depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and communication skills Security certifications such as More ❯
ArcSight/AlienVault/Microsoft Sentinel/LogRhythm). Enterprise level Operating Systems RedHat Linux & Windows Server command line required. Vulnerability Management Technologies (e.g. Qualys, Tenable, Rapid7) or MDR Technologies (e.g. TrendMicro, SentinelOne, CrowdStrike). Ability to achieve SC & NPPV3 Clearances. Preferred Skills and Experience IDS/IPS technologies (e.g. More ❯
fields (or equivalent certifications) Preferred certifications: CISSP, CEH, GSEC Familiarity with network protocols, operating systems, and security principles Proficiency with security tools like LogRhythm, Qualys, SCCM, Intune, Microsoft 365, AD, and enterprise anti-malware Technical knowledge in network segmentation, firewalls, Mitre Att&ck, Windows, Linux, and Mac, with experience in More ❯
detail. Nice to Have (But Not Essential): Familiarity with security frameworks such as ISO27001, Cyber Essentials, or NIST. Exposure to tools like Microsoft Defender, Qualys, Tenable, or CrowdStrike. Certifications such as CompTIA Security+, Microsoft SC-900, SC-200, or similar. More ❯
detail. Nice to Have (But Not Essential): Familiarity with security frameworks such as ISO27001, Cyber Essentials, or NIST. Exposure to tools like Microsoft Defender, Qualys, Tenable, or CrowdStrike. Certifications such as CompTIA Security+, Microsoft SC-900, SC-200, or similar. More ❯
detail. Nice to Have (But Not Essential): Familiarity with security frameworks such as ISO27001, Cyber Essentials, or NIST. Exposure to tools like Microsoft Defender, Qualys, Tenable, or CrowdStrike. Certifications such as CompTIA Security+, Microsoft SC-900, SC-200, or similar. More ❯
Penetration Testing Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Intrusion Detection/Prevention Systems (IDS/IPS) (Suricata, Snort, Bro More ❯
of assets. Hands-on experience in enterprise scale Amazon Web Services. A range of industry leading tooling, such as GitHub, Jfrog Artifactory, Jenkins, Docker, Qualys and Hashicorp Vault. Contributing to solving Enterprise scale problems. Delivering work for multiple stakeholders. Managing security and technology in a regulated environment. What it takes More ❯
protocols and network components/Experience with cloud security/Understanding of security tools, vulnerability management, penetration testing and remediation/Working knowledge of Qualys, Defender, Knowbe4 are essential./Exposure to MS Sentinel and Expel MDR are desirable/Familiarity with scripting (Python, PowerShell) are desirable/Strong analytical More ❯
cloud security (AWS/Azure/GCP), encryption, IAM, endpoint protection, and SIEM solutions . Hands-on experience with tools such as Splunk, CrowdStrike, Qualys, Nessus, Palo Alto, Fortinet, or similar . Solid understanding of security frameworks and standards: NIST, CIS Controls, ISO 27001 , and compliance mandates relevant to banking. More ❯
cloud security (AWS/Azure/GCP), encryption, IAM, endpoint protection, and SIEM solutions . Hands-on experience with tools such as Splunk, CrowdStrike, Qualys, Nessus, Palo Alto, Fortinet, or similar . Solid understanding of security frameworks and standards: NIST, CIS Controls, ISO 27001 , and compliance mandates relevant to banking. More ❯
cloud security (AWS/Azure/GCP), encryption, IAM, endpoint protection, and SIEM solutions . Hands-on experience with tools such as Splunk, CrowdStrike, Qualys, Nessus, Palo Alto, Fortinet, or similar . Solid understanding of security frameworks and standards: NIST, CIS Controls, ISO 27001 , and compliance mandates relevant to banking. More ❯
cloud security (AWS/Azure/GCP), encryption, IAM, endpoint protection, and SIEM solutions . Hands-on experience with tools such as Splunk, CrowdStrike, Qualys, Nessus, Palo Alto, Fortinet, or similar . Solid understanding of security frameworks and standards: NIST, CIS Controls, ISO 27001 , and compliance mandates relevant to banking. More ❯
role you will need: Windows Server 2003 to 2022 Veeam Backup and Replication Microsoft Active Directory Group Policy Windows Server Update Services Kaseya VSA Qualys Vulnerability Scanner Documentation writing More ❯
within an OT environment with strong OT/ICS knowledge about products, architectures and workflows. Experience or knowledge of vulnerability management tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for OT environment are highly desirable. In turn More ❯
global joiners, movers and offboarding leavers. Ensure that end-users devices are up to date with security patches and secured using Microsoft Intune, Defender Qualys patch management solutions. Assist with hardware and asset procurement. The ideal candidate will have the following relevant experience: 5 years of relevant experience in a More ❯
We are currently seeking an experienced Qualys Subject Matter Expert (SME) to lead the ongoing customisation, optimisation, and management of our client's Qualys vulnerability management platform. This is a critical role focused on improving the organisation's security posture across on-premise, cloud, and hybrid environments. Key Responsibilities: Customise … Qualys for reporting and real-time data capture across organisational assets and infrastructure. Utilise and optimise Qualys Cloud Connectors for effective cloud vulnerability management. Mature the Qualys platform into a centralised view of vulnerability management across environments. Troubleshoot and resolve issues including agent communication, inventory scanning, data purging, and user … line with TruRisk scoring and stakeholder needs. Engage with internal customers to gather requirements, provide recommendations, and drive continuous improvements. Configure and maintain the Qualys platform to support ongoing vulnerability scans, compliance checks, and security assessments. Collaborate with IT and infrastructure teams to ensure seamless integration of Qualys into the More ❯
safe with AES256 encryption, SSL Certificates, and a minimum of TLS1.2 , between your website and our datacentres. Our systems are scanned quarterly using the Qualys PCI Platform, an independent Qualified Security Assessor(QSA)and approved vendors -Omnicybersecurity (UK) & Forgenix (US)-to ensure compliance with the security requirements of the card More ❯
application security vulnerabilities (such as SQL injection, XSS, CSRF, insecure deserialization, etc.) and OWASP Top 10. Proficiency in using and configuring vulnerability scanners (Nessus, Qualys, or similar) and interpreting their results. Familiarity with cloud security testing and testing applications hosted on platforms like AWS, Azure, or Google Cloud. Understanding of … application security. Proven track record of executing penetration tests and exploiting vulnerabilities in complex systems and applications. Experience with vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) and penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux). Familiarity with common security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR More ❯
systems. Network Security: Strong understanding and experience in network security. Cloud Security: Knowledge of cloud security concepts. Tools & Utilities: Experience with vulnerability management tools (Qualys, Nexpose Rapid 7, HP WebInspect, IBM AppScan, Tenable Nessus, Burp, NMAP), External Attack Surface Management, ITSM (Service Now) and cloud vulnerability tools (AWS Inspector, GCP … Security Command Center, Tenable, Qualys, Rapid 7). Aggregator Platforms: Familiarity with platforms like Vulncan.io, Prism. Vulnerability Exposure Management: Strong experience of running Vulnerability Management, an understanding of how vulnerabilities can be linked and the impact on risk. Soft Skills: Excellent interpersonal and communication skills, proactive problem-solving, strong team More ❯
Security Architect We are looking for a Security Architect with an insurance background who can review a technical solution to ensure its fit for purpose.... You will be working closely with solutions experts, third party suppliers to make a significant More ❯