Vulnerability Assessment Job Vacancies

276 to 300 of 562 Vulnerability Assessment Jobs

Cyber Defence Services - Consultant

England, United Kingdom
Hybrid / WFH Options
KPMG UK
up-to-date with the latest treds, tooling, techniques to continuously improve testing approaches. What will you need to do it? Some demonstrable practical experience in penetration testing and vulnerability assessments Understanding of common vulnerabilities and how to exploit or mitigate them. Basic Knowledge of network security, application security and cloud security principles. A passion for all things hacking More ❯
Posted:

Data Platform Engineer (DBA)

London, England, United Kingdom
First Central Services
SQL Toolset/SSMS 18.xxx/Quest Spotlight | Replication Monitor and other industry standard monitoring tools. An understanding of and some exposure to SQL Server auditing/encryption/vulnerability assessments/data classification/Query Store etc. Creation and use of DACPAC and BACPACs. An appreciation of and willingness to learn SQL Azure PAAS and IAAS database solutions. More ❯
Posted:

Hosting Service - Senior System Administrator

England, United Kingdom
Hybrid / WFH Options
Idox plc
to quickly resolve issues affecting hosted environments. Security and Compliance: Implement and maintain robust security protocols for hosted solutions, including firewalls, encryption, and access controls. Conduct regular security audits, vulnerability assessments, and patch management to meet compliance standards. Ensure hosted environments adhere to industry and regulatory security requirements. Utilize System Center Configuration Manager for software deployments, updates, and compliance More ❯
Posted:

Hosting Service - Senior System Administrator

London, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
to quickly resolve issues affecting hosted environments. Security and Compliance: Implement and maintain robust security protocols for hosted solutions, including firewalls, encryption, and access controls. Conduct regular security audits, vulnerability assessments, and patch management to meet compliance standards. Ensure hosted environments adhere to industry and regulatory security requirements. Utilize System Center Configuration Manager for software deployments, updates, and compliance More ❯
Posted:

Data Platform Engineer (DBA)

London, England, United Kingdom
Hybrid / WFH Options
SERVPRO of Limestone and Lawrence Counties
SQL Toolset/SSMS 18.xxx/Quest Spotlight | Replication Monitor and other industry standard monitoring tools. An understanding of and some exposure to SQL Server auditing/encryption/vulnerability assessments/data classification/Query Store etc. Creation and use of DACPAC and BACPACs. An appreciation of and willingness to learn SQL Azure PAAS and IAAS database solutions. More ❯
Posted:

Hosting Service - Senior System Administrator

London, England, United Kingdom
Hybrid / WFH Options
Idox plc
to quickly resolve issues affecting hosted environments. Security and Compliance: Implement and maintain robust security protocols for hosted solutions, including firewalls, encryption, and access controls. Conduct regular security audits, vulnerability assessments, and patch management to meet compliance standards. Ensure hosted environments adhere to industry and regulatory security requirements. Utilize System Center Configuration Manager for software deployments, updates, and compliance More ❯
Posted:

Information System Security Engineer with Security Clearance

Philadelphia, Pennsylvania, United States
Joint Tactics and Technologies
tailor IT and CS security control baselines based on RMF guidelines and categorization of the RMF boundary • Perform Ports, Protocols, and Services Management (PPSM). • Perform IT and CS vulnerability-level risk assessments. • Execute security control testing as required by a risk assessment or annual security review (ASR). • Mitigate and remediate IT and CS system level vulnerabilities … level IT and CS policies and procedures for respective RMF boundaries and/or guidance provided by the command ISSMs • Implement and assess STIG and SRGs. • Perform and develop vulnerability assessments with automated tools such as Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP) Compliance Check (SCC) and Evaluate STIG. • Deploy security updates to Information System … components. • Perform routine audits of IT system hardware and software components. • Maintain inventory of Information System components. • Participate in IT change control and configuration management processes. • Upload vulnerability data in Vulnerability Remediation Asset Manager (VRAM). • Image or re-image assets that are part of the assigned RMF boundary • Install software and troubleshoot software issues as necessary to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Network Cyber Security Engineer III with Security Clearance

Virginia Beach, Virginia, United States
Strategic Resilience Group
only, no telework. Design, implement, configure, and enforce security controls on network, hardware, and software components and devices. Implement STIGs and manage enterprise-level deployment of Active Directory. Perform vulnerability assessments using Assured Compliance Assessment Solution tools. Configure Cisco networking devices and utilize packet analyzer tools such as Wireshark and tcpdump. Troubleshoot network connectivity issues and implement firewalls … the design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices. o Performing STIG implementation. o Utilizing and configuring Active Directory. o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool. o Configuring Cisco networking devices. o Utilizing packet analyzer tools (examples, Wireshark and tcpdump, etc.); and o Implementing and managing More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Infrastructure Engineer

Borehamwood, Hertfordshire, United Kingdom
NHS
Engineer will be responsible for developing and maintaining secure configuration baselines, enforcing patch compliance, and embedding preventative controls into day-to-day operations. You will lead the organization's vulnerability assessment process, including the use of scanning tools, interpretation of technical findings, and coordination of remediation activities. Additionally, you will provide expert input on design proposals, technical change … and maintaining secure configuration baselines (e.g. CIS Benchmarks), enforcing patch compliance, and embedding preventative controls into day-to-day operations. You have the opportunity to lead the Elysium's vulnerability assessment process - including the use of scanning tools, interpretation of technical findings, and coordination of remediation activities with relevant teams. This will ensure timely resolution of risks and … security responsibilities. Hands-on experience with server hardening, patching regimes, and baseline enforcement. Experience supporting infrastructure change or design assessments from a security perspective. Experience managing or contributing to vulnerability assessment and remediation. Experience working within regulated environments (e.g. NHS DSPT, ISO 27001, CE+). Deep understanding of infrastructure security, including system hardening, patching, and baseline configuration. Familiarity More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Security Engineer - Hedge Fund - up to £185,000 + bonus

London Area, United Kingdom
Hunter Bond
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerability assessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯
Posted:

Senior Security Engineer - Hedge Fund - up to £185,000 + bonus

City of London, London, United Kingdom
Hunter Bond
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerability assessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯
Posted:

Senior Security Engineer - Hedge Fund - up to £185,000 + bonus

London, England, United Kingdom
JR United Kingdom
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerability assessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯
Posted:

Senior Security Engineer - Hedge Fund - up to £185,000 + bonus

Slough, England, United Kingdom
JR United Kingdom
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerability assessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯
Posted:

Senior Security Engineer - Hedge Fund - up to £185,000 + bonus

City of London, England, United Kingdom
JR United Kingdom
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerability assessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯
Posted:

Penetration Tester

United Kingdom
Darkshield Technologies Ltd
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Analyst

London, England, United Kingdom
Webcodio
and server infrastructure. This role demands expertise in cybersecurity protocols, threat detection, and proactive security measures, ensuring the safety and integrity of our clients’ digital assets. Key Responsibilities: Conduct vulnerability assessments and security audits, identifying and addressing potential vulnerabilities in clients’ WordPress websites and server setups. Implement robust security protocols, including firewall configurations, intrusion detection systems, and encryption tools … or similar role, with a focus on web security and WordPress platforms. In-depth knowledge of cybersecurity protocols, threat detection, intrusion detection systems, and encryption technologies. Experience with security assessment tools and methodologies. Strong understanding of web vulnerabilities, including SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF). Excellent communication skills and ability to convey More ❯
Posted:

Senior Cloud/DevOps Engineer (TS/SCI with Polygraph) with Security Clearance

Chantilly, Virginia, United States
Strategic Business Systems
system architecture Assisting external customers with development and troubleshooting of IT and software systems Encouraging and building automated processes wherever possible Identifying and deploying cybersecurity measures by continuously performing vulnerability assessment and risk management Monitoring and measuring customer experience and KPIs Qualifications: Experience working on Linux based infrastructure Linux system administrator experience with AWS building and managing highly More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Product Security Engineer

London, England, United Kingdom
Qube Research & Technologies
maintenance of a secure software development lifecycle (SDLC) with a focus on secure coding practices in languages like Python, C++, Rust, Go and Kotlin/Java. Conduct threat modeling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle. Provide mentorship, guidance, and training on security best practices and … systems. Extensive experience with one or more cloud platforms such as AWS, Microsoft Azure and Alibaba Cloud used in a hybrid environment. In-depth knowledge of threat modeling, risk assessment and development of mitigation strategies for large-scale, complex systems in a fast-paced environment. Experience integrating security scanning tools into CI/CD pipelines and runtime environments. Experience More ❯
Posted:

Cyber Security Analyst 279624

London, England, United Kingdom
Hybrid / WFH Options
Littlefish
or similar technical positions. Understanding of security threats and methods of compromise. Proficiency in server, client, and network technologies. Knowledge of malware, network reconnaissance, and emerging threats. Competence in vulnerability assessment and remediation procedures. Strong analytical, logical thinking, and judgment skills. Proficiency in KQL and familiarity with the Microsoft Defender Suite. Education/Qualifications: CompTIA Security+ or equivalent More ❯
Posted:

Cyber Security Analyst 279624

London, England, United Kingdom
Hybrid / WFH Options
Little Fish (UK) Ltd
or similar technical positions. Fundamental understanding of security threats and compromise methods. Proficiency in server, client, and network technologies. Knowledge of malware, network reconnaissance, and emerging threats. Competence in vulnerability assessment and remediation procedures. Strong analytical skills, logical thinking, and sound judgment. Proficiency in KQL. Familiarity with the Microsoft Defender Suite. Education/Qualifications: CompTIA Security+ or equivalent More ❯
Posted:

Cyber Security Analyst

Nottingham, Nottinghamshire, East Midlands, United Kingdom
Hybrid / WFH Options
Littlefish
or similar technical positions. Fundamental understanding of security threats and compromise methods. Proficiency in server, client, and network technologies. Knowledge of malware, network reconnaissance, and emerging threats. Competence in vulnerability assessment and remediation procedures. Strong analytical skills, logical thinking, and sound judgment. Proficiency in KQL. Familiarity with the Microsoft Defender Suite. Education/Qualifications: CompTIA Security+ or equivalent More ❯
Employment Type: Permanent, Work From Home
Salary: £26,000
Posted:

IT Security Analyst

London, South East, England, United Kingdom
Hybrid / WFH Options
Goodman Masson
and information. You’ll work closely with the IT Security Manager to monitor networks, respond to incidents, and enhance cyber resilience across the organisation. The role also includes conducting vulnerability assessments, supporting audits, and helping to strengthen third-party security compliance. Key Responsibilities: Monitor security systems and investigate incidents Operate firewalls, EDR, SIEM tools, and encryption software Support vulnerability More ❯
Employment Type: Full-Time
Salary: £45,000 - £60,000 per annum
Posted:

Cyber Threat Analyst

Greater London, England, United Kingdom
apexanalytix
About Apexanalytix At Apexanalytix, we help some of the world’s largest companies stay ahead of risk. Our Cyber Threat & Vulnerability team provides cutting-edge analysis, monitoring, and intelligence on third-party and supplier cyber threats — helping procurement and risk leaders understand and act on the hidden risks in their extended supply chains. The Opportunity We’re looking for … a rare chance to be part of a tight-knit team tackling real-world threats at scale. What You'll Be Doing Supporting the delivery of threat intelligence and vulnerability assessments for global clients in the form of reports, briefings and alerts. Monitoring threat actor activity, emerging vulnerabilities and cyber trends relevant to third-party risk. Contributing to the … and verbal communication skills and can present findings clearly to non-technical audiences. You thrive in a team but can work independently and take initiative. You’re familiar with vulnerability management concepts, including CVEs, patching, and risk prioritisation. Nice-to-Haves Familiarity with supplier or third-party risk management. Knowledge of cyber threat intelligence frameworks and concepts. Experience or More ❯
Posted:

IT Security Analyst

London, United Kingdom
InterQuest Solutions
and make well-considered and informed recommendations to IT Security Manager. Examine security systems and web applications. Monitor security access across the organisation. Assist with conducting security assessments through vulnerability testing and risk analysis within good time and to a high standard. Assist with performing both internal and external security audits. Analyse security logs from various systems for breaches … and collaborating with them to fulfill security requirements. Review daily security logs for abnormal events and escalate them to the IT Security teams in a timely manner. Conduct technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation. Knowledge, skills and experience Essential skills: BSc in Cyber More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

OT Cyber Security Consultant

London, England, United Kingdom
Coca-Cola Europacific Partners
with engineering, maintenance and central teams, you'll ensure robust protection of our electrical, automation, and industrial network systems. You'll also drive key initiatives like cyber hygiene programmes, vulnerability assessments, and network monitoring – keeping us ahead of threats and ready to respond. KEY RESPONSIBILITIES Ensure OT assets and industrial control systems are protected against cyber threats. Implement and … support cyber security tools and practices defined in our global OT Cyber Strategy. Lead cyber hygiene and vulnerability management programmes, coordinating remediation where needed. Monitor OT network activity, detect insecure configurations or malicious activity, and take appropriate action. Own the site–level cyber incident response plan – coordinating with stakeholders and ensuring timely resolution. Support compliance efforts related to OT … and SCADA, and have strong knowledge of industrial networks. You have solid grounding in cyber security principles – TCP/IP, common protocols, OSI model, and cyber tooling such as vulnerability scanning, antivirus and endpoint protection. You can lead, influence and guide others – from site technicians to external contractors. You're confident working independently and as part of a broader More ❯
Posted:
Vulnerability Assessment
10th Percentile
£41,750
25th Percentile
£47,531
Median
£57,500
75th Percentile
£77,500
90th Percentile
£89,875