big ideas into the products, content and services millions of people love. And we do it all right here at Sky. A Senior Technical Vulnerability Analyst is responsible for identifying, evaluating, and assisting in fixing security vulnerabilities and misconfigurations in a system or network. You will have a strong … understanding of vulnerability management processes and tools for performing assessments and remediation activities. You will also work closely with business and technology stakeholders and product owners in other IT and security teams to ensure that systems are secure and compliant with relevant regulations and standards. What you'll do … remediation of identified vulnerabilities and misconfigurations across various platforms and environments. Develop and implement effective remediation strategies and solutions. Work as part of a vulnerabilityscanning team to identify, prioritise and address high-risk vulnerabilities and misconfigurations Collaborate extensively with IT operations, development teams, and security architects to More ❯
a broad knowledge of Cyber security technologies and have excellent skills in network security, monitoring and incident response. Exposure to EDR technologies, IPS and Vulnerability Management tools would be beneficial. A good understanding of legislation and security frameworks such as the Network and Information Systems Regulations, ISO 27001 and … a Cyber Security incident. As a member of the ICT team at Hywel Dda you will work with the Cyber Security team to undertake vulnerabilityscanning, the monitoring of Cyber Security Systems utilising SIEM technologies and work with third parties to review compliance with best practice. You will … Security. Evidence of Cyber Security or other relevant work outside formal training or employment (voluntary, research, academia, social media etc.) Working with SIEM and Vulnerabilityscanning solutions. Development of training packages. Desirable Experience of ICT service provision in a health care setting Experience of working in fields other More ❯
tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as key management, vulnerabilityscanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the continuous integration … In-depth knowledge of DevSecOps tools such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerabilityscanning, encryption, authentication, and secrets management (Vault, Key Management Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat More ❯
detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerabilityscanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Perform or coordinate internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA … organization. Participates in change management meetings and provides expert input to ensure security is maintained. Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering. Ability to manage and continuously improve upon vulnerability management program. Ability More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
Reston, Virginia, United States Hybrid / WFH Options
ICF
M for our customers. We are seeking a Senior Security Engineer to support our Federal customer's CIO Cyber Security organization and manage all vulnerability remediation activities, including Binding Operational Directive (BOD) compliance. Responsibilities: Perform Security Impact Analyses on application releases and provide recommendations to federal leadership Perform software … vulnerability scans, interpret the results, and provide vulnerability mitigation recommendations Support and develop analyses of alternatives and decisions on courses of action by providing security insights to project teams and federal leadership Review and provide recommendations on requests for AWS policy changes Work with development teams and other … updates to secure coding standards documentation and the ongoing assessment of the customer organization against the NIST Cyber Security Framework Support Information Security Center vulnerability management groups by performing asset inventory, secure configurations and continuous monitoring, tracking and reporting and vulnerability service catalog. Support Vulnerability Management activities More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
Technical Expertise: Provide guidance on secure architecture, secrets management, and best practices. Threat Management: Lead all aspects of penetration testing, bug bounty programs, and vulnerability reporting to mitigate risks and align with regulations. Vendor Relationships: Manage partnerships with security vendors, ensuring value and support. Cyber Governance Compliance and Risk … senior cyber security role, ideally within a complex, global organisation. Deep expertise in one or more of the following areas: security consultancy, security engineering, vulnerability management or governance. Deep knowledge of modern DevSecOps practices. Experience in leading vulnerability management programs, including expertise in utilising tools and processes for … vulnerabilityscanning, conducting penetration testing, and delivering actionable reporting to support an effective and comprehensive vulnerability management strategy. Excellent communication and stakeholder management skills, with the ability to convey complex technical issues to non-technical audiences. Hands-on experience collaborating with engineering and development teams to integrate More ❯
