Vulnerability Management Jobs

76 to 100 of 226 Vulnerability Management Jobs

IT Security Engineer

Aldie, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Security Engineer

Herndon, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Security Engineer

Reston, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Security Engineer

Sterling, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Security Engineer

Burke, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Security Engineer

Merrifield, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Security Engineer

Chantilly, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Security Engineer

Springfield, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Security Engineer

Falls Church, Virginia, United States
Leidos
The Cyber Security Engineer shall have security Assessment and Authorization (A&A) expertise, to include but not limited to: ICD 503, Federal Information Security Management Act (FISMA), Xacta, and National Institute of Standards and Technology (NIST). Primary Responsibilities Lead multi-disciplined teams in the design and implementation of … and configure collection services and tools Work with team members to move data to the appropriate data stores Meet hands-on RMF responsibilities Lead Vulnerability Management and ConMon tasks with Enterprise Security Services Basic Qualifications Must possess an active Top Secret Security Clearance with ability to obtain SCI … Jira, Confluence, RocketChat) Working knowledge with XACTA 360, Tenable Security Center, Nessus, Trelix ePO, ACAS, HBSS and Audit enterprise security services Proficient in ACAS Vulnerability and STIG scanning, reporting, management and remediation Viewed as an industry expert in the Risk Management Framework (RMF) steps one thru six more »
Employment Type: Permanent
Salary: USD Annual
Posted:

OT Cyber Security Lead

Enfield, London, United Kingdom
Hybrid / WFH Options
Johnson Matthey Plc
and JMIT, particularly Security Operations Centre (SOC) and CISO functions. T ake a lead role in monitoring unusual activity across OT environments utilising asset management and vulnerability management tools, reporting incidents/vulnerabilities and working with SOC and Site functions for assessment, investigation and resolution. Requirements for more »
Employment Type: Part Time, Work From Home
Posted:

OT Cyber Security Lead

Royston, Hertfordshire, South East, United Kingdom
Hybrid / WFH Options
Johnson Matthey Plc
and JMIT, particularly Security Operations Centre (SOC) and CISO functions. T ake a lead role in monitoring unusual activity across OT environments utilising asset management and vulnerability management tools, reporting incidents/vulnerabilities and working with SOC and Site functions for assessment, investigation and resolution. Requirements for more »
Employment Type: Part Time, Work From Home
Posted:

🌳🌳🌳Head of Information Security Operations – CONTRACT – 6-12 Months – Urgent – Reading/Thames Valley🌳🌳🌳

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
the confidentiality, integrity and availability of information systems are maintained to protect customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Experience 🌳Minimum 5+ years commercial experience more »
Posted:

IT Cyber Security Analyst & Team Leader - UK South or Mids

Dorset, United Kingdom
Experis
are conducted, and improvements implemented and ensure colleague queries around policies and requirements are appropriately answered in a timely manner. Be responsible for the Vulnerability Management process. Act on vulnerability information and conduct Cyber Security risk assessments and work with suppliers, partners, and internal teams to ensure … need: In depth knowledge of Information Security concepts and principles, including cloud security capabilities. Experience with configuring and utilising security tooling, including SIEM, EDR, vulnerability scanners, CASB, network scanning, DLP. Hands-on IT experience with proven expertise in a previous Information Security role. Vendor management experience. A relevant more »
Employment Type: Permanent
Salary: £50000/annum + Excellent Bens
Posted:

Information Assurance Engineer

Tampa, Florida, United States
Leidos
Leidos Defense group has an opening for a highly motivated individual. The Information Assurance Engineer position at MacDill AFB, FL supports the Global Solutions Management-Operations II (GSM-O II), Joint Communications Support Element (JCSE). The JCSE team provides en-route, early entry, scalable C4 support to Regional … Key elements of this position include: Capture and refine information security requirements and ensure their integration into information technology components and information systems: Perform vulnerability assessments, to determine weaknesses and exploit methods in systems/networks; Perform cybersecurity analysis and hardening of complex IT systems; and conducting cybersecurity mitigations … on design solutions to comply with Risk Management Framework (RMF) cybersecurity requirements. Responsibilities include: Develop Security plan of action and milestones (POA&M) for all open security findings identified during the development phase of modernization on the end -to-end enterprise infrastructure (Data Center, SATCOM Gateway, and deployed kits more »
Employment Type: Permanent
Salary: USD Annual
Posted:

