in talent, technologies, and tools that empower you to own your career. Join MUFG, where being inspired is expected and making a meaningful impact is rewarded. The Threat and Vulnerability Management Team Lead is responsible for defining, developing, and leading the strategic direction for safeguarding the organisation's infrastructure and applications. This is achieved by proactively identifying, assessing, and … which encompasses Infrastructure and Service Management across EMEA Bank, International Securities, and the 15+ countries in which these entities operate. The position is responsible for leading the Threat and Vulnerability Management function, including oversight of an outsourced offshore third-party service. This function integrates secure practices into the development lifecycle and aligns with service transition processes to ensure compliance … standards. It plays a critical role in governance, audit readiness, and the continuous improvement of MUFG's security posture, while also serving as the central coordination point for all vulnerability-related activities across DES. The successful candidate must demonstrate proven experience in leading teams and fostering a culture of technical excellence. They will be expected to establish best practices More ❯
VULNERABILITY MANAGEMENT ANALYST/VM ANALYST Up to £75,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a major … driving forces behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a Vulnerability Management Analyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's Vulnerability Management Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes & Schedules related to … VulnerabilityScanning of All Endpoints of the business. As a Vulnerability Management Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of Vulnerability Management Analyst role would include: Conducting VulnerabilityScanningMore ❯
buildings that house them, demand rigorous cybersecurity defenses to prevent disruption and compromise. In this role, you will be securing Boeing's production environments by architecting and implementing OT vulnerability and patch management capabilities, enabling continuous asset visibility, prioritized remediation, and validating fixes in controlled test environments. Working alongside manufacturing, IT, safety, and external vendors, you'll coordinate mitigations … specialized domain. Join us and help lead the charge in securing the systems and environments that produce our industry leading products. Primary responsibilities: Develop and enhance the enterprise OT Vulnerability Management Program to deploy OT aware scanning and patching tooling across targeted OT environments such as production equipment, facilities, and labs Implement continuous asset discovery and credentialed/… passive vulnerabilityscanning with centralized ingestion to Boeing SIEM and consolidated reporting Formalize the OT Security lifecycle workflows with risk-based prioritization, ticketing and verification workflows, exception documentation, and compensating control processes Design, build, and validate a safe patching infrastructure, including vendor sourcing, patch staging, test lab validation, deployment orchestration, rollback procedures, and change control coordination Create and More ❯
buildings that house them, demand rigorous cybersecurity defenses to prevent disruption and compromise. In this role, you will be securing Boeing's production environments by architecting and implementing OT vulnerability and patch management capabilities, enabling continuous asset visibility, prioritized remediation, and validating fixes in controlled test environments. Working alongside manufacturing, IT, safety, and external vendors, you'll coordinate mitigations … specialized domain. Join us and help lead the charge in securing the systems and environments that produce our industry leading products. Primary responsibilities: Develop and enhance the enterprise OT Vulnerability Management Program to deploy OT aware scanning and patching tooling across targeted OT environments such as production equipment, facilities, and labs Implement continuous asset discovery and credentialed/… passive vulnerabilityscanning with centralized ingestion to Boeing SIEM and consolidated reporting Formalize the OT Security lifecycle workflows with risk-based prioritization, ticketing and verification workflows, exception documentation, and compensating control processes Design, build, and validate a safe patching infrastructure, including vendor sourcing, patch staging, test lab validation, deployment orchestration, rollback procedures, and change control coordination Create and More ❯