Technical Expertise: Provide guidance on secure architecture, secrets management, and best practices. Threat Management: Lead all aspects of penetration testing, bug bounty programs, and vulnerability reporting to mitigate risks and align with regulations. Vendor Relationships: Manage partnerships with security vendors, ensuring value and support. Cyber Governance Compliance and Risk … senior cyber security role, ideally within a complex, global organisation. Deep expertise in one or more of the following areas: security consultancy, security engineering, vulnerability management or governance. Deep knowledge of modern DevSecOps practices. Experience in leading vulnerability management programs, including expertise in utilising tools and processes for … vulnerabilityscanning, conducting penetration testing, and delivering actionable reporting to support an effective and comprehensive vulnerability management strategy. Excellent communication and stakeholder management skills, with the ability to convey complex technical issues to non-technical audiences. Hands-on experience collaborating with engineering and development teams to integrate More ❯
incident reports. Project Delivery Take part in the team's project delivery initiative, rotating between the following roles on a 1-3 monthly schedule: Vulnerability Management - maintain regular scans, interpret results, identify asset owners, track remediation activities and report on the agreed SLAs. Security Controls Administration - maintain availability and … and standard use cases of technical security products, such as firewalls, anti-virus, web proxies, SIEM, IDS/IPS, DLP, and EDR. Familiarity with vulnerabilityscanning and penetration testing tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but not required): Cyber More ❯
Chicago, Illinois, United States Hybrid / WFH Options
LaSalle Network
and cloud service providers Practical experience in cloud technologies, preferably Azure Proficiency in security tools and products, including firewalls, IDS/IPS, SIEM, and vulnerabilityscanning Proficiency in programming languages commonly used in security, such as Python and Powershell Experience with security standards for cloud applications including in More ❯
security incidents. Conduct root cause analysis of breaches following documented procedures. Support security incident handling and coordination at Level 1/2. Participate in vulnerabilityscanning and threat-hunting activities. Assist in the configuration and maintenance of security tools such as SIEM, EDR, and MDR solutions (e.g. Microsoft More ❯
Falls Church, Virginia, United States Hybrid / WFH Options
Epsilon Inc
overall pipeline optimization. In this position you will: Implement and maintain security policies, standards, and procedures to protect organizational assets and data. Conduct regular vulnerability assessments and penetration tests to identify and remediate security weaknesses. Monitor and analyze security alerts and reports using SIEM tools to proactively detect threats … II Certification may be required (GSEC, GICSP, CND, CySA+, Security+ CE, SSCP or CCNA-Security). Proficiency with SIEM platforms (e.g., Splunk, QRadar) and vulnerabilityscanning tools (e.g., Nessus). Practical knowledge of security frameworks such as NIST, ISO 27001, and SOC 2. Hands-on experience with common More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Aeyon
and responsibilities Cybersecurity and Risk Management: • Lead the development and maintenance of cybersecurity documentation, including Plans of Action and Milestones (POA&M), Information Assurance Vulnerability Management (IAVM) plans, and other security-related artifacts. • Coordinate and plan Information Assurance (IA) efforts for the deployment and sustainment of Information Systems (IS … ELK stack or Splunk. • Proficiency in Git and experience with version control practices in a team environment. • Knowledge of container security best practices, including vulnerabilityscanning and network policies. • Excellent written and verbal communication skills. • Active TS/SCI with CI Poly Required Desired qualifications/non-essential More ❯
including malware infections, data breaches, and unauthorized access attempts Develop and maintain security incident response plans and procedures Conduct security assessments, penetration tests, and vulnerabilityscanning Collaborate with IT and engineering teams to implement security improvements and remediation measures Stay up-to-date with the latest cybersecurity trends More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Duel
Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerabilityscanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development process. Assist in … security compliance frameworks such as ISO 27001 or SOC 2, even if not previously responsible for certification processes. Experience working within security risk management, vulnerability tracking, or operational security efforts. Prior experience working with engineering teams on security topics is beneficial, particularly around secure development practices. Ability to clearly … or Vanta. Experience working with pen testing and bug bounties a plus. Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerability management solutions. Experience or knowledge of cloud security (AWS, GCP, or Azure). Awareness of security best practices in application and infrastructure security. Some More ❯
security policies and procedures for all IT systems and devices, taking into account diverse regional regulations and network conditions. Conduct regular security audits and vulnerability assessments, with a focus on remote access and endpoint security. Device Management & MDM (Worldwide Deployment): Manage device procurement, distribution, and lifecycle for a geographically … authentication (MFA). Implement zero trust secure access from any location. Security Tooling & Integration: Evaluate, select, and onboard security solutions (e.g., endpoint protection, SIEM, vulnerability scanners). Integrate security tools with existing systems and workflows, ensuring effective threat detection and response. Automation & Scripting: Develop and maintain scripts and automation … tools to streamline IT operations and enhance security. Automate security tasks, such as patch management, vulnerabilityscanning or secure configuration enforcement. Vendor Management: Manage relationships with IT and security vendors and service providers. Evaluate vendor security practices and ensure compliance with company policies. Incident Response: Participate in security More ❯
to implement security controls across infrastructure (e.g., access control, encryption, logging). Lead the incident response process and manage third-party pen testing and vulnerability management. Customer & Vendor Security: Support security questionnaires, RFPs, and due diligence for customer deals. Review third-party vendors and tools for security posture and … and SSO. Clear understanding of data privacy laws (especially GDPR). Familiarity with security tools (e.g., endpoint protection, SSO/IAM, monitoring/logging, vulnerabilityscanning). Experience with risk assessments, incident response planning, and writing security policies. Strong communication skills, with the ability to explain security concepts More ❯
and ensuring our defences provide and effective response. Key responsibilities: Reviewing and assessing Security Operations Centre alerts to ensure an appropriate response taken. Overseeing vulnerabilityscanning to confirm the effectiveness of patching Monitoring systems for compliance with policy and supporting remediation where required. Track and manage penetration testing More ❯
security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusion detection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
SOC team to enhance Sentinel SIEM, runbooks, and threat detection. Lead investigations into security incidents and conduct proactive threat hunting. Manage endpoint security, patching, vulnerabilityscanning, and system hardening. Support audits and compliance with Cyber Essentials Plus , ISO 27001 , and other frameworks. Partner with DevOps, InfoSec, and platform … Participate in a 1-in-6 on-call rota after completing probation. Key Requirements: Hands-on knowledge of SIEM platforms (preferably Sentinel), EDR, and vulnerability management. Familiarity with frameworks like Cyber Essentials Plus and ISO 27001. Experience in securing hybrid cloud environments (Microsoft Azure desirable). Experience in DevOps More ❯
real-world operations. You’ll be responsible for overseeing the delivery and integration of key security services — including penetration testing, threat modelling, logging, and vulnerabilityscanning — into enterprise platforms and workflows. You’ll work cross-functionally to align technical services with business and risk priorities, helping to unblock … least 3 years of experience in a similar service delivery or cyber consultancy role Deep understanding of enterprise security services: Pen testing, threat modelling, vulnerability management, logging & monitoring, incident response Strong communication and stakeholder engagement skills Excellent documentation and governance capability CISM or CISSP certification Degree in Computer Science More ❯
Quincy, Massachusetts, United States Hybrid / WFH Options
Hire Elevation Resources
improve audit and security procedures and maintain up-to-date documentation. Respond to security incidents and conduct forensic analysis when needed. Oversee and maintain vulnerabilityscanning tools, scheduling scans, and coordinating remediation. Generate and maintain routine and ad hoc reports. Provide backup support for the Security Lead and More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
BAE Systems (New)
and affected business units. Maintain compliance with frameworks such as Secure by Design, NIST-800-53, STRAP. Security Testing - Scope and oversee penetration testing, vulnerabilityscanning, and other security validation activities to ensure effectiveness of security controls. Design and Architecture Review - Assess the Information Security of IT architecture More ❯