Vulnerability Assessment Jobs

1 to 25 of 87 Vulnerability Assessment Jobs

Cyber Vulnerability Assessment Analyst

Ashburn, Virginia, United States
Leidos
of coordination and communication. Security Clearance Required: Active/Current Top Secret clearance to be considered. Must be US Citizen. Primary Responsibilities Information Security Vulnerability Management Continuously research emerging threats to the environment in order to disseminate the information to all stakeholders, immediately assess the known environment for presence … of the vulnerability, and work with the NOSC and enterprise networking teams to proactively block exploitation within the DHS environment. Perform enterprise-wide network scans, agent scans, including credentialed scans of UNIX, Windows, Network devices, and VMware assets Develop and execute vulnerability/compliance scans through Tenable.SC interface … maintain scan templates based on asset types, repository, credentials, etc. in support of continuous scanning requirements for various FISMA systems Perform security compliance and vulnerability assessments, specifically developing and applying STIG or CIS baselines for various operating systems, including Windows or RHEL and CentOS Maintain, optimize, and troubleshoot scan more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Lead IT Security Manager

Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
technology and Security Operations Centre management. Key focus areas for this role, the ideal candidate will have experience in each of the below; Threat & Vulnerability Management Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar … determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and … Provide expert advice on threat intelligence activities, identifying which threat categories are most dangerous to the organization and how to defend against them. * Manage vulnerability assessment activities within company IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. * Develop, maintain more »
Employment Type: Permanent
Posted:

Lead Vulnerability Analyst

Ashburn, Virginia, United States
Leidos
be leading 5 to 10 VAT members, perform research on current threats and vulnerabilities, will be responsible for authoring security advisories and manage enterprise vulnerability compliance and will conduct vulnerability assessments of IT systems. The VAT Lead will be assisting the government with the Enterprise Information System Vulnerability Management (ISVM) compliance validation, execute Vulnerability Scans and will conduct vulnerability assessments of IT systems. Perform research on current vulnerabilities, support Incident Response and SOC functions as related to vulnerabilities. Will be responsible for authoring security advisories. Basic Qualifications: BS degree Science, Technology, Engineering, Math or related … experience may be considered in lieu of a degree. Relevant experience is within one of the following areas pentesting, security technical assessments or supporting vulnerability scanning/management program. Experience managing teams Experience with vulnerability analysis Ability to identify false positives within scan results and work with vendor more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Tier 2 VAT Analyst

Bluemont, Virginia, United States
Leidos
information systems, and collects, investigates, and reports any suspected and confirmed security violations. The VAT Analyst will be assisting with the Enterprise Information System Vulnerability Management (ISVM) compliance validation, execute Vulnerability Scans and will conduct vulnerability assessments of IT systems. Perform research on current vulnerabilities, support Incident … Response and SOC functions as related to vulnerabilities. Will be responsible for authoring security advisories. Basic Qualifications: Expertise and experience conducting assessments and vulnerability scans against web, database, operating system, wifi and network devices using DHS CDM vulnerability scanning tool suites. Experience customizing and maintaining scan polices, scan … scanning tools. Experience providing formal and adhoc reports on security vulnerabilities . Experience reviewing scan results to ensure accurate findings . Experience with the vulnerability assessment component of DHS Audits and FISMA security authorization, and on-going authorization activities. Detailed oriented, strong problem solving abilities with an analytic more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer

Douglas, Isle of Man, United Kingdom
Orchard Recruitment Ltd
requirements Conduct periodic internal assessments to evaluate adherence to Information Security Frameworks and compliance standards, driving continuous improvement and implement corrective actions based on assessment findings Stay updated with industry trends, best practices, regulatory standards and amendments in Information Security Frameworks Develop strategic plans outlining security objectives and domain … knowledge sharing and cooperation to leverage expertise from external entities Develop a comprehensive framework for assessing the security posture of Material IT Suppliers, outlining assessment criteria, methodologies, and evaluation metrics Working with the Head of IT Service, establish mechanisms to verify and validate the compliance of material IT suppliers … potential risks and threats to the organisation's assets and operations Develop and implement risk mitigation strategies based on the findings from risk assessments, vulnerability testing, and penetration testing reports Organise and oversee regular vulnerability assessments and penetration testing activities to identify weaknesses and potential entry points for more »
Employment Type: Permanent
Salary: £45000 - £58000/annum Excellent benefits package
Posted:

Cyber Security Analyst

London Area, United Kingdom
Britannia Financial Group Limited
NIST, ISO270001, OWASP, and CIS. Proficiency in security tools, technologies, and methodologies, such as firewalls, antivirus, encryption, VPN, IDS/IPS, SIEM, penetration testing, vulnerability assessment, and incident response. Strong analytical, problem-solving, and troubleshooting skills, as well as attention to detail and accuracy. Good communication, collaboration, and more »
Posted:

Penetration Tester

Belfast, Northern Ireland, United Kingdom
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. Responsibilities: Thoroughly evaluate proposed and current solutions to ensure compliance with established … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability assessment and a penetration test more »
Posted:

Cyber Security Technician Apprentice

County Hall, Morpeth, Northumberland, England
Northumberland County Council
ensuring the safety and integrity of digital assets and data. You will complete apprenticeship training to enable you to develop into the below responsibilities: Vulnerability Assessment: Assist in regular vulnerability assessments to identify weaknesses in systems and applications Incident Response: Collaborate with senior engineers to respond to … and alerts for signs of unauthorized access or suspicious activity Security Awareness Training: Participate in educating employees about security protocols and safe practices Risk Assessment: Evaluate risks associated with new technologies or system changes Network Security: Advise in the configuration and maintenance of firewalls, intrusion detection/prevention systems more »
Employment Type: Advanced Apprenticeship
Salary: £12,313.60
Posted:

Local Operations Security Expert

Bristol, England, United Kingdom
AXA
x) in the local Operations Security department, you will focus on various infor-mation security activities with the following main responsibilities: • Operate and maintain vulnerability management and policy compliance scanning tool • Perform and improve vulnerability management processes as well as ensure remediation and mitigation actions are appropriately implemented … Policy & Standards; Information Security Strategy; Innovation & Business Improvement; Information Security Awareness and Training; Legal & Regulatory Environment; Third Party Man-agement • Information Risk Management: Risk Assessment; Risk Management • Implementing Secure Systems: Security Architecture; Secure Development • Information Assurance Methodologies and Testing • Operational Security Management: Secure Operations Management; Secure Operations & Service Delivery … Vulnerability Assessment • Incident Management: Incident Management; Investigation; Forensics • Computer Security Information Response Team • Cyber Threat Management • Audit, Assurance & Review: Audit & Review • Business Continuity Management Skills/abilities • Strong interpersonal and communication skills; able to deal effectively with diverse cultures, skill sets and per-sonalities, works effectively as a more »
Posted:

Senior Cyber Security Analyst

Norwich, England, United Kingdom
Workday
skills within a dedicated security advisory team? This role exists within Aviva’s CISO team and is responsible for carrying out consultancy and risk assessment activities across multiple geographical areas, business areas and change disciplines. If you feel this is something to which you could bring benefit to, or … each other. This is accomplished through knowledge sharing and maintaining an enjoyable working environment. Skills and experience we’re looking for: Experience utilising Risk Assessment methods and frameworks (IRAM2, OCTAVE, NIST, ISO 27005 etc). Exposure to Information Security Management System frameworks and standards and their application. Partnered with … management, application security & cloud security and associated compliance frameworks such as SOX, PCI-DSS etc. Previous use of security technologies (firewalls, WAFs, DLP, cryptography, vulnerability scanning, identity and access management, etc). The ability to carry out threat modelling, vulnerability assessment, control effectiveness review and risk assessment more »
Posted:

Cyber Security Vulnerability Manger

Slough, England, United Kingdom
iFindTech Ltd
Job Overview: Join a dynamic and high-performing team as a Senior Analyst in Vulnerability Management & Security Testing. This role offers the unique opportunity to enhance a best-in-class Threat Defence capability and make significant contributions to our security operations. Ideal candidates will bring a strong background in … threat management, vulnerability assessment, and security testing, aiming to drive innovation and excellence in our security practices. Key Responsibilities: Conduct thorough vulnerability assessments across various platforms, including networks, systems, applications, and devices. Analyze risks associated with vulnerabilities, provide detailed reporting, and recommend actionable remediation strategies. Work collaboratively … across IT, IoT, and OT environments. Coordinate and oversee remediation efforts to ensure timely and effective resolution of security vulnerabilities. Requirements: Extensive experience in vulnerability management and remediation, including hands-on experience with vulnerability scanning tools. Good knowledge of Exabeam, Tenable.io and Tenable.sc would be considered a positive more »
Posted:

Senior IT Infrastructure Engineer

London Area, United Kingdom
Zenith Bank (UK) Limited
Service Desk and Change Management Systems (ManageEngine) Maintain, monitor, and support the bank’s network, applications and infrastructure. Carry out regular system health checks, vulnerability assessment and patching. Integrate solutions with other applications and platforms based on business requirements. Perform routine maintenance tasks for infrastructure systems such as more »
Posted:

SOC Analyst - 24/7

Poole, Dorset, United Kingdom
Pro Box Recruitment
the organization's network and systems. Utilize various security tools and methodologies to identify and address potential vulnerabilities before they are exploited. Assist in vulnerability assessments and penetration testing activities. Evaluate and prioritize identified vulnerabilities for remediation by collaborating with IT and system administrators. Create detailed reports on security more »
Employment Type: Permanent
Salary: £25000 - £30000/annum
Posted:

Principal OT Security Architect - UK

West Norwood, England, United Kingdom
Hybrid / WFH Options
Haleon
architectures, network protocols, industrial protocols, Active Directory, Backup processes, virtualization of applications and other general IT knowledge. Fundamental knowledge in IT-Security threat modelling, vulnerability assessments and pen-testing. Experienced in the use of tools for incident investigations, simulation, and forensics - GxP regulations. Ability to present technical design proposals more »
Posted:

Security Engineer - Perimeter Security Team

Saint Louis, Missouri, United States
EDWARD JONES
with security aspects of critical technologies (e.g., Linux, Windows, Cloud, Web, Network, Firewalls, Application Firewalls, IDS/IPS, Authentication, Authorization, DNS, Load Balancers and Vulnerability Assessment Tools. Proficient understanding of system and security development lifecycles and Agile methodologies Knowledge and comprehension of scripting languages preferred for automation tasks more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer - Perimeter Security Team

Columbia, Missouri, United States
EDWARD JONES
with security aspects of critical technologies (e.g., Linux, Windows, Cloud, Web, Network, Firewalls, Application Firewalls, IDS/IPS, Authentication, Authorization, DNS, Load Balancers and Vulnerability Assessment Tools. Proficient understanding of system and security development lifecycles and Agile methodologies Knowledge and comprehension of scripting languages preferred for automation tasks more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer - Perimeter Security Team

Springfield, Missouri, United States
EDWARD JONES
with security aspects of critical technologies (e.g., Linux, Windows, Cloud, Web, Network, Firewalls, Application Firewalls, IDS/IPS, Authentication, Authorization, DNS, Load Balancers and Vulnerability Assessment Tools. Proficient understanding of system and security development lifecycles and Agile methodologies Knowledge and comprehension of scripting languages preferred for automation tasks more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer - Perimeter Security Team

Jefferson City, Missouri, United States
EDWARD JONES
with security aspects of critical technologies (e.g., Linux, Windows, Cloud, Web, Network, Firewalls, Application Firewalls, IDS/IPS, Authentication, Authorization, DNS, Load Balancers and Vulnerability Assessment Tools. Proficient understanding of system and security development lifecycles and Agile methodologies Knowledge and comprehension of scripting languages preferred for automation tasks more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer (CISSP, CISM, CEH, CompTIA)- (Hybrid / South UK)

