Permanent Vulnerability Management Job Vacancies

351 to 375 of 504 Permanent Vulnerability Management Jobs

Senior Cyber Engineer

Sussex, United Kingdom
Hybrid / WFH Options
Data Careers Ltd
Brighton 2 days per week + WFH) Salary: 60K - 62.5K + exceptional Employee Benefits including 28% Employer Pension, (+ on-call payment), great work/life balance Key Skills: Vulnerability Management tools, Azure Security Centre, Defender, Sentinel and a broad Infrastructure Engineer background Summary: This role joins a high performing, dedicated, hands-on Cyber Security Team responsible for … and Microsoft cloud infrastructure, including: Cisco firewalls and ISE, Forcepoint or similar secure web gateway/CASB solution, Mimecast, IDS/IPS solutions, Network Detection and Response (NDR), Qualys vulnerability detection and management platform or similar Highly practical with a can-do attitude, able to demonstrate a proactive approach to identifying and mitigating potential security risks. Strong communications More ❯
Employment Type: Permanent
Salary: GBP 55,000 - 62,000 Annual
Posted:

TrueSight Automation Developer - Systems Engineer with Security Clearance

Alexandria, Virginia, United States
Hybrid / WFH Options
Peraton
Day Work Responsibilities: TSSA Development & Implementation Architect and develop sophisticated automation work-flows using BMC TrueSight Server Automation (TSSA) platform. Create custom scripts and templates for provisioning, configuration, patch management, and compliance enforcement. Implement automated vulnerability management and remediation processes, tightly integrated with security and change management systems. Deliver end-to-end patching automation solutions with … maintenance window scheduling and compliance tracking. Enterprise Infrastructure Automation Automate server life-cycle management from provisioning and configuration to decommissioning across physical, virtual, and cloud environments. Develop scalable configuration management systems to enforce security and compliance standards (STIG, CIS, DISA, HIPAA, PCI-DSS, SOX). Implement drift detection mechanisms and automated remediation solutions to ensure system integrity. Design … BMC tools such as Remedy and Patrol. Strong background in IT infrastructure management. Ability to obtain BMC TrueSight Server Automation certification. ITIL certification or equivalent understanding of ITIL service management processes.Preferred Qualifications: Security certifications (Security+, CISSP, etc.) Automation script and template development, architecture and configuration. TSSA console administration and deployment scenario design. Hands-on management of large-scale More ❯
Employment Type: Permanent
Salary: USD 138,000 Annual
Posted:

Senior Cyber Engineer

Brighton, East Sussex, Preston Park, United Kingdom
Hybrid / WFH Options
Data Careers Ltd
Brighton 2 days per week + WFH) Salary: £60K - £62.5K + exceptional Employee Benefits including 28% Employer Pension, (+ on-call payment), great work/life balance Key Skills: Vulnerability Management tools, Azure Security Centre, Defender, Sentinel and a broad Infrastructure Engineer background Summary: This role joins a high performing, dedicated, hands-on Cyber Security Team responsible for … and Microsoft cloud infrastructure, including: Cisco firewalls and ISE, Forcepoint or similar secure web gateway/CASB solution, Mimecast, IDS/IPS solutions, Network Detection and Response (NDR), Qualys vulnerability detection and management platform or similar Highly practical with a can-do attitude, able to demonstrate a proactive approach to identifying and mitigating potential security risks. Strong communications More ❯
Employment Type: Permanent
Salary: £55000 - £62000/annum + 28% pension contribution
Posted:

Security Engineer - Product & Production Infrastructure / Product Security Remote - United Kingdom

United Kingdom
Hybrid / WFH Options
Wiz
secure cloud environments that allow the best companies to move faster. SUMMARY Wiz is looking for a Security Engineer for Product & Production Infrastructure who has experience performing security reviews, vulnerability management, and detection and response operations in cloud-native environments. You'll get to collaborate with our software development and DevOps teams to secure Wiz's products, CI … modeling and security review exercises across Wiz's production and CI/CD environments - identifying and mitigating risks in our products and the cloud services that support them Drive vulnerability management and remediation efforts - prioritizing issues, implementing mitigations, and designing strategic preventative controls Extend our detection and response capabilities - building scalable solutions to identify malicious activity, triage alerts … Azure and GCP) Kubernetes (AWS EKS) and container infrastructure IAM and managing cloud identities at-scale Secure development and application of IAC solutions (Terraform, Helm) Cloud-native observability and management tools Development experience in Go, Python and Rust PREFERRED QUALIFICATIONS Bachelor's degree in computer science or a related field and/or candidates with equivalent job experience in More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cyber Security Manager (f/m/d)

Leipzig, Sachsen, Germany
Hybrid / WFH Options
Deutsche Börse Group
We're flexible! We're happy to receive applications in English or German. Your tasks: In this key role, you will take on professional responsibilities within the Cyber Security Management team, supporting departments in managing Cyber Detection and Protection measures, including Vulnerability Management, Security Information and Event Management (SIEM), Incident Management, and overseeing the Change … pragmatic solutions with a sense of proportion Knowledge of security-relevant technologies, methods, and procedures, as well as preferably familiarity with banking or derivatives exchange processes Proficient in Project Management and Stakeholder Management Methodical and goal-oriented approach to work, with the ability to work autonomously within a team setting Experience with Information Security Standards such as BSI More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Windows System Administrator with Security Clearance

Fort Belvoir, Virginia, United States
General Dynamics Information Technology
seeks a highly motivated and experienced Windows Systems Administrator to support a Defense Threat Reduction Agency (DTRA) mission in Fort Belvoir, VA. This position will support the Defense Stockpile Management Systems (DSMS) which includes Defense Integration and Management of Nuclear Data Services (DIAMONDS), Joint Application Design Environment (JADE), Nuclear Inventory Management and Cataloging System (NIMACS), Government Acceptance … MAKE AN IMPACT Essential Duties and Responsibilities: Plan, build, and upgrade Windows server systems across the organization. Provide day-to-day support for Windows systems, services, and performances. Perform vulnerability management on physical/virtual servers and systems. Perform migration, backups, and recovery of Windows systems. Develop documentation and training for systems and tasks related to Windows systems. … and configure hosted applications and services on Windows servers. Experience using Windows PowerShell. Advanced skills in problem solving. Good work ethic and an active desire to learn. Skillful time management and organizational skills to set and meet deadlines. Excellent written and oral communication skills. Ability to work both independently and within a team. Advanced knowledge with administrating Ivanti Security More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

INFORMATION SYSTEMS SECURITY ENGINEER (408) - VIRGINIA - URGENT with Security Clearance

Fort Belvoir, Virginia, United States
Cyberstrike Group
implement RMF system accreditation processes Assess use case and operational risk of integrated open source, and GOTS/COTS software components Provide security planning, assessment, risk analysis, and risk management support Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements Support the enforcement of the design and implementation of … with Masters in related field Working knowledge of TCP/IP suite of protocols and services, computer architectures, and network topologies is required xperience with DISA STIGs and SRGs, vulnerability management systems, mitigation and compliance processes, and reviewing results from automated security scanning tools Ability to work independently and as part of a team is needed Flexibility is More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Linux Systems Administrator with Security Clearance

Alplaus, New York, United States
Information Management Group
System Administrator to support our customer's enterprise RedHat Linux environment. This role involves ensuring the stability, security, and performance of these systems while adhering to U.S. government risk management frameworks such as NIST 800-53. the administrator will handle system administration tasks, perform regular updates and security patches, troubleshoot and resolve issues, and develop robust backup and … various applications and services, ensuring comprehensive documentation and compliance with security protocols. Additionally, the subcontractor will assist in the development of Plans of Action and Milestone (POA&Ms), Risk Management Framework (RMF) and Risk Based Decisions (RBDs) for deficiencies found during the information system authorization process. Job duties include: Administer and optimize RedHat Linux systems, OpenShift, VMWare, and Cloudera … platforms including authentication, cluster management, user management, monitoring, performance and data management. Implement and enforce security measures to meet NIST 800-53 standards. Monitor system performance, troubleshoot issues, and perform regular maintenance. Manage system updates, patches, and upgrades to ensure system integrity. Develop and enforce backup and disaster recovery plans. Provide support for system configurations, user management More ❯
Employment Type: Permanent
Salary: USD 130,000 Annual
Posted:

Security Engineer

Italy
Telit Cinterion
authentication mechanisms. Hands-on knowledge of information security technologies such as security design review, threat modeling, risk analysis, and software testing techniques. Hands-on experience with security testing tools, vulnerability management tools, and secure development environments. Excellent English written and verbal communication skills Ability to work with cross functional teams Preferred Qualifications: Experience with Linux, AOSP or RTOS …/C++ or Python Experience with software development methodologies, code reviews, and version control Knowledge of secure coding practices, including mitigating common vulnerabilities. Strong understanding of cryptographic algorithms, key management, and secure communication protocols Familiarity with embedded architectures, such as ARM and related security architecture LOCATION Remote, Italy. More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

ISSE Security Engineer with Security Clearance

Alexandria, Virginia, United States
Hybrid / WFH Options
Metronome LLC
understand and be able to implement DoD RMF system accreditation processes. Assess use case and operational risk of integrated open source, and GOTS/COTS software components. Will use vulnerability management systems, automated security scanning tools, and system accreditation record systems. Must be able to grasp new concepts, facilitate information exchanges for data gathering, and collaborate with diverse … audiences. Will follow established processes where applicable, and establish and execute defensible processes where none are prescribed. Provide security planning, assessment, risk analysis, and risk management support. Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements. Support the Government in the enforcement of the design and implementation of trusted … and services, computer architectures, and network topologies is required. DoD 8570 compliance with IAT Level II (SSCP, Security+, CCNA-Security, or GSEC certification) Experience with DISA STIGs and SRGs, vulnerability management systems, mitigation and compliance processes, and reviewing results from automated security scanning tools. The ability to work independently and as part of a team is needed. Flexibility More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Journeyman Network Engineer with Security Clearance

Washington, Washington DC, United States
CACI
the badge access system supporting Marine Corps and Naval Senior Leaders. Responsibilities: Implement network upgrades, system software patching, and security compliance in accordance with Maintenance Task Orders, Information Assurance Vulnerability Management, USCYBERCOM directives and the Department of Defense Cyber Defense Command (DCDC), and WPC policies. Perform field engineering activities in accordance with project or exercise plans and designs … captures and analysis of network traffic during exercises. Perform system configuration and start up configuration backups of all network equipment. Push out network-wide switch configuration changes. Perform network vulnerability scans. Compile and run compliance policy reports. Configure switches to direct all network traffic data to be captured in Net Flow. Perform daily network checks of key network switches … not optimal; terminating network cables used at all layers on all networks; and maintaining and installing network infrastructure for exercise and permanent party on all networks. Maintain a central management point of control for troubleshooting and monitoring encryption devices; maintain cut sheets with TACLANE configurations for troubleshooting; manage, maintain and operate all encryption devices on all networks; serve as More ❯
Employment Type: Permanent
Salary: USD 129,700 Annual
Posted:

SOC Analyst

Poole, England, United Kingdom
IP-People
posture and prevent or mitigate potential cyber-attacks, working closely with other Digital Forensic and Incident response teams Security Monitoring and Incident Detection Incident Response and Analysis Threat Hunting Vulnerability Management Please apply and get in touch today More ❯
Posted:

Assistant IT Security Officer

Southend-on-sea, Essex, United Kingdom
Stena Drilling Limited
implementing changes accordingly. Establish and develop solution architecture for IT security and end-user service domains, ensuring security is integrated into all aspects of the organisation's IT. Oversee vulnerability management and secure the design of IT services. Involvement in Monitoring, identification, resolution activities, and reporting of IT security KPI's and Incidents. Liaise with Data Protection Officer … in on-call and shift rotas. Attend training courses as identified and follow up with exams/qualifications if available. Implement IT Changes in line with the IT Change Management Procedure. Maintain high level of awareness in IT, Information, and Cyber Security and provide information and advice to others as necessary. Work with elevated account privileges and permissions in More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SecOps Analyst

Leeds, West Yorkshire, Yorkshire, United Kingdom
La Fosse
You'll be at the heart of their SecOps function, helping to shape and improve their cyber capabilities. What they are looking for : Someone comfortable with SIEM, EDR, and vulnerability management tooling (Rapid7, CrowdStrike, Qualys etc.) Scripting and automation Strong foundational IT and networking knowledge Familiarity with patching solutions and email security tools A proactive mindset and good More ❯
Employment Type: Permanent
Salary: £40,000
Posted:

ML Ops Engineer

Crawley, Sussex, United Kingdom
Hybrid / WFH Options
Thales Group
with the product owner to address user needs Develop secure and high-quality production code, perform code reviews and able to debug issues Participate in agile threat modelling and vulnerability management Ensure compliance with security and regulatory requirements for MOD and high Design assurance software Develop solutions for where data can bring value to our offers and our … in coordinating the data landscaping and cataloguing for Thales UK Support the Customer Enterprise and Solution Data Architects in the creation and influence of UK MoD standards for Data Management and solutions that support data management and integration Work to implement 3rd party data integrations to support internal and external use cases Working collaboratively with the various squads … PaaS), SOA, APIs, open data, microservices, event-driven IT, predictive analytics, machine learning and artificial intelligence General IT Knowledge (applications, storage, networks, IT infrastructure, Infrastructure, service level agreements, Asset management etc) Familiarity with information management practices, system development life cycle management, IT services management, infrastructure and operations, and EA and ITIL frameworks Technical IT (security, transaction More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Sentinel Principal Systems Security Engineer -14306 with Security Clearance

Colorado Springs, Colorado, United States
Northrop Grumman
engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management). Establishes and implements system security designs; additionally, you will assess and mitigate system security threats and risks throughout the program life cycle. Validates system security requirements definition and … workplace without requiring prompting from supervisors. Support MDT with other duties as assigned. Travel: 10% In addition to technical skills, you will be a self-starter with strong time management skills. Your organizational skills and ability to anticipate future challenges will serve you well. Basic Qualifications: Bachelor's degree in a Science, Technology, Engineering or Mathematics (STEM) discipline from … of experience with any of the following: operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management). Minimum 3 years in researching, interpreting, and developing mitigations for threats and vulnerabilities. Minimum 3 years in showing the ability to communicate effectively and clearly present technical approaches More ❯
Employment Type: Permanent
Salary: USD 115,900 Annual
Posted:

Defensive Cyberspace Operation (DCO) Analyst with Security Clearance

Colorado Springs, Colorado, United States
SMS Data Products Group, Inc
time and effort to understand the mission systems, their architecture, functions and dependencies, assist with Functional Mission Analysis to increase the resilience of the system/s. Perform records management of sustainment related deliverables and documentation. Participate in customer exercises, after duty hours may be required. Ensure adherence to Government policies, master plans and schedules, and develop solutions to … program problems. Comply with USCYBERCOM directions and task orders provided via AFCYBER, and SpOC AFFOR Communications Control Center (ACCC). Vulnerability Management actions to include providing recommendations and responding INFOCON and CPCON changes. Qualifications Ability to communicate effectively, both orally and in writing; negotiate complex issues; write comprehensive studies; and maintain good working relationships. Strong analytical and product … management skills required, including a thorough understanding of how to interpret customer needs and translate them into application and operational requirements. Proficient in Microsoft Office applications such as Outlook, Word, Excel, and PowerPoint; message distribution/retrieval programs; and Analyst Notebook. Ability to quickly learn new tools and applications, adapt to changing tasks, requirements and architectures. Three or more More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

OT Security Analyst

Scotland, United Kingdom
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Familiarity with security frameworks such as NIST, IEC62443, NIS Regulations, CAF, or SoGP. Understanding of threat intelligence, attack surfaces, and cyber kill chains relevant to OT. Proven experience in vulnerability management and incident response in OT contexts. Ability to manage stakeholder relationships and communicate technical risks effectively. A proactive approach to problem-solving and strong attention to detail. More ❯
Posted:

CYBERSECURITY INCIDENT RESPONSE & THREAT DETECTION ANALYST with Security Clearance

Fort Belvoir, Virginia, United States
MAGNUS Management Group
performing root cause analysis of cybersecurity events and incidents. • Working knowledge of at least two types of security tools: Firewall, IDS/IPS, Host based antivirus, Data loss prevention, Vulnerability Management, Forensics, Malware Analysis, Device Hardening, Understanding of Defense-in-Depth, Ability to build scripts and tools to enhance threat detection and incident response capabilities (Preferably in SPL More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Threat Intelligence Analyst

United Kingdom
Hybrid / WFH Options
Sportserve
identify emerging threats and vulnerabilities. Track and profile threat actors, malware campaigns, and attack techniques relevant to our industry and assets, participating in confidential security investigations. Collaborate with incident management, SOC, and security engineering teams to enhance detections and improve threat response effectiveness. Produce high-quality, actionable intelligence reports to inform stakeholders and support proactive security decisions. Enhance team … to reduce false positives and strengthen protections. Strong experience with SIEM solutions such as Splunk or Kibana. Proficiency in maintaining and troubleshooting IAM platforms, including SSO integration. Experience with vulnerability management and scanning solutions. Proficient with XDR platforms, ensuring continuous improvement in detection and response capabilities, including automation playbooks. Ability to plan and execute migration activities from legacy More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cloud Security Engineer

London, South East, England, United Kingdom
Holland & Barrett International Limited
experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python, JavaScript … GoLang, Terraform, CloudFormation (AWS), and AWS CDK. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Desired: Ability to work independently, take initiative, and maintain a keen attention to detail, ensuring high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. Why More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

IT Systems Analyst IV (AMAC Crew - IV) with Security Clearance

San Antonio, Texas, United States
Computer World Services Corp
of CTOs from all applicable 688 CW tactical units • Execute initial triage/scoping of network assessments • Coordinate with 688 CW/A2O for reports/tippers related to vulnerability management, DCO high interest items, and emerging cyber threats • Maintain ability to identify threats and vulnerabilities using ARAD/Tanium toolset • Identify solutions for complex network system issues More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Infrastructure Engineer

Milton Keynes, Buckinghamshire, England, United Kingdom
Sonepar
WHAT DO YOU NEED TO BRING TO SONEPAR UK? • Technical Cybersecurity Expertise: Demonstrated experience in implementing and managing security controls across hybrid environments, including endpoint protection, threat detection, and vulnerability management tools.• Incident Response & Problem Solving: Ability to respond swiftly and effectively to security incidents, minimizing impact and ensuring rapid recovery through structured analysis and remediation.• Threat Awareness More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

Vulnerability Management Architect

City of London, London, United Kingdom
Lorien
Vulnerability Management Architect 5 Month Contract Hybrid - travel to Bracknell and London, Pimlico as and when required Our Retail client is seeking a Vulnerability Management Architect to join their team on a 5-month contract basis. As a Vulnerability Management Architect, you will play a crucial role in modernising the company's vulnerability management capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerability management architecture Capture our vulnerability management requirements and usage scenarios, captured as a set of patterns that a future solution will need to support Build out … evaluate the drivers and benefits for change Provide market assessment as appropriate, partnering with our procurement teams as needed Provide a validated and recommended strategy solution architecture for our vulnerability management services (i.e. this is all about explaining how the elements of the solution will work together, vendor agnostic) Compile vendor solution options to address the above (with More ❯
Posted:

Vulnerability Management Architect

London Area, United Kingdom
Lorien
Vulnerability Management Architect 5 Month Contract Hybrid - travel to Bracknell and London, Pimlico as and when required Our Retail client is seeking a Vulnerability Management Architect to join their team on a 5-month contract basis. As a Vulnerability Management Architect, you will play a crucial role in modernising the company's vulnerability management capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerability management architecture Capture our vulnerability management requirements and usage scenarios, captured as a set of patterns that a future solution will need to support Build out … evaluate the drivers and benefits for change Provide market assessment as appropriate, partnering with our procurement teams as needed Provide a validated and recommended strategy solution architecture for our vulnerability management services (i.e. this is all about explaining how the elements of the solution will work together, vendor agnostic) Compile vendor solution options to address the above (with More ❯
Posted:
Vulnerability Management
10th Percentile
£37,300
25th Percentile
£47,500
Median
£60,000
75th Percentile
£77,500
90th Percentile
£90,000