Vulnerability Management Jobs

1 to 25 of 207 Vulnerability Management Jobs

Tech lead - vulnerability management

Central London, London, United Kingdom
Hybrid/Remote Options
Colt Technology Services
Company description: We are seeking a dynamic and motivated Vulnerability Management Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The Vulnerability Management Lead will play a crucial role in tracking and managing the identification, assessment, and remediation of security vulnerabilities across … the organizations infrastructure and monitoring and reporting on vulnerability and other security compliance status. The role requires collaboration with various partners to ensure that vulnerability assessments and emerging threats are prioritized and advanced. Additionally, the successful candidate will work with management to continuously evolve the vulnerability management program. Job description: You will be responsible for … supporting CSOC in order to achieve the below: The development and implementation of the Colt Vulnerability Management Framework. Enhancing the scope and efficiency of current vulnerability scanning and management tools and integration between them. Design and manage the periodic penetration testing exercise. Collaborating with identified stakeholders to provide specialist guidance and support, ensuring effective vulnerability More ❯
Employment Type: Permanent, Work From Home
Posted:

VULNERABILITY MANAGEMENT ANALYST / VM ANALYST

Birmingham, West Midlands, United Kingdom
Secure Recruitment Ltd
VULNERABILITY MANAGEMENT ANALYST/VM ANALYST Up to £75,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a … major driving forces behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a Vulnerability Management Analyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's Vulnerability Management Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes … Schedules related to Vulnerability Scanning of All Endpoints of the business. As a Vulnerability Management Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of Vulnerability Management Analyst role would include More ❯
Employment Type: Permanent
Salary: £75,000
Posted:

Vice President, Threat and Vulnerability Management Team Lead

England, United Kingdom
MUFG Bank, Ltd
means investing in talent, technologies, and tools that empower you to own your career.Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.The Threat and Vulnerability Management Team Lead is responsible for defining, developing, and leading the strategic direction for safeguarding the organisation's infrastructure and applications. This is achieved by proactively identifying, assessing … sits within the Digital Engineering Services & Solutions (DES) department of the Technology Division.The role is part of the Digital Engineering Services & Solutions (DES) department, which encompasses Infrastructure and Service Management across EMEA Bank, International Securities, and the 15+ countries in which these entities operate. The position is responsible for leading the Threat and Vulnerability Management function, including … standards. It plays a critical role in governance, audit readiness, and the continuous improvement of MUFG's security posture, while also serving as the central coordination point for all vulnerability-related activities across DES.The successful candidate must demonstrate proven experience in leading teams and fostering a culture of technical excellence. They will be expected to establish best practices for More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Vulnerability Management Analyst

Manchester, Lancashire, England, United Kingdom
Hybrid/Remote Options
Searchability
Vulnerability Management Analyst KEY POINTS * Hybrid working arrangement - Up to £55,000 p/a* Opportunity to work across vulnerability management and wider security operations* Exposure to class-leading scanning tools and third-party penetration testing* Competitive package (DOE) ABOUT THE CLIENT We're supporting an established organisation with a strong technical footprint that is continuing … to invest in its security posture. They are now looking to add an Information Security Analyst to their vulnerability management function, supporting the secure operation of systems across a large and complex environment. THE BENEFITS * Hybrid working pattern* Clear progression pathways and training opportunities* Exposure to a broad range of security tooling and methodologies* Collaborative culture working alongside … governance, compliance, and wider IT teams THE INFORMATION SECURITY ANALYST ROLE: In this role, you'll support the organisation's vulnerability management processes, ensuring endpoints and systems are scanned, monitored, and assessed for risk. You'll review and interpret vulnerability scan results, assist with scheduling and planning internal and external testing activities, and support the collation and More ❯
Employment Type: Full-Time
Salary: £50,000 - £55,000 per annum
Posted:

Vulnerability Management Analyst

Stoke-on-Trent, Staffordshire, England, United Kingdom
Hybrid/Remote Options
Searchability
Vulnerability Management Analyst KEY POINTS * Hybrid working arrangement - Up to £55,000 p/a* Opportunity to work across vulnerability management and wider security operations* Exposure to class-leading scanning tools and third-party penetration testing* Competitive package (DOE) ABOUT THE CLIENT We're supporting an established organisation with a strong technical footprint that is continuing … to invest in its security posture. They are now looking to add an Information Security Analyst to their vulnerability management function, supporting the secure operation of systems across a large and complex environment. THE BENEFITS * Hybrid working pattern* Clear progression pathways and training opportunities* Exposure to a broad range of security tooling and methodologies* Collaborative culture working alongside … governance, compliance, and wider IT teams THE INFORMATION SECURITY ANALYST ROLE: In this role, you'll support the organisation's vulnerability management processes, ensuring endpoints and systems are scanned, monitored, and assessed for risk. You'll review and interpret vulnerability scan results, assist with scheduling and planning internal and external testing activities, and support the collation and More ❯
Employment Type: Full-Time
Salary: £50,000 - £55,000 per annum
Posted:

Cybersecurity Engineer

Concord, Massachusetts, United States
Robotics technology LLC
security tools across enterprise endpoints. This role focuses on ensuring robust protection against threats through advanced solutions such as: Antivirus (AV) Endpoint Detection & Response (EDR) Cyber Asset Attack Surface Management (CAASM) Vulnerability Management platforms Required Skills & Qualifications Bachelor's degree in Computer Science, Cybersecurity, or related field (or equivalent experience) 3+ years of experience in cybersecurity engineering … with a focus on endpoint security Hands-on experience with AV and EDR platforms (e.g., CrowdStrike, SentinelOne, Microsoft Defender) Familiarity with CAASM tools and vulnerability management solutions (e.g., Tenable, Qualys) Strong understanding of Windows, macOS, and Linux endpoint environments Knowledge of incident response processes and threat detection techniques Excellent problem-solving and communication skills Preferred Qualifications Relevant certifications … e.g., CISSP, CEH, CompTIA Security+) Experience with scripting and automation (PowerShell, Python) Exposure to SIEM platforms and integration with endpoint tools Key Responsibilities Endpoint Security Deployment & Management Implement and maintain enterprise-grade AV and EDR solutions across all endpoints Configure policies, rules, and alerts to ensure optimal security posture Monitor and troubleshoot endpoint security tools for performance and compliance More ❯
Employment Type: Any
Salary: USD Annual
Posted:

Senior Product Manager (Vulnerability Management)

Santa Clara, California, United States
Palo Alto Networks
Job Description Your Career We're seeking a strategic and execution-driven Sr. Product Manager to shape and elevate our product experience. As a Sr. Product Manager in the Vulnerability Management team, you will define new features, own core product areas, and lead cross-functional collaboration to deliver customer-focused solutions that set us apart in the market. … The ideal candidate brings deep experience in one or more of the following areas: Endpoint (EDR/XDR), Vulnerability Management, or Cloud Security. You've a systems mindset and are equally comfortable diving into technical discussions with engineering, as well as leading customer-facing presentations. Success in this role demands agility, excellent time management, and the ability … post-launch iterations. Stay ahead of emerging trends in the CTEM and Cloud security landscape through ongoing research and competitive analysis. Act as a product evangelist for our Exposure Management solution, articulating the product vision and competitive differentiators to internal stakeholders, partners, and customers. Qualifications Your Experience 5-7 years of experience in Cybersecurity, Vulnerability Management, Endpoint More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Security Engineer

London, South East, England, United Kingdom
Proactive Appointments
recent experience of using Vulcan, to be considered for the role, you will need Vulcan and the following: - Assist with the deployment of Vulcan Cyber for orchestrating and automating vulnerability management workflows, prioritisation, and remediation tracking. Assist with the vulnerability management lifecycle, from detection to remediation, ensuring robust protection against threats. Operate and optimise vulnerability management tools, including Vulcan Cyber, to conduct comprehensive vulnerability assessments and generate actionable reports. Develop and deliver regular vulnerability reporting, metrics, and dashboards for management and technical teams via Vulcan Cyber, Tenable and Defender. Collaborate with incident response teams using CrowdStrike and Microsoft Defender to correlate vulnerability data with threat intelligence and active security … business stakeholders. Work closely with IT operations, development, and compliance teams to ensure timely remediation of identified vulnerabilities and adherence to regulatory standards. Contribute to the continuous improvement of vulnerability management processes and integration with other security platforms. If this could be your next role, please forward your CV in the first instance. Due to the volume of More ❯
Employment Type: Contractor
Rate: £75,000 - £80,000 per annum
Posted:

Cybersecurity Engineer

Walsall, West Midlands, United Kingdom
Poundland
educate staff on common threats and misconceptions. You will also provide oversight and support for SOC operations and may participate in security-related projects. This role requires expertise in vulnerability management, patch management, and security platforms, with a strong general knowledge of IT services. We uphold three core behaviours that guide all our actions: Love Our Customers … you save for a secure retirement. Your Impact and Responsibilities Design, implement, and maintain security measures to protect information and network infrastructure. Conduct regular security audits, risk assessments, and vulnerability scans (using tools such as Qualys). Manage and monitoring of technical vulnerabilities and manage remediation across IT assets. Monitor systems and networks for security breaches, irregular behavior, and … security-related projects as required. Stay current with emerging threats, technologies, and industry trends. Skills and Knowledge A minimum of 10 years experience in IT. Hands-on experience with vulnerability management, patch management, and security platforms. Experience developing and auditing governance, risk, and compliance controls. Experience in incident response and security project delivery. Experience managing or participating More ❯
Employment Type: Permanent
Posted:

Vice President, Secure By Design SME

England, United Kingdom
MUFG Bank, Ltd
East and Africa, Asia and Oceania, and East Asia. The group has over 150,000 employees, offering services including commercial banking, trust banking, securities, credit cards, consumer finance, asset management, and leasing.As one of the top financial groups globally with a vision to be the world's most trusted, we want to attract, nurture and retain the most talented … better world.Please visit our website for more information - Risk, Security & Control department covers cyber security strategy maintenance and tactical planning and operations to provide IT Security protection, governance, risk management and reporting. This includes promoting the global Information Security Standards and Procedures (ISSP) requirements and local security requirements.The department deploys, supports and monitors security solutions such as virus protection … vulnerability management, complianfce monitoring and threat/incident management activities to reduce risk. MAIN PURPOSE OF THE ROLE To lead a team of Governance Risk and Control SMEs responsible for carrying out IT Security Assessments (Secure-by-Design) on technology projects. To ensure that all projects comply with IT security policies and requirements. KEY RESPONSIBILITIES In this More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Director of Cyber Security

England, United Kingdom
Willis Towers Watson
Description The Senior Leader of Cyber Engineering and Identity & Access Management (IAM) will provide enterprise-wide leadership to secure critical assets, enable digital transformation, and ensure compliance with regulatory expectations. As a designated Senior Management Function (SMF) under the Financial Conduct Authority's Senior Managers & Certification Regime (SM&CR), this role carries personal accountability for the effectiveness of … the Board, shaping the organization's defense strategy while enabling secure growth. We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & Access Management (IAM), and Data Loss Prevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable … will combine deep technical expertise with strong leadership skills to shape the future of cybersecurity, identity, and data protection within the organization. This position is designated as a Senior Management Function (SMF) under the Financial Conduct Authority regime, carrying personal accountability for compliance, operational resilience, and security effectiveness. As an FCA Senior Management Function holder, this leader is More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Director of Cyber Security

London, South East, England, United Kingdom
WTW
We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & Access Management (IAM), and Data Loss Prevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable, and resilient identity and data protection services. The ideal candidate will combine … deep technical expertise with strong leadership skills to shape the future of cybersecurity, identity, and data protection within the organization. This position is designated as a Senior Management Function (SMF) under the Financial Conduct Authority regime, carrying personal accountability for compliance, operational resilience, and security effectiveness. The Role: Strategic Leadership Define and execute the global strategy for Cyber Engineering … NYDFS), Sarbanes-Oxyley (SOX), and the Financia Conduct Authority(FCA). Cyber Engineering Oversight Lead engineering teams responsible for core security platforms, including endpoint protection, cloud security, network defense, vulnerability management, and DevSecOps integrations. Build and mature a comprehensive vulnerability management program, including continuous scanning, risk-based prioritization, remediation tracking, and Board-level reporting. Drive innovation More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

