Vulnerability Assessment Jobs in the UK excluding London

26 to 50 of 52 Vulnerability Assessment Jobs in the UK excluding London

SC Cleared Penetration Tester

Hemel Hempstead, England, United Kingdom
Hamilton Barnes 🌳
strategies. Provide expert solution architecture expertise and ownership throughout all stages of the solutions design engagement life cycle. Undertake installation site surveys, inspections, and vulnerability assessments. Identify, document, and escalate risks or non-conformance to project owners and provide resolution advice. Produce vulnerability assessment documentation. Required Skills … Working knowledge and hands-on experience of Penetration Testing. Working knowledge and hands-on experience of techniques and tools in conducting vulnerability scanning and assessments (such as Nessus, Nmap, Nipper). Working understanding and hands-on experience of Information Communication Technologies in at least two of the following: Enterprise more »
Posted:

SC Cleared Penetration Tester

hemel hempstead, east anglia, United Kingdom
Hamilton Barnes 🌳
strategies. Provide expert solution architecture expertise and ownership throughout all stages of the solutions design engagement life cycle. Undertake installation site surveys, inspections, and vulnerability assessments. Identify, document, and escalate risks or non-conformance to project owners and provide resolution advice. Produce vulnerability assessment documentation. Required Skills … Working knowledge and hands-on experience of Penetration Testing. Working knowledge and hands-on experience of techniques and tools in conducting vulnerability scanning and assessments (such as Nessus, Nmap, Nipper). Working understanding and hands-on experience of Information Communication Technologies in at least two of the following: Enterprise more »
Posted:

Cyber Security Analyst

Manchester, Lancashire, United Kingdom
IO Associates
phishing attacks, and network intrusions. Perform detailed forensic analysis to determine the root cause and impact of security incidents. Security Assessments & Hardening: Execute regular vulnerability assessments and penetration tests to identify and address security weaknesses. Implement and manage security controls to harden systems against attacks. Policy Development & Compliance: Collaborate … lateral movement. Solid grasp of network fundamentals (OSI Stack, TCP/IP, DNS, HTTP(S), SMTP). Experience with security monitoring, incident response, and vulnerability management. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Ability to thrive in a fast-paced, dynamic environment. Experience with cloud more »
Employment Type: Permanent
Salary: GBP 45,000 Annual
Posted:

Cyber Security Analyst

Manchester, North West, United Kingdom
IO Associates
phishing attacks, and network intrusions. Perform detailed forensic analysis to determine the root cause and impact of security incidents. Security Assessments & Hardening: Execute regular vulnerability assessments and penetration tests to identify and address security weaknesses. Implement and manage security controls to harden systems against attacks. Policy Development & Compliance: Collaborate … lateral movement. Solid grasp of network fundamentals (OSI Stack, TCP/IP, DNS, HTTP(S), SMTP). Experience with security monitoring, incident response, and vulnerability management. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Ability to thrive in a fast-paced, dynamic environment. Experience with cloud more »
Employment Type: Permanent
Salary: £40,000
Posted:

Apprentice Test Engineer

Unit H2, The Brewery Quarter, Cheltenham, England
SUREVINE LIMITED
as needed. Role Your duties will include: Write a clear and concise test strategy covering both functional and non-functional requirements (e.g. security/vulnerability assessment, load/performance and usability), applying automated and manual methods as appropriate Testing requirements and user stories to ensure they are well … result in teams agreeing on the understanding of requirements Plan, execute and report exploratory testing sessions for risks and features Use a balanced risk assessment to identify the most valuable ways to apply testing and improvement activities Determination and tenacity to expose the true behaviour of a system and more »
Employment Type: Higher Apprenticeship
Salary: £18,000.00
Posted:

Information Security Engineer

Luton, England, United Kingdom
Randstad UK
IS programmes and ensure compliance with identified standards and maintain data security. Key Responsibilities: Collaborate with internal and global teams to manage and reduce vulnerability assessments and remediation across server and end-user computing estates. Manage and update the OneTrust platform, including new assessments, asset reviews, and vendor onboarding. more »
Posted:

Information Security Engineer

luton, bedfordshire, east anglia, United Kingdom
Randstad UK
IS programmes and ensure compliance with identified standards and maintain data security. Key Responsibilities: Collaborate with internal and global teams to manage and reduce vulnerability assessments and remediation across server and end-user computing estates. Manage and update the OneTrust platform, including new assessments, asset reviews, and vendor onboarding. more »
Posted:

Senior Cyber Security Analyst

brighton, south east england, United Kingdom
Hybrid / WFH Options
Hays
other teams in the organisation, and the ability to build strong internal relationships with other members in the business. You will be experienced with vulnerability assessments and Cyber Assurance. 4+ years of experience in cyber security, with a proven track record of progressively increasing responsibilities. Strong technical expertise in … areas such as network security, intrusion detection/prevention, endpoint security, encryption, and vulnerability management. Experience with leading or mentoring cyber security professionals. Strong knowledge and experience with recognised Cyber Security frameworks (e.g., NIST, ISO 27001, CIS Controls). Excellent communication skills, with the ability to effectively convey complex more »
Posted:

Cyberspace Operations Officer

Dundee, Florida, United States
United States Air Force
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyberspace Operations Officer

