Vulnerability Assessment Job Vacancies

326 to 350 of 558 Vulnerability Assessment Jobs

Site Reliability Engineer (SRE)

Lisburn, Northern Ireland, United Kingdom
Hybrid / WFH Options
Camlin Ltd
Provide guidance and mentorship to junior team members. Security and Compliance: Ensure systems comply with security standards and best practices. Implement and maintain security measures, including patch management and vulnerability assessments. Assist in audits and compliance initiatives as required. What you will need: Bachelor's degree in Computer Science, Engineering, or a related field. 4+ years of hands-on More ❯
Posted:

3rd Line Technician / Solutions Architect

Scotland, United Kingdom
Tela Technology
IT systems and networks are secure from threats and vulnerabilities Implement and manage security measures, such as firewalls, antivirus software, and intrusion detection systems Conduct regular security audits and vulnerability assessments Work within the parameters of ISO 27001, taking guidance from the compliance team as needed System Monitoring Monitor system performance and identify areas for improvement Implement performance tuning More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

3rd Line Technician / Solutions Architect

Aberdeen, Scotland, United Kingdom
Tela Technology
IT systems and networks are secure from threats and vulnerabilities Implement and manage security measures, such as firewalls, antivirus software, and intrusion detection systems Conduct regular security audits and vulnerability assessments Work within the parameters of ISO 27001, taking guidance from the compliance team as needed System Monitoring Monitor system performance and identify areas for improvement Implement performance tuning More ❯
Posted:

Lead Cloud Infrastructure Architect

City of London, London, United Kingdom
UST
security best practices, such as identity and access management (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. Infrastructure Automation & DevOps : Develop Infrastructure as Code (IaC) using tools to automate infrastructure provisioning and management. Collaborate with DevOps teams to integrate cloud infrastructure with More ❯
Posted:

Lead Cloud Infrastructure Architect

London Area, United Kingdom
UST
security best practices, such as identity and access management (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. Infrastructure Automation & DevOps : Develop Infrastructure as Code (IaC) using tools to automate infrastructure provisioning and management. Collaborate with DevOps teams to integrate cloud infrastructure with More ❯
Posted:

Naval Connectivity & Infrastructure Engineer

Liguria, Italy
Robert Walters
Switches, Access Points, ensuring robust network security and availability. Implement comprehensive backup solutions and disaster recovery plans; conduct regular failover tests to guarantee data integrity and business continuity. Conduct vulnerability assessments and enforce cybersecurity best practices to safeguard systems against emerging threats. Provide technical guidance to end users on Windows 10/11 systems; document issues thoroughly while communicating More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Group IT Risk Security Lead

Manchester, England, United Kingdom
Hybrid / WFH Options
Finsbury Food Group Plc
demonstrable experience in: Leading cybersecurity governance, risk management, and compliance initiatives within an enterprise environment. Managing incident response frameworks, including cross-functional planning and coordination. Conducting security audits and vulnerability assessments, with a proven track record of risk mitigation. Designing and implementing cybersecurity awareness programs to enhance company-wide security culture. Handling third-party cybersecurity risk, ensuring secure vendor More ❯
Posted:

Group IT Risk Security Lead

Salisbury, England, United Kingdom
Hybrid / WFH Options
Finsbury Food Group Plc
demonstrable experience in: Leading cybersecurity governance, risk management, and compliance initiatives within an enterprise environment. Managing incident response frameworks, including cross-functional planning and coordination. Conducting security audits and vulnerability assessments, with a proven track record of risk mitigation. Designing and implementing cybersecurity awareness programs to enhance company-wide security culture. Handling third-party cybersecurity risk, ensuring secure vendor More ❯
Posted:

Group IT Risk Security Lead

Cardiff, Wales, United Kingdom
Hybrid / WFH Options
Finsbury Food Group Plc
demonstrable experience in: Leading cybersecurity governance, risk management, and compliance initiatives within an enterprise environment. Managing incident response frameworks, including cross-functional planning and coordination. Conducting security audits and vulnerability assessments, with a proven track record of risk mitigation. Designing and implementing cybersecurity awareness programs to enhance company-wide security culture. Handling third-party cybersecurity risk, ensuring secure vendor More ❯
Posted:

Group IT Risk Security Lead

Sheffield, England, United Kingdom
Hybrid / WFH Options
Finsbury Food Group Plc
demonstrable experience in: Leading cybersecurity governance, risk management, and compliance initiatives within an enterprise environment. Managing incident response frameworks, including cross-functional planning and coordination. Conducting security audits and vulnerability assessments, with a proven track record of risk mitigation. Designing and implementing cybersecurity awareness programs to enhance company-wide security culture. Handling third-party cybersecurity risk, ensuring secure vendor More ❯
Posted:

Group IT Risk Security Lead

Hamilton, Scotland, United Kingdom
Hybrid / WFH Options
Finsbury Food Group Plc
demonstrable experience in: Leading cybersecurity governance, risk management, and compliance initiatives within an enterprise environment. Managing incident response frameworks, including cross-functional planning and coordination. Conducting security audits and vulnerability assessments, with a proven track record of risk mitigation. Designing and implementing cybersecurity awareness programs to enhance company-wide security culture. Handling third-party cybersecurity risk, ensuring secure vendor More ❯
Posted:

Lead Cloud Infrastructure Architect

London, England, United Kingdom
JR United Kingdom
security best practices, such as identity and access management (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. Infrastructure Automation & DevOps : Develop Infrastructure as Code (IaC) using tools to automate infrastructure provisioning and management. Collaborate with DevOps teams to integrate cloud infrastructure with More ❯
Posted:

Manager, Operational Technology, Cybersecurity, Global

London, England, United Kingdom
Hybrid / WFH Options
Vantage Data Centers
responsible for protecting a rapidly expanding global enterprise. The OT Manager, Cybersecurity, will audit the Industrial Control System/Operational Technology (ICS/OT) environment and perform risk/vulnerability assessments leading to the development of an enterprise strategy/design plan. The OT Manager, Cybersecurity, will lead the team on implementation (hands-on configuration) of the enterprise ICS More ❯
Posted:

Lead Platforms Engineer (Elastic) - Contract

London, England, United Kingdom
Hybrid / WFH Options
Northrop Grumman
to protect Elasticsearch data, including access controls, encryption, and monitoring. - Ensure compliance with relevant data protection regulations and industry standards (e.g., GDPR, HIPAA). - Conduct regular security audits and vulnerability assessments. Performance Optimization: - Monitor and analyse the performance of Elasticsearch clusters and indices. - Optimize configurations and queries to improve performance and reduce latency. - Implement effective indexing strategies and shard More ❯
Posted:

Product Security Specialist

London, England, United Kingdom
Hybrid / WFH Options
Astro Studios, Inc
testing for embedded systems, IoT devices while ensuring compliance with industry regulations Work alongside client R&D teams to lead on secure code reviews, threat modeling, security risk assessments, vulnerability assessments and validation and verification of controls Monitor emerging cybersecurity threats in the IoT and medical device landscape and write though leadership to showcase PA’s point of view More ❯
Posted:

Elasticsearch Platforms Engineer

London, England, United Kingdom
Northrop Grumman UK
to protect Elasticsearch data, including access controls, encryption, and monitoring. - Ensure compliance with relevant data protection regulations and industry standards (e.g., GDPR, HIPAA). - Conduct regular security audits and vulnerability assessments. 4. Performance Optimization: - Monitor and analyse the performance of Elasticsearch clusters and indices. - Optimize configurations and queries to improve performance and reduce latency. - Implement effective indexing strategies and More ❯
Posted:

Security Engineer, Vulnerability Management and Remediation Operations

London, England, United Kingdom
Amazon Web Services (AWS)
Security Engineer, Vulnerability Management and Remediation Operations Job ID: 2961789 | Amazon Data Services UK Limited Embark on a Mission to Fortify Amazon's Defenses as a Security Engineer with the Vulnerability Management & Remediation Operations team! Amazon Security is seeking a Security Engineer to join our Vulnerability Management and Remediation Operations (VMRO) team in London, UK. The VMRO … team is responsible for discovering, assessing, triaging, detecting, and driving the remediation of vulnerabilities across the Amazon ecosystem Key job responsibilities - Analyse public and private vulnerability disclosures and exploit code - Deeply understand and assess the technical details and potential impact of vulnerabilities across Amazon's infrastructure, services, and applications. - Investigate and triage vulnerabilities, identifying severity and the scope of … potential impact to Amazon. - Support response and remediation efforts, assisting builder teams to fix their security issues in a timely manner - Engineer high quality, scalable, and accurate vulnerability detection mechanisms - Design and implement automation, tools and workflows to enhance our operations capabilities. - Be part of a global team and participate in periodic on-call responsibilities to ensure the continuous More ❯
Posted:

Information System Security Engineer III with Security Clearance

Virginia Beach, Virginia, United States
Strategic Resilience Group
funding with an expected start date of December 2025 SECRET Clearance required SRG is seeking an Information System Security Engineer (ISSE) to perform STIG assessments using SCAP benchmarks, conduct vulnerability assessments with ACAS, manage compliance tracking in eMASS, develop POA&Ms, and complete RMF Step 5 authorizations On-site only, no telework. Position Responsibilities: Conduct Security Technical Implementation Guide … STIG) assessments using SCAP benchmarks and Evaluate STIG to ensure compliance with security standards. Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) tool. Execute processes within Enterprise Mission Assurance Support Service (eMASS) for security authorization and compliance tracking. Develop and maintain Plans of Action and Milestones (POA&M) to address security vulnerabilities and ensure risk mitigation. … full-time professional experience performing Risk Management Framework activities. • Demonstrated experience in the following areas: o Performing STIG assessments to include using SCAP benchmarks and Evaluate STIG. o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool. o Utilization and process execution within eMASS; o Developing Plans of Actions and Milestones (POA&M) entries. o Completing Risk More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Information Assurance Analyst (PART TIME) with Security Clearance

Fallon, Nevada, United States
DKW Communications, Inc
that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture. • Participate in an information security risk assessment during the Security Assessment and Authorization process. • Participate in the development or modification of the computer environment cybersecurity program plans and requirements. • Recognize a possible security violation and … Authorize documentation required to achieve an Authority to Operate (ATO). Prepare and maintain information systems ATO record on the Navy's Enterprise Mission Assurance Support Service (eMASS) • Run vulnerability assessment tools; ACAS vulnerability scanner, Security Content Automation Protocol (SCAP), STIG Viewe • Manage system/network vulnerabilities using the Vulnerability Remediation and Assets Manager (VRAM) Qualifications More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Info System Security Officer 1 with Security Clearance

Columbia, Maryland, United States
CenCore LLC
aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the … security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Assessment & Authorization (A&A) packages, and System Controls Traceability Matrices (SCTMs). Supports security authorization activities in compliance with the NIST Risk Management Framework (RMF) and any DoD and IC tailored requirements. Key tasks include: • Plan and coordinate the IT … under their control • Understand the authorization boundary of systems • Collaboration with System and Network administrators to understand and document data flow and architecture diagrams • Knowledge of security controls, the assessment and applicability to systems • Maintain operational baseline of systems under their purview • Provide ongoing Continuous Monitoring to assigned systems • Provide and validate the operational security posture of systems and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Controls Assessor 2 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Conduct verification … requirements that are not in compliance. Conduct on-site evaluations. Validate the security requirements of the information system. Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system. Provide process improvement recommendations. Draft standards and … requirements and possible mitigations to requirements that are not in compliance Validate the security requirements of the information system Verify and validate the system meets the security requirements Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system Qualifications: 5 years' experience in security, systems More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Controls Assessor 3 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Conduct verification … requirements that are not in compliance. Conduct on-site evaluations. Validate the security requirements of the information system. Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system. Provide process improvement recommendations. Draft standards and … requirements and possible mitigations to requirements that are not in compliance Validate the security requirements of the information system Verify and validate the system meets the security requirements Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system Facilitate penetration testing Provide a comprehensive verification More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Blue Team Cyber Security Engineer with Security Clearance

Virginia Beach, Virginia, United States
Strategic Resilience Group
enhance the security of legacy systems to ensure continued compliance and protection. Apply advanced cybersecurity frameworks such as MITRE ATT&CK and MITRE D3FEND to strengthen defense mechanisms. Conduct vulnerability assessments using tools such as the Assured Compliance Assessment Solution (ACAS) and remediate findings by implementing vendor patches across Linux and Windows environments. Design, implement, configure, and enforce … and virtualization. o DoD cybersecurity policies and security tools. o Frameworks such as MITRE ATT&CK or MITRE D3FEND. o Threat Intelligence and identifying emerging potential threats. o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool. o Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems; and o Design More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Security Penetration Tester

Reading, England, United Kingdom
Hybrid / WFH Options
THAMES WATER UTILITIES LIMITED
As a Senior Security Penetration Tester , you will be responsible for supporting the design, implementation, and maintenance of TVM (Threat & Vulnerability Management) solutions, controls and processes across the organisation. You will be liaising with Digital teams to ensure appropriate mitigation and remediation of vulnerabilities detected across our IT estate. This role requires an understanding of TVM concepts, technologies, and … Tester Help support and develop an internal penetration testing function. Conduct network, application penetration testing, code and security reviews. Identify and exploit vulnerabilities through proof-of-concept testing. Support vulnerability management across the enterprise, ensuring that a framework for identification, categorisation and mitigation exists and is implemented and maintained. Responsible for supporting the creation of the operating model for … vulnerability management, that it is shared, agreed and operates effectively across the business. Develop and maintain penetration testing documentation, policies, and procedures. Integrate cybersecurity solutions (e.g. vulnerability scanning tools) with existing systems, applications, and infrastructure. Evaluate and recommend technologies, tools, and vendors to meet business needs. Investigate newly identified cybersecurity vulnerabilities and provide appropriate mitigation actions. Liaise and More ❯
Posted:

Principal User Assistance Developer/Technical Writer

United Kingdom
Oracle
this role, you will work closely with security engineers, researchers, and compliance professionals to produce high-quality documentation that is clear, accurate, and defensible. Reporting deliverables will include: Security assessment reports that communicate technical findings and vulnerabilities identified through activities such as penetration tests, vulnerability assessments, and risk analyses. System architecture and design documentation that describes the architecture … of our team, you will work independently or side-by-side within a team structure to draft, edit, and review a variety of technical and security-focused reports including vulnerability assessments, penetration tests, risk assessments, system architecture and design documentation, and compliance and attestation reports[CH1] [AK2] with an emphasis on accuracy, clarity, and consistency. Additional key responsibilities include … support security teams in efficiently documenting their technical work. What You’ll Bring: Solid experience as Technical Writer, Technical Editor, Content Strategist, or similar role Familiarity with common security assessment frameworks and methodologies such as OWASP Top 10, NIST SP 800-53, MITRE ATT&CK, or Common Criteria (ISO/IEC 15408). Familiarity with architectural documentation practices such More ❯
Posted:
Vulnerability Assessment
10th Percentile
£41,750
25th Percentile
£47,531
Median
£57,500
75th Percentile
£77,500
90th Percentile
£89,875