Vulnerability Assessment Jobs

1 to 25 of 154 Vulnerability Assessment Jobs

Senior Consultant, Proactive Services (Unit 42)

London, England, United Kingdom
Palo Alto Networks
cyber security strategies and roadmaps Technical proficiency in a wide range of cyber risk management services, including cyber threat, risk and control assessments, secure software development practices, penetration testing, vulnerability assessments, among others Sound knowledge of applicable laws, compliance regulations, and industry standards as it relates to privacy, security, and compliance Sound knowledge of applicable frameworks, including MITRE ATT More ❯
Posted:

Senior Consultant, Proactive Services (Unit 42)

london, south east england, united kingdom
Palo Alto Networks
cyber security strategies and roadmaps Technical proficiency in a wide range of cyber risk management services, including cyber threat, risk and control assessments, secure software development practices, penetration testing, vulnerability assessments, among others Sound knowledge of applicable laws, compliance regulations, and industry standards as it relates to privacy, security, and compliance Sound knowledge of applicable frameworks, including MITRE ATT More ❯
Posted:

Senior Consultant, Proactive Services (Unit 42)

slough, south east england, united kingdom
Palo Alto Networks
cyber security strategies and roadmaps Technical proficiency in a wide range of cyber risk management services, including cyber threat, risk and control assessments, secure software development practices, penetration testing, vulnerability assessments, among others Sound knowledge of applicable laws, compliance regulations, and industry standards as it relates to privacy, security, and compliance Sound knowledge of applicable frameworks, including MITRE ATT More ❯
Posted:

Information Security Officer

Milton Keynes, Buckinghamshire, England, United Kingdom
Altitude-Recruitment Limited
assessments for new features and system changes Evaluate and recommend security technologies and tools Operational (40%) Manage security environments across Azure and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerability assessment and penetration testing programs Maintain identity and access management controls Compliance & Assurance (30%) Maintain ISO27001 certification More ❯
Employment Type: Full-Time
Salary: £50,000 - £60,000 per annum
Posted:

Information Security Officer

Bletchley, Buckinghamshire, United Kingdom
Altitude-Recruitment Limited
assessments for new features and system changes Evaluate and recommend security technologies and tools Operational (40%) Manage security environments across Azure and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerability assessment and penetration testing programs Maintain identity and access management controls Compliance & Assurance (30%) Maintain ISO27001 certification More ❯
Employment Type: Permanent
Salary: GBP 50,000 - 60,000 Annual
Posted:

Architect - Systems Programmer

Brentwood, Tennessee, United States
Health Support Center
/GCVE). - Dell's Superna Eyeglass Suite, including Superna Ransomware Defender for proactive ransomware detection, response, and forensic analysis within storage environments. - Cyber defense management including threat detection, vulnerability assessment, incident response, and forensics as they pertain to storage systems and data. - Data Vaulting solutions for secure, immutable storage, including air-gapped and logically isolated storage vaults More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Vulnerability and Penetration Testing Engineer

Belfast, United Kingdom
Hybrid / WFH Options
Baker McKenzie
Location: Belfast Workplace: Hybrid The opportunity: The Security Vulnerability and Penetration Testing Engineer will oversee and serve as a technical resource for all assessment activities related to the security posture of existing and proposed firm systems, platforms, and processes to protect and continually improve the confidentiality, integrity, and availability of information systems per the firm's business objectives … systems, platforms, and applications Serve as a Subject Matter Expert (SME) for the VAPT function Serve as the system owner for common VAPT toolsets, platforms, and processes Provide technical assessment reports that are easily understandable by the target audience and include practical and reasonable recommendations based upon sound risk management principles Skills and experience: A Computer Science bachelor's … preferred Offensive Security OSCP is required Commanding knowledge of VAPT concepts and best practices, including the requirements for WhiteHat/ethical hacking Expert understanding of the difference between a vulnerability assessment and a penetration test in the context of assessment scope, objectives, and deliverables Extensive experience with common automated VAPT tools such as Nessus, Appscan, Burp Suite More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Penetration Tester

United Kingdom
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. Responsibilities: Thoroughly evaluate proposed and current solutions to ensure compliance with established standards for secure system design. This includes meeting requirements outlines … in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. Essential Criteria: Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat …/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability assessment and a penetration test in the context of assessment scope, objectives, and deliverables. Working knowledge of information security frameworks such as ISO27001, NIST, and CIS. If this sounds like a good opportunity More ❯
Posted:

Cyber Security Intern

United Kingdom
WillHire
and incident response workflows in a fast-growing tech environment . Key Responsibilities Assist in monitoring and analyzing network traffic, logs, and system alerts to identify potential threats Perform vulnerability assessments and help implement remediation strategies Participate in penetration testing and report exploitable weakens Assist with hardening of systems, identity & access management, and secure configuration of cloud assets Research … in CTFs, bug bounty, or cybersecurity clubs/communities What You'll Get Real-time exposure to cybersecurity operations within a tech-driven product environment Hands-on training in vulnerability assessment, threat hunting & compliance 1:1 mentorship from seasoned cyber professionals & exclusive learning resources Internship Certificate & Letter of Recommendation upon successful completion Opportunity for a Pre-Placement Offer … PPO) at WillHire or with our client organizations Hiring Process Online Application Resume + short write-up on your cybersecurity interests/projects Security Aptitude TestMCQ + scenario-based assessment on networking & cyber fundamentals Technical Interview Live discussion around vulnerabilities, tools, and problem-solving Managerial Interview Assess motivation, culture fit, communication skills Offer Formal internships offer with stipend details More ❯
Posted:

Cyber Security Intern

England, United Kingdom
WillHire
and incident response workflows in a fast-growing tech environment . Key Responsibilities Assist in monitoring and analyzing network traffic, logs, and system alerts to identify potential threats Perform vulnerability assessments and help implement remediation strategies Participate in penetration testing and report exploitable weakens Assist with hardening of systems, identity & access management, and secure configuration of cloud assets Research … in CTFs, bug bounty, or cybersecurity clubs/communities What You'll Get Real-time exposure to cybersecurity operations within a tech-driven product environment Hands-on training in vulnerability assessment, threat hunting & compliance 1:1 mentorship from seasoned cyber professionals & exclusive learning resources Internship Certificate & Letter of Recommendation upon successful completion Opportunity for a Pre-Placement Offer … PPO) at WillHire or with our client organizations Hiring Process Online Application Resume + short write-up on your cybersecurity interests/projects Security Aptitude TestMCQ + scenario-based assessment on networking & cyber fundamentals Technical Interview Live discussion around vulnerabilities, tools, and problem-solving Managerial Interview Assess motivation, culture fit, communication skills Offer Formal internships offer with stipend details More ❯
Posted:

Cyber Security Intern

London Area, United Kingdom
WillHire
and incident response workflows in a fast-growing tech environment . Key Responsibilities Assist in monitoring and analyzing network traffic, logs, and system alerts to identify potential threats Perform vulnerability assessments and help implement remediation strategies Participate in penetration testing and report exploitable weakens Assist with hardening of systems, identity & access management, and secure configuration of cloud assets Research … in CTFs, bug bounty, or cybersecurity clubs/communities What You'll Get Real-time exposure to cybersecurity operations within a tech-driven product environment Hands-on training in vulnerability assessment, threat hunting & compliance 1:1 mentorship from seasoned cyber professionals & exclusive learning resources Internship Certificate & Letter of Recommendation upon successful completion Opportunity for a Pre-Placement Offer … PPO) at WillHire or with our client organizations Hiring Process Online Application Resume + short write-up on your cybersecurity interests/projects Security Aptitude TestMCQ + scenario-based assessment on networking & cyber fundamentals Technical Interview Live discussion around vulnerabilities, tools, and problem-solving Managerial Interview Assess motivation, culture fit, communication skills Offer Formal internships offer with stipend details More ❯
Posted:

Cyber Security Intern

City of London, London, United Kingdom
WillHire
and incident response workflows in a fast-growing tech environment . Key Responsibilities Assist in monitoring and analyzing network traffic, logs, and system alerts to identify potential threats Perform vulnerability assessments and help implement remediation strategies Participate in penetration testing and report exploitable weakens Assist with hardening of systems, identity & access management, and secure configuration of cloud assets Research … in CTFs, bug bounty, or cybersecurity clubs/communities What You'll Get Real-time exposure to cybersecurity operations within a tech-driven product environment Hands-on training in vulnerability assessment, threat hunting & compliance 1:1 mentorship from seasoned cyber professionals & exclusive learning resources Internship Certificate & Letter of Recommendation upon successful completion Opportunity for a Pre-Placement Offer … PPO) at WillHire or with our client organizations Hiring Process Online Application Resume + short write-up on your cybersecurity interests/projects Security Aptitude TestMCQ + scenario-based assessment on networking & cyber fundamentals Technical Interview Live discussion around vulnerabilities, tools, and problem-solving Managerial Interview Assess motivation, culture fit, communication skills Offer Formal internships offer with stipend details More ❯
Posted:

Cyber Security Intern

london (city of london), south east england, united kingdom
WillHire
and incident response workflows in a fast-growing tech environment . Key Responsibilities Assist in monitoring and analyzing network traffic, logs, and system alerts to identify potential threats Perform vulnerability assessments and help implement remediation strategies Participate in penetration testing and report exploitable weakens Assist with hardening of systems, identity & access management, and secure configuration of cloud assets Research … in CTFs, bug bounty, or cybersecurity clubs/communities What You'll Get Real-time exposure to cybersecurity operations within a tech-driven product environment Hands-on training in vulnerability assessment, threat hunting & compliance 1:1 mentorship from seasoned cyber professionals & exclusive learning resources Internship Certificate & Letter of Recommendation upon successful completion Opportunity for a Pre-Placement Offer … PPO) at WillHire or with our client organizations Hiring Process Online Application Resume + short write-up on your cybersecurity interests/projects Security Aptitude TestMCQ + scenario-based assessment on networking & cyber fundamentals Technical Interview Live discussion around vulnerabilities, tools, and problem-solving Managerial Interview Assess motivation, culture fit, communication skills Offer Formal internships offer with stipend details More ❯
Posted:

Tech Lead - Vulnerability Management

England, United Kingdom
Hybrid / WFH Options
Colt Technology Services
reach but a deep local presence, Colt is big enough to deliver and small enough to care. Why we need this role? We are seeking a dynamic and motivated Vulnerability Management Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The Vulnerability Management Lead … will play a crucial role in tracking and managing the identification, assessment, and remediation of security vulnerabilities across the organization’s infrastructure and monitoring and reporting on vulnerability and other security compliance status. The role requires collaboration with various partners to ensure that vulnerability assessments and emerging threats are prioritized and advanced. Additionally, the successful candidate will … work with management to continuously evolve the vulnerability management program. What you will do: You will be responsible for supporting CSOC in order to achieve the below: The development and implementation of the Colt Vulnerability Management Framework. Enhancing the scope and efficiency of current vulnerability scanning and management tools and integration between them. Design and manage the More ❯
Posted:

Cybersecurity Analyst

New York, United States
Iconvergence Solutions
internal business process area project teams. May be required tosupport Critical Infrastructure Protection (CIP) readiness and compliance activities. Generate regular risk management reports using various security technologies. Perform internal vulnerability assessments and ensure remediation of vulnerabilitiesfor business process area infrastructure and web applications. May be requested toperform internal penetration testing. Support incident response activities. Assiston RFP specifications, participate in More ❯
Employment Type: Any
Salary: USD Annual
Posted:

IT Security Consultant

Bradford, West Yorkshire, England, United Kingdom
MLC Partners
system architectures, applications, cloud services (IaaS, PaaS, SaaS), and network security. Assess IAM/PAM implementations and M365/Azure/Active Directory configurations. Conduct or oversee penetration testing, vulnerability assessments, and threat modelling. Review and approve technical designs and solution architectures from a security standpoint. Assurance, Compliance, and Audit Develop and maintain an IT Security Assurance Framework. Lead More ❯
Employment Type: Temporary
Salary: £600 - £700 per day
Posted:

Senior Information Technology Engineer

Banbridge, Northern Ireland, United Kingdom
Gordons Chemists
AI tools for predictive analytics, customer insights, and operational automation. Cybersecurity • Implement and maintain security controls to protect customer data, payment systems, and business operations. • Conduct regular security audits, vulnerability assessments, and compliance checks (e.g., PCI-DSS). • Respond to incidents and ensure business continuity through disaster recovery planning. • Integrate AI-driven threat detection and response tools to enhance More ❯
Posted:

Cyber Defence Analyst

Farnborough, Hampshire, South East, United Kingdom
Hybrid / WFH Options
Leidos Innovations UK Limited
respond to Cyber Security Incidents Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others. Run Vulnerability Assessment tools to measure compliance with security updates and security patches. Member of a Team who are responsible for making multiple daily CSOC checks to detect and respond … XDR and Microsoft Defender variants, and Elastic Security, or displays aptitude to learn how to work with a SIEM. Experience and knowledge of SIEM tools, Cyber Security Incident Response, Vulnerability Management and Cyber Threat Intelligence. Experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at it. More ❯
Employment Type: Permanent
Salary: £45,000
Posted:

IT Network and Telephony Engineer

Nashville, Tennessee, United States
Hybrid / WFH Options
DCI Donor Services
teams. Enforce access controls, segmentation, and secure configurations to protect sensitive data and systems. Ensure compliance with organizational security policies, industry standards, and regulatory requirements. Conduct periodic security audits, vulnerability assessments, and penetration tests, partnering with consultants/third parties where necessary Respond to and mitigate cybersecurity incidents in coordination with incident response protocols VoIP and Telephony Administration Administer More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Architect

London, United Kingdom
N Consulting Limited
Strong experience in building secure web and mobile apps Experience with Security architecture, Application Security assessments, penetration testing, vulnerability assessment, Secure SDLC, and Static code reviews Certified Secure Software Lifecycle Professional (CSSLP) (desirable) Responsibilities: - Design, develop, and implement security frameworks and solutions to safeguard company's assets and infrastructure. - Conduct regular security audits and risk assessments to identify More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Analyst

London Area, United Kingdom
dnevo Partners
carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerability assessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations More ❯
Posted:

Information Security Analyst

City of London, London, United Kingdom
dnevo Partners
carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerability assessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations More ❯
Posted:

Information Security Analyst

london, south east england, united kingdom
dnevo Partners
carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerability assessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations More ❯
Posted:

Information Security Analyst

slough, south east england, united kingdom
dnevo Partners
carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerability assessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations More ❯
Posted:

Information Security Analyst

london (city of london), south east england, united kingdom
dnevo Partners
carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerability assessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations More ❯
Posted:
Vulnerability Assessment
10th Percentile
£41,250
25th Percentile
£46,875
Median
£57,500
75th Percentile
£73,125
90th Percentile
£84,500