VULNERABILITY MANAGEMENT ANALYST Up to £70,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a major driving forces … behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a Vulnerability Management Analyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's Vulnerability Management Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes & Schedules related to Vulnerability Scanning of All Endpoints of the business. As a Vulnerability Management Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of Vulnerability Management Analyst role would include: Conducting Vulnerability Scanning More ❯
VULNERABILITY MANAGEMENT ANALYST Up to £70,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a major driving forces … behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a Vulnerability Management Analyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's Vulnerability Management Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes & Schedules related to Vulnerability Scanning of All Endpoints of the business. As a Vulnerability Management Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of Vulnerability Management Analyst role would include: Conducting Vulnerability Scanning More ❯
SOC and VulnerabilityAnalyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and VulnerabilityAnalyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality More ❯
SOC and VulnerabilityAnalyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and VulnerabilityAnalyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality More ❯
SOC and VulnerabilityAnalyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and VulnerabilityAnalyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality More ❯
SOC and VulnerabilityAnalyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and VulnerabilityAnalyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality More ❯
Planners, Intrusion Analysts, Protocol Analysts, Signals Analysts and Reverse Engineers, responsible for improving, protecting, and defending our Nation's Security . Job Description: We are looking for a System VulnerabilityAnalyst to identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by … effective countermeasures. You will also produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems or missions being studied. The Level 2 System VulnerabilityAnalyst shall possess the following capabilities: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis … penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience. The Analyst should be comfortable with network analysis, network anomaly detection, IOC's, Mitre framework, AMOD tools experience, and be able to analyze data to discover malicious or unauthorized activity collected from various sources. More ❯
Planners, Intrusion Analysts, Protocol Analysts, Signals Analysts and Reverse Engineers, responsible for improving, protecting, and defending our Nation's Security . Job Description: We are looking for a System VulnerabilityAnalyst to identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by … effective countermeasures. You will also produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems or missions being studied. The Level 3 System VulnerabilityAnalyst shall possess the following capabilities: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis More ❯
Planners, Intrusion Analysts, Protocol Analysts, Signals Analysts and Reverse Engineers, responsible for improving, protecting, and defending our Nation's Security . Job Description: We are looking for a System VulnerabilityAnalyst to identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by … effective countermeasures. You will also produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems or missions being studied. The Level 4 System VulnerabilityAnalyst shall possess the following capabilities: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis More ❯
Primary Details Time Type: Full time Worker Type: Employee Vulnerability Management Data Analyst Permanent London/Hybrid At QBE, our purpose is to enable a more resilient future. We are an international insurer and reinsurer with a local presence in 27 countries. The Opportunity As part of our continuous improvement and expansion of the vulnerability management function … we are seeking a highly motivated Vulnerability Management Data Analyst to join our Global Security Operations Centre. This permanent, hybrid role is based out of our London office and reports to the Threat & Vulnerability Manager. The successful candidate will play a key role in strengthening QBE’s cyber resilience by turning complex security data into meaningful insights. … This role will directly support the identification, prioritisation, remediation and reporting of vulnerabilities—helping QBE stay ahead of emerging threats. Your New Role As a Vulnerability Management Data Analyst, you’ll collaborate with teams across security engineering, vulnerability management, service management, cyber governance, risk and divisional consultancy to ensure data accuracy, develop dashboards and reports, and support More ❯
Description Support the identification of vulnerabilities of and attacks against specific systems. Analyze attack techniques and develop countermeasures. Produce formal and informal reports, and briefings relating to system vulnerability analysis. The VulnerabilityAnalyst shall possess the following capabilities: Analyze existing architecture and recommend policies and procedures for improvement. Identify vulnerabilities of and attacks to the design and … related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security). Relevant experience must be in vulnerability analysis, penetration testing, and/or computer forensics. In addition, may include computer of information systems design/development, programming, information/cyber/network security, systems engineering, and More ❯
patients, our communities, and our people. If you want to be part of tomorrows health today, we want to hear from you. Current Need We are searching for a Vulnerability Management Analy st Posi tion Description A vulnerability management analyst is an advanced, hands-on practitioner and representative of the cybersecurity defense team. The role is technical … possess a solid understanding of information security and preferably have held positions in cybersecurity and systems administration. The role also requires an understanding of business and governance process . Vulnerability management analysts are responsible for the overall management lifecycle of the program. They must understand applications, operating systems, networking, cloud infrastructure and basic attacker tactics, techniques and procedures (TTPs … are expected to maintain a high level of rigor to stay up-to-date with advancements in technology, while also retaining knowledge of older systems and applications in use. Vulnerability management analysts understand that legacy and present-day systems and applications may have weaknesses that can be exploited by external threat actors and potentially lead to a breach. Given More ❯
patients, our communities, and our people. If you want to be part of tomorrows health today, we want to hear from you. Current Need We are searching for a Vulnerability Management Analy st Posi tion Description A vulnerability management analyst is an advanced, hands-on practitioner and representative of the cybersecurity defense team. The role is technical … possess a solid understanding of information security and preferably have held positions in cybersecurity and systems administration. The role also requires an understanding of business and governance process . Vulnerability management analysts are responsible for the overall management lifecycle of the program. They must understand applications, operating systems, networking, cloud infrastructure and basic attacker tactics, techniques and procedures (TTPs … are expected to maintain a high level of rigor to stay up-to-date with advancements in technology, while also retaining knowledge of older systems and applications in use. Vulnerability management analysts understand that legacy and present-day systems and applications may have weaknesses that can be exploited by external threat actors and potentially lead to a breach. Given More ❯
patients, our communities, and our people. If you want to be part of tomorrows health today, we want to hear from you. Current Need We are searching for a Vulnerability Management Analy st Posi tion Description A vulnerability management analyst is an advanced, hands-on practitioner and representative of the cybersecurity defense team. The role is technical … possess a solid understanding of information security and preferably have held positions in cybersecurity and systems administration. The role also requires an understanding of business and governance process . Vulnerability management analysts are responsible for the overall management lifecycle of the program. They must understand applications, operating systems, networking, cloud infrastructure and basic attacker tactics, techniques and procedures (TTPs … are expected to maintain a high level of rigor to stay up-to-date with advancements in technology, while also retaining knowledge of older systems and applications in use. Vulnerability management analysts understand that legacy and present-day systems and applications may have weaknesses that can be exploited by external threat actors and potentially lead to a breach. Given More ❯
patients, our communities, and our people. If you want to be part of tomorrows health today, we want to hear from you. Current Need We are searching for a Vulnerability Management Analy st Posi tion Description A vulnerability management analyst is an advanced, hands-on practitioner and representative of the cybersecurity defense team. The role is technical … possess a solid understanding of information security and preferably have held positions in cybersecurity and systems administration. The role also requires an understanding of business and governance process . Vulnerability management analysts are responsible for the overall management lifecycle of the program. They must understand applications, operating systems, networking, cloud infrastructure and basic attacker tactics, techniques and procedures (TTPs … are expected to maintain a high level of rigor to stay up-to-date with advancements in technology, while also retaining knowledge of older systems and applications in use. Vulnerability management analysts understand that legacy and present-day systems and applications may have weaknesses that can be exploited by external threat actors and potentially lead to a breach. Given More ❯
patients, our communities, and our people. If you want to be part of tomorrows health today, we want to hear from you. Current Need We are searching for a Vulnerability Management Analy st Posi tion Description A vulnerability management analyst is an advanced, hands-on practitioner and representative of the cybersecurity defense team. The role is technical … possess a solid understanding of information security and preferably have held positions in cybersecurity and systems administration. The role also requires an understanding of business and governance process . Vulnerability management analysts are responsible for the overall management lifecycle of the program. They must understand applications, operating systems, networking, cloud infrastructure and basic attacker tactics, techniques and procedures (TTPs … are expected to maintain a high level of rigor to stay up-to-date with advancements in technology, while also retaining knowledge of older systems and applications in use. Vulnerability management analysts understand that legacy and present-day systems and applications may have weaknesses that can be exploited by external threat actors and potentially lead to a breach. Given More ❯
patients, our communities, and our people. If you want to be part of tomorrows health today, we want to hear from you. Current Need We are searching for a Vulnerability Management Analy st Posi tion Description A vulnerability management analyst is an advanced, hands-on practitioner and representative of the cybersecurity defense team. The role is technical … possess a solid understanding of information security and preferably have held positions in cybersecurity and systems administration. The role also requires an understanding of business and governance process . Vulnerability management analysts are responsible for the overall management lifecycle of the program. They must understand applications, operating systems, networking, cloud infrastructure and basic attacker tactics, techniques and procedures (TTPs … are expected to maintain a high level of rigor to stay up-to-date with advancements in technology, while also retaining knowledge of older systems and applications in use. Vulnerability management analysts understand that legacy and present-day systems and applications may have weaknesses that can be exploited by external threat actors and potentially lead to a breach. Given More ❯
patients, our communities, and our people. If you want to be part of tomorrows health today, we want to hear from you. Current Need We are searching for a Vulnerability Management Analy st Posi tion Description A vulnerability management analyst is an advanced, hands-on practitioner and representative of the cybersecurity defense team. The role is technical … possess a solid understanding of information security and preferably have held positions in cybersecurity and systems administration. The role also requires an understanding of business and governance process . Vulnerability management analysts are responsible for the overall management lifecycle of the program. They must understand applications, operating systems, networking, cloud infrastructure and basic attacker tactics, techniques and procedures (TTPs … are expected to maintain a high level of rigor to stay up-to-date with advancements in technology, while also retaining knowledge of older systems and applications in use. Vulnerability management analysts understand that legacy and present-day systems and applications may have weaknesses that can be exploited by external threat actors and potentially lead to a breach. Given More ❯
patients, our communities, and our people. If you want to be part of tomorrows health today, we want to hear from you. Current Need We are searching for a Vulnerability Management Analy st Posi tion Description A vulnerability management analyst is an advanced, hands-on practitioner and representative of the cybersecurity defense team. The role is technical … possess a solid understanding of information security and preferably have held positions in cybersecurity and systems administration. The role also requires an understanding of business and governance process . Vulnerability management analysts are responsible for the overall management lifecycle of the program. They must understand applications, operating systems, networking, cloud infrastructure and basic attacker tactics, techniques and procedures (TTPs … are expected to maintain a high level of rigor to stay up-to-date with advancements in technology, while also retaining knowledge of older systems and applications in use. Vulnerability management analysts understand that legacy and present-day systems and applications may have weaknesses that can be exploited by external threat actors and potentially lead to a breach. Given More ❯
patients, our communities, and our people. If you want to be part of tomorrows health today, we want to hear from you. Current Need We are searching for a Vulnerability Management Analy st Posi tion Description A vulnerability management analyst is an advanced, hands-on practitioner and representative of the cybersecurity defense team. The role is technical … possess a solid understanding of information security and preferably have held positions in cybersecurity and systems administration. The role also requires an understanding of business and governance process . Vulnerability management analysts are responsible for the overall management lifecycle of the program. They must understand applications, operating systems, networking, cloud infrastructure and basic attacker tactics, techniques and procedures (TTPs … are expected to maintain a high level of rigor to stay up-to-date with advancements in technology, while also retaining knowledge of older systems and applications in use. Vulnerability management analysts understand that legacy and present-day systems and applications may have weaknesses that can be exploited by external threat actors and potentially lead to a breach. Given More ❯
and develop operationally effective countermeasures. Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems or missions being studied. The principal level System VulnerabilityAnalyst shall possess the following capabilities: Candidate must have relevant experience in vulnerability analysis, penetration testing, and/or computer forensics. Requirements Active TS/SCI w More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Prism, Inc
a foundational knowledge of LINUX/UNIX OS, networking, databases, and other IT Technologies required. Working knowledge of DevSecOps functionality a plus. Requirements: 5+ years of operational experience in vulnerability management or security engineering with a working knowledge of OS hardening/compliance/DISA STIGs. Position requires 8570 Certification (e.g. Security +, CISSP). Desired Skills: Working knowledge … of ACAS. Knowledge of PowerShell. Experience with MECM, Tanium, and MDE a plus Understanding of DISA STIGs and Information Assurance Vulnerability Management (IAVM) Program Working knowledge of Red Hat Advanced Cluster Security for Kubernetes (StackRox) and Splunk strongly desired. Strong critical thinking, communication, and organizational skills Collaborates with technical and compliance teams across the organization. Capable of performing trend … and analysis of vulnerability scan data and preparation of weekly metrics for presentation to leadership Experience in Information Technology/Vulnerability Management/Cybersecurity Demonstrate deep technical knowledge in the management and configuration of operating systems, networks, and software including knowledge of OS authentication mechanisms, permissions, and a solid understanding of networking In-depth knowledge of network protocols More ❯
Experience must be in computer or info systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Are you ready to start a cybersecurity career The demand for newly trained and qualified Cyber Security professionals has never been greater and this boasts excellent opportunities for growth amongst other benefits. Companies across the globe try to protect themselves More ❯