Strong knowledge of network security, cloud security (AWS/Azure/GCP), encryption, IAM, endpoint protection, and SIEM solutions . Hands-on experience with tools such as Splunk, CrowdStrike, Qualys, Nessus, Palo Alto, Fortinet, or similar . Solid understanding of security frameworks and standards: NIST, CIS Controls, ISO 27001 , and compliance mandates relevant to banking. Familiarity with secure coding practices More ❯
skills, with the ability to explain technical issues to non-technical audiences. Desirable Skills: Experience in financial services or multi-site support environments. Exposure to vulnerability management tools (e.g., Qualys) and remote access administration. Experience with Microsoft Power Apps and automation of Service Desk processes. ITIL 4 Foundation and/or Service Desk Analyst certification. Shift pattern covering the following More ❯
a suitable maturity model to develop the SOC, and the subsequent implementation of an agreed standard to improve this maturity where appropriate. Familiar with the following tools: Microsoft Sentinel Qualys VMDR Tenable VM MITRE ATT&CK Framework Desirable Certifications, Qualifications Experience: Computer Security Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst One More ❯
a suitable maturity model to develop the SOC, and the subsequent implementation of an agreed standard to improve this maturity where appropriate. Familiar with the following tools: Microsoft Sentinel Qualys VMDR Tenable VM MITRE ATT&CK Framework Desirable Certifications, Qualifications Experience: Computer Security Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst One More ❯
a suitable maturity model to develop the SOC, and the subsequent implementation of an agreed standard to improve this maturity where appropriate. Familiar with the following tools: Microsoft Sentinel Qualys VMDR Tenable VM MITRE ATT&CK Framework Desirable Certifications, Qualifications Experience: Computer Security Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst One More ❯
with security accreditation, compliance, and risk assessment for deployable communications and information systems (CIS). What You ll Do Conduct vulnerability scanning using tools such as Tenable/Nessus, Qualys, or OpenVAS Develop, maintain, and review Security Accreditation documentation in line with NIST RMF, DoD RMF, and ISO 27001 Perform and support Security Risk Assessments (SRA) across CIS assets Coordinate More ❯
with security accreditation, compliance, and risk assessment for deployable communications and information systems (CIS). What You’ll Do Conduct vulnerability scanning using tools such as Tenable/Nessus, Qualys, or OpenVAS Develop, maintain, and review Security Accreditation documentation in line with NIST RMF, DoD RMF, and ISO 27001 Perform and support Security Risk Assessments (SRA) across CIS assets Coordinate More ❯
with security accreditation, compliance, and risk assessment for deployable communications and information systems (CIS). What You’ll Do Conduct vulnerability scanning using tools such as Tenable/Nessus, Qualys, or OpenVAS Develop, maintain, and review Security Accreditation documentation in line with NIST RMF, DoD RMF, and ISO 27001 Perform and support Security Risk Assessments (SRA) across CIS assets Coordinate More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
Rickmansworth, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Senior plc
knowledge sharing and team training. Skilled in using threat frameworks (e.g. MITRE ATT&CK, Cyber Kill chain). Experienced in using OSINT and security analysis tools (e.g. Shodan, Censys, Qualys, Virus Total, EDR, AV). Experience supporting incident response or vulnerability management programs. Professional certifications in Cyber and Information Security (e.g. OCSP, GREM, CEH). Strong analytical and problem-solving More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
of HMG Security Standards and Processes. Ability to balance business needs with technical and security standards. Attributes: Commercial awareness. Familiarity with ITIL practices. Technologies: Microsoft Sentinel AT&T USM Qualys Office365 MS Exchange Defender Suite & ADX Platform What can we offer you? Referral Bonus Earn £1000 when you refer a friend to join us! Endless Learning Get access to Linked More ❯
Barrow-In-Furness, Cumbria, Barrow in Furness, United Kingdom Hybrid / WFH Options
Experis
be a self-starter with good stakeholder management skills. Good to have Experience of working within Defence sector on OS, S and TS environments. Knowledge of Vulnerability tools: Nessus, Qualys, Tanium All profiles will be reviewed against the required skills and experience. Due to the high number of applications we will only be able to respond to successful applicants in More ❯
Barrow-In-Furness, Cumbria, North West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
Key Skills & Experience: * Must be a self-starter with good stakeholder management skills. * Experience of working within MOD on OS, S and TS environments. * Knowledge of Vulnerability tools: Nessus, Qualys, Tanium This is an excellent opportunity on a great project of work, If you are looking for your next exciting opportunity, apply now for your CV to reach me directly More ❯
Skills & Experience: In-depth experience with Microsoft 365, PowerShell, MDM/MAM (e.g., Intune), and RMM tools Hands-on endpoint management & deployment experience Familiarity with vulnerability management platforms (e.g., Qualys) Security-conscious mindset, with exposure to frameworks like Cyber Essentials Broad infrastructure knowledge (servers, networks, cloud services) MSP experience is advantageous but not essential Qualifications: We value experience, but working More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
FryerMiles Recruitment
in a consultative capacity Demonstratable experience in delivering Web Application and Infrastructure/cloud tests Relevant penetration testing certifications (OSCP, CRT, CCT) Experience of relevant toolings such as Nessus, Qualys, Kali etc.. Experience mentoring or assisting junior/graduate testers Eligibility to be SC Cleared This client do pen testing differently & are not your typical offensive security consultancy & there are More ❯
critical 24/7 environment. Their infrastructure includes over 450 servers operating across both Windows and Linux platforms — making secure access and timely response essential. Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools is needed for this role. Key Skills from the Vulnerability Analyst: Demonstrated experience in vulnerability management within large-scale enterprise or corporate … environments . Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools. Strong working knowledge of Windows and Linux operating systems , including their associated technology stacks. Able to operate effectively in a secure, complex, and highly regulated setting with restricted access considerations. Key responsibilities for the Vulnerability Analyst: Daily monitoring and analysis of security events and vulnerabilities. … Proactively reviewing Qualys reports to identify missing patches, misconfigurations, and other potential threats. Collaborating closely with infrastructure and operations teams to coordinate and apply remediation actions. Ensuring alignment with regulatory compliance and internal security standards. Supporting patch management processes under the guidance of established teams. The Vulnerability Analyst is required onsite 2 days per week in Felixstowe. Apply now to More ❯