Summit Technologies, Inc. is looking for a VulnerabilityScanning Administrator to join our team supporting a government agency. The role is a part of the Development, Modernization, and Enhancement Team providing engineering solutions in support of our client. The successful candidate will manage the web application scanning program, reporting to the Vulnerability Management Team Lead. This … Washington, DC. You must be a US citizen, as this supports a government contract and requires a Public Trust clearance. Responsibilities and Duties: Provide technical hands-on support for vulnerabilityscanning, with an emphasis on device scanning, using Tenable Security Center and Tenable Nessus. Configure, manage, and operate Tenable Security Center and Tenable Nessus, and other vulnerabilityscanning tools as required. Execute, manage, and troubleshoot device vulnerability scans. Work with tool vendors to resolve issues. Develop, execute, and improve work instructions and other technical documentation related to vulnerability scanning. Analyze vulnerability data with a variety of tools. Accurately document work in various formats including work instructions, change management requests, incident tickets, and More ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability management-specific tooling, and have … an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process vulnerability data to provide reports, insights and metrics … that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerability management, security standards, and regulations More ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability management-specific tooling, and have … an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process vulnerability data to provide reports, insights and metrics … that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerability management, security standards, and regulations More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Atrium Workforce Solutions Ltd
SOC) Manager to lead the Cyber Security Operations Centre and be responsible for managing the day-to-day operations of the SOC team, overseeing incident detection and response, ensuring vulnerabilityscanning and remediation efforts across the organization. Predominantly remote work with occasional Lon don and Leeds office visit Lead and manage the SOC team, including security analysts and … incident responders, ensuring 24/7 coverage and effective incident handling. Oversee threat monitoring, detection, and response activities to minimize the impact of cyber incidents. Implement and manage vulnerabilityscanning programs, coordinate assessments, and ensure timely remediation of findings. Develop and enforce SOC processes, playbooks, and incident response procedures. Coordinate with IT and business units to mitigate risks … identified through vulnerabilityscanning or threat intelligence. Manage SOC tools and technologies, including SIEM, EDR, SOAR, and scanning platforms. Track and report key performance indicators (KPIs) for SOC operations and vulnerability management. Conduct regular security assessments and risk evaluations in partnership with internal audit and compliance teams. Keep abreast of emerging cyber threats and best practices More ❯
secured federal facilities in: Washington, DC; Huntsville, AL; and Clarksburg, WV. A current TOP SECRET clearance is required to be considered. We are seeking a Senior Cybersecurity Analyst - Enterprise Vulnerability Assessment Program (EVAP). This role combines strategic oversight and technical expertise to ensure the government customer maintains a proactive and resilient vulnerability management posture across its enterprise … systems and infrastructure. Key Responsibilities: Serve as the technical authority for enterprise vulnerability assessment tools and practices Manage the architecture, engineering, and operation of the EVAP scanning infrastructure Configure and optimize scanning solutions to ensure accuracy and effectiveness Stay current with emerging tools, technologies, and threat landscapes to refine methodologies Operational Oversight: Performs daily operations of EVAP … allowing EVAP, Red and Blue Teams to perform timely and effective vulnerability assessments Provide hands-on support for complex scans, troubleshooting, and result analysis Align scanning activities with organizational priorities for maximum impact Tool and Infrastructure Management: Maintain and enhance the FBI's enterprise vulnerabilityscanning tools and infrastructure Ensure tools are secure, up to date More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
GTSC Talent Solutions
will ensure proper infrastructure functionality with PKI authentication, firewalls, and SSL/TLS, while also contributing to best practices for enterprise data analytics. Additional responsibilities include scripting for automation, vulnerabilityscanning, patch deployment, and documentation development to support security and IT teams. Location: Annapolis Junction, Maryland All work is on-site. This is not a hybrid or remote … of relevant experience. Experience with Splunk Machine Learning Toolkit (MLTK) Proficiency in scripting languages such as CSS, HTML, JavaScript, and Python Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning tools Experience with ServiceNow Ticketing System Proficiency in shell scripting to automate tasks and manipulate data Ability to ensure Splunk infrastructure functions properly with PKI-based authentication … firewall security logs Experience with Splunk Machine Learning Toolkit (MLTK) Experience with scripting languages such as CSS, HTML, JavaScript, and Python Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning ServiceNow Ticketing System Shell scripting to automate tasks and manipulate data Education and Required Qualification Bachelor's degree and Twenty (20) years of demonstrated combined experience in More ❯
