depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and communication skills Security certifications such as More ❯
depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and communication skills Security certifications such as More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Intec Select
depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and communication skills Security certifications such as More ❯
fields (or equivalent certifications) Preferred certifications: CISSP, CEH, GSEC Familiarity with network protocols, operating systems, and security principles Proficiency with security tools like LogRhythm, Qualys, SCCM, Intune, Microsoft 365, AD, and enterprise anti-malware Technical knowledge in network segmentation, firewalls, Mitre Att&ck, Windows, Linux, and Mac, with experience in More ❯
ArcSight/AlienVault/Microsoft Sentinel/LogRhythm). Enterprise level Operating Systems RedHat Linux & Windows Server command line required. Vulnerability Management Technologies (e.g. Qualys, Tenable, Rapid7) or MDR Technologies (e.g. TrendMicro, SentinelOne, CrowdStrike). Ability to achieve SC & NPPV3 Clearances. Preferred Skills and Experience IDS/IPS technologies (e.g. More ❯
security exceptions Updating, maintaining and documenting security controls Participating in security operations support - Following up on information security related incidents Performing Patch & Vulnerability Management (Qualys) Identifying and advising on external risk (Bitsight) Participating in projects Consistently implementing security solutions at the business unit level Testing new security measures Advising and More ❯
detail. Nice to Have (But Not Essential): Familiarity with security frameworks such as ISO27001, Cyber Essentials, or NIST. Exposure to tools like Microsoft Defender, Qualys, Tenable, or CrowdStrike. Certifications such as CompTIA Security+, Microsoft SC-900, SC-200, or similar. More ❯
detail. Nice to Have (But Not Essential): Familiarity with security frameworks such as ISO27001, Cyber Essentials, or NIST. Exposure to tools like Microsoft Defender, Qualys, Tenable, or CrowdStrike. Certifications such as CompTIA Security+, Microsoft SC-900, SC-200, or similar. More ❯
detail. Nice to Have (But Not Essential): Familiarity with security frameworks such as ISO27001, Cyber Essentials, or NIST. Exposure to tools like Microsoft Defender, Qualys, Tenable, or CrowdStrike. Certifications such as CompTIA Security+, Microsoft SC-900, SC-200, or similar. More ❯
of assets. Hands-on experience in enterprise scale Amazon Web Services. A range of industry leading tooling, such as GitHub, Jfrog Artifactory, Jenkins, Docker, Qualys and Hashicorp Vault. Contributing to solving Enterprise scale problems. Delivering work for multiple stakeholders. Managing security and technology in a regulated environment. What it takes More ❯
Penetration Testing Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Intrusion Detection/Prevention Systems (IDS/IPS) (Suricata, Snort, Bro More ❯
scripting languages, especially Python, and a solid understanding of the web stack and its components. Experience with vulnerability management tools, security scanners (e.g. Snyk, Qualys, Trivy, Dependabot, etc.), and secure systems configuration (e.g., firewalls, VPNs, IDS/IPS, WAF). DevSecOps mindset, knowledge of CI/CD processes, security automation More ❯
protocols and network components/Experience with cloud security/Understanding of security tools, vulnerability management, penetration testing and remediation/Working knowledge of Qualys, Defender, Knowbe4 are essential./Exposure to MS Sentinel and Expel MDR are desirable/Familiarity with scripting (Python, PowerShell) are desirable/Strong analytical More ❯
You will have experience of vulnerability management, cyber security or in a related field · Tools with a strong experience level include MS Defender, Tenable, Qualys, Rapid7 · SIEM, EDR and security orchestration tools (MS Sentinel/defender, Splunk, Palo Alto XSOAR…) · Solid Security framework knowledge ie. NIST, CIS, ISO 27001 & MITRE More ❯
You will have experience of vulnerability management, cyber security or in a related field · Tools with a strong experience level include MS Defender, Tenable, Qualys, Rapid7 · SIEM, EDR and security orchestration tools (MS Sentinel/defender, Splunk, Palo Alto XSOAR…) · Solid Security framework knowledge ie. NIST, CIS, ISO 27001 & MITRE More ❯
You will have experience of vulnerability management, cyber security or in a related field · Tools with a strong experience level include MS Defender, Tenable, Qualys, Rapid7 · SIEM, EDR and security orchestration tools (MS Sentinel/defender, Splunk, Palo Alto XSOAR…) · Solid Security framework knowledge ie. NIST, CIS, ISO 27001 & MITRE More ❯
Windows, Cloud, OT and Lab infrastructure. You’ll be the go-to person for running and improving vulnerability scanning architecture, working with tools like Qualys , CrowdStrike , and Splunk , and you’ll collaborate across engineering and security teams to make real impact. You’ll also get involved in shaping wider security More ❯
Windows, Cloud, OT and Lab infrastructure. You'll be the go to person for running and improving vulnerability scanning architecture, working with tools like Qualys , CrowdStrike , and Splunk , and you'll collaborate across engineering and security teams to make real impact. You'll also get involved in shaping wider security More ❯
monitor performance against SLAs and KPIs. Key Responsibilities Implement a variety of cybersecurity tools for clients, such as: Sentinel One EDR FortiEDR FortiSIEM FortiSOAR Qualys (including network scanners and cloud agents) Mimecast Microsoft Sentinel, Azure, and Entra CybSafe cybersecurity awareness training Monitor cybersecurity systems and infrastructure to identify issues and More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with organisational standards. Collaborate with various departments to address and remediate vulnerabilities More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
related security discipline. Strong understanding of ICS/SCADA systems , PLC networks , and their role in the energy sector. Familiarity with tools like Tenable, Qualys, Rapid7 , and platforms such as MISP, ThreatConnect , or Recorded Future . Experience working in or securing OT environments , with a deep appreciation for safety and More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
related security discipline. Strong understanding of ICS/SCADA systems , PLC networks , and their role in the energy sector. Familiarity with tools like Tenable, Qualys, Rapid7 , and platforms such as MISP, ThreatConnect , or Recorded Future . Experience working in or securing OT environments , with a deep appreciation for safety and More ❯
role you will need: Windows Server 2003 to 2022 Veeam Backup and Replication Microsoft Active Directory Group Policy Windows Server Update Services Kaseya VSA Qualys Vulnerability Scanner Documentation writing More ❯
within an OT environment with strong OT/ICS knowledge about products, architectures and workflows. Experience or knowledge of vulnerability management tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for OT environment are highly desirable. In turn More ❯
within an OT environment with strong OT/ICS knowledge about products, architectures and workflows. Experience or knowledge of vulnerability management tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for OT environment are highly desirable. In turn More ❯