Permanent Vulnerability Scanning Jobs

1 to 25 of 87 Permanent Vulnerability Scanning Jobs

Lead Security Engineer

South East London, London, United Kingdom
Hybrid / WFH Options
The Fortune Group (Recruitment) Limited
secure environment. Suitable Lead Security Engineers will work remotely or in the London office. Projects that need to be completed Security Awareness OpenSource Software scanning Automated Vulnerability Scanning Kubernetes Vulnerability Scanning Supply Chain monitoring (container images etc.) SIEM and Monitoring/Alerting service AntiVirus/ more »
Employment Type: Permanent, Work From Home
Salary: £80,000
Posted:

Senior System Engineer

Corby, England, United Kingdom
Iron Mountain
skills in a culture that will welcome your unique contributions? If so, let's start the conversation. The Role: Senior System Engineer, IT Systems Vulnerability & Patch Management In this role, the Vulnerability & Patch Management Engineer will lead high priority projects and day-to-day activities related to our … Vulnerability & Patch Management Program. The Vulnerability Management Engineer is expected to deliver results while maintaining positive relationships with other IT infrastructure teams and project sponsors. The Vulnerability & Patch Management Engineer will work in a team based environment performing technical duties supporting Vulnerability & Patch Management and be … responsible for executing patches and configuration updates through the production promote life cycle. The Vulnerability & Patch Management Engineer acts as a threat and vulnerability resource assisting with daily operations, specifically the remediation of identified vulnerabilities ensuring compliance and security goals. This role works with IMDC Information Security Risk more »
Posted:

Security Analyst

Hampshire, England, United Kingdom
Shaw Daniels Solutions
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and monitor … for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular Vulnerability Scanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. … Asses the urgency and severity of incidents. Determine whether an incident requires immediate action or further investigation. Escalate incidents to higher tiers when necessary. Vulnerability Scanning: scan systems for vulnerabilities. and manage vulnerabilities discovered during scans. Security Tool Management: Configure and manage security tools (e.g., SIEM, IDS/ more »
Posted:

Senior Security Analyst

Welwyn Garden City, England, United Kingdom
Tesco
Tesco Technology are looking for a Senior Security Analyst reporting into the Vulnerability Management team. This is an exciting opportunity for a highly motivated security focused individual to join our expanding organisation. The scale and complexity of Tesco creates a huge opportunity for someone to apply their existing skills … public cloud environments. Following our Business Code of Conduct and always acting with integrity and due diligence and have these specific risk responsibilities: Maintaining vulnerability scanning platforms to identify and analyse vulnerabilities. Taking a risk-based approach to prioritise remediation efforts. Working with engineering teams to remediate issues. … security incidents and reporting about relevant security threats to contribute to our internal detection engineering programme. Work alongside our analysts to upskill them in Vulnerability Management and look for patterns and issues that can be fixed centrally. POC assessments from our active Bug Bounty Program. You will need: 5+ more »
Posted:

Vulnerability Analyst

England, United Kingdom
Bestman Solutions
Information Security Vulnerability Analyst – Permanent - £50,000 Annual Bestman Solutions is working with a leading energy company in their search for a Vulnerability Analyst. As a Vulnerability Analyst, you will play a vital role in identifying, prioritizing, and addressing vulnerabilities in the organization’s networks, applications, and … systems. Key responsibilities: and implement appropriate vulnerability scanning tools for both IT and OT environments. these tools to scan all assets regularly (e.g., daily, weekly) and identify potential vulnerabilities. with security teams during assessments and cyber exercises to identify vulnerabilities. the identified vulnerabilities based on severity, exploitability, and … potential impact. regular reports summarizing outstanding vulnerabilities, remediation plans, applied exceptions, and associated security risks. the vulnerability manager in navigating approval processes for remediation efforts. Qualifications: in IT Infrastructure, or Network, with a focus in cloud infrastructure and hybrid environments. experience in identifying and managing security vulnerabilities. Prior experience more »
Posted:

Senior Security Engineer

United Kingdom
identifi Global Resources
response efforts/playbooks. -You will be monitoring, remediating, and reporting on security events. -You will be Security incident Manager (SIM). -You will vulnerability configure and scan reviews & improvements -You will ensure asset management across tools is accurate. -You will review security codes and security approvals. -You will … CloudTrail, Guardduty), Qualys tools and SIEM experience, to detect and respond to security events/incidents. -Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, Vulnerability Scanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. -Knowledge of security compliance standards more »
Posted:

Information Systems Security Officer

Columbia, Maryland, United States
Leidos
requirements for processing classified information. Perform tasks related to the continuous Monitoring (ConMon) plans that include auditing, software and hardware configuration management updates and vulnerability assessments. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk … techniques. Working knowledge with Microsoft Windows operating systems (workstation & server), Linux, and system virtualization (multiple hypervisors) in a secure network environment. Experience with compliance scanning tools and vulnerability scanning tools (e.g., Tenable). Must be able to work in a constantly changing regulatory environment with short-, mid … a working knowledge of LINUX operating systems. Current DoD 8570 compliance with IAT Level I or higher (e.g., Security+, CASP, CISM or CISSP). Vulnerability assessment and analysis experience utilizing SCAP, NESSUS and DISA STIGs Experience with DoD implementation of the Risk Management Framework (RMF) and governing directives (NIST more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer - Remote Optional