SIPRNet networks. Data Management & Reporting: Keep our systems on track by updating and synchronizing cybersecurity data across essential Air Force and DISA repositories, and deliver detailed monthly progress reports. Vulnerability Management: Collaborate closely with PACAF vulnerability managers to proactively identify, manage, and mitigate potential security risks, reinforcing our overall cyber defense. Travel Opportunity: Based in Hawaii, you'll … assessing cyber risks, identifying mission sets, and defending critical missions Advisory Expertise: Applying, assessing, and advising MAJCOM staff and Wings on cybersecurity requirements 3-4 year' experience in Theater Vulnerability Analyst Requirements to INCLUDE: Conducting Network Vulnerability Engineering Functions Expertise in DoD, AF, DISA, NIST, NIAP and PACAF processes DoD approved Scanning Tools (e.g., ACAS) Microsoft SCCM … MECM REQUIRED KSAs AF Cyber Architecture: Familiarity with AF Cyber architecture, including the roles of PACAF MOBs and GSUs. Endpoint Security: Familiar with endpoint security product requirements. Vulnerability Analysis: Capable of analyzing cyber vulnerabilities and presenting the findings clearly. Office & Collaboration Tools: Proficient with Microsoft Office and SharePoint for trend analysis; experienced with MS Teams, email, and VoIP. DISA More ❯
processes and outcomes to reduce vulnerabilities across the Engineering estate; taking a lead role in detecting and responding to advanced threats across a growing portfolio of clients. Experience & responsibilities VulnerabilityScanning & Reporting - performing regular vulnerability scans and generating reports using SonarQube, Trivvy & Nessus; ensuring tool sets are kept up to date and that scans are performed regularly … regular system compliance audits and updates, ensuring systems are compliant with industry best practices. (CIS, STIG, NIST etc.) Performing regular reviews and updates to security enforcing GPOs, conducting periodic vulnerability assessments to identify and address potential vulnerabilities. About You You will possess hands on experience working in a similar Cyber Engineering role with a working knowledge of SonarQube, Nessus … and Ivanti and a broad experience spanning VulnerabilityScanning & Reporting, Endpoint Security, Incident Management & System Hardening. Security Clearance: Must hold an active SC clearance If you're interested in hearing more about this opportunity, please submit your application. Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we More ❯
SIPRNet networks. Data Management & Reporting: Keep our systems on track by updating and synchronizing cybersecurity data across essential Air Force and DISA repositories, and deliver detailed monthly progress reports. Vulnerability Management: Collaborate closely with PACAF vulnerability managers to proactively identify, manage, and mitigate potential security risks, reinforcing our overall cyber defense. Travel Opportunity: Based in Hawaii, you'll … Circuit Connection Processing: Knowledge of processing circuit connection requests through SGS and SNAP. Mentorship & Training: Demonstrated ability to mentor and train personnel on DoD cybersecurity tools, resolve issues with vulnerabilityscanning and endpoint security solutions. CORA/CCORI Preparation: Extensive experience preparing Wings for CORAs and CCORIs on NIPRNet/SIPRNet, utilizing DISA CORA scoring and risk assessment … for main bases Mentor and train NAF, Wing, and cybersecurity teams through the CRR-M program, including the use of DoD security technical implementation tools Resolve issues with DoD vulnerabilityscanning tools, endpoint security solutions, and assist in preparing PACAF Wings for CORA and CCORI missions Develop CORA and CCORI scores, Risk Assessment Reports, and provide recommendations for More ❯
federal facilities in: Washington, DC; Huntsville, AL; and Clarksburg, WV. A current TOP SECRET clearance is required to be considered. We are seeking a Mid-level Cybersecurity Analyst - Enterprise Vulnerability Assessment Program (EVAP) Team, to conduct Enterprise Vulnerability Assessment Program (EVAP) tasks. This role requires candidate to have technical experience to assist the EVAP Team and the government … customer to maintain a proactive and resilient vulnerability management posture across its enterprise systems and infrastructure. Key Responsibilities: Serve as the administrator for enterprise vulnerability assessment tools and practices Helps maintain the architecture, engineering, and operation of the EVAP scanning infrastructure Assist with configuring and optimizing scanning solutions to ensure accuracy and effectiveness Continue to stay … Operation Procedures (SOP) to ensure tasks are performed within Cybersecurity policies Operational Oversight Performs daily operations of EVAP allowing EVAP, Red and Blue Teams to perform timely and effective vulnerability assessments Provide hands-on support for complex scans, troubleshooting, and result analysis Align scanning activities with organizational priorities for maximum impact Tool and Infrastructure Management Maintain and enhance More ❯
