Remote Vulnerability Management Jobs

1 to 25 of 199 Remote Vulnerability Management Jobs

Project Manager - Cybersecurity

City, London, United Kingdom
Hybrid / WFH Options
Oliver James Associates Ltd
or financial services sector to come in and drive forward a new Cyber Security project through to delivery. This role will be focusing on Vulnerability Management & Assessment, and Remediation Processes within the project and you will be responsible for the end-to-end delivery ensuring its success. The … a waterfall and Agile perspective and requires the candidate to be experienced in not only Cyber security but focusing on Secure builds and Configuration Management & Vulnerability Management. The ideal candidate will need to be a self-starter and has strong experience working in Agile environments and is a … seasoned project manager who has strong Cyber Security, Configuration Management & Vulnerability Management experience. You will need to come from either financial services or ideally insurance, along with being comfortable working with stakeholders, CISO and Programme Manager. You must also be familiar with vulnerability management tools More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Vulnerability Management Analyst- HYBRID with Security Clearance

Smyrna, Georgia, United States
Hybrid / WFH Options
Crest Security Assurance
Vulnerability Management Analyst Provide support to increase the Cybersecurity Center's ability to manage the cybersecurity risk to systems, assets, data, and agency capabilities through active identification of system/application weaknesses that require remediation and/or mitigation, enabling DoD to focus and prioritize its risk and … vulnerability management efforts in alignment with the needs of the Agency. Work shall be performed in accordance with Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01, NIST SP 800-40, DoDI 8530.01, CJCSM 6510.02, TASKORD 20-020, FRAGO 21 to OPORD 05-01CJCSI 6510.01F, CJCSM … released directives/mandates. Responsibilities: • Ensure routine action is taken to identify and correct vulnerabilities according to the following phases. Vulnerabilities include Information Assurance Vulnerability Management (IAVM) as well as vulnerabilities not be addressed through IAVM directives but affect DoD owned and managed information systems (ISs) and devices More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Vulnerability Management Analyst

London Area, United Kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/ More ❯
Posted:

Cyber Vulnerability Management Analyst

london, south east england, united kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/ More ❯
Posted:

Director of Cyber Security

London, United Kingdom
Hybrid / WFH Options
Financial Times
Responsibilities Secure Development: Collaborate with engineering and IT teams to embed security into systems and applications. Technical Expertise: Provide guidance on secure architecture, secrets management, and best practices. Threat Management: Lead all aspects of penetration testing, bug bounty programs, and vulnerability reporting to mitigate risks and align … senior cyber security role, ideally within a complex, global organisation. Deep expertise in one or more of the following areas: security consultancy, security engineering, vulnerability management or governance. Deep knowledge of modern DevSecOps practices. Experience in leading vulnerability management programs, including expertise in utilising tools and … processes for vulnerability scanning, conducting penetration testing, and delivering actionable reporting to support an effective and comprehensive vulnerability management strategy. Excellent communication and stakeholder management skills, with the ability to convey complex technical issues to non-technical audiences. Hands-on experience collaborating with engineering and development More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Director of Cyber Security London

London, United Kingdom
Hybrid / WFH Options
Financial Times group
Responsibilities Secure Development: Collaborate with engineering and IT teams to embed security into systems and applications. Technical Expertise: Provide guidance on secure architecture, secrets management, and best practices. Threat Management: Lead all aspects of penetration testing, bug bounty programs, and vulnerability reporting to mitigate risks and align … senior cyber security role, ideally within a complex, global organisation. Deep expertise in one or more of the following areas: security consultancy, security engineering, vulnerability management or governance. Deep knowledge of modern DevSecOps practices. Experience in leading vulnerability management programs, including expertise in utilising tools and … processes for vulnerability scanning, conducting penetration testing, and delivering actionable reporting to support an effective and comprehensive vulnerability management strategy. Excellent communication and stakeholder management skills, with the ability to convey complex technical issues to non-technical audiences. Hands-on experience collaborating with engineering and development More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Tenable Vulnerability Management Analyst - Banking sector

london, south east england, united kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/ More ❯
Posted:

TDA Vulnerability Management

Southampton, Hampshire, South East, United Kingdom
Hybrid / WFH Options
LA International Computer Consultants Ltd
TDA Vulnerability Management (7-month assignment) Hybrid work with time onsite in Southmampton Technical architect needed with network experience (Cisco).Experience of Vulnerability Management solutions such as Tenable or Qualys is ideal. Knowledge of network security solutions. ITIL and Service Management If it could be More ❯
Employment Type: Contract, Work From Home
Rate: £500 - £650 per day
Posted:

TDA Vulnerability Management

Southampton, Hampshire, United Kingdom
Hybrid / WFH Options
LA International Computer Consultants Ltd
TDA Vulnerability Management (7-month assignment) Hybrid work with time onsite in Southmampton Technical architect needed with network experience (Cisco).Experience of Vulnerability Management solutions such as Tenable or Qualys is ideal. Knowledge of network security solutions. ITIL and Service Management If it could be More ❯
Employment Type: Contract
Rate: GBP 500 - 650 Daily
Posted:

Information Systems Security Manager (ISSM) - Hybrid Chantilly with Security Clearance

Herndon, Virginia, United States
Hybrid / WFH Options
Optiv+ClearShark
in the development of procedures and runbooks; act as the subject matter expert in a variety of cybersecurity domains such as Identity and Access Management, Vulnerability Management, Endpoint Protection, Incident Response activities, etc.; and will provide tier two production support for responsible solutions. How you'll make … evaluate the impact of new vulnerabilities, security alerts and threat intelligence bulletins. Participate in threat hunting and incident response events. Lead third-party risk management tasks such as conducting risk assessments for vendors and services. Build and maintain relationships with key customer's technical staff members and with internal … stakeholders from IT, customer service and field operations. Share experience, knowledge, and ideas with management and co-workers to maintain a kind and respectful team-based environment. Promote a corporate culture that is committed to information security best practices. Participate in after-hours support, as needed, to respond to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SOC Lead

Basingstoke, Hampshire, South East, United Kingdom
Hybrid / WFH Options
Queen Square Recruitment Limited
Hybrid (3 days in office ) About the Role We are seeking a highly skilled SOC Lead to oversee cyber incident response, threat intelligence, and vulnerability management for a leading organization. This role will act as a trusted advisor to senior leadership, ensuring a structured and effective response to … cyber incidents while driving improvements in incident management processes. Key Responsibilities Lead and coordinate responses to significant cyber incidents, ensuring effective and timely resolution. Act as a subject matter expert, advising senior leadership on business impacts and risk mitigation strategies. Develop and implement cyber incident containment plans and remediation … reporting, and documentation to drive continuous improvement. Collaborate with Threat Intelligence and Incident Response teams to monitor and respond to emerging threats. Ensure effective vulnerability management, prioritizing risks and coordinating remediation efforts. Provide regular technical and management reports demonstrating the effectiveness of security operations. Develop and maintain More ❯
Employment Type: Contract
Posted:

SOC Analyst

London, United Kingdom
Hybrid / WFH Options
Hays Technology
and experience with MS Sentinel, Cisco Meraki, MS Defender, Endpoint protection Knowledge and experience with SIEM, IDS/IPS, firewalls, endpoint protection systems, and vulnerability management Knowledge and experience analysing and interpreting security logs, event data, and alerts to identify potential threats Knowledge and experience of network protocols … traffic analysis, and cyber-attack methodologies Knowledge and experience of threat intelligence, risk management, vulnerability management, and penetration testing Please note sponsorship is not available for this position, and you must be able to obtain a Security Clearance. Your new employer is looking for candidates who want More ❯
Employment Type: Permanent
Salary: GBP 46,000 - 57,000 Annual
Posted:

Senior Cloud & Application Security Engineer | London, UK | Hybrid (Hiring Immediately)

London, UK
Hybrid / WFH Options
Funding Circle
native applications, microservices, and infrastructure components. Manage internal and external penetration testing engagements for Funding Circle applications, services, and cloud infrastructure. Oversee and enhance vulnerability management processes, focusing on strategic remediation, root cause analysis, and preventative measures. Contribute to drive implementation of security automation across cloud infrastructure configuration … vulnerability management, and compliance monitoring. Design, implement, and support the adoption of robust security architectures, controls, and best practices within our AWS cloud environment. Act as a subject matter expert on cloud security (AWS), DevSecOps, and application security, providing guidance and mentorship to other engineers. Contribute to the … securing, and managing a wide range of AWS security services. Proven, hands-on experience architecting, building, and integrating security tooling (SAST, DAST, SCA, secrets management, IAST) and automated security controls within CI/CD pipelines (e.g., GitLab CI, Jenkins, GitHub Actions). Strong track record of defining, implementing, measuring More ❯
Employment Type: Full-time
Posted:

Senior AppSec Engineer

United Kingdom
Hybrid / WFH Options
WeAreTechWomen
native applications, microservices, and infrastructure components. Manage internal and external penetration testing engagements for Funding Circle applications, services, and cloud infrastructure. Oversee and enhance vulnerability management processes, focusing on strategic remediation, root cause analysis, and preventative measures. Contribute to drive implementation of security automation across cloud infrastructure configuration … vulnerability management, and compliance monitoring. Design, implement, and support the adoption of robust security architectures, controls, and best practices within our AWS cloud environment. Act as a subject matter expert on cloud security (AWS), DevSecOps, and application security, providing guidance and mentorship to other engineers. Contribute to the … securing, and managing a wide range of AWS security services. Proven, hands-on experience architecting, building, and integrating security tooling (SAST, DAST, SCA, secrets management, IAST) and automated security controls within CI/CD pipelines (e.g., GitLab CI, Jenkins, GitHub Actions). Strong track record of defining, implementing, measuring More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Principal Information Security Analyst - Risk Management

Hollywood, Florida, United States
Hybrid / WFH Options
Southern Glazer's Wine & Spirits
and external assessments and audits. The person in this position will need to have extensive knowledge of information security risk and third-party risk management, as well as IT systems architectural concepts and business processes. This position works closely with all IT areas including Infrastructure, Application Development, Database, Network … can work across multiple functions and disciplines Capable of developing and delivering effective presentations to at all levels within the organization Primary Responsibilities Risk Management & Remediation Act as an Information Security Risk Management subject matter expert Assist the Information Security Risk Manager and GRC Director in the development … risk and potential impact of new projects and architectural changes to IT and the organization. Participate heavily in the implementation of the ServiceNow Risk Management solution and its regular maintenance. Assist with periodic reporting and presentation on status for a variety of risk-related stakeholder requirements. Preferred Qualifications Master More ❯
Employment Type: Permanent
Salary: USD Hourly
Posted:

Cyber Security Engineer with Security Clearance

Bethesda, Maryland, United States
Hybrid / WFH Options
Leidos
review and analysis of cybersecurity event logs Conduct and review technical cybersecurity assessments Coordinate with security personnel and recommend mitigation strategies Identify points of vulnerability and non-compliance with established cybersecurity standards and regulations Collaborate with our DevOpsSec team to help with analyzing scan results and remediation of findings … corresponding processes that can be used for system security testing, internal audits, incident response, and diagnosis of security-related system issues Perform and maintain vulnerability scans using Assured Compliance Assessment Solution (ACAS) and create reports Track and report Information Assurance Vulnerability Management (IAVM) compliance using Assured Compliance … and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content Perform system installation, configuration maintenance, account maintenance, signature maintenance, patch management, and troubleshooting of operational IA and CND systems Apply system security engineering expertise in one or more of the following to : system security design More ❯
Employment Type: Permanent
Salary: USD 189,175 Annual
Posted:

Senior AWS Security Engineer- Remote with Security Clearance

Reston, Virginia, United States
Hybrid / WFH Options
ICF
M for our customers. We are seeking a Senior Security Engineer to support our Federal customer's CIO Cyber Security organization and manage all vulnerability remediation activities, including Binding Operational Directive (BOD) compliance. Responsibilities: Perform Security Impact Analyses on application releases and provide recommendations to federal leadership Perform software … vulnerability scans, interpret the results, and provide vulnerability mitigation recommendations Support and develop analyses of alternatives and decisions on courses of action by providing security insights to project teams and federal leadership Review and provide recommendations on requests for AWS policy changes Work with development teams and other … updates to secure coding standards documentation and the ongoing assessment of the customer organization against the NIST Cyber Security Framework Support Information Security Center vulnerability management groups by performing asset inventory, secure configurations and continuous monitoring, tracking and reporting and vulnerability service catalog. Support Vulnerability Management More ❯
Employment Type: Permanent
Salary: USD 166,810 Annual
Posted:

Head of Vulnerability and Threat Intelligence

London Area, United Kingdom
Hybrid / WFH Options
Merlin Entertainments
Head of Vulnerability and Threat Intelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in … our attractions. The Head of Vulnerability and Threat Intelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with More ❯
Posted:

Head of Vulnerability and Threat Intelligence

london, south east england, united kingdom
Hybrid / WFH Options
Merlin Entertainments
Head of Vulnerability and Threat Intelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in … our attractions. The Head of Vulnerability and Threat Intelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with More ❯
Posted:

End user Security Engineer (Vulnerabilities), Intune, Hybrid

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
Sanderson Recruitment
project to ensure the efficient operation of end user devices, including Laptops, phones, handheld devices etc. The primary responsibility with the role will be vulnerability Management, including conducting regular assessments, implementing security measures and liaising with various depts. The successful candidate will implement and manage software patches promptly … and configure MS Teams, Intune and Endpoint Config Manager accordingly. Skills required: - Relevant experience in vulnerability management and endpoint security Strong knowledge of MS Teams, Intune and Endpoint Configuration manager Familiar with identity and access management principles Responsibilities: Respond to incidents related to EUC reported through the … Implement and manage software patches for end user computing devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with More ❯
Employment Type: Contract
Rate: £250 - £310 per day
Posted:

Senior Information Security Analyst, UK

London, United Kingdom
Hybrid / WFH Options
Realty Income Corporation
logging is being collected and analyzed and relevant security alerts are being generated. Automate processes to reduce manual task delivery and enhance process delivery. Vulnerability Management Collaborate with IT and development teams to detect and remediate vulnerabilities across the enterprise in alignment with defined SLAs. Understand current and … . Knowledge of security frameworks and regulatory compliance standards (NIST CSF, SOX ITGC, GDPR, MITRE ATT&CK, etc.) Experience with common industry SIEM and vulnerability management platforms. Experience maintaining the Microsoft Defender platform and other Microsoft security products. Ability to rank and prioritize vulnerabilities and security recommendations appropriately … within the context of the infrastructure and business processes. Experience maintaining identity and access management systems including PAM technology and other authentication and authorization control platforms. Experience with Incident Response best practices. Knowledge of cloud security best practices related to AWS and Azure cloud services. Knowledge of DevOps practices More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Chief Information Security Officer Leeds · (Hiring Immediately)

Leeds, UK
Hybrid / WFH Options
Radar Healthcare
and ensuring everyone understands their role in protecting our organisation. Leading from the front, you will champion a security conscious culture of proactive risk management and practical compliance to deliver meaningful and sustainable security improvements aligned to our strategic ambitions. What you’ll be doing to make a difference … everyday processes. Oversee the security posture of cloud environments, ensuring secure configurations, proactive threat monitoring, and resilience planning. Establish and maintain a robust risk management framework, proactively identifying, assessing, and mitigating cybersecurity risks in alignment with business goals. Define standards for operational security including vulnerability management, incident … . Demonstrated experience conducting security due diligence and managing integrations in acquisitions. A proven track record of building and embedding security awareness and risk management frameworks across business and technical teams. Strong operational experience, including establishing and managing incident response, vulnerability management, and security monitoring programs. Ability More ❯
Employment Type: Full-time
Posted:

Chief Information Security Officer Leeds

Leeds, Yorkshire, United Kingdom
Hybrid / WFH Options
Radar Healthcare
and ensuring everyone understands their role in protecting our organisation. Leading from the front, you will champion a security conscious culture of proactive risk management and practical compliance to deliver meaningful and sustainable security improvements aligned to our strategic ambitions. What you'll be doing to make a difference … everyday processes. Oversee the security posture of cloud environments, ensuring secure configurations, proactive threat monitoring, and resilience planning. Establish and maintain a robust risk management framework, proactively identifying, assessing, and mitigating cybersecurity risks in alignment with business goals. Define standards for operational security including vulnerability management, incident … . Demonstrated experience conducting security due diligence and managing integrations in acquisitions. A proven track record of building and embedding security awareness and risk management frameworks across business and technical teams. Strong operational experience, including establishing and managing incident response, vulnerability management, and security monitoring programs. Ability More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Manager Cyber Transformation Management

Belfast, United Kingdom
Hybrid / WFH Options
Deloitte LLP
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerability management, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. Experience More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Manager Cyber Transformation Management

London, United Kingdom
Hybrid / WFH Options
Deloitte LLP
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerability management, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. Experience More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Vulnerability Management
Work from Home
10th Percentile
£42,500
25th Percentile
£52,500
Median
£60,000
75th Percentile
£85,000
90th Percentile
£93,250