Remote Vulnerability Assessment Jobs

26 to 50 of 228 Remote Vulnerability Assessment Jobs

Vulnerability Assessment Analyst

City of London, London, United Kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active customers in over 700 business locations. Due to business requirements … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely …/Dashboard reports for the relevant stakeholders and alleviate the workload of the IT Service desk function when required. The primary responsibilities of the role is to perform daily assessment of vulnerabilities identified by internal and external scans. Evaluate, risk assess and rate the results of the scan, prioritise all vulnerabilities discovered and remediate/patch within the established More ❯
Posted:

Cyber Security Analyst

London, England, United Kingdom
Hybrid / WFH Options
Techwaka
Title: Security Analyst Location: Remote Job Summary: We are seeking a skilled and experienced Security Analyst to join our team. The ideal candidate will have a strong background in vulnerability management and experience working with Security Information and Event Management (SIEM) tools such as Microsoft Sentinel. You will play a critical role in ensuring the security of our cloud … environments, infrastructure, and business units by identifying, analyzing, and addressing vulnerabilities and threats. Key Responsibilities: Vulnerability Management: Develop, implement, and operate vulnerability management capabilities using tools like Tenable One. Deploy, configure, and manage vulnerability assessment tools (e.g., Tenable, NCSC's Active Cyber Defence Toolkit) and Attack Surface Management tools. Deliver a seamless vulnerability management service … alignment on security initiatives. Translate complex security issues into clear, actionable items for both technical and non-technical stakeholders. Security Operations: Lead and deliver core security operations focused on vulnerability management. Verify the effectiveness of security measures across the entire estate, ensuring compliance with security policies and standards. Qualifications: Proven experience in vulnerability management and the use of More ❯
Posted:

Information Security Engineer

London, England, United Kingdom
Hybrid / WFH Options
watchTowr
cloud infrastructures, ensuring robust protection against potential threats. Endpoint Management and Administration : Overseeing the deployment, configuration, and maintenance of endpoint security solutions to safeguard all devices within the organisation. Vulnerability Assessment and Management : Conducting regular vulnerability assessments, analysing findings, and coordinating remediation efforts to enhance our security posture. Implementation of Security Controls : Deploying security measures that not … cloud platforms (AWS), including the design and implementation of security architectures and controls. Endpoint Security : Hands-on experience with endpoint protection solutions, ensuring devices are safeguarded against potential threats. Vulnerability Management : Proficiency in conducting vulnerability assessments using industry-standard tools and methodologies, and managing remediation processes. Compliance and Security Controls : Familiarity with implementing security controls aligned with frameworks More ❯
Posted:

IT Security Analyst

Belfast, Northern Ireland, United Kingdom
Hybrid / WFH Options
McLaughlin & Harvey
alerts generated within security monitoring tools. Stay informed on cybersecurity trends, issues, and emerging threats, and help promote a culture of security awareness and compliance across the group. Conduct vulnerability assessments to identify potential gaps and weaknesses and propose suitable improvements. Contributing to the maintenance and continuous improvement of our ISMS to make sure systems are as secure as … improve Business Continuity and Disaster Recovery plans. Contribute to the IT risk register and mitigation plans. Ensure Endpoint security compliance, including Mobile Device Management. Organise audits, external and internal vulnerability scans, web, infrastructure and application penetration tests and ensure remediation of any issues. Assisting with ISO27001 & Cyber Essentials Plus certifications and GDPR compliance. Provide ad-hoc assistance in monitoring … with technical and non-technical colleagues at all levels in the organisation. Essential Previous experience within a cyber/information security role. Strong knowledge and understanding of security risk assessment, including security testing principles and tools. Network, operating system, application and organisational security concepts. An investigative and analytical nature with a focus on ensuring the organisation is as secure More ❯
Posted:

Principal Security Engineer

London, England, United Kingdom
Hybrid / WFH Options
Kinsei Recruitment
insecure features and malicious activities within our networks and infrastructure. You will implement customized application security assessments for client-based asset risk, corporate policy compliance as well as conduct vulnerability assessment. You must have an advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements. … engagements providing in-depth analysis of the security issues. Developing technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks. Writing comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement. Authoring and updating internal and external docs, and formally initiating and delivering requirements. Authoring blogs posts and doing talks … at security conferences on vulnerabilities discovered. Facilitating cross-branch communication and know-how exchange between team members. Handling communications with independent vulnerability researchers and designing appropriate mitigation strategies for reported vulnerabilities. Implementing security best practices and new ideas to encourage innovation within your team. Working closely with CISO to embed best-in-class information security processes within the corporate More ❯
Posted:

Lead Cyber Security Analyst

Liverpool, England, United Kingdom
Hybrid / WFH Options
Crown Commercial Service
easy to consume articles such as blogs, policies and presentations. Experience of day-to-day management of multi-disciplinary teams of cyber security professionals. Experience deploying, configuring and using vulnerability assessment (such as Tenable and the NCSC’s Active Cyber Defence Toolkit) and Attack Surface Management tools Experience using cloud provider monitoring tools such as AWS CloudWatch, CloudTrail More ❯
Posted:

Lead Network Security engineer

Macclesfield, England, United Kingdom
Hybrid / WFH Options
KBC Technologies Group
end to end network infrastructure automation capabilities that are aligned to the strategic goals of the business and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusion detection/prevention systems, and encryption technologies. Adhere to enterprise governance & review More ❯
Posted:

Lead Cyber Security Engineer

Glasgow, United Kingdom
Hybrid / WFH Options
S Three
access, and remote gateway protection at the edge. Security Operations & Threat Defence Act as the technical escalation point for complex threat investigations and incident response. Lead red-teaming simulations, vulnerability assessments, and threat hunting activities. Support proactive telemetry monitoring and improvement of detection logic and alert fidelity. Leadership & Mentoring Provide engineering mentorship to junior analysts and engineers; lead by More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Vulnerability Assessment Analyst

Slough, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Vulnerability Assessment Analyst, Slough Client: The Curve Group Location: Slough, United Kingdom Job Category: Other EU work permit required: Yes Job Views: 4 Posted: 26.06.2025 Expiry Date: 10.08.2025 Job Description: Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our client is a globally recognised, successful … remediation process and prepare MI/Dashboard reports for stakeholders. You will also help alleviate the workload of the IT Service desk when needed. Your primary responsibilities include daily assessment of vulnerabilities from scans, evaluating and prioritizing risks, and remediating within SLA. You will collaborate with SMEs/vendors of relevant systems and possess understanding of cloud technologies such … of IT security principles, standards, and regulations (ISO 27001, NIST, CIS, PCI DSS, GDPR) Certifications: CISM, CISSP Experience with Patch Management, EDR/XDR, Antivirus, NAC (Forescout) Familiarity with Vulnerability Scanning Tools (Tenable One, Qualys) Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident Response & Forensic Management skills Experience with Azure, OCI Cloud, Windows, Linux administration Knowledge of More ❯
Posted:

Tenable Vulnerability Management Analyst - Banking sector

Slough, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analyzing vulnerabilities from penetration testing reports, working with vendors to remediate vulnerabilities, patch management experience, and working on Windows, Linux, and Azure cloud systems. Also, ability to analyze and remediate SOC/NOC alerts. Our client is a globally recognized bank providing … and implementation within SLA. Collaborate with third-party vendors involved in remediation. Prepare MI/Dashboard reports for stakeholders and support the IT Service desk when needed. Perform daily vulnerability assessments, evaluate, risk assess, and prioritize vulnerabilities, remediating within SLA. Work closely with SMEs and vendors, especially on cloud technologies like Azure, AWS, and Oracle Cloud Infrastructure. Key Skills … related certifications. Desirable: Knowledge of IT security standards (ISO 27001, NIST, CIS, PCI DSS, GDPR). Certifications: CISM, CISSP. Experience with Patch Management, EDR/XDR, Antivirus, NAC (Forescout), Vulnerability Scanning tools (Tenable One, Qualys). Understanding of vulnerability scoring (CVSS/CMSS). Incident Response & Forensic Skills. Support experience with Azure, Oracle Cloud, Windows, Linux, and Mac. More ❯
Posted:

Director, Digital Risks Cyber Assurance

London, England, United Kingdom
Hybrid / WFH Options
Control Risks
collaborate closely with our cyber threat intelligence, advisory, and response teams to expand our digital risk business. Your responsibility will include representing our global penetration testing team, overseeing the assessment of cybersecurity programs, ensuring alignment with industry standards and regulatory requirements, and guiding clients through complex third-party audits. Key Responsibilities Cybersecurity Program Evaluation Lead cyber assurance engagements, assessing … industry standards such as NIST, ISO 27001, and other relevant frameworks. Act as a trusted advisor, ensuring client cybersecurity postures are resilient, compliant, and in line with regulatory requirements. Vulnerability Assessment and Penetration Testing Management Represent our vulnerability assessment and penetration testing team Partner with the penetration testing team to incorporate findings into broader cyber assurance … across audit lifecycles. In-depth understanding of regulatory frameworks, with hands-on experience delivering compliance audits for both commercial and government sectors. In-depth understanding of penetration testing and vulnerability assessments and their integration into broader cyber assurance projects. Education & Certifications: Bachelor’s or master’s degree in information security, Computer Science, Engineering, or a related field. Relevant certifications More ❯
Posted:

Director, Digital Risks Cyber Assurance

London, England, United Kingdom
Hybrid / WFH Options
Control Risks
collaborate closely with our cyber threat intelligence, advisory, and response teams to expand our digital risk business. Your responsibility will include representing our global penetration testing team, overseeing the assessment of cybersecurity programs, ensuring alignment with industry standards and regulatory requirements, and guiding clients through complex third-party audits. Key Responsibilities Cybersecurity Program Evaluation Lead cyber assurance engagements, assessing … industry standards such as NIST, ISO 27001, and other relevant frameworks. Act as a trusted advisor, ensuring client cybersecurity postures are resilient, compliant, and in line with regulatory requirements. Vulnerability Assessment and Penetration Testing Management Represent our vulnerability assessment and penetration testing team Partner with the penetration testing team to incorporate findings into broader cyber assurance … across audit lifecycles. In-depth understanding of regulatory frameworks, with hands-on experience delivering compliance audits for both commercial and government sectors. In-depth understanding of penetration testing and vulnerability assessments and their integration into broader cyber assurance projects. Education & Certifications: Bachelor's or master's degree in information security, Computer Science, Engineering, or a related field. Relevant certifications More ❯
Posted:

Director, Digital Risks Cyber Assurance (London)

South Kensington, England, United Kingdom
Hybrid / WFH Options
Control Risks
collaborate closely with our cyber threat intelligence, advisory, and response teams to expand our digital risk business. Your responsibility will include representing our global penetration testing team, overseeing the assessment of cybersecurity programs, ensuring alignment with industry standards and regulatory requirements, and guiding clients through complex third-party audits. In order to make an application, simply read through the … industry standards such as NIST, ISO 27001, and other relevant frameworks. Act as a trusted advisor, ensuring client cybersecurity postures are resilient, compliant, and in line with regulatory requirements. Vulnerability Assessment and Penetration Testing Management Represent our vulnerability assessment and penetration testing team Partner with the penetration testing team to incorporate findings into broader cyber assurance … across audit lifecycles. In-depth understanding of regulatory frameworks, with hands-on experience delivering compliance audits for both commercial and government sectors. In-depth understanding of penetration testing and vulnerability assessments and their integration into broader cyber assurance projects. Education & Certifications: Bachelor's or master's degree in information security, Computer Science, Engineering, or a related field. Relevant certifications More ❯
Posted:

Cyber Security Analyst

England, United Kingdom
Hybrid / WFH Options
Fruition Group
Requirements: Technically adept with proven experience as a security analyst or engineer. Proficiency with security tools, including SIEM, PAM, IDS/IPS, antivirus, and MS Sentinel. Strong knowledge of vulnerability assessment tools such as Tenable. Excellent analytical skills for identifying and addressing security threats. Ability to remain calm and effective under pressure, with strong problem-solving capabilities. Relevant More ❯
Posted:

Security Operations Center Analyst

Peterborough, England, United Kingdom
Hybrid / WFH Options
ZipRecruiter
certification support. Responsibilities: Monitor, analyse, and respond to security events and incidents within the SOC, ensuring timely detection and resolution in line with SLAs. Conduct thorough threat analysis and vulnerability assessments to identify potential security risks and implement mitigation strategies. Develop and refine incident response plans and playbooks to enhance SOC effectiveness. Perform root cause analysis (RCA) for high … years’ experience with leadership or advanced incident response experience. Strong understanding of network security, firewalls, VPNs, IDS/IPS, and endpoint security. Proficiency in incident response, threat analysis, and vulnerability management. Experience with security monitoring, root cause analysis, and risk assessments. Excellent analytical and problem-solving skills with attention to detail. Strong communication skills, including report writing and client More ❯
Posted:

Lead Network Security engineer

Warrington, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
details will be provided later. Job Responsibilities: Design and implement end-to-end network infrastructure automation aligned with business and IT strategic goals. Conduct security assessments, penetration testing, and vulnerability assessments to identify and mitigate risks. Design secure network architectures, including firewalls, IDS/IPS, and encryption technologies. Ensure compliance with enterprise governance, review processes, ITSM, and CMDB standards. More ❯
Posted:

Product Security Engineer

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
Pertemps
/37/53, JSP 440, 604, and Defence Standards. Develop and maintain security documentation (e.g., RMADS, Security Assurance Documents, Security Management Plans). Conduct penetration testing, vulnerability assessments, and remediation activities. The Person Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53). More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Lead Network Security engineer

Macclesfield, England, United Kingdom
Hybrid / WFH Options
ZipRecruiter
end to end network infrastructure automation capabilities that are aligned to the strategic goals of the business and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusion detection/prevention systems, and encryption technologies. Adhere to enterprise governance & review More ❯
Posted:

Entry-Level Cybersecurity Analyst

City of London, London, England, United Kingdom
Hybrid / WFH Options
How to Job Ltd
knowledge of cybersecurity who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and More ❯
Employment Type: Full-Time
Salary: £35,000 - £42,000 per annum, Negotiable
Posted:

IT Security Analyst

Derby, England, United Kingdom
Hybrid / WFH Options
Cooper Parry
to develop, refine, and optimize detection rules and custom alerts, ensuring alerting mechanisms are aligned with evolving threat landscapes while reducing false positives and enhancing actionable insights Conduct regular vulnerability assessments, interpret scan results, and coordinate remediation efforts Investigate suspicious files and behaviors for malware; collaborate with vendors/internal teams to mitigate and prevent future infections Respond swiftly More ❯
Posted:

Cybersecurity Software Evaluator with Security Clearance

Colorado Springs, Colorado, United States
Hybrid / WFH Options
OSAAVA Services
compliance with DoD cybersecurity frameworks, including NIST 800-53, RMF, and STIGs. • Work closely with developers, security engineers, and system administrators to implement security recommendations. • Perform penetration testing and vulnerability assessments on government software systems. • Document findings, create security reports, and provide actionable recommendations for remediation. • Assist with the development of secure coding practices and software security guidelines. • Evaluate … of experience in cybersecurity, penetration testing, or software security evaluation. • Certifications such as CISSP, CEH, OSCP, or GIAC GWEB are highly preferred. • Experience with secure coding practices and software vulnerability assessment tools (e.g., Nessus, Burp Suite, Fortify, SonarQube). • Familiarity with secure software development lifecycle (SSDLC) methodologies. • Strong knowledge of encryption protocols, authentication mechanisms, and network security. • Ability … teams to enhance software security postures. Preferred Qualifications: • Experience conducting cybersecurity assessments in DoD or government environments. • Understanding of container security and DevSecOps principles. • Familiarity with threat modeling, risk assessment frameworks, and security controls testing. • Knowledge of cloud security best practices (AWS, Azure, GovCloud). Work Environment & Requirements: • Location: Colorado Springs, CO - On-site presence required. • Potential hybrid/ More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Junior Cyber Security Consultant (UK) - Dionach by Nomios

