Permanent Vulnerability Management Jobs

1 to 25 of 139 Permanent Vulnerability Management Jobs

Cyber Security Engineer (IT digital systems)

South East, United Kingdom
Hudson Shribman
Engineer role will support the systems and applications that deliver enterprise security services for a global organisation. With a focus on identity and access management, the Security Engineer will provide expert knowledge to support the planning, design, development, and deployment of centralized IAM and PAM solutions and the delivery … of the enterprise-level Privileged Access Management program. The role will also support the implementation and management of all cyber security technologies and services in use at the company Role & Accountabilities KEY Identity access management, experience/involvement with Security services such as SIEM and Vulnerability … a subject matter expert on key principles of (IAM) with an in-depth knowledge in the areas of authentication and authorization systems, identity lifecycle management, and identity governance. Build the IAM strategy, and ensure its implementation is a success across the business. Staying up-to-date on current IAM more »
Employment Type: Permanent
Salary: £49000 - £61000/annum
Posted:

Senior Cybersecurity Engineer

Philadelphia, Pennsylvania, United States
Comcast Corporation
privacy controls are effectively implemented. Job Description Core Responsibilities Assesses and helps drive implementation of Cybersecurity controls and procedures related to Secure Development Lifecycle, Vulnerability Management and Privacy progra m s. Uses security skills and knowledge to provide remediation guidance . Applies system architecture, design and specification within … overall committed timelines are met. Qualifications, Skills & Experience s : Experience with assessing Cyber r isk s and i mpact analysis Experience with Vuln erability Management , Patch Management, CVE s Background with researching emerging threat s such as Malware, Ransomware, Data exfiltration, DDoS, etc Background with Threat Modeling or … Cloud and Containers Background with Network Protocol s at all layer , ability to troubleshoot network/connectivity issues Understands security concepts such as access management, security configurations, firewall , acls , endpoint protection, technology resiliency, etc. Experience with operations at scale, H/A architecture and strategies Experience with analyzing large more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Vulnerability REG Remediation Lead ( Remote)

Atlanta, Georgia, United States
Hybrid / WFH Options
Cognizant
V ulnerability REG Remediation Leader Location : Atlanta GA/Remote Roles and responsibilities :- • Business Acumen: Expert knowledge of vulnerability management and the stakeholders engaged to deliver it • Best Practices: Proven track record of implementing FFIEC, NIST and CRI frameworks to assess gaps and deploy solutions • Business Outcomes: Experience … Prepares, orchestrates, and presents complex messages in simple terms to IT, business and regulatory leaders SNo Primary Skill Proficiency Level Rqrd./Dsrd. 1 Vulnerability Management PL1 Required 2 Networking PL4 Required 3 Qualys PL4 Required 4 Cyber Security & Cloud PL1 Required 5 Oracle Linux PL4 Desired Salary more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cloud Operations Engineer

Westminster, Colorado, United States
Maxar Technologies
monitoring, alerting, and metrics from log aggregators and data collectors. Provide a collaborative conduit between security focused and development focused teams. Provide configuration and vulnerability management support for production applications and custom code. Minimum Requirements: Must be a U.S. citizen and be willing and able to obtain a … experience may be substituted for a degree. Experience automating, running and maintaining a variety of security tool types (some combination of i.e. monitoring, compliance, vulnerability detection, intrusion detection and prevention, change management and detection, code analysis, etc.) CompTIA Security+ or other DoDD 8140 certification Experience with custom source more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Engineer, PAM Cyberark 2 days PW Reading - £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What We more »
Employment Type: Permanent
Salary: £40,000
Posted:

Cyber Threat & Vulnerability Analyst

Reading, England, United Kingdom
The People Network
Cyber Threat & Vulnerability Analyst – Reading/Hybrid up to £50k + Benefits An opportunity for a Cyber Threat & Vulnerability Analyst to join the team of a growing Cyber Security team at a large enterprise serving millions of customers! The business is making a big investment in Cyber and … impact and have your voice heard! In this role, you will be responsible for supporting the design, implementation, and maintenance of the Cyber Threat & Vulnerability Management solutions, controls, and processes across the business. Your responsibilities will be but not limited to: Support vulnerability management across the … infrastructure Investigate newly identified Cyber Security vulnerabilities and provide appropriate mitigation actions Work closely with technology and business stakeholders about Cyber Security patching and vulnerability management issues/actions Perform proactive threat hunting for new and emerging cyber threats Maintain dashboards with Cyber Security threat and vulnerability more »
Posted:

Tenable Nessus Engineer

United Kingdom
GlobalLogic UK&I
Tenable product suite (Security Centre, Nessus scan engines, Tenable.io) and peripherals with Engineering. Local and network credentials Tenable Security Centre and provisions access to vulnerability scanning systems. Integration of Nessus/Security Centre with other security and IT systems management tools (i.e. Splunk, ServiceNow) Developing and maintaining standard … processes and operating procedures, creating technical architecture diagrams and system build documentation. Operating the scanning tools and maintaining coverage along with supporting the vulnerability management and remediation teams in understating how to remediate vulnerabilities (i.e. laptops, VMs, wireless devices) Experience of vulnerability management team to build … relating to security tools/solutions. Improving customers' security deployments and integrate new technologies and services. Technical Skills & Competencies 5+ years of experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues 2+ years of experience with more »
Posted:

IT Systems Administrator

Bath, England, United Kingdom
Hybrid / WFH Options
Peaple Talent
as a System Administrator, Infrastructure Engineer, or similar role at a minimum of 2nd line level. MS Azure knowledge, with experience of: Entra ID Management Azure storage accounts Azure Virtual Desktop (AVD) Azure Virtual machine management MS Exchange Management (Ideally Exchange Online) On-premises infrastructure experience including … Building and configuration of MS Windows Servers Active Directory domain knowledge Hypervisor virtualisation management (ideally VMWare) Backup solutions (ideally VEEAM) Desirable: Knowledge and experience of: MS 365 applications e.g. SharePoint, Teams, OneDrive, etc. SSL certificate management Vulnerability management SIEM experience (Ideally MS Sentinel) Infrastructure As Code more »
Posted:

IT Infrastructure Security Engineer

Greater Cheshire West and Chester Area, United Kingdom
Hybrid / WFH Options
psd group
take ownership of identifying signs of compromise in cyber security services, IT systems, and related infrastructure. This will be a hands-on approach to vulnerability management reduction across all IT Systems and you will work with the SOC to assist in the coordination and management of cyber … log storage are provided to the Cyber Security team. Working alongside the Cyber Security Team, take ownership and develop a hands-on approach to vulnerability and threat management reduction across all IT Systems. Monitor changes in cyber security threats, and appropriately respond to changes in threat profile. Identify … requests, use of new software or hardware facilities and report findings to the Cyber Security Team. Take ownership and a hands-on approach to vulnerability management reduction across all IT Systems Essential Skills & Experience: Experience with analysing event logs and recognizing cyber intrusions or attacks. Experience using tools more »
Posted:

Security Engineer

London Area, United Kingdom
TRIA
cover all areas of security, covering support on projects that require security input (Design and concept) and BAU projects. Areas will cover things like vulnerability management, network security, and general security support. Experience required: Security/Cyber Security Generalist Background in IT Support CISSP or an equivalent qualification … Strong understanding of Servers Vulnerability Management Network Security Desirable but not required: Qualis Zscaler DLP Access Management (IAM/PAM) Please apply directly and we will be in touch to provide further information more »
Posted:

Cyber Security Lead / Head of Cyber 'Hands on'

London Area, United Kingdom
Radius
success of our security function. As such, you will provide the day-to-day technical expertise and guidance on security operations activities, such as vulnerability management, major incident response, and security monitoring improvements. Perform requirements analysis following customer engagements. Design, architect, and deliver security projects. Document and transition … or vCISO, consulting to external clients (delivering workshops and reporting sessions). Experience in overseeing and leading remediation of security assessments, technical testing, and vulnerability analysis including Cyber Essentials, Cyber Essentials Plus, and NIST CSF. Hands-on experience in delivering security projects, including implementation and post-implementation support, providing … both leading the function and people. Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft XDR stack, vulnerability management tools, SIEMs including Sentinel. more »
Posted:

IT Infrastructure Manager

Northamptonshire, England, United Kingdom
Tech4
and critical thinking techniques. Solid understanding of IT security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerability management, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments; willingness to share knowledge … knowledge in the use and support of M365 suite particularly Excel, Word, Teams and SharePoint. Essential Criteria Significant experience in a leadership or technical management role is crucial - this includes all elements of managing and motivating technical teams. Significant experience of project management in a technical management more »
Posted:

Data Security Manager

London Area, United Kingdom
Arcus Search
you. Join them by being a key player in their innovative and forward-thinking team! Responsibilities: Partner with key stakeholders from Global Technology, Risk Management, Data Protection Officer, and Information Security to ensure products and processes are compliant, resilient, and audit-ready Ensure products comply with GDPR, CFIUS, and … end ownership of Data Controls projects to achieve success with relevant stakeholders Manage current projects related to Cloud Secure Design and Data Access Rights Management improvement to proactively meet future strategic requirements, focusing on Process, People, and Technology Strong communication and negotiation skills are essential to ensure that key … Proven business acumen and commercial awareness Experience with the '3 Lines of Defense' Governance Model Working knowledge of IT security best practices, penetration testing, vulnerability management, Incident, Problem & Change Management, and Business Continuity Robust experience in project management, analytical skills, and continuous improvement methodologies Strategic thinking more »
Posted:

Security Operations Center Analyst

London Area, United Kingdom
Hybrid / WFH Options
Bestman Solutions
Threat Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security Penetration Testing Security Automation (SOAR) Qualifications: Knowledge and experience in the following: SIEM Tools Vulnerability Management EDR Software Intrusion Detection/Prevention Systems Web Proxies Network Security & Firewalls Programming – Nice to have! More details: Permanent role 2 days more »
Posted:

Security Operations Specialist

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerability management platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
Posted:

Cloud Infrastructure Engineer

Bath, England, United Kingdom
Hybrid / WFH Options
Peaple Talent
Azure Landing Zones Azure architecture Azure Entra ID (Enterprise applications, conditional access etc.) Azure storage accounts Azure Virtual Machines Azure performance, security, and cost management MS365 Applications with certification and/or demonstrable experience of: Sharepoint MS Exchange Online On-prem infrastructure experience including: Building and configuration of MS … Windows Servers Active Directory domain knowledge Hypervisor virtualisation management (ideally VMWare) Backup solutions (ideally VEEAM) Infrastructure performance monitoring Additional Technologies: Vulnerability Management SIEM Technologies Powershell Infrastructure As Code (ideally Terraform and Ansible) Essential Desirable Knowledge and Experience: SQL Networking experience (Cisco switch, firewalls) Cisco Umbrella Nutanix Hyperconverged more »
Posted:

Security Analyst

Manchester Area, United Kingdom
Gravitas Recruitment Group (Global) Ltd
pension contributions, flexible working, in house L&D, 28 days holiday +BH Skills required for this role: - Experience working with SIEM solutions (ideally Sentinel) - Vulnerability management (Nessus) - Incident Response - Implementing appropriate mediation Desirables: - SC Clearance - Large guideline expérience (ISO27001, Cyber Essentials, etc) This role gives the right candidate more »
Posted:

Application Security Lead

London, England, United Kingdom
Mastercard
innovation and delivers better business results. Title and Summary Application Security Lead Overview This is an exciting opportunity to be part of an expanding Vulnerability Management function at Vocalink Limited, a company that enables the payments of 90% of salaries, 70% of utility bills, most ATM transactions and … and breaches related to applications. All About You • Proven experience in application security, including hands-on experience with secure coding practices, code review, and vulnerability assessment tools. • Strong understanding of software development methodologies, programming languages, and web technologies. • Experience leading or managing a team of security professionals. • Excellent communication more »
Posted:

Senior Offensive Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
undocumented network protocol or the grammar of a new programming language. Other responsibilities includes as below Scope and execute in-depth security assessments and vulnerability research across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic … achieving long term goals (for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances … analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerability management, risk assessments, bug bounty hunting, malware analysis, forensics OSCP, OSWE certification, or interest in achieving certification Experience navigating and working with extremely more »
Posted:

Information Security Consultant

City Of London, England, United Kingdom
Barclay Simpson
security risk for the whole project life cycle Perform security activities, including but not limited to, security design reviews, risk assessments, threat modelling, and vulnerability management and risk mitigation on internally & externally developed software Embedding security within DevOps (eg CI/CD pipelines), developing security requirements On-demand more »
Posted:

SOC lead

Greater Manchester, England, United Kingdom
Gamma
different data sources and tools for analysis. · Previous experience of mentoring or leading SOC analysts is desirable but not essential. · Experience of risk-based vulnerability management is desirable. What do we offer? 25 days PTO + bank holidays Your birthday off Private Medical Insurance Electric Vehicle (EV) scheme more »
Posted:

Full Stack Engineer

London Area, United Kingdom
Glocomms
to the design and architecture of the front-office application. Understand CI/CD pipelines and deploy the UI into production. Familiarize yourself with vulnerability management. Qualifications and Skills: Strong experience in React development. Proficiency in TypeScript, JavaScript, and possibly Java. Familiarity with low-latency systems and financial markets more »
Posted:

Solutions Designer - Operational Technology

Portsmouth, England, United Kingdom
Hybrid / WFH Options
TalentHawk
for a contract position. The ideal candidate will have experience in software, hardware, network, and Operational Technology (OT) . Key Projects: OT Asset Discovery & Vulnerability Management OT AD Audit Tool Both projects are currently at the high-level design stage. The successful candidate will be responsible for advancing more »
Posted:

Information Security Risk and Compliance Engineer

Bellevue, Washington, United States
Hybrid / WFH Options
The Pokémon Company International
International The Pokémon Company International, a subsidiary of The Pokémon Company in Japan, manages the property outside of Asia and is responsible for brand management, licensing, marketing, the Pokémon Trading Card Game, the animated TV series, home entertainment, and the official Pokémon website. Pokémon was launched in Japan in … with internal and external stakeholders to resolve compliance issues. Maintain up-to-date knowledge of industry regulations and trends. Prepare and present reports to management on overall compliance status. Provide security expertise and consulting to partner teams in Tech and across the enterprise. Alongside the Information Security team, responsible … or similar enterprise applications. Experience with securing technology solutions relating to a company's supply chain. Strong knowledge in the application of Identity & Access Management, Segregation of Duties, and Least Privilege concepts. Familiarity with process improvement methodology. Up to date with security attacks and latest security research. Excellent analytical more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Tenable Nessus Vulnerability Management Scanning Engineer

England, United Kingdom
Hybrid / WFH Options
GlobalLogic
Tenable Nessus Vulnerability Management Scanning Engineer GlobalLogic have a new role for an Vulnerability Management Scanning Enginee r with Tenable Nessus expertise. This role is working INSIDE IR35 for an initial 6 months and will be a Hybrid working pattern, 2 days per week onsite at … either Cheshire or Glasgow offices. Any Banking or financial services experience would be an advantage. The core skill is Tenable Nessus Vulnerability Management, and we are looking for someone who can be responsible for maintaining the Tenable product suite and ensure meeting scanning coverage across the organisation .The … ideal candidatehas the following skills and expertise: years of experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues years of experience with performing systems administration in Windows, Linux, VMware environments, including performing troubleshooting, installation or configuration more »
Posted:
Vulnerability Management
10th Percentile
£40,000
25th Percentile
£50,000
Median
£65,000
75th Percentile
£85,000
90th Percentile
£97,500