is embedded within the Software Development Life Cycle, while ensuring that all security requirements have been applied before product or function release. Analyse and interpret security scan results and vulnerability reports to develop prioritized remediation strategies, working closely with IT, Development and Hosting teams to address vulnerabilities effectively Engineer and implement security controls based on industry standards while continuously … ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetration testing and vulnerabilityscanning Ensure products compliance with security standards and regulations Ensure NAVBLUE Security strategy deployment within technical operations Ensure effective synchronization and alignment with Airbus Security Organization Education: Bachelor … influencing individuals at all levels of the organization to drive and implement change while identifying and minimizing the impact of risks Technical Systems Proficiency: Security Management Tools (email filtering, vulnerabilityscanning tools, security dashboards, etc.) Cloud security management tools like CNAPP, CSPM, CWPP, and CIEM. Security risk assessment methodology (EBIOS RM) Security Requirement Definition and Review Travel Required More ❯
is embedded within the Software Development Life Cycle, while ensuring that all security requirements have been applied before product or function release. Analyse and interpret security scan results and vulnerability reports to develop prioritized remediation strategies, working closely with IT, Development and Hosting teams to address vulnerabilities effectively Engineer and implement security controls based on industry standards while continuously … ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetration testing and vulnerabilityscanning Ensure products compliance with security standards and regulations Ensure NAVBLUE Security strategy deployment within technical operations Ensure effective synchronization and alignment with Airbus Security Organization Education: Bachelor … influencing individuals at all levels of the organization to drive and implement change while identifying and minimizing the impact of risks Technical Systems Proficiency: Security Management Tools (email filtering, vulnerabilityscanning tools, security dashboards, etc.) Cloud security management tools like CNAPP, CSPM, CWPP, and CIEM. Security risk assessment methodology (EBIOS RM) Security Requirement Definition and Review Travel Required More ❯
Required: Tenable Nessus Engineers IR35 Status: Inside Duration: 12 month initial contract Location: 1-2 days onsite in either Central London or Knutsford Role 1 As an experienced Vulnerability Assessment Engineer responsible for maintaining the Vulnerability Assessment toolsets and products. Primary Responsibilities The ability to review requirements, undertake product design followed by Implementation/deployment/support of … Vulnerability Assessment tools suite (e.g Tenable, Rapid7, Qualys etc) and peripherals with Engineering. Maintains local and network credentials and provisions access to vulnerabilityscanning systems. Responsible for integration of Vulnerability assessment tooling with other security and IT systems management tools (i.e. Splunk, ServiceNow) Responsible for developing and maintaining standard processes and operating procedures, creating technical architecture … diagrams and system build documentation. Responsible for operating the scanning tools and maintaining coverage along with supporting the vulnerability management and remediation teams in understating how to remediate vulnerabilities (i.e. laptops, VMs, wireless devices) Works with vulnerability management team to build asset repositories and asset scan policies Work closely with customer delivery managers to prioritize daily tasks More ❯
/SaaS Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerability assessment, and threat modeling Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications Develop and maintain containerization and micro … services Integrate security controls, such as automated vulnerabilityscanning, static and dynamic analysis, and security testing, into the CI/CD process Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others Stay updated with More ❯
security tooling, stitching together CI steps, scripts, and small tools to automate security controls and visualise their results in a helpful manner. This could include SAST, SCA, DAST, secrets scanning, vulnerabilityscanning, or other tooling Being guardians of our Secure Development Lifecycle, ensuring security controls are baked in and "pushed left" as much as reasonably possible Triaging More ❯
