or financial services sector to come in and drive forward a new Cyber Security project through to delivery. This role will be focusing on VulnerabilityManagement & Assessment, and Remediation Processes within the project and you will be responsible for the end-to-end delivery ensuring its success. The … a waterfall and Agile perspective and requires the candidate to be experienced in not only Cyber security but focusing on Secure builds and Configuration Management & Vulnerability Management. The ideal candidate will need to be a self-starter and has strong experience working in Agile environments and is a … seasoned project manager who has strong Cyber Security, Configuration Management & VulnerabilityManagement experience. You will need to come from either financial services or ideally insurance, along with being comfortable working with stakeholders, CISO and Programme Manager. You must also be familiar with vulnerabilitymanagement tools More ❯
Smyrna, Georgia, United States Hybrid / WFH Options
Crest Security Assurance
VulnerabilityManagement Analyst Provide support to increase the Cybersecurity Center's ability to manage the cybersecurity risk to systems, assets, data, and agency capabilities through active identification of system/application weaknesses that require remediation and/or mitigation, enabling DoD to focus and prioritize its risk and … vulnerabilitymanagement efforts in alignment with the needs of the Agency. Work shall be performed in accordance with Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01, NIST SP 800-40, DoDI 8530.01, CJCSM 6510.02, TASKORD 20-020, FRAGO 21 to OPORD 05-01CJCSI 6510.01F, CJCSM … released directives/mandates. Responsibilities: • Ensure routine action is taken to identify and correct vulnerabilities according to the following phases. Vulnerabilities include Information Assurance VulnerabilityManagement (IAVM) as well as vulnerabilities not be addressed through IAVM directives but affect DoD owned and managed information systems (ISs) and devices More ❯
Cyber VulnerabilityManagement Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber VulnerabilityManagement Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/ More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber VulnerabilityManagement Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber VulnerabilityManagement Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/ More ❯
Responsibilities Secure Development: Collaborate with engineering and IT teams to embed security into systems and applications. Technical Expertise: Provide guidance on secure architecture, secrets management, and best practices. Threat Management: Lead all aspects of penetration testing, bug bounty programs, and vulnerability reporting to mitigate risks and align … senior cyber security role, ideally within a complex, global organisation. Deep expertise in one or more of the following areas: security consultancy, security engineering, vulnerabilitymanagement or governance. Deep knowledge of modern DevSecOps practices. Experience in leading vulnerabilitymanagement programs, including expertise in utilising tools and … processes for vulnerability scanning, conducting penetration testing, and delivering actionable reporting to support an effective and comprehensive vulnerabilitymanagement strategy. Excellent communication and stakeholder management skills, with the ability to convey complex technical issues to non-technical audiences. Hands-on experience collaborating with engineering and development More ❯
Cyber VulnerabilityManagement Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber VulnerabilityManagement Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/ More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber VulnerabilityManagement Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber VulnerabilityManagement Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/ More ❯
Herndon, Virginia, United States Hybrid / WFH Options
Optiv+ClearShark
in the development of procedures and runbooks; act as the subject matter expert in a variety of cybersecurity domains such as Identity and Access Management, VulnerabilityManagement, Endpoint Protection, Incident Response activities, etc.; and will provide tier two production support for responsible solutions. How you'll make … evaluate the impact of new vulnerabilities, security alerts and threat intelligence bulletins. Participate in threat hunting and incident response events. Lead third-party risk management tasks such as conducting risk assessments for vendors and services. Build and maintain relationships with key customer's technical staff members and with internal … stakeholders from IT, customer service and field operations. Share experience, knowledge, and ideas with management and co-workers to maintain a kind and respectful team-based environment. Promote a corporate culture that is committed to information security best practices. Participate in after-hours support, as needed, to respond to More ❯
and experience with MS Sentinel, Cisco Meraki, MS Defender, Endpoint protection Knowledge and experience with SIEM, IDS/IPS, firewalls, endpoint protection systems, and vulnerabilitymanagement Knowledge and experience analysing and interpreting security logs, event data, and alerts to identify potential threats Knowledge and experience of network protocols … traffic analysis, and cyber-attack methodologies Knowledge and experience of threat intelligence, risk management, vulnerabilitymanagement, and penetration testing Please note sponsorship is not available for this position, and you must be able to obtain a Security Clearance. Your new employer is looking for candidates who want More ❯