London, England, United Kingdom
Hybrid / WFH Options
Nomios Netherlands
ll work to meet your needs. Job requirements What You'll Do Deliver cyber security assurance services to identify vulnerabilities in different areas on a variety of technologies, including vulnerability assessments on external networks, internal networks, applications, and enterprise security systems. Delivering presentations to technical and non-technical stakeholders. Main role will be as a Junior Cyber Security Consultant … needed. What We're Looking For Qualifications: Relevant degree or one full year’s minimum experience in penetration testing or cyber security assurance. Experience: Some experience of cyber security assessment, vulnerability assessments, or penetration testing. Certifications: such as CPSA or CEH would be advantageous. Tools: Experience of penetration testing tools, Linux, Windows, and Active Directory. Communication: Strong verbal … oriented approach. Excellent verbal and written communication skills. Ability to work effectively under pressure. Commitment to maintaining the highest ethical and professional standards. Are you experienced in cyber security assessment, vulnerability assessments, or penetration testing and looking to further improve your skills and take on more responsibilities? If so, this opportunity is perfect for you! Seniority level Seniority More ❯
Posted:

Sr. Application Security Engineer/Director - Generative AI (Remote)

London, England, United Kingdom
Hybrid / WFH Options
AltFi Ltd
the business along with customer or market requirements Perform threat modeling, secure code reviews, and secure design reviews for high-risk applications, evaluate new technology stacks and frameworks Perform vulnerability research, serve as technical security/risk advisor for new technology/applications developed by S&P Ratings Determine testing requirements and develop strategies to automate security testing using … a variety of scripting and open source tools Assist developers in remediating vulnerability findings by providing line-by-line guidance Coach development teams on security disciplines like Threat modeling, Security code reviews, provide training and education to developers on software security best practices Maintain knowledge of current and emerging technologies/products/trends related to security architectural solutions … modeling, design reviews, risk analysis and control design Experience architecting and leading security for Cloud native applications In depth knowledge of network security, authentication and authorization Advanced understanding of vulnerability exploitation chaining, and vulnerability remediation Demonstrated expertise in product/application security architecture – Service oriented architecture (SOA), Network security, application security, web services, Angular, JavaScript Security audit, Vulnerability More ❯
Posted:

Cyber Security Consulting Engineer – Transmission & Distribution Systems

Stafford, England, United Kingdom
Hybrid / WFH Options
GE Vernova
trends, ICS/OT threat landscapes, and emerging technologies, recommending tools and methods to enhance product security posture. Partner with PSL, incident response and product security teams to support vulnerability remediation, post-incident analysis, and contribute to the creation of security documentation, including architecture specs, procedures, and training materials. Represent the company in industry forums, standards bodies, and technical … C++, RTOS), as well as Linux/Windows platforms. Strong hands-on background in PKI, identity management, network security appliances, and security monitoring. Proficient in threat modeling, risk/vulnerability assessment, and using forensic/security analysis tools.. Excellent communication and stakeholder engagement skills, able to translate technical content for non-technical audiences. Exposure to quality improvement methodologies … vision, and prescription drug coverage; access to a Health Coach, a 24/7 nurse-based resource; and access to the Employee Assistance Program, providing 24/7 confidential assessment, counseling and referral services. Retirement benefits include the GE Retirement Savings Plan, a tax-advantaged 401(k) savings opportunity with company matching contributions and company retirement contributions, as well More ❯
Posted:

Senior Technical Engineer - 40 hours per week - hybrid contract

Birmingham, Staffordshire, United Kingdom
Hybrid / WFH Options
CET Structures Limited
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Desirable Skills Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Vulnerability Assessment
Work from Home
10th Percentile
£44,100
25th Percentile
£52,500
Median
£60,000
75th Percentile
£74,688
90th Percentile
£95,375