reach but a deep local presence, Colt is big enough to deliver and small enough to care. Why we need this role? We are seeking a dynamic and motivated Vulnerability Management Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The Vulnerability Management Lead … will play a crucial role in tracking and managing the identification, assessment, and remediation of security vulnerabilities across the organization’s infrastructure and monitoring and reporting on vulnerability and other security compliance status. The role requires collaboration with various partners to ensure that vulnerability assessments and emerging threats are prioritized and advanced. Additionally, the successful candidate will work … with management to continuously evolve the vulnerability management program. What you will do: You will be responsible for supporting CSOC in order to achieve the below: The development and implementation of the Colt Vulnerability Management Framework. Enhancing the scope and efficiency of current vulnerabilityscanning and management tools and integration between them. Design and manage the More ❯
at the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Threat and Vulnerability Manager to protect DIT and the wider UK government from cyber threats in a fast paced and exciting role, responsible for the Vulnerability Management and Threat Hunting of … government from cyber threats in a fast paced and exciting role. Reporting to the Head of Cyber Security Operations, you will manage and be responsible for the Threat and Vulnerability Management function within the SOC, by providing leadership on identification and improvement opportunities, and ensuring service owners are aware of weaknesses in their security posture and are empowered with … be found. Main responsibilities Your day-to-day role will involve the need to: Working with the Security Leadership team to develop a strategic road map for an effective vulnerability detection, assessment, remediation, and threat intelligence program. Line management of the threat and vulnerability management team. Building sustainable relationships to champion the adoption of vulnerability and threat More ❯
DEX platforms such as SolarWinds, ControlUp, Splunk, Strong Hardware proficiency (Ex: Synergy, Nimble, Brocade, Service BAU requests. Securing systems to Cyber Essentials, PCI DSS and ISO27000 standards through audits, vulnerabilityscanning and remediation Documentation, creation, update and keeping to date. Assist in the migration from, consolidation of and/or decommission of legacy systems The Ideal Candidate Personal More ❯
DEX platforms such as SolarWinds, ControlUp, Splunk, Strong Hardware proficiency (Ex: Synergy, Nimble, Brocade, Service BAU requests. Securing systems to Cyber Essentials, PCI DSS and ISO27000 standards through audits, vulnerabilityscanning and remediation Documentation, creation, update and keeping to date. Assist in the migration from, consolidation of and/or decommission of legacy systems The Ideal Candidate Personal More ❯
DEX platforms such as SolarWinds, ControlUp, Splunk, Strong Hardware proficiency (Ex: Synergy, Nimble, Brocade, Service BAU requests. Securing systems to Cyber Essentials, PCI DSS and ISO27000 standards through audits, vulnerabilityscanning and remediation Documentation, creation, update and keeping to date. Assist in the migration from, consolidation of and/or decommission of legacy systems The Ideal Candidate Personal More ❯
DEX platforms such as SolarWinds, ControlUp, Splunk, Strong Hardware proficiency (Ex: Synergy, Nimble, Brocade, Service BAU requests. Securing systems to Cyber Essentials, PCI DSS and ISO27000 standards through audits, vulnerabilityscanning and remediation Documentation, creation, update and keeping to date. Assist in the migration from, consolidation of and/or decommission of legacy systems The Ideal Candidate Personal More ❯
DEX platforms such as SolarWinds, ControlUp, Splunk, Strong Hardware proficiency (Ex: Synergy, Nimble, Brocade, Service BAU requests. Securing systems to Cyber Essentials, PCI DSS and ISO27000 standards through audits, vulnerabilityscanning and remediation Documentation, creation, update and keeping to date. Assist in the migration from, consolidation of and/or decommission of legacy systems The Ideal Candidate Personal More ❯
DEX platforms such as SolarWinds, ControlUp, Splunk, Strong Hardware proficiency (Ex: Synergy, Nimble, Brocade, Service BAU requests. Securing systems to Cyber Essentials, PCI DSS and ISO27000 standards through audits, vulnerabilityscanning and remediation Documentation, creation, update and keeping to date. Assist in the migration from, consolidation of and/or decommission of legacy systems The Ideal Candidate Personal More ❯
DEX platforms such as SolarWinds, ControlUp, Splunk, Strong Hardware proficiency (Ex: Synergy, Nimble, Brocade, Service BAU requests. Securing systems to Cyber Essentials, PCI DSS and ISO27000 standards through audits, vulnerabilityscanning and remediation Documentation, creation, update and keeping to date. Assist in the migration from, consolidation of and/or decommission of legacy systems The Ideal Candidate Personal More ❯
