Vulnerability Assessment Job Vacancies

76 to 100 of 679 Vulnerability Assessment Jobs

Senior IT Engineer (Cybersecurity)

Coventry, Warwickshire, United Kingdom
Nasmyth Group
vulnerabilities or breaches. Collaborate with teams to resolve performance issues and ensure business continuity. Monitor and maintain security infrastructure, including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and remediation. Perform root cause analysis More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cloud Security Architect

London, England, United Kingdom
UBDS Group
policies, standards, and procedures to ensure compliance with regulatory requirements. Collaborate with clients to understand their security needs and provide tailored solutions. Lead security assurance activities, including risk assessments, vulnerability assessments, penetration testing, and threat modelling techniques such as MITRE ATT&CK, STRIDE, DREAD, and PASTA. Provide expert guidance on security controls and measures to protect cloud infrastructure and More ❯
Posted:

Vulnerability Assessment Analyst

London, UK
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active customers in over 700 business locations. Due to business requirements … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely …/Dashboard reports for the relevant stakeholders and alleviate the workload of the IT Service desk function when required. The primary responsibilities of the role is to perform daily assessment of vulnerabilities identified by internal and external scans. Evaluate, risk assess and rate the results of the scan, prioritise all vulnerabilities discovered and remediate/patch within the established More ❯
Posted:

Vulnerability Assessment Analyst

City of London, London, United Kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active customers in over 700 business locations. Due to business requirements … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely …/Dashboard reports for the relevant stakeholders and alleviate the workload of the IT Service desk function when required. The primary responsibilities of the role is to perform daily assessment of vulnerabilities identified by internal and external scans. Evaluate, risk assess and rate the results of the scan, prioritise all vulnerabilities discovered and remediate/patch within the established More ❯
Posted:

Vulnerability Assessment Analyst

London, England, United Kingdom
JR United Kingdom
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) - 18 months Our client is a globally recognized, successful bank providing retail and corporate financial services/products. With over 10 million active customers across more than 700 locations, we are seeking an experienced Senior Compliance Officer, Monitoring & Assurance. Please note: This is a hybrid role with 3 days in … Security principles, standards, and regulations (ISO 27001, NIST, CIS, PCI DSS, GDPR). Experience with Patch Management Applications, EDR/XDR systems, Antivirus, NAC (e.g., Forescout). Knowledge of Vulnerability Scanning Tools (e.g., Tenable One, Qualys). Familiarity with vulnerability scoring systems (CVSS/CMSS). Incident Response & Forensic Management skills. Support experience with Azure, Oracle Cloud Infrastructure. More ❯
Posted:

Cyber Security Analyst

London, England, United Kingdom
Hybrid / WFH Options
Techwaka
Title: Security Analyst Location: Remote Job Summary: We are seeking a skilled and experienced Security Analyst to join our team. The ideal candidate will have a strong background in vulnerability management and experience working with Security Information and Event Management (SIEM) tools such as Microsoft Sentinel. You will play a critical role in ensuring the security of our cloud … environments, infrastructure, and business units by identifying, analyzing, and addressing vulnerabilities and threats. Key Responsibilities: Vulnerability Management: Develop, implement, and operate vulnerability management capabilities using tools like Tenable One. Deploy, configure, and manage vulnerability assessment tools (e.g., Tenable, NCSC's Active Cyber Defence Toolkit) and Attack Surface Management tools. Deliver a seamless vulnerability management service … alignment on security initiatives. Translate complex security issues into clear, actionable items for both technical and non-technical stakeholders. Security Operations: Lead and deliver core security operations focused on vulnerability management. Verify the effectiveness of security measures across the entire estate, ensuring compliance with security policies and standards. Qualifications: Proven experience in vulnerability management and the use of More ❯
Posted:

Information System Security Officer (ISSO) with Security Clearance

Washington, Washington DC, United States
Spry Methods, Inc
and/or re-design activities. Develop, implement, and evaluate security controls, measures, and frameworks in cloud-based systems to ensure data integrity, confidentiality, and availability. Perform risk analysis, vulnerability assessments, and security audits to identify and address potential weaknesses in cloud environments. Follow all appropriate security authorization process for requesting and maintaining an Authority to Operate (ATO). … concerns are addressed during all phases of system lifecycle. Perform continuous system security monitoring. Implement and manage cloud-native and third-party security tools for monitoring, threat detection and vulnerability management. Act as a SME on Cloud Security while applying methods, standards, and approaches for ensuring the baseline security safeguards are appropriately implemented and documented. Provides reports to superiors … adoption of new procedures. Draft and keep updated information security documentation to include System Security Plan, Information System Contingency Plan, Plan of Actions and Milestones (POA&M), Privacy Threat Assessment, Privacy Impact Assessment, and Configuration Management Plan. Responsible for ensuring the implementation and maintenance of annual security controls assessments. Assist with FISMA System audits as necessary. Leverage necessary More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Digital Solutions - Lead InfoSec Consultant

London, United Kingdom
CACI Ltd
are ready for the challenges of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security weaknesses in web, mobile, and … play a hands-on role in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & Vulnerability Assessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including demonstrating the business impact of … system administrators. Keep up to date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerability management program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work with stakeholders to develop mitigation strategies. Conduct regular security risk assessments and develop action More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cybersecurity Engineer

London, England, United Kingdom
Substance
network solutions, develop robust security strategies, and ensure that their systems remain resilient against attacks. You will work closely with cross-functional teams to enforce security best practices, conduct vulnerability assessments, and respond to potential security incidents. Your expertise will be instrumental in safeguarding their infrastructure and ensuring compliance with industry standards. Key Responsibilities: Design, implement, and maintain secure … mitigate cybersecurity risks. Develop security strategies, policies, and frameworks to enhance organisational security. Install, configure, and manage firewalls, intrusion detection systems (IDS), and other security technologies. Conduct penetration testing, vulnerability assessments, and security audits to identify and remediate risks. Monitor networks and systems for security breaches, investigate incidents, and coordinate response efforts. Stay updated with the latest security standards … frameworks, risk management, and compliance standards (ISO 27001, NIST, GDPR). Hands-on experience with firewalls, IDS/IPS, endpoint protection, and other security tools. Expertise in penetration testing, vulnerability assessment, and security monitoring. Knowledge of encryption protocols, authentication mechanisms, and network security principles. Relevant certifications such as CISSP, CISM, CEH, or OSCP are a plus. Strong analytical More ❯
Posted:

Information Security Engineer

London, England, United Kingdom
Hybrid / WFH Options
watchTowr
cloud infrastructures, ensuring robust protection against potential threats. Endpoint Management and Administration : Overseeing the deployment, configuration, and maintenance of endpoint security solutions to safeguard all devices within the organisation. Vulnerability Assessment and Management : Conducting regular vulnerability assessments, analysing findings, and coordinating remediation efforts to enhance our security posture. Implementation of Security Controls : Deploying security measures that not … cloud platforms (AWS), including the design and implementation of security architectures and controls. Endpoint Security : Hands-on experience with endpoint protection solutions, ensuring devices are safeguarded against potential threats. Vulnerability Management : Proficiency in conducting vulnerability assessments using industry-standard tools and methodologies, and managing remediation processes. Compliance and Security Controls : Familiarity with implementing security controls aligned with frameworks More ❯
Posted:

Pen Tester/ Cloud Engineer with Security Clearance

Rome, New York, United States
Anonymous Employer
Working knowledge and/or familiarity with Cloud-based technologies (AWS Platform, Azure Platform, Google Cloud) • Experience with NIST Risk Management Framework or other similar control framework • Knowledge of vulnerability assessment tools including Nessus, Wireshark, Kali Linux, Nmap, Metasploit, and Lin/WinPEAS • Experience with penetration testing, adversarial emulation, or red teaming 2) Cloud Engineer A candidate must More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Security Engineer II United Kingdom

