Remote Vulnerability Management Jobs

26 to 50 of 176 Remote Vulnerability Management Jobs

Cyber Security Engineer

London, United Kingdom
Hybrid / WFH Options
Oliver James Associates Ltd
Role Title: Cyber Security Engineer - Penetration & Vulnerability Testing Client Details: Oliver James has partnered with a leading distribution organisation with a strong market presence and significant investment in their IT security strategy. They are expanding their Cybersecurity team to enhance their vulnerability management and testing capabilities. This … is an exciting opportunity for an experienced Cyber Security Engineer to contribute to strengthening the organisation's security posture through targeted vulnerability assessments and penetration testing, primarily focused on Microsoft Azure and associated technologies. Description: The Cyber Security Engineer will play a critical role in identifying and mitigating security … vulnerabilities across the organisation's technology estate. You will lead regular vulnerability assessments, conduct penetration tests, and work collaboratively with IT teams to address risks and improve security standards. Key Responsibilities: Perform penetration testing and vulnerability assessments across cloud and on-premises environments. Focused security testing within Microsoft More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Security Engineer

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Sanderson
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation and management of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use cases. … Designing and implementing security controls and secure configurations. Maintaining proactive vulnerability scanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and … and audits of our information security information security policies, procedures, and systems. Identifying, assessing, managing, remediating, and tracking information security risks through our risk management framework and ensuring key risks are reported to the CISO. Performing regular internal security audits aligned to ISO/IEC 27001 and SOC2 controls. More ❯
Posted:

IT Security Engineer

Glasgow, Lanarkshire, Scotland, United Kingdom
Hybrid / WFH Options
Sanderson Recruitment
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation and management of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use cases. … Designing and implementing security controls and secure configurations. Maintaining proactive vulnerability scanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and … and audits of our information security information security policies, procedures, and systems. Identifying, assessing, managing, remediating, and tracking information security risks through our risk management framework and ensuring key risks are reported to the CISO. Performing regular internal security audits aligned to ISO/IEC 27001 and SOC2 controls. More ❯
Employment Type: Permanent, Work From Home
Salary: £65,000
Posted:

Information Security Engineer Engineering Team Bristol Office

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
Duel
Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerability scanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development process. Assist in securing … to security compliance frameworks such as ISO 27001 or SOC 2, even if not previously responsible for certification processes. Experience working within security risk management, vulnerability tracking, or operational security efforts. Prior experience working with engineering teams on security topics is beneficial, particularly around secure development practices. Ability … or Vanta. Experience working with pen testing and bug bounties a plus. Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerability management solutions. Experience or knowledge of cloud security (AWS, GCP, or Azure). Awareness of security best practices in application and infrastructure security. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Vulnerability Management Engineer

London Area, United Kingdom
Hybrid / WFH Options
Totum Partners
environments. You’ll play a key role in strengthening the security posture and ensuring compliance with security policies and industry best practices. Perform regular vulnerability assessments across endpoints, servers, applications, and cloud resources. Analyse scan results, validate findings, and prioritize based on risk, exploitability, and asset criticality. Collaborate with … compliance checks, and security assessments as needed. Implement and support endpoint protection, patching, and backup solutions. Skills Required 2 years+ of experience focussing on Vulnerability Management, with a background in cyber security or cloud/infrastructure security. Proficiency with tools such as CrowdStrike, Intune or Action1. Familiarity with … patch management processes in Windows and macOS environments. Knowledge of basic networking, firewalls, and cloud security. Experience working in Active Directory, Microsoft Entra ID, Microsoft 365, Intune, Apple Business Manager and other enterprise tools. This role offers hybrid working - 3 days office based/2 days WFH. More ❯
Posted:

Vulnerability Management Engineer

london, south east england, united kingdom
Hybrid / WFH Options
Totum Partners
environments. You’ll play a key role in strengthening the security posture and ensuring compliance with security policies and industry best practices. Perform regular vulnerability assessments across endpoints, servers, applications, and cloud resources. Analyse scan results, validate findings, and prioritize based on risk, exploitability, and asset criticality. Collaborate with … compliance checks, and security assessments as needed. Implement and support endpoint protection, patching, and backup solutions. Skills Required 2 years+ of experience focussing on Vulnerability Management, with a background in cyber security or cloud/infrastructure security. Proficiency with tools such as CrowdStrike, Intune or Action1. Familiarity with … patch management processes in Windows and macOS environments. Knowledge of basic networking, firewalls, and cloud security. Experience working in Active Directory, Microsoft Entra ID, Microsoft 365, Intune, Apple Business Manager and other enterprise tools. This role offers hybrid working - 3 days office based/2 days WFH. More ❯
Posted:

Vulnerability Analyst (OT)

Portsmouth, Hampshire, United Kingdom
Hybrid / WFH Options
Tria
We're working with a leading organisation in critical infrastructure that is looking for a Vulnerability Analyst (OT) to join their team. This is a fantastic opportunity to contribute to the security of Operational Technology (OT) environments, helping to safeguard essential services. The Role: Our client is looking for … someone to: Conduct vulnerability assessments across OT environments to identify security risks. Work closely with internal teams to develop and implement risk mitigation strategies. Monitor and assess emerging threats impacting critical infrastructure. Provide expert guidance on best practices for OT security and compliance. Travel once per quarter to the … South of England for team collaboration. What We're Looking For: Some hands-on experience in OT security or vulnerability management - this could be from working with ICS/SCADA environments, network security, or cyber risk management in OT. A strong understanding of OT vulnerabilities and security More ❯
Employment Type: Permanent
Salary: £50000 - £60000/annum
Posted:

Vulnerability Analyst (OT)

Portsmouth, yorkshire and the humber, united kingdom
Hybrid / WFH Options
TRIA
We’re working with a leading organisation in critical infrastructure that is looking for a Vulnerability Analyst (OT) to join their team. This is a fantastic opportunity to contribute to the security of Operational Technology (OT) environments , helping to safeguard essential services. The Role: Our client is looking for … someone to: Conduct vulnerability assessments across OT environments to identify security risks. Work closely with internal teams to develop and implement risk mitigation strategies. Monitor and assess emerging threats impacting critical infrastructure . Provide expert guidance on best practices for OT security and compliance. Travel once per quarter to … the South of England for team collaboration. What We’re Looking For: Some hands-on experience in OT security or vulnerability management – this could be from working with ICS/SCADA environments, network security, or cyber risk management in OT. A strong understanding of OT vulnerabilities and More ❯
Posted:

Information Security Engineer

United Kingdom
Hybrid / WFH Options
watchTowr
largest organisations, our mission is to enable organisations to continuously understand how an attacker would successfully compromise their business-with cutting-edge Attack Surface Management and Continuous Automated Red Teaming technology. watchTowr was named within Gartner's Emerging Tech Impact Radar report in 2023, in Gartner's Innovation Impact … will I do? This role involves: Security Architecture in the Cloud : Designing and implementing secure cloud infrastructures, ensuring robust protection against potential threats. Endpoint Management and Administration : Overseeing the deployment, configuration, and maintenance of endpoint security solutions to safeguard all devices within the organisation. Vulnerability Assessment and Management : Conducting regular vulnerability assessments, analysing findings, and coordinating remediation efforts to enhance our security posture. Implementation of Security Controls : Deploying security measures that not only meet compliance requirements but also proactively address emerging threats. Security Awareness Assessments : Evaluating and enhancing the security awareness of our team members through More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Centre Team Lead

