Permanent Vulnerability Scanning Job Vacancies

26 to 50 of 150 Permanent Vulnerability Scanning Jobs

IT Security Manager

Clydebank, Dunbartonshire, United Kingdom
Hybrid / WFH Options
Nine Twenty
Maintains awareness of industry best practices and applies them to organisational security policies. Implements and monitors security systems such as firewalls, intrusion detection systems, endpoint protection, log monitoring, and vulnerability scanning. Investigates and documents security breaches and cyber incidents, including assessment of impact and coordination of remediation efforts. Coordinates penetration testing with internal or external parties as appropriate. Drives More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Vulnerability Management Analyst

London, United Kingdom
Hybrid / WFH Options
Barclay Simpson
access View job & apply Zero Trust Architect Location: Fully Remote Job type: Contract Position Overview: Leading FinTech company seeking a Zero Trust Architect to design and implement Cyber Security Vulnerability Management Analyst Cyber Security Vulnerability Management Analyst required for a market leading financial services firm. It's a great opportunity to get to work with industry-leading tools … your analytical, technical and communication skills, and to really make a difference to our customers and colleagues. This role will contribute to the development, maintenance and overall delivery of Vulnerability Management controls for the Bank, reporting to the Vulnerability Management Lead. The Vulnerability Management Analyst will contribute to the day-to-day running of the team, assisting … Specialists with managing the Bank's Vulnerability Management controls and providing security input for vulnerabilities which threaten the organisation. Experience Understanding of vulnerability lifecycles, standards and ratings Risk assessing findings to determine appropriate response with a proactive approach to recording, management and escalation of risks Increasing the quality of vulnerability reporting automation to reduce manual effort Advanced More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Systems Security Manager with Security Clearance

Fairfax, Virginia, United States
M.C. Dean
for effective and efficient execution of business functions. 3. Provide effective leadership to identify, assess, and mitigate cybersecurity risks; exercise direct ownership of system monitoring and auditing, threat intelligence, vulnerability management, incident response, cybersecurity awareness, and other critical continuous monitoring processes. 4. Lead investigations of computer security violations and incidents, reporting as necessary to both the Facility Security and … Technical Implementation Guide (STIGs) • Working knowledge of information key security concepts, such as encryption, Public Key Infrastructure (PKI), and related • Working knowledge of and hands-on experience with compliance scanning tools (e.g. SCAP), vulnerability scanning tools (e.g. ACAS), eMASS • Excellent written and verbal communication and presentation skills. • Ability to work in a cross-functional team environment and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Manager

City of London, London, England, United Kingdom
Hybrid / WFH Options
Skillcast
security operations, drive compliance efforts, and strengthen our cloud and infrastructure defenses. As a Cyber Security Manager you will play a key role in managing security incidents, audits, and vulnerability programs, while mentoring junior team members and helping shape the future of cybersecurity at Skillcast. Key Responsibilities: - Coordinate SOC 2, ISO 27001, and Cyber Essentials audits - including documentation, evidence … management, gap analysis, and communication with auditors - Administer and enhance Azure Sentinel SIEM - including data source configuration, detection rule creation, incident triage, and reporting - Oversee vulnerability scanning, prioritisation, stakeholder coordination, and remediation tracking - Implement and manage security controls across Azure and Kubernetes environments, ensuring scalable and secure architecture - Work closely with DevOps to embed security in CI/… experience in cybersecurity and IT infrastructure roles - Hands-on experience with Azure, Kubernetes/Docker, and CI/CD security practices - Proficient in SIEM platforms (especially Azure Sentinel) and vulnerability management tools - Strong knowledge of incident response, infrastructure hardening, and cloud security controls - Familiarity with SOC 2, ISO 27001, Cyber Essentials, and NIST frameworks - Experience with core security technologies More ❯
Employment Type: Full-Time
Salary: £60,000 - £65,000 per annum
Posted:

Cyber Security Manager

EC3A, Tower, Greater London, United Kingdom
Hybrid / WFH Options
Skillcast
security operations, drive compliance efforts, and strengthen our cloud and infrastructure defenses. As a Cyber Security Manager you will play a key role in managing security incidents, audits, and vulnerability programs, while mentoring junior team members and helping shape the future of cybersecurity at Skillcast. Key Responsibilities: - Coordinate SOC 2, ISO 27001, and Cyber Essentials audits – including documentation, evidence … management, gap analysis, and communication with auditors - Administer and enhance Azure Sentinel SIEM – including data source configuration, detection rule creation, incident triage, and reporting - Oversee vulnerability scanning, prioritisation, stakeholder coordination, and remediation tracking - Implement and manage security controls across Azure and Kubernetes environments, ensuring scalable and secure architecture - Work closely with DevOps to embed security in CI/… experience in cybersecurity and IT infrastructure roles - Hands-on experience with Azure, Kubernetes/Docker, and CI/CD security practices - Proficient in SIEM platforms (especially Azure Sentinel) and vulnerability management tools - Strong knowledge of incident response, infrastructure hardening, and cloud security controls - Familiarity with SOC 2, ISO 27001, Cyber Essentials, and NIST frameworks - Experience with core security technologies More ❯
Employment Type: Permanent
Salary: £60000 - £65000/annum
Posted:

Information Security Consultant

Leeds, West Yorkshire, England, United Kingdom
Elevate Technology Group Ltd
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding … a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Employment Type: Full-Time
Salary: £60,000 - £75,000 per annum
Posted:

Cybersecurity Consultant

Leeds, West Yorkshire, England, United Kingdom
Elevate Technology Group Ltd
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding … a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Employment Type: Full-Time
Salary: £60,000 - £75,000 per annum
Posted:

Information Systems Security Engineer with Security Clearance

Herndon, Virginia, United States
RSCY Consultants, LLC
Develops and implements security designs ensure that the hardware, operating systems and software applications adequately address cyber security requirements and Security Controls Traceability Matrix (SCTM). Identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Implement, validate Security Technical Implementation Guide (STIG) requirements and/or perform SRG assessments for … Guide (STIG) implementation and Security Content Automation Protocol (SCAP) tool usage Proven experience performing Systems Security tasks including: Security Information and Event Monitoring (Splunk); Endpoint security (HBSS); Compliance and vulnerability scanning (ACAS/Nessus) Demonstrated experience with creating and validating evidence for NIST security controls. Desired Qualifications: Skilled in implementing mitigation strategies and how to resolve problems, and … scripting/programming (use of Shell scripting, Python, Javascript, Powershell) in a Linux or Windows environment to support the various Cyber Security tools and applications required Provide guidance on vulnerability and malware remediation. Experience analyzing vulnerabilities, establishing cause and impact, and identifying the corrective action needed to eliminate and prevent the event from happening in the future. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

System Administrator with Security Clearance

Hill Afb, Utah, United States
Golden Tech Systems Inc
analysis and resolve system and application faults and errors Maintain working knowledge of Microsoft Active Directory, Group Policy Objects (GPOs), DHCP, DNS, and PowerShell General understanding of antivirus and vulnerability scanning software Basic understanding of Security Information and Event Management (SIEM) tools Ensure compliance of assigned operating systems and applications with Department of Defense (DoD) directives, including DISA … Security Technical Implementation Guide (STIG) and Information Assurance Vulnerability Management (IAVM) bulletins What's In It For You Competitive wages Medical and dental coverage 401k plan Paid time off Rewards & recognition US Citizenship Requirement Clearance Requirement This position requires an active final Secret clearance upon hire, with the ability to obtain and maintain a Top Secret clearance. An active More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer with Security Clearance

