depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and communication skills Security certifications such as More ❯
ArcSight/AlienVault/Microsoft Sentinel/LogRhythm). Enterprise level Operating Systems RedHat Linux & Windows Server command line required. Vulnerability Management Technologies (e.g. Qualys, Tenable, Rapid7) or MDR Technologies (e.g. TrendMicro, SentinelOne, CrowdStrike). Ability to achieve SC & NPPV3 Clearances. Preferred Skills and Experience IDS/IPS technologies (e.g. More ❯
fields (or equivalent certifications) Preferred certifications: CISSP, CEH, GSEC Familiarity with network protocols, operating systems, and security principles Proficiency with security tools like LogRhythm, Qualys, SCCM, Intune, Microsoft 365, AD, and enterprise anti-malware Technical knowledge in network segmentation, firewalls, Mitre Att&ck, Windows, Linux, and Mac, with experience in More ❯
detail. Nice to Have (But Not Essential): Familiarity with security frameworks such as ISO27001, Cyber Essentials, or NIST. Exposure to tools like Microsoft Defender, Qualys, Tenable, or CrowdStrike. Certifications such as CompTIA Security+, Microsoft SC-900, SC-200, or similar. More ❯
detail. Nice to Have (But Not Essential): Familiarity with security frameworks such as ISO27001, Cyber Essentials, or NIST. Exposure to tools like Microsoft Defender, Qualys, Tenable, or CrowdStrike. Certifications such as CompTIA Security+, Microsoft SC-900, SC-200, or similar. More ❯
detail. Nice to Have (But Not Essential): Familiarity with security frameworks such as ISO27001, Cyber Essentials, or NIST. Exposure to tools like Microsoft Defender, Qualys, Tenable, or CrowdStrike. Certifications such as CompTIA Security+, Microsoft SC-900, SC-200, or similar. More ❯
detail. Nice to Have (But Not Essential): Familiarity with security frameworks such as ISO27001, Cyber Essentials, or NIST. Exposure to tools like Microsoft Defender, Qualys, Tenable, or CrowdStrike. Certifications such as CompTIA Security+, Microsoft SC-900, SC-200, or similar. More ❯
detail. Nice to Have (But Not Essential): Familiarity with security frameworks such as ISO27001, Cyber Essentials, or NIST. Exposure to tools like Microsoft Defender, Qualys, Tenable, or CrowdStrike. Certifications such as CompTIA Security+, Microsoft SC-900, SC-200, or similar. More ❯
Penetration Testing Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Intrusion Detection/Prevention Systems (IDS/IPS) (Suricata, Snort, Bro More ❯
of assets. Hands-on experience in enterprise scale Amazon Web Services. A range of industry leading tooling, such as GitHub, Jfrog Artifactory, Jenkins, Docker, Qualys and Hashicorp Vault. Contributing to solving Enterprise scale problems. Delivering work for multiple stakeholders. Managing security and technology in a regulated environment. What it takes More ❯
protocols and network components/Experience with cloud security/Understanding of security tools, vulnerability management, penetration testing and remediation/Working knowledge of Qualys, Defender, Knowbe4 are essential./Exposure to MS Sentinel and Expel MDR are desirable/Familiarity with scripting (Python, PowerShell) are desirable/Strong analytical More ❯
cloud security (AWS/Azure/GCP), encryption, IAM, endpoint protection, and SIEM solutions . Hands-on experience with tools such as Splunk, CrowdStrike, Qualys, Nessus, Palo Alto, Fortinet, or similar . Solid understanding of security frameworks and standards: NIST, CIS Controls, ISO 27001 , and compliance mandates relevant to banking. More ❯
cloud security (AWS/Azure/GCP), encryption, IAM, endpoint protection, and SIEM solutions . Hands-on experience with tools such as Splunk, CrowdStrike, Qualys, Nessus, Palo Alto, Fortinet, or similar . Solid understanding of security frameworks and standards: NIST, CIS Controls, ISO 27001 , and compliance mandates relevant to banking. More ❯
cloud security (AWS/Azure/GCP), encryption, IAM, endpoint protection, and SIEM solutions . Hands-on experience with tools such as Splunk, CrowdStrike, Qualys, Nessus, Palo Alto, Fortinet, or similar . Solid understanding of security frameworks and standards: NIST, CIS Controls, ISO 27001 , and compliance mandates relevant to banking. More ❯
