asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability … active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process … vulnerability data to provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerabilityremediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks More ❯
Position: IT Security & Vulnerability Management Engineer Industry: Investment Banking (Global Financial) Day rate contract position: 654/day (inside IR35) Initial contract length of 6 months Location: Central London Hybrid working: 3 days at their London office Do you have experience leading vulnerability management in large-scale, banking … life cycle of security assessments, threat identification, and mitigation Experience in security assessments, particularly within complex enterprise environments Security risk oversight, applying technical security vulnerabilityremediation practices Identification, prioritization, remediation and reporting of security risks. Knowledge of vulnerabilityremediation practices Monitoring and capacity planning of More ❯
london, south east england, united kingdom Hybrid / WFH Options
Hawksworth
Position: IT Security & Vulnerability Management Engineer Industry: Investment Banking (Global Financial) Day rate contract position: 654/day (inside IR35) Initial contract length of 6 months Location: Central London Hybrid working: 3 days at their London office Do you have experience leading vulnerability management in large-scale, banking … life cycle of security assessments, threat identification, and mitigation Experience in security assessments, particularly within complex enterprise environments Security risk oversight, applying technical security vulnerabilityremediation practices Identification, prioritization, remediation and reporting of security risks. Knowledge of vulnerabilityremediation practices Monitoring and capacity planning of More ❯
You will need to login before you can apply for a job. Security Support Engineer, Vulnerability Management and Remediation Operations DESCRIPTION Embark on a Mission to Fortify Amazon's Defenses as a Support Engineer with the Vulnerability Management & Remediation Operations team! Amazon Security is seeking an … experienced and innovative Support Engineer specialising in cybersecurity to join our Vulnerability Management and Remediation Operations (VMRO) team in London, UK. The VMRO team is a global team that is responsible for assessing, detecting, and driving the remediation of vulnerabilities across the Amazon ecosystem. Key job responsibilities … Support vulnerability detection campaigns by working closely with Campaign Owners to launch and continuously improve the quality of campaigns across Amazon. - Assess and negotiate with customers to drive down security risk by engaging with teams to remediate critical security vulnerabilities in their environments. - Collaborate with builder teams to implement More ❯
implementing security infrastructure including SIEM, WAFs, Firewalls and EDR/AV Working with engineering teams to ensure best practices including secure development, security testing, vulnerabilityremediation and supply chain security Working with DevOps on our Cloud Security Posture, ensure appropriate IAM structures are in place, and review, triage … and remediate (or coordinate remediation of) cloud infrastructure threats and findings Work closely with on Governance, Risk and Compliance to maintain certifications (e.g. ISO 27001), and identify opportunities for automation - improving efficiency and coverage. You may be right for this role if you: Have hands-on experience in one More ❯
and ensuring compliance with data protection laws (e.g., GDPR). Establish, implement, and maintain security policies, standards, and operational controls; support audits, incident response, vulnerabilityremediation, and ensure effective use of security tooling (e.g., Sentinel, Defender for Cloud, SIEM). Work closely with Operational Risk, DevOps, and Information More ❯
tools like SIEM and Sophos MTR and Splunk. Maintain system security by configuring firewalls, VPNs, and intrusion detection systems, and ensuring timely patching. Manage vulnerabilityremediation based on penetration test results and risk assessments. Conduct penetration tests. Investigate security incidents, conduct forensic analysis, and apply swift mitigation actions. More ❯
tools like SIEM and Sophos MTR and Splunk. Maintain system security by configuring firewalls, VPNs, and intrusion detection systems, and ensuring timely patching. Manage vulnerabilityremediation based on penetration test results and risk assessments. Conduct penetration tests. Investigate security incidents, conduct forensic analysis, and apply swift mitigation actions. More ❯
South West London, London, United Kingdom Hybrid / WFH Options
La Fosse
technologies, cloud computing advancements, industry best practices, and emerging security solutions. Continuously expand expertise in areas such as hybrid cloud environments, threat detection, and vulnerabilityremediation to improve organisational capabilities. Firewall and Compliance Management: Oversee firewall configurations, internal and cloud security policies, and compliance enforcement, including achieving annual … Cyber Essentials accreditation. Develop and implement corporate security policies to meet evolving organisational and regulatory requirements. Threat and Vulnerability Management: Monitor and mitigate threats using advanced detection and remediation strategies to maintain the security of infrastructure, data, and services. Infrastructure Stability and Development: Deliver and maintain a stable More ❯
tools like SIEM and Sophos MTR and Splunk. Maintain system security by configuring firewalls, VPNs, and intrusion detection systems, and ensuring timely patching. Manage vulnerabilityremediation based on penetration test results and risk assessments. Conduct penertration testing. Investigate security incidents, conduct forensic analysis, and apply swift mitigation actions. More ❯