West Point, Georgia, United States
TEKsystems c/o Allegis Group
The Security Engineer III participates in all aspects of information systems and network security including intrusion detection, incident response, vulnerability assessment, application security and compliance with the corporate information security policy. Primarily be responsible for implementing, operating and improving security technologies including DLP, Antivirus, IPS/IDS, End Point Protection, Database Activity Monitoring, Web Application Firewall and processes. Essential … schedule - Implement changes to our security technologies/infrastructure in accordance with standard and change control policies/procedures - Evaluate, implement, tune and operate Security Solutions such as IPS, Vulnerability scanning tools, encryption capabilities, etc. - Monitor and recommend improvements of security technologies and their various reports - Risk Management/Security Audit/Assessment Support/Ad-hoc support More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Infrastructure Engineer

Birmingham, West Midlands, West Midlands (County), United Kingdom
Hybrid / WFH Options
ECS Resource Group Ltd
those related to physical security. Maintain and enhance the security posture of servers for both existing and new applications, on-premise and in Azure cloud environments. Monitor and manage vulnerability scanning tools, address findings, and coordinate remediation efforts with infrastructure and development teams. Support the development, testing, and annual validation of disaster recovery and backup plans. Create and … To Be Considered for This Role, You Will Need: Cybersecurity Experience: Demonstrated experience in implementing and managing security controls across hybrid environments. Familiarity with endpoint protection, threat detection, and vulnerability management tools. Incident Response & Problem Solving: Ability to respond swiftly and effectively to security incidents. Skilled in structured analysis and incident remediation to ensure rapid recovery. Threat Awareness & Risk More ❯
Employment Type: Permanent
Salary: £50000/annum
Posted:

DevSecOps Engineer III with Security Clearance

Colorado Springs, Colorado, United States
Golden Tech Systems Inc
Responsibilities Collaborate with cross-functional teams to integrate robust security measures throughout the software development lifecycle. Design, implement, and manage CI/CD pipelines that include automated security testing, vulnerability scanning, and compliance validation. Develop and maintain infrastructure as code (IaC) configurations to ensure secure, scalable cloud and infrastructure deployments. Conduct comprehensive security assessments, code reviews, and penetration More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SOC Analyst L2

Birmingham, Staffordshire, United Kingdom
Applicable Limited
experience with Microsoft Sentinel or similar SIEM tools. Strong verbal and written English communication skills. Interpersonal and presentation skills. Analytical skills. Understanding of network traffic and activities. Knowledge of Vulnerability Scanning, Management, and Ethical Hacking (Penetration Testing). Ability to learn forensic techniques and reverse engineer attacks. Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cloud Centre of Excellence (CCoE) Engineer

England, United Kingdom
Oldcastle Inc
bottlenecks - e.g. Grafana, Datadog Networking Concepts - Knowledge in TCP/IP, DNS, VPN, load balancing, and firewalls Security Best Practices - Implementing security in DevOps (e.g., IAM policies, network security, vulnerability scanning, encryption) Security Protocols - Experience with modern security protocols and practices - e.g. Zero Trust, OAuth, OpenID, TLS/SSL Agile Methodologies - Experience with Agile, Scrum, and Kanban DevOps More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Manager

London, United Kingdom
Hybrid / WFH Options
Ravelin Technology Ltd
including preparing for and undergoing assessments. Familiarity with information security frameworks (e.g., NIST, CIS). Proficiency in risk management methodologies. Knowledge of common security technologies (e.g., firewalls, EDR, SIEM, vulnerability scanners). Exceptional analytical, problem-solving, and decision-making abilities. Excellent communication (written and verbal), interpersonal, and presentation skills. Ability to operate autonomously and manage multiple priorities in a More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SOC Manager - Security Vendor

