Remote Permanent Vulnerability Management Jobs

26 to 49 of 49 Permanent Vulnerability Management Jobs with Remote Work Options

SOC Engineer

Doncaster, England, United Kingdom
Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ✨Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ✨Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and Vulnerability Management tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
Posted:

Security Operations Specialist

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerability management platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
Posted:

Security Technology Architect - Northeast

Connecticut, United States
Hybrid / WFH Options
Lumen
in highly complex corporate IT infrastructure environments. Working knowledge is expected in multiple security disciplines including: MEDR Managed SIEM SOC Services SASE Incident Response Vulnerability Management Security Strategy and Architecture consulting Security Awareness and Training Data Protection Able to successfully interact with audiences that may include senior executives more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security IT Analyst

England, United Kingdom
Hybrid / WFH Options
Larbey Evans
latest security principles, techniques, and protocols Detailed technical knowledge related to endpoints, servers, infrastructure and networking technologies Strong experience in supporting security systems, including vulnerability management, SIEM, DLP,SOAR, EDR solution, Network Firewalls etc. Working knowledge of IT processes (i.e., ITIL) including incident, problem, defect, change and release … management The Cyber Security IT Analyst requirements: 3+ years’ experience in Cyber Security IT operations (law firm preferable, professional services advantageous) Bachelor’s degree or higher in Computer Science or Information Security (essential) Advanced ability to organize, prioritize, coordinate, and work as part of a team Excellent written and more »
Posted:

Cloud Infrastructure Engineer

Bath, England, United Kingdom
Hybrid / WFH Options
Peaple Talent
Azure Landing Zones Azure architecture Azure Entra ID (Enterprise applications, conditional access etc.) Azure storage accounts Azure Virtual Machines Azure performance, security, and cost management MS365 Applications with certification and/or demonstrable experience of: Sharepoint MS Exchange Online On-prem infrastructure experience including: Building and configuration of MS … Windows Servers Active Directory domain knowledge Hypervisor virtualisation management (ideally VMWare) Backup solutions (ideally VEEAM) Infrastructure performance monitoring Additional Technologies: Vulnerability Management SIEM Technologies Powershell Infrastructure As Code (ideally Terraform and Ansible) Essential Desirable Knowledge and Experience: SQL Networking experience (Cisco switch, firewalls) Cisco Umbrella Nutanix Hyperconverged more »
Posted:

Cyber Security Engineer

Birmingham, West Midlands, West Midlands (County), United Kingdom
Hybrid / WFH Options
Delaney & Bourton
approach threat actors take to attacking a network, phishing, port scanning, web application attacks, DDoS, lateral movement. Experience with security monitoring, incident response, and vulnerability management. Understanding of malware analysis, intrusion detection/prevention systems, and endpoint security solutions. Ability to analyze and interpret security logs and data. Role more »
Employment Type: Permanent
Salary: £55000 - £65000/annum + Benefits Package
Posted:

Information Security Risk and Compliance Engineer

Renton, Washington, United States
Hybrid / WFH Options
The Pokémon Company International
International The Pokémon Company International, a subsidiary of The Pokémon Company in Japan, manages the property outside of Asia and is responsible for brand management, licensing, marketing, the Pokémon Trading Card Game, the animated TV series, home entertainment, and the official Pokémon website. Pokémon was launched in Japan in … with internal and external stakeholders to resolve compliance issues. Maintain up-to-date knowledge of industry regulations and trends. Prepare and present reports to management on overall compliance status. Provide security expertise and consulting to partner teams in Tech and across the enterprise. Alongside the Information Security team, responsible … or similar enterprise applications. Experience with securing technology solutions relating to a company's supply chain. Strong knowledge in the application of Identity & Access Management, Segregation of Duties, and Least Privilege concepts. Familiarity with process improvement methodology. Up to date with security attacks and latest security research. Excellent analytical more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Risk and Compliance Engineer

