3 of 3 Remote/Hybrid Vulnerability Remediation Jobs in the South East

CyberArk SME

Hiring Organisation
Robert Half
Location
London, South East, England, United Kingdom
Employment Type
Contractor
Contract Rate
Salary negotiable
configurations within CyberArk. * Conduct discovery and assessment activities for application service accounts, SSH keys, certificates, and secrets across production and pre-production environments. * Define remediation and treatment plans for secrets management including CP/CCP adoption, PKI, mTLS and SPIFFE approaches. * Deliver monitoring, hypercare, prioritisation, and remediation planning … environments. * Expert-level knowledge of CyberArk components including Vault, CPM, PSM, CP, CCP, PTA and Discovery. * Experience planning and delivering CyberArk upgrades, patching, and vulnerability remediation activities. * Strong understanding of privileged access management, secrets management, SSH key management, and certificate-based authentication. * Experience integrating CyberArk with enterprise tooling ...

Cyber Security Analyst - Hybrid - Fridays Off

Hiring Organisation
eTech Partners
Location
London, South East, England, United Kingdom
Employment Type
Full-Time
Salary
£65,000 - £70,000 per annum
change. My client operates a Monday to Thursday working week, with hybrid working in place and Fridays off. Responsibilities Own and run our vulnerability and patch management processes Investigate and respond to security incidents (malware, phishing, unauthorised access, etc.) Conduct vulnerability assessments and support remediation efforts Help ...

Cyber Security Analyst - 1 day a week on Site - Remote

Hiring Organisation
eTech Partners
Location
London, South East, England, United Kingdom
Employment Type
Full-Time
Salary
£65,000 - £70,000 per annum
change. My client operates a Monday to Thursday working week, with hybrid working in place and Fridays off. Responsibilities Own and run our vulnerability and patch management processes Investigate and respond to security incidents (malware, phishing, unauthorised access, etc.) Conduct vulnerability assessments and support remediation efforts Help ...