United Kingdom
Trilaty Group
Operate within a global team that takes responsibility for the security monitoring of key technologies and tools across the estate Lead and manage a team of Security Analysts & the Vulnerability management team Comfortable operating in a technical capacity performing hands-on incident response and supporting/managing SOC analysts Act as a SME in matters related threat and vulnerability … and new technology initiatives Implement and maintain operating run books, operating processes and procedures Help to develop and configure use cases, and alerting rules within SIEM technologies Mange the vulnerability management programme that includes vulnerability scanning, security testing, threat monitoring and data loss and leakage prevention Direct on-going threat intelligence activities Mentor and develop security analysts … Skills: Prior experience working/managing a SOC Demonstrable experience and operational knowledge of SIEM, firewalls, intrusion detection and vulnerability management systems/solutions Detailed understanding of Security Monitoring, Threat Intelligence, Vulnerability management and Incident Response Experience managing security incidents within a complex environment. Strong foundation in network security and common attack methodologies Exposure to user behaviour analytical More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Associate, Cybersecurity Systems Analyst with Security Clearance

Fort Bragg, North Carolina, United States
Federal IT Consulting
shortcomings and vulnerabilities. Advise on network and system risks, risk mitigation courses of action, and operational. Additionally, the Cybersecurity Systems Analyst should be able to perform security evaluations and vulnerability assessments using the DOD Assured Compliance Assessment Solution (ACAS), Nessus vulnerability scanning tool and Security Content Automation Protocol tool. Identify applicable STIGs and perform assessments using the … hardware, and software using the DoD & IC RMF to obtain an Authority to Operate (ATO), Interim Authority to Test (IATT), or Authority to Connect (ATC). Perform risk and vulnerability assessments of IT and IS for authorization; prepare risk assessment reports for submission to the SCA and Authorizing Official/Designated Authorizing Official/Designated Accrediting Authority (AO/… hardware, software and device security authorization and assessments, as well as the application and execution of policy, including project management support services. Validate the patching of systems, perform validation scanning, develop Plans of Action & Milestone (POA&Ms), and report as directed by applicable policies, procedures, and regulations. Provide subject matter expertise for COA development and the implementation of Cybersecurity More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer - Crowdstrike

London, United Kingdom
Hybrid / WFH Options
Marlin Selection Ltd
responsible for protecting enterprise systems and data. This role offers hands-on involvement with a wide range of technologies-from endpoint detection and SIEM platforms to firewalls, MFA, and vulnerability management-providing a well-rounded foundation in enterprise security operations. You'll gain exposure to advanced security practices, assist in running and responding to threat detection systems, and contribute … to projects that strengthen security across the organisation. Key Responsibilities Monitor and respond to security alerts and incidents (EDR, SIEM, Identity Protection, SOAR). Assist in vulnerability scanning and remediation activities. Help manage systems such as email and web security gateways, VPNs, MFA, SSO, and mobile device security. Support the maintenance of security certificates, PAM systems, and conditional … platforms in a corporate IT environment. Experience with some of the following: EDR platforms (e.g., CrowdStrike) Email or web security gateways (e.g., Mimecast) MFA/SSO (e.g., Duo, Okta) Vulnerability scanners (e.g., Rapid7, Tenable, Nessus) InTune and Conditional Access Exposure to: Imperva WAF KnowBe4 Certificate management tools Kali Linux toolset and penetration testing basics Qualifications: Working towards or holding More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Teamcenter Systems Administrator with Security Clearance

Hill Afb, Utah, United States
Golden Tech Systems Inc
resolving system and application faults and errors Ensuring operating systems and applications comply with Department of Defense (DoD) guidelines, including DISA Security Technical Implementation Guide (STIG) and Information Assurance Vulnerability Management (IAVM) bulletins What's In It For You Competitive wages Medical and dental benefits 401k plan Paid time off Rewards & recognition US Citizenship Requirement Pursuant to a government … Collaboration with vendors for server technology implementation Tenacious documentation of activities, status, and issues worked Knowledge of Microsoft Active Directory, GPOs, DHCP, DNS, and PowerShell General understanding of antivirus, vulnerability scanning, and SIEM tools Preferred Education, Experience, & Skills (Not required but will increase consideration for the position): Teamcenter Application and/or Database Administration experience AWS or similar More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. DevSecOps Engineer IV with Security Clearance