Cyber Security Specialist

Abingdon, Oxfordshire, South East, United Kingdom
Rullion Limited
computing, modelling, simulation, software engineering, business systems, data acquisition, and core IT services. Within the Computing Division, the Enterprise Infrastructure Solutions unit is responsible for the design, delivery, and management of centrally supported IT infrastructure and applications. This includes enterprise compute platforms, data networks, UNIX/Linux/Windows environments, cloud services, data centres, commercial software solutions, and end … matter expertise in security architecture, cyber risk governance, and assurance frameworks. This is a cross-functional role with both advisory and hands-on responsibilities, focusing on security assurance, risk management and supporting architecture reviews, vulnerability management, risk assessments, cyber defence posture, driving technical assurance, and embedding risk-aligned security controls across IT and OT systems and secure … Azure AD), Microsoft 365 E5, Azure IaaS/PaaS, Windows/Linux/Unix. o Strong knowledge of security tooling such as SIEM, endpoint detection (EDR/XDR), and vulnerability management platforms. o Hands-on experience with policy development, access control models (RBAC, ABAC), and logging standards. o Experience supporting assurance activities or government-mandated reviews (e.g. GovAssure More ❯
Employment Type: Contract
Posted:

Vulnerability Management & Penetration Testing Specialist

Stoke-on-Trent, Staffordshire, England, United Kingdom
Searchability
Vulnerability Management & Penetration Testing Specialist Hands on technical specialist role, the chance to spearhead a technical red team operation. Working Hybrid within one of the most innovative and fastest growing technological companies in the country in the West Midlands. £80,000 p/a + 15% bonus and car scheme. Perfect for candidates that like a challenge and … is a chance to be a pivotal part of that process. What will you be doing? You will be responsible for both being the technical go to person for vulnerability management on the clients applications, as well as being able to talk this through with your peers both technical and non-technical. This is a big multi discipline … needed. You will bring your Cyber Security and InfoSec knowledge to a point and spearhead a new 'red team' function by being the go to for penetration testing and vulnerability management. What do you need? Hands on vulnerability testing and evaluations, as well as the 'hands off' ability to discuss this with peers. PCI DSS Pen testing specialist More ❯
Employment Type: Full-Time
Salary: £75,000 - £80,000 per annum
Posted:

Vulnerability Management & Penetration Testing Specialist

Stoke-On-Trent, Staffordshire, West Midlands, United Kingdom
Hybrid/Remote Options
Searchability (UK) Ltd
Vulnerability Management & Penetration Testing Specialist Hands on technical specialist role, the chance to spearhead a technical red team operation. Working Hybrid within one of the most innovative and fastest growing technological companies in the country in the West Midlands. £80,000 p/a + 15% bonus and car scheme. Perfect for candidates that like a challenge and … is a chance to be a pivotal part of that process. What will you be doing? You will be responsible for both being the technical go to person for vulnerability management on the clients applications, as well as being able to talk this through with your peers both technical and non-technical. This is a big multi discipline … needed. You will bring your Cyber Security and InfoSec knowledge to a point and spearhead a new 'red team' function by being the go to for penetration testing and vulnerability management. What do you need? Hands on vulnerability testing and evaluations, as well as the 'hands off' ability to discuss this with peers. PCI DSS Pen testing specialist More ❯
Employment Type: Permanent, Work From Home
Salary: £80,000
Posted:

Head of Information Security

England, United Kingdom
River Island Clothing Co., Ltd
framework - ensuring we remain compliant, resilient, and trusted by our customers, partners, and people. This is a highly visible role, blending strategy and delivery. You'll oversee security operations, vulnerability management, compliance, and risk governance, while partnering with Technology, Data, Legal, and wider business teams to ensure security is embedded into everything we do - from store systems to … Security policies, standards, and controls, ensuring alignment with frameworks such as ISO 27001, NIST CSF, and the SANS Top 18. Define and report security KPIs/KRIs to senior management to senior leadership representing risk posture, compliance status, and strategic improvement initiatives. Own and manage the Information Security Risk Register; ensure risks are assessed, documented, and mitigated effectively. Lead … Own and govern IAM standards (RBAC, joiner/mover/leaver, privileged access, MFA, SSO) across corporate, store and customer facing platforms. Oversee operational security activities, including threat detection, vulnerability management, and incident response. Coordinate penetration testing, red team, and vulnerability remediation across applications, infrastructure, and cloud environments. Develop and maintain incident response playbooks and lead investigations More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cloud Architect

