Remote Permanent Vulnerability Scanning Jobs

1 to 25 of 63 Remote Permanent Vulnerability Scanning Jobs

Cyber Security Specialist

Carmarthen, United Kingdom
Hybrid / WFH Options
Hywel Dda University Health Board
a broad knowledge of Cyber security technologies and have excellent skills in network security, monitoring and incident response. Exposure to EDR technologies, IPS and Vulnerability Management tools would be beneficial. A good understanding of legislation and security frameworks such as the Network and Information Systems Regulations, ISO 27001 and … a Cyber Security incident. As a member of the ICT team at Hywel Dda you will work with the Cyber Security team to undertake vulnerability scanning, the monitoring of Cyber Security Systems utilising SIEM technologies and work with third parties to review compliance with best practice. You will … Security. Evidence of Cyber Security or other relevant work outside formal training or employment (voluntary, research, academia, social media etc.) Working with SIEM and Vulnerability scanning solutions. Development of training packages. Desirable Experience of ICT service provision in a health care setting Experience of working in fields other More ❯
Employment Type: Permanent
Salary: £37898.00 - £45637.00 a year
Posted:

Information Systems Security Officer (ISSO) with Security Clearance

Huntsville, Alabama, United States
Hybrid / WFH Options
Lockheed Martin
security, testing and system accreditation activities for multiple training platforms. Successful candidates will require a strong background in Assured Compliance Assessment Solution (ACAS) and vulnerability scanning, development of the system security plan, maintaining the Plan of Action and Milestones (POAM), and other security related processes to include part … sanitization procedures, vulnerability scanning, and virus scanning. The candidate will perform routine security scans and provide engineering level research when requested. The candidate will apply information technology security principles and configure security settings, apply security patches and conduct media reviews. Assist in the development and implementation of government … concepts and cybersecurity related tools to include, Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG) and Security Content Automation Protocol (SCAP), and vulnerability scanners. Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration. Clearance Level: Secret Other Important More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security with Security Clearance

Aberdeen Proving Ground, Maryland, United States
Hybrid / WFH Options
CACI
support RMF control implementation, boundary analysis, and system accreditation efforts. Use enterprise tools such as eMASS, Tenable.SC, and ACAS to manage security artifacts, conduct vulnerability scanning, generate compliance findings, and validate adherence to DoD cybersecurity directives and DISA STIG requirements. Collaborate with Information System Owners (ISOs), Information System … Experience with the following tools and frameworks: o eMASS for managing the full RMF package lifecycle o Tenable Security Center (Tenable.SC) and ACAS for vulnerability scanning, analysis, and compliance reporting o Control selection, implementation - What You Can Expect: A culture of integrity. At CACI, we place character and More ❯
Employment Type: Permanent
Salary: USD 143,700 Annual
Posted:

Cybersecurity Development Engineer with Security Clearance

Colorado Springs, Colorado, United States
Hybrid / WFH Options
Lockheed Martin
Cyber Plans and Procedures The successful candidate will have experience and knowledge of: • Linux (e.g. Red Hat, Ubuntu) • Infrastructure as code tools (e.g. Ansible) • Vulnerability scanning and patching • Bachelor's degree from an accredited college in Cybersecurity, Software Engineering, or a related discipline, or equivalent experience/combined … technology related programs such as Computer Science, Systems Engineering, Electrical Engineering, Computer Engineering, Physics, Mathematics etc. • Infrastructure as code tools (e.g. Ansible) • Experience with vulnerability scanning & report generation • Experience developing configurations for and hardening Linux • Current DoD 8570 baseline certification (e.g., Security+, CISSP, CEH, CySA+, etc.). • Applicants More ❯
Employment Type: Permanent
Salary: USD 209,300 Annual
Posted:

Lead DevOps Engineer

London, United Kingdom
Hybrid / WFH Options
QiH Group
tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as key management, vulnerability scanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the continuous integration … In-depth knowledge of DevSecOps tools such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerability scanning, encryption, authentication, and secrets management (Vault, Key Management Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Information Security Analyst