native applications, microservices, and infrastructure components. Manage internal and external penetration testing engagements for Funding Circle applications, services, and cloud infrastructure. Oversee and enhance vulnerabilitymanagement processes, focusing on strategic remediation, root cause analysis, and preventative measures. Contribute to drive implementation of security automation across cloud infrastructure configuration … vulnerabilitymanagement, and compliance monitoring. Design, implement, and support the adoption of robust security architectures, controls, and best practices within our AWS cloud environment. Act as a subject matter expert on cloud security (AWS), DevSecOps, and application security, providing guidance and mentorship to other engineers. Contribute to the … securing, and managing a wide range of AWS security services. Proven, hands-on experience architecting, building, and integrating security tooling (SAST, DAST, SCA, secrets management, IAST) and automated security controls within CI/CD pipelines (e.g., GitLab CI, Jenkins, GitHub Actions). Strong track record of defining, implementing, measuring More ❯
Hollywood, Florida, United States Hybrid / WFH Options
Southern Glazer's Wine & Spirits
and external assessments and audits. The person in this position will need to have extensive knowledge of information security risk and third-party risk management, as well as IT systems architectural concepts and business processes. This position works closely with all IT areas including Infrastructure, Application Development, Database, Network … can work across multiple functions and disciplines Capable of developing and delivering effective presentations to at all levels within the organization Primary Responsibilities Risk Management & Remediation Act as an Information Security Risk Management subject matter expert Assist the Information Security Risk Manager and GRC Director in the development … risk and potential impact of new projects and architectural changes to IT and the organization. Participate heavily in the implementation of the ServiceNow Risk Management solution and its regular maintenance. Assist with periodic reporting and presentation on status for a variety of risk-related stakeholder requirements. Preferred Qualifications Master More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Leidos
review and analysis of cybersecurity event logs Conduct and review technical cybersecurity assessments Coordinate with security personnel and recommend mitigation strategies Identify points of vulnerability and non-compliance with established cybersecurity standards and regulations Collaborate with our DevOpsSec team to help with analyzing scan results and remediation of findings … corresponding processes that can be used for system security testing, internal audits, incident response, and diagnosis of security-related system issues Perform and maintain vulnerability scans using Assured Compliance Assessment Solution (ACAS) and create reports Track and report Information Assurance VulnerabilityManagement (IAVM) compliance using Assured Compliance … and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content Perform system installation, configuration maintenance, account maintenance, signature maintenance, patch management, and troubleshooting of operational IA and CND systems Apply system security engineering expertise in one or more of the following to : system security design More ❯
Reston, Virginia, United States Hybrid / WFH Options
ICF
M for our customers. We are seeking a Senior Security Engineer to support our Federal customer's CIO Cyber Security organization and manage all vulnerability remediation activities, including Binding Operational Directive (BOD) compliance. Responsibilities: Perform Security Impact Analyses on application releases and provide recommendations to federal leadership Perform software … vulnerability scans, interpret the results, and provide vulnerability mitigation recommendations Support and develop analyses of alternatives and decisions on courses of action by providing security insights to project teams and federal leadership Review and provide recommendations on requests for AWS policy changes Work with development teams and other … updates to secure coding standards documentation and the ongoing assessment of the customer organization against the NIST Cyber Security Framework Support Information Security Center vulnerabilitymanagement groups by performing asset inventory, secure configurations and continuous monitoring, tracking and reporting and vulnerability service catalog. Support VulnerabilityManagementMore ❯
Head of Vulnerability and Threat Intelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in … our attractions. The Head of Vulnerability and Threat Intelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerabilitymanagement programme, conducting … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement VulnerabilityManagement Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with More ❯
london, south east england, united kingdom Hybrid / WFH Options
Merlin Entertainments
