Proven capability in creating and executing comprehensive threat and vulnerability management programmes, including vulnerability scanning, penetration testing, and security awareness training. Proficiency in using vulnerability scanning tools (e.g. Tenable, Qualys, Rapid7, Veracode, JFrog Xray), threat intelligence platforms, and incident response tools. Prior experience implementing automated solutions for vulnerability scanning, threat detection, and incident response, with a focus on continuous process More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
in data analysis, ideally within cybersecurity, risk or IT operations, with experience in: Using data tools such as PowerBI, SQL and ServiceNow Reporting Working with vulnerability management tools (e.g. Qualys, Tenable, Rapid7) Understanding vulnerability management processes and security frameworks Automating data collection and reporting using Python or PowerShell Developing and monitoring KPIs and KRIs Communicating complex technical data to non More ❯
their contractual needs in respect to SLA’s, JPI’s are being met and attend regular service reviews.Raise any Requests For Change for any SaaS supplier changes to production.Review Qualys reports and work closely with our support partner to ensure that all vulnerabilities are addressed via regular patching.Ensuring that all Knowledge Articles are reviewed on at least an annual basis More ❯