Permanent 'Vulnerability Management' Job Vacancies

76 to 100 of 286 Permanent Vulnerability Management Jobs

Cyber Security Analyst

Crewe, England, United Kingdom
Hybrid/Remote Options
DCS Technology
Security Analyst to play a key role in protecting our client’s systems, networks, and data. This is an exciting opportunity to lead on threat detection, incident response, and vulnerability management , while driving continuous improvement across the organisation’s security posture. You’ll collaborate closely with infrastructure, development, and compliance teams to maintain high standards of cyber resilience … and uphold key frameworks such as ISO 27001 and Cyber Essentials Plus . Key Responsibilities: • Lead threat detection, incident response, and vulnerability management activities • Strengthen cyber security posture across cloud, infrastructure, and applications • Provide expert guidance to development teams on secure SDLC practices • Maintain compliance with ISO 27001 and Cyber Essentials Plus standards • Mentor junior analysts and support More ❯
Posted:

Senior Cyber Security Analyst

Crewe, Cheshire, England, United Kingdom
Hybrid/Remote Options
DCS Recruitment
Security Analyst to play a key role in protecting our client's systems, networks, and data. This is an exciting opportunity to lead on threat detection, incident response, and vulnerability management , while driving continuous improvement across the organisation's security posture. You'll collaborate closely with infrastructure, development, and compliance teams to maintain high standards of cyber resilience … and uphold key frameworks such as ISO 27001 and Cyber Essentials Plus . Key Responsibilities: * Lead threat detection, incident response, and vulnerability management activities * Strengthen cyber security posture across cloud, infrastructure, and applications * Provide expert guidance to development teams on secure SDLC practices * Maintain compliance with ISO 27001 and Cyber Essentials Plus standards * Mentor junior analysts and support More ❯
Employment Type: Full-Time
Salary: £50,000 - £60,000 per annum
Posted:

Director, Site Reliability Engineering & Security

Dublin, Ireland
Klaviyo Inc
Engineering organization. Champion Secure Reliability: Drive a 'secure and reliable by design' philosophy across all of engineering. Own Platform Integrity: Take ownership of the availability, latency, performance, efficiency, change management, monitoring, emergency response, and capacity planning for Klaviyo's global platform. Build a Modern Security Program: Lead the evolution of our security program, including application security, vulnerability management … technical background in distributed systems, observability, container orchestration (Kubernetes), infrastructure as code (Terraform), and CI/CD principles. Demonstrable experience leading a modern security engineering function, including application security, vulnerability management, and incident response. Deep, practical experience implementing technical controls for GDPR compliance and familiarity with other security frameworks (e.g., SOC 2, ISO 27001). Experience managing geographically More ❯
Employment Type: Permanent
Salary: EUR 125,000 - 150,000 Annual
Posted:

DevOps Engineer

Liverpool, England, United Kingdom
Hybrid/Remote Options
Love2shop
development teams to optimize application performance and reliability • Maintain and improve backup, recovery, and disaster recovery procedures • Support incident response and root cause analysis for production issues • Manage configuration management and secrets management solutions • Optimize cloud resource utilization and cost management • Cover on-call rotation for production support (1 week out of 6) As well as making … improvements to: • Deployment automation and release management processes • Application and infrastructure monitoring and observability • Security scanning and vulnerability management in pipelines • Performance optimization and capacity planning • Development team productivity through tooling and automation What we would like from you • Strong experience with CI/CD pipeline design and implementation (Azure DevOps, GitHub Actions) • Proficiency in Infrastructure as … great if you have the following • Experience with Azure DevOps administration • Knowledge of database deployment automation and migration strategies • Familiarity with microservices architecture and deployment patterns • Experience with API management and gateway solutions • Knowledge of network security and firewall management • Certification in Azure, AWS, or DevOps methodologies • Experience with chaos engineering and resilience testing • Familiarity with service mesh More ❯
Posted:

DevOps Engineer

Welwyn Garden City, England, United Kingdom
Hybrid/Remote Options
PayPoint plc
development teams to optimize application performance and reliability • Maintain and improve backup, recovery, and disaster recovery procedures • Support incident response and root cause analysis for production issues • Manage configuration management and secrets management solutions • Optimize cloud resource utilization and cost management • Cover on-call rotation for production support (1 week out of 6) As well as making … improvements to: • Deployment automation and release management processes • Application and infrastructure monitoring and observability • Security scanning and vulnerability management in pipelines • Performance optimization and capacity planning • Development team productivity through tooling and automation What we would like from you • Strong experience with CI/CD pipeline design and implementation (Azure DevOps, GitHub Actions) • Proficiency in Infrastructure as … great if you have the following • Experience with Azure DevOps administration • Knowledge of database deployment automation and migration strategies • Familiarity with microservices architecture and deployment patterns • Experience with API management and gateway solutions • Knowledge of network security and firewall management • Certification in Azure, AWS, or DevOps methodologies • Experience with chaos engineering and resilience testing • Familiarity with service mesh More ❯
Posted:

Head of Security Engineering - Security Testing & Application Security

Welwyn Garden City, England, United Kingdom
Tesco
leadership role where you’ll shape the future of security assurance across our platforms and products. You’ll lead a talented team of engineers and architects, driving innovation in vulnerability management, application security, and adversarial testing. This is a pivotal cyber leadership role within Tesco Technology, shaping how we secure our platforms and products. You’ll be at … stakeholders across Tesco Technology to embed security into everything we do. 🧠 What You’ll Bring: Proven leadership in large-scale security engineering environments. Deep technical expertise in application security, vulnerability management, and adversarial testing. Experience with modern security tooling and secure development practices. Strong communication and stakeholder engagement skills. A strategic mindset with hands-on execution ability. 🌟 Why More ❯
Posted:

Security Solutions Architect

sheffield, south yorkshire, yorkshire and the humber, united kingdom
Hybrid/Remote Options
Adroit People Limited (UK)
Greetings Greetings We are Hiring Lead Security Solution Architect(Privilege Password Management CyberArk ) Position in UK - Sheffield -JC: 106885 Client is looking for someone with strong ITSM knowledge Privilege Password Management CyberArk . Job Description Location: UK - Sheffield (Hybrid) Hybrid Model Job Profile – Lead Security Solution Architect Project Overview Client is working on a strategic Identity and Access … Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. Client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage … programme as subject matter expert. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at More ❯
Posted:

SOC Manager

London, United Kingdom
Trilaty Group
the senior lead to ensure our state of the art security centre is as effective and as efficient as can possibly be. As well as the proactive and responsive management of your team you will also have input for the strategy and future direction of our operation. Main tasks and responsibilities: Manage Shared SOC for more than 100 FTE … improvisation to achieve operational objectives Revise and develop processes to strengthen the current Security Operations Framework, Review policies and highlight the challenges in managing SLAs Responsible for team & vendor management, overall use of resources and initiation of corrective action where required for Security Operations Centre Management, administration & maintenance of security devices under the purview of SOC which consists … build and maintain positive working relationships with them Pre-requisites: Experience of more than 12 years in advanced security technologies Strong security professional skilled in Security Information and Event Management (SIEM), Vulnerability Management and Security Intelligence, IDAM, Digital Rights Management (DRM), Anti-APT, Data Leak Prevention (DLP), Phishing simulation tools etc Experience in managing P1 incidents More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Lead Security Solution Architect

Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
Lead Security Solution Architect Project Overview Client is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. Client is working on uplifting controls and capabilities in privileged access for the Group and introducing the … programme as subject matter expert. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Provides technical thought leadership to the Design Team and More ❯
Employment Type: Full-Time
Salary: Salary negotiable
Posted:

Cyber Security Engineer

London, South East, England, United Kingdom
Comtecs Ltd
Cyber Security Engineer CyberSec Engineer/IT Security Specialist – Disaster Recovery, Resilience Testing, CyberSec Improvements, Vulnerability Scanning/Management, Infrastructure, Nutanix, Commvault, VMware, Azure, PowerShell, Python; Law Firm, Permanent, London/Hybrid (3/2). £80k - £95k (On Experience) +Bonus +Benefits Global Low Firm seeks experienced Cyber Security Engineer/IT Security Specialist to join the IT … infrastructure tooling and at least one scripting language (PowerShell or Python preferred). Experience with Nutanix, VMware, Commvault, and hybrid cloud platforms Azure (preferred), AWS or GCP. Understanding of vulnerability management, monitoring, and orchestration tools. Relevant certifications such as Microsoft SC-200, Certified Ethical Hacker (CEH), CBCP/CBCI or equivalent. We are open to receiving applications from More ❯
Employment Type: Full-Time
Salary: £80,000 - £95,000 per annum
Posted:

Platform Engineer / DevOps Engineer – Security

London Area, United Kingdom
Cognizant
Engineer/DevOps Engineer with strong expertise in AWS, Terraform, Azure DevOps, and Apigee. The ideal candidate should have a solid background in cloud architecture, automation, and secure platform management, ensuring reliable and compliant deployments. This role involves developing, deploying, and maintaining scalable systems, managing upgrades, and applying robust security controls across CI/CD pipelines and infrastructure. Candidate … services using AWS ECS, ECR, and Fargate, ensuring scalable and secure microservice environments. Use Docker for containerizing applications and improving deployment consistency. Manage and secure Apigee or similar API Management platforms, ensuring API governance, performance optimization, and compliance. Ensure security and compliance best practices across the platform, including secure coding, dependency management, and vulnerability scanning. Implement and … libraries. Collaborate with security teams to align architecture with compliance standards. Prepare and maintain detailed documentation for builds, deployments, and updates. Required Skills Expertise in implementing secure coding and vulnerability management practices. Strong knowledge of API security, OAuth, JWT, and API Gateway policies. Experience in security audits, monitoring, and incident remediation. Familiarity with compliance frameworks (e.g., ISO, SOC More ❯
Posted:

Platform Engineer / DevOps Engineer – Security

City of London, London, United Kingdom
Cognizant
Engineer/DevOps Engineer with strong expertise in AWS, Terraform, Azure DevOps, and Apigee. The ideal candidate should have a solid background in cloud architecture, automation, and secure platform management, ensuring reliable and compliant deployments. This role involves developing, deploying, and maintaining scalable systems, managing upgrades, and applying robust security controls across CI/CD pipelines and infrastructure. Candidate … services using AWS ECS, ECR, and Fargate, ensuring scalable and secure microservice environments. Use Docker for containerizing applications and improving deployment consistency. Manage and secure Apigee or similar API Management platforms, ensuring API governance, performance optimization, and compliance. Ensure security and compliance best practices across the platform, including secure coding, dependency management, and vulnerability scanning. Implement and … libraries. Collaborate with security teams to align architecture with compliance standards. Prepare and maintain detailed documentation for builds, deployments, and updates. Required Skills Expertise in implementing secure coding and vulnerability management practices. Strong knowledge of API security, OAuth, JWT, and API Gateway policies. Experience in security audits, monitoring, and incident remediation. Familiarity with compliance frameworks (e.g., ISO, SOC More ❯
Posted:

Security Analyst

Houston, Texas, United States
Hybrid/Remote Options
K.L. McKinney
incidents within our organization's IT infrastructure. The ideal candidate will have expertise in threat detection, vulnerability assessments, and security compliance to enhance our cybersecurity posture. Key Responsibilities: Threat Monitoring & Incident Response -Continuously monitor security logs, SIEM alerts, and network traffic for threats. -Analyze security events and escalate incidents based on severity and impact. -Investigate potential breaches, malware infections … and unauthorized access attempts. -Assist in incident response, containment, and remediation activities. Vulnerability Management & Risk Assessment -Conduct vulnerability scans, risk assessments, and penetration tests. -Work with IT teams to remediate security gaps and harden systems. -Research emerging threats and attack techniques to proactively improve defenses. Security Policies & Compliance -Ensure compliance with industry standards (ISO 27001, NIST, GDPR More ❯
Employment Type: Any
Salary: USD 130,000 Annual
Posted:

Security Engineer

Houston, Texas, United States
K.L. McKinney
alerts, logs, and network traffic for suspicious activity. Conduct forensic investigations, malware analysis, and incident remediation. Work with SOC teams to develop and improve security monitoring and response strategies. Vulnerability Management & Risk Assessment Perform penetration testing, vulnerability assessments, and security audits. Identify and remediate security misconfigurations, weaknesses, and risks. Ensure security policies align with industry standards (ISO … NIST, GDPR, SOC 2, etc.). Security Automation & DevSecOps Integrate security controls into CI/CD pipelines and cloud environments. Automate security monitoring, log analysis, and vulnerability scanning. Develop scripts and tools for incident response and threat mitigation. Compliance & Security Awareness Ensure adherence to regulatory and compliance frameworks applicable to the organization. Provide security guidance and training for IT More ❯
Employment Type: Any
Salary: USD 140,000 Annual
Posted:

Cyber Security Analyst $97/hr Srinivasa Reddy Kandi

Philadelphia, Pennsylvania, United States
VALIANT TECHNOLOGIES LLC
techniques. 4. Demonstrated experience with cyber security principles for Linux, Windows, virtual platforms, networking, and Cloud. 5. Demonstrated experience with network architectures and fundamentals. 6. Demonstrated experience developing risk management methodologies. 7. Demonstrated experience analyzing test results to develop risk and threat mitigation plans. 8. Demonstrated experience with market-leading vulnerability management tools including the ability to … deploy, configure, and run these tools. 9. Demonstrated experience with vulnerability concepts and prevalent vulnerability types such as SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), path traversals, denial of service (DoS), buffer overflows, command injection, race conditions, open redirects, privilege escalation, authentication bypasses, XML External Entity (XXE) attacks and similar. 10. Demonstrated experience with … privilege and high/low trust boundaries and what defines a vulnerability vs. weakness. 11. Demonstrated experience with vulnerability and risk scoring frameworks and methodologies such as CVSSv2 and CVSSv3. 12. Demonstrated experience with vulnerability repositories (NVD, CVE MITRE, and VULdb) and exploitation techniques (MITRE ATT&CK and DEFEND 13. Demonstrated experience with web application (OWASP) and More ❯
Employment Type: Any
Salary: USD 97 Hourly
Posted:

Cyber Security Manager

London Area, United Kingdom
Hybrid/Remote Options
TRIA
not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerability management, identity & access management, and network security. Develop and manage project plans, milestones, risks, and budgets. Coordinate delivery across regional teams, ensuring consistency and practicality. Manage third … progress. Essential Skills & Experience Proven experience managing complex cyber security projects within multi-region or federated organisations. Strong technical understanding across key cyber domains within Microsoft environments. Excellent stakeholder management and communication skills. Familiarity with structured project management methodologies (e.g. PRINCE2, PMP, Agile). Relevant security certifications such as CISSP, CISM, CompTIA Security+, or AWS/Azure Security More ❯
Posted:

Cyber Security Manager

City of London, London, United Kingdom
Hybrid/Remote Options
TRIA
not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerability management, identity & access management, and network security. Develop and manage project plans, milestones, risks, and budgets. Coordinate delivery across regional teams, ensuring consistency and practicality. Manage third … progress. Essential Skills & Experience Proven experience managing complex cyber security projects within multi-region or federated organisations. Strong technical understanding across key cyber domains within Microsoft environments. Excellent stakeholder management and communication skills. Familiarity with structured project management methodologies (e.g. PRINCE2, PMP, Agile). Relevant security certifications such as CISSP, CISM, CompTIA Security+, or AWS/Azure Security More ❯
Posted:

Technical Systems Administrator

Horsforth, Leeds, West Yorkshire, England, United Kingdom
TPP (The Phoenix Partnership)
The role involves: • Managing, maintaining and upgrading enterprise server and storage hardware • Providing internal support for office hardware including, PCs, laptops, mobile devices (Windows OS, iOS, MacOS and Android) • Vulnerability management using scanning tools such as Nessus • Remediation/automation of software rollout using Ninite/PDQ • Configuring and monitoring of Anti-virus software & Mobile Device Management • Firewall/Switch management - Configuration, patching and upgrading • Administering Microsoft Active Directory, Exchange Server & Office 365 • Achieving recognised Cyber Security accreditation • Management of video conferencing • Management of enterprise level phone system • Monitoring and managing the availability and scalability of resources, including CPU usage, disk usage and storage systems including network troubleshooting • Continuously improving and keeping up More ❯
Employment Type: Full-Time
Salary: £45,000 per annum
Posted:

Associate, Technology Audit

Dallas, Texas, United States
Goldman Sachs & Co. LLC
independent assurance of the internal control structure within the firm's technology infrastructure and business systems. Leverage knowledge and experience in technology infrastructure, application development, cybersecurity, electronic trading, risk management and anti-financial crime systems. Requires: Master's degree (U.S. or foreign equivalent) in Computer Science, Computer or Electronics Engineering, Business Analytics, Information Systems, or a related field and … to business risks in integrated audits/projects; utilizing concepts related to information systems, networks, system architecture, design, information security, technology resiliency, risk and control governance and metrics, incident management, SDLC, vulnerability management, and data protection in audits/projects; and collaborate with partners between first and second lines-of-defense to inform risk evaluation of compliance More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security & Centralised Services Manager

London Area, United Kingdom
Hybrid/Remote Options
MFK Recruitment
and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. … and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerability management, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement More ❯
Posted:

Cyber Security & Centralised Services Manager

City of London, London, United Kingdom
Hybrid/Remote Options
MFK Recruitment
and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. … and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerability management, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement More ❯
Posted:

Cyber Security & Centralised Services Manager

London, South East, England, United Kingdom
Hybrid/Remote Options
MFK Recruitment
and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. … and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerability management, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement More ❯
Employment Type: Full-Time
Salary: £55,000 - £65,000 per annum
Posted:

InfoSec Analyst

City of London, London, United Kingdom
Hybrid/Remote Options
Travelfusion
and security alerts for suspicious activity and potential security breaches. Incident Response: Act as a first responder to security incidents, investigating breaches, containing threats and helping to restore systems. Vulnerability Management: Conduct regular vulnerability assessments and penetration tests to identify weaknesses in systems and implement necessary improvements. Security Implementation: Improve Security measures. Data Protection & Compliance: Ensure that … Mindset: The ability to analyzs large amounts of data to identify anomalies and potential risks. Technical Proficiency: Knowledge of operating systems, firewalls, encryption, VPNs and security information and event management (SIEM) systems. Attention to Detail: Meticulous in reviewing data and systems to catch even minor security flaws. Strong Communication: Ability to clearly communicate findings and recommendations to both technical More ❯
Posted:

InfoSec Analyst

London Area, United Kingdom
Hybrid/Remote Options
Travelfusion
and security alerts for suspicious activity and potential security breaches. Incident Response: Act as a first responder to security incidents, investigating breaches, containing threats and helping to restore systems. Vulnerability Management: Conduct regular vulnerability assessments and penetration tests to identify weaknesses in systems and implement necessary improvements. Security Implementation: Improve Security measures. Data Protection & Compliance: Ensure that … Mindset: The ability to analyzs large amounts of data to identify anomalies and potential risks. Technical Proficiency: Knowledge of operating systems, firewalls, encryption, VPNs and security information and event management (SIEM) systems. Attention to Detail: Meticulous in reviewing data and systems to catch even minor security flaws. Strong Communication: Ability to clearly communicate findings and recommendations to both technical More ❯
Posted:

Management Coordinator/ Technical Writer

Charlotte, North Carolina, United States
SoftPath Technologies LLC
Management Coordinator/Technical Writer Location: Charlotte, NC- Onsite Duration: Long term contract Banking domain exp. is must Candidates who can work independently are more preferred Skills: The ideal candidate will have deep experience identifying, collecting, and organizing large amounts of technical content across many disparate groups, bringing knowledge to bear in automated processes. Experience as curator of technical … procedures, work instructions, job aids, technical manuals) with a large complex organization Ability to perform technical writing as well as guide other tech writers Experience with Industry standard content management and knowledge automation solutions (Confluence, Service Now, or other content management systems (CMS) and content management databases for ECM and WCM) Experience/knowledge with Infrastructure patching … or Security Vulnerability management Required Skills: Technical Writing Experience Skilled in organizing large volumes of content across teams and platforms Proficient in CMS tools like Confluence, ServiceNow, ECM/WCM platforms Understands how to automate and optimize knowledge workflows General understanding of server infrastructure, patching, and security operations More ❯
Employment Type: Any
Salary: USD Annual
Posted:
Vulnerability Management
10th Percentile
£35,650
25th Percentile
£47,500
Median
£68,500
75th Percentile
£90,000
90th Percentile
£97,500