Head of Vulnerability and Threat Intelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in … our attractions. The Head of Vulnerability and Threat Intelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerabilitymanagement programme, conducting … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement VulnerabilityManagement Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with More ❯
logging is being collected and analyzed and relevant security alerts are being generated. Automate processes to reduce manual task delivery and enhance process delivery. VulnerabilityManagement Collaborate with IT and development teams to detect and remediate vulnerabilities across the enterprise in alignment with defined SLAs. Understand current and … . Knowledge of security frameworks and regulatory compliance standards (NIST CSF, SOX ITGC, GDPR, MITRE ATT&CK, etc.) Experience with common industry SIEM and vulnerabilitymanagement platforms. Experience maintaining the Microsoft Defender platform and other Microsoft security products. Ability to rank and prioritize vulnerabilities and security recommendations appropriately … within the context of the infrastructure and business processes. Experience maintaining identity and access management systems including PAM technology and other authentication and authorization control platforms. Experience with Incident Response best practices. Knowledge of cloud security best practices related to AWS and Azure cloud services. Knowledge of DevOps practices More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Radar Healthcare
and ensuring everyone understands their role in protecting our organisation. Leading from the front, you will champion a security conscious culture of proactive risk management and practical compliance to deliver meaningful and sustainable security improvements aligned to our strategic ambitions. What you'll be doing to make a difference … everyday processes. Oversee the security posture of cloud environments, ensuring secure configurations, proactive threat monitoring, and resilience planning. Establish and maintain a robust risk management framework, proactively identifying, assessing, and mitigating cybersecurity risks in alignment with business goals. Define standards for operational security including vulnerabilitymanagement, incident … . Demonstrated experience conducting security due diligence and managing integrations in acquisitions. A proven track record of building and embedding security awareness and risk management frameworks across business and technical teams. Strong operational experience, including establishing and managing incident response, vulnerabilitymanagement, and security monitoring programs. Ability More ❯
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. Experience More ❯
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. Experience More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. Experience More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. Experience More ❯
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
Deloitte LLP
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. Experience More ❯
Role Title: Cyber Security Engineer - Penetration & Vulnerability Testing Client Details: Oliver James has partnered with a leading distribution organisation with a strong market presence and significant investment in their IT security strategy. They are expanding their Cybersecurity team to enhance their vulnerabilitymanagement and testing capabilities. This … is an exciting opportunity for an experienced Cyber Security Engineer to contribute to strengthening the organisation's security posture through targeted vulnerability assessments and penetration testing, primarily focused on Microsoft Azure and associated technologies. Description: The Cyber Security Engineer will play a critical role in identifying and mitigating security … vulnerabilities across the organisation's technology estate. You will lead regular vulnerability assessments, conduct penetration tests, and work collaboratively with IT teams to address risks and improve security standards. Key Responsibilities: Perform penetration testing and vulnerability assessments across cloud and on-premises environments. Focused security testing within Microsoft More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Sanderson
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation and management of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use cases. … Designing and implementing security controls and secure configurations. Maintaining proactive vulnerability scanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and … and audits of our information security information security policies, procedures, and systems. Identifying, assessing, managing, remediating, and tracking information security risks through our risk management framework and ensuring key risks are reported to the CISO. Performing regular internal security audits aligned to ISO/IEC 27001 and SOC2 controls. More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation and management of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use cases. … Designing and implementing security controls and secure configurations. Maintaining proactive vulnerability scanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and … and audits of our information security information security policies, procedures, and systems. Identifying, assessing, managing, remediating, and tracking information security risks through our risk management framework and ensuring key risks are reported to the CISO. Performing regular internal security audits aligned to ISO/IEC 27001 and SOC2 controls. More ❯