access View job & apply Zero Trust Architect Location: Fully Remote Job type: Contract Position Overview: Leading FinTech company seeking a Zero Trust Architect to design and implement Cyber Security Vulnerability Management Analyst Cyber Security Vulnerability Management Analyst required for a market leading financial services firm. It's a great opportunity to get to work with industry-leading tools … your analytical, technical and communication skills, and to really make a difference to our customers and colleagues. This role will contribute to the development, maintenance and overall delivery of Vulnerability Management controls for the Bank, reporting to the Vulnerability Management Lead. The Vulnerability Management Analyst will contribute to the day-to-day running of the team, assisting … Specialists with managing the Bank's Vulnerability Management controls and providing security input for vulnerabilities which threaten the organisation. Experience Understanding of vulnerability lifecycles, standards and ratings Risk assessing findings to determine appropriate response with a proactive approach to recording, management and escalation of risks Increasing the quality of vulnerability reporting automation to reduce manual effort Advanced More ❯
SIEM use cases: log ingestion, analytics rules, playbooks and workbooks. Deploy and manage Microsoft Defender solutions (Defender for Cloud, Defender for Servers, Defender for Containers) to harden Azure workload Vulnerability & Patch Management Operate vulnerability management tools to discover and prioritise flaws across cloud and on-prem systems. Define and run patch management processes for virtual machines, containers and … serverless functions. Integrate vulnerabilityscanning (e.g. Qualys, Sonar Cloud, Tenable or Azure-native scanners) into CI/CD pipelines. Security Analysis & Incident Response Perform root-cause analysis of security incidents and vulnerabilities. Conduct threat modelling, code and infrastructure reviews. Develop and execute incident response procedures, leveraging Sentinel playbooks and Logic Apps when required. CI/CD & Automation Integrate … services (IAM, networking, Key Vault). Proven track record configuring and optimising Microsoft Sentinel (SIEM) and Microsoft Defender tools. Familiarity with Azure Policy and Azure Blueprints for compliance enforcement. Vulnerability & Patch Management Practical experience with vulnerability scanners (Qualys, Tenable, or Azure Defender Vulnerability Assessment). Knowledge of patch management frameworks (WSUS, Azure Update Management, third-party tools More ❯
the country. It is the largest news publisher on TikTok with over 28 million total followers and nearly 45 billion views in the past year. We are seeking a Vulnerability Engineer to help build and drive our vulnerability management function. This is a key role for someone with the technical skills, automation mindset, and proactive attitude to take … someone who thrives on ownership, brings ideas to life through automation, and collaborates effectively with teams across the business. Main Responsibilities Develop, implement, and maintain an automated and scalable vulnerability management program using Tenable and related tools. Establish and enforce vulnerability management policies, scan configurations, and best practices, aligned to frameworks such as ISO 27001, NIST, and CIS. … Integrate vulnerabilityscanning and remediation into CI/CD pipelines and development workflows to ensure security at speed. Automate data collection, triage, reporting, and ticketing processes using scripting languages such as Python, Bash, PowerShell, or Go. Collaborate with IT, DevOps, and engineering teams to remediate identified vulnerabilities quickly and effectively. Scope and coordinate penetration testing activities; track remediation More ❯
penetration testing, and static/dynamic security testing (SAST/DAST). Security Tooling and Automation : Implement and maintain security tools used in the development and deployment processes (e.g., scanning tools, vulnerability management systems, SAST, DAST, ASPM). Automate security processes to streamline secure development and operational workflows. Incident Detection and Response : Work with engineering and platform teams … Expertise: Deep understanding of identifying, assessing, and mitigating security risks in application designs, code, and deployed products. Experience managing and using security testing tools such as SAST, DAST, and vulnerabilityscanning solutions. Strong grasp of secure coding practices and proficiency in integrating security into the Software Development Lifecycle (SDLC). Technical Knowledge and Implementation experience: Direct experience with More ❯
Barrow-in-Furness, Cumbria, England, United Kingdom Hybrid / WFH Options
Adecco
Job Title: Vulnerability Manager Location: Barrow-in-Furness (Hybrid - 3 days onsite per week) Type: Full-time | Permanent Overview I'm recruiting on behalf of a leading organisation in the technology and cybersecurity space, looking to bring on an experienced and proactive Vulnerability Manager . This is a great opportunity for someone with a strong background in cybersecurity … vulnerability management, and governance. You'll be working closely with internal teams, clients, and third-party stakeholders to manage and improve security posture across complex environments. Key Responsibilities Manage and execute the end-to-end vulnerability management process Conduct vulnerability analysis , risk assessments, and impact reporting Identify current and emerging threats and communicate these effectively to stakeholders … support remediation activities through to closure Deliver security awareness sessions and support a culture of cybersecurity best practices across the team Ideal Candidate Will Have: Hands-on experience with vulnerabilityscanning tools and related frameworks Strong understanding of risk assessment methodologies and security governance Ability to present complex technical findings clearly to both technical and non-technical audiences More ❯