DEX platforms such as SolarWinds, ControlUp, Splunk, Strong Hardware proficiency (Ex: Synergy, Nimble, Brocade, Service BAU requests. Securing systems to Cyber Essentials, PCI DSS and ISO27000 standards through audits, vulnerabilityscanning and remediation Documentation, creation, update and keeping to date. Assist in the migration from, consolidation of and/or decommission of legacy systems The Ideal Candidate Personal More ❯
DEX platforms such as SolarWinds, ControlUp, Splunk, Strong Hardware proficiency (Ex: Synergy, Nimble, Brocade, Service BAU requests. Securing systems to Cyber Essentials, PCI DSS and ISO27000 standards through audits, vulnerabilityscanning and remediation Documentation, creation, update and keeping to date. Assist in the migration from, consolidation of and/or decommission of legacy systems The Ideal Candidate Personal More ❯
DEX platforms such as SolarWinds, ControlUp, Splunk, Strong Hardware proficiency (Ex: Synergy, Nimble, Brocade, Service BAU requests. Securing systems to Cyber Essentials, PCI DSS and ISO27000 standards through audits, vulnerabilityscanning and remediation Documentation, creation, update and keeping to date. Assist in the migration from, consolidation of and/or decommission of legacy systems The Ideal Candidate Personal More ❯
DEX platforms such as SolarWinds, ControlUp, Splunk, Strong Hardware proficiency (Ex: Synergy, Nimble, Brocade, Service BAU requests. Securing systems to Cyber Essentials, PCI DSS and ISO27000 standards through audits, vulnerabilityscanning and remediation Documentation, creation, update and keeping to date. Assist in the migration from, consolidation of and/or decommission of legacy systems The Ideal Candidate Personal More ❯
DEX platforms such as SolarWinds, ControlUp, Splunk, Strong Hardware proficiency (Ex: Synergy, Nimble, Brocade, Service BAU requests. Securing systems to Cyber Essentials, PCI DSS and ISO27000 standards through audits, vulnerabilityscanning and remediation Documentation, creation, update and keeping to date. Assist in the migration from, consolidation of and/or decommission of legacy systems The Ideal Candidate Personal More ❯
enterprise applications, data and infrastructure and by identifying, assessing, and mitigating security risks. This is a hands-on, predominantly office-based role requiring experience in application and data security, vulnerability assessments, security administration, threat monitoring and response. You will work alongside a multidisciplinary team of infrastructure, support staff and developers, cross-functionally supporting colleagues from across the business and … endpoint protection, etc.). • Monitoring security policies, standards, and best practices. • Reviewing and monitoring user access and identity management controls across systems. • Key activities in relation to Penetration Testing & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing … Cyber Security practices like NIST, Cyber Essentials +, ISO27001. • Familiarity with regulatory compliance and auditing standards. • Ability to identify, assess and mitigate security risks. • Knowledge of penetration testing and vulnerabilityscanning tools like Nessus and Qualys. • Proficiency in applying security tooling including firewalls, VPN’s, Network Traffic Analysis. • Knowledge of network protocols TCP/IP, HTTP, DNS, SSH More ❯
enterprise applications, data and infrastructure and by identifying, assessing, and mitigating security risks. This is a hands-on, predominantly office-based role requiring experience in application and data security, vulnerability assessments, security administration, threat monitoring and response. You will work alongside a multidisciplinary team of infrastructure, support staff and developers, cross-functionally supporting colleagues from across the business and … endpoint protection, etc.). • Monitoring security policies, standards, and best practices. • Reviewing and monitoring user access and identity management controls across systems. • Key activities in relation to Penetration Testing & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing … Cyber Security practices like NIST, Cyber Essentials +, ISO27001. • Familiarity with regulatory compliance and auditing standards. • Ability to identify, assess and mitigate security risks. • Knowledge of penetration testing and vulnerabilityscanning tools like Nessus and Qualys. • Proficiency in applying security tooling including firewalls, VPN’s, Network Traffic Analysis. • Knowledge of network protocols TCP/IP, HTTP, DNS, SSH More ❯
enterprise applications, data and infrastructure and by identifying, assessing, and mitigating security risks. This is a hands-on, predominantly office-based role requiring experience in application and data security, vulnerability assessments, security administration, threat monitoring and response. You will work alongside a multidisciplinary team of infrastructure, support staff and developers, cross-functionally supporting colleagues from across the business and … endpoint protection, etc.). • Monitoring security policies, standards, and best practices. • Reviewing and monitoring user access and identity management controls across systems. • Key activities in relation to Penetration Testing & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing … Cyber Security practices like NIST, Cyber Essentials +, ISO27001. • Familiarity with regulatory compliance and auditing standards. • Ability to identify, assess and mitigate security risks. • Knowledge of penetration testing and vulnerabilityscanning tools like Nessus and Qualys. • Proficiency in applying security tooling including firewalls, VPN's, Network Traffic Analysis. • Knowledge of network protocols TCP/IP, HTTP, DNS, SSH More ❯
