Vulnerability Assessment Job Vacancies

126 to 150 of 670 Vulnerability Assessment Jobs

Product Security Engineer

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
Pertemps
/37/53, JSP 440, 604, and Defence Standards. Develop and maintain security documentation (e.g., RMADS, Security Assurance Documents, Security Management Plans). Conduct penetration testing, vulnerability assessments, and remediation activities. The Person Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53). More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Lead Network Security engineer

Macclesfield, England, United Kingdom
Hybrid / WFH Options
ZipRecruiter
end to end network infrastructure automation capabilities that are aligned to the strategic goals of the business and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusion detection/prevention systems, and encryption technologies. Adhere to enterprise governance & review More ❯
Posted:

Information Systems Security Officer (ISSO) with Security Clearance

Eglin Afb, Florida, United States
OSAAVA Services
including System Security Plans (SSPs), Plan of Action & Milestones (POA&Ms), and risk assessments. Support system accreditation and continuous monitoring activities under the Risk Management Framework (RMF). Conduct vulnerability assessments, track remediation efforts, and verify that security requirements are effectively implemented. Monitor system compliance with DoD, NIST, and organizational security policies. Participate in security audits, inspections, and assessments. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SOC Analyst with Security Clearance

West Mifflin, Pennsylvania, United States
Mayhew Technology Solutions
engineering to strengthen security posture. • Utilize threat intelligence feeds to contextualize events and support proactive defense strategies. • Assist in developing and refining incident response procedures and SOC playbooks. • Support vulnerability assessments and remediation tracking. • Maintain compliance with government standards and security policies (e.g., NIST 800-53, FISMA, DFARS/CMMC). • Participate in security audits, reporting, and continuous monitoring More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Entry-Level Cybersecurity Analyst

City of London, London, England, United Kingdom
Hybrid / WFH Options
How to Job Ltd
knowledge of cybersecurity who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and More ❯
Employment Type: Full-Time
Salary: £35,000 - £42,000 per annum, Negotiable
Posted:

Information Security Specialist | London, UK

London, England, United Kingdom
Crédit Agricole CIB
and following up on security vulnerabilities in IT systems. Help maintain accurate IT asset inventory across various security platforms (e.g., CMDB, AV, SIEM). Participate in regular security reviews, vulnerability assessments, and help ensure compliance with established security standards. Monitor user access and permissions, identifying and reporting potential unauthorized access. Implement and maintain Active Directory and File Share security More ❯
Posted:

IT Security Analyst

Derby, England, United Kingdom
Hybrid / WFH Options
Cooper Parry
to develop, refine, and optimize detection rules and custom alerts, ensuring alerting mechanisms are aligned with evolving threat landscapes while reducing false positives and enhancing actionable insights Conduct regular vulnerability assessments, interpret scan results, and coordinate remediation efforts Investigate suspicious files and behaviors for malware; collaborate with vendors/internal teams to mitigate and prevent future infections Respond swiftly More ❯
Posted:

Cybersecurity Software Evaluator with Security Clearance

Colorado Springs, Colorado, United States
Hybrid / WFH Options
OSAAVA Services
compliance with DoD cybersecurity frameworks, including NIST 800-53, RMF, and STIGs. • Work closely with developers, security engineers, and system administrators to implement security recommendations. • Perform penetration testing and vulnerability assessments on government software systems. • Document findings, create security reports, and provide actionable recommendations for remediation. • Assist with the development of secure coding practices and software security guidelines. • Evaluate … of experience in cybersecurity, penetration testing, or software security evaluation. • Certifications such as CISSP, CEH, OSCP, or GIAC GWEB are highly preferred. • Experience with secure coding practices and software vulnerability assessment tools (e.g., Nessus, Burp Suite, Fortify, SonarQube). • Familiarity with secure software development lifecycle (SSDLC) methodologies. • Strong knowledge of encryption protocols, authentication mechanisms, and network security. • Ability … teams to enhance software security postures. Preferred Qualifications: • Experience conducting cybersecurity assessments in DoD or government environments. • Understanding of container security and DevSecOps principles. • Familiarity with threat modeling, risk assessment frameworks, and security controls testing. • Knowledge of cloud security best practices (AWS, Azure, GovCloud). Work Environment & Requirements: • Location: Colorado Springs, CO - On-site presence required. • Potential hybrid/ More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Operations Security Engineer with Security Clearance

Maryland, United States
Country Intelligence Group
using DISA Security Technical Implementation Guides (STIGs), and manage remediation plans in collaboration with technical teams and stakeholders. The Operations Security Engineer will be responsible for system hardening, conducting vulnerability assessments using ACAS and SCAP tools, and deploying updates to meet STIG compliance. This role also requires experience in scripting with PowerShell, writing POA&Ms, and evaluating STIG checklists. … or USAF Authority to Operate (ATO). • Implement operating system and network device security configuration in accordance with Defense Information Systems Agency (DISA) approved Security Technical Implementation Guides. • Perform vulnerability assessments using Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG), the Security Content Automation Protocol (SCAP) Compliance Checker, incorporating automated Benchmarks. … IIS, SQL. • Experience implementing operating systems and network devices security configuration in accordance with Defense Information Systems Agency (DISA) approved Security Technical Implementation Guides. • Experience with performing vulnerability assessments using Assured Compliance Assessment Solution (ACAS). • Demonstrated ability to correct flaws and implement technical controls in the hardware or software installed within a network environment. • Ability to maintain More ❯
Employment Type: Permanent
Salary: USD 155,000 Annual
Posted:

Information Systems Security Officer (ISSO) with Security Clearance

Herndon, Virginia, United States
RSCY Consultants, LLC
Risk Management Framework (RMF) policies, and the development of System Security Plans (SSPs). Strengthen Our Defense: Perform Security Technical Implementation Guide (STIG) reviews, self-assessments, and participate in Assessment & Authorization (A&A) testing to ensure our systems stay secure and compliant. Stay Ahead of Threats: Analyze system audit logs for unusual activity, conduct vulnerability assessments, and implement … process, and recommend security solutions to address any identified gaps. Collaborate with Experts: Partner with government customers to support Continuous Monitoring (ConMon) activities, manage security incidents, and ensure timely vulnerability remediation. Maintain Security Documentation: Ensure all system documentation is up to date in government record-keeping systems like Xacta. Oversee Configuration Management: Manage changes to security-relevant software, hardware … for Federal or DoD information security initiatives. Knowledge of NIST guidelines (SP 800-37, 800-53, 800-53A) and proven experience in Security Control Assessment. Hands-on risk assessment experience that incorporates system/mission requirements and operational constraints. Splunk experience to enhance your threat detection capabilities. Understanding of FISCAM compliance, with familiarity in managing risk for federal More ❯
Employment Type: Permanent
Salary: USD 180,000 Annual
Posted:

Junior Cyber Security Consultant (UK) - Dionach by Nomios

London, England, United Kingdom
Hybrid / WFH Options
Nomios Netherlands
ll work to meet your needs. Job requirements What You'll Do Deliver cyber security assurance services to identify vulnerabilities in different areas on a variety of technologies, including vulnerability assessments on external networks, internal networks, applications, and enterprise security systems. Delivering presentations to technical and non-technical stakeholders. Main role will be as a Junior Cyber Security Consultant … needed. What We're Looking For Qualifications: Relevant degree or one full year’s minimum experience in penetration testing or cyber security assurance. Experience: Some experience of cyber security assessment, vulnerability assessments, or penetration testing. Certifications: such as CPSA or CEH would be advantageous. Tools: Experience of penetration testing tools, Linux, Windows, and Active Directory. Communication: Strong verbal … oriented approach. Excellent verbal and written communication skills. Ability to work effectively under pressure. Commitment to maintaining the highest ethical and professional standards. Are you experienced in cyber security assessment, vulnerability assessments, or penetration testing and looking to further improve your skills and take on more responsibilities? If so, this opportunity is perfect for you! Seniority level Seniority More ❯
Posted:

Head of Cyber Security Operations

Leeds, England, United Kingdom
QA Ltd
enhance the security of IT systems both on-prem and cloud. Creation of reports, dashboards, metrics for SOC operations and presentation to senior management. Oversight, planning and execution of vulnerability assessments, penetration tests, audits or related security assessment exercises (eg Red Team) to improve the security posture of the infrastructure, applications and services. Manage the remediation of identified … networks and operating systems including firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, networks and cloud services Comprehensive knowledge or experience of information security principles, including risk assessment, intrusion detection, Security Incident and Event Management (SIEM) tools, threat and vulnerability management Detailed knowledge or experience of application or network based penetration testing tools and methodologies Experience More ❯
Posted:

Head of Cyber Security Operations

London, England, United Kingdom
QA Ltd
enhance the security of IT systems both on-prem and cloud. Creation of reports, dashboards, metrics for SOC operations and presentation to senior management. Oversight, planning and execution of vulnerability assessments, penetration tests, audits or related security assessment exercises (eg Red Team) to improve the security posture of the infrastructure, applications and services. Manage the remediation of identified … networks and operating systems including firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, networks and cloud services Comprehensive knowledge or experience of information security principles, including risk assessment, intrusion detection, Security Incident and Event Management (SIEM) tools, threat and vulnerability management Detailed knowledge or experience of application or network based penetration testing tools and methodologies Experience More ❯
Posted:

Sr. Application Security Engineer/Director - Generative AI (Remote)

London, England, United Kingdom
Hybrid / WFH Options
AltFi Ltd
the business along with customer or market requirements Perform threat modeling, secure code reviews, and secure design reviews for high-risk applications, evaluate new technology stacks and frameworks Perform vulnerability research, serve as technical security/risk advisor for new technology/applications developed by S&P Ratings Determine testing requirements and develop strategies to automate security testing using … a variety of scripting and open source tools Assist developers in remediating vulnerability findings by providing line-by-line guidance Coach development teams on security disciplines like Threat modeling, Security code reviews, provide training and education to developers on software security best practices Maintain knowledge of current and emerging technologies/products/trends related to security architectural solutions … modeling, design reviews, risk analysis and control design Experience architecting and leading security for Cloud native applications In depth knowledge of network security, authentication and authorization Advanced understanding of vulnerability exploitation chaining, and vulnerability remediation Demonstrated expertise in product/application security architecture – Service oriented architecture (SOA), Network security, application security, web services, Angular, JavaScript Security audit, Vulnerability More ❯
Posted:

Cyber Security Consulting Engineer – Transmission & Distribution Systems

Stafford, England, United Kingdom
Hybrid / WFH Options
GE Vernova
trends, ICS/OT threat landscapes, and emerging technologies, recommending tools and methods to enhance product security posture. Partner with PSL, incident response and product security teams to support vulnerability remediation, post-incident analysis, and contribute to the creation of security documentation, including architecture specs, procedures, and training materials. Represent the company in industry forums, standards bodies, and technical … C++, RTOS), as well as Linux/Windows platforms. Strong hands-on background in PKI, identity management, network security appliances, and security monitoring. Proficient in threat modeling, risk/vulnerability assessment, and using forensic/security analysis tools.. Excellent communication and stakeholder engagement skills, able to translate technical content for non-technical audiences. Exposure to quality improvement methodologies … vision, and prescription drug coverage; access to a Health Coach, a 24/7 nurse-based resource; and access to the Employee Assistance Program, providing 24/7 confidential assessment, counseling and referral services. Retirement benefits include the GE Retirement Savings Plan, a tax-advantaged 401(k) savings opportunity with company matching contributions and company retirement contributions, as well More ❯
Posted:

Senior Technical Engineer - 40 hours per week - hybrid contract

Birmingham, Staffordshire, United Kingdom
Hybrid / WFH Options
CET Structures Limited
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Desirable Skills Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Technical Engineer - 40 hours per week - hybrid contract

Birmingham, England, United Kingdom
Hybrid / WFH Options
CET Structures Limited
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Desirable Skills Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL More ❯
Posted:

Information Security Analyst - Banking/Financial Services

London, England, United Kingdom
Robert Walters
ISO27001, NIST or SOC2. Preferably with a recognised certification in a governance and management-oriented discipline of Information Security (CISSP, CISM or similar). Other qualifications related to governance assessment and reporting (such as CISA). 2+ years experience in Information Security, conducting information security reviews and guiding business and technical management in prioritising security improvement for technical and … Security measures. Strong documentation and reporting skills. Technical experience and knowledge of Cyber Security (up to date). (Desirable) experience working with Security Information and Event Management (SIEM) and Vulnerability Assessment. (Desirable) Knowledge of attack methodologies and system hardening principles including aspects of vulnerability scanning and detection and security testing. (Desirable) experience working with MS Sentinel (SIEM), Darktrace More ❯
Posted:

Senior Technical Engineer - 40 hours per week - hybrid contract

Walsall, England, United Kingdom
Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL servers – database More ❯
Posted:

Senior Technical Engineer - 40 hours per week - hybrid contract

Dudley, England, United Kingdom
Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL servers – database More ❯
Posted:

Senior Technical Engineer - 40 hours per week - hybrid contract

Preston, England, United Kingdom
Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL servers – database More ❯
Posted:

Senior Technical Engineer - 40 hours per week - hybrid contract

Nottingham, England, United Kingdom
Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL servers – database More ❯
Posted:

Senior Technical Engineer - 40 hours per week - hybrid contract

Leicester, England, United Kingdom
Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL servers – database More ❯
Posted:

Senior Technical Engineer - 40 hours per week - hybrid contract

Stratford-upon-Avon, England, United Kingdom
Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL servers – database More ❯
Posted:

Senior Technical Engineer - 40 hours per week - hybrid contract

Coventry, England, United Kingdom
Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL servers – database More ❯
Posted:
Vulnerability Assessment
10th Percentile
£41,750
25th Percentile
£47,531
Median
£57,500
75th Percentile
£77,500
90th Percentile
£89,875