London, United Kingdom
Hybrid / WFH Options
Jas Gujral
detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Perform or coordinate internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA … organization. Participates in change management meetings and provides expert input to ensure security is maintained. Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering. Ability to manage and continuously improve upon vulnerability management program. Ability More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Vulnerability Management Analyst

london, south east england, united kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
Posted:

Senior AWS Security Engineer- Remote with Security Clearance

Reston, Virginia, United States
Hybrid / WFH Options
ICF
M for our customers. We are seeking a Senior Security Engineer to support our Federal customer's CIO Cyber Security organization and manage all vulnerability remediation activities, including Binding Operational Directive (BOD) compliance. Responsibilities: Perform Security Impact Analyses on application releases and provide recommendations to federal leadership Perform software … vulnerability scans, interpret the results, and provide vulnerability mitigation recommendations Support and develop analyses of alternatives and decisions on courses of action by providing security insights to project teams and federal leadership Review and provide recommendations on requests for AWS policy changes Work with development teams and other … updates to secure coding standards documentation and the ongoing assessment of the customer organization against the NIST Cyber Security Framework Support Information Security Center vulnerability management groups by performing asset inventory, secure configurations and continuous monitoring, tracking and reporting and vulnerability service catalog. Support Vulnerability Management activities More ❯
Employment Type: Permanent
Salary: USD 166,810 Annual
Posted:

Tenable Vulnerability Management Analyst - Banking sector

London Area, United Kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
Posted:

Tenable Vulnerability Management Analyst - Banking sector

london, south east england, united kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
Posted:

Cyber Engineer - A&A with Security Clearance

Colorado Springs, Colorado, United States
Hybrid / WFH Options
Lockheed Martin
Level II (e.g., Sec+ or Higher) - A strong working knowledge of Cyber capabilities such as patch management, security event management, active/passive system scanning, and defense-in-depth. - Recent experience with creating/updating Assessment and Authorization (A&A) packages for RMF Authority to Operate (ATOs) is required. … with a working knowledge of NIST Standards and Risk Management Framework (RMF) controls -Must have experience in the Agile Development Lifecycle, and performing Cyber vulnerability, and Cyber configuration activities. This position requires the ability to obtain and maintain a DoD clearance at the Secret level. Multiple companies provide impactful … in accordance with GPOs, IAVMs, and STIGs is desired. - Highly desired experience using scripting languages such as Python and PowerShell - Highly desired experience with vulnerability scanning and analysis tools such as ACAS (Tenable.sc, Nessus Vulnerability scanner), Evaluate-STIG, STIG Manager - Working knowledge of Confidentiality, Integrity, and Availability More ❯
Employment Type: Permanent
Salary: USD 140,530 Annual
Posted:

Director of Cyber Security London

London, United Kingdom
Hybrid / WFH Options
Financial Times group
Technical Expertise: Provide guidance on secure architecture, secrets management, and best practices. Threat Management: Lead all aspects of penetration testing, bug bounty programs, and vulnerability reporting to mitigate risks and align with regulations. Vendor Relationships: Manage partnerships with security vendors, ensuring value and support. Cyber Governance Compliance and Risk … senior cyber security role, ideally within a complex, global organisation. Deep expertise in one or more of the following areas: security consultancy, security engineering, vulnerability management or governance. Deep knowledge of modern DevSecOps practices. Experience in leading vulnerability management programs, including expertise in utilising tools and processes for … vulnerability scanning, conducting penetration testing, and delivering actionable reporting to support an effective and comprehensive vulnerability management strategy. Excellent communication and stakeholder management skills, with the ability to convey complex technical issues to non-technical audiences. Hands-on experience collaborating with engineering and development teams to integrate More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Director of Cyber Security

