Vulnerability Assessment Jobs

1 to 25 of 83 Vulnerability Assessment Jobs

Lead IT Security Manager

Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
technology and Security Operations Centre management. Key focus areas for this role, the ideal candidate will have experience in each of the below; Threat & Vulnerability Management Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar … determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and … Provide expert advice on threat intelligence activities, identifying which threat categories are most dangerous to the organization and how to defend against them. * Manage vulnerability assessment activities within company IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. * Develop, maintain more »
Employment Type: Permanent
Posted:

Lead IT Security Manager

Birmingham, West Midlands, West Midlands (County), United Kingdom
Proftech Talent
. Ability to provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. Vulnerability Assessment. Ability to identify and classify security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. Risk Management . Ability to … Security Operations pillar, determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). Manage … opportunities to IT. Provide expert advice on threat intelligence activities, identifying which threat categories are most dangerous and how to defend against them. Manage vulnerability assessment activities within IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. Develop, maintain, and more »
Employment Type: Permanent
Salary: £40750 - £61100/annum
Posted:

Lead Vulnerability Analyst

Ashburn, Virginia, United States
Leidos
be leading 5 to 10 VAT members, perform research on current threats and vulnerabilities, will be responsible for authoring security advisories and manage enterprise vulnerability compliance and will conduct vulnerability assessments of IT systems. The VAT Lead will be assisting the government with the Enterprise Information System Vulnerability Management (ISVM) compliance validation, execute Vulnerability Scans and will conduct vulnerability assessments of IT systems. Perform research on current vulnerabilities, support Incident Response and SOC functions as related to vulnerabilities. Will be responsible for authoring security advisories. Basic Qualifications: BS degree Science, Technology, Engineering, Math or related … experience may be considered in lieu of a degree. Relevant experience is within one of the following areas pentesting, security technical assessments or supporting vulnerability scanning/management program. Experience managing teams Experience with vulnerability analysis Ability to identify false positives within scan results and work with vendor more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Threat & Vulnerability Management Specialist

England, United Kingdom
Hybrid / WFH Options
Matchtech
of sensitive data. This is a contract position offering a competitive daily rate and the opportunity to work remotely. Key Responsibilities Implement and maintain vulnerability management programs and processes. Identify, assess, and prioritize vulnerabilities within the company's technology infrastructure. Perform regular scans, audits, and penetration testing to identify … potential weaknesses. Create reports and provide insights to stakeholders regarding vulnerability status and remediation strategies. Collaborate with cross-functional teams to address vulnerabilities and implement security controls. Maintain up-to-date knowledge of emerging security threats and industry best practices. Participate in incident response and provide guidance in the … event of a security breach. Job Requirements Significant experience in vulnerability management, including vulnerability assessment, penetration testing, and remediation. Strong knowledge of vulnerability scanning tools such as Nessus, Qualys, or similar. Understanding of industry frameworks and standards, such as OWASP, NIST, and CVSS. Ability to analyze more »
Employment Type: Contract
Rate: £600 - £650/day
Posted:

Security Engineer

Douglas, Isle of Man, United Kingdom
Orchard Recruitment Ltd
requirements Conduct periodic internal assessments to evaluate adherence to Information Security Frameworks and compliance standards, driving continuous improvement and implement corrective actions based on assessment findings Stay updated with industry trends, best practices, regulatory standards and amendments in Information Security Frameworks Develop strategic plans outlining security objectives and domain … knowledge sharing and cooperation to leverage expertise from external entities Develop a comprehensive framework for assessing the security posture of Material IT Suppliers, outlining assessment criteria, methodologies, and evaluation metrics Working with the Head of IT Service, establish mechanisms to verify and validate the compliance of material IT suppliers … potential risks and threats to the organisation's assets and operations Develop and implement risk mitigation strategies based on the findings from risk assessments, vulnerability testing, and penetration testing reports Organise and oversee regular vulnerability assessments and penetration testing activities to identify weaknesses and potential entry points for more »
Employment Type: Permanent
Salary: £35000 - £47500/annum Excellent benefits package
Posted:

Information Assurance Professional

Arlington, Virginia, United States
Leidos
in support of customer requirements and objectives. Mitigate or eliminate impact to confidentiality, integrity, or availability of information and information systems Develop and update assessment and authorization documentation of information systems. Validate security policies and procedures outlined in the System Security Plan. Take corrective action to resolve problems identified … ISSM. Perform security audits IAW established procedures. Establish system specific recovery processes to ensure security features and procedures are properly protected and restored. Conduct vulnerability management (scanning, assessment, reporting, and mitigation verification), security reviews and tests of systems to verify security features and controls are functional and effective. … training or experience with Windows-based Information Systems with a working knowledge of LINUX operating systems. Current Certified Information System Security Professional (CISSP) certification Vulnerability assessment and analysis experience utilizing SCAP, ACAS/NESSUS and DISA STIGs Experience with DoD implementation of the Risk Management Framework (RMF) and more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer - PVH Corp

New Brunswick, New Jersey, United States
PVH
solutions in large complex environments. The candidate must have foundational knowledge in endpoint security, network security, web security, data security technologies, cloud security technologies, vulnerability, and threat management. PRIMARY RESPONSIBILITIES/ACCOUNTABILITIES OF THE JOB: Work to ensure the security infrastructure and tools are properly deployed, operational, secure, and … configured appropriately. Deploy and operationalize Vulnerability assessment tools Deploy and operationalize SIEM and security correlation platform Work with groups to optimize and operationalize Firewalls and other network security infrastructure Deploy and operationalize Identity and credential management tools Deploy and operationalize Endpoint Detection & Response technologies Collaborate on solutions for … QUALIFICATIONS & EXPERIENCE: Experience: 5+ years' of cybersecurity experience In-depth knowledge of firewalls, intrusion detection/prevention systems, endpoint security software, cloud security tools, vulnerability & threat management tools, SIEM, encryption, and other industry-standard tools and protocols. Extensive technical understanding of operating systems and how to secure them. (Windows more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer - PVH Corp

Bridgewater, New Jersey, United States
PVH
solutions in large complex environments. The candidate must have foundational knowledge in endpoint security, network security, web security, data security technologies, cloud security technologies, vulnerability, and threat management. PRIMARY RESPONSIBILITIES/ACCOUNTABILITIES OF THE JOB: Work to ensure the security infrastructure and tools are properly deployed, operational, secure, and … configured appropriately. Deploy and operationalize Vulnerability assessment tools Deploy and operationalize SIEM and security correlation platform Work with groups to optimize and operationalize Firewalls and other network security infrastructure Deploy and operationalize Identity and credential management tools Deploy and operationalize Endpoint Detection & Response technologies Collaborate on solutions for … QUALIFICATIONS & EXPERIENCE: Experience: 5+ years' of cybersecurity experience In-depth knowledge of firewalls, intrusion detection/prevention systems, endpoint security software, cloud security tools, vulnerability & threat management tools, SIEM, encryption, and other industry-standard tools and protocols. Extensive technical understanding of operating systems and how to secure them. (Windows more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer - PVH Corp

Bedminster, New Jersey, United States
PVH
solutions in large complex environments. The candidate must have foundational knowledge in endpoint security, network security, web security, data security technologies, cloud security technologies, vulnerability, and threat management. PRIMARY RESPONSIBILITIES/ACCOUNTABILITIES OF THE JOB: Work to ensure the security infrastructure and tools are properly deployed, operational, secure, and … configured appropriately. Deploy and operationalize Vulnerability assessment tools Deploy and operationalize SIEM and security correlation platform Work with groups to optimize and operationalize Firewalls and other network security infrastructure Deploy and operationalize Identity and credential management tools Deploy and operationalize Endpoint Detection & Response technologies Collaborate on solutions for … QUALIFICATIONS & EXPERIENCE: Experience: 5+ years' of cybersecurity experience In-depth knowledge of firewalls, intrusion detection/prevention systems, endpoint security software, cloud security tools, vulnerability & threat management tools, SIEM, encryption, and other industry-standard tools and protocols. Extensive technical understanding of operating systems and how to secure them. (Windows more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer - PVH Corp

