or financial services sector to come in and drive forward a new Cyber Security project through to delivery. This role will be focusing on VulnerabilityManagement & Assessment, and Remediation Processes within the project and you will be responsible for the end-to-end delivery ensuring its success. The … a waterfall and Agile perspective and requires the candidate to be experienced in not only Cyber security but focusing on Secure builds and Configuration Management & Vulnerability Management. The ideal candidate will need to be a self-starter and has strong experience working in Agile environments and is a … seasoned project manager who has strong Cyber Security, Configuration Management & VulnerabilityManagement experience. You will need to come from either financial services or ideally insurance, along with being comfortable working with stakeholders, CISO and Programme Manager. You must also be familiar with vulnerabilitymanagement tools More ❯
Smyrna, Georgia, United States Hybrid / WFH Options
Crest Security Assurance
VulnerabilityManagement Analyst Provide support to increase the Cybersecurity Center's ability to manage the cybersecurity risk to systems, assets, data, and agency capabilities through active identification of system/application weaknesses that require remediation and/or mitigation, enabling DoD to focus and prioritize its risk and … vulnerabilitymanagement efforts in alignment with the needs of the Agency. Work shall be performed in accordance with Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01, NIST SP 800-40, DoDI 8530.01, CJCSM 6510.02, TASKORD 20-020, FRAGO 21 to OPORD 05-01CJCSI 6510.01F, CJCSM … released directives/mandates. Responsibilities: • Ensure routine action is taken to identify and correct vulnerabilities according to the following phases. Vulnerabilities include Information Assurance VulnerabilityManagement (IAVM) as well as vulnerabilities not be addressed through IAVM directives but affect DoD owned and managed information systems (ISs) and devices More ❯
Cyber VulnerabilityManagement Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber VulnerabilityManagement Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/ More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber VulnerabilityManagement Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber VulnerabilityManagement Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/ More ❯
Responsibilities Secure Development: Collaborate with engineering and IT teams to embed security into systems and applications. Technical Expertise: Provide guidance on secure architecture, secrets management, and best practices. Threat Management: Lead all aspects of penetration testing, bug bounty programs, and vulnerability reporting to mitigate risks and align … senior cyber security role, ideally within a complex, global organisation. Deep expertise in one or more of the following areas: security consultancy, security engineering, vulnerabilitymanagement or governance. Deep knowledge of modern DevSecOps practices. Experience in leading vulnerabilitymanagement programs, including expertise in utilising tools and … processes for vulnerability scanning, conducting penetration testing, and delivering actionable reporting to support an effective and comprehensive vulnerabilitymanagement strategy. Excellent communication and stakeholder management skills, with the ability to convey complex technical issues to non-technical audiences. Hands-on experience collaborating with engineering and development More ❯
Responsibilities Secure Development: Collaborate with engineering and IT teams to embed security into systems and applications. Technical Expertise: Provide guidance on secure architecture, secrets management, and best practices. Threat Management: Lead all aspects of penetration testing, bug bounty programs, and vulnerability reporting to mitigate risks and align … senior cyber security role, ideally within a complex, global organisation. Deep expertise in one or more of the following areas: security consultancy, security engineering, vulnerabilitymanagement or governance. Deep knowledge of modern DevSecOps practices. Experience in leading vulnerabilitymanagement programs, including expertise in utilising tools and … processes for vulnerability scanning, conducting penetration testing, and delivering actionable reporting to support an effective and comprehensive vulnerabilitymanagement strategy. Excellent communication and stakeholder management skills, with the ability to convey complex technical issues to non-technical audiences. Hands-on experience collaborating with engineering and development More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber VulnerabilityManagement Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber VulnerabilityManagement Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/ More ❯
Southampton, Hampshire, South East, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
TDA VulnerabilityManagement (7-month assignment) Hybrid work with time onsite in Southmampton Technical architect needed with network experience (Cisco).Experience of VulnerabilityManagement solutions such as Tenable or Qualys is ideal. Knowledge of network security solutions. ITIL and Service Management If it could be More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
TDA VulnerabilityManagement (7-month assignment) Hybrid work with time onsite in Southmampton Technical architect needed with network experience (Cisco).Experience of VulnerabilityManagement solutions such as Tenable or Qualys is ideal. Knowledge of network security solutions. ITIL and Service Management If it could be More ❯
Herndon, Virginia, United States Hybrid / WFH Options
Optiv+ClearShark
