bristol, south west england, united kingdom Hybrid / WFH Options
Logiq
EDR, anti-malware, and DLP. Monitoring & Threat Detection Operate and optimise SIEM tools (Splunk, Microsoft Sentinel) for proactive threat detection and incident response. Vulnerability Management Perform vulnerability assessments using Qualys and Tenable, driving remediation and continuous improvement. Compliance & Governance Align security controls with frameworks such as ISO 27001, NIST, CIS, and Cyber Essentials, supporting audits and certification processes. What We More ❯
for: Proven leadership in cyber security engineering Expertise in vulnerability scanning, penetration testing, and risk assessments Strong communication and stakeholder management skills Hands-on experience with tools like Zscaler, Qualys, Taegis, IDS/IPS, SIEM Deep knowledge of NIST, ISO 27001, GDPR, and cloud security principles Expertise in financial services regulatory compliance Experience in strategic planning and reporting to senior More ❯
Proven capability in creating and executing comprehensive threat and vulnerability management programmes, including vulnerability scanning, penetration testing, and security awareness training. Proficiency in using vulnerability scanning tools (e.g. Tenable, Qualys, Rapid7, Veracode, JFrog Xray), threat intelligence platforms, and incident response tools. Prior experience implementing automated solutions for vulnerability scanning, threat detection, and incident response, with a focus on continuous process More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
in Computer Science, Information Security, or equivalent practical experience Familiarity with frameworks such as MITRE ATT&CK, NIST, ISO 27001, Cyber Essentials+ Hands-on experience with tools like Nessus, Qualys, SIEM, EDR, DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency More ❯
Other skills & experience: Hands-on experience working in a vulnerability testing environment , utilising third party tools to perform analysis of systems/reporting of vulnerabilities (e.g. Nessus, Metasploit, Nexpose, Qualys, IBM AppScan). Strong foundational understanding of enterprise system, network and application architectures. Demonstrable comprehension of end-to-end vulnerability management workflow to include industry standards such as CVE, CPE More ❯
OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
Proven capability in creating and executing comprehensive threat and vulnerability management programmes, including vulnerability scanning, penetration testing, and security awareness training. Proficiency in using vulnerability scanning tools (e.g. Tenable, Qualys, Rapid7, Veracode, JFrog Xray), threat intelligence platforms, and incident response tools. Prior experience implementing automated solutions for vulnerability scanning, threat detection, and incident response, with a focus on continuous process … both technical and non-technical stakeholders, including executive leadership. Education/Qualifications/Technical Competencies Essential Recognised cybersecurity certification: CISSP and/or CISM Strong knowledge of: Ivanti LANDesk, Qualys, Splunk Windows Server/Desktop, RHEL/OEL Linux PowerShell and Python scripting Proven experience leading strategic security initiatives and process automation in large-scale environments Desirable Additional certifications: CCSP More ❯
OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
Proven experience in enterprise-scale environments supporting both Windows Server and Linux platforms. Familiarity with patch management tools (eg, WSUS, SCCM, Ansible). Exposure to vulnerability scanning tools (eg, Qualys, Tenable, Rapid7). Understanding of ITIL processes and change control. Strong troubleshooting and diagnostic skills. Ability to work collaboratively under direction while managing tasks independently. Please apply with your CV More ❯
new development efforts. Collaboration & Other Duties: Perform other duties as required. Requirements: Experience in information security or security operations, typically demonstrated over several years.Practical experience with security tools, including Qualys, SIEM platforms (such as Splunk or Sentinel), and antivirus/endpoint detection and response (AV/EDR) solutions. Familiarity with compliance frameworks, such as ISO 27001. Ability to communicate security More ❯
large enterprises, across a diverse technology stack (IaaS/PaaS/SaaS/physical/mainframe/hybrid-cloud) and delivery lifecycles (Project/COTS applications, DevOps) Expertise with Qualys and other vulnerability and exposure management technologies Expertise in the full vulnerability management lifecycle Vendor and market analysis and engagement Ability to translate technical information into Risks, Threats, and Vulnerabilities More ❯
Wirral, Merseyside, England, United Kingdom Hybrid / WFH Options
QA
Responsibilities: Support Cyber Essentials/Plus assessors with technical tasks Assist with IT support and MSP-related responsibilities Work with tools like Office 365, Syncro RMM, DNS Filter, and Qualys Manage WordPress and mobile device security Contribute to patch management and vulnerability scanning Participate in hybrid working after probation Engage in a structured 3-year training plan to become a More ❯
function. Key Responsibilities Drive the Vulnerability Management strategy across the business, acting as the SME for all VM related queries. Configure, fine-tune and manage the Vulnerability Management tooling (Qualys, RiskSense, Tanium, etc). Work with SecOps teams to coordinate response to high profile/severity vulnerabilities. Develop and enhance Vulnerability Management standards and procedures, continually looking for opportunities to More ❯
function. Key Responsibilities Drive the Vulnerability Management strategy across the business, acting as the SME for all VM related queries. Configure, fine-tune and manage the Vulnerability Management tooling (Qualys, RiskSense, Tanium, etc). Work with SecOps teams to coordinate response to high profile/severity vulnerabilities. Develop and enhance Vulnerability Management standards and procedures, continually looking for opportunities to More ❯
function. Key Responsibilities Drive the Vulnerability Management strategy across the business, acting as the SME for all VM related queries. Configure, fine-tune and manage the Vulnerability Management tooling (Qualys, RiskSense, Tanium, etc). Work with SecOps teams to coordinate response to high profile/severity vulnerabilities. Develop and enhance Vulnerability Management standards and procedures, continually looking for opportunities to More ❯
london (city of london), south east england, united kingdom
Lawrence Harvey
function. Key Responsibilities Drive the Vulnerability Management strategy across the business, acting as the SME for all VM related queries. Configure, fine-tune and manage the Vulnerability Management tooling (Qualys, RiskSense, Tanium, etc). Work with SecOps teams to coordinate response to high profile/severity vulnerabilities. Develop and enhance Vulnerability Management standards and procedures, continually looking for opportunities to More ❯
function. Key Responsibilities Drive the Vulnerability Management strategy across the business, acting as the SME for all VM related queries. Configure, fine-tune and manage the Vulnerability Management tooling (Qualys, RiskSense, Tanium, etc). Work with SecOps teams to coordinate response to high profile/severity vulnerabilities. Develop and enhance Vulnerability Management standards and procedures, continually looking for opportunities to More ❯
Qualys SME 6 MonthsFully Remote £540 per day (Inside IR35) Essential Responsibilities :Transposing security build guides and documentation.Developing configuration compliance policies in Qualys Policy Audit service.Liaising and validating the transposed build guides and documentation with the relevant technology teams. Required Technical Skills: Experience with Qualys configuration compliance scanning tool Policy Compliance/Policy Audit.Experience with other configuration compliance services (e.g. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
ARM
Qualys SME 6 Months Fully Remote £540 per day (Inside IR35) Essential Responsibilities : Transposing security build guides and documentation. Developing configuration compliance policies in Qualys Policy Audit service. Liaising and validating the transposed build guides and documentation with the relevant technology teams. Required Technical Skills: Experience with Qualys configuration compliance scanning tool Policy Compliance/Policy Audit. Experience with other More ❯