College Park, Maryland, United States
Golden Tech Systems Inc
Partner with development, operations, and security teams to integrate security protocols seamlessly into the software development lifecycle. Design, build, and maintain CI/CD pipelines incorporating automated security testing, vulnerability assessments, and compliance checks. Develop and manage infrastructure as code (IaC) configurations, ensuring secure and scalable cloud resources and infrastructure. Conduct security assessments, code reviews, and penetration testing to … Terraform, CloudFormation, or Ansible. Strong scripting skills in languages such as Python and Bash for automation and integration. Proficiency with static code analysis, dynamic application security testing (DAST), and vulnerability scanning tools like Fortify and Acunetix. Knowledge: In-depth understanding of security frameworks (e.g., OWASP, NIST) and best practices for mitigating vulnerabilities. Familiarity with common threat vectors and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Systems Security Analyst / Cyber Defense Analyst with Security Clearance

Newport, Rhode Island, United States
Strategos Consulting
to implement, maintain and sustain all unclassified and classified information security support services. • Setup, configure, modify, test, maintain, operate, and support information security tools. • Operate ACAS for Information Assurance Vulnerability Alert (IAVA) management and scanning, McAfee HBSS, Corelight, and Cortex. • IOT discovery, monitoring, SOAR orchestration, and SIEM event correlation and analysis. • Cloud security systems for DLP, and Email … Secure Configuration Compliance Validation Initiative, and Secure Configuration Remediation Initiative tools. • Virtual Private network management, penetration testing, forensics research and analysis, web content filter management, security incident reporting, and vulnerability scanning. • Knowledge of cybersecurity principles, cyber threats and vulnerabilities. • Analyze network alerts from enterprise sources determining causes of alerts. • Security reviews, gap analysis and risk mitigation in security architecture. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer

Basingstoke, Hampshire, South East, United Kingdom
Hybrid / WFH Options
Southern Communications Ltd
relation rules, and administration of SIEMpreferred Should haveexpertiseon TCP/IP network traffic and event log analysis Network Troubleshooting skillsrequired. Knowledge and hands-on experience in penetration testing/vulnerability scanning, security tools like tenable Nessus, kaliLinux Knowledge of ITIL disciplines such as Incident, Problem and Change Management Experience of infrastructure design and management in mission critical environments More ❯
Employment Type: Permanent, Work From Home
Salary: £55,000
Posted:

Senior Systems Administrator with Security Clearance

Huntsville, Alabama, United States
Teledyne Brown Engineering (TBE)
other Domain services in accordance with MS best practices and compliance requirements. Experience with Current versions of Windows (e.g. Server 2019, 2022, Windows 10, 11 Enterprise) Configure and execute vulnerability scanning tools, SCAP/STIG scans (SCC Tool, OpenSCAP, etc.), and perform remediating steps based on findings on Windows and Linux operating systems. Apply OS patches and upgrades More ❯
Employment Type: Permanent
Salary: USD 135,000 Annual
Posted:

Senior System Administrator with Security Clearance

Huntsville, Alabama, United States
OASYS, INC
Domain services in accordance with MS best practices and compliance requirements. Experience with Current versions of Windows (e.g. Server 2019, 2022, 2025, Windows 10, 11 Enterprise) Configure and execute vulnerability scanning tools, SCAP/STIG scans (SCC Tool, OpenSCAP, etc.), and perform remediating steps based on findings on Windows and Linux operating systems. Apply OS patches and upgrades More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Infrastructure Architect - UK

England, United Kingdom
Oldcastle Inc
between teams. Networking & Security Networking Concepts: Knowledge in TCP/IP, DNS, VPN, load balancing, and firewalls. Security Best Practices: Implementing security in DevOps (e.g., IAM policies, network security, vulnerability scanning, encryption). Zero Trust, OAuth, OpenID, TLS/SSL: Experience with modern security protocols and practices. Agile Methodologies Experience with Agile, Scrum, and Kanban for iterative and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Vulnerability Scanning
10th Percentile
£42,200
25th Percentile
£51,250
Median
£60,000
75th Percentile
£90,000
90th Percentile
£93,500