West Bend, Wisconsin, United States
Hybrid / WFH Options
Delta Defense
Response team, apply keen investigative skills and take swift action in resolving security alerts or breaches, safeguarding our digital borders. Conduct penetration testing and vulnerability scanning on all company networks and applications. Collaborate with engineering stakeholders to prioritize and remediate vulnerabilities based on severity and impact. Lead company more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Security Engineer

Central London, London, United Kingdom
Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, Vulnerability Scanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Employment Type: Permanent, Work From Home
Salary: £80,000
Posted:

Security Operations Specialist

London Area, United Kingdom
Hybrid / WFH Options
Egress Software Technologies
and manage all group security incidents. Whilst there are process aspects to the role there are two main areas of focus for the team: Vulnerability management. The team manage issues identified through internal and external vulnerability testing. Internally we use tools like Snyk (one of several tools available … expo or one of our regular social events after work. The Role Reporting to the Security Operations Manager, your key tasks may involve: Managing vulnerability scanning tools - SAST, SCA, IaC, Containers & DAST for all Egress products Investigate SIEM alerts, working with the Engineering and Operations teams to resolve more »
Posted:

Business Analyst

United Kingdom
Hybrid / WFH Options
PURVIEW
knowledge of web application security practices, including OWASP Top Ten vulnerabilities. Experience with security tools and technologies such as SIEM, IDS/IPS, and vulnerability scanners. Analytical and Problem-Solving Skills: Ability to analyze complex security issues and develop effective solutions. Strong attention to detail and the ability to more »
Posted:

Information Technology Manager

England, United Kingdom
Hybrid / WFH Options
GPA Global | Packaging Solutions
control software; workstations (MAC, Windows), smartphones (Android, OS), printers, desk phones, Reliable technical knowledge about: Network infrastructure including SecOps operations (FW, Switch…), Monitoring and vulnerability scanning at performance for 4 types of assets: workstations, servers, applications, and network components, Microsoft product expertise will be advantageous: O365 (Power BI more »
Posted:

Security Analyst

Wimbledon, United Kingdom
South West London Integrated Care Board
and initiatives to ensure compliance with the organisational Security Policy. Lead security evaluation activities utilising security tests such as commissioned IT Health Checks, auditing, vulnerability scanning and penetration testing to name a few [but not exhaustive]. Report testing results to management and commissioning customers. Documenting and managing more »
Employment Type: Permanent
Salary: £49178.00 - £55492.00 a year
Posted:

System Support Engineer

Redhill, England, United Kingdom
Tiger Resourcing Group
platforms. Support Windows patching process through the creation/update of ad-hoc scripting (Shell, PowerShell) on Windows Server/Desktop platforms. Assist with vulnerability scanning of devices utilizing standard security scanning tools. Manage customer expectations and resolve queries by working closely with Information Security through effective more »
Posted:

Information Security Operations Specialist

London Area, United Kingdom
Hybrid / WFH Options
Primis
with relevant rules and regulations related to financial crime and conduct. Technical Requirements: Excellent knowledge of security technologies and domains, including endpoint protection tools, vulnerability scanners, attack simulation, network security, and cloud security. Proficient in PAM best practices, technologies, and procedures. 2+ years knowledge of Windows Server, Active Directory more »
Posted:

Security Engineer

United Kingdom
Hybrid / WFH Options
Secure Source
identifying vulnerabilities, enhancing security measures, and ensuring the safety of our clients’ digital environments. Your responsibilities will span a wide range of tasks, from vulnerability scanning to technical content creation. Responsibilities: Vulnerability Detection and Automation: Collaborate with our security team to scan customer systems for critical vulnerabilities. … Develop new vulnerability checks using tools like Nuclei. Curate crowd-sourced checks for inclusion in our Intruder platform. Automate penetration testing processes to scale across multiple clients simultaneously. Rapid Response and Custom Scanning: Conduct custom scans on customer targets to identify emerging critical weaknesses. Provide rapid response solutions … Occasionally participate in industry events and conferences. Qualifications and Experience: Industry Experience: Minimum of 2 years in offensive security roles. Proven track record in vulnerability assessment and penetration testing. Educational Background: Technical academic background in software engineering or cyber security. Certifications (One or More): OSCP OSWE OSEP CRT CCT more »
Posted:

Senior Linux Administrator

Oxfordshire, England, United Kingdom
Hybrid / WFH Options
University of Oxford
Security Operations and the rest of the team. OxCERT runs an on-premises Elasticsearch-based SIEM solution, an Intrusion Detection System (IDS), and a vulnerability scanning service as well as other open source and commercial tools. We are one of the first UK universities to have the capability more »
Posted:

Senior .NET Developer

Bangalore, Karnataka, India
American Express Global Business Travel
platforms like AWS, Azure, or GCP and deploying applications in cloud environments. Security Practices: Understanding of security best practices in CI/CD, including vulnerability scanning and code analysis. Monitoring and Logging: Experience with monitoring and logging tools like Prometheus, Grafana, ELK stack, or similar. Collaboration: Strong communication more »
Employment Type: Permanent
Salary: INR Annual
Posted:

Sr. Principal Windows Systems Administrator - Polygraph

Maryland, New York, United States
Northrop Grumman
Servers (WSUS), SCCM or similar update service - Certificate Authority (CA) server - Supporting license managers Supporting golden image creation, deployment and underlying infrastructure Experience deploying vulnerability scanning tools and remediation. Clearance and access: Candidates must have a current DoD Top Secret/SCI level security clearance with a polygraph more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Northrop Grumman (DoD SkillBridge) - Sr. Principal Classified Cybersecurity Analyst

Maryland, New York, United States
Northrop Grumman
with Certification and Accreditation of classified systems and Risk Management Framework Knowledge of ACAS, NESSUS, SPLUNK, SCAP, POA&Ms, NIST, DIACAP, NISPOM, system audits, vulnerability scanning, and RMF package development preferred Current Top Secret with SAP/SAR access level is highly desirable ESCSO ESMilIntern ESCyberInfoSec Salary Range more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Manager

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Head Resourcing
team engagements to tune and validate detection tooling. Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetration testing, and vulnerability scanning. Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams. Manage the delivery of daily more »
Posted:

Cyber Security Specialist

United Kingdom
Dragonfly People
prevent further spread across the organization. Document incident details, response actions, and lessons learned to improve incident response procedures and enhance endpoint security posture. Vulnerability Management: Conduct vulnerability assessments and scans on endpoints to identify software vulnerabilities, misconfigurations, and security weaknesses. Prioritize vulnerabilities based on risk assessment and … a strong understanding of security principles, technologies, and best practices. Proficiency in using security tools such as SIEM, IDS/IPS, antivirus, firewalls, and vulnerability scanners. Hands-on experience with Microsoft Defender Security & Compliance Suite, Exchange Online Protection, CASB, Mimecast, Inutne Policy Deployment, Microsoft Entra ID etc… Hands-on more »
Posted:

IT Security Engineer

Glasgow, Lanarkshire, United Kingdom
Hybrid / WFH Options
Sanderson Recruitment Plc
incidents relating to internal and customer assets. Designing and developing SIEM security use cases. Designing and implementing security controls and secure configurations. Maintaining proactive vulnerability scanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and … to discuss security related matters. Skills Required: Proven hands-on experience as an IT Security Engineer or similar working with tools such as SIEM, vulnerability management, endpoint detection & response (EDR), applications security, identity, and access management, etc. Ability to work in a small high performing team, collaborating with other … technical resources whilst aligning to the security strategy. Technical knowledge and experience with SIEM, SOAR, IDPS, DDoS, Malware Protection, Vulnerability Management, and Application Security tooling, etc. Knowledge of Information Security frameworks (CIS, NIST, NCSC CAF), supporting processes and toolsets. Ability to breakdown and solve complex problems across multiple domains more »
Employment Type: Permanent
Salary: GBP 70,000 Annual
Posted:

Lead Software Engineer (Fullstack)

Atlanta, Georgia, United States
Mastercard
services and facilitate cross-functional team interactions to drive resolution • Write code to build and enhance applications/services and promote code-reviews, code scanning, and other standard development practices to deliver high-quality artifacts to production. • Define, design, and develop procedures and solutions at a service level to … remove coding errors • Has skills to document and coach team on the development practices and coding guidelines (e.g., branching, peer reviews, library use, logging, scanning rules, test-driven development, error handling) • Understands use cases for advanced design patterns (e.g., service-to-worker, MVC, API gateway, intercepting filter, dependency injection … using industry-standard tools (e.g., Jenkins, Bamboo, AWS/Azure pipelines, XL Release, others) • Able to configure rules and build automation for code with vulnerability scanning and software composition analysis using standard tools (e.g., Sonar, Checkmarx, Nexus, JFrog XRay, Veracode, others) • Has skills to define, organize, and report more »
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Information Security Consultant - Leeds

Leeds, West Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
CIIH Ltd T/A Headway Recruitment
knowledge of the Microsoft O365 environment, threat intelligence analysis, Security Incident Response processes, disaster recovery, and business continuity principles. Familiarity with security testing principles, vulnerability scanning, risk identification, resolution, and reporting. Experience in formal document creation, such as reports or procedures. Key Responsibilities include but not limited to more »
Employment Type: Permanent, Work From Home
Salary: £55,000
Posted:
Vulnerability Scanning
10th Percentile
£39,975
25th Percentile
£45,000
Median
£61,250
75th Percentile
£80,000
90th Percentile
£82,500