Tacoma, Washington, United States
Hybrid / WFH Options
The Pokémon Company International
International The Pokémon Company International, a subsidiary of The Pokémon Company in Japan, manages the property outside of Asia and is responsible for brand management, licensing, marketing, the Pokémon Trading Card Game, the animated TV series, home entertainment, and the official Pokémon website. Pokémon was launched in Japan in … with internal and external stakeholders to resolve compliance issues. Maintain up-to-date knowledge of industry regulations and trends. Prepare and present reports to management on overall compliance status. Provide security expertise and consulting to partner teams in Tech and across the enterprise. Alongside the Information Security team, responsible … or similar enterprise applications. Experience with securing technology solutions relating to a company's supply chain. Strong knowledge in the application of Identity & Access Management, Segregation of Duties, and Least Privilege concepts. Familiarity with process improvement methodology. Up to date with security attacks and latest security research. Excellent analytical more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Risk and Compliance Engineer

Redmond, Washington, United States
Hybrid / WFH Options
The Pokémon Company International
International The Pokémon Company International, a subsidiary of The Pokémon Company in Japan, manages the property outside of Asia and is responsible for brand management, licensing, marketing, the Pokémon Trading Card Game, the animated TV series, home entertainment, and the official Pokémon website. Pokémon was launched in Japan in … with internal and external stakeholders to resolve compliance issues. Maintain up-to-date knowledge of industry regulations and trends. Prepare and present reports to management on overall compliance status. Provide security expertise and consulting to partner teams in Tech and across the enterprise. Alongside the Information Security team, responsible … or similar enterprise applications. Experience with securing technology solutions relating to a company's supply chain. Strong knowledge in the application of Identity & Access Management, Segregation of Duties, and Least Privilege concepts. Familiarity with process improvement methodology. Up to date with security attacks and latest security research. Excellent analytical more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Risk and Compliance Engineer

Seattle, Washington, United States
Hybrid / WFH Options
The Pokémon Company International
International The Pokémon Company International, a subsidiary of The Pokémon Company in Japan, manages the property outside of Asia and is responsible for brand management, licensing, marketing, the Pokémon Trading Card Game, the animated TV series, home entertainment, and the official Pokémon website. Pokémon was launched in Japan in … with internal and external stakeholders to resolve compliance issues. Maintain up-to-date knowledge of industry regulations and trends. Prepare and present reports to management on overall compliance status. Provide security expertise and consulting to partner teams in Tech and across the enterprise. Alongside the Information Security team, responsible … or similar enterprise applications. Experience with securing technology solutions relating to a company's supply chain. Strong knowledge in the application of Identity & Access Management, Segregation of Duties, and Least Privilege concepts. Familiarity with process improvement methodology. Up to date with security attacks and latest security research. Excellent analytical more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cloud Security Engineer (Azure / M365 / EDR)

United Kingdom
Hybrid / WFH Options
DGH Recruitment
record in high level delivery. Required Skills/Experience; - A broad range of technology experience including Cloud Security (Azure, 365 E5 suite), Internet Protection, Vulnerability Management, SIEM, Firewalls, CASB, WAF and EDR products. - Experience in managing, supporting, and improving enterprise security solutions with a strong understanding of the more »
Employment Type: Permanent, Work From Home
Salary: £70,000
Posted:

Senior Cloud Security Engineer (Azure/M365/EDR)

England, United Kingdom
Hybrid / WFH Options
DGH Recruitment Ltd
record in high level delivery. Required Skills/Experience; - A broad range of technology experience including Cloud Security (Azure, 365 E5 suite), Internet Protection, Vulnerability Management, SIEM, Firewalls, CASB, WAF and EDR products. - Experience in managing, supporting, and improving enterprise security solutions with a strong understanding of the more »
Employment Type: Permanent
Salary: GBP 70,000 Annual
Posted:

