Required: Tenable Nessus Engineers IR35 Status: Inside Duration: 12 month initial contract Location: 1-2 days onsite in either Central London or Knutsford Role 1 As an experienced Vulnerability Assessment Engineer responsible for maintaining the Vulnerability Assessment toolsets and products. Primary Responsibilities The ability to review requirements, undertake product design followed by Implementation/deployment/support of … Vulnerability Assessment tools suite (e.g Tenable, Rapid7, Qualys etc) and peripherals with Engineering. Maintains local and network credentials and provisions access to vulnerabilityscanning systems. Responsible for integration of Vulnerability assessment tooling with other security and IT systems management tools (i.e. Splunk, ServiceNow) Responsible for developing and maintaining standard processes and operating procedures, creating technical architecture … diagrams and system build documentation. Responsible for operating the scanning tools and maintaining coverage along with supporting the vulnerability management and remediation teams in understating how to remediate vulnerabilities (i.e. laptops, VMs, wireless devices) Works with vulnerability management team to build asset repositories and asset scan policies Work closely with customer delivery managers to prioritize daily tasks More ❯
various components. While having experience with implementing the Tenable solution key, this job also requires full-time hands-on administration of the Tenable system as well as managing the vulnerability management aspect of the tool. Installing and Configuring Nessus, Nessus Manager, Nessus Agents, Log Correlation Engine, Nessus Network Monitor, and Security Center on both Linux/Unix and Windows … Responsible for the Analysis and validation of the scan results. Responsible the Monitoring the dashboards. Responsible for defining and configuring dashboards Technical Skills & Competencies: 5+ years of experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues Experience in the design and implementation of enterprise-wide security controls … to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. Demonstrated understanding of TCP/IP networking concepts and DNS. 3+ years of related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with one or More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Lorien
architecture across diverse technologies and platforms. Deep understanding of cloud architecture principles, ideally within Microsoft Azure. Familiarity of working across the SDLC and secure software development practices. Experience with vulnerabilityscanning, remediation strategies, and CI/CD pipelines is a plus. Analytical and detail-oriented, with the ability to work independently and manage sensitive information. Strong communication skills More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Lorien
architecture across diverse technologies and platforms. Deep understanding of cloud architecture principles, ideally within Microsoft Azure. Familiarity of working across the SDLC and secure software development practices. Experience with vulnerabilityscanning, remediation strategies, and CI/CD pipelines is a plus. Analytical and detail-oriented, with the ability to work independently and manage sensitive information. Strong communication skills More ❯
on AWS Cloud migration projects Experience with any or all of: Terragrunt & ArgoCD Experience supporting the build, deployment production support of Java applications Solid understanding of common security principles Vulnerabilityscanning & reporting experience Able to demonstrate they have worked in regulated environments (eg, finance, government) Demonstrable experience of identifying manual processes suitable for automation Carbon60, Lorien & SRG - The More ❯
or 4.18) Advanced Kubernetes knowledge, especially within enterprise OpenShift environments Proven experience migrating applications, infrastructure components, and operators Familiar with OpenShift core operators: HashiCorp Vault Red Hat Quay Clair (vulnerabilityscanning) Keycloak (IAM) Istio (Service Mesh) Able to support validation, configuration checks, post-migration testing, and documentation Additional Technical Skills Infrastructure as Code: Ansible and/or Terraform More ❯
infrastructure design, development, and review, with a specific focus on security. Proven track record of designing and documenting security solutions. Knowledge and experience with the design and implementation of vulnerabilityscanning solutions. Adaptive ability to consider new innovations and technologies within compressed timeframes. Strong presentation skills to robustly defend security designs to both peer and leadership positions. Benefits More ❯