London, United Kingdom
Hybrid / WFH Options
Financial Times
Technical Expertise: Provide guidance on secure architecture, secrets management, and best practices. Threat Management: Lead all aspects of penetration testing, bug bounty programs, and vulnerability reporting to mitigate risks and align with regulations. Vendor Relationships: Manage partnerships with security vendors, ensuring value and support. Cyber Governance Compliance and Risk … senior cyber security role, ideally within a complex, global organisation. Deep expertise in one or more of the following areas: security consultancy, security engineering, vulnerability management or governance. Deep knowledge of modern DevSecOps practices. Experience in leading vulnerability management programs, including expertise in utilising tools and processes for … vulnerability scanning, conducting penetration testing, and delivering actionable reporting to support an effective and comprehensive vulnerability management strategy. Excellent communication and stakeholder management skills, with the ability to convey complex technical issues to non-technical audiences. Hands-on experience collaborating with engineering and development teams to integrate More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Analyst II with Security Clearance

Falls Church, Virginia, United States
Hybrid / WFH Options
Epsilon Inc
overall pipeline optimization. In this position you will: Implement and maintain security policies, standards, and procedures to protect organizational assets and data. Conduct regular vulnerability assessments and penetration tests to identify and remediate security weaknesses. Monitor and analyze security alerts and reports using SIEM tools to proactively detect threats … II Certification may be required (GSEC, GICSP, CND, CySA+, Security+ CE, SSCP or CCNA-Security). Proficiency with SIEM platforms (e.g., Splunk, QRadar) and vulnerability scanning tools (e.g., Nessus). Practical knowledge of security frameworks such as NIST, ISO 27001, and SOC 2. Hands-on experience with common More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Security Operations Analyst

London, United Kingdom
Hybrid / WFH Options
IG Index Limited
incident reports. Project Delivery Take part in the team's project delivery initiative, rotating between the following roles on a 1-3 monthly schedule: Vulnerability Management - maintain regular scans, interpret results, identify asset owners, track remediation activities and report on the agreed SLAs. Security Controls Administration - maintain availability and … and standard use cases of technical security products, such as firewalls, anti-virus, web proxies, SIEM, IDS/IPS, DLP, and EDR. Familiarity with vulnerability scanning and penetration testing tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but not required): Cyber More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Junior DevSecOps Engineer

Chicago, Illinois, United States
Hybrid / WFH Options
LaSalle Network
and cloud service providers Practical experience in cloud technologies, preferably Azure Proficiency in security tools and products, including firewalls, IDS/IPS, SIEM, and vulnerability scanning Proficiency in programming languages commonly used in security, such as Python and Powershell Experience with security standards for cloud applications including in More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Engineer Engineering Team Bristol Office

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
Duel
Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerability scanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development process. Assist in … security compliance frameworks such as ISO 27001 or SOC 2, even if not previously responsible for certification processes. Experience working within security risk management, vulnerability tracking, or operational security efforts. Prior experience working with engineering teams on security topics is beneficial, particularly around secure development practices. Ability to clearly … or Vanta. Experience working with pen testing and bug bounties a plus. Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerability management solutions. Experience or knowledge of cloud security (AWS, GCP, or Azure). Awareness of security best practices in application and infrastructure security. Some More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information System Security Specialist & DevOps Engineer with Security Clearance

Chantilly, Virginia, United States
Hybrid / WFH Options
Aeyon
and responsibilities Cybersecurity and Risk Management: • Lead the development and maintenance of cybersecurity documentation, including Plans of Action and Milestones (POA&M), Information Assurance Vulnerability Management (IAVM) plans, and other security-related artifacts. • Coordinate and plan Information Assurance (IA) efforts for the deployment and sustainment of Information Systems (IS … ELK stack or Splunk. • Proficiency in Git and experience with version control practices in a team environment. • Knowledge of container security best practices, including vulnerability scanning and network policies. • Excellent written and verbal communication skills. • Active TS/SCI with CI Poly Required Desired qualifications/non-essential More ❯
Employment Type: Permanent
Salary: USD 190,900 Annual
Posted:

MDR / SOC Engineer

Zaventem, Vlaams-Brabant, Belgium
Hybrid / WFH Options
KPMG Belgium
including malware infections, data breaches, and unauthorized access attempts Develop and maintain security incident response plans and procedures Conduct security assessments, penetration tests, and vulnerability scanning Collaborate with IT and engineering teams to implement security improvements and remediation measures Stay up-to-date with the latest cybersecurity trends More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Junior SOC Analyst

Mont-Saint-Guibert, Brabant Wallon, Belgium
Hybrid / WFH Options
Approach Cyber
security incidents. Conduct root cause analysis of breaches following documented procedures. Support security incident handling and coordination at Level 1/2. Participate in vulnerability scanning and threat-hunting activities. Assist in the configuration and maintenance of security tools such as SIEM, EDR, and MDR solutions (e.g. Microsoft More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Senior IT Security Engineer

United Kingdom
Hybrid / WFH Options
Babylon Labs Ltd
security policies and procedures for all IT systems and devices, taking into account diverse regional regulations and network conditions. Conduct regular security audits and vulnerability assessments, with a focus on remote access and endpoint security. Device Management & MDM (Worldwide Deployment): Manage device procurement, distribution, and lifecycle for a geographically … authentication (MFA). Implement zero trust secure access from any location. Security Tooling & Integration: Evaluate, select, and onboard security solutions (e.g., endpoint protection, SIEM, vulnerability scanners). Integrate security tools with existing systems and workflows, ensuring effective threat detection and response. Automation & Scripting: Develop and maintain scripts and automation … tools to streamline IT operations and enhance security. Automate security tasks, such as patch management, vulnerability scanning or secure configuration enforcement. Vendor Management: Manage relationships with IT and security vendors and service providers. Evaluate vendor security practices and ensure compliance with company policies. Incident Response: Participate in security More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Lead London

London, United Kingdom
Hybrid / WFH Options
HowNow
to implement security controls across infrastructure (e.g., access control, encryption, logging). Lead the incident response process and manage third-party pen testing and vulnerability management. Customer & Vendor Security: Support security questionnaires, RFPs, and due diligence for customer deals. Review third-party vendors and tools for security posture and … and SSO. Clear understanding of data privacy laws (especially GDPR). Familiarity with security tools (e.g., endpoint protection, SSO/IAM, monitoring/logging, vulnerability scanning). Experience with risk assessments, incident response planning, and writing security policies. Strong communication skills, with the ability to explain security concepts More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Systems Engineer

City of London, London, United Kingdom
Hybrid / WFH Options
Cyber Talent Limited
and DevSecOps tools (e.g. GitLab CI/CD, Ansible, Terraform). Experience with security tools like SIEM/SOAR (preferably Rapid7), IDS/IPS, vulnerability scanners, and code analysis tools (SonarCloud, Snyk, Chekov) Strong knowledge of network security, encryption, identity and access management, and application security. Certifications (Preferred): CISSP More ❯
Employment Type: Permanent, Work From Home
Salary: £70,000
Posted:

Security Services Delivery Consultant

United Kingdom
Hybrid / WFH Options
Maxwell Bond
real-world operations. You’ll be responsible for overseeing the delivery and integration of key security services — including penetration testing, threat modelling, logging, and vulnerability scanning — into enterprise platforms and workflows. You’ll work cross-functionally to align technical services with business and risk priorities, helping to unblock … least 3 years of experience in a similar service delivery or cyber consultancy role Deep understanding of enterprise security services: Pen testing, threat modelling, vulnerability management, logging & monitoring, incident response Strong communication and stakeholder engagement skills Excellent documentation and governance capability CISM or CISSP certification Degree in Computer Science More ❯
Posted:

Cyber Secuirty Architect - UK Remote

London, United Kingdom
Hybrid / WFH Options
McNally Recruitment Ltd
security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusion detection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Vulnerability Scanning
Work from Home
10th Percentile
£47,250
25th Percentile
£57,500
Median
£62,500
75th Percentile
£90,000
90th Percentile
£90,625