Permanent Vulnerability Management Jobs

26 to 50 of 87 Permanent Vulnerability Management Jobs

Technology Infrastructure Engineer

Nationwide, United Kingdom
Adecco
Zscaler support, managing security vulnerabilities, user accounts and privileges, and managing all Enterprise tooling (SAAS) requirements. The post holder will be responsible for security vulnerability management, testing & deployment of patches, supporting technical projects & provide technical guidance & support to other team members. Skills & Experience Can work autonomously as part … paced environment Cisco Meraki Hardware and cloud administration Networking experience (Proxy, LAN, WIFI, 802.1x, EAP) Zscaler Admin in ZIA, ZPA & ZDX including configuration and management of alerts Amazon Web Services admin including EC2 and S3 admin Domain management including setting up and maintaining SSL, DNS records Vulnerability and Security management with change control Good working knowledge of Virtual desktop environments HubSpot cloud - administration System Administration in Microsoft Stack (Azure AD, Endpoint MDM, Exchange, SharePoint) PowerShell/Linux scripting Windows, Apple macOS & iPad/iPhones device setup and configuration WordPress VIP backend support and administration Laptop more »
Employment Type: Permanent
Salary: £70000 - £80000/annum
Posted:

Cyber Security Engineer - Firewall

Teddington, London, United Kingdom
Matchtech
number of Cyber Security Engineers to join our client, a leading technology company. As a Cyber Security Engineer you will be focused on Firewall management, network security and Vulnerability Management. You will play a vital role in protecting our client's systems and data from cyber threats. About … the Role As a Cyber Security Engineer your primary responsibility will be Firewall Management, Network Security, Network Segmentation and Vulnerability Management. In addition, you will work closely with the Cyber Security Manager and Security Architect to independently resolve complex issues. Key Responsibilities Experience with enterprise networks including next … generation firwalls, network segmentation technology (Forescout preferred) and internet connectivity. Experience with EDR, M365 security, SIEM, Vulnerability management, MITRE attack framework and Incident response. Experience of providing knowledge transfer to Service Delivery teams and developing other cybersecurity team members. Having an in-depth understanding of threats in a more »
Employment Type: Permanent
Salary: £50000 - £60000/annum
Posted:

CDAITO Information Security Assistant Manager

London, United Kingdom
Confidential
of the state of information security and cybersecurity and provide periodic reports (at least annually) on the state of information security to/Top management Adopt, implement and update Cybersecurity policies, rules, processes and procedures in line with Head Office regulatory Framework In reporting to the Top Management … the Group model. Work with information owners in business units to determine appropriate security objectives Monitor network activity for malicious activity Monitor and evaluates vulnerability reports, vendor hot-fixes, and vendor patches for applicability to deployed technologies Monitor the process of creating, changing, or removing user access across all … Bachelor's in computer science, Information Technology or related field Master's degree a plus CISSP/CISM certification preferable Experience in application security, vulnerability management Solid background in assuring high level of Information Security management and Business Continuity management in an organization I.T./Info more »
Posted:

DevSecOps Engineer

East London, London, United Kingdom
Hybrid / WFH Options
MECS Communications Ltd
out Splunk software across the platforms & infrastructure managed by the Engineering & Run & Operate teams. The DevSecOps Engineer will also oversee logging & Security Information & Event Management (SIEM) aspects of infrastructure, collaborating with application development teams to resolve issues & enhance security measures within the CI/CD pipeline. If you have … day London office, 4 days remote working, work from home Key Skills: Continuous Integration (CI), Continuous Deployment (CD), Infrastructure as Code (IaC), Security Automation, Vulnerability Management, Threat Intelligence, Secure Software Development Lifecycle (SSDLC), Compliance as Code, Security Orchestration, Container Security, Microservices Security, Threat Modelling, Secure Configuration Management, Secure DevOps Practices, Security Scanning & Testing, Security Incident Response, Identity & Access Management (IAM), Secure Cloud Environments, Secure Code Reviews Nature: Permanent, Full Time Hours: Monday - Friday 09.00 -17.30 Gross pay rate: £55,000 - £70,000 basic + 20% bonus, Health Care, Discounts & other benefits Key Activity: * Develop more »
Employment Type: Permanent, Work From Home
Salary: £65,000
Posted:

Cyber Engineer, PAM Cyberark 2 days PW Reading - £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What We more »
Employment Type: Permanent
Salary: £40,000
Posted:

Principal Security Engineer

London, United Kingdom
Hybrid / WFH Options
Confidential
and access policies appropriate to the security needs of the business Provide security guidance and drive infrastructure decisions in collaboration with other technical and management teams, ensuring Security principles are being upheld. Advanced knowledge of layer 7 firewall technologies and capabilities (e.g., Application awareness, user identities, advanced threat detection … etc.) Provides vulnerability assessment of cloud assets, delivers remediation recommendations, and provides knowledgeable assistance in resolving identified vulnerabilities. Develop and implement security measures, policies, and procedures to protect systems and networks against unauthorized access, data breaches, and other security incidents. Monitor and analyse security logs and events, and respond … Cyber Principles, ISO27001, SoC, NIST, PCI, and GDPR. Hands-on experience with security technologies, SIEM , IDS/IPS, EDR, NDR, network forensics, antivirus, and vulnerability scanning tools. (preferably Crowdstrike Falcon, Wiz, Datadog) Up-to-date understanding of testing the security of software and infrastructure using appropriate security tools including more »
Posted:

Information Security Manager

EC3V, Walbrook, Greater London, United Kingdom
Hybrid / WFH Options
Ignite Digital Search Limited
into the Head of Information Security, eventually building and leading a new security team. Key Responsibilities: Implement and manage security controls and countermeasures. Perform vulnerability management and remediation. Collaborate with software engineering and product teams. Manage Active Directory, Azure, Office 365, and Defender services. Respond to new vulnerabilities … IDS, IPS). Knowledge of Microsoft Security Centre and Sentinel. Understanding of ISO27001:22, NIST, and secure software development. Attributes: Excellent communication and stakeholder management skills. Strong leadership and time management abilities. Collaborative approach and relationship-building skills. Why Join Us? Be part of a dynamic start-up more »
Employment Type: Permanent
Salary: £85000 - £95000/annum 10% pension, bonus, medical
Posted:

Head of Information Security Operations - Contract - URGENT - Reading/Thames Valley/Oxford

Reading, Berkshire, United Kingdom
Confidential
the confidentiality, integrity, and availability of information systems are maintained to protect customer, corporate, and third-party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC partners. This is a hybrid position with … required on site each week. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are … is maintained and in line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes, and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Experience Minimum 5+ years commercial experience more »
Posted:

Security Services Analyst

Dublin, City of Dublin, Republic of Ireland
The Recruitment Company
security policies, and procedures. Technical Assessments & Recommendations : Conduct technical assessments and recommend standards and baselines. Coordinate and provide technical input for security services, including: Vulnerability Management Security Information and Event Management (SIEM) Penetration Testing Security Training and Communication Incident and Emergency Response Threat and Risk Management … team members in their absence. Work Relationships Internal Collaboration : Technology & Security Services Team IT Process & Quality Manager Service Delivery Team Business Application Team Project Management Office IT Security Managers within operating companies External Collaboration : Managed Service Providers SIEM/SOC Providers Third-party Suppliers and Vendors Experience & Competencies Strong more »
Employment Type: Permanent
Salary: £50000 - £55000/annum
Posted:

IT Infrastructure Manager

Northamptonshire, United Kingdom
Confidential
and critical thinking techniques. Solid understanding of IT security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerability management, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments willingness to share knowledge … knowledge in the use and support of M365 suite particularly Excel, Word, Teams and SharePoint. Essential Criteria Significant experience in a leadership or technical management role is crucial - this includes all elements of managing and motivating technical teams. Significant experience of project management in a technical management more »
Posted:

Technical Security Analyst

Nationwide, United Kingdom
Portare Solutions Limited
Support the continuous improvement of security policies, procedures, standards and guidelines Implement and improve technical processes to create efficient and secure methodologies Support the management and investigation of security events including post incident reviews in conjunction with other IT teams and members of the Information Security function Develop awareness … materials to ensure continuous improvements to the security culture for the organisation Identification, mitigation, and management of security threats, vulnerabilities and risks Providing support and guidance within IT and the Wider Business to ensure compliance with security policy and standards Research security enhancements and make recommendations Stay current on … of security principles surrounding SIEM, Antivirus, DLP, Firewalls, Open Source Filtering tools, Cloud security (Azure), IdAM (PAM on-prem/cloud), EDR, Scanning/vulnerability tools, etc. Windows Server & Networking Incident response Endpoint and network security technologies Extensive knowledge of IT Security and Governance best practices and industry standards more »
Employment Type: Permanent
Salary: £55000 - £65000/annum Strong benefits package
Posted:

IT Security Solutions Architect

London, United Kingdom
Confidential
interpersonal skills, with the ability to effectively collaborate with cross-functional teams. Experience with security tools and technologies such as firewalls, SIEM , DLP, Identity Management and encryption solutions. A variety of career development tools, resources and opportunities The chance to work on some of the most challenging, relevant issues … of our company. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Senior Security Engineer

London, United Kingdom
Hybrid / WFH Options
Confidential
tools such as Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerability management, and penetration testing. Risk Management and Compliance Identify and assess security risks and develop mitigation strategies. Ensure compliance with relevant security more »
Posted:

Cyber Security Manager

South East London, London, United Kingdom
The Fortune Group (Recruitment) Limited
business on what is good practice, what are the current threats and how to avoid appearing in the news. Providing specialist security advice to management, project teams and internal stakeholders. Continuous improvement of MI reporting up to and including board level audience. Monitoring the vendor and product landscape to … know what products are available. Perform threat identification and vulnerability management duties. Responsible for ensuring that security vulnerabilities are raised to internal teams and/or 3rd parties suppliers and remediated according to agree timescales. Working with internal and external teams to mitigate and/or control Cyber … Cyber Security risks within IT Operations and escalating as required. Liaising with stakeholders to determine impacts, workarounds, analytical services and recommendations for improvement. Monitoring vulnerability and intelligence feeds for the latest news and alerts in the Cyber Security space. Required You need a proven track record in Security. You more »
Employment Type: Permanent
Salary: £75,000
Posted:

Infrastructure Engineer (Security career development)

Brighton, East Sussex, South East, United Kingdom
Hybrid / WFH Options
JNC Recruitment Ltd
systems and applications Responding to incidents and delivering fixes in line with SLAs and corporate processes Technical experience required includes: Comprehensive experience in SCCM management and administration Active Directory administration including DNS, DHCP, PKI and Group Policy Strong Microsoft Windows Server 2008 2022 Administration in a hybrid cloud environment … and Endpoint Manager PowerShell scripting ITIL Networking Fundamentals - Palo Alto and Cisco Bonus extra skills include: MS Defender/MS Defender for Cloud TenableVulnerability Management, or other Vulnerability Management tool Knowledge of monitoring tools such as Splunk, Netcrunch or Solarwinds (or others) This opportunity would suit an … engineer with an inherent interest in IT Security, as the role will develop the post holder's Monitoring and Vulnerabilty Management skills on the job. The role is available on a hybrid basis remotely and from the offices in easy to get to Central Brighton 1 day per week more »
Employment Type: Permanent, Work From Home
Salary: £45,000
Posted:

Senior Cyber Detection Engineer – Cloud Technical Lead

London, United Kingdom
Confidential
requesting an accommodation. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Cyber Security Consultant - DV Cleared

Corsham, Wiltshire, South West, United Kingdom
83zero Limited
relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, Vulnerability Management utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain more »
Employment Type: Permanent
Posted:

Business Continuity Lead

London, United Kingdom
Confidential
s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH, CEH, or OSCP. Proficiency in SIEM Platforms, vulnerability management tools, and incident management processes. Experience in managing security functions or SOC capabilities. Strong analytical skills to analyze security monitoring data more »
Posted:

Information Security Manager

London, United Kingdom
Hybrid / WFH Options
Confidential
compliance with key data and security policies. Expertise in planning and delivering roadmaps, contributing to our cloud security strategy Good understanding of security risk management in a cloud security context, and of cloud security principles Knowledge of multiple regulatory requirements e.g UK GDPR, CCPA Expertise in security and compliance … Architecture Knowledge of Infrastructure as Code Knowledge of Azure, Google, AWS, and Kubernetes cloud native services Securing GitOps and Continuous Deployment Identity and Access Management, including securing privileged access Relevant certifications such as SABSA, CISSP, CCSK, AZ 500, GIAC, CISM, ISO Lead Auditor/Implementer, CISLA, CISMP, Security + … to light subsequently. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Senior Security Consultant(P2PE Application and SSF Assessor)

London, United Kingdom
Hybrid / WFH Options
Confidential
industry best practices for systems hardening. Expertise in data encryption and data privacy. Proficiency in incident response, business continuity planning, physical security, risk assessments, vulnerability scanning, and penetration testing report reviews. Standards and Best Practices: Solid understanding of industry standards such as PCI DSS, CIS, ISO27001, and NIST. Client … independently lead client engagements or collaborate with a team, including scoping, planning, governance review, onsite assessment activities, status reporting, report writing, and client resource management, with support from our project management team. Certifications: At least one Information Security certification from the following is a must: PCI P2PE or … industry leading certifications. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Information Security Service Manager

London, United Kingdom
Hybrid / WFH Options
Confidential
experience, skills and knowledge Essential Information Security Expertise : Must have experience in managing security services in a cloud -first environment. Security Principles and Risk Management : Must possess a solid understanding of information security principles and risk management practices. The ability to apply these concepts effectively in real-world … strong communication skills and the ability to explain complex security issues to a wide range of audiences, helping to align technical teams and senior management on security priorities and strategies. Analytical and Detail-Oriented : The role requires an analytical mindset and an eye for detail while maintaining an overall … happy to accommodate. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Information Security Manager UKI

London, United Kingdom
Hybrid / WFH Options
Confidential
policy. As Information Security Manager UKI you contribute directly to BAM s objectives by strengthening the design and effectiveness of the BAM Information Security Management Framework.You will support Divisional management, Segments and underlying projects within UKI with the implementation and compliance with the required information security policies. You … Your mission Managing the UKI information security agenda in line with the Group Security agenda, including reporting to key stakeholders Managing the Information Security Management System (ISMS) within UKI as part of the ISO27001 certification and Cyber Essentials requirements Identifying emerging data and information security risks and trends and … information security incidents and closure of identified remedial action as required Perform periodic internal control assessments regarding information security (via the BRIC tool). Management of the UK Information Security Project Manager Deliver Security Standards within the organisation and on projects, including certifications (ISO27001 and Cyber Essentials) Implementation of more »
Posted:

2nd Line Network Engineer

Nottingham, Nottinghamshire, East Midlands, United Kingdom
Hybrid / WFH Options
COMPUTACENTER (UK) LIMITED
You will be exposed to many technologies and situations which will help your career grow. The successful candidate will provide proactive and reactive network management, including resolution of network incidents, root cause analysis and completion of change requests. The role will focus on remotely resolving incidents, performing platform upgrades … relationships within IT Services and Business Change, additionally interacting with business teams, as and when required Maintain good customer relationships Managing compliance and patching, vulnerability management, ITIL BAU Queue management, small project work within the customers time frames, providing technical advice and recommendations where required Managing documentation … required Liaising with 3rd Line team members to enable any service improvement to reduce incidents on customer environments. Roles and Responsibilities: Call and incident Management Delivery of network configuration tasks on LAN, WAN and security devices Implement and manage disaster recovery and back-up of network devices Monitoring the more »
Employment Type: Permanent
Posted:

Senior Cybersecurity Technical Delivery Manager

London, United Kingdom
Confidential
inspired is expected and making a meaningful impact is rewarded. EDUCATION Degree or equivalent work experience equally preferable. Degree in information technology, cybersecurity, risk management, business administration, or related field Master's degreeCERTIFICATIONS Certified Information Systems Security Professional (CISSP) certificationWORK EXPERIENCE Experience in IT security and risk management … firm's executive leadership and risk committees Drive complex, firm-wide initiatives towards successful completion and develop reports to communicate the progress to senior management, risk committees, and board of directors Understand current cybersecurity strategy and help evolve it on a continuous basis through targeted initiatives Collaborate with stakeholders … cause analysis, cost/benefits, feasibility analysis and research of sound industry practices Drive progress in executing the overall cyber strategy through analysis, stakeholder management, leadership communication, and provide recommendations on how to execute strategic goals including: Partnering with stakeholders to monitor and achieve annual targets Identifying and driving more »
Posted:

Information Security Manager

London, United Kingdom
Confidential
capability to ensure our services are delivered effectively and in line with Sainsbury s future ways of working. What you need to do Line management of a small team of colleagues. Assuring that security controls are met in conjunction with our Product Assurance Framework through the product lifecycle. Articulating … scoped and vulnerabilities are remediated in line with SLA. Work with business and external suppliers. Track and manage the delivery of actions for example vulnerability mitigation for business owned & managed products. What you need to know and show Demonstrative experience of providing InfoSec consultancy to business teams who are … Confidentiality, Integrity and Availability are adhered to. Understanding of Data and Cyber related risks in a complex organisation (including regulatory requirements) Experience of people management of small teams including setting team strategy. Ability to motivate a small team of individuals to be high performers, celebrate success and help develop more »
Posted:
Vulnerability Management
10th Percentile
£40,000
25th Percentile
£51,250
Median
£65,000
75th Percentile
£86,063
90th Percentile
£97,375