to cryptography, key-vault certificate management and HSM. Azure and Thales. Familiarity with Hyper-V, VMware and Citrix. Practical understanding of SCCM or enterprise patch management tools Experience with Qualys or enterprise Vulnerability Management and Compliance toolsets. More ❯
controls, and best practices for all Operating systems & asset types, (e.g. workstations, endpoints, mobile, servers either Windows/Linux, cloud instances, etc.) Vulnerability Management tools (Tenable/Rapid7/Qualys) Cloud Security compliance (IaaS, PaaS, SaaS) and misconfigurations Multi-platform endpoints, infrastructure and XaaS vulnerability management deployments General IT networking concepts, protocols, standards and network security concepts, controls, and best More ❯
service We would like you to have Knowledge of vulnerability scanning technologies Experience in analysis of vulnerabilities identified against one of infrastructure, assets or code Working knowledge of the Qualys application and its core modules Self-driven qualities and ability to work independently as well as part of a team Strong interpersonal and influencing skills with the ability to influence More ❯
the identification, assessment, and remediation of vulnerabilities across all operating systems (Windows, Linux, macOS) and platforms (on-premise and cloud). Analyze vulnerability scan results from tools such as Qualys, Nessus and cloud native tools. Collaborate with system, application, and infrastructure teams to prioritize and remediate vulnerabilities across on-premise and cloud environments. Prioritize vulnerabilities based on risk, asset criticality … documentation, and adoption of best practices. Stay updated on emerging vulnerabilities, CVEs, and remediation techniques. Technical Skills: Strong knowledge of vulnerability management tools (e.g., AWS Inspector, Azure Security Center, Qualys, or similar). Solid understanding of operating systems (Windows, Linux) Hands-on experience with AWS and Azure cloud security practices. Familiarity with patch management, endpoint protection, and configuration management tools. … In-Depth Knowledge Of: Windows Server, Linux distributions (Ubuntu, RHEL/CentOS) Network and endpoint security principles Patch management and vulnerability lifecycle Vulnerability scanning and management tools (e.g., Tenable, Qualys, Rapid7) Scripting and automation (PowerShell, Bash, Python) Ticketing and ITSM tools (e.g., Jira, ServiceNow, Remedy) Security compliance standards (e.g., NIST, PCI-DSS, ISO 27001, CIS Benchmarks More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ikhoi Recruitment
including Sentinel One Deployment and management of networking solutions including firewalls, switches and access points including Cisco Meraki, Fortinet and Watchguard Deployment of vulnerability management solutions including Tenable and Qualys Deployment and management of email security solutions including Mimecast and Egress Main Tasks and Responsibilities Assisting with Cyber Essentials and Cyber Essentials Plus audits and assessments Undertaking technical vulnerability remediation More ❯
Good experience of Microsoft Sentinel (SIEM) Knowledge of Azure firewalls Networking and firewall solutions expertise with the like of (Cisco Meraki, Fortinet, Ubiquiti. WatchGuard) Vulnerability management tool expertise (Tenable, Qualys) Email security solutions Knowledge (Mimecast, Egress) A Working understanding of Microsoft 365 Cloud Technologies and their threat landscape Familiarity with SOC operations, threat detection, incident response, and security analytics As More ❯
configurations. Integrate systems for identity and privileged access management. Support audit, forensic, and security event investigations in coordination with InfoSec teams. Regularly review and remediate security vulnerabilities identified by Qualys, Nessus, or other scanning tools. Contribute to incident response planning, patching SLAs, and compliance reporting. Design and maintain logging, audit trails, and syslog/SIEM integrations Authentication, Authorization, and Directory More ❯
Threat Intelligence (MITRE ATT&CK) Penetration Testing Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Programming (Python, or other languages) What you can expect from us We won't just meet More ❯
At Lendscape, we build technology that helps funders get capital to the businesses that need it. Our platform powers some of the world's leading finance providers, giving them the tools to lend efficiently, transparently, and at scale. Our team More ❯
methods. Strong understanding of common application security vulnerabilities (such as SQL injection, XSS, CSRF, insecure deserialization, etc.) and OWASP Top 10. Proficiency in using and configuring vulnerability scanners (Nessus, Qualys, or similar) and interpreting their results. Familiarity with cloud security testing and testing applications hosted on platforms like AWS, Azure, or Google Cloud. Understanding of DevSecOps practices and experience integrating … penetration testing, vulnerability assessment, and application security. Proven track record of executing penetration tests and exploiting vulnerabilities in complex systems and applications. Experience with vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) and penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux). Familiarity with common security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR, PCI-DSS) Relevant certifications (e.g. More ❯
peer reviews of work products as required Provide ad hoc consulting services to the general user community Essential: Experience working with vulnerability management tools and data such as Tenable, Qualys, Rapid 7, Microsoft Defender, Aqua, Palo Alto Xpanse. Jira to manage project work, timelines and operational tickets. 5+years of relevant experience Possess strong understanding of vulnerability management processes, procedures and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harvey Nash
