Permanent Vulnerability Management Job Vacancies

326 to 350 of 478 Permanent Vulnerability Management Jobs

Senior Cloud Security Engineer

London, South East, England, United Kingdom
Holland & Barrett International Limited
experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python, JavaScript … GoLang, Terraform, CloudFormation (AWS), and AWS CDK. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Desired: Ability to work independently, take initiative, and maintain a keen attention to detail, ensuring high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. Why More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

Cyber Intelligence Analyst with Security Clearance

Arlington, Virginia, United States
MicroSys LLC
for malicious cyber activity. MicroSys is supporting a customer by delivering intelligence support to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer's vulnerability management (VM) efforts. In support of the customer's strategic direction, MicroSys is looking for motivated individuals who can support the development of new and innovative Cyber Threat … and physical locations • Must have experience using multiple Intelligence Community database search tools and familiarity with intelligence monitoring, collection, targeting and reporting • Must have working familiarity with Intelligence Community management of information, classification, dissemination and information and records system • Must have working familiarity with Open-Source Intelligence sources including the use of scraping tools and darkweb browsers • Must have More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Local Defender / Security Operations Center SOC Analyst with Security Clearance

San Miguel, California, United States
OASYS, INC
in analyzing security events, logs, and alerts from various security tools (e.g., SIEM, firewalls, IDS/IPS). Familiarity with CVEs, threat intelligence frameworks (e.g., MITRE ATT&CK), and vulnerability management practices. Knowledge of NETCOM policies, Cyber Tasking Orders (CTOs), and cybersecurity compliance requirements. A high-level performer with the ability to be proactive and respond rapidly to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Administrator with Security Clearance

Huntsville, Alabama, United States
Integral Federal
Computer Science , Information Technology, Cybersecurity, or a related field. Experience with DoD and Army cybersecurity standards and practices. Strong knowledge of cybersecurity frameworks and tools. Proficiency in risk assessment, vulnerability management, and incident response. Excellent communication and collaboration skills. Must meet certification requirements for the role. Relevant certifications may include CISSP, CISM, CEH, Security+, or equivalent. Must possess More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Client Service Technician with Security Clearance

San Antonio, Texas, United States
ANALYGENCE, Inc
employees. Install, relocate, configure, troubleshoot, scan media, and repair desktop computers, laptops, and printers. Load, configure, and troubleshoot software applications. Load proper patches to computers identified during information Assurance Vulnerability Management (IAVM) scanning. Support Client Service Liaison (CSL) in maintaining physical media control processes. Prepare equipment for DRMO disposal, prepare DRMO paperwork as required, validate equipment to ensure More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Threat Intel Engineer III with Security Clearance

Springfield, Virginia, United States
CACI
Responsibilities: • Conduct analysis and research on emerging threats and intelligence by collecting and analyzing commercial and government cyber intelligence reports to provide actionable cyber intelligence to support incident response, vulnerability management, and other cybersecurity initiatives. • Monitor and assess the global threat landscape, including threat actors, malware, hacking techniques that may impact NGA systems and networks • Collaborate with internal More ❯
Employment Type: Permanent
Salary: USD 158,100 Annual
Posted:

Cybersecurity Infrastructure Engineer

Milton Keynes, Buckinghamshire, England, United Kingdom
Sonepar
WHAT DO YOU NEED TO BRING TO SONEPAR UK? • Technical Cybersecurity Expertise: Demonstrated experience in implementing and managing security controls across hybrid environments, including endpoint protection, threat detection, and vulnerability management tools.• Incident Response & Problem Solving: Ability to respond swiftly and effectively to security incidents, minimizing impact and ensuring rapid recovery through structured analysis and remediation.• Threat Awareness More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

Information Security Analyst (sme) with Security Clearance

Arlington, Virginia, United States
Hybrid / WFH Options
ANALYGENCE, Inc
have extensive experience working with various security methodologies and processes, compliance controls related to cloud security, performing assessments in cloud computing environment, extensive experience providing analysis and trending of vulnerability data form a large number of heterogeneous devices, and must possess expert knowledge in risk and vulnerability management. Must possess excellent verbal and written communication skills. Summary Our More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Vulnerability Management Architect

City of London, London, United Kingdom
Lorien
Vulnerability Management Architect 5 Month Contract Hybrid - travel to Bracknell and London, Pimlico as and when required Our Retail client is seeking a Vulnerability Management Architect to join their team on a 5-month contract basis. As a Vulnerability Management Architect, you will play a crucial role in modernising the company's vulnerability management capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerability management architecture Capture our vulnerability management requirements and usage scenarios, captured as a set of patterns that a future solution will need to support Build out … evaluate the drivers and benefits for change Provide market assessment as appropriate, partnering with our procurement teams as needed Provide a validated and recommended strategy solution architecture for our vulnerability management services (i.e. this is all about explaining how the elements of the solution will work together, vendor agnostic) Compile vendor solution options to address the above (with More ❯
Posted:

Vulnerability Management Architect

London Area, United Kingdom
Lorien
Vulnerability Management Architect 5 Month Contract Hybrid - travel to Bracknell and London, Pimlico as and when required Our Retail client is seeking a Vulnerability Management Architect to join their team on a 5-month contract basis. As a Vulnerability Management Architect, you will play a crucial role in modernising the company's vulnerability management capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerability management architecture Capture our vulnerability management requirements and usage scenarios, captured as a set of patterns that a future solution will need to support Build out … evaluate the drivers and benefits for change Provide market assessment as appropriate, partnering with our procurement teams as needed Provide a validated and recommended strategy solution architecture for our vulnerability management services (i.e. this is all about explaining how the elements of the solution will work together, vendor agnostic) Compile vendor solution options to address the above (with More ❯
Posted:

Software Engineer - Vulnerability Management

London, United Kingdom
Hybrid / WFH Options
Starling Bank
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability management-specific … tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process vulnerability data to … provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerability More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Incident & Threat Management Governance Analyst

Edinburgh, Midlothian, United Kingdom
Red Snapper Recruitment Limited
Red Snapper Recruitment are seeking a detail-oriented and experienced Cyber Incident Management (CIM) and Threat and Vulnerability Management (TVM) Governance Analyst to support a robust cybersecurity governance program. This role plays a key part in enhancing and maintaining the integrity of cybersecurity operations through effective data analysis, reporting, and cross-functional collaboration. The successful candidate will … teams and external partners to support governance-related functions. Assist with distributing governance reports across organizational leadership and forums. What You Bring: Deep understanding of cyber incident response, patch management, and vulnerability assessment in large-scale environments. Strong problem-solving, analytical, and organizational skills. Ability to build strong working relationships in a global, distributed team environment. Experience using More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Incident & Threat Management Governance Analyst

Edinburgh, City of Edinburgh, United Kingdom
Red Snapper Recruitment Limited
Red Snapper Recruitment are seeking a detail-oriented and experienced Cyber Incident Management (CIM) and Threat and Vulnerability Management (TVM) Governance Analyst to support a robust cybersecurity governance program. This role plays a key part in enhancing and maintaining the integrity of cybersecurity operations through effective data analysis, reporting, and cross-functional collaboration. The successful candidate will … teams and external partners to support governance-related functions. Assist with distributing governance reports across organizational leadership and forums. What You Bring: Deep understanding of cyber incident response, patch management, and vulnerability assessment in large-scale environments. Strong problem-solving, analytical, and organizational skills. Ability to build strong working relationships in a global, distributed team environment. Experience using More ❯
Employment Type: Permanent
Posted:

Vulnerability Manager

Manchester, Lancashire, United Kingdom
Hybrid / WFH Options
Capgemini
including: identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role Vulnerability Management Understand the Vulnerability Management end to end process and reporting and Have working experience of Vulnerability Management tools Conduct vulnerability analysis and … create impact assessments including risk assessment of vulnerability reports and impact risks to service Collate conclusions and recommendations and Identify and communicate current and emerging information security threats Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement and notify requirements to address security deficiencies Report audit findings, including corrective action suggestions, Conducts follow up remediation … part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Strong understanding of vulnerability management frameworks and tools. Experience in conducting risk assessments and interpreting vulnerability reports. Familiarity with audit processes, compliance standards, and security governance. Skilled in delivering security training More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Vulnerability Analyst

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
Computershare
Cyber Vulnerability Analyst - Bristol/Edinburgh (Hybrid) In this position, you'll be based in either the Bristol or Edinburgh office for a minimum of three days a week with the flexibility to work from home for some of your working week. Find out more about our flexible work culture at We give you a world of potential Computershare … are currently recruiting for a talented individual to join our Cyber Assurance team as a Cyber Vulnerability Analyst. Our Cyber Assurance team are a small but growing team based across our UK sites and sit within the wider InfoSec department. The team are responsible for assessing our global systems for vulnerabilities, determining our priorities, and working closely with our … wider technical teams to remediate issues. A role you will love Along with your teammates, you will be responsible for conducting and co-ordinating technical vulnerability assessments across our IT infrastructure, applications, and services. You will provide recommendations towards the development of appropriate remediation plans and deliver clear reports detailing the organisation's level of security assurance against internal More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Security Consultant - AWS - Manchester

Manchester, North West, United Kingdom
Circle Group
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerability management and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. Skills & Experience Required: 3+ years of experience working in Cyber Security within … an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerability management & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when speaking with stakeholders and clients, as well as the ability to provide … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerability management & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
Employment Type: Permanent
Salary: £70,000
Posted:

IT Security Consultant - AWS - Manchester

Manchester, Lancashire, England, United Kingdom
Circle Recruitment
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerability management and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. Skills & Experience Required: 3+ years of experience working in Cyber Security within … an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerability management & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when speaking with stakeholders and clients, as well as the ability to provide … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerability management & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
Employment Type: Full-Time
Salary: £55,000 - £70,000 per annum
Posted:

Industrial Infrastructure Engineering Lead

United Kingdom
Northrop Grumman Corp. (JP)
a skilled Industrial Control Systems (ICS) Infrastructure Engineer to join our team. This position offers the unique opportunity to design, develop, and maintain cutting-edge infrastructure for naval platform management systems, including both surface ships and submarines. You will play a critical role in both the development of the product and the provision and maintenance of the development environment … itself, supporting mission-critical naval programmes. In addition to integrating IT/OT systems, you will be responsible for the management of IT assets within the development environment, ensuring compliance with company and regulatory standards such as ISO27001 and IEC62443. This role is ideal for engineers familiar with Windows Server domains, Red Hat Linux, virtualisation, industrial networking, and working … Security: Design and manage robust industrial networking architectures (e.g., Profinet, Ethernet/IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. Platform Management Systems: Work closely with multidisciplinary teams to design and integrate ICS solutions into PMS, ensuring they meet rigorous naval requirements for performance, reliability, and security. Development Environment Provision & Maintenance More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Analyst

West London, London, England, United Kingdom
Hybrid / WFH Options
Ashdown Group
Duties will include: - Working with the wider business on ISO27001 and Cyber Essentials - Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Deploy SIEM - Support ongoing improvements to internal defence - Oversee policies and procedures - Support data protection initiatives - Security projects - Develop disaster recovery plans - Establish and improve vulnerability management More ❯
Employment Type: Full-Time
Salary: £50,000 - £55,000 per annum
Posted:

Network Security Engineer

Manchester, Lancashire, United Kingdom
Cloud Decisions
control traffic flow. - Collaborate with other teams to define and enforce network access policies, ensuring that only authorized personnel and devices have appropriate access rights. Proactive Security Testing and Vulnerability Management: - Conduct and organise regular security assessments, including vulnerability scanning and testing, to identify weaknesses in the network infrastructure. - Collaborate with system administrators and application owners to … address identified vulnerabilities and implement necessary patches or configuration changes. - Develop and maintain a comprehensive vulnerability management program, including vulnerability tracking, risk assessment, and remediation planning. Stakeholder Collaboration: - Act as a stakeholder for the response team, providing expert guidance on security-related alerts, incidents, and potential improvements. - Collaborate with cross-functional teams, including network engineers, system administrators More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cybersecurity Engineer - AMMO with Security Clearance

Dayton, Ohio, United States
Solutions Through Innovative Technologies, Inc
Solutions Through Innovative Technologies, Inc. (STI-TEC) specializes in the delivery of professional business and information management services. STI-TEC offers government and commercial clients a comprehensive portfolio of services that identify, manage, distribute and improve business processes related to entities' most valued resource, information. As a fast-growing solutions provider, established in 2000, total customer satisfaction has remained … a collaborative user community across the military, government, industry, academia, and international partners. To enhance AFSIM's growth, the Department of the Air Force (DAF) is establishing a Model Management Office (MMO). In this cutting-edge new MMO the Cybersecurity Engineer willenhance and maintain the cybersecurity posture of MMO products and services, to include AFSIM. The contractor shall … libraries for emerging vulnerabilities and weaknesses, particularly those vulnerabilities as identified in the public Common Vulnerabilities and Exposures (CVE) list Participate in critical design or code reviews and inspections. Vulnerability or Weakness Remediation Advise or assist in the tracking and remediation of potential vulnerabilities and weaknesses associated with MMO products or services Perform security impact assessments and communicate risk More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer

West London, London, United Kingdom
Hybrid / WFH Options
Ashdown Group
Duties will include: - Working with the wider business on ISO27001 and Cyber Essentials - Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Deploy SIEM - Support ongoing improvements to internal defence - Oversee policies and procedures - Support data protection initiatives - Security projects - Develop disaster recovery plans - Establish and improve vulnerability management More ❯
Employment Type: Permanent, Work From Home
Salary: £55,000
Posted:

System Administrator - Linux with Security Clearance

Alplaus, New York, United States
PlanIT Group LLC
DoE Q or DoD OR Top-Secret clearance Job Type: Contract - Long Term Key Responsibilities • Administer and optimize RedHat Linux systems, OpenShift, VMWare, and Cloudera platforms including authentication, cluster management, user management, monitoring, performance and data management. • Implement and enforce security measures to meet NIST 800-53 standards. • Monitor system performance, troubleshoot issues, and perform regular maintenance. • Manage … system updates, patches, and upgrades to ensure system integrity. • Develop and enforce backup and disaster recovery plans. • Provide support for system configurations, user management, and access control. • Document system configurations, procedures and updates. • Collaborate with IT teams to integrate and manage applications and services Required Experience • Bachelor's degree in computer science, Information Technology, or related field, or equivalent … least five years' experience with RedHat Linux, VMware, and OpenShift cumulative, • At least two years of experience supporting development of information system security authorization packages in accordance with Risk Management Framework (NIST 800-37, 800-53, 800-53a) • Strong understanding of system security principles and experience with NIST 800-53 compliance. Proficient in system performance tuning, troubleshooting and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Defense Incident Responder with Security Clearance

Washington, Washington DC, United States
TekSynap
Responsibilities & Qualifications This role requires a blend of strategic thinking and technical expertise to support the robust and proactive approach to vulnerability management in the government customer's dynamic and fast-paced cybersecurity environment. RESPONSIBILITIES Operational Duties Use enterprise vulnerability assessment tools and practices and operation of the EVAP scanning infrastructure. Support hands-on configuration and optimization … of vulnerability scanning solutions to ensure effectiveness and accuracy. Stay current with the latest vulnerability assessment tools, technologies, and threat landscapes to continuously refine scanning methodologies. Conduct complex scans, troubleshooting tool issues, and analyzing results. Participate in a collaborative environment and ensuring high performance. Meet project deadlines. Use enterprise vulnerability scanning tools. Conduct Comprehensive Vulnerability Assessments … Complete efficient and timely execution of vulnerability assessments. Support technical execution of enterprise-wide vulnerability assessments, focusing on identifying and mitigating security risks across the government customer networks, systems, and infrastructure. Conduct in-depth analysis of vulnerabilities to determine potential impacts and recommend remediation steps. Ensure that assessments cover a variety of technologies, including network devices, databases, operating More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO with Security Clearance

Dulles, Virginia, United States
Zachary Piper Solutions, LLC
NIST, FIPS, CNSSI 1253, Nessus, A&A. Demonstrated on-the-job knowledge and experience with reviewing security concepts of operations, systems security plans, security control assessments, contingency plans, configuration management plans, incident response plans, vulnerability scanning, and/or vulnerability management plans. At Zachary Piper Solutions, we offer competitive compensation and a comprehensive benefits package. Our More ❯
Employment Type: Permanent
Salary: USD 130,000 Annual
Posted:
Vulnerability Management
10th Percentile
£37,650
25th Percentile
£48,545
Median
£60,000
75th Percentile
£77,813
90th Percentile
£90,000