Vulnerability Assessment Jobs

1 to 25 of 43 Vulnerability Assessment Jobs

Lead IT Security Manager

Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
technology and Security Operations Centre management. Key focus areas for this role, the ideal candidate will have experience in each of the below; Threat & Vulnerability Management Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar … determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and … Provide expert advice on threat intelligence activities, identifying which threat categories are most dangerous to the organization and how to defend against them. * Manage vulnerability assessment activities within company IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. * Develop, maintain more »
Employment Type: Permanent
Posted:

Lead IT Security Manager

Birmingham, West Midlands, West Midlands (County), United Kingdom
Proftech Talent
. Ability to provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. Vulnerability Assessment. Ability to identify and classify security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. Risk Management . Ability to … Security Operations pillar, determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). Manage … opportunities to IT. Provide expert advice on threat intelligence activities, identifying which threat categories are most dangerous and how to defend against them. Manage vulnerability assessment activities within IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. Develop, maintain, and more »
Employment Type: Permanent
Salary: £40750 - £61100/annum
Posted:

Threat & Vulnerability Management Specialist

England, United Kingdom
Hybrid / WFH Options
Matchtech
of sensitive data. This is a contract position offering a competitive daily rate and the opportunity to work remotely. Key Responsibilities Implement and maintain vulnerability management programs and processes. Identify, assess, and prioritize vulnerabilities within the company's technology infrastructure. Perform regular scans, audits, and penetration testing to identify … potential weaknesses. Create reports and provide insights to stakeholders regarding vulnerability status and remediation strategies. Collaborate with cross-functional teams to address vulnerabilities and implement security controls. Maintain up-to-date knowledge of emerging security threats and industry best practices. Participate in incident response and provide guidance in the … event of a security breach. Job Requirements Significant experience in vulnerability management, including vulnerability assessment, penetration testing, and remediation. Strong knowledge of vulnerability scanning tools such as Nessus, Qualys, or similar. Understanding of industry frameworks and standards, such as OWASP, NIST, and CVSS. Ability to analyze more »
Employment Type: Contract
Rate: £600 - £650/day
Posted:

Security Engineer

Douglas, Isle of Man, United Kingdom
Orchard Recruitment Ltd
requirements Conduct periodic internal assessments to evaluate adherence to Information Security Frameworks and compliance standards, driving continuous improvement and implement corrective actions based on assessment findings Stay updated with industry trends, best practices, regulatory standards and amendments in Information Security Frameworks Develop strategic plans outlining security objectives and domain … knowledge sharing and cooperation to leverage expertise from external entities Develop a comprehensive framework for assessing the security posture of Material IT Suppliers, outlining assessment criteria, methodologies, and evaluation metrics Working with the Head of IT Service, establish mechanisms to verify and validate the compliance of material IT suppliers … potential risks and threats to the organisation's assets and operations Develop and implement risk mitigation strategies based on the findings from risk assessments, vulnerability testing, and penetration testing reports Organise and oversee regular vulnerability assessments and penetration testing activities to identify weaknesses and potential entry points for more »
Employment Type: Permanent
Salary: £35000 - £47500/annum Excellent benefits package
Posted:

IT SecOps & Automation Analyst

England, United Kingdom
Pragmatic
security posture and implement best practices. And conduct security monitoring, analysis, and incident response to detect and address cyber threats and vulnerabilities. Participate in vulnerability assessments, penetration testing, and security audits to identify and mitigate risks. Identify opportunities to integrate tools with Single Sign On/MFA across our more »
Posted:

Penetration Tester

Belfast, Northern Ireland, United Kingdom
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. Responsibilities: Thoroughly evaluate proposed and current solutions to ensure compliance with established … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability assessment and a penetration test more »
Posted:

Senior Cyber Security Analyst

Norwich, England, United Kingdom
Workday
skills within a dedicated security advisory team? This role exists within Aviva’s CISO team and is responsible for carrying out consultancy and risk assessment activities across multiple geographical areas, business areas and change disciplines. If you feel this is something to which you could bring benefit to, or … each other. This is accomplished through knowledge sharing and maintaining an enjoyable working environment. Skills and experience we’re looking for: Experience utilising Risk Assessment methods and frameworks (IRAM2, OCTAVE, NIST, ISO 27005 etc). Exposure to Information Security Management System frameworks and standards and their application. Partnered with … management, application security & cloud security and associated compliance frameworks such as SOX, PCI-DSS etc. Previous use of security technologies (firewalls, WAFs, DLP, cryptography, vulnerability scanning, identity and access management, etc). The ability to carry out threat modelling, vulnerability assessment, control effectiveness review and risk assessment more »
Posted:

Cyber Security Vulnerability Manger

Slough, England, United Kingdom
iFindTech Ltd
Job Overview: Join a dynamic and high-performing team as a Senior Analyst in Vulnerability Management & Security Testing. This role offers the unique opportunity to enhance a best-in-class Threat Defence capability and make significant contributions to our security operations. Ideal candidates will bring a strong background in … threat management, vulnerability assessment, and security testing, aiming to drive innovation and excellence in our security practices. Key Responsibilities: Conduct thorough vulnerability assessments across various platforms, including networks, systems, applications, and devices. Analyze risks associated with vulnerabilities, provide detailed reporting, and recommend actionable remediation strategies. Work collaboratively … across IT, IoT, and OT environments. Coordinate and oversee remediation efforts to ensure timely and effective resolution of security vulnerabilities. Requirements: Extensive experience in vulnerability management and remediation, including hands-on experience with vulnerability scanning tools. Good knowledge of Exabeam, Tenable.io and Tenable.sc would be considered a positive more »
Posted:

Security Analyst - (Berkshire / Hybrid) - CISSP, CISM, CEH

Wokingham, England, United Kingdom
Hybrid / WFH Options
Mayflower Recruitment Ltd
maintain security controls, policies, and procedures to protect internal and client environments. Implement and maintain cybersecurity products to safeguard internal and client infrastructures. Perform vulnerability assessments and penetration testing to identify security weaknesses and recommend remedial actions. Collaborate with internal teams and clients to address security needs or concerns more »
Posted:

Senior IT Infrastructure Engineer

London Area, United Kingdom
Zenith Bank (UK) Limited
Service Desk and Change Management Systems (ManageEngine) Maintain, monitor, and support the bank’s network, applications and infrastructure. Carry out regular system health checks, vulnerability assessment and patching. Integrate solutions with other applications and platforms based on business requirements. Perform routine maintenance tasks for infrastructure systems such as more »
Posted:

SOC Analyst - 24/7

Poole, Dorset, United Kingdom
Pro Box Recruitment
the organization's network and systems. Utilize various security tools and methodologies to identify and address potential vulnerabilities before they are exploited. Assist in vulnerability assessments and penetration testing activities. Evaluate and prioritize identified vulnerabilities for remediation by collaborating with IT and system administrators. Create detailed reports on security more »
Employment Type: Permanent
Salary: £25000 - £30000/annum
Posted:

Threat and Vulnerability Engineer

London Area, United Kingdom
Iceberg Cyber Security
My client is a leading and technology-driven company in the financial industry. I’m currently seeking a skilled Threat and Vulnerability Engineer to join their cybersecurity team. As a Threat and Vulnerability Engineer, you will play a crucial role in safeguarding our systems and data from potential … threats and vulnerabilities. To be successful in this role, you should have proven experience as a Threat and Vulnerability Engineer in a high performing environment or team and possess In-depth knowledge of threat landscape, vulnerability assessment, and penetration testing techniques. You will need to be skilled more »
Posted:

Infrastructure Solution Architecture Manager

London Area, United Kingdom
Hybrid / WFH Options
Control Risks
processes and adhering to best practices. Knowledge of penetration testing methodologies. Knowledge of Intrusion detection/prevention systems (IDS/IPS/WAF) and vulnerability assessment tools. Extensive switching, routing and firewall experience. Experience in producing implementation documents (e.g. new office setup). Extensive VPN and Global network more »
Posted:

Information Security Manager

Hemel Hempstead, England, United Kingdom
Smiths Detection
mitigations and solutions to risk and vulnerabilities. Experience of maintaining compliance with CPNI requirements and adopting the Operational Requirements process and conducting Threat and Vulnerability Assessments. Capable of maintaining relevant UK National Security clearances Hold one or more the following: CompTIA, GIAC Security Essentials (GSEC), NIST Cybersecurity Framework (NCSF more »
Posted:

Security Engineer

United Kingdom
Hybrid / WFH Options
Secure Source
identifying vulnerabilities, enhancing security measures, and ensuring the safety of our clients’ digital environments. Your responsibilities will span a wide range of tasks, from vulnerability scanning to technical content creation. Responsibilities: Vulnerability Detection and Automation: Collaborate with our security team to scan customer systems for critical vulnerabilities. Develop … new vulnerability checks using tools like Nuclei. Curate crowd-sourced checks for inclusion in our Intruder platform. Automate penetration testing processes to scale across multiple clients simultaneously. Rapid Response and Custom Scanning: Conduct custom scans on customer targets to identify emerging critical weaknesses. Provide rapid response solutions to address … Occasionally participate in industry events and conferences. Qualifications and Experience: Industry Experience: Minimum of 2 years in offensive security roles. Proven track record in vulnerability assessment and penetration testing. Educational Background: Technical academic background in software engineering or cyber security. Certifications (One or More): OSCP OSWE OSEP CRT more »
Posted:

Security Architect

Belfast, Northern Ireland, United Kingdom
Telefónica Tech
solutions, ensuring they meet industry best practices and standards. Planning, studying and designing a security architecture for IT projects Designing, developing, and continuously improving vulnerability assessment, security testing, and risk analysis Designing, developing, and continuously improving the security posture of the company's products Providing developers with remediation … and continuously improving security operations Recommending and providing technical leadership for the implementation of security measures to protect information systems, networks, and data Risk Assessment and Management: Conduct risk assessments to identify potential vulnerabilities and threats. Develop risk mitigation strategies and work with relevant teams to implement necessary security more »
Posted:

Graduate Security Engineer

London Area, United Kingdom
Harpoon Consulting
Assist in the deployment and configuration of security technologies, such as firewalls, intrusion detection systems, and security information and event management (SIEM) solutions. Conduct vulnerability assessments and penetration tests to identify potential weaknesses in OT environments. Participate in incident response activities, including monitoring and analysis of security events. Stay more »
Posted:

Security Operations Engineer

Belfast, Northern Ireland, United Kingdom
Hybrid / WFH Options
Idox plc
Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage automated more »
Posted:

Cyber security SME

Hatfield, Hertfordshire, United Kingdom
Hybrid / WFH Options
Hays Technology
but not be limited to): Perform comprehensive security control reviews and collaborate with external experts. Analyse IT security posture, manage OS patches, and conduct vulnerability scans; advise on risk mitigation. Investigate security breaches, preserve evidence, and maintain a Cybersecurity Incident Response Plan. Develop IT security training for users and … of cyber security Extensive practical experience in managing Microsoft server systems, NGAV, Amazon Cloud services, AD, ADFS, M365, security, public clouds, Azure services, SIEM, vulnerability assessment, patch management, DLP, and endpoint protection. Substantial proven expertise in supporting large corporate systems and applications within a large enterprise networked environment. more »
Employment Type: Permanent
Salary: £54421 - £61228/annum £54,000 - 61,000 per annum
Posted:

Application Security Engineer

London Area, United Kingdom
Stott and May
work, ensuring the security integrity of software applications throughout the development lifecycle. Responsibilities: - Design, implement, and maintain application security measures - Conduct code reviews and vulnerability assessments - Collaborate with development teams to integrate security practices - Develop and enforce application security policies and procedures - Stay abreast of emerging security threats and more »
Posted:

Cyber Security Engineer

Manchester Area, United Kingdom
Hybrid / WFH Options
Found Talent
the organisation’s security stance across on-premises and cloud environments. Monitor and respond to security incidents. Maintain Cyber Security certifications and conduct regular vulnerability assessments. Conduct Phishing tests and respond to breaches promptly. Ensure all assets and infrastructure are up-to-date with patches. Provide security awareness training more »
Posted:

SecOps Engineer, Hybrid Working

Hatfield, Hertfordshire, United Kingdom
Hybrid / WFH Options
Reed Technology
monitoring of security systems for potential threats and efficient incident management. - Establishing technical standards aligned with corporate security policies and regulatory compliance. - Conducting thorough vulnerability assessments and driving effective remediation strategies. - Engaging in security architecture reviews to identify and rectify gaps. - Playing an active role in the Change Advisory more »
Employment Type: Permanent
Posted:

SecOps Engineer, Hybrid Working

Hatfield, Hertfordshire, South East, United Kingdom
Hybrid / WFH Options
Reed Technology
monitoring of security systems for potential threats and efficient incident management. - Establishing technical standards aligned with corporate security policies and regulatory compliance. - Conducting thorough vulnerability assessments and driving effective remediation strategies. - Engaging in security architecture reviews to identify and rectify gaps. - Playing an active role in the Change Advisory more »
Employment Type: Permanent, Work From Home
Posted:

Information Technology Security Analyst

London Area, United Kingdom
Hybrid / WFH Options
Intaso
analyse root causes, and implement necessary remediation actions. - Develop and maintain incident response procedures to ensure timely and effective handling of security breaches. 2. Vulnerability Management: - Conduct regular vulnerability assessments and penetration tests to identify weaknesses in our systems and infrastructure. - Collaborate with system administrators and developers to more »
Posted:

Network Security Engineer

London Area, United Kingdom
InterEx Group
to protect organization's data and systems - Monitor network traffic for potential security breaches and respond appropriately to incidents - Conduct regular security audits and vulnerability assessments to identify and address security risks - Collaborate with cross-functional teams to implement security policies and procedures - Provide technical support and guidance to more »
Posted:
Vulnerability Assessment
10th Percentile
£38,000
25th Percentile
£53,750
Median
£66,000
75th Percentile
£80,000
90th Percentile
£93,125