Plymouth, Devon, South West, United Kingdom
Hybrid / WFH Options
Inspire People
Security Operations Centre team providing technical oversight and direction. You will engage with various teams across DDaT to maintain security monitoring, threat intelligence and vulnerability management controls to detect and alert across all HM Land Registry technical assets. Salary of £46,058 - £57,400 dependent upon interview assessment … and Business Strategies. Working closely with the Lead Infrastructure Engineers and subject matter experts, you will develop and maintain security monitoring, threat intelligence and vulnerability management controls, to detect and alert across all HMLR technical assets. You will work with technical teams to develop SOC scenario-based run … books to respond to security events & incidents. Develop vulnerability tools to ensure awareness of threats and risks to security controls. Working with Lead Infrastructure Engineers and other security teams to advise and guide operational teams on Security controls. Engage with project teams to provide assurance around the security of More ❯
Employment Type: Permanent, Work From Home
Salary: £55,000
Posted:

Senior Cyber Security Engineer - UK Remote

London, United Kingdom
Hybrid / WFH Options
McNally Recruitment Ltd
the charge in deploying high-tech solutions that not only meet compliance with regulations and industry standards but also exceed expectations. Oversee incident response, vulnerability management, and cyber threat hunting. Execute security solutions applying cutting-edge technologies like firewalls, intrusion detection and prevention systems, antivirus software, and vulnerability … s - (Qradar Preferred) (e.g. ArcSight/AlienVault/Microsoft Sentinel/LogRhythm). Enterprise level Operating Systems RedHat Linux & Windows Server command line required. Vulnerability Management Technologies (e.g. Qualys, Tenable, Rapid7) or MDR Technologies (e.g. TrendMicro, SentinelOne, CrowdStrike). Ability to achieve SC & NPPV3 Clearances. Preferred Skills and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Enterprise Customer Success Manager

London, United Kingdom
Hybrid / WFH Options
Intigriti
clients, ensuring they achieve maximum value from our platform while driving retention and expansion opportunities. This role requires deep cybersecurity industry knowledge, exceptional relationship management skills, and the ability to navigate complex enterprise environments. What you'll be doing Serve as the primary point of contact for a portfolio … stakeholders. Mentor junior CSMs and share best practices for enterprise account management. What you'll bring Essential 5+ years of customer success or account management experience with at least 3 years focused on enterprise clients. Proven track record of managing strategic relationships with enterprise organizations. Deep understanding of the … cybersecurity landscape, vulnerability management, and security testing methodologies. Experience with enterprise security programs, compliance frameworks (ISO 27001, SOC 2, GDPR, etc.), and risk management. Strong business acumen and ability to translate technical concepts into business value for C-level executives. Excellent project management skills with experience managing More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer/Architect (Hybrid) - 21782 with Security Clearance

Fort Belvoir, Virginia, United States
Hybrid / WFH Options
HII Mission Technologies
implement DoD RMF system accreditation processes. Assess use case and operational risk of integrated open source, and GOTS/COTS software components. Will use vulnerability management systems, automated security scanning tools, and system accreditation record systems. Must be able to grasp new concepts, facilitate information exchanges for data … Will follow established processes where applicable, and establish and execute defensible processes where none are prescribed. Provide security planning, assessment, risk analysis, and risk management support. Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements. Support the Government in … and system level applications. DoD 8570 compliance with IAT Level II (SSCP, Security+, CCNA-Security, or GSEC certification) Experience with DISA STIGs and SRGs, vulnerability management systems, mitigation and compliance processes, and reviewing results from automated security scanning tools. The ability to work independently and as part of More ❯
Employment Type: Permanent
Salary: USD 190,000 Annual
Posted:

Cyber Engineer - A&A with Security Clearance

Colorado Springs, Colorado, United States
Hybrid / WFH Options
Lockheed Martin
Job Number 691891BR Description:What We're Doing Our team, the Command and Control, Battle Management and Communications (C2BMC) team at Lockheed Martin, is dedicated to engineering, developing, and integrating new capabilities for the Missile Defense System that protects the United States and its allies. While we are part … Acceptance Requests (RARs) -Provide cyber support to the C2BMC program and customer meetings -Working closely with System owners, Cyber peers, Program Office technical/management staff, and other C2BMC Functional Areas to ensure the fielded C2BMC system attains and maintains appropriate Authorization for Connection, Test, and Operational purposes -Identifying … process improvement opportunities and implementing solutions to enhance workflow efficiencies and system cybersecurity posture - Report Cyber status to the Government, Program Management, and other C2BMC Functional Areas. Please Note: This position requires a government security clearance at the Secret level; you must be a U.S. Citizen for consideration. The More ❯
Employment Type: Permanent
Salary: USD 140,530 Annual
Posted:

Senior Information Security Analyst (Hybrid Opportunity)

Amherst, Massachusetts, United States
Hybrid / WFH Options
University of Massachusetts Amherst
to policies, standards, procedures, solutions and governance frameworks to address information security, compliance and privacy risks. Works with internal and external partners on risk management, information security and privacy related topics. Other Functions Performs other duties as assigned. Minimum Qualifications (Knowledge, Skills, Abilities, Education, Experience, Certifications, Licensure) Bachelor's … NIST, FERPA, HIPAA, PCI-DSS, ISO 27001). Extensive experience conducting risk assessments, compliance evaluations, and policy development. Deep understanding of security governance, risk management frameworks, and regulatory compliance. Demonstrated ability to lead security initiatives and projects at an enterprise level. Strong analytical and critical thinking skills to assess … security risks and develop mitigation strategies. Demonstrated technical understanding of system, network and cloud security, incident management, intrusion detection, vulnerability and patch management, and other related concepts and technologies. Experience with security tools such as SIEM, EDR/XDR, forensics tools, firewalls, IDS/IPS, vulnerability More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSE Security Engineer with Security Clearance

Alexandria, Virginia, United States
Hybrid / WFH Options
Metronome LLC
implement DoD RMF system accreditation processes. Assess use case and operational risk of integrated open source, and GOTS/COTS software components. Will use vulnerability management systems, automated security scanning tools, and system accreditation record systems. Must be able to grasp new concepts, facilitate information exchanges for data … Will follow established processes where applicable, and establish and execute defensible processes where none are prescribed. Provide security planning, assessment, risk analysis, and risk management support. Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements. Support the Government in … network topologies is required. DoD 8570 compliance with IAT Level II (SSCP, Security+, CCNA-Security, or GSEC certification) Experience with DISA STIGs and SRGs, vulnerability management systems, mitigation and compliance processes, and reviewing results from automated security scanning tools. The ability to work independently and as part of More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cloud DevSecOps Specialist (f/m/d)

Fellbach, Baden-Württemberg, Germany
Hybrid / WFH Options
Süddeutsche Krankenversicherung a. G
code with Terraform Incident handling in cooperation with IT security and IT infrastructure Interdisciplinary collaboration at all hierarchical levels Establishment of incident response and vulnerability management for the cloud environment Support for service providers, e.g. in the area of penetration testing of developed applications in the Azure environment … Kubernetes Sound knowledge in the area of hybrid Azure infrastructure (esp. network, firewall, RBAC, Entra ID Connect) Good knowledge of cloud security (in particular vulnerability management, incident response, backup & disaster recovery, MS Defender for Cloud and Sentinel) Knowledge of one or more common frameworks and standards (e.g. CAF More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Head of SOC

Manchester OR Hertfordshire - Hybrid, Manchester, England
Hybrid / WFH Options
InfraView
leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a "people manager" as well … business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerability management, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and … SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerability management tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials More ❯
Employment Type: Permanent
Posted:

Senior Cyber Security Manager (f/m/d)

