Remote Vulnerability Management Jobs

226 to 250 of 468 Remote Vulnerability Management Jobs

Security Project Manager

City of London, London, United Kingdom
Hybrid / WFH Options
Computappoint
to lead the end-to-end delivery of critical security projects for a global leader in financial market infrastructure. This role focuses on driving Security Maturity and Identity & Access Management (IAM) initiatives, ensuring alignment with regulatory requirements and business objectives in a highly regulated environment. You will oversee complex, multi-workstream projects, managing budgets, stakeholders, and vendor relationships while … and interface with PMO, Finance, and Portfolio teams. Required Experience: 5+ years in delivering complex InfoSec projects (financial/trading sector preferred). Proven expertise in IAM, cloud security, vulnerability management, and third-party risk. Certifications: PRINCE2, MSP, PMP, or APM (CISM/CRISC/ITIL desirable). Strong stakeholder management and experience in matrixed environments. Proficiency More ❯
Posted:

IT Operational Platforms and Security Lead

London, England, United Kingdom
Hybrid / WFH Options
Pioneer Search
cloud environment. Your primary focus will involve two key projects around the generational cloud migration to Azure based services, as well as driving best practice I Identity and Access Management and defining the organisations cloud security policies. While there is some direct leadership, hands on ability to take ownership of a global infrastructure estate that spans cloud, on-prem … to move faster, smarter, and with confidence. Responsibilities: Lead the shift to a secure, cloud-first infrastructure Owning the security strategy: zero-trust, Oversee global IT operations and lifecycle management Strengthen security controls and ensure regulatory compliance Manage vendor performance and service delivery Drive continuous improvement across platforms and processes Technical Skills: Security frameworks: ISO 27001, NIST, CIS SIEM … endpoint protection, vulnerability management ITIL-based service management and automation Leadership Skills Proven ability to lead IT operations and transformation projects Strong vendor and budget management experience Resilience in high-pressure environments with a security-first mindset Excellent communication across technical and non-technical audiences Why this is a great opportunity: Lead a team through a More ❯
Posted:

Governance, Risk & Compliance (GRC) Manager

Central London, London, England, United Kingdom
Hybrid / WFH Options
GreatFind Recruitment
goals, and ensure robust governance across information security and operational practices. Key Responsibilities: Develop and implement a comprehensive GRC framework across the group Conduct regular risk assessments and support vulnerability management Maintain and evolve security controls, policies, and standards Ensure compliance with GDPR, CIS18, PCI DSS, and ISO27001 Lead on third-party audits and provide documentation and evidence … of risk awareness through training and communication Monitor changes in regulation and adapt the GRC framework accordingly Ideal Candidate Profile: Minimum 5 years' experience in GRC, compliance, or risk management Solid understanding of regulatory frameworks and industry standards Hands-on experience with risk assessments and compliance auditing Strong communication and stakeholder engagement skills Professional certifications such as CISSP, CISM More ❯
Employment Type: Full-Time
Salary: £70,000 - £75,000 per annum
Posted:

Risk & Assurance Manager - IT & Infosec

Marlow, England, United Kingdom
Hybrid / WFH Options
Softcat Plc
Softcat's business continues to grow and evolve, so have the risks and the regulatory landscape. In response, Softcat Plc has recognised the need to further strengthen its Risk Management and Internal Controls and has created a second line Risk and Assurance function to strengthen the overall three lines model and improve the way in which risks are identified … managing and enhancing the IT and Information Security risk landscape. Reporting directly to the Head of Risk and Assurance, you will play a key role in embedding effective risk management practices across Softcat's technology and cybersecurity domains. As a Risk & Assurance Manager, you'll be responsible for: Partnering with senior IT, Security, and business leaders to embed risk … management practices into operational processes and strategic initiatives. Owning and maintaining IT Risk and Control Matrices (RCMs) , ensuring they remain current, comprehensive, and aligned with industry standards and audit expectations. Reviewing effectiveness of first line functions in testing and validation of key IT controls (e.g., access management, change control, incident response, vulnerability management), ensuring effectiveness and More ❯
Posted:

VP - Cybersecurity Technical Delivery Manager

London, England, United Kingdom
Hybrid / WFH Options
MUFG Americas
rewarded. OVERVIEW OF THE DEPARTMENT/SECTION IT Risk, Security & Control department covers cyber security strategy maintenance and tactical planning and operations to provide IT Security protection, governance, risk management and reporting. This includes promoting the global Information Security Standards and Procedures (ISSP) requirements and local security requirements. The department deploys, supports and monitors security solutions such as virus … protection, vulnerability management, compliance monitoring and threat/incident management activities to reduce risk. NUMBER OF DIRECT REPORTS 1-2 MAIN PURPOSE OF THE ROLE To manage the technical delivery of various cybersecurity projects and contribute to the overall success of the Cybersecurity programme function by: Ensuring that projects are delivered according to scope, on time and … etc. Demonstrable proficiency in a wide range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as Identity and Access Management, Threat Intelligence, Risk Evaluation, Security Assessment/Testing, Incidence Management and Vendor/Cloud products assessment. Possessing high level of analytical ability where problems are typically unusual and More ❯
Posted:

Senior Security Engineer

Madrid, Spain
Hybrid / WFH Options
Lunik - Explorers at Work
engagement for both local and distributed projects focused on technological transformation, improvement and growth. The Senior Security Automation Engineer will have full responsibility for the design, engineering, planning and management of the security orchestration and automation process. Key responsibilities include: Providing automation services to the Information Security Team. Including proof of concept, design, deployment, and maintenance of new technologies … maintenance of automation playbooks). Extensive experience with SIEM platforms Extensive experience SOC environments In-depth understanding of the design and deployment of other common security technologies, e.g., IDS, Vulnerability Management, Authentication and identity management, WAF, SOAR, MDM etc Experience with designing security solutions at scale for large enterprises or for multi-tenant service providers. Familiarity with More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

SIEM Application Engineer

Birmingham, Staffordshire, United Kingdom
Hybrid / WFH Options
BT Group
with expertise in Elasticsearch to join our dynamic team. As a SIEM engineer, you will play a critical role in designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threat detection, incident response, and overall security posture. This role is hybrid (3 days in … Logstash: Design, develop, and maintain data pipelines using Logstash, part of the Elastic Stack. Automate data ingestion, transformation, and loading tasks. Beats for Data Collection: Agent and Agent Policy Management: Proficiency in configuring and managing agents, including setting up agent policies for various operation systems. Ensure seamless data flow from endpoints to the Elastic Stack. Data Cleaning and Enrichment … Collaborate with data analysts to create meaningful search experiences. Database Architecture and Scaling with Elasticsearch: Optimize data storage and retrieval mechanisms within Elasticsearch clusters. Implement sharding, replication, and index management strategies. End-to-End Solution Delivery: Expertise in taking ownership of a requirement from start to finish, including gathering detailed requirements, designing, and implementing robust, innovative solutions. Experience Required More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Head of Cyber Security - Remote

Bristol, England, United Kingdom
Hybrid / WFH Options
Nigel Frank
candidates across the UK, with travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerability management and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security assessments and maintain compliance. Requirements More ❯
Posted:

Vulnerability Coordinator

London, England, United Kingdom
Hybrid / WFH Options
TipTopJob
Vulnerability Coordinator Location: (3 days a week in the office (York), 2 days a week work from home) Department: Cyber Security Type: Full-time Salary: GBP48,000 Reports To: Cyber Security Manager About the Role: Concept IT are seeking a skilled and proactive Vulnerability Coordinator to join our Clients Cyber Security team. The ideal candidate will have extensive … experience with Tenable One Vulnerability Management, Microsoft Defender Threat and Vulnerability Management (TVM) and the entire vulnerability management lifecycle across various platforms (Windows, Linux, Applications, security appliances). Experience working with UK government or NHS organisations is highly desirable. As a Vulnerability Coordinator, you will be responsible for identifying, assessing, and managing vulnerabilities … and data. Minimum Requirements: Education: Associate degree in Computer Science, Information Security, or a related field (or equivalent experience). Experience: Minimum of 3-5 years of experience in vulnerability management or a similar role, with proven experience in using Tenable One or Microsoft Defender Threat and Vulnerability Management. Experience: Conducting risk assessments and trend analysis, collaborating More ❯
Posted:

Security Engineer

Paris, France
Hybrid / WFH Options
Next Ventures
days optional remote work. The goal is to strengthen the operational security of information systems by deploying, administering, and monitoring various cybersecurity tools. This mission also includes incident management, optimizing existing solutions, and ensuring compliance with regulatory security requirements. Responsibilities: Deployment and administration of protection tools (AV/EDR, WAF, SIEM, vulnerability scanners) Analysis and management of … cybersecurity incidents in support of SOC N2 The implementation and optimization of detection scenarios Carrying out security audits and proposing action plans Risk management and compliance with current regulations (GDPR, ISO standards, etc.) Skills needed: Mastery of security technologies: Firewalls, IPS/IDS, WAF, Proxy, SIEM, vulnerability management Expertise in mitigating DDoS attacks Mastery of Threat Intelligence … tools (MITRE ATT&CK, OTX, Shodan) Experience in crisis management and incident response Mastery of IT infrastructure security concepts (network, servers, OS, databases) Knowledge of application security (OWASP, SAST) Mastery of collaborative tools: Klaxoon, JIRA, Teams Mastery of ITIL best practices and security by design principles Knowledge of GDPR, ISO 27001 regulations Interested in joining a household name in More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Information Security Analyst

Edinburgh, Scotland, United Kingdom
Hybrid / WFH Options
Head Resourcing Ltd
months, Inside IR35 £400-£450 per day Edinburgh Financial Services A small Edinburgh Financial Services organisation is currently seeking an experienced Information Security Analyst with a strong background in vulnerability management , to join their team on an initial 6 month Contract & working from their office based in Edinburgh (hybrid). The Contract will involve assessing vulnerability reports … and collaborating with cross-functional teams to ensure timely mitigation & to be successful, key knowledge & experience should include: Recent experience working as an Information Security Analyst, Security Engineer or Vulnerability Analyst with strong experience with complex information security projects . In-depth knowledge & expertise of Information Security standards, technologies & methodologies etc (e.g., ISO27001 ). Strong grasp of security best … practices , risk management , and compliance . Particular focus on Vulnerability Management utilising SAST/DAST tools , especially Tenable . Familiarity with Azure DevOps for tracking work items. Ability to work independently and in agile teams. Excellent communication and stakeholder management skills are a must as always. Any formal certifications like CISA, CISM , or ISO27001 Lead Implementer More ❯
Posted:

Security Engineer

London, England, United Kingdom
Hybrid / WFH Options
Cyber UK
s responsibilities develop over time. In the Security Platform team, you will be working to advance our service offerings, which focus on: Providing a runtime platform for security services Vulnerability management for all platform teams Ensuring compliance of our digital assets and proving this to auditors Other exciting security domains How we work We operate on a strong … with different stakeholders and varying levels of technological depth. Priorities shift based on business needs, but engineers in our team typically focus on one or two of the following: Vulnerability Management and Cloud Security Posture Management Maintain and enhance our Vulnerability Management Program, ensuring effective use across platform engineering teams. Develop and maintain a Cloud … Security Posture Management (CSPM) Program. Data Loss Prevention (DLP) program Develop and support a company-wide adoption of a DLP program. Implement components of it as well as collaborate with other teams on their implementations. System and endpoint hardening Provide and maintain hardened base images. Establish guidelines and processes for system and endpoint hardening. Compliance evidencing Develop automations and More ❯
Posted:

Senior Security Penetration Tester

Reading, England, United Kingdom
Hybrid / WFH Options
Thames Water
Posted: 22.06.2025 Expiry Date: 06.08.2025 col-wide Job Description: As a Senior Security Penetration Tester , you will be responsible for supporting the design, implementation, and maintenance of TVM (Threat & Vulnerability Management) solutions, controls and processes across the organisation. You will be liaising with Digital teams to ensure appropriate mitigation and remediation of vulnerabilities detected across our IT estate. … Tester Help support and develop an internal penetration testing function. Conduct network, application penetration testing, code and security reviews. Identify and exploit vulnerabilities through proof-of-concept testing. Support vulnerability management across the enterprise, ensuring that a framework for identification, categorisation and mitigation exists and is implemented and maintained. Responsible for supporting the creation of the operating model … for vulnerability management, that it is shared, agreed and operates effectively across the business. Develop and maintain penetration testing documentation, policies, and procedures. Integrate cybersecurity solutions (e.g. vulnerability scanning tools) with existing systems, applications, and infrastructure. Evaluate and recommend technologies, tools, and vendors to meet business needs. Investigate newly identified cybersecurity vulnerabilities and provide appropriate mitigation actions. More ❯
Posted:

IT Security & Compliance Manager

Leatherhead, England, United Kingdom
Hybrid / WFH Options
Hyundai Motor UK
adherence to policies, processes and standards related to organisational and technical security. Being a SPOC for all aspects of cybersecurity within HMUK and leading incidents resolution. Risk Assessment and Management - Assess and identify potential security threats, vulnerabilities and developing strategies to mitigate these risks. Establish a vulnerability management process aligned with headquarters guidelines. Policy Development and Enforcement … have access to HMUK data/systems and any other activities that will require security measures review and approval Be a key member of Data Breach Task force , Disaster management team , Business continuity team etc to manage and resolve all issues related to cybersecurity aspects of the incident. Maintain an up-to-date understanding of regulatory requirements, industry changes … and standards related to organisational and technical security. Being a SPOC for all aspects of cybersecurity within HMUK and leading incidents resolution. We Want You To: Risk Assessment and Management - Assess and identify potential security threats, vulnerabilities and developing strategies to mitigate these risks. Establish a vulnerability management process aligned with headquarters guidelines. Policy Development and Enforcement More ❯
Posted:

Principal Cyber Security Consultant - Hybrid

London, England, United Kingdom
Hybrid / WFH Options
ZipRecruiter
Security Consultant is a senior leader specialising in designing, implementing and managing advanced security solutions. With expertise in SOC engineering tools and one of either Cloud Security, and Access Management (IAM) or Threat Modelling, this role focuses on enhancing the security posture of organisations. The consultant will lead strategic security initiatives, collaborate with clients or stakeholders to solve complex … feeds. Skills Extensive experience in Cyber Security, with a significant portion in a leadership role. A background in SOC engineering tools combined with expertise in either cloud security, & Access Management or threat modelling. Proficiency in cloud platforms and services (AWS, Azure, GCP) with deep knowledge of security tools. Hands-on experience designing and implementing SIEM solutions in enterprise environments. … Skilled in scripting and automation (e.g., Python, PowerShell) for security processes. Familiarity with tools for threat modelling, vulnerability management, and incident response. SIEM-specific certifications like Splunk Certified Architect, Sentinel Expert, or equivalent. IAM certifications (e.g., Okta Certified Consultant, SailPoint IdentityNow, or CyberArk Defender) are highly desirable. #J-18808-Ljbffr More ❯
Posted:

Global IT Infrastructure Manager

London, England, United Kingdom
Hybrid / WFH Options
ITRS Group
for the departments and liaising with all staff and clients to implement appropriate IT infrastructure balanced against regulation requirements, risks, and cost. As part of the IT global senior management team, you will lead a global team of Infrastructure Technicians, ensuring that efficient and high-quality IT services and projects are delivered to support the continued growth of our … you’ll ensure they are available and fit for purpose to meet our needs as we scale our business. As a Global IT Infrastructure Manager, you will: Provide line management for the Global infrastructure staff. Lead the strategy, scalability, innovation, and best practices for local and global infrastructure solutions with service improvement reviews and guide improving and tuning infrastructure … services delivered. Directly contribute to ITRS Group’s goal for achieving and maintaining ISO 27001 accreditation across the group. Be responsible for Problem management and helping in finding solutions. Integrate future acquisitions into the existing ITRS Group Infrastructure, systems, and processes Identity and Access Management (IAM) for infrastructure. Monitor and Event management for infrastructure Ensure the compliance More ❯
Posted:

Senior/Staff Application Security Analyst (Bangkok based, relocation provided)

Liverpool, England, United Kingdom
Hybrid / WFH Options
Agoda
Harnessing our innovative technologies and strong partnerships, we aim to make travel easy and rewarding for everyone. Get to Know our Team: The Security Department oversees security, governance, risk management, and compliance, and security operations for all Agoda. We are vigilant in ensuring there is no breach or vulnerability threatening our company or endangering our employees to keep … advanced environment. The Opportunity: As a Security Analyst, you will focus on identifying, analyzing, and remediating vulnerabilities across our environment. You will be hands-on with penetration testing and vulnerability management, ensuring our systems remain secure and resilient. In this Role, you’ll get to: Develop Security Automation Tools to implement solutions at scale Triage security findings from … multiple tools and work with hundreds of teams to get them remediated within the right SLA Conduct security assessments through code reviews, vulnerability assessments, penetration testing and risk analysis Research on the negative effects of a vulnerability, from minimizing the impact to altering security controls for future prevention Identify potential threats so that the organization can protect itself More ❯
Posted:

Senior Cyber Security Engineer

Aldershot, Hampshire, South East, United Kingdom
Hybrid / WFH Options
JLA Resourcing Ltd
Your role will be pivotal in ensuring the secure delivery of new systems into live service, as well as ongoing protection, compliance, and incident response. You will: Own the vulnerability management strategy across platforms, leading scanning, remediation, and reporting activities Design and enforce endpoint security policies, access controls, and malware protections Lead incident identification and response efforts, ensuring … skills & experience: Extensive hands-on experience in cyber security engineering roles, ideally in defence, government, or secure sectors Advanced knowledge of AWS security services, network security, endpoint protection, and vulnerability management Strong working knowledge of compliance frameworks and standards (CIS, STIG, NIST, Government Functional Standard 007) Proven ability to lead security planning, risk assessments, and incident response activities More ❯
Employment Type: Permanent, Work From Home
Salary: £75,000
Posted:

Product Cybersecurity Advisor

Andalucía, Spain
Hybrid / WFH Options
Schneider Electric
for all people to be able to make the most of our energy and resources through the integration of processes, software, Big Data, and energy technologies that enable integrated management of buildings, industries, and cities. We are present in over 110 countries with a diverse and disruptive team of over 135,000 people. If you are seeking an opportunity … do you get to do in this position? Deploy Schneider's SDL (Secure Development Lifecycle) Act as an expert facilitator on practices such as secure design, threat modeling, and vulnerability management Act as a point of contact for cybersecurity issues for a portfolio of offers Support product owners in specifying security requirements and bring expert knowledge of relevant … and effective Support site, team, and offer cybersecurity certifications Form a network of experts inside and outside the line of business to engage as necessary on technical reviews, risk management and customer topics Travel requirements Occasional travel is required to visit sites, participate in working groups, and engage directly with customers and partners as needed Location and Availability: Sevilla More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

San Antonio-Based Prisma Cloud Security Engineer (Secret Clearan with Security Clearance

San Antonio, Texas, United States
Hybrid / WFH Options
Novacoast Federal
strong foundation in cloud security. Proficiency in Python Scripting is highly preferred. Minimum of 3 years experience in spearheading security solutions in large-scale environments. A comprehensive grasp of vulnerability management and various compliance standards. Adeptness with API-based security and compliance standards is highly valued. Knowledgeable in cloud networking, network security, virtualization, and cloud computing basics. Skillful … presenting solutions to leadership and customers. Preferred Experience: Hands-on experience with Palo Alto Prisma Cloud: 2+ years (Highly preferred) Strong Python scripting skills (Highly preferred) API configuration and management: 3+ years (Highly preferred) Cloud Security expertise: 3+ years Experience with Kubernetes: 3+ years Experience with other Cloud Security Posture Management (CSPM) tools: (Significant plus) Code Security knowledge More ❯
Employment Type: Permanent
Salary: USD 75 Hourly
Posted:

Second Line Support Engineer - On-Site

London, England, United Kingdom
Hybrid / WFH Options
Prince Talent & Resourcing Group
for service desk colleagues to help them resolve tickets the same day (preferably the same hour). Log tickets for the customer and ensure you are following the Incident Management process every time – “if it’s not in the ticket, it didn’t happen”. Maintain ticket Q so all tickets include a daily update. The standard is to … avoid having tickets older than 2 weeks that do not have a full plan of action to move to resolution. Change Management – Ensure that you always log a change in accordance with our change management process to fix a fault or satisfy a work request. Help the Service Desk and wider teams quickly identify security or a major …/or apply automation to remove manual work/process. Conduct weekly ticket reviews and monthly Service reviews with the customer. Manage and Maintain all Licensing and certificates. Patching & Vulnerability Management. Consider Information Security as part of the incident and security management process to ensure the confidentiality, integrity and availability of both internal and customer IT assets are More ❯
Posted:

Second Line Support Engineer - On-Site

South East London, England, United Kingdom
Hybrid / WFH Options
Prince Talent & Resourcing Group
for service desk colleagues to help them resolve tickets the same day (preferably the same hour). Log tickets for the customer and ensure you are following the Incident Management process every time – “if it’s not in the ticket, it didn’t happen”. Maintain ticket Q so all tickets include a daily update. The standard is to … avoid having tickets older than 2 weeks that do not have a full plan of action to move to resolution. Change Management – Ensure that you always log a change in accordance with our change management process to fix a fault or satisfy a work request. Help the Service Desk and wider teams quickly identify security or a major …/or apply automation to remove manual work/process. Conduct weekly ticket reviews and monthly Service reviews with the customer. Manage and Maintain all Licensing and certificates. Patching & Vulnerability Management. Consider Information Security as part of the incident and security management process to ensure the confidentiality, integrity and availability of both internal and customer IT assets are More ❯
Posted:

Cyber Security Consultant

Bedford, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
in depth technical understanding. You will be expected to cover the initiation through to the design and implementation, across several of the skills and technologies below: Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/Related Certifications DESIRED KNOWLEDGE, SKILLS & EXPERIENCE The ability … significant value to your application. Training and development in these technologies/solutions may be provided if required. Microsoft Intune (Focused on Security, not the full suite) Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee must be able to demonstrate the following qualities: Autonomy … Quality Focus – Concern for quality, being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in written and verbal communication. The More ❯
Posted:

Cyber Security Consultant

Norwich, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
in depth technical understanding. You will be expected to cover the initiation through to the design and implementation, across several of the skills and technologies below: Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/Related Certifications DESIRED KNOWLEDGE, SKILLS & EXPERIENCE The ability … significant value to your application. Training and development in these technologies/solutions may be provided if required. Microsoft Intune (Focused on Security, not the full suite) Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee must be able to demonstrate the following qualities: Autonomy … Quality Focus – Concern for quality, being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in written and verbal communication. The More ❯
Posted:

Cyber Security Consultant

Exeter, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
in depth technical understanding. You will be expected to cover the initiation through to the design and implementation, across several of the skills and technologies below: Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/Related Certifications DESIRED KNOWLEDGE, SKILLS & EXPERIENCE The ability … significant value to your application. Training and development in these technologies/solutions may be provided if required. Microsoft Intune (Focused on Security, not the full suite) Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee must be able to demonstrate the following qualities: Autonomy … Quality Focus – Concern for quality, being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in written and verbal communication. The More ❯
Posted:
Vulnerability Management
Work from Home
10th Percentile
£47,500
25th Percentile
£52,500
Median
£57,500
75th Percentile
£77,500
90th Percentile
£90,000