Piscataway, New Jersey, United States
PVH
solutions in large complex environments. The candidate must have foundational knowledge in endpoint security, network security, web security, data security technologies, cloud security technologies, vulnerability, and threat management. PRIMARY RESPONSIBILITIES/ACCOUNTABILITIES OF THE JOB: Work to ensure the security infrastructure and tools are properly deployed, operational, secure, and … configured appropriately. Deploy and operationalize Vulnerability assessment tools Deploy and operationalize SIEM and security correlation platform Work with groups to optimize and operationalize Firewalls and other network security infrastructure Deploy and operationalize Identity and credential management tools Deploy and operationalize Endpoint Detection & Response technologies Collaborate on solutions for … QUALIFICATIONS & EXPERIENCE: Experience: 5+ years' of cybersecurity experience In-depth knowledge of firewalls, intrusion detection/prevention systems, endpoint security software, cloud security tools, vulnerability & threat management tools, SIEM, encryption, and other industry-standard tools and protocols. Extensive technical understanding of operating systems and how to secure them. (Windows more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer - PVH Corp

Hillsborough, New Jersey, United States
PVH
solutions in large complex environments. The candidate must have foundational knowledge in endpoint security, network security, web security, data security technologies, cloud security technologies, vulnerability, and threat management. PRIMARY RESPONSIBILITIES/ACCOUNTABILITIES OF THE JOB: Work to ensure the security infrastructure and tools are properly deployed, operational, secure, and … configured appropriately. Deploy and operationalize Vulnerability assessment tools Deploy and operationalize SIEM and security correlation platform Work with groups to optimize and operationalize Firewalls and other network security infrastructure Deploy and operationalize Identity and credential management tools Deploy and operationalize Endpoint Detection & Response technologies Collaborate on solutions for … QUALIFICATIONS & EXPERIENCE: Experience: 5+ years' of cybersecurity experience In-depth knowledge of firewalls, intrusion detection/prevention systems, endpoint security software, cloud security tools, vulnerability & threat management tools, SIEM, encryption, and other industry-standard tools and protocols. Extensive technical understanding of operating systems and how to secure them. (Windows more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer - PVH Corp

Warren, New Jersey, United States
PVH
solutions in large complex environments. The candidate must have foundational knowledge in endpoint security, network security, web security, data security technologies, cloud security technologies, vulnerability, and threat management. PRIMARY RESPONSIBILITIES/ACCOUNTABILITIES OF THE JOB: Work to ensure the security infrastructure and tools are properly deployed, operational, secure, and … configured appropriately. Deploy and operationalize Vulnerability assessment tools Deploy and operationalize SIEM and security correlation platform Work with groups to optimize and operationalize Firewalls and other network security infrastructure Deploy and operationalize Identity and credential management tools Deploy and operationalize Endpoint Detection & Response technologies Collaborate on solutions for … QUALIFICATIONS & EXPERIENCE: Experience: 5+ years' of cybersecurity experience In-depth knowledge of firewalls, intrusion detection/prevention systems, endpoint security software, cloud security tools, vulnerability & threat management tools, SIEM, encryption, and other industry-standard tools and protocols. Extensive technical understanding of operating systems and how to secure them. (Windows more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer - PVH Corp

Somerville, New Jersey, United States
PVH
solutions in large complex environments. The candidate must have foundational knowledge in endpoint security, network security, web security, data security technologies, cloud security technologies, vulnerability, and threat management. PRIMARY RESPONSIBILITIES/ACCOUNTABILITIES OF THE JOB: Work to ensure the security infrastructure and tools are properly deployed, operational, secure, and … configured appropriately. Deploy and operationalize Vulnerability assessment tools Deploy and operationalize SIEM and security correlation platform Work with groups to optimize and operationalize Firewalls and other network security infrastructure Deploy and operationalize Identity and credential management tools Deploy and operationalize Endpoint Detection & Response technologies Collaborate on solutions for … QUALIFICATIONS & EXPERIENCE: Experience: 5+ years' of cybersecurity experience In-depth knowledge of firewalls, intrusion detection/prevention systems, endpoint security software, cloud security tools, vulnerability & threat management tools, SIEM, encryption, and other industry-standard tools and protocols. Extensive technical understanding of operating systems and how to secure them. (Windows more »
Employment Type: Permanent
Salary: USD Annual
Posted:

IT SecOps & Automation Analyst

England, United Kingdom
Pragmatic
security posture and implement best practices. And conduct security monitoring, analysis, and incident response to detect and address cyber threats and vulnerabilities. Participate in vulnerability assessments, penetration testing, and security audits to identify and mitigate risks. Identify opportunities to integrate tools with Single Sign On/MFA across our more »
Posted:

Penetration Tester

Belfast, Northern Ireland, United Kingdom
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. Responsibilities: Thoroughly evaluate proposed and current solutions to ensure compliance with established … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability assessment and a penetration test more »
Posted:

Local Operations Security Expert

Bristol, England, United Kingdom
AXA
x) in the local Operations Security department, you will focus on various infor-mation security activities with the following main responsibilities: • Operate and maintain vulnerability management and policy compliance scanning tool • Perform and improve vulnerability management processes as well as ensure remediation and mitigation actions are appropriately implemented … Policy & Standards; Information Security Strategy; Innovation & Business Improvement; Information Security Awareness and Training; Legal & Regulatory Environment; Third Party Man-agement • Information Risk Management: Risk Assessment; Risk Management • Implementing Secure Systems: Security Architecture; Secure Development • Information Assurance Methodologies and Testing • Operational Security Management: Secure Operations Management; Secure Operations & Service Delivery … Vulnerability Assessment • Incident Management: Incident Management; Investigation; Forensics • Computer Security Information Response Team • Cyber Threat Management • Audit, Assurance & Review: Audit & Review • Business Continuity Management Skills/abilities • Strong interpersonal and communication skills; able to deal effectively with diverse cultures, skill sets and per-sonalities, works effectively as a more »
Posted:

Senior Cyber Security Analyst

Norwich, England, United Kingdom
Workday
skills within a dedicated security advisory team? This role exists within Aviva’s CISO team and is responsible for carrying out consultancy and risk assessment activities across multiple geographical areas, business areas and change disciplines. If you feel this is something to which you could bring benefit to, or … each other. This is accomplished through knowledge sharing and maintaining an enjoyable working environment. Skills and experience we’re looking for: Experience utilising Risk Assessment methods and frameworks (IRAM2, OCTAVE, NIST, ISO 27005 etc). Exposure to Information Security Management System frameworks and standards and their application. Partnered with … management, application security & cloud security and associated compliance frameworks such as SOX, PCI-DSS etc. Previous use of security technologies (firewalls, WAFs, DLP, cryptography, vulnerability scanning, identity and access management, etc). The ability to carry out threat modelling, vulnerability assessment, control effectiveness review and risk assessment more »
Posted:

Cyber Security Vulnerability Manger

Slough, England, United Kingdom
iFindTech Ltd
Job Overview: Join a dynamic and high-performing team as a Senior Analyst in Vulnerability Management & Security Testing. This role offers the unique opportunity to enhance a best-in-class Threat Defence capability and make significant contributions to our security operations. Ideal candidates will bring a strong background in … threat management, vulnerability assessment, and security testing, aiming to drive innovation and excellence in our security practices. Key Responsibilities: Conduct thorough vulnerability assessments across various platforms, including networks, systems, applications, and devices. Analyze risks associated with vulnerabilities, provide detailed reporting, and recommend actionable remediation strategies. Work collaboratively … across IT, IoT, and OT environments. Coordinate and oversee remediation efforts to ensure timely and effective resolution of security vulnerabilities. Requirements: Extensive experience in vulnerability management and remediation, including hands-on experience with vulnerability scanning tools. Good knowledge of Exabeam, Tenable.io and Tenable.sc would be considered a positive more »
Posted:

Security Analyst - (Berkshire / Hybrid) - CISSP, CISM, CEH

Wokingham, England, United Kingdom
Hybrid / WFH Options
Mayflower Recruitment Ltd
maintain security controls, policies, and procedures to protect internal and client environments. Implement and maintain cybersecurity products to safeguard internal and client infrastructures. Perform vulnerability assessments and penetration testing to identify security weaknesses and recommend remedial actions. Collaborate with internal teams and clients to address security needs or concerns more »
Posted:

Sr. Windows Administrator SPLUNK with active TS/SCI Poly

Annapolis Junction, Maryland, United States
Leidos
databases, and workstations as well as VMware and Linux server instances. Additional responsibilities include: Maintaining a complex server-based enclave, including performing system scans, vulnerability management activities, and active directory configuration. Identifying and correcting hardware and software issues. Utilizing enterprise monitoring solutions to identify alarms that have been triggered … technical assistance to companion work groups in support of overlapping projects and maintaining good inter-departmental relations. Executing the process for managing information assurance vulnerability alerts (IAVAs) and system security scanning for equipment suites in accordance with the System Security Plans for these systems to identify and remediate IAVAs … team. Preferred Qualifications: Experience documenting and providing information for security accreditation and certification. Experience with Network Security Technologies (e.g., Multiple Domain, PKI, SSP, and Vulnerability Assessment). Experience with Data Center design and configuration (e.g., rack and stack, power, placement, etc.). Experience in a System Administration role more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior IT Infrastructure Engineer

London Area, United Kingdom
Zenith Bank (UK) Limited
Service Desk and Change Management Systems (ManageEngine) Maintain, monitor, and support the bank’s network, applications and infrastructure. Carry out regular system health checks, vulnerability assessment and patching. Integrate solutions with other applications and platforms based on business requirements. Perform routine maintenance tasks for infrastructure systems such as more »
Posted:

SOC Analyst - 24/7

Poole, Dorset, United Kingdom
Pro Box Recruitment
the organization's network and systems. Utilize various security tools and methodologies to identify and address potential vulnerabilities before they are exploited. Assist in vulnerability assessments and penetration testing activities. Evaluate and prioritize identified vulnerabilities for remediation by collaborating with IT and system administrators. Create detailed reports on security more »
Employment Type: Permanent
Salary: £25000 - £30000/annum
Posted:

Security Analyst - NATO Cleared

Belgium
Square One Resources
logs and network traffic, determine alert severity and escalate if necessary. Collate information in clear format, providing recommendation and first line response. Responsibility: Conduct assessment of security events. Analyse of Firewalls, IDS, anti-virus and network sensors events. Use tool set for investigations (eg Log collection, Intrusion detection, Packet … in cybersecurity area such as GCIA, GNFA Computer Incident response Team CIRT, CERT Full packet Capture System ( eg NetWitness, Niksun ) HIDS Computer security tools - vulnerability Assessment, Protocol analysis, Anti-virus; Forensics tools Disclaimer Notwithstanding any guidelines given to level of experience sought, we will consider candidates from outside more »
Employment Type: Contract
Rate: EUR 530 Daily
Posted:

Security Engineer - Perimeter Security Team

Columbia, Missouri, United States
EDWARD JONES
with security aspects of critical technologies (e.g., Linux, Windows, Cloud, Web, Network, Firewalls, Application Firewalls, IDS/IPS, Authentication, Authorization, DNS, Load Balancers and Vulnerability Assessment Tools. Proficient understanding of system and security development lifecycles and Agile methodologies Knowledge and comprehension of scripting languages preferred for automation tasks more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer - Perimeter Security Team

Saint Louis, Missouri, United States
EDWARD JONES
with security aspects of critical technologies (e.g., Linux, Windows, Cloud, Web, Network, Firewalls, Application Firewalls, IDS/IPS, Authentication, Authorization, DNS, Load Balancers and Vulnerability Assessment Tools. Proficient understanding of system and security development lifecycles and Agile methodologies Knowledge and comprehension of scripting languages preferred for automation tasks more »
Employment Type: Permanent
Salary: USD Annual
Posted:
Vulnerability Assessment
10th Percentile
£38,000
25th Percentile
£53,750
Median
£66,000
75th Percentile
£80,000
90th Percentile
£93,125