tools like SIEM and Sophos MTR and Splunk. Maintain system security by configuring firewalls, VPNs, and intrusion detection systems, and ensuring timely patching. Manage vulnerabilityremediation based on penetration test results and risk assessments. Conduct penertration testing. Investigate security incidents, conduct forensic analysis, and apply swift mitigation actions. More ❯
and maintain monitoring alerts, dashboards, and metrics to ensure visibility into the messaging layer. Ensure compliance with security policies and participate in audits and vulnerability remediation. Maintain accurate documentation, including topology diagrams, runbooks, and configuration baselines. Required Skills & Qualifications: 3+ years of experience administering Solace PubSub+ messaging systems. Strong More ❯
programming in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language Information security professional certification Knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits or equivalent Experience applying threat modeling or other risk identification techniques or equivalent Experience implementing More ❯
programming in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object-oriented language Information security professional certification Knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits or equivalent Experience applying threat modeling or other risk identification techniques or equivalent Experience implementing More ❯
include: Security Analysis and Improvement: Continuously analyse our security systems for potential improvements, ensuring that our defences remain at the forefront of cybersecurity practices. Vulnerability Management: Proactively identify, assess, and remediate security vulnerabilities to maintain the integrity and confidentiality of our customer data. Security Automation: Automate security processes and More ❯
network security and protocols like TCP/IP. Experience with technical concepts such as tunneling traffic and IP configuration. Experience delivering penetration tests and vulnerability assessments for networks, applications, and cloud services. Excellent communication skills, both verbal and written, with the ability to present to clients. Ability to manage More ❯
security policies, architecture, technical standards, controls, solutions, guidelines, procedures, and other elements necessary to maintain security posture. Responsible for assessing information risk and facilitating remediation of vulnerabilities and risks across the organization. Accountable for coordinating security measures to protect our computer infrastructure and information systems, ensuring an acceptable risk … cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, data leakage prevention, patching, encryption, vulnerability scanning, and configuration of security tools. Prior experience in an international enterprise environment is essential. Responsibilities Collaborate with IT teams to design and implement … Develop, test, and implement disaster recovery procedures. Manage cybersecurity projects to ensure timely delivery within budget. Perform or coordinate security assessments, penetration tests, and vulnerability scans. Ensure compliance with frameworks like COBIT, NIST, ISO, PCI, GDPR, HIPAA, etc. Provide internal support for security issues within SLAs. Evaluate and implement More ❯
PowerCLI and Infrastructure as Code (IaC) tools such as Packer, Terraform, and Ansible Secure the virtual environment by implementing best practices, including patch management, vulnerabilityremediation, and access control Develop and implement disaster recovery and business continuity plans using tools such as Zerto and VMware Live Recovery What More ❯
Security isn't just about locking things down-it's about enabling innovation without compromise. If you're fluent in Terraform, experienced in vulnerability management, and thrive in mobile and cloud security, this contract role offers the chance to make an immediate impact on a fast-growing global platform. More ❯
etc. Collaborate with development teams to integrate security best practices into the secure software development lifecycle (SDLC) and ensure products are built securely Oversee vulnerability management and remediation efforts, including leading responses to pen test findings and security assessments Experience conducting risk assessments and threat modelling for software More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Barbara Houghton
and systems. Plan for and execute the local Disaster Recovery drills and/or contingency process. Monitor and manage the IT system vulnerabilities, take remediation actions to solve the relevant risks. Provide support and validation for IT/system changes, Disaster Recovery drills and/or contingency process. Skills More ❯
and systems. • Plan for and execute the local Disaster Recovery drills and/or contingency process. • Monitor and manage the IT system vulnerabilities, take remediation actions to solve the relevant risks. • Provide support and validation for IT/system changes, Disaster Recovery drills and/or contingency process. Skills More ❯
london, south east england, united kingdom Hybrid / WFH Options
Barbara Houghton Associates Limited
and systems. • Plan for and execute the local Disaster Recovery drills and/or contingency process. • Monitor and manage the IT system vulnerabilities, take remediation actions to solve the relevant risks. • Provide support and validation for IT/system changes, Disaster Recovery drills and/or contingency process. Skills More ❯
Plan for and execute the Branch s local Disaster Recovery drills and/or contingency process. Monitor and manage the IT system vulnerabilities, take remediation actions to solve the relevant risks. Provide support and validation for HO s IT/system changes, Disaster Recovery drills and/or contingency More ❯
Plan for and execute the Branch’s local Disaster Recovery drills and/or contingency process. Monitor and manage the IT system vulnerabilities, take remediation actions to solve the relevant risks. Provide support and validation for HO’s IT/system changes, Disaster Recovery drills and/or contingency More ❯