configuration and real-time threat visibility Oversee firewall, VPN, and intrusion prevention configurations to maintain secure network boundaries Support certificate and key management following encryption and PKI best practices Vulnerability, Threat, and Risk Management Automate vulnerabilityscanning and penetration testing using tools (Qualys, Nessus, OpenVAS) and custom scripts Coordinate third-party penetration tests and track remediation actions … cloud and on-premise environments Strong knowledge of network security, endpoint protection, and cloud security principles Hands-on experience with security tools such as SIEM, EDR/XDR, and vulnerability scanners Understanding of regulatory frameworks including GDPR, ISO 27001, and FCA requirements Experience with scripting and automation (Python, PowerShell, or similar) Ability to analyze security incidents and recommend appropriate More ❯
Edina, Minnesota, United States Hybrid / WFH Options
Jerry's Enterprises Inc
threat detection, incident response, and cybersecurity controls. Demonstrated knowledge of a broad range of technical concepts, examples include: firewall rule configuration, network segmentation, network intrusion detection and response, security vulnerabilityscanning, threat hunting, log analysis, security frameworks and methods both cloud and on-prem. Ability to work on-site or in a hybrid capacity as needed. Participation in … ability to influence decisions by identifying risks and opportunities. Our ideal candidate: Knowledge of cyber-attack stages (e.g., MITRE ATT&CK Framework, tactics, techniques and procedures for conducting reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). Experienced with EDR tools (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint). Understands Microsoft Windows and … Linux operating systems including Active Directory, Group Policy, system hardening, authentication protocols, privilege management. Familiar with SIEM/SOAR platforms, vulnerability scanners, and forensic tools. Knows scripting languages such as Python, PowerShell, or Bash. Experience with cloud security tools and practices in AWS, Azure, or GCP. Knowledge of AI and LLM concepts and ability to leverage IA toolsets. Knows More ❯
Cyber Security Engineer CyberSec Engineer/IT Security Specialist – Disaster Recovery, Resilience Testing, CyberSec Improvements, VulnerabilityScanning/Management, Infrastructure, Nutanix, Commvault, VMware, Azure, PowerShell, Python; Law Firm, Permanent, London/Hybrid (3/2). £80k - £95k (On Experience) +Bonus +Benefits Global Low Firm seeks experienced Cyber Security Engineer/IT Security Specialist to join the IT … infrastructure tooling and at least one scripting language (PowerShell or Python preferred). Experience with Nutanix, VMware, Commvault, and hybrid cloud platforms Azure (preferred), AWS or GCP. Understanding of vulnerability management, monitoring, and orchestration tools. Relevant certifications such as Microsoft SC-200, Certified Ethical Hacker (CEH), CBCP/CBCI or equivalent. We are open to receiving applications from across More ❯
effective controls and adherence to regulatory standards. Consistently monitor and assess cloud environments for vulnerabilities and misconfigurations utilising tools like AWS Inspector, GuardDuty, and Security Hub, complemented by regular vulnerabilityscanning and penetration testing. Design, implement, and automate enterprise-level security systems and controls -including IAM, SIEM, DLP, firewalls, endpoint protection, and cloud-native guardrails-to safeguard assets … on experience with networking, infrastructure, and container security (EKS, ECS, Kubernetes) across both cloud and on-premises environments. Strong understanding of security principles, technologies, and industry best practices , including vulnerability and incident management. Practical experience with security monitoring and protection tools such as Firewalls, IDS/IPS, XDR, SIEM, CNAPP, and log collection platforms (e.g., CrowdStrike, Lacework). Experience … in designing and implementing Identity and Access Management (IAM) solutions and maintaining secure authentication practices. Proficiency with Windows and Linux systems , as well as network scanning and diagnostic tools (e.g., Wireshark, IP scanner). A solid understanding of Public Key Infrastructure (PKI) and encryption fundamentals. Excellent collaboration, communication, and organisational skills , with the ability to work both independently and More ❯