Operate within a global team that takes responsibility for the security monitoring of key technologies and tools across the estate Lead and manage a team of Security Analysts & the Vulnerability management team Comfortable operating in a technical capacity performing hands-on incident response and supporting/managing SOC analysts Act as a SME in matters related threat and vulnerability … and new technology initiatives Implement and maintain operating run books, operating processes and procedures Help to develop and configure use cases, and alerting rules within SIEM technologies Mange the vulnerability management programme that includes vulnerabilityscanning, security testing, threat monitoring and data loss and leakage prevention Direct on-going threat intelligence activities Mentor and develop security analysts … Skills: Prior experience working/managing a SOC Demonstrable experience and operational knowledge of SIEM, firewalls, intrusion detection and vulnerability management systems/solutions Detailed understanding of Security Monitoring, Threat Intelligence, Vulnerability management and Incident Response Experience managing security incidents within a complex environment. Strong foundation in network security and common attack methodologies Exposure to user behaviour analytical More ❯
Management : Lead the information security risk management process, including identification, assessment, treatment, and monitoring of risks, with a particular emphasis on application security risks. Conduct regular risk assessments and vulnerability analyses of systems, applications, and infrastructure. Security Operations : Oversee the management of security technologies and controls, including but not limited to, firewalls, intrusion detection/prevention systems, security information … and event management (SIEM), data loss prevention (DLP), vulnerability management tools, and application security testing tools. Secure Software Development Lifecycle (SSDLC) : Integrate security best practices into the software development lifecycle. Work closely with development teams to ensure secure coding practices, conduct comprehensive security testing (e.g., penetration testing, vulnerabilityscanning, application security reviews), and promote a security-aware More ❯
frameworks, and threat landscapes to ensure enterprise-grade protection across cloud platforms. You will work closely with TMHCC International IT teams and Group Security teams to prioritise and coordinate vulnerability remediation across the cloud estate. You will be experienced in cyber vulnerability detection, remediation, and reporting processes. You will be responsible for triaging and prioritising detected vulnerabilities as … they emerge, to the BISO and IT Leadership for action or information. Skills and Experience Specification 5-10 years of experience in a technical cyber role (e.g., threat and vulnerability analyst, security engineer, SOC analyst). Minimum 3-5 years of hands-on experience in cloud environments. Proven experience with at least one major cloud provider (AWS, Azure). … Proven experience with Microsoft Azure (multi-cloud knowledge, especially AWS, is a plus). Experience with security operations, incident response, and cloud compliance. Working knowledge of vulnerabilityscanning and detection technologies. Practical experience in triage and remediation of vulnerabilities. Deep understanding of and ability to articulate the risk associated with security vulnerabilities. Ability to coordinate and chair regular More ❯
are ready for the challenges of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security weaknesses in web, mobile, and … play a hands-on role in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & Vulnerability Assessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including demonstrating the business impact of potential … system administrators. Keep up to date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerability management program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work with stakeholders to develop mitigation strategies. Conduct regular security risk assessments and develop action More ❯
coordinating penetration testing and managing cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, data leakage prevention, patching, encryption, vulnerabilityscanning, and configuration of security tools. Prior experience in an international enterprise environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity … procedures annually for security compliance. Develop, test, and implement disaster recovery procedures. Manage cybersecurity projects to ensure timely delivery within budget. Perform or coordinate security assessments, penetration tests, and vulnerability scans. Ensure compliance with frameworks like COBIT, NIST, ISO, PCI, GDPR, HIPAA, etc. Provide internal support for security issues within SLAs. Evaluate and implement CIS controls as needed. Contribute More ❯