United Kingdom
Hybrid / WFH Options
Mayflower Recruitment Ltd
maintain security controls, policies, and procedures to protect internal and client environments. Implement and maintain cybersecurity products to safeguard internal and client infrastructures. Perform vulnerability assessments and penetration testing to identify security weaknesses and recommend remedial actions. Collaborate with internal teams and clients to address security needs or concerns more »
Posted:

Security Engineer

San Antonio, Texas, United States
Hybrid / WFH Options
Leidos
C2E members and teams, delegated authorizing officials and other government security representatives. Adherence to all aspects of the Information Assurance (IA) program, Preparation of Assessment and Authorization (A&A) documents, procedures, and policies to ensure the organization is secure. A Hybrid work plan is in place and the mission … related experience. DoD 8570 IAT-II or above Knowledge of various security concepts: enterprise cloud architecture, infrastructure security and compliance, data encryption, continuous monitoring, vulnerability assessment, security control validation, etc. Supports secure systems operations and maintenance Effectively communicate, conduct meetings, and brief executive leadership, key stakeholders and customers more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer

Douglas, Isle of Man, United Kingdom
CND
with a broad knowledge of Security Operations, Access Management, and Policy Development. Understanding of security frameworks such as NIST or ISO 27001 Knowledge of vulnerability assessment tools, incident response frameworks, and risk management methodologies. Analytical mindset and problem-solving abilities to assess security risks and propose appropriate mitigation more »
Employment Type: Permanent
Posted:

Technical Support Engineer

Leiston, England, United Kingdom
Hybrid / WFH Options
G4S
Experience of working with IP Video Surveillance Systems Experience of working with asset management and monitoring software i.e. SolarWinds,Tripwire, GFI Knowledge of Cyber Vulnerability Assessment tools and principles. In Return Excellent salary Car or Allowance 25 days holiday Pension/Life assurance Employee Discount Schemes Workplace pension more »
Posted:

Cyber Security Engineer

United Kingdom
Locke and McCloud
Engineer to join their established but expanding cyber security function! In this newly developed role, you will be responsible for implementing security measures, conducting vulnerability assessments, and responding to security incidents, in addition to participating in strategy development as a key leader within our clients security function. This would more »
Posted:

Cyber Security Engineer

London Area, United Kingdom
Locke and McCloud
Engineer to join their established but expanding cyber security function! In this newly developed role, you will be responsible for implementing security measures, conducting vulnerability assessments, and responding to security incidents, in addition to participating in strategy development as a key leader within our clients security function. This would more »
Posted:

Security Engineer

United Kingdom
Hybrid / WFH Options
Secure Source
identifying vulnerabilities, enhancing security measures, and ensuring the safety of our clients’ digital environments. Your responsibilities will span a wide range of tasks, from vulnerability scanning to technical content creation. Responsibilities: Vulnerability Detection and Automation: Collaborate with our security team to scan customer systems for critical vulnerabilities. Develop … new vulnerability checks using tools like Nuclei. Curate crowd-sourced checks for inclusion in our Intruder platform. Automate penetration testing processes to scale across multiple clients simultaneously. Rapid Response and Custom Scanning: Conduct custom scans on customer targets to identify emerging critical weaknesses. Provide rapid response solutions to address … Occasionally participate in industry events and conferences. Qualifications and Experience: Industry Experience: Minimum of 2 years in offensive security roles. Proven track record in vulnerability assessment and penetration testing. Educational Background: Technical academic background in software engineering or cyber security. Certifications (One or More): OSCP OSWE OSEP CRT more »
Posted:
Vulnerability Assessment
10th Percentile
£38,750
25th Percentile
£53,750
Median
£67,500
75th Percentile
£80,625
90th Percentile
£93,250