Remote Vulnerability Management Jobs

126 to 150 of 251 Remote Vulnerability Management Jobs

Security Consultant (Security Operations / SOC)

York, North Yorkshire, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Security Consultant (Security Operations / SOC)

Brighton, East Sussex, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Security Consultant (Security Operations / SOC)

Stoke-on-Trent, Staffordshire, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Assistant Director of Cyber Security

Chelmsford, Essex, South East, United Kingdom
Hybrid / WFH Options
Keystream Group Limited
leadership and over 9,000 users - working collaboratively across internal teams and over 100 partners and suppliers. Oversee governance, risk, compliance, and security operations including incident response, threat intelligence, vulnerability management, and penetration testing. Direct the selection, deployment, and maintenance of appropriate security technologies and processes to protect ECCs data and assets. You will be responsible for designing … a team of approximately 15, including six direct reports, fostering a culture of professionalism, learning, and service excellence. Experience Needed: Deep expertise in cyber security governance, compliance, and risk management within complex organisations. Strong strategic leadership experience across large scale organisations, with the ability to influence and communicate effectively at senior and political levels. A track record of developing More ❯
Employment Type: Permanent, Work From Home
Posted:

OT Cyber Security Engineer

Coventry, Warwickshire, United Kingdom
Hybrid / WFH Options
Cadent Gas
and Operational Technology (OT) environments. This is a hands-on, technically rich role where you will work with a wide range of security tools and collaborate with threat intelligence, vulnerability management, and incident response teams. You will engineer solutions to mitigate threats, automate detection and response, and ensure our systems remain secure, resilient, and compliant. Why you'll … IT and OT environments. Strategic Contribution - Influence the development of new controls and support the delivery of Cadent's cyber security strategy. Cross-Team Collaboration - Partner with threat intelligence, vulnerability analysts, and incident responders to enhance our defences. Continuous Improvement - Engineer solutions for unpatchable vulnerabilities and automate detection and response processes. National Impact - Help protect the systems that keep More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Instructor

City of London, London, United Kingdom
Hybrid / WFH Options
FIND | Creating Futures
at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetration testing and vulnerability management Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why Join? Be at More ❯
Posted:

Cyber Security Instructor

London Area, United Kingdom
Hybrid / WFH Options
FIND | Creating Futures
at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetration testing and vulnerability management Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why Join? Be at More ❯
Posted:

Security Project Manager

London Area, United Kingdom
Hybrid / WFH Options
Computappoint
to lead the end-to-end delivery of critical security projects for a global leader in financial market infrastructure. This role focuses on driving Security Maturity and Identity & Access Management (IAM) initiatives, ensuring alignment with regulatory requirements and business objectives in a highly regulated environment. You will oversee complex, multi-workstream projects, managing budgets, stakeholders, and vendor relationships while … and interface with PMO, Finance, and Portfolio teams. Required Experience: 5+ years in delivering complex InfoSec projects (financial/trading sector preferred). Proven expertise in IAM, cloud security, vulnerability management, and third-party risk. Certifications: PRINCE2, MSP, PMP, or APM (CISM/CRISC/ITIL desirable). Strong stakeholder management and experience in matrixed environments. Proficiency More ❯
Posted:

Security Project Manager

City of London, London, United Kingdom
Hybrid / WFH Options
Computappoint
to lead the end-to-end delivery of critical security projects for a global leader in financial market infrastructure. This role focuses on driving Security Maturity and Identity & Access Management (IAM) initiatives, ensuring alignment with regulatory requirements and business objectives in a highly regulated environment. You will oversee complex, multi-workstream projects, managing budgets, stakeholders, and vendor relationships while … and interface with PMO, Finance, and Portfolio teams. Required Experience: 5+ years in delivering complex InfoSec projects (financial/trading sector preferred). Proven expertise in IAM, cloud security, vulnerability management, and third-party risk. Certifications: PRINCE2, MSP, PMP, or APM (CISM/CRISC/ITIL desirable). Strong stakeholder management and experience in matrixed environments. Proficiency More ❯
Posted:

Security Project Manager

Slough, Berkshire, UK
Hybrid / WFH Options
Computappoint
to lead the end-to-end delivery of critical security projects for a global leader in financial market infrastructure. This role focuses on driving Security Maturity and Identity & Access Management (IAM) initiatives, ensuring alignment with regulatory requirements and business objectives in a highly regulated environment. You will oversee complex, multi-workstream projects, managing budgets, stakeholders, and vendor relationships while … and interface with PMO, Finance, and Portfolio teams. Required Experience: 5+ years in delivering complex InfoSec projects (financial/trading sector preferred). Proven expertise in IAM, cloud security, vulnerability management, and third-party risk. Certifications: PRINCE2, MSP, PMP, or APM (CISM/CRISC/ITIL desirable). Strong stakeholder management and experience in matrixed environments. Proficiency More ❯
Employment Type: Full-time
Posted:

Senior Security Engineer

Madrid, Spain
Hybrid / WFH Options
Lunik - Explorers at Work
engagement for both local and distributed projects focused on technological transformation, improvement and growth. The Senior Security Automation Engineer will have full responsibility for the design, engineering, planning and management of the security orchestration and automation process. Key responsibilities include: Providing automation services to the Information Security Team. Including proof of concept, design, deployment, and maintenance of new technologies … maintenance of automation playbooks). Extensive experience with SIEM platforms Extensive experience SOC environments In-depth understanding of the design and deployment of other common security technologies, e.g., IDS, Vulnerability Management, Authentication and identity management, WAF, SOAR, MDM etc Experience with designing security solutions at scale for large enterprises or for multi-tenant service providers. Familiarity with More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

SIEM Application Engineer

Birmingham, Staffordshire, United Kingdom
Hybrid / WFH Options
BT Group
with expertise in Elasticsearch to join our dynamic team. As a SIEM engineer, you will play a critical role in designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threat detection, incident response, and overall security posture. This role is hybrid (3 days in … Logstash: Design, develop, and maintain data pipelines using Logstash, part of the Elastic Stack. Automate data ingestion, transformation, and loading tasks. Beats for Data Collection: Agent and Agent Policy Management: Proficiency in configuring and managing agents, including setting up agent policies for various operation systems. Ensure seamless data flow from endpoints to the Elastic Stack. Data Cleaning and Enrichment … Collaborate with data analysts to create meaningful search experiences. Database Architecture and Scaling with Elasticsearch: Optimize data storage and retrieval mechanisms within Elasticsearch clusters. Implement sharding, replication, and index management strategies. End-to-End Solution Delivery: Expertise in taking ownership of a requirement from start to finish, including gathering detailed requirements, designing, and implementing robust, innovative solutions. Experience Required More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer

Paris, France
Hybrid / WFH Options
Next Ventures
days optional remote work. The goal is to strengthen the operational security of information systems by deploying, administering, and monitoring various cybersecurity tools. This mission also includes incident management, optimizing existing solutions, and ensuring compliance with regulatory security requirements. Responsibilities: Deployment and administration of protection tools (AV/EDR, WAF, SIEM, vulnerability scanners) Analysis and management of … cybersecurity incidents in support of SOC N2 The implementation and optimization of detection scenarios Carrying out security audits and proposing action plans Risk management and compliance with current regulations (GDPR, ISO standards, etc.) Skills needed: Mastery of security technologies: Firewalls, IPS/IDS, WAF, Proxy, SIEM, vulnerability management Expertise in mitigating DDoS attacks Mastery of Threat Intelligence … tools (MITRE ATT&CK, OTX, Shodan) Experience in crisis management and incident response Mastery of IT infrastructure security concepts (network, servers, OS, databases) Knowledge of application security (OWASP, SAST) Mastery of collaborative tools: Klaxoon, JIRA, Teams Mastery of ITIL best practices and security by design principles Knowledge of GDPR, ISO 27001 regulations Interested in joining a household name in More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Senior Cyber Security Engineer

Aldershot, Hampshire, South East, United Kingdom
Hybrid / WFH Options
JLA Resourcing Ltd
Your role will be pivotal in ensuring the secure delivery of new systems into live service, as well as ongoing protection, compliance, and incident response. You will: Own the vulnerability management strategy across platforms, leading scanning, remediation, and reporting activities Design and enforce endpoint security policies, access controls, and malware protections Lead incident identification and response efforts, ensuring … skills & experience: Extensive hands-on experience in cyber security engineering roles, ideally in defence, government, or secure sectors Advanced knowledge of AWS security services, network security, endpoint protection, and vulnerability management Strong working knowledge of compliance frameworks and standards (CIS, STIG, NIST, Government Functional Standard 007) Proven ability to lead security planning, risk assessments, and incident response activities More ❯
Employment Type: Permanent, Work From Home
Salary: £75,000
Posted:

Product Cybersecurity Advisor

Andalucía, Spain
Hybrid / WFH Options
Schneider Electric
for all people to be able to make the most of our energy and resources through the integration of processes, software, Big Data, and energy technologies that enable integrated management of buildings, industries, and cities. We are present in over 110 countries with a diverse and disruptive team of over 135,000 people. If you are seeking an opportunity … do you get to do in this position? Deploy Schneider's SDL (Secure Development Lifecycle) Act as an expert facilitator on practices such as secure design, threat modeling, and vulnerability management Act as a point of contact for cybersecurity issues for a portfolio of offers Support product owners in specifying security requirements and bring expert knowledge of relevant … and effective Support site, team, and offer cybersecurity certifications Form a network of experts inside and outside the line of business to engage as necessary on technical reviews, risk management and customer topics Travel requirements Occasional travel is required to visit sites, participate in working groups, and engage directly with customers and partners as needed Location and Availability: Sevilla More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

San Antonio-Based Prisma Cloud Security Engineer (Secret Clearan with Security Clearance

San Antonio, Texas, United States
Hybrid / WFH Options
Novacoast Federal
strong foundation in cloud security. Proficiency in Python Scripting is highly preferred. Minimum of 3 years experience in spearheading security solutions in large-scale environments. A comprehensive grasp of vulnerability management and various compliance standards. Adeptness with API-based security and compliance standards is highly valued. Knowledgeable in cloud networking, network security, virtualization, and cloud computing basics. Skillful … presenting solutions to leadership and customers. Preferred Experience: Hands-on experience with Palo Alto Prisma Cloud: 2+ years (Highly preferred) Strong Python scripting skills (Highly preferred) API configuration and management: 3+ years (Highly preferred) Cloud Security expertise: 3+ years Experience with Kubernetes: 3+ years Experience with other Cloud Security Posture Management (CSPM) tools: (Significant plus) Code Security knowledge More ❯
Employment Type: Permanent
Salary: USD 75 Hourly
Posted:

Second Line Support Engineer - On-Site

London, England, United Kingdom
Hybrid / WFH Options
Prince Talent & Resourcing Group
for service desk colleagues to help them resolve tickets the same day (preferably the same hour). Log tickets for the customer and ensure you are following the Incident Management process every time – “if it’s not in the ticket, it didn’t happen”. Maintain ticket Q so all tickets include a daily update. The standard is to … avoid having tickets older than 2 weeks that do not have a full plan of action to move to resolution. Change Management – Ensure that you always log a change in accordance with our change management process to fix a fault or satisfy a work request. Help the Service Desk and wider teams quickly identify security or a major …/or apply automation to remove manual work/process. Conduct weekly ticket reviews and monthly Service reviews with the customer. Manage and Maintain all Licensing and certificates. Patching & Vulnerability Management. Consider Information Security as part of the incident and security management process to ensure the confidentiality, integrity and availability of both internal and customer IT assets are More ❯
Posted:

Second Line Support Engineer - On-Site

South East London, England, United Kingdom
Hybrid / WFH Options
Prince Talent & Resourcing Group
for service desk colleagues to help them resolve tickets the same day (preferably the same hour). Log tickets for the customer and ensure you are following the Incident Management process every time – “if it’s not in the ticket, it didn’t happen”. Maintain ticket Q so all tickets include a daily update. The standard is to … avoid having tickets older than 2 weeks that do not have a full plan of action to move to resolution. Change Management – Ensure that you always log a change in accordance with our change management process to fix a fault or satisfy a work request. Help the Service Desk and wider teams quickly identify security or a major …/or apply automation to remove manual work/process. Conduct weekly ticket reviews and monthly Service reviews with the customer. Manage and Maintain all Licensing and certificates. Patching & Vulnerability Management. Consider Information Security as part of the incident and security management process to ensure the confidentiality, integrity and availability of both internal and customer IT assets are More ❯
Posted:

Senior Security Engineer - Automation & Detection

Andalucía, Spain
Hybrid / WFH Options
Humankind Global Recruitment
possess a strong understanding of security operations and incident response processes. Key responsibilities include: The Senior Security Automation Engineer will have full responsibility for the design, engineering, planning and management of the security orchestration and automation process. Key responsibilities include: Providing automation services to the Information Security Team. Including proof of concept, design, deployment, and maintenance of new technologies … maintenance of automation playbooks). Extensive experience with SIEM platforms Extensive experience SOC environments In-depth understanding of the design and deployment of other common security technologies, e.g., IDS, Vulnerability Management, Authentication and identity management, WAF, SOAR, MDM etc Experience with designing security solutions at scale for large enterprises or for multi-tenant service providers. Familiarity with More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

IT Systems Administrator

Bath, Somerset, South West, United Kingdom
Hybrid / WFH Options
London & Country Mortgages
ensure these systems are fit for purpose and operational. Ideally youll have knowledge and experience with the following: 1. MS Azure knowledge, with experience of the following; Entra ID Management Azure storage accounts Azure Virtual Desktop (AVD) Azure Virtual machine management 2. MS 365 administration of; Teams Sharepoint Intune 3. On prem infrastructure experience i ncluding; Building and … when business needs change. Furthermore, whilst not essential, in addition to the Essential skills it would be desirable to have knowledge and experience of the following technologies; SSL certificate management Vulnerability management SIEM experience (Ideally MS Sentinel) Infrastructure As Code (Ideally Terraform and Ansible) Powershell SQL Cisco Umbrella Nutanix Hyperconverged Infrastructure support Netapp Support Knowledge of and More ❯
Employment Type: Permanent, Work From Home
Salary: £45,000
Posted:

Cloud Engineering Manager

Dallas, Texas, United States
Hybrid / WFH Options
Vanguard
experience. Provide latest industry expertise in emerging security practices and standards. What it Takes: Minimum of 5 years related work experience required, including experience in cloud security engineering, cloud vulnerability management, or general cloud cyber domains Undergraduate degree in a related field or the equivalent combination of training and experience Excellent leadership and team management skills, with More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Penetration Tester

United Kingdom
Hybrid / WFH Options
CGI
Security allowing you to grow and develop your career. We offer full 360-degree services to our clients from initial consulting on a range of areas including Risk Assessments, Vulnerability Management, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, Penetration Testing and much more. We More ❯
Employment Type: Permanent
Posted:

Senior Penetration Tester

United Kingdom
Hybrid / WFH Options
CGI
Security allowing you to grow and develop your career. We offer full 360-degree services to our clients from initial consulting on a range of areas including Risk Assessments, Vulnerability Management, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, Penetration Testing and much more. We More ❯
Employment Type: Permanent
Posted:

Information Security Engineer - Vulnerability Management

London, United Kingdom
Hybrid / WFH Options
Starling Bank Limited
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability management-specific … tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process vulnerability data to … provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerability More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Analyst

City of London, London, United Kingdom
Hybrid / WFH Options
Next Ventures
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerability scanning and remediation activities via Tenable Vulnerability Management Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerability management tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯
Posted:
Vulnerability Management
Work from Home
10th Percentile
£47,500
25th Percentile
£52,500
Median
£57,500
75th Percentile
£77,500
90th Percentile
£90,000