among other areas. the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. with IT Service Frameworks more »
Posted:

IT Security Manager - Security Operations - Birmingham

Birmingham, West Midlands, West Midlands (County), United Kingdom
Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threat management, and vulnerability management, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »
Employment Type: Permanent
Salary: £50950 - £50951/annum
Posted:

Lead IT Security Manager

Birmingham, West Midlands, West Midlands (County), United Kingdom
Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threat management, and vulnerability management, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »
Employment Type: Permanent
Salary: £50950 - £56000/annum
Posted:

IT Security Engineer

Manassas, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:
Vulnerability Management
10th Percentile
£39,850
25th Percentile
£50,000
Median
£65,000
75th Percentile
£82,500
90th Percentile
£97,500