depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and communication skills Security certifications such as More ❯
depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and communication skills Security certifications such as More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Intec Select
depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and communication skills Security certifications such as More ❯
ArcSight/AlienVault/Microsoft Sentinel/LogRhythm). Enterprise level Operating Systems RedHat Linux & Windows Server command line required. Vulnerability Management Technologies (e.g. Qualys, Tenable, Rapid7) or MDR Technologies (e.g. TrendMicro, SentinelOne, CrowdStrike). Ability to achieve SC & NPPV3 Clearances. Preferred Skills and Experience IDS/IPS technologies (e.g. More ❯
scripting languages, especially Python, and a solid understanding of the web stack and its components. Experience with vulnerability management tools, security scanners (e.g. Snyk, Qualys, Trivy, Dependabot, etc.), and secure systems configuration (e.g., firewalls, VPNs, IDS/IPS, WAF). DevSecOps mindset, knowledge of CI/CD processes, security automation More ❯
of assets. Hands-on experience in enterprise scale Amazon Web Services. A range of industry leading tooling, such as GitHub, Jfrog Artifactory, Jenkins, Docker, Qualys and Hashicorp Vault. Contributing to solving Enterprise scale problems. Delivering work for multiple stakeholders. Managing security and technology in a regulated environment. What it takes More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with organisational standards. Collaborate with various departments to address and remediate vulnerabilities More ❯
Warwick, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Azure Functions, and Logic Apps to development teams. Conduct design reviews and ensure compliance with architecture principles. Apply cloud security controls (e.g., Azure Defender, Qualys vulnerability scans) and enforce baseline security requirements. Define and validate Non-Functional Requirements (NFRs) such as scalability, availability, resilience, observability, and compliance. Optimize solutions for More ❯
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Ltd
Azure Functions, and Logic Apps to development teams. Conduct design reviews and ensure compliance with architecture principles. Apply cloud security controls (e.g., Azure Defender, Qualys vulnerability scans) and enforce baseline security requirements. Define and validate Non-Functional Requirements (NFRs) such as scalability, availability, resilience, observability, and compliance. Optimize solutions for More ❯
Ability to perform black box, grey box and white box tests with an attacker's mindset. Expertise in using Kali, Burp Suite, Nmap, Nessus, Qualys, Metasploit and other security tools. Strong knowledge of the OWASP Testing Methodology. Strong understanding of security protocols, such as SSL/TLS, SSH, and Knowledge More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Risk Crew
Ability to perform black box, grey box and white box tests with an attacker's mindset. Expertise in using Kali, Burp Suite, Nmap, Nessus, Qualys, Metasploit and other security tools. Strong knowledge of the OWASP Testing Methodology. Strong understanding of security protocols, such as SSL/TLS, SSH, and HTTP. More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Risk Crew
Ability to perform black box, grey box and white box tests with an attacker's mindset. Expertise in using Kali, Burp Suite, Nmap, Nessus, Qualys, Metasploit and other security tools. Strong knowledge of the OWASP Testing Methodology. Strong understanding of security protocols, such as SSL/TLS, SSH, and HTTP. More ❯
background in performance and regression testing – understanding of tools like JMeter, LoadRunner, etc. is a plus. Familiarity with vulnerability management tools and concepts (e.g., Qualys, Nessus, CVE tracking). More ❯
background in performance and regression testing – understanding of tools like JMeter, LoadRunner, etc. is a plus. Familiarity with vulnerability management tools and concepts (e.g., Qualys, Nessus, CVE tracking). More ❯
Tunbridge Wells, Kent, South East, United Kingdom Hybrid / WFH Options
GMA Consulting
zones etc), and integration related technologies (Auth0, APIM) · Expertise with SAST & SCA systems such as Snyk, Checkmarx · Experience with DAST systems such as OpenZAP, Qualys DAST (preferred) ideally with HTTP APIs · Ability to manage large scale software estates from a operational perspective (build, release, monitoring, rollbacks, high availability, etc) · Hands More ❯
ideally insurance, along with being comfortable working with stakeholders, CISO and Programme Manager. You must also be familiar with vulnerability management tools such as Qualys, Tenable, Rapid7, or similar such as Vulcan Cyber. You will also need to be familiar with industry frameworks such as Cyber Essentials, NIST Cybersecurity Framework …/Agile experience (Wagile) Experience working with steering committees, demand management, service transition, project plans, Project SteerCo Experience in Vulnerability management tools such as Qualys, Tenable, Rapid7, or similar such as Vulcan Cyber Experience in developing and implementing security policies, standards, and procedures. Knowledge of current cybersecurity threats, trends, and More ❯