Permanent Vulnerability Assessment Job Vacancies

26 to 50 of 657 Permanent Vulnerability Assessment Jobs

Penetration Tester

United Kingdom
Inspirec
assessing, and mitigating security risks across various platforms. The consultant will play a critical role in evaluating and strengthening our clients’ cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with industry best practices. Provide expert … reports on penetration testing findings, including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerability management, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit, Burp Suite, Nessus, and Wireshark. Strong … understanding of network protocols, firewall configurations, and secure network design. Proficiency in scripting languages (e.g., Python, Bash, PowerShell) to automate tasks and streamline processes. Hands-on experience of vulnerability assessments, Incident response, penetration testing, threat hunting and compromise assessment. Experience collaborating with Sales teams as a pre-sale's cyber security consultant. Experience working in Energy or Construction industry More ❯
Posted:

Security Engineer

England, United Kingdom
Hybrid / WFH Options
Cerebras
and remediate application and cloud security vulnerabilities (e.g., XSS, SSRF, CSRF, CORS, SQL Injection, broken authentication/authorization, encryption flaws). Provide expert guidance on secure coding practices, common vulnerability classes (e.g., OWASP Top 10), and threat modeling for modern web applications. Conduct security reviews of design and architecture documents; lead threat modeling exercises using frameworks such as STRIDE … tooling (e.g., Burp Suite, ZAP, Amass, Nmap). Assess and mitigate static (SAST) and dynamic (DAST) vulnerabilities across services and components. Evaluate, implement, and maintain security tooling to support vulnerability management, secure development, and event detection workflows. Define and track metrics related to application security, vulnerability remediation, detection coverage, and incident response effectiveness. Support compliance initiatives (e.g., SOC … and log analysis. Proficient in log analysis, SIEM usage/configuration, threat hunting, and querying tools to support detection and response. Familiarity with static and dynamic analysis techniques and vulnerability mitigation. Strong understanding of modern cloud platforms-especially AWS-and cloud-native security practices. Experience conducting penetration tests, vulnerability assessments, and network scans. Excellent communication and collaboration skills More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SecOps Engineer

Bristol, Gloucestershire, United Kingdom
Unite Foundation
secure network architectures. Monitor network traffic for suspicious activity and respond to security incidents. Conduct regular network security assessments and audits to ensure compliance with security policies and standards. Vulnerability Analysis: Conduct regular vulnerability assessments and penetration testing to identify and mitigate security risks. Develop and implement strategies to address vulnerabilities. Track and report on the status of … are properly configured and updated. Evaluate and recommend new security tools and technologies to enhance security operations. Documentation: Create and maintain detailed documentation of security incidents, forensic analysis, and vulnerability assessments. Prepare reports for management and stakeholders. Collaboration: Work closely with other IT and Digital teams to ensure comprehensive security coverage. Provide security guidance to projects and programs as … solutions. Network Security: Strong understanding of network protocols, VPNs, and network security architecture. Incident Response: Ability to detect, analyse, and respond to security incidents, including forensics and malware analysis. Vulnerability Management: Experience in identifying, assessing, and mitigating vulnerabilities in systems and applications. Automation: Skills in scripting and automation for security tasks (e.g. Python, PowerShell). Information Security Frameworks: Working More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT, Security & Compliance Manager

Islington, England, United Kingdom
Futureheads
line Helpdesk support to internal users Ensure business continuity and disaster recovery plans are maintained and tested Cybersecurity Management Implement and maintain security policies (e.g., access control, password management, vulnerability management) Monitor and respond to cybersecurity threats and incidents Oversee system patching, endpoint protection, and network security controls Lead periodic penetration tests and vulnerability assessments Manage risk assessments More ❯
Posted:

Cloud Security Architect

London, England, United Kingdom
UBDS Digital
policies, standards, and procedures to ensure compliance with regulatory requirements Collaborate with clients to understand their security needs and provide tailored solutions Lead security assurance activities, including risk assessments, vulnerability assessments, penetration testing, and threat modelling techniques such as MITRE ATT&CK, STRIDE, DREAD, and PASTA Provide expert guidance on security controls and measures to protect cloud infrastructure and … Cloud Security Consultant, Google Cloud Professional Services London, England, United Kingdom 1 week ago IT Security Solution Architect - Director London, England, United Kingdom 2 weeks ago Senior Security Analyst - Vulnerability Management Senior Cloud Security Architect - AWS, Landing Zone, IAM Network and Endpoint Security Pre-Sales Architect - London Enterprise Security Architect, Strategic Accounts London, England, United Kingdom 2 weeks ago More ❯
Posted:

Security Engineer

Leeds, England, United Kingdom
Maples Group - Legal Services
risk management, etc Assist with the design, engineering and management of automations to improve workflows and inefficiencies related to security processes Assists in responding to audits, penetration tests and vulnerability assessments Develop, manage, and measure KPIs, KRIs and additional metrics to understand the trends, quality, and insights from the vulnerability detection results to facilitate business decisions, automation development More ❯
Posted:

Head of Information Security

London, England, United Kingdom
Eames Consulting
and maintain a robust Cyber Security strategy in line with business objectives and regulatory requirements (e.g., FCA, ISO 27001, NIST). Lead security operations, including monitoring, incident response, and vulnerability assessments. Ensure top-tier security for Azure Cloud environments, including Microsoft Defender, Sentinel, and Entra ID solutions. Manage audits, compliance, and supplier security profiles, ensuring adherence to industry standards. More ❯
Posted:

ASPIRE Global Service Centre Vulnerability & Security Compliance Lead

Belfast, UK
Version 1
we utilise the best digital capabilities of the ServiceNow ITSM tooling product to provide the very best Experience to our Customers. We are seeking an experienced and results-driven Vulnerability & Security Compliance Lead who plays a critical role in ensuring the security and reliability of our customers IT infrastructure. This role is responsible for leading efforts to identify, assess … applications. Coordinate and implement regular patching cycles while minimizing downtime and disruption to business operations. Coordinate the testing of patches prior to deployment to validate functionality and compatibility. Utilize vulnerability scanning tools to identify weaknesses in the IT environment. Analyze and prioritize vulnerabilities based on risk impact and business-criticality. Oversee and enforce best practice for security hygiene; access … reviews, vulnerability assessment, key rotation, etc Collaborate with internal teams to remediate identified vulnerabilities in a timely and efficient manner. Ensure compliance with regulatory requirements, internal policies, and industry standards related to patching and vulnerability management Generate reports on vulnerability status, patching progress, and key metrics for senior leadership and audit purposes. Act as a point More ❯
Posted:

Vulnerability & Security Compliance Lead

Belfast, Northern Ireland, United Kingdom
Version 1
we utilise the best digital capabilities of the ServiceNow ITSM tooling product to provide the very best Experience to our Customers. We are seeking an experienced and results-driven Vulnerability & Security Compliance Lead who plays a critical role in ensuring the security and reliability of our customers IT infrastructure. This role is responsible for leading efforts to identify, assess … applications. Coordinate and implement regular patching cycles while minimizing downtime and disruption to business operations. Coordinate the testing of patches prior to deployment to validate functionality and compatibility. Utilize vulnerability scanning tools to identify weaknesses in the IT environment. Analyze and prioritize vulnerabilities based on risk impact and business-criticality. Oversee and enforce best practice for security hygiene; access … reviews, vulnerability assessment, key rotation, etc Collaborate with internal teams to remediate identified vulnerabilities in a timely and efficient manner. Ensure compliance with regulatory requirements, internal policies, and industry standards related to patching and vulnerability management Generate reports on vulnerability status, patching progress, and key metrics for senior leadership and audit purposes. Act as a point More ❯
Posted:

Security Analyst

York, England, United Kingdom
Darkshield Technologies Ltd
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, incident response, and compliance. Our mission is to protect businesses from cyber threats by delivering tailored security solutions that keep them resilient and secure. The Role … threats and attack techniques, and the ability to implement effective security controls to mitigate risks. This role involves proactively monitoring security events, investigating potential breaches, and supporting clients with vulnerability management and security best practices. About You You are passionate about cybersecurity and have a strong ability to think critically, solve complex problems, and anticipate security threats before they … to mitigate security risks. Conduct digital forensics and root cause analysis on security breaches. Work closely with internal teams and clients to ensure swift containment and resolution of threats. Vulnerability Management & Security Operations Perform regular vulnerability scans and assessments, identifying security gaps and misconfigurations. Recommend and implement security improvements based on assessment findings. Optimize security configurations and More ❯
Posted:

Senior Information Security Analyst (ASM/VM)

Edinburgh, Scotland, United Kingdom
Cirrus Logic, Inc
Cirrus Logic an exceptional place to grow your career! We are seeking a highly motivated, seasoned security professional to join Information Security as a Senior Attack Surface Management/Vulnerability Management Information Security Analyst. You will be responsible for managing the scanning architecture, as well as the program to identify, analyze, prioritize, and mitigate security vulnerabilities in our digital … assets to enhance cybersecurity and protect sensitive data. This role supports business strategy in a dynamic environment. Responsibilities: Vulnerability Assessment: Conduct regular vulnerability assessments to identify security weaknesses in our systems, applications, and network infrastructure. Risk Analysis: Analyze and prioritize vulnerabilities based on risk level and potential impact on the organization. Mitigation Strategies: Develop and implement effective … with the incident response team to investigate and respond to security incidents, ensuring swift resolution and minimizing damage. Security Tools: Manage and maintain security tools and technologies used for vulnerability management, including scanning tools. Security Policies: Develop and enforce security policies, standards, and best practices to ensure compliance with industry regulations and internal security requirements. Reporting: Prepare detailed reports More ❯
Posted:

Cyber Security Analyst R2 (Visa Sponsorship Available)

Bradford, England, United Kingdom
Hybrid / WFH Options
Techwaka
are seeking a motivated Cyber Security Analyst R2 to join our client's security team. In this role, you will be responsible for monitoring and analyzing security incidents, performing vulnerability assessments, and implementing security measures to protect the organization’s systems and data. You will work closely with cross-functional teams to ensure compliance with security policies and procedures. … Key Responsibilities: Monitor network and system activities for suspicious behavior and potential security breaches Conduct regular vulnerability assessments and penetration testing to identify security weaknesses Respond to security incidents and provide detailed analysis and reporting on findings Collaborate with IT and other departments to implement effective security controls and measures Stay updated on the latest cyber threats, vulnerabilities, and … security principles, frameworks, and best practices Experience with security monitoring tools (SIEM, IDS/IPS, etc.) and incident response Familiarity with network protocols, firewalls, and encryption technologies Knowledge of vulnerability assessment tools and techniques (e.g., Nessus, Qualys) Proficient in scripting languages (Python, Bash, etc.) for automation of tasks Strong analytical and problem-solving skills, with attention to detail More ❯
Posted:

Deputy CISO

London, England, United Kingdom
Hays
support JRC members in decision-making processes. Hands-On Security Experience: Take an active role in the day-to-day management of security operations, including incident response, threat hunting, vulnerability management, and other proactive measures. Provide expertise in implementing technical security solutions and ensuring they align with organisational goals. Assist with the management of security tools, systems, and processes … policies and practices align with operational goals and Legal/regulatory requirements. Contribute to the development of training programs to raise awareness about information security within the organisation. Risk Assessment & Mitigation: Conduct risk assessments of business processes and applications to identify security gaps and recommend solutions. Track, manage, and mitigate risks identified through internal and external audits, vulnerability … Skills: Deep understanding of security frameworks (e.g., NIST, ISO 27001, CIS Controls, etc.). Practical experience with security tools such as SIEM, firewalls, IDS/IPS, endpoint protection, and vulnerability scanners. Proficiency in risk management practices and tools. Knowledge of cloud security, network security, and data protection technologies. Policy & Standards Expertise: Extensive experience in writing, reviewing, and implementing information More ❯
Posted:

Cyber Defence Analyst

Nottingham, Nottinghamshire, United Kingdom
Hybrid / WFH Options
Experian Group
As a Cyber Defence Analyst, you will join the Cyber Fusion Center, performing in-depth analysis, assessment, and response to security threats by following documented policies to meet Service Level Goals. The team provides global 24x7 security operations and monitoring for cybersecurity events affecting Experian. You will be a part of the first line of defence in Experian's … departments, responsible for receiving and prioritizing cybersecurity alerts, including being the dedicated contact for potential security incidents reported by users (e.g., Experian employees). Depending on the results of assessment, this team is then responsible for investigating, containing, eradicating, and recovering from events falling in its scope or escalating higher-risk events to dedicated incident response and management teams … security tools including Defender for Cloud, GuardDuty, CloudTrail, or CloudWatch. System administration on Unix, Linux, or Windows Network forensics, logging, and event management Defensive network infrastructure (operations or engineering) Vulnerability assessment and penetration testing concepts Malware analysis concepts, techniques, and reverse engineering In-depth knowledge of network and host security technologies and products (such as firewalls, network IDS More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

CNO Analyst/Engineer 2 with Security Clearance

Maryland, United States
Caribou Thunder, LLC
and support to junior engineers and analysts on the team, fostering an environment of continuous learning and professional growth. QUALIFICATIONS 1. Demonstrated expertise in network security analysis, reverse engineering, vulnerability assessment, and exploit development. 2. Proficiency in programming languages such as Python, C, C++, and scripting languages relevant to CNO tasks. 3. Strong knowledge of networking protocols, operating More ❯
Employment Type: Permanent
Salary: USD 135,000 Annual
Posted:

Cybersecurity Analyst with Security Clearance

Hampton, Virginia, United States
Marathon TS Inc
TS is looking for a Cybersecurity Analyst to support our efforts at DISA. Key Responsibilities: Detection/Monitoring : Continuously monitor and analyze systems for unusual activity and potential threats. Vulnerability Assessments : Conduct regular vulnerability assessments and penetration testing to identify and address security weaknesses. Incident Response : Investigate security breaches and other cybersecurity incidents, providing timely and effective responses. … operating systems (e.g., Windows, Linux). Strong knowledge of cybersecurity principles, tools, and techniques. Experience with security information and event management (SIEM) systems (e.g. Splunk). Proficiency in conducting vulnerability assessments using ACAS. Security or equivalent certification (DoD 8570 for IAT). Quick learner and team player. Desired Skills & Qualifications: IAT level III certification (CASP, CISA, CISSP, or GCIH More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Security Associate

City of London, London, United Kingdom
Hybrid / WFH Options
BRITISH ARAB COMMERCIAL BANK PUBLIC LIMITED COMPANY
security related requests Assist with the collection, collation and presentation of assurance that the Banks security controls are operating as intended and within the Banks risk tolerance (including organising vulnerability management and penetration testing exercises) Lead the Bank's collection, interpretation and dissemination of the current Cyber threat landscape and help with the identification of innovative controls and mitigations … how IT Security tooling such as Firewalls, AV, Proxies and IDS/IPS operate Familiar with the Microsoft stack including desktops, servers and cloud services. Understanding of Patching and Vulnerability management Experience Working with security technologies such as Firewalls, Proxies, IDS and AV Planning and scoping security vulnerability assessments and penetration tests Practical experience of developing and implementing More ❯
Employment Type: Permanent, Work From Home
Salary: £55,000
Posted:

DevSecOps Engineer - ONSITE

Loughton, Essex, England, United Kingdom
Hybrid / WFH Options
Profile 29
Office (WFO) role. This role will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC) using Terraform. Their ideal candidate … Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & Penetration Testing: Review Penetration Testing, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk assessments, and ensure regulatory compliance. … Required Strong expertise in Azure cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetration testing, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of DevOps pipelines (CI/CD More ❯
Employment Type: Full-Time
Salary: £80,000 - £100,000 per annum
Posted:

Security Architect

Gloucestershire, United Kingdom
Hybrid / WFH Options
SSR General & Management
security compliance and best practices, ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks … MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree More ❯
Employment Type: Permanent
Salary: GBP 85,000 Annual
Posted:

Security Architect

Bristol, Kendleshire, Gloucestershire, United Kingdom
Hybrid / WFH Options
SSR General & Management
security compliance and best practices, ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks … MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree More ❯
Employment Type: Permanent
Salary: £85000/annum
Posted:

Insider threat hunter with Security Clearance

Atlanta, Georgia, United States
TEKsystems c/o Allegis Group
controls to reduce unauthorized data transfers and improve visibility across cloud and on-prem environments. Conduct behavioral analysis and threat hunting using IOCs, TTPs, and threat intelligence feeds. Perform vulnerability assessments and risk analysis on high-value systems and personnel. Support compliance with NIST 800-53, DFARS , CMMC, and other regulatory frameworks. Engineer and maintain cybersecurity controls across IT … e.g., Code42, DTEX, UEBA platforms). Familiarity with NIST, DFARS, CMMC, and insider threat program frameworks (e.g., NISPOM, EO 13587). Strong understanding of incident response, threat hunting, and vulnerability management. Excellent communication skills and experience working cross-functionally with HR, legal, and compliance teams. One or more relevant certifications: CISSP, GCED, GCIH, GCFA, CEH, CySA+, or equivalent. Preferred More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Analyst

City of London, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
with internal and external audits relating to information security. Conducting security awareness training and education for staff and users on best practices and emerging trends in cyber security. Use vulnerability management to improve Infinigate’s security landscape. Performing risk assessments and vulnerability scans to identify and mitigate potential threats to the network, devices, applications, and data. Complete security … security architecture. Experience in key cloud and network security architecture. Good understanding of NIST Framework. Exposure to security monitoring technologies Being able to perform Root Cause Analysis Experience with vulnerability assessments Ability to discover, design and document security implementations. Good understanding of securing Cloud technologies through native and multi-cloud technologies. Performed Ethic Hacking, Intrusion Prevention techniques. Having a More ❯
Posted:

Senior System Administrator with Security Clearance

Washington, Washington DC, United States
LTS
Group Policy, and related services. Plan, schedule, and perform system patches, firmware upgrades, and security hardening in accordance with DISA STIGs, CIS Benchmarks, and NIST 800-53 controls. Conduct vulnerability assessments using tools such as Tenable.SC; remediate findings and document corrective actions. Administer centralized storage solutions, including SAN/NAS environments and perform backup and recovery operations using enterprise … security protocols and access controls, with hands-on experience configuring and managing firewalls, VPNs, IDS/IPS solutions, and network encryption technologies. Advanced proficiency with enterprise security tools and vulnerability management platforms (e.g., Nessus, Tenable.SC), and thorough understanding of compliance frameworks such as DISA STIGs and NIST SP 800-53. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

IT, Security & Compliance Manager

London, England, United Kingdom
Futureheads
line Helpdesk support to internal users Ensure business continuity and disaster recovery plans are maintained and tested Cybersecurity Management Implement and maintain security policies (e.g., access control, password management, vulnerability management) Monitor and respond to cybersecurity threats and incidents Oversee system patching, endpoint protection, and network security controls Lead periodic penetration tests and vulnerability assessments Manage risk assessments More ❯
Posted:

Information Security Analyst

Nottingham, England, United Kingdom
Boots
security policies, standards, and guidelines along with internal processes Implement and document new or enhanced security controls and system/process changes. Advise on and support penetration testing and vulnerability assessments across applications, systems, and networks. Conduct in-depth reviews of legacy systems to identify and remediate security gaps. Represent Information Security in project teams, ensuring alignment with security … recognized certifications such as CISSP, CISM, CompTIA Security+, CEH, or vendor-specific credentials (e.g., AWS Security, Microsoft SC-200). Experience with security tools and platforms (e.g., SIEM, DLP, vulnerability scanners). Familiarity with regulatory and compliance frameworks (e.g., ISO 27001, NIST, GDPR). Our benefits Boots Retirement Savings Plan Discretionary annual bonus Generous employee discounts Enhanced maternity/ More ❯
Posted:
Vulnerability Assessment
10th Percentile
£41,750
25th Percentile
£47,531
Median
£57,500
75th Percentile
£77,500
90th Percentile
£89,875