peer reviews of work products as required Provide ad hoc consulting services to the general user community Essential: Experience working with vulnerability management tools and data such as Tenable, Qualys, Rapid 7, Microsoft Defender, Aqua, Palo Alto Xpanse. Jira to manage project work, timelines and operational tickets. 5+years of relevant experience Possess strong understanding of vulnerability management processes, procedures and More ❯
We are currently seeking an experienced Qualys Subject Matter Expert (SME) to lead the ongoing customisation, optimisation, and management of our client's Qualys vulnerability management platform. This is a critical role focused on improving the organisation's security posture across on-premise, cloud, and hybrid environments. Key Responsibilities: Customise Qualys for reporting and real-time data capture across organisational … assets and infrastructure. Utilise and optimise Qualys Cloud Connectors for effective cloud vulnerability management. Mature the Qualys platform into a centralised view of vulnerability management across environments. Troubleshoot and resolve issues including agent communication, inventory scanning, data purging, and user access. Design and implement tagging strategies, including dynamic tagging, to meet customer requirements. Customise dashboards and reports in line with … TruRisk scoring and stakeholder needs. Engage with internal customers to gather requirements, provide recommendations, and drive continuous improvements. Configure and maintain the Qualys platform to support ongoing vulnerability scans, compliance checks, and security assessments. Collaborate with IT and infrastructure teams to ensure seamless integration of Qualys into the broader security ecosystem. Deploy and manage Qualys Cloud Agents across enterprise endpoints More ❯
I was certain that I wanted to build my career in information security. My determination paid off when I landed my first technical job as a Security Engineer at Qualys, an Enterprise Cyber Risk & Security Platform . It was a significant achievement for me, especially since it's rare for companies to hire freshers directly into the InfoSec domain. At … Qualys, I worked with the Vulnerability Management team, where we researched new CVEs and zero-day vulnerabilities, and developed signatures for vulnerability scanners. A zero-day vulnerability is a security flaw in software or hardware that is unknown to the vendor or developer. Since the vendor is unaware of the vulnerability, no patch or fix is available, making it highly … its network, which identifies known security flaws. The scanner reports these issues so the IT team can prioritize and fix them to secure the network. Thereare tools like Nessus, Qualys, OpenVAS, Nexpose, Astra etc. CVE stands for Common Vulnerabilities and Exposures and is a standardized identifier for known security vulnerabilities. Each CVE entry includes a uniqueidentifier (e.g., CVE-2024-XXXX More ❯
ServiceNow SecOps and IRM modules. Incident Management: Develop and manage incident response processes, ensuring timely resolution of security incidents. Integration: Integrate ServiceNow SecOps with common SIEM tools (e.g., Splunk, Qualys) and external systems via REST APIs. Process Automation: Implement automation workflows to streamline security operations, such as incident triage and response. Collaboration: Work with team members, customers, and external vendors More ❯
years' cyber security experience within an OT environment with strong OT/ICS knowledge about products, architectures and workflows. Experience or knowledge of vulnerability management tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for OT environment are highly desirable. Been in the UK for the last More ❯
design (VPNs, subnets, regions/zones etc), and integration related technologies (Auth0, APIM) Expertise with SAST & SCA systems such as Snyk, Checkmarx Experience with DAST systems such as OpenZAP, Qualys DAST (preferred) ideally with HTTP APIs Ability to manage large scale software estates from a operational perspective (build, release, monitoring, rollbacks, high availability, etc) Hands on experience building automated security More ❯
design (VPNs, subnets, regions/zones etc), and integration related technologies (Auth0, APIM) Expertise with SAST & SCA systems such as Snyk, Checkmarx Experience with DAST systems such as OpenZAP, Qualys DAST (preferred) ideally with HTTP APIs Ability to manage large scale software estates from a operational perspective (build, release, monitoring, rollbacks, high availability, etc) Hands on experience building automated security More ❯
cybersecurity certifications (e.g., OSCP, CISSP, GCTI, GREM, CEH); Agile/PM certifications desirable Extensive experience in cybersecurity, ideally in regulated environments Hands-on experience with tools such as Tenable, Qualys, Wiz, and AttackIQ Knowledge of cybersecurity standards and regulations (e.g., NIST CSF, PCI DSS, GDPR, ISO 27001, DPA 2018) Strong communication skills for technical and non-technical audiences Decisive and More ❯
large enterprises, across a diverse technology stack (IaaS/PaaS/SaaS/physical/mainframe/hybrid-cloud) and delivery lifecycles (Project/COTS applications, DevOps) Expertise with Qualys and other vulnerability and exposure management technologies Expertise in the full vulnerability management lifecycle Vendor and market analysis and engagement Ability to translate technical information into Risks, Threats, and Vulnerabilities More ❯
large enterprises, across a diverse technology stack (IaaS/PaaS/SaaS/physical/mainframe/hybrid-cloud) and delivery lifecycles (Project/COTS applications, DevOps) Expertise with Qualys and other vulnerability and exposure management technologies Expertise in the full vulnerability management lifecycle Vendor and market analysis and engagement Ability to translate technical information into Risks, Threats, and Vulnerabilities More ❯
large enterprises, across a diverse technology stack (IaaS/PaaS/SaaS/physical/mainframe/hybrid-cloud) and delivery lifecycles (Project/COTS applications, DevOps) Expertise with Qualys and other vulnerability and exposure management technologies Expertise in the full vulnerability management lifecycle Vendor and market analysis and engagement Ability to translate technical information into Risks, Threats, and Vulnerabilities More ❯