in the development of procedures and runbooks; act as the subject matter expert in a variety of cybersecurity domains such as Identity and Access Management, VulnerabilityManagement, Endpoint Protection, Incident Response activities, etc.; and will provide tier two production support for responsible solutions. How you'll make … evaluate the impact of new vulnerabilities, security alerts and threat intelligence bulletins. Participate in threat hunting and incident response events. Lead third-party risk management tasks such as conducting risk assessments for vendors and services. Build and maintain relationships with key customer's technical staff members and with internal … stakeholders from IT, customer service and field operations. Share experience, knowledge, and ideas with management and co-workers to maintain a kind and respectful team-based environment. Promote a corporate culture that is committed to information security best practices. Participate in after-hours support, as needed, to respond to More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Hybrid (3 days in office ) About the Role We are seeking a highly skilled SOC Lead to oversee cyber incident response, threat intelligence, and vulnerabilitymanagement for a leading organization. This role will act as a trusted advisor to senior leadership, ensuring a structured and effective response to … cyber incidents while driving improvements in incident management processes. Key Responsibilities Lead and coordinate responses to significant cyber incidents, ensuring effective and timely resolution. Act as a subject matter expert, advising senior leadership on business impacts and risk mitigation strategies. Develop and implement cyber incident containment plans and remediation … reporting, and documentation to drive continuous improvement. Collaborate with Threat Intelligence and Incident Response teams to monitor and respond to emerging threats. Ensure effective vulnerabilitymanagement, prioritizing risks and coordinating remediation efforts. Provide regular technical and management reports demonstrating the effectiveness of security operations. Develop and maintain More ❯
and experience with MS Sentinel, Cisco Meraki, MS Defender, Endpoint protection Knowledge and experience with SIEM, IDS/IPS, firewalls, endpoint protection systems, and vulnerabilitymanagement Knowledge and experience analysing and interpreting security logs, event data, and alerts to identify potential threats Knowledge and experience of network protocols … traffic analysis, and cyber-attack methodologies Knowledge and experience of threat intelligence, risk management, vulnerabilitymanagement, and penetration testing Please note sponsorship is not available for this position, and you must be able to obtain a Security Clearance. Your new employer is looking for candidates who want More ❯
native applications, microservices, and infrastructure components. Manage internal and external penetration testing engagements for Funding Circle applications, services, and cloud infrastructure. Oversee and enhance vulnerabilitymanagement processes, focusing on strategic remediation, root cause analysis, and preventative measures. Contribute to drive implementation of security automation across cloud infrastructure configuration … vulnerabilitymanagement, and compliance monitoring. Design, implement, and support the adoption of robust security architectures, controls, and best practices within our AWS cloud environment. Act as a subject matter expert on cloud security (AWS), DevSecOps, and application security, providing guidance and mentorship to other engineers. Contribute to the … securing, and managing a wide range of AWS security services. Proven, hands-on experience architecting, building, and integrating security tooling (SAST, DAST, SCA, secrets management, IAST) and automated security controls within CI/CD pipelines (e.g., GitLab CI, Jenkins, GitHub Actions). Strong track record of defining, implementing, measuring More ❯
native applications, microservices, and infrastructure components. Manage internal and external penetration testing engagements for Funding Circle applications, services, and cloud infrastructure. Oversee and enhance vulnerabilitymanagement processes, focusing on strategic remediation, root cause analysis, and preventative measures. Contribute to drive implementation of security automation across cloud infrastructure configuration … vulnerabilitymanagement, and compliance monitoring. Design, implement, and support the adoption of robust security architectures, controls, and best practices within our AWS cloud environment. Act as a subject matter expert on cloud security (AWS), DevSecOps, and application security, providing guidance and mentorship to other engineers. Contribute to the … securing, and managing a wide range of AWS security services. Proven, hands-on experience architecting, building, and integrating security tooling (SAST, DAST, SCA, secrets management, IAST) and automated security controls within CI/CD pipelines (e.g., GitLab CI, Jenkins, GitHub Actions). Strong track record of defining, implementing, measuring More ❯
Hollywood, Florida, United States Hybrid / WFH Options
Southern Glazer's Wine & Spirits
and external assessments and audits. The person in this position will need to have extensive knowledge of information security risk and third-party risk management, as well as IT systems architectural concepts and business processes. This position works closely with all IT areas including Infrastructure, Application Development, Database, Network … can work across multiple functions and disciplines Capable of developing and delivering effective presentations to at all levels within the organization Primary Responsibilities Risk Management & Remediation Act as an Information Security Risk Management subject matter expert Assist the Information Security Risk Manager and GRC Director in the development … risk and potential impact of new projects and architectural changes to IT and the organization. Participate heavily in the implementation of the ServiceNow Risk Management solution and its regular maintenance. Assist with periodic reporting and presentation on status for a variety of risk-related stakeholder requirements. Preferred Qualifications Master More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Leidos
review and analysis of cybersecurity event logs Conduct and review technical cybersecurity assessments Coordinate with security personnel and recommend mitigation strategies Identify points of vulnerability and non-compliance with established cybersecurity standards and regulations Collaborate with our DevOpsSec team to help with analyzing scan results and remediation of findings … corresponding processes that can be used for system security testing, internal audits, incident response, and diagnosis of security-related system issues Perform and maintain vulnerability scans using Assured Compliance Assessment Solution (ACAS) and create reports Track and report Information Assurance VulnerabilityManagement (IAVM) compliance using Assured Compliance … and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content Perform system installation, configuration maintenance, account maintenance, signature maintenance, patch management, and troubleshooting of operational IA and CND systems Apply system security engineering expertise in one or more of the following to : system security design More ❯
