Permanent 'Vulnerability Assessment' Job Vacancies

101 to 125 of 148 Permanent Vulnerability Assessment Jobs

GRC Manager

Woking, Surrey, England, United Kingdom
Hybrid / WFH Options
Nomad Foods
and standards that support risk mitigation and compliance efforts in line with industry standards. Play an active, hands-on role in security initiatives and GRC activities, including incident management, vulnerability assessments, and compliance reviews. Provide reporting to leadership committees and the Board. About you: We need someone who can communicate at all levels and with the ability to summarise More ❯
Employment Type: Full-Time
Salary: Salary negotiable
Posted:

Info Systems Security - Sr.

Irving, Texas, United States
Parkland Health and Hospital System
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
Employment Type: Permanent
Salary: USD Hourly
Posted:

Info Systems Security - Sr.

Plano, Texas, United States
Parkland Health and Hospital System
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
Employment Type: Permanent
Salary: USD Hourly
Posted:

Info Systems Security - Sr.

Dallas, Texas, United States
Parkland Health and Hospital System
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
Employment Type: Permanent
Salary: USD Hourly
Posted:

Info Systems Security - Sr.

Arlington, Texas, United States
Parkland Health and Hospital System
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
Employment Type: Permanent
Salary: USD Hourly
Posted:

Info Systems Security - Sr.

Grand Prairie, Texas, United States
Parkland Health and Hospital System
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
Employment Type: Permanent
Salary: USD Hourly
Posted:

Info Systems Security - Sr.

Fort Worth, Texas, United States
Parkland Health and Hospital System
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
Employment Type: Permanent
Salary: USD Hourly
Posted:

Infrastructure Engineering Lead

New Malden, England, United Kingdom
Northrop Grumman UK
maintain virtualised environments (e.g., VMware, Hyper-V) to facilitate scalable and secure development processes. This includes configuring virtual machines, monitoring system health, and automating deployment workflows for seamless operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate … advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits, and patch management for both IT and OT systems. Collaborate with cybersecurity and product teams to address vulnerabilities, apply security patches … security settings. Virtualisation: Expertise in virtualisation technologies such as VMware and Hyper-V, with a demonstrated ability to set up, maintain, and optimise virtual environments for industrial applications. Cybersecurity & Vulnerability Management: Strong understanding of cybersecurity practices and vulnerability management for both IT and OT systems. Experience implementing vulnerability assessments reports, securing systems, and applying necessary patches or More ❯
Posted:

Infrastructure Engineering Lead

london (new malden), south east england, united kingdom
Northrop Grumman UK
maintain virtualised environments (e.g., VMware, Hyper-V) to facilitate scalable and secure development processes. This includes configuring virtual machines, monitoring system health, and automating deployment workflows for seamless operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate … advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits, and patch management for both IT and OT systems. Collaborate with cybersecurity and product teams to address vulnerabilities, apply security patches … security settings. Virtualisation: Expertise in virtualisation technologies such as VMware and Hyper-V, with a demonstrated ability to set up, maintain, and optimise virtual environments for industrial applications. Cybersecurity & Vulnerability Management: Strong understanding of cybersecurity practices and vulnerability management for both IT and OT systems. Experience implementing vulnerability assessments reports, securing systems, and applying necessary patches or More ❯
Posted:

Infrastructure Engineering Lead

london, south east england, united kingdom
Northrop Grumman UK
maintain virtualised environments (e.g., VMware, Hyper-V) to facilitate scalable and secure development processes. This includes configuring virtual machines, monitoring system health, and automating deployment workflows for seamless operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate … advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits, and patch management for both IT and OT systems. Collaborate with cybersecurity and product teams to address vulnerabilities, apply security patches … security settings. Virtualisation: Expertise in virtualisation technologies such as VMware and Hyper-V, with a demonstrated ability to set up, maintain, and optimise virtual environments for industrial applications. Cybersecurity & Vulnerability Management: Strong understanding of cybersecurity practices and vulnerability management for both IT and OT systems. Experience implementing vulnerability assessments reports, securing systems, and applying necessary patches or More ❯
Posted:

Cyber Security & Centralised Services Manager

London, South East, England, United Kingdom
Hybrid / WFH Options
MFK Recruitment
and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerability management, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement long More ❯
Employment Type: Full-Time
Salary: £55,000 - £65,000 per annum
Posted:

IT SECURITY SPECIALIST - SECURITY, CYBER, AZURE

Manchester, United Kingdom
Hybrid / WFH Options
Adecco
system logs and network traffic to identify suspicious activity and potential threats. *Respond to security incidents and support forensic investigations. *Develop and maintain security protocols, policies, and procedures. *Conduct vulnerability assessments and recommend mitigation strategies. *Deliver cybersecurity awareness training and guidance to staff. *Maintain the information security risk register and support audit processes. *Collaborate with IT and operational teams … We are proud to be an equal opportunities employer. Keywords IT Security Specialist, Cybersecurity Analyst, SOC Analyst, Azure Security, Information Security, Firewalls, Intrusion Detection, Antivirus, ITIL, CISSP, Security Compliance, Vulnerability Management, Risk Register, Public Sector IT, Hybrid Role, Manchester Jobs, Security Awareness Training More ❯
Employment Type: Permanent
Salary: £35000 - £45000/annum Benefits
Posted:

Nozomi OT Security SME

Coventry, England, United Kingdom
KBC Technologies Group
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Posted:

Nozomi OT Security SME

binley, midlands, united kingdom
KBC Technologies Group
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Posted:

Nozomi OT Security SME

leicester, midlands, united kingdom
KBC Technologies Group
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Posted:

OT/IOT Security Consultant-claroty defender

Coventry, England, United Kingdom
HCLTech
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Posted:

OT/IOT Security Consultant-claroty defender

leicester, midlands, united kingdom
HCLTech
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Posted:

OT/IOT Security Consultant-claroty defender

binley, midlands, united kingdom
HCLTech
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Posted:

Senior Site Reliability Engineer - HFT Team

London, England, United Kingdom
Selby Jennings
pipelines for integration, development, and deployment. Implement and maintain monitoring systems. Maintain and enhance the team's cloud infrastructure. Promote and implement automation processes. Enhance security protocols by conducting vulnerability assessments and risk management to deploy cybersecurity measures. Technical Proficient in Terraform and AWS. Solid experience with CI/CD, ideally with GitLab CI and Jenkins. Extensive experience using More ❯
Posted:

Senior Site Reliability Engineer - HFT Team

london, south east england, united kingdom
Selby Jennings
pipelines for integration, development, and deployment. Implement and maintain monitoring systems. Maintain and enhance the team's cloud infrastructure. Promote and implement automation processes. Enhance security protocols by conducting vulnerability assessments and risk management to deploy cybersecurity measures. Technical Proficient in Terraform and AWS. Solid experience with CI/CD, ideally with GitLab CI and Jenkins. Extensive experience using More ❯
Posted:

Senior Site Reliability Engineer - HFT Team

slough, south east england, united kingdom
Selby Jennings
pipelines for integration, development, and deployment. Implement and maintain monitoring systems. Maintain and enhance the team's cloud infrastructure. Promote and implement automation processes. Enhance security protocols by conducting vulnerability assessments and risk management to deploy cybersecurity measures. Technical Proficient in Terraform and AWS. Solid experience with CI/CD, ideally with GitLab CI and Jenkins. Extensive experience using More ❯
Posted:

Senior Software Security Engineer

England, United Kingdom
Hybrid / WFH Options
Menlo Ventures
Design and implement secure-by-default controls as they relate to our software supply chain, AI model training systems, and deployment environments. Perform security architecture reviews, threat modeling, and vulnerability assessments to identify and remediate risks. Support Anthropic's responsible disclosure and bug bounty programs and participate in the Security Engineering team's on-call rotation. Accelerate the development More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cyber Security Analyst

newport, wales, united kingdom
Hybrid / WFH Options
Revoco
a Senior Cyber Security Engineer, you’ll play a key role in strengthening our security posture and driving continuous improvement across systems and networks. You will: Lead and implement vulnerability management programmes across multiple environments. Oversee incident response processes, from detection to resolution and post-incident review. Manage and optimise security tools , ensuring effective monitoring, detection, and prevention. Design … and maintain network security controls — including firewalls, intrusion detection/prevention, and segmentation. Conduct and oversee offensive security testing and vulnerability assessments. Ensure secure-by-design principles are embedded across development and infrastructure. Collaborate closely with engineering and product teams to identify and mitigate risks early. Contribute to a multidisciplinary cybersecurity taskforce , responding rapidly to emerging threats. 🧠 What We … re Looking For Strong understanding of OWASP Top 10 , MITRE ATT&CK , and evolving threat landscapes. Proven experience across vulnerability management, incident response, and network security . Ideally skilled in at least one programming language (e.g. Go, Python, Rust ). Experience managing or integrating security tooling (SIEM, endpoint protection, scanning tools, etc.). Hands-on experience with firewalls , network More ❯
Posted:

Senior Cyber Security Analyst

Greater Bristol Area, United Kingdom
Hybrid / WFH Options
Revoco
a Senior Cyber Security Engineer, you’ll play a key role in strengthening our security posture and driving continuous improvement across systems and networks. You will: Lead and implement vulnerability management programmes across multiple environments. Oversee incident response processes, from detection to resolution and post-incident review. Manage and optimise security tools , ensuring effective monitoring, detection, and prevention. Design … and maintain network security controls — including firewalls, intrusion detection/prevention, and segmentation. Conduct and oversee offensive security testing and vulnerability assessments. Ensure secure-by-design principles are embedded across development and infrastructure. Collaborate closely with engineering and product teams to identify and mitigate risks early. Contribute to a multidisciplinary cybersecurity taskforce , responding rapidly to emerging threats. 🧠 What We … re Looking For Strong understanding of OWASP Top 10 , MITRE ATT&CK , and evolving threat landscapes. Proven experience across vulnerability management, incident response, and network security . Ideally skilled in at least one programming language (e.g. Go, Python, Rust ). Experience managing or integrating security tooling (SIEM, endpoint protection, scanning tools, etc.). Hands-on experience with firewalls , network More ❯
Posted:

Senior Cyber Security Analyst

bath, south west england, united kingdom
Hybrid / WFH Options
Revoco
a Senior Cyber Security Engineer, you’ll play a key role in strengthening our security posture and driving continuous improvement across systems and networks. You will: Lead and implement vulnerability management programmes across multiple environments. Oversee incident response processes, from detection to resolution and post-incident review. Manage and optimise security tools , ensuring effective monitoring, detection, and prevention. Design … and maintain network security controls — including firewalls, intrusion detection/prevention, and segmentation. Conduct and oversee offensive security testing and vulnerability assessments. Ensure secure-by-design principles are embedded across development and infrastructure. Collaborate closely with engineering and product teams to identify and mitigate risks early. Contribute to a multidisciplinary cybersecurity taskforce , responding rapidly to emerging threats. 🧠 What We … re Looking For Strong understanding of OWASP Top 10 , MITRE ATT&CK , and evolving threat landscapes. Proven experience across vulnerability management, incident response, and network security . Ideally skilled in at least one programming language (e.g. Go, Python, Rust ). Experience managing or integrating security tooling (SIEM, endpoint protection, scanning tools, etc.). Hands-on experience with firewalls , network More ❯
Posted:
Vulnerability Assessment
10th Percentile
£41,250
25th Percentile
£46,875
Median
£57,500
75th Percentile
£73,125
90th Percentile
£84,500