Vulnerability Assessment Job Vacancies

101 to 125 of 678 Vulnerability Assessment Jobs

Tenable Vulnerability Management Analyst - Banking sector

Slough, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analyzing vulnerabilities from penetration testing reports, working with vendors to remediate vulnerabilities, patch management experience, and working on Windows, Linux, and Azure cloud systems. Also, ability to analyze and remediate SOC/NOC alerts. Our client is a globally recognized bank providing … and implementation within SLA. Collaborate with third-party vendors involved in remediation. Prepare MI/Dashboard reports for stakeholders and support the IT Service desk when needed. Perform daily vulnerability assessments, evaluate, risk assess, and prioritize vulnerabilities, remediating within SLA. Work closely with SMEs and vendors, especially on cloud technologies like Azure, AWS, and Oracle Cloud Infrastructure. Key Skills … related certifications. Desirable: Knowledge of IT security standards (ISO 27001, NIST, CIS, PCI DSS, GDPR). Certifications: CISM, CISSP. Experience with Patch Management, EDR/XDR, Antivirus, NAC (Forescout), Vulnerability Scanning tools (Tenable One, Qualys). Understanding of vulnerability scoring (CVSS/CMSS). Incident Response & Forensic Skills. Support experience with Azure, Oracle Cloud, Windows, Linux, and Mac. More ❯
Posted:

Director, Digital Risks Cyber Assurance

London, England, United Kingdom
Hybrid / WFH Options
Control Risks
collaborate closely with our cyber threat intelligence, advisory, and response teams to expand our digital risk business. Your responsibility will include representing our global penetration testing team, overseeing the assessment of cybersecurity programs, ensuring alignment with industry standards and regulatory requirements, and guiding clients through complex third-party audits. Key Responsibilities Cybersecurity Program Evaluation Lead cyber assurance engagements, assessing … industry standards such as NIST, ISO 27001, and other relevant frameworks. Act as a trusted advisor, ensuring client cybersecurity postures are resilient, compliant, and in line with regulatory requirements. Vulnerability Assessment and Penetration Testing Management Represent our vulnerability assessment and penetration testing team Partner with the penetration testing team to incorporate findings into broader cyber assurance … across audit lifecycles. In-depth understanding of regulatory frameworks, with hands-on experience delivering compliance audits for both commercial and government sectors. In-depth understanding of penetration testing and vulnerability assessments and their integration into broader cyber assurance projects. Education & Certifications: Bachelor’s or master’s degree in information security, Computer Science, Engineering, or a related field. Relevant certifications More ❯
Posted:

Security Engineer with Security Clearance

West Point, Georgia, United States
TEKsystems c/o Allegis Group
The Security Engineer III participates in all aspects of information systems and network security including intrusion detection, incident response, vulnerability assessment, application security and compliance with the corporate information security policy. Primarily be responsible for implementing, operating and improving security technologies including DLP, Antivirus, IPS/IDS, End Point Protection, Database Activity Monitoring, Web Application Firewall and processes. … schedule - Implement changes to our security technologies/infrastructure in accordance with standard and change control policies/procedures - Evaluate, implement, tune and operate Security Solutions such as IPS, Vulnerability scanning tools, encryption capabilities, etc. - Monitor and recommend improvements of security technologies and their various reports - Risk Management/Security Audit/Assessment Support/Ad-hoc support … Support security audit/assessment related activities and compliance reviews# - Performs other task, duties and projects as assigned - Provide Ad-hoc support as required. Job Requirements - Bachelor's Degree in Computer Science, Information Systems or related field, or equivalent experience - 7 years of IT relevant experience or equivalent combination of experience plus at least 3 years of experience performing More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Systems Engineer with Security Clearance

San Diego, California, United States
Titania Solutions Group
incur minimal travel. Your essential job functions will include but may not be limited to: • Perform system security technical decomposition, analysis, and impact assessments with the focus on the vulnerability assessment of ground- and space-based cyber physical, logical and embedded systems operating in a variety of domains and mission contexts. • Apply cybersecurity analytical methods, processes, and frameworks … such as RMF, to support the development, assessment, and authorization of secure technical solutions. • Develop and review system documentation for cybersecurity measures to support program management and Defense acquisition life cycle milestone requirements. • Conduct operational and system data flow analysis and documentation for vulnerability assessments. • Complete verification, validation analysis and documentation of system interfaces or sub-components of … to include assisting with requirement development, project execution, and reporting. Qualifications • Minimum 5+ years relevant work experience (cyber offense/defense, hardware/software reverse engineering, technical cyber risk assessment). • Cybersecurity experience to include: o Assessing and testing NIST SP 800-53 security controls. o Experience working with space, aeronautical and aerospace systems, maritime systems, and/or More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Director, Digital Risks Cyber Assurance

London, England, United Kingdom
Hybrid / WFH Options
Control Risks
collaborate closely with our cyber threat intelligence, advisory, and response teams to expand our digital risk business. Your responsibility will include representing our global penetration testing team, overseeing the assessment of cybersecurity programs, ensuring alignment with industry standards and regulatory requirements, and guiding clients through complex third-party audits. Key Responsibilities Cybersecurity Program Evaluation Lead cyber assurance engagements, assessing … industry standards such as NIST, ISO 27001, and other relevant frameworks. Act as a trusted advisor, ensuring client cybersecurity postures are resilient, compliant, and in line with regulatory requirements. Vulnerability Assessment and Penetration Testing Management Represent our vulnerability assessment and penetration testing team Partner with the penetration testing team to incorporate findings into broader cyber assurance … across audit lifecycles. In-depth understanding of regulatory frameworks, with hands-on experience delivering compliance audits for both commercial and government sectors. In-depth understanding of penetration testing and vulnerability assessments and their integration into broader cyber assurance projects. Education & Certifications: Bachelor's or master's degree in information security, Computer Science, Engineering, or a related field. Relevant certifications More ❯
Posted:

Director, Digital Risks Cyber Assurance (London)

South Kensington, England, United Kingdom
Hybrid / WFH Options
Control Risks
collaborate closely with our cyber threat intelligence, advisory, and response teams to expand our digital risk business. Your responsibility will include representing our global penetration testing team, overseeing the assessment of cybersecurity programs, ensuring alignment with industry standards and regulatory requirements, and guiding clients through complex third-party audits. In order to make an application, simply read through the … industry standards such as NIST, ISO 27001, and other relevant frameworks. Act as a trusted advisor, ensuring client cybersecurity postures are resilient, compliant, and in line with regulatory requirements. Vulnerability Assessment and Penetration Testing Management Represent our vulnerability assessment and penetration testing team Partner with the penetration testing team to incorporate findings into broader cyber assurance … across audit lifecycles. In-depth understanding of regulatory frameworks, with hands-on experience delivering compliance audits for both commercial and government sectors. In-depth understanding of penetration testing and vulnerability assessments and their integration into broader cyber assurance projects. Education & Certifications: Bachelor's or master's degree in information security, Computer Science, Engineering, or a related field. Relevant certifications More ❯
Posted:

ACAS Operator with Security Clearance

Montgomery, Alabama, United States
TEKsystems c/o Allegis Group
Squadron (26NOS) is searching for qualified candidates for a position of Junior or Mid-Level ACAS Systems Operator I or II (depends upon experience). Seeking an individual for vulnerability assessment analysis and administration role with cybersecurity oriented principles to protect and defend information systems and networks. If you are seeking a challenging place to work, please review … the qualifications, a candidate may still be considered depending on your level of experience. Duties & Responsibilities: • Operates the security and compliance baseline configuration, inventory, and best practices for the vulnerability management solution (VMS) deployed across multiple unclassified and classified network locations supporting the implementation for Tenable products within Assured Compliance Assessment Solution (ACAS) including .SC (SecurityCenter ) and Nessus … Internet Protocol (IP) Router Network (NIPRNet, SIPRNet) environment for all ACAS implementations • Responsible for acquiring, configuring and ensuring external deliverables: DISA/Continuous Monitoring and Risk Scoring (CMRS), importing vulnerability and security audit plug-ins, DoD Patch Repository Defense Asset Distribution System (DADS), build/maintain vulnerability and audit repositories • Assist mapping scan zones, scanners, subnets to include More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Network Security Engineer Devi Technologies

United Kingdom
Devitechs
identifying potential vulnerabilities, and mitigating security risks ️ Configuring and maintaining firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and other security devices ️ Conducting regular security audits and vulnerability assessments on network infrastructure ️ Collaborating with IT and security teams to develop and enforce security policies and procedures ️ Responding to and investigating network security incidents, including identifying root causes … tools (e.g., Wireshark, SolarWinds, Nagios) and security incident management tools ️ Proficiency in network administration (e.g., TCP/IP, routing, switching, VLANs, DNS, DHCP) ️ Understanding of security best practices, risk assessment, and threat mitigation techniques ️ Relevant certifications such as CISSP, CISM, CCNP Security, or CompTIA Security+ ️ Strong analytical, troubleshooting, and problem-solving skills ️ Ability to work independently and as part More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Network Security Engineer Devi Technologies

London, England, United Kingdom
Devitechs
identifying potential vulnerabilities, and mitigating security risks ️ Configuring and maintaining firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and other security devices ️ Conducting regular security audits and vulnerability assessments on network infrastructure ️ Collaborating with IT and security teams to develop and enforce security policies and procedures ️ Responding to and investigating network security incidents, including identifying root causes … tools (e.g., Wireshark, SolarWinds, Nagios) and security incident management tools ️ Proficiency in network administration (e.g., TCP/IP, routing, switching, VLANs, DNS, DHCP) ️ Understanding of security best practices, risk assessment, and threat mitigation techniques ️ Relevant certifications such as CISSP, CISM, CCNP Security, or CompTIA Security+ ️ Strong analytical, troubleshooting, and problem-solving skills ️ Ability to work independently and as part More ❯
Posted:

Cyber Security Analyst

England, United Kingdom
Hybrid / WFH Options
Fruition Group
Requirements: Technically adept with proven experience as a security analyst or engineer. Proficiency with security tools, including SIEM, PAM, IDS/IPS, antivirus, and MS Sentinel. Strong knowledge of vulnerability assessment tools such as Tenable. Excellent analytical skills for identifying and addressing security threats. Ability to remain calm and effective under pressure, with strong problem-solving capabilities. Relevant More ❯
Posted:

Director of IT & Security

London, England, United Kingdom
Sporty Group
red-teaming, and bug bounty programs. Build relationships with the ethical hacking community and create internal safe hacking environments to continuously test and improve our systems. Oversee threat modeling, vulnerability assessments, and incident response frameworks. Hands-on expertise in probing for security vulnerabilities in medium to large-scale organizations. Technology Governance & Risk Develop and maintain a unified and flexible … control framework, working to integrate the requirements of global laws, standards, and regulations. Lead risk assessment efforts and ensure a balance between protection and productivity. Partner with Legal, HR, Product, and Engineering teams to align technology risk with business initiatives. Innovation & Operational Excellence Drive continuous improvement in IT infrastructure and cloud security through emerging technologies and automation. Evaluate and More ❯
Posted:

Network Security Engineer

London, United Kingdom
TestYantra Software Solutions
technical expertise in identifying, prioritizing, and remediating network vulnerabilities, including zero-day threats , across hybrid environments. The ideal candidate will have a strong security mindset , hands-on experience with vulnerability management tools , and the ability to harden infrastructure using best practices and industry standards. Key Responsibilities: Analyze and act upon vulnerability assessments from tools such as Tenable, Qualys … architectures , including: AWS VPCs, Security Groups Azure NSGs GCP Firewall Rules Support security incident response by investigating and remediating network-level threats and anomalies. Collaborate with penetration testing and vulnerability scanning teams to validate vulnerabilities and verify implemented remediations. Work with GRC and compliance teams to align network configurations with regulatory frameworks like PCI-DSS, ISO 27001 , etc. Preferred More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Cloud Engineer

London, England, United Kingdom
Vista
teams to ensure our applications and infrastructure are secure, scalable, and resilient. Your Responsibilities Implement and manage security tools and practices in CI/CD pipelines. Automate security testing, vulnerability assessments, and compliance checks. Work closely with development teams to ensure secure coding practices. Develop and maintain infrastructure as code (IaC) scripts with security best practices. Monitor and respond … security in CI/CD pipelines. Hands-on experience with security automation tools and practices. Experience with cloud security best practices across AWS and Azure. Experience conducting security audits, vulnerability assessments, and incident response. Additional Details Seniority level: Associate Employment type: Full-time Job function: Engineering and Information Technology Industry: Airlines and Aviation Referrals increase your chances of interviewing More ❯
Posted:

Information Security Specialist

London, England, United Kingdom
Crédit Agricole CIB
and following up on security vulnerabilities in IT systems. Help maintain accurate IT asset inventory across various security platforms (e.g., CMDB, AV, SIEM). Participate in regular security reviews, vulnerability assessments, and help ensure compliance with established security standards. Monitor user access and permissions, identifying and reporting potential unauthorized access. Implement and maintain Active Directory and File Share security … and following up on security vulnerabilities in IT systems. Help maintain accurate IT asset inventory across various security platforms (e.g., CMDB, AV, SIEM). Participate in regular security reviews, vulnerability assessments, and help ensure compliance with established security standards. Monitor user access and permissions, identifying and reporting potential unauthorized access. Implement and maintain Active Directory and File Share security More ❯
Posted:

Security Operations Center Analyst

Peterborough, England, United Kingdom
Hybrid / WFH Options
ZipRecruiter
certification support. Responsibilities: Monitor, analyse, and respond to security events and incidents within the SOC, ensuring timely detection and resolution in line with SLAs. Conduct thorough threat analysis and vulnerability assessments to identify potential security risks and implement mitigation strategies. Develop and refine incident response plans and playbooks to enhance SOC effectiveness. Perform root cause analysis (RCA) for high … years’ experience with leadership or advanced incident response experience. Strong understanding of network security, firewalls, VPNs, IDS/IPS, and endpoint security. Proficiency in incident response, threat analysis, and vulnerability management. Experience with security monitoring, root cause analysis, and risk assessments. Excellent analytical and problem-solving skills with attention to detail. Strong communication skills, including report writing and client More ❯
Posted:

Sr. DevSecOps Engineer IV with Security Clearance

College Park, Maryland, United States
Golden Tech Systems Inc
Partner with development, operations, and security teams to integrate security protocols seamlessly into the software development lifecycle. Design, build, and maintain CI/CD pipelines incorporating automated security testing, vulnerability assessments, and compliance checks. Develop and manage infrastructure as code (IaC) configurations, ensuring secure and scalable cloud resources and infrastructure. Conduct security assessments, code reviews, and penetration testing to … Terraform, CloudFormation, or Ansible. Strong scripting skills in languages such as Python and Bash for automation and integration. Proficiency with static code analysis, dynamic application security testing (DAST), and vulnerability scanning tools like Fortify and Acunetix. Knowledge: In-depth understanding of security frameworks (e.g., OWASP, NIST) and best practices for mitigating vulnerabilities. Familiarity with common threat vectors and experience More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Security Architect

Brussel, Belgium
Brainbridge IT Staffing
Identifying, assessing, and mitigating security risks through risk analysis and management frameworks. Security Architecture Design : Creating and maintaining security architecture frameworks and models, such as SABSA, TOGAF, and NIST. Vulnerability Management : Conducting vulnerability assessments, penetration testing, and managing remediation efforts. Cloud Security : Implementing security measures for cloud environments, including AWS, Azure, and Google Cloud Platform. Non-technical requirements More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Information Security Manager

City of London, London, United Kingdom
ME+EM Ltd
and track mitigation progress. Compliance & Audit Ensure compliance with relevant security frameworks, data protection laws (e.g. GDPR), and industry standards. Manage internal and external security audits, penetration tests, and vulnerability assessments. Maintain records of security incidents and lead post-incident reviews and continuous improvements. Training & Awareness Drive an organisation-wide security awareness program to foster a proactive security culture. … or e-commerce environments. Familiarity with cloud security, especially across SaaS platforms and modern infrastructure (e.g., GCP, Azure). Experience with security tools like SIEM, DLP, endpoint protection, and vulnerability scanners. Benefits: 33 days annual leave for full time employees (25 days holiday + 8 bank holidays). A day off to celebrate your birthday. Pension Scheme. Group Life More ❯
Posted:

Information Security Manager

London Area, United Kingdom
ME+EM Ltd
and track mitigation progress. Compliance & Audit Ensure compliance with relevant security frameworks, data protection laws (e.g. GDPR), and industry standards. Manage internal and external security audits, penetration tests, and vulnerability assessments. Maintain records of security incidents and lead post-incident reviews and continuous improvements. Training & Awareness Drive an organisation-wide security awareness program to foster a proactive security culture. … or e-commerce environments. Familiarity with cloud security, especially across SaaS platforms and modern infrastructure (e.g., GCP, Azure). Experience with security tools like SIEM, DLP, endpoint protection, and vulnerability scanners. Benefits: 33 days annual leave for full time employees (25 days holiday + 8 bank holidays). A day off to celebrate your birthday. Pension Scheme. Group Life More ❯
Posted:

Information Security Manager

London, England, United Kingdom
ME+EM Ltd
and track mitigation progress. Compliance & Audit Ensure compliance with relevant security frameworks, data protection laws (e.g. GDPR), and industry standards. Manage internal and external security audits, penetration tests, and vulnerability assessments. Maintain records of security incidents and lead post-incident reviews and continuous improvements. Drive an organisation-wide security awareness program to foster a proactive security culture. Deliver targeted … or e-commerce environments. Familiarity with cloud security, especially across SaaS platforms and modern infrastructure (e.g., GCP, Azure). Experience with security tools like SIEM, DLP, endpoint protection, and vulnerability scanners. 33 days annual leave for full time employees (25 days holiday + 8 bank holidays). A day off to celebrate your birthday. Pension Scheme. Group Life Insurance. More ❯
Posted:

Lead Network Security engineer

Warrington, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
details will be provided later. Job Responsibilities: Design and implement end-to-end network infrastructure automation aligned with business and IT strategic goals. Conduct security assessments, penetration testing, and vulnerability assessments to identify and mitigate risks. Design secure network architectures, including firewalls, IDS/IPS, and encryption technologies. Ensure compliance with enterprise governance, review processes, ITSM, and CMDB standards. More ❯
Posted:

Product Security Engineer

Gloucestershire, United Kingdom
Hybrid / WFH Options
SSR General & Management
/37/53, JSP 440, 604, and Defence Standards. Develop and maintain security documentation (e.g., RMADS, Security Assurance Documents, Security Management Plans). Conduct penetration testing, vulnerability assessments, and remediation activities. Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53) . Experience with More ❯
Employment Type: Permanent
Salary: GBP 60,000 Annual
Posted:

Product Security Engineer

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
Pertemps
/37/53, JSP 440, 604, and Defence Standards. Develop and maintain security documentation (e.g., RMADS, Security Assurance Documents, Security Management Plans). Conduct penetration testing, vulnerability assessments, and remediation activities. The Person Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53). More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Lead Network Security engineer

Macclesfield, England, United Kingdom
Hybrid / WFH Options
ZipRecruiter
end to end network infrastructure automation capabilities that are aligned to the strategic goals of the business and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusion detection/prevention systems, and encryption technologies. Adhere to enterprise governance & review More ❯
Posted:

Information Systems Security Officer (ISSO) with Security Clearance

Eglin Afb, Florida, United States
OSAAVA Services
including System Security Plans (SSPs), Plan of Action & Milestones (POA&Ms), and risk assessments. Support system accreditation and continuous monitoring activities under the Risk Management Framework (RMF). Conduct vulnerability assessments, track remediation efforts, and verify that security requirements are effectively implemented. Monitor system compliance with DoD, NIST, and organizational security policies. Participate in security audits, inspections, and assessments. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Vulnerability Assessment
10th Percentile
£41,750
25th Percentile
£47,531
Median
£57,500
75th Percentile
£77,500
90th Percentile
£89,875