Reston, Virginia, United States Hybrid / WFH Options
ICF
M for our customers. We are seeking a Senior Security Engineer to support our Federal customer's CIO Cyber Security organization and manage all vulnerability remediation activities, including Binding Operational Directive (BOD) compliance. Responsibilities: Perform Security Impact Analyses on application releases and provide recommendations to federal leadership Perform software … vulnerability scans, interpret the results, and provide vulnerability mitigation recommendations Support and develop analyses of alternatives and decisions on courses of action by providing security insights to project teams and federal leadership Review and provide recommendations on requests for AWS policy changes Work with development teams and other … updates to secure coding standards documentation and the ongoing assessment of the customer organization against the NIST Cyber Security Framework Support Information Security Center vulnerabilitymanagement groups by performing asset inventory, secure configurations and continuous monitoring, tracking and reporting and vulnerability service catalog. Support VulnerabilityManagementMore ❯
Head of Vulnerability and Threat Intelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in … our attractions. The Head of Vulnerability and Threat Intelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerabilitymanagement programme, conducting … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement VulnerabilityManagement Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with More ❯
london, south east england, united kingdom Hybrid / WFH Options
Merlin Entertainments
Head of Vulnerability and Threat Intelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in … our attractions. The Head of Vulnerability and Threat Intelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerabilitymanagement programme, conducting … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement VulnerabilityManagement Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
project to ensure the efficient operation of end user devices, including Laptops, phones, handheld devices etc. The primary responsibility with the role will be vulnerabilityManagement, including conducting regular assessments, implementing security measures and liaising with various depts. The successful candidate will implement and manage software patches promptly … and configure MS Teams, Intune and Endpoint Config Manager accordingly. Skills required: - Relevant experience in vulnerabilitymanagement and endpoint security Strong knowledge of MS Teams, Intune and Endpoint Configuration manager Familiar with identity and access management principles Responsibilities: Respond to incidents related to EUC reported through the … Implement and manage software patches for end user computing devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with More ❯
logging is being collected and analyzed and relevant security alerts are being generated. Automate processes to reduce manual task delivery and enhance process delivery. VulnerabilityManagement Collaborate with IT and development teams to detect and remediate vulnerabilities across the enterprise in alignment with defined SLAs. Understand current and … . Knowledge of security frameworks and regulatory compliance standards (NIST CSF, SOX ITGC, GDPR, MITRE ATT&CK, etc.) Experience with common industry SIEM and vulnerabilitymanagement platforms. Experience maintaining the Microsoft Defender platform and other Microsoft security products. Ability to rank and prioritize vulnerabilities and security recommendations appropriately … within the context of the infrastructure and business processes. Experience maintaining identity and access management systems including PAM technology and other authentication and authorization control platforms. Experience with Incident Response best practices. Knowledge of cloud security best practices related to AWS and Azure cloud services. Knowledge of DevOps practices More ❯
and ensuring everyone understands their role in protecting our organisation. Leading from the front, you will champion a security conscious culture of proactive risk management and practical compliance to deliver meaningful and sustainable security improvements aligned to our strategic ambitions. What you’ll be doing to make a difference … everyday processes. Oversee the security posture of cloud environments, ensuring secure configurations, proactive threat monitoring, and resilience planning. Establish and maintain a robust risk management framework, proactively identifying, assessing, and mitigating cybersecurity risks in alignment with business goals. Define standards for operational security including vulnerabilitymanagement, incident … . Demonstrated experience conducting security due diligence and managing integrations in acquisitions. A proven track record of building and embedding security awareness and risk management frameworks across business and technical teams. Strong operational experience, including establishing and managing incident response, vulnerabilitymanagement, and security monitoring programs. Ability More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Radar Healthcare
and ensuring everyone understands their role in protecting our organisation. Leading from the front, you will champion a security conscious culture of proactive risk management and practical compliance to deliver meaningful and sustainable security improvements aligned to our strategic ambitions. What you'll be doing to make a difference … everyday processes. Oversee the security posture of cloud environments, ensuring secure configurations, proactive threat monitoring, and resilience planning. Establish and maintain a robust risk management framework, proactively identifying, assessing, and mitigating cybersecurity risks in alignment with business goals. Define standards for operational security including vulnerabilitymanagement, incident … . Demonstrated experience conducting security due diligence and managing integrations in acquisitions. A proven track record of building and embedding security awareness and risk management frameworks across business and technical teams. Strong operational experience, including establishing and managing incident response, vulnerabilitymanagement, and security monitoring programs. Ability More ❯
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. Experience More ❯
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. Experience More ❯