'Vulnerability Assessment' Job Vacancies

101 to 125 of 155 Vulnerability Assessment Jobs

Cyber Security Specialist

Abingdon, Oxfordshire, South East, United Kingdom
Rullion Limited
cyber risk governance, and assurance frameworks. This is a cross-functional role with both advisory and hands-on responsibilities, focusing on security assurance, risk management and supporting architecture reviews, vulnerability management, risk assessments, cyber defence posture, driving technical assurance, and embedding risk-aligned security controls across IT and OT systems and secure-by-design practices. You will work across … SSCP, CISM, CRISC, CCSP, SABSA, or SANS GIAC (GSEC, GCCC, GCPM). o Demonstrable experience in designing and implementing secure infrastructure or cloud architectures. o Proven experience with risk assessment methodologies and maintaining enterprise risk registers. o Working knowledge of risk assessment methodologies (e.g. ISO 31000, FAIR, OWASP risk rating). o Strong understanding of Gov Assure, CAF … Azure AD), Microsoft 365 E5, Azure IaaS/PaaS, Windows/Linux/Unix. o Strong knowledge of security tooling such as SIEM, endpoint detection (EDR/XDR), and vulnerability management platforms. o Hands-on experience with policy development, access control models (RBAC, ABAC), and logging standards. o Experience supporting assurance activities or government-mandated reviews (e.g. GovAssure, Secure More ❯
Employment Type: Contract
Posted:

Senior Application Security Engineer

Minneapolis, Minnesota, United States
Target
supply chain risks, and SCA techniques Familiarity with SAST/DAST tools and ability to translate results into actionable fixes Practical experience in security code reviews, threat modeling, or vulnerability assessment Demonstrated ability to embed security into developer workflows and improve the developer experience Passion for staying current with security trends, tools, and developer-centric security models Preferred More ❯
Employment Type: Permanent
Salary: USD 82 Hourly
Posted:

Head of IT Security Incident and Threat Management

Chelmsley Wood, Warwickshire, United Kingdom
SSR General & Management
strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security practices. Manage the relationship with the external SOC, ensuring proactive threat detection and response. Stay updated on industry More ❯
Employment Type: Permanent
Salary: GBP 90,000 - 110,000 Annual
Posted:

Head of IT Security Incident and Threat Management

Birmingham, Chelmsley Wood, West Midlands (County), United Kingdom
SSR General & Management
strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security practices. Manage the relationship with the external SOC, ensuring proactive threat detection and response. Stay updated on industry More ❯
Employment Type: Permanent
Salary: £90000 - £110000/annum
Posted:

Security Analyst (Network & Support)

City of London, London, United Kingdom
Hybrid / WFH Options
Adecco
against cyber threats. Accountabilities and Responsibilities Security Operations Support Serve as a reference point for network security across IT teams, providing guidance and specialised expertise on security measures. Conduct vulnerability assessments, security audits, and continuous monitoring of network traffic for anomalies using advanced security tools. Collaborate with IT teams to ensure security measures are integrated into network architecture and More ❯
Employment Type: Contract
Rate: £450 - £500/day
Posted:

Security Analyst Network & Support

London, South East, England, United Kingdom
Hybrid / WFH Options
Adecco
against cyber threats. Accountabilities and Responsibilities Security Operations Support Serve as a reference point for network security across IT teams, providing guidance and specialised expertise on security measures. Conduct vulnerability assessments, security audits, and continuous monitoring of network traffic for anomalies using advanced security tools. Collaborate with IT teams to ensure security measures are integrated into network architecture and More ❯
Employment Type: Contractor
Rate: £450 - £500 per day
Posted:

GRC Manager

Woking, Surrey, England, United Kingdom
Hybrid / WFH Options
Nomad Foods
and standards that support risk mitigation and compliance efforts in line with industry standards. Play an active, hands-on role in security initiatives and GRC activities, including incident management, vulnerability assessments, and compliance reviews. Provide reporting to leadership committees and the Board. About you: We need someone who can communicate at all levels and with the ability to summarise More ❯
Employment Type: Full-Time
Salary: Salary negotiable
Posted:

Info Systems Security - Sr.

Dallas, Texas, United States
Parkland Health and Hospital System
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
Employment Type: Permanent
Salary: USD Hourly
Posted:

Info Systems Security - Sr.

Arlington, Texas, United States
Parkland Health and Hospital System
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
Employment Type: Permanent
Salary: USD Hourly
Posted:

Info Systems Security - Sr.

Plano, Texas, United States
Parkland Health and Hospital System
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
Employment Type: Permanent
Salary: USD Hourly
Posted:

Info Systems Security - Sr.

Irving, Texas, United States
Parkland Health and Hospital System
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
Employment Type: Permanent
Salary: USD Hourly
Posted:

Info Systems Security - Sr.

Grand Prairie, Texas, United States
Parkland Health and Hospital System
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
Employment Type: Permanent
Salary: USD Hourly
Posted:

Info Systems Security - Sr.

Fort Worth, Texas, United States
Parkland Health and Hospital System
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
Employment Type: Permanent
Salary: USD Hourly
Posted:

Infrastructure Engineering Lead

New Malden, England, United Kingdom
Northrop Grumman UK
maintain virtualised environments (e.g., VMware, Hyper-V) to facilitate scalable and secure development processes. This includes configuring virtual machines, monitoring system health, and automating deployment workflows for seamless operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate … advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits, and patch management for both IT and OT systems. Collaborate with cybersecurity and product teams to address vulnerabilities, apply security patches … security settings. Virtualisation: Expertise in virtualisation technologies such as VMware and Hyper-V, with a demonstrated ability to set up, maintain, and optimise virtual environments for industrial applications. Cybersecurity & Vulnerability Management: Strong understanding of cybersecurity practices and vulnerability management for both IT and OT systems. Experience implementing vulnerability assessments reports, securing systems, and applying necessary patches or More ❯
Posted:

Infrastructure Engineering Lead

london, south east england, united kingdom
Northrop Grumman UK
maintain virtualised environments (e.g., VMware, Hyper-V) to facilitate scalable and secure development processes. This includes configuring virtual machines, monitoring system health, and automating deployment workflows for seamless operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate … advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits, and patch management for both IT and OT systems. Collaborate with cybersecurity and product teams to address vulnerabilities, apply security patches … security settings. Virtualisation: Expertise in virtualisation technologies such as VMware and Hyper-V, with a demonstrated ability to set up, maintain, and optimise virtual environments for industrial applications. Cybersecurity & Vulnerability Management: Strong understanding of cybersecurity practices and vulnerability management for both IT and OT systems. Experience implementing vulnerability assessments reports, securing systems, and applying necessary patches or More ❯
Posted:

Infrastructure Engineering Lead

london (new malden), south east england, united kingdom
Northrop Grumman UK
maintain virtualised environments (e.g., VMware, Hyper-V) to facilitate scalable and secure development processes. This includes configuring virtual machines, monitoring system health, and automating deployment workflows for seamless operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate … advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits, and patch management for both IT and OT systems. Collaborate with cybersecurity and product teams to address vulnerabilities, apply security patches … security settings. Virtualisation: Expertise in virtualisation technologies such as VMware and Hyper-V, with a demonstrated ability to set up, maintain, and optimise virtual environments for industrial applications. Cybersecurity & Vulnerability Management: Strong understanding of cybersecurity practices and vulnerability management for both IT and OT systems. Experience implementing vulnerability assessments reports, securing systems, and applying necessary patches or More ❯
Posted:

Cyber Security & Centralised Services Manager

London, South East, England, United Kingdom
Hybrid / WFH Options
MFK Recruitment
and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerability management, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement long More ❯
Employment Type: Full-Time
Salary: £55,000 - £65,000 per annum
Posted:

IT SECURITY SPECIALIST - SECURITY, CYBER, AZURE

Manchester, United Kingdom
Hybrid / WFH Options
Adecco
system logs and network traffic to identify suspicious activity and potential threats. *Respond to security incidents and support forensic investigations. *Develop and maintain security protocols, policies, and procedures. *Conduct vulnerability assessments and recommend mitigation strategies. *Deliver cybersecurity awareness training and guidance to staff. *Maintain the information security risk register and support audit processes. *Collaborate with IT and operational teams … We are proud to be an equal opportunities employer. Keywords IT Security Specialist, Cybersecurity Analyst, SOC Analyst, Azure Security, Information Security, Firewalls, Intrusion Detection, Antivirus, ITIL, CISSP, Security Compliance, Vulnerability Management, Risk Register, Public Sector IT, Hybrid Role, Manchester Jobs, Security Awareness Training More ❯
Employment Type: Permanent
Salary: £35000 - £45000/annum Benefits
Posted:

Nozomi OT Security SME

Coventry, England, United Kingdom
KBC Technologies Group
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Posted:

Nozomi OT Security SME

binley, midlands, united kingdom
KBC Technologies Group
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Posted:

Nozomi OT Security SME

leicester, midlands, united kingdom
KBC Technologies Group
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Posted:

OT/IOT Security Consultant-claroty defender

Coventry, England, United Kingdom
HCLTech
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Posted:

OT/IOT Security Consultant-claroty defender

binley, midlands, united kingdom
HCLTech
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Posted:

OT/IOT Security Consultant-claroty defender

leicester, midlands, united kingdom
HCLTech
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Posted:

Senior Site Reliability Engineer - HFT Team

London, England, United Kingdom
Selby Jennings
pipelines for integration, development, and deployment. Implement and maintain monitoring systems. Maintain and enhance the team's cloud infrastructure. Promote and implement automation processes. Enhance security protocols by conducting vulnerability assessments and risk management to deploy cybersecurity measures. Technical Proficient in Terraform and AWS. Solid experience with CI/CD, ideally with GitLab CI and Jenkins. Extensive experience using More ❯
Posted:
Vulnerability Assessment
10th Percentile
£41,250
25th Percentile
£46,875
Median
£57,500
75th Percentile
£73,125
90th Percentile
£84,500