You will have experience of vulnerability management, cyber security or in a related field · Tools with a strong experience level include MS Defender, Tenable, Qualys, Rapid7 · SIEM, EDR and security orchestration tools (MS Sentinel/defender, Splunk, Palo Alto XSOAR...) · Solid Security framework knowledge ie. NIST, CIS, ISO 27001 & MITRE More ❯
You will have experience of vulnerability management, cyber security or in a related field · Tools with a strong experience level include MS Defender, Tenable, Qualys, Rapid7 · SIEM, EDR and security orchestration tools (MS Sentinel/defender, Splunk, Palo Alto XSOAR…) · Solid Security framework knowledge ie. NIST, CIS, ISO 27001 & MITRE More ❯
You will have experience of vulnerability management, cyber security or in a related field · Tools with a strong experience level include MS Defender, Tenable, Qualys, Rapid7 · SIEM, EDR and security orchestration tools (MS Sentinel/defender, Splunk, Palo Alto XSOAR…) · Solid Security framework knowledge ie. NIST, CIS, ISO 27001 & MITRE More ❯
role you will need: Windows Server 2003 to 2022 Veeam Backup and Replication Microsoft Active Directory Group Policy Windows Server Update Services Kaseya VSA Qualys Vulnerability Scanner Documentation writing More ❯
within an OT environment with strong OT/ICS knowledge about products, architectures and workflows. Experience or knowledge of vulnerability management tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for OT environment are highly desirable. In turn More ❯
global joiners, movers and offboarding leavers. Ensure that end-users devices are up to date with security patches and secured using Microsoft Intune, Defender Qualys patch management solutions. Assist with hardware and asset procurement. The ideal candidate will have the following relevant experience: 5 years of relevant experience in a More ❯
Ability to perform black box, grey box and white box tests with an attacker's mindset. Expertise in using Kali, Burp Suite, Nmap, Nessus, Qualys, Metasploit and other security tools. Strong knowledge of the OWASP Testing Methodology. Strong understanding of security protocols, such as SSL/TLS, SSH, and Knowledge More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Risk Crew
Ability to perform black box, grey box and white box tests with an attacker's mindset. Expertise in using Kali, Burp Suite, Nmap, Nessus, Qualys, Metasploit and other security tools. Strong knowledge of the OWASP Testing Methodology. Strong understanding of security protocols, such as SSL/TLS, SSH, and HTTP. More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Risk Crew
Ability to perform black box, grey box and white box tests with an attacker's mindset. Expertise in using Kali, Burp Suite, Nmap, Nessus, Qualys, Metasploit and other security tools. Strong knowledge of the OWASP Testing Methodology. Strong understanding of security protocols, such as SSL/TLS, SSH, and HTTP. More ❯
We are currently seeking an experienced Qualys Subject Matter Expert (SME) to lead the ongoing customisation, optimisation, and management of our client's Qualys vulnerability management platform. This is a critical role focused on improving the organisation's security posture across on-premise, cloud, and hybrid environments. Key Responsibilities: Customise … Qualys for reporting and real-time data capture across organisational assets and infrastructure. Utilise and optimise Qualys Cloud Connectors for effective cloud vulnerability management. Mature the Qualys platform into a centralised view of vulnerability management across environments. Troubleshoot and resolve issues including agent communication, inventory scanning, data purging, and user … line with TruRisk scoring and stakeholder needs. Engage with internal customers to gather requirements, provide recommendations, and drive continuous improvements. Configure and maintain the Qualys platform to support ongoing vulnerability scans, compliance checks, and security assessments. Collaborate with IT and infrastructure teams to ensure seamless integration of Qualys into the More ❯