Barry, Illinois, United States
United States Air Force
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyberspace Operations Officer

Lanark, Illinois, United States
United States Air Force
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyberspace Operations Officer

Hinckley, Utah, United States
United States Air Force
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyberspace Operations Officer

Mayfield, Utah, United States
United States Air Force
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyberspace Operations Officer

Abingdon, Illinois, United States
United States Air Force
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyberspace Operations Officer

Sandwich, Illinois, United States
United States Air Force
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyberspace Operations Officer

Coalville, Utah, United States
United States Air Force
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyberspace Operations Officer

Leeds, Utah, United States
United States Air Force
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyberspace Operations Officer

Inverness, Florida, United States
United States Air Force
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyberspace Operations Officer

East Liverpool, Ohio, United States
United States Air Force
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
Employment Type: Permanent
Salary: USD Annual
Posted:

SOC Engineer

Bournemouth, Dorset, South West, United Kingdom
IP People Ltd
for hidden threats and vulnerabilities within the organization's network and systems. Employing various security tools and methodologies to address potential weaknesses before exploitation. Vulnerability Management: Assisting in vulnerability assessments and penetration testing. Collaborating with IT and system administrators to prioritize and remediate identified vulnerabilities. Security Reporting and more »
Employment Type: Permanent
Salary: £60,000
Posted:

Head of Product Cyber Security SME

Hemel Hempstead, England, United Kingdom
Smiths Detection
various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in … depth security assessments, penetration testing, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for product cyber security initiatives across the organization. Collaborate with senior management to establish product cyber security goals, policies, and procedures aligned with … leadership roles, particularly in product security within IoT or Operational Technology (OT) companies. Technical Expertise: Proficient in DevSecOps, threat modeling, secure coding practices, and vulnerability management. Leadership : Experience leading cross-cultural and geographically distributed teams. Regulatory Knowledge: Familiar with industry standards such as ISO 27001, NIST, and GDPR. Certifications more »
Posted:

Head of Product Cyber Security SME

hemel hempstead, east anglia, United Kingdom
Smiths Detection
various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in … depth security assessments, penetration testing, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for product cyber security initiatives across the organization. Collaborate with senior management to establish product cyber security goals, policies, and procedures aligned with … leadership roles, particularly in product security within IoT or Operational Technology (OT) companies. Technical Expertise: Proficient in DevSecOps, threat modeling, secure coding practices, and vulnerability management. Leadership : Experience leading cross-cultural and geographically distributed teams. Regulatory Knowledge: Familiar with industry standards such as ISO 27001, NIST, and GDPR. Certifications more »
Posted:

AWS Security Engineer

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
Leidos Innovations UK Limited
ensure that our cloud infrastructure is secure and compliant with industry standards and regulations. You will also monitor and respond to security incidents, perform vulnerability assessments and penetration testing, and develop and maintain security policies and procedures. Responsibilities: Support the LCST Security Working Groups which require close co-operation … AWS architecture best practices and best-in-class security standards Review relevant Cyber Risk alerts/notifications and MODCERT notices, assess impact on and vulnerability of our solution, define actions to take and work with the technical teams to design, and implement mitigating solutions within required timeframes Duties may … monitoring and operating intrusion detection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and support penetration testing. Develop and maintain security policies and procedures Collaborate with development and operations teams to ensure security best practices are more »
Employment Type: Permanent
Salary: £55,000
Posted:

Cyber Security Vulnerability Manager

cardiff, United Kingdom
Hybrid / WFH Options
Intaso
Interviews available immediately Intaso’s long standing client are seeking a dynamic individual to join their Security Operations team as the Security Vulnerability Manager, a pivotal role within their organization. This position will focus on identifying, monitoring, analysing, and facilitating the remediation of vulnerabilities across their systems. Key Responsibilities … Develop and document a comprehensive vulnerability management strategy aligned with stakeholder and business need Create intuitive reporting and dashboarding mechanisms to convey threat and risk profiles associated with vulnerabilities to stakeholders Ensure regular vulnerability scans cover all IT and OT assets, maintaining up-to-date coverage. Collaborate with … IT and OT asset owners to execute vulnerability and compliance scans in a controlled manner. Partner with both technical and non-technical stakeholders to devise effective mitigation plans for identified vulnerabilities. Lead cross-functional teams in responding to high-risk or complex vulnerabilities, leveraging technical expertise. Stay informed about more »
Posted:

Application Security Lead

cardiff, United Kingdom
Hybrid / WFH Options
Persistent Systems
the work with the offshore team. Candidate should have effective communication skills with excellent customer handling capabilities. Experience required: 1. Experience on Infrastructure & Application Vulnerability Assessments and Management. Validate and triage identified vulnerabilities. 2. Experience in vulnerability remediation. 3. Hands-on experience on SAST, DAST, SCA, Container scanning … issues. 10. Web application firewall Administration and management 11. Able to work on Azure Devops Pipeline. Benefits: Focused on talent development with quarterly assessment cycles and company-sponsored certifications. Working with cutting-edge technologies. Engagement initiatives such as project parties, flexible work hours, Persistent Business Run. Private medical and more »
Posted:
Vulnerability Assessment
the UK excluding London
10th Percentile
£36,900
25th Percentile
£42,250
Median
£61,250
75th Percentile
£76,563
90th Percentile
£80,000