Information Security Consultant

Romsey, England, United Kingdom
Hybrid / WFH Options
CBSbutler Holdings
to a wide range of defence clients. You will contribute to the development of security capabilities ranging from Security & Assurance services to leading edge Vulnerability Management and Protective Monitoring capabilities. Based in Romsey/Gloucester (Remote working available) £55,000 - £60,000 per annum + 6% bonus Must … be eligible for Security Clearance Key Responsiblities: Production and maintenance of security documentation including, Secure by Design Documentation, Security Management Plans, RMADS, Security Operating Procedures, Security Cases and Test Security Instructions (TSI). Coordinate Security Risk Analysis and Management activity to support design and accreditation of solutions. This … includes creation and maintenance of the security risk register and management of Risk Balance Cases. Supporting the team lead in the development and deployment of cyber services. Acting as the Security SME for proposals and ITT/ITN responses. Working as part of an Integrated Delivery Team including: Technical more »
Posted:

Information Security Consultant

Romsey, Hampshire, South East, United Kingdom
Hybrid / WFH Options
CBSbutler Holdings Limited
to a wide range of defence clients. You will contribute to the development of security capabilities ranging from Security & Assurance services to leading edge Vulnerability Management and Protective Monitoring capabilities. Based in Romsey/Gloucester (Remote working available) £55,000 - £60,000 per annum + 6% bonus Must … be eligible for Security Clearance Key Responsiblities: Production and maintenance of security documentation including, Secure by Design Documentation, Security Management Plans, RMADS, Security Operating Procedures, Security Cases and Test Security Instructions (TSI). Coordinate Security Risk Analysis and Management activity to support design and accreditation of solutions. This … includes creation and maintenance of the security risk register and management of Risk Balance Cases. Supporting the team lead in the development and deployment of cyber services. Acting as the Security SME for proposals and ITT/ITN responses. Working as part of an Integrated Delivery Team including: Technical more »
Employment Type: Permanent, Work From Home
Salary: £60,000
Posted:

Azure SecOps Engineer

Bournemouth, Dorset, South West, United Kingdom
Hybrid / WFH Options
Interact Consulting Limited
pipelines and integrating security tooling. Scripting Responsibilities will include Lead efforts to assess the current security posture of Azure infrastructure, encompassing Azure resources, processes, vulnerability management tools, and techniques. Collaborate with the wider Infosec team and any third-party consultants engaged by the client to provide recommendations based … into CI/CD pipelines. Maintain an active risk registry and devise a plan to address identified issues in order of priority, ensuring proactive management of security risks. Please apply now. more »
Employment Type: Permanent, Work From Home
Posted:

Cyber Security Specialist

United Kingdom
Hybrid / WFH Options
Recruit with Purpose
security principles are applied during project design to reduce risk. Education, Qualifications & Experience Required: proficiency in security technologies such as Microsoft XDR stack and vulnerability management tools. in SIEMS (Azure Sentinel) and Powershell Automation. exposure to enterprise networking and infrastructure technologies. one of more relevant Cyber Security qualification more »
Posted:

Information Security Officer

Farnborough, England, United Kingdom
Hybrid / WFH Options
Shaw Daniels Solutions
with stakeholders, to uncover emerging risks and opportunities for malicious actors. Produce written reports, status updates, actions, minutes to support decision making within the management systems governance programme. Conduct annual Business Impact Assessments with relevant teams Ensure and track that staff get the infosec training required Annual infosec and … the document review period. Compile a list of actions to address any lapses and track to conclusion. Assist with the monitoring of our platform vulnerability management systems and logging of identified vulnerabilities In the event of any security event, be part of the response team, by providing infosec more »
Posted:

Presales Consultant

Manchester Area, United Kingdom
Hybrid / WFH Options
InfoSec People Ltd
Excellent understanding of cybersecurity trends Ability to interpret customer landscape and challenges Strong presentation and client-facing skills Desired Skills: Knowledge across EDR, SIEM, Vulnerability Management Operational experience with security technologies Existing relationships in Manchester area Self-motivation and ability to work autonomously Job Specifics: This is a more »
Posted:

Senior Cyber Security Analyst

Brighton, England, United Kingdom
Hybrid / WFH Options
Hays
infrastructure for the organisation. The role responsibilities: You will be supporting the Head of IT and Cyber Security with the day-to-day operational management of the cyber security function. You will work with the Senior Cyber Security Manager to define and evolve the cyber strategy across the organisation. … and analyse security incidents and breaches, and lead incident response efforts to contain and mitigate the impact in a timely manner. Reporting to senior management on Cyber related metrics and improvement needs. Foster a culture of security awareness and compliance amongst team members and stakeholders through training, education, and … initiatives. Leading any major cyber incidents should they arise. Escalating security concerns that are not being adequately addressed through the established risk/issue management framework. You will need: You will need to be able to influence and collaborate with other teams in the organisation, and the ability to more »
Posted:

Security Operations Manager

United Kingdom
Hybrid / WFH Options
Creditsafe
big and small but most importantly, opened up new avenues of data intelligence for businesses with machine learning, AI and connected data. From risk management through to opportunity identification, our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger … day activities of the Security Operations Centre (SOC) and Security Engineering teams. • Produce reports on key security metrics across Security Operations, Application Security and Vulnerability Management. • Conduct regular 1-2-1s, Performance Reviews, and Personal Development Plans of team members. • Develop and implement security policies, processes, and procedures … to comply with SOC2 and ISO27001 standards. • Participate in Steering groups for Identity and Access Management and Data Protection • Setting and aligning team objectives and tasks to help achieve the overall Information Security and Compliance function’s strategy and goals • Participate in Quarterly Business Reviews with our security tooling more »
Posted:

Presales Consultant

Manchester Area, United Kingdom
Hybrid / WFH Options
GS Solutions
have worked within a Networking/Security setting recently. Experience solutioning Cisco, Fortinet, Juniper, Palo Alto, Netskope, Zscaler, CrowdStrike (At-least two or more) Vulnerability Management/EDR/DDoS/WAF/PAM – Beneficial MUST have an excellent understanding of current cyber security trends. more »
Posted:

Security Operations Specialist

London Area, United Kingdom
Hybrid / WFH Options
Egress Software Technologies
Operations. The Team The three Egress security teams report to the Chief Information Security Officer (CISO), these are: Security Operations – the day-to-day management of operational processes and incidents Cyber Security – defining security best practice of technologies and internal pentesting Compliance & Risk – managing accreditations, auditing, and risk management … and manage all group security incidents. Whilst there are process aspects to the role there are two main areas of focus for the team: Vulnerability management. The team manage issues identified through internal and external vulnerability testing. Internally we use tools like Snyk (one of several tools available … vetting, Business Continuity Planning (BCP) and supplier onboarding. The wider security team work closely together with opportunities for cross-training and career development. The management team actively support personal development, with access to training tools such as Percipio, O’Reilly and Microsoft’s ESI. We are looking for a more »
Posted:

Solutions Designer - Utilities

Portsmouth, England, United Kingdom
Hybrid / WFH Options
TalentHawk
for a contract position. The ideal candidate will have experience in software, hardware, network, and Operational Technology (OT) . Key Projects: OT Asset Discovery & Vulnerability Management OT AD Audit Tool Both projects are currently at the high-level design stage. The successful candidate will be responsible for advancing more »
Posted:

Infrastructure Support Analyst – York (outskirts – hybrid/remote)

York, England, United Kingdom
Hybrid / WFH Options
Candour Solutions
skills: · Demonstrable experience in an IT infrastructure support or similar role. · Microsoft products (Windows, SCCM, O365, Intune, Azure, SQL) · VMWare (vCenter, ESX, Horizon) · Storage management and administration · Experience of configuring and troubleshooting TCP/IP networking, including switches, routers, firewalls, VLANs and VPNs · Understanding of ITIL And how you … externally provided IT services, including potential involvement with our customer-facing environments. · Maintain and manage the company’s IT security systems, including patching and vulnerability management. · Identify weaknesses in line with IT industry developments and implement improvements. · Monitor and manage backups, resolving any issues may that occur. · Implement IT more »
Posted:
Vulnerability Management
10th Percentile
£40,000
25th Percentile
£51,000
Median
£65,000
75th Percentile
£86,000
90th Percentile
£97,250