Leipzig, Sachsen, Germany
Hybrid / WFH Options
Deutsche Börse Group
happy to receive applications in English or German. Your tasks: In this key role, you will take on professional responsibilities within the Cyber Security Management team, supporting departments in managing Cyber Detection and Protection measures, including Vulnerability Management, Security Information and Event Management (SIEM), Incident Management … of proportion Knowledge of security-relevant technologies, methods, and procedures, as well as preferably familiarity with banking or derivatives exchange processes Proficient in Project Management and Stakeholder Management Methodical and goal-oriented approach to work, with the ability to work autonomously within a team setting Experience with Information More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Senior Information Security Analyst

London, United Kingdom
Hybrid / WFH Options
Jas Gujral
computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Perform or coordinate internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Manager, Cybersecurity

San Diego, California, United States
Hybrid / WFH Options
Avidity Biosciences
responsible for overseeing and enhancing Avidity's information security strategy, governance, risk, and compliance, with a strong emphasis on cyber operations and identity & access management (IAM). This role ensures that Avidity's security framework aligns with industry best practices, regulatory requirements (FDA, HIPAA, GxP), and business objectives. You … will lead efforts in threat detection, incident response, identity and access management (IAM), and third-party risk management (TPRM), collaborating across IT, research, and compliance teams to protect Avidity's assets. This position requires a technical leader with hands-on experience in security operations, governance, and incident response … department budget, and managing vendor relationships to ensure security policies and solutions are effectively implemented. This role will oversee cybersecurity engineers managing threat and vulnerability management, threat intelligence and hunting, insider threat, and the MSSP-managed Security Operations Center (SOC). The individual must also be strong in More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer

Eau Claire, Wisconsin, United States
Hybrid / WFH Options
WIN Technology
exceptional customer service. A strong background in general IT and networking is essential. Your focus will be on blue team defensive security solutions, including vulnerability and risk assessments, security monitoring, auditing, and incident response, while also assisting with System Administration tasks to support and enable future security initiatives. If … customer service Qualifications : Technical Skills: Experience in at least 3 of the below: Information Security Administration Networking or Firewall Administration Server and Workstation Administration Vulnerability Management Risk Management Security Strategy & Engineering EDR/MDR Administration IAM User awareness training Scripting, development, and automation Business & Soft Skills: Experience More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Security Technology Audit Manager

London Area, United Kingdom
Hybrid / WFH Options
Eames Consulting
focus lies on IT Security expertise within the financial services sector. The ideal candidate will possess robust skills in various Security domains, including Access Management, Threat Management, Incident Response and Recovery, Data Protection, Vulnerability Management, Monitoring and Logging, Physical Security, and Security Risk Management and More ❯
Posted:

IT Security Technology Audit Manager

london, south east england, united kingdom
Hybrid / WFH Options
Eames Consulting
focus lies on IT Security expertise within the financial services sector. The ideal candidate will possess robust skills in various Security domains, including Access Management, Threat Management, Incident Response and Recovery, Data Protection, Vulnerability Management, Monitoring and Logging, Physical Security, and Security Risk Management and More ❯
Posted:

Cyber Analyst - Nottingham City

United Kingdom, UK
Hybrid / WFH Options
Nottingham Building Society
environments using SIEM and EDR tools. Incident Investigation: Investigate security incidents and support the full incident response lifecycle, including documentation and root cause analysis. Vulnerability Assessments: Conduct regular vulnerability assessments and collaborate with IT teams to ensure timely remediation. Regulatory Compliance: Support compliance with regulatory requirements (FCA, PRA … trends, and regulatory changes affecting the financial sector.About you: - Security Tools Expertise: Strong understanding of security tools (SIEM, EDR, firewalls, IDS/IPS) and vulnerability management processes. Technical Knowledge: Solid grasp of networking, system administration, and secure configurations. Standards Familiarity: Familiarity with standards and frameworks such as ISO More ❯
Posted:
Vulnerability Management
Work from Home
10th Percentile
£42,500
25th Percentile
£52,500
Median
£60,000
75th Percentile
£85,000
90th Percentile
£93,250