london, south east england, united kingdom
Hybrid/Remote Options
Crown Agents Bank
teams, reducing duplicate efforts. Design and oversee AWS networking configurations (VPCs, subnets, routing) and multi-account setups. Implement cloud security standards, including network segmentation and security groups, identity & access management, and encryption. Drive automation across the cloud environment—Utilise Infrastructure-as-Code tools, such as Terraform and AWS CDK, to provision resources in a repeatable manner. Work closely with … the security team to implement security best practices, including identity management, encryption, compliance (such as GDPR and ISO 27001), and threat detection and vulnerability management (e.g., Inspector, Security Hub, GuardDuty), to improve the NIST score. Monitor and optimise AWS environments for performance, cost, and efficiency (right-sizing, auto-scaling, etc.). Implement monitoring and logging solutions (such … cloud-native design and troubleshooting. Engage with senior technology leadership and stakeholders to communicate architectural decisions, technical risks, and opportunities. Qualifications Proven practical experience of AWS services including account management, networking, security and identity, compute, storage, databases, and messaging. Established cloud architecture principles, patterns, and guardrails to guide the design and development of solution architectures. Extensive experience with AWS More ❯
Posted:

Platform Security Engineer

England, United Kingdom
ION Group
operations with a strong focus on automation, detection and secure by design principles. Additionally, as part of the role you will be participating in threat detection, incident response and vulnerability management remediation. You will be serving as an operational responder, working closely with Product, infrastructure and Security Operations teams. We are looking for a hard-working, dedicated and … system visibility by expanding logging coverage and implementing additional monitoring capabilities. Maintain, update, and regularly test incident response runbooks, containment strategies, and escalation protocols. Lead the end-to-end vulnerability management process for ION Markets systems, from identification to remediation. Provide support for security architecture reviews of developed systems to ensure alignment with best practices. Stay up to … or operating security technologies is preferred, such as endpoint security (e.g. AV/EPP/EDR), SIEM, DLP, SWG, CASB, UEBA, IDS, IPS, firewalls, IAM/PIM/PAM, vulnerability management, MDM, etc. About us We're a diverse group of visionary innovators who provide trading and workflow automation software, high-value analytics, and strategic consulting to corporations More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Technical Consultant (Infrastructure Operations)

National, United Kingdom
NHS England
multi-skilled 24/7 Infra Operations team organised by function and focussed on supporting continual improvement. The teams are divided into four core areas providing technical and service management expertise: Hosting Cloud centre of excellence Connectivity Central capabilities RRP (Recruitment and Retention Premia) The post of Technical Consultant has been awarded a Recruitment and Retention Premia (RRP) in … attracts an additional monthly RRP payment equal to 13% per annum. Main duties of the job The Technical Consultant band 7 will work closely with the Technical Operations Manager (Vulnerability and Risk Management) to reduce the overall risk and threat landscape of the NHS England Infrastructure Services estate. This will include but not be limited to: Undertaking patching … and tooling to increase the speed and efficacy of patching Work with the IT Ops team to address data quality shortfalls Work across Directorates to develop reporting capabilities from Vulnerability Management tooling. The Vulnerability and Patch Management team is a sub-team, embedded within the Infrastructure Services pillar, working closely with the IT Operations team. The More ❯
Employment Type: Fixed-Term
Salary: £54025.30 - £61822.30 a year
Posted:

Tech lead - vulnerability management

City, London, United Kingdom
Colt Technology Services
Company description: We are seeking a dynamic and motivated Vulnerability Management Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The Vulnerability Management Lead will play a crucial role in tracking and managing the identification, assessment, and remediation of security vuln click More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Analyst 1, Digital Technology Solutions

Cincinnati, Ohio, United States
University of Cincinnati
research, design, implementation, and support of systems supporting information security tools and services. Participate in the development, maintenance, and utilization of standard operating procedures. Participate in conducting risk and vulnerability assessments of information systems to identity vulnerabilities, risks, and protection needs. Participate in troubleshooting processes during and outside of normal business hours. Assist with mentoring non-security teams regarding … risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS). Assist with information security training and awareness programs. Perform related duties based on departmental need. This job description can be changed at any time. Required Education Associate's Degree … or experience in the field of information security operations. Responsibilities may include, but are not limited to: endpoint security, full-disk encryption, multi-factor authentication, security incident and event management (SIEM), SSL and client certificate management, vulnerability management, privileged access management, password management, system/application administration for security related technologies, as well as More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer

South East London, London, United Kingdom
Hybrid/Remote Options
Daniel James Resourcing Ltd
Cyber Security to strengthen the organisations security posture, protect critical infrastructure, and reduce risk across a diverse and complex environment. Youll take ownership of real security challenges threat monitoring, vulnerability management, incident response, and continuous hardening of systems while helping shape a maturing cyber function. This is hands-on, meaningful engineering work within a team thats growing and … and execution of response processes, ensuring swift containment and minimisation of impact. Security Assessments: Conduct regular audits and reviews, ensuring systems align to best practice and evolving security standards. Vulnerability Management: Own the identification, prioritisation and remediation of vulnerabilities, driving measurable improvements in resilience. Collaboration & Influence: Work closely with the Head of Cyber Security, operational teams and partners … by supporting colleagues, sharing knowledge and promoting safe working practices. What Youll Bring 3+ years cyber security experience within a sizeable or complex organisation. Strong understanding of threat analysis, vulnerability management and incident response. Experience with mainstream security tools (firewalls, IDS/IPS, scanning platforms, monitoring tools). Relevant certifications (CISSP, CEH, or similar) are highly desirable. Excellent More ❯
Employment Type: Permanent, Work From Home
Posted:

SOC Analyst

London, South East, England, United Kingdom
Precise Placements
SOC Analyst - CISSP, ISC2 SCCP, Palo Alto, Threat Detection, Vulnerability Management, Firewall A global law firm client we work with are currently looking to take on a new SOC Analyst (CISSP, ISC2 SCCP, Palo Alto, Threat Detection, Vulnerability Management, Firewall) on a permanent basis. The firm are currently undergoing a significant transformation and expansion across the … deal of trust, autonomy and ownership with a very anti-micromanage managerial structure in place. To be considered for this SOC Analyst (CISSP, ISC2 SCCP, Palo Alto, Threat Detection, Vulnerability Management, Firewall) role, it's ideal you meet one of the following criteria: Work Experience Based Criteria 5+ Years of Working Experience in Cybersecurity or Related Field [Preferred More ❯
Employment Type: Full-Time
Salary: £60,000 - £70,000 per annum
Posted:

Director, Information Security Officer

Chicago, Illinois, United States
Capital One
Be responsible for delivery of end to end security for strategic projects, including but not limited to mergers and acquisitions Deliver divisional cyber strategy integration and execution, identification and management of risk for top business initiatives and technology platforms, threat and vulnerability management, incident management, supply chain cyber risk management, cyber risk oversight and reporting. … Security within business objectives for line of business area Serve as the central point of contact for your line of business technology executives into Capital One's Cyber risk management priorities Educate and influence executive leadership and associates to effectively leverage security capabilities and solutions to mitigate risks and emerging threats Provide security expertise on prioritizing and managing information … of leaders, drives innovation activity as an outcome; partner extensively with other Cyber and Technology organizations to derive solutions enabling industry leading products Build relationships and influence with risk management functions across lines of defense Become knowledgeable and advise on Capital One's Cyber's services, policies, procedures and standards Staying current on the changing regulatory environment and understanding More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Director, Information Security Officer

Baltimore, Maryland, United States
Capital One
Be responsible for delivery of end to end security for strategic projects, including but not limited to mergers and acquisitions Deliver divisional cyber strategy integration and execution, identification and management of risk for top business initiatives and technology platforms, threat and vulnerability management, incident management, supply chain cyber risk management, cyber risk oversight and reporting. … Security within business objectives for line of business area Serve as the central point of contact for your line of business technology executives into Capital One's Cyber risk management priorities Educate and influence executive leadership and associates to effectively leverage security capabilities and solutions to mitigate risks and emerging threats Provide security expertise on prioritizing and managing information … of leaders, drives innovation activity as an outcome; partner extensively with other Cyber and Technology organizations to derive solutions enabling industry leading products Build relationships and influence with risk management functions across lines of defense Become knowledgeable and advise on Capital One's Cyber's services, policies, procedures and standards Staying current on the changing regulatory environment and understanding More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Vulnerability Management
10th Percentile
£36,250
25th Percentile
£47,500
Median
£75,000
75th Percentile
£90,000
90th Percentile
£97,500