United Kingdom
Olo Inc
goals and industry standards. Take ownership of security project execution, prioritizing tasks and aligning initiatives with team and company objectives. Use and optimize advanced security tools, including SIEMs and vulnerability scanners, to enhance detection, logging, and analysis capabilities. Conduct regular and detailed vulnerability assessments, identifying gaps in security controls and implementing mitigation strategies. Support compliance efforts, ensuring documentation … of operating system, networking, and application hardening for Windows, macOS, and Linux, including virtualization security. Experience deploying, maintaining, and administering security technologies like IDS, DLP, FIM, firewalls, SIEM, MFA, vulnerability assessment tools, web proxies, and WAFs. Experience with cloud providers and Infrastructure as Code (IaC) tools, such as Terraform, Ansible, or CloudFormation. Proficiency in AWS security best practices. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Security Analyst

Belfast, Northern Ireland, United Kingdom
Hybrid / WFH Options
McLaughlin & Harvey
alerts generated within security monitoring tools. Stay informed on cybersecurity trends, issues, and emerging threats, and help promote a culture of security awareness and compliance across the group. Conduct vulnerability assessments to identify potential gaps and weaknesses and propose suitable improvements. Contributing to the maintenance and continuous improvement of our ISMS to make sure systems are as secure as … improve Business Continuity and Disaster Recovery plans. Contribute to the IT risk register and mitigation plans. Ensure Endpoint security compliance, including Mobile Device Management. Organise audits, external and internal vulnerability scans, web, infrastructure and application penetration tests and ensure remediation of any issues. Assisting with ISO27001 & Cyber Essentials Plus certifications and GDPR compliance. Provide ad-hoc assistance in monitoring … with technical and non-technical colleagues at all levels in the organisation. Essential Previous experience within a cyber/information security role. Strong knowledge and understanding of security risk assessment, including security testing principles and tools. Network, operating system, application and organisational security concepts. An investigative and analytical nature with a focus on ensuring the organisation is as secure More ❯
Posted:

Cyber Security Analyst/Engineer

Leeds, England, United Kingdom
Castle Employment Agency Ltd
solid foundation in hands-on cyber defence Proficiency with tools such as SIEM, PAM, web/email filtering (e.g. Mimecast), IDS/IPS, antivirus, endpoint protection, Microsoft Sentinel, and vulnerability assessment tools (e.g. Tenable) Strong analytical mindset and attention to detail, with a passion for detecting and mitigating threats Excellent problem-solving skills and the ability to respond More ❯
Posted:

Lead Security Architect

United Kingdom
Aker Systems Limited
e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. Formulate HMG Information Assurance Risk Assessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST, CSF, and CSA … development of patterns and principles Working within environments utilising DevOps, DevSecOps, SRE, CI/CD, Infrastructure & Security as Code (Docker, Git, Terraform) Managing technical assessments of security related technologies, vulnerability assessments and penetration tools and techniques Enabling & informing risk-based decisions: Working with higher impact or more complex risks, advising on the impact and whether this is within risk More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cybersecurity Course Instructor with Security Clearance

Hanover, Maryland, United States
Eccalon LLC
Real-world Case Studies: Integrate real-world security incidents, breaches, or news into course material to ensure relevance and applicability of the concepts being taught. Student Engagement Student Performance Assessment: Evaluate student assignments, exams, projects, and lab performance through both formative and summative assessments to ensure they meet learning objectives. Feedback: Offer constructive and timely feedback to students, guiding … IPS, network monitoring tools, threat intelligence platforms, and security protocols. Skills and Expectations: Technical Expertise In-depth knowledge of cybersecurity frameworks, tools, and protocols. Practical experience with penetration testing, vulnerability assessments, and security operations. Familiarity with incident response procedures, risk management, and security compliance. Instructional Skills Ability to convey complex technical information clearly and effectively to students with varying More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Lead Cyber Security Analyst

Liverpool, England, United Kingdom
Hybrid / WFH Options
Crown Commercial Service
easy to consume articles such as blogs, policies and presentations. Experience of day-to-day management of multi-disciplinary teams of cyber security professionals. Experience deploying, configuