Permanent Vulnerability Assessment Jobs

1 to 25 of 58 Permanent Vulnerability Assessment Jobs

Cyber Security Analyst

Northampton, Northamptonshire, East Midlands, United Kingdom
Viqu Limited
and secure your clients' technology estates. Collaborating with the CISO, the Cyber Security Analyst will be involved in incident response, security consultations, project work, vulnerability assessments, and ensuring compliance with standards like ISO 27001 and Cyber Essentials. Requirements of the Cyber Security Analyst: - 3 years' experience in a comparable more »
Employment Type: Permanent
Salary: £45,000
Posted:

Penetration Tester

United Kingdom
Hybrid / WFH Options
Intertek
will work on both infrastructure and applications, conduct IT Health Checks, and review IT configurations to identify gaps. About the Role Perform pen tests, vulnerability assessments and build reviews both remotely and at client sites, against network devices, servers, end user devices, cloud technologies, wireless networks, web and mobile more »
Employment Type: Permanent, Work From Home
Posted:

Head of IT

Manchester, North West, United Kingdom
Hybrid / WFH Options
Ascent People
Thorough understanding of data security principles and best practices, ideally in a regulated environment. - Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. **Preferred Qualifications:** - Experience in private and public cloud data centre management. - Level 3 Service Management Framework qualification and knowledge of ITIL. - Relevant technical more »
Employment Type: Permanent, Work From Home
Salary: £65,000
Posted:

Security GRC Specialist

Chicago, Illinois, United States
Request Technology
risk management principles and practices. Strong knowledge of security administration and role-based security controls. Strong knowledge and use of GRC platforms. Knowledge of vulnerability assessment and forensic investigations tools. Knowledge of Privileged Access Management technologies Responsibilities Respond to security assessments, questionnaires and audits from clients and third more »
Employment Type: Permanent
Salary: USD 135,000 Annual
Posted:

GRC Security Risk Specialist

Austin, Texas, United States
Request Technology - Craig Johnson
data encryption technologies. Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerability assessment and forensic investigations tools. Knowledge of mobile device security and Mobile Device Management solutions. Knowledge of Privileged Access Management technologies. Preferred Skills more »
Employment Type: Permanent
Salary: USD 135,000 Annual
Posted:

GRC Security Manager

Austin, Texas, United States
Request Technology - Craig Johnson
data encryption technologies. Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerability assessment and forensic investigations tools. Knowledge of mobile device security and Mobile Device Management solutions. Certified Information Systems Security Professional (CISSP), Certified Information more »
Employment Type: Permanent
Salary: USD 180,000 Annual
Posted:

GRC Security Risk Specialist

Chicago, Illinois, United States
Request Technology - Craig Johnson
data encryption technologies. Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerability assessment and forensic investigations tools. Knowledge of mobile device security and Mobile Device Management solutions. Knowledge of Privileged Access Management technologies. Preferred Skills more »
Employment Type: Permanent
Salary: USD 135,000 Annual
Posted:

Information Technology Support Engineer

United Kingdom
Confidential
environment Relevant certifications in IT support are a plus Experience in data protection and management Knowledge of security protection and disaster recovery Understanding of vulnerability assessment and patch management Familiarity with device as a service and penetration testing If you are interested in this role, please email your more »
Posted:

Azure Cloud Security Engineer

London, United Kingdom
Confidential
and best practices. - Deep understanding of cloud security controls, tools (Azure Security Center), and services. - Familiarity with security testing methodologies like penetration testing and vulnerability assessments. - Experience with SIEM tools (Splunk, ELK, Azure Sentinel) and incident response/forensics. - Knowledge of security frameworks (NIST, ISO 27001, SOC 2) and more »
Posted:

Senior IT Infrastructure Engineer

London, United Kingdom
Confidential
Service Desk and Change Management Systems (ManageEngine) Maintain, monitor, and support the bank s network, applications and infrastructure. Carry out regular system health checks, vulnerability assessment and patching. Integrate solutions with other applications and platforms based on business requirements. Perform routine maintenance tasks for infrastructure systems such as more »
Posted:

Software Engineer

London, United Kingdom
Hybrid / WFH Options
Confidential
/C++ High-level linux experience on users/kernel space (or on Android platforms) Knowledge of Linux build systems and system components Security Vulnerability Assessment experience Knowledge of Bootloaders Good experience with Git and branch integration Good solid Python skills for tools automation Nice to have skills more »
Posted:

Infrastructure Team Leader

Manchester, North West, United Kingdom
Hybrid / WFH Options
Ascent People
Thorough understanding of data security principles and best practices, ideally in a regulated environment. - Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. **Preferred Qualifications:** - Experience in private and public cloud datacentre management. - Level 3 Service Management Framework qualification and knowledge of ITIL. - Relevant technical certifications. more »
Employment Type: Permanent, Work From Home
Salary: £65,000
Posted:

Cyber Strategy Manager

Toronto, Ontario (ON), Canada
RSM Canada Operations ULC
Privacy & Risk team. This individual can possess a variety of skill sets such as performing and overseeing governance assessments (HIPAA, NIST, ISO, FISMA, etc.), vulnerability assessments, penetration testing, incident response, Payment Card Industry (PCI) assessments, as well as experience in managing or deploying SIEM, DLP, and Identity Management solutions. … as the Open Web Application Security Project (OWASP), Open Source Security Testing Methodology Manual (OSSTMM), the Penetration Testing Execution Standard (PTES), Information Systems Security Assessment Framework (ISSAF), and NIST SP800-115 Experience with discovering and demonstrating web application vulnerabilities such as Cross Site Scripting (XSS), Cross Site Request Forgery … CSRF), Injection Flaws, Remote file inclusion (RFI) and SQL Injection Familiar with security testing techniques such as network discovery, port and service identification, vulnerability scanning, network sniffing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing, fuzzing, and password cracking and can perform these techniques from more »
Employment Type: Permanent
Salary: CAD Annual
Posted:

Penetration Tester Manager

Chicago, Illinois, United States
RSM US LLP
industries and understanding how technology impacts the operation and growth of organizations is what we do best. We are seeking individuals skilled at performing vulnerability assessments, penetration testing, and secure architecture reviews of a variety of operating systems, network devices, wireless solutions, and their related infrastructure. Examples of candidate … as the Open Web Application Security Project (OWASP), Open Source Security Testing Methodology Manual (OSSTMM), the Penetration Testing Execution Standard (PTES), Information Systems Security Assessment Framework (ISSAF), and NIST SP800-115 Familiar with security testing techniques such as threat modeling, network discovery, port and service identification, vulnerability scanning more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Staff Classified Cybersecurity Analyst - Top Secret

Beale Afb, California, United States
Northrop Grumman
deviate from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations such as compliance audits and active evaluations such as vulnerability assessments. Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems. Includes support of process, analysis … each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports. Coordinate all associated Assessment and Authorization activities, which includes all RMF Body Of Evidence (BOE) documentation: System Security Plan (SSP), Security Controls Traceability Matrix (SCTM), Control Family Security more »
Employment Type: Permanent
Salary: USD Annual
Posted:

IT GRC/Security Manager

Chicago, Illinois, United States
Request Technology
data encryption technologies. Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerability assessment and forensic investigations tools. Knowledge of mobile device security and Mobile Device Management solutions. more »
Employment Type: Permanent
Salary: USD 180,000 Annual
Posted:

GRC Security Manager

Chicago, Illinois, United States
Request Technology - Craig Johnson
data encryption technologies. Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerability assessment and forensic investigations tools. Knowledge of mobile device security and Mobile Device Management solutions. Certified Information Systems Security Professional (CISSP), Certified Information more »
Employment Type: Permanent
Salary: USD 180,000 Annual
Posted:

IT GRC/Security Manager

Austin, Texas, United States
Request Technology
data encryption technologies. Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerability assessment and forensic investigations tools. Knowledge of mobile device security and Mobile Device Management solutions. more »
Employment Type: Permanent
Salary: USD 180,000 Annual
Posted:

Security operations analyst

Gloucestershire, South West, United Kingdom
Hays
you're passionate about cloud security and have the technical acumen to thrive in this dynamic field, read on! Responsibilities Develop Approach to Security Assessment & Authorization (SA&A): Collaborate with cross-functional teams to conduct security assessments for FedRAMP-approved cloud service providers. Ensure compliance with security standards and … architecture, cloud service models (IaaS, PaaS, SaaS), and security controls within cloud environments. Risk Management: Identify, assess, and mitigate risks through regular security audits, vulnerability assessments, and disaster recovery planning. Automation: Proficiency in automating security tasks to ensure elasticity and efficiency across cloud platforms. Encryption and Authentication: Knowledge of more »
Employment Type: Permanent
Salary: £50,000
Posted:

Principal Security Engineer

London, United Kingdom
Hybrid / WFH Options
Confidential
Security principles are being upheld. Advanced knowledge of layer 7 firewall technologies and capabilities (e.g., Application awareness, user identities, advanced threat detection, etc.) Provides vulnerability assessment of cloud assets, delivers remediation recommendations, and provides knowledgeable assistance in resolving identified vulnerabilities. Develop and implement security measures, policies, and procedures … Cyber Principles, ISO27001, SoC, NIST, PCI, and GDPR. Hands-on experience with security technologies, SIEM , IDS/IPS, EDR, NDR, network forensics, antivirus, and vulnerability scanning tools. (preferably Crowdstrike Falcon, Wiz, Datadog) Up-to-date understanding of testing the security of software and infrastructure using appropriate security tools including … disability or age. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Internal Audit-London-Vice President-Technology Audit

London, United Kingdom
Confidential
mobile, web services, and client/server architectures Encryption schemes (symmetric, asymmetric, and hashing) and how they may be applied in an application architecture Vulnerability assessment and penetration testing methodologies and processes for web, thick-client and mobile applications Experience with Splunk and/or other SIEM platforms more »
Posted:

Senior / Lead Security Engineer

London, United Kingdom
Confidential
lifecycle. Spearhead the integration of security within the SDLC, promoting secure coding practices and integrating security tools within CI/CD pipelines. Oversee designs, vulnerability assessments and code reviews, ensuring applications are free of critical security flaws. Guide the engineering teams in embracing security as an integral part of more »
Posted:

Lead Systems Engineer

London, United Kingdom
Hybrid / WFH Options
Confidential
proactive, diligent, comprehensive engineering, completer-finisher Project management experience across multiple clients with concurrent requirements Strong Security and administration tools knowledge : patching, antivirus, backup, vulnerability assessment : monitoring, reporting and remediation Extensive knowledge of Microsoft s technology?products, including Azure, Microsoft/Office 365, Windows Server, Active Directory and more »
Posted:

PKI Engineer

Clerkenwell, England, United Kingdom
Hybrid / WFH Options
Sky
environments. Analyse current use of certificates by individual Sky business and infrastructure teams. Assist onboarding new teams into the PKI service. Work with Cyber vulnerability assessment teams to prioritise onboarding to automated certificate management. Work with App Service managed certificates, private and public certificates, and certificates from Key more »
Posted:

Site Reliability Engineer (SRE) - LLM and Machine Learning

London, United Kingdom
Hybrid / WFH Options
Confidential
capacity planning and scaling to accommodate growing workloads and ensure resource efficiency. Security and Compliance: Collaborate with security teams to implement security best practices, vulnerability assessments, and compliance requirements for LLM and Machine Learning systems. Continuous Improvement: Continuously evaluate and improve system reliability, performance, and efficiency through automation and more »
Posted:
Vulnerability Assessment
10th Percentile
£38,750
25th Percentile
£52,750
Median
£67,500
75th Percentile
£80,000
90th Percentile
£93,125