DevSecOps Engineer

East London, London, United Kingdom
Hybrid / WFH Options
MECS Communications Ltd
out Splunk software across the platforms & infrastructure managed by the Engineering & Run & Operate teams. The DevSecOps Engineer will also oversee logging & Security Information & Event Management (SIEM) aspects of infrastructure, collaborating with application development teams to resolve issues & enhance security measures within the CI/CD pipeline. If you have … day London office, 4 days remote working, work from home Key Skills: Continuous Integration (CI), Continuous Deployment (CD), Infrastructure as Code (IaC), Security Automation, Vulnerability Management, Threat Intelligence, Secure Software Development Lifecycle (SSDLC), Compliance as Code, Security Orchestration, Container Security, Microservices Security, Threat Modelling, Secure Configuration Management, Secure DevOps Practices, Security Scanning & Testing, Security Incident Response, Identity & Access Management (IAM), Secure Cloud Environments, Secure Code Reviews Nature: Permanent, Full Time Hours: Monday - Friday 09.00 -17.30 Gross pay rate: £55,000 - £70,000 basic + 20% bonus, Health Care, Discounts & other benefits Key Activity: * Develop more »
Employment Type: Permanent, Work From Home
Salary: £65,000
Posted:

Head of Cyber

Bristol, Avon, South West, United Kingdom
Synoptix
Lead and deliver Cybersecurity work packages on behalf of Synoptix clients or as part of internal delivery programmes. This may include: Development of Security Management Plans Understanding and defining the capability context Performance of Risk Assessments (System Driven or Component Driven) Define and architect of Security Controls Development of … SyOps Development of CoCos Vulnerability Management Planning Development of Key/Certificate Management Plans Development of Security Case Reports. Support to Security Working Groups Management (but not delivery of) Penetration Testing and/or TEMPEST Testing Act as an SME for security requirements. Assist in the …/certificate management. Extensive experience in embedding security best practices within multi-disciplinary product teams. Experience in conducting security risk assessments. Experience of Security Management Plan (SMP) Generation Experience of Security Case/Security Case Report Generation Strong communication and stakeholder management skills. Strong analytical and problem-solving more »
Employment Type: Permanent
Salary: £90,000
Posted:

Head of Information Security

Reading, England, United Kingdom
Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
Posted:

IT Cyber Security Manager

Surrey, United Kingdom
Hybrid / WFH Options
Gold Group
will Provide Security Input for projects in a Digital Transformation Programme as well as establish and maintain cyber security policies and procedures. Own threat management and response. Manage and mentor the cyber security team. Manage Security tooling risks and processes. Own vulnerability management through the whole lifecycle … incident response capabilities and overall security posture Perform malware analysis and digital forensics where appropriate Drive internal phishing campaigns (KnowBe4 platform) and work with management and HR - Training to raise Cyber awareness within the corporate environment, (new hire inductions, periodic training, etc) Own maintenance, renewal and distribution of SSL … network concepts and technologies, particularly in a Microsoft-centric environment (Defender for Cloud, Cloud apps, Security scores, Purview including Data classification and retention, Identity Management, and conditional Access) Strong attention to detail with an analytical mindset and the ability to spot and investigate anomalous behaviour Strong Communication skills and more »
Employment Type: Permanent
Salary: £80000 - £500000/annum + Benefits
Posted:

HEAD OF INFORMATION SECURITY OPERATIONS- CONTRACT

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Experience Minimum 5+ years commercial experience …/Anti-Virus/Identity Awareness/URL Filtering SIEM/Splunk Enterprise Desktop and Server Anti-Virus/Malware and endpoint protection technologies Vulnerability Security Scanning e.g. Nessus Microsoft Windows Server family of products. Operational experience of PCI DSS Citrix XenApp, remote access products LAN & WAN networking using … Cisco routers, switches and infrastructure products. Good understanding of TCP/IP Identity and access management systems Active Directory, GPO Configuration Citrix/VMWare Experience of managing and developing a SIEM system, and feeding events into a SOC in order to identify and alert on security incidents Understanding of more »
Employment Type: Contract
Posted:

Cloud Security Engineer

Dublin, City of Dublin, Republic of Ireland
Hybrid / WFH Options
Reperio Human Capital
and communicating information security policies for their organisation, ensuring ongoing compliance and adherence. Requirements: Minimum of 3 years of relevant experience in information security management activities. Microsoft Security Operations Analyst certification is preferred. Experience with Microsoft Security Suite of products essential - Azure, Sentinel, Defender etc. Experience with Microsoft … and Azure - Entra ID, Conditional Access, Enterprise Apps, App Registrations, Identity Protection, Privileged Identity Management, Identity Governance, Azure Infrastructure, Entra Connect, Intune, Secure Score, Exposure Management, Exchange Online Protection, Purview Familiarity with firewalls, SIEM, EDR, IDS/IPS concepts, email Security products, Vulnerability management and relevant more »
Employment Type: Contract
Rate: £345 - £517/day
Posted:

Information Security Cloud Analyst

Northampton, England, United Kingdom
Peaple Talent
maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat intelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerability management programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of Information Security Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring more »
Posted:

Cyber Security Assurance Specialist

Birmingham, West Midlands, United Kingdom
Hays
supplier chain security agreements/contracts/questionnaires and manage completion and disengagement. * Lead reviews of governance practices with appropriate and sufficient independence from management activity. * Develop policies, standards, processes, guidelines for ensuring appropriate security standards are in place and are adhered to. * Ensure architectural security principles are applied … and assessments of product security architectures and designs across a diverse range of complex infrastructure, data and application systems. * Ensure timely and robust incident management resolution, including major incident response coordination and management. * Deputise for the Senior IT Security Manager as and when required. Education, Qualifications & Training * Achieved one … more relevant qualification/certification (i.e. CISSP, CISA, CISM Knowledge & Experience * Expert knowledge of security data tools, information security controls, security best practice and management strategies. * Experience of designing control maturity tests and conducting control maturity assessments. * Experience of overseeing and leading remediation of security assessments, technical testing, and more »
Employment Type: Permanent
Salary: £60,000
Posted:

Vulnerability Analyst

Portsmouth, England, United Kingdom
TRIA
Information Security Vulnerability Analyst £50,000 - £55,000 Hybrid - 2 days per week in either Horley/Portsmouth office depending on location We are looking for a brilliant Vulnerability Analyst to join a constantly growing UK utilities company as they embark on a 5 year long transformation of … for an individual that has: At least 2 years’ cyber security experience, with a background in IT infrastructure or networking Experience or knowledge of vulnerability management tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for more »
Posted:

Enterprise Security Architect

Glasgow, Scotland, United Kingdom
NextTech Recruitment
in projects and operations Work with technical teams baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation and identity and access management (IAM) Work with technical teams develops standards and practices for data encryption and tokenization Draft security procedures and standards to be reviewed and approved … by executive management and/or formally authorised by the chief information security officer (CISO) Threat modelling of services and applications that tie to the risk and data associated with the service or application Key Qualifications: Vast experience in leading/mentoring teams in “secure by design” including a … strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services, identity management, as well as securing CI/CD pipelines. Direct, hands-on experience or a solid working knowledge of relevant security patterns, vulnerability management tools, securing public cloud applications. Full more »
Posted:

Senior Security Engineer

London Area, United Kingdom
Caspian One
. Ability to develop and implement strategies for compliance with data protection regulations. Knowledge and experience in security technologies such as EDR, SIEM, and Vulnerability Management is a plus. Relevant security certifications (CISSP, GCIA, CISM, etc.) and/or product certifications (Azure, Windows, AD, etc.) are desirable. This more »
Posted:
Vulnerability Management
10th Percentile
£39,850
25th Percentile
£50,000
Median
£65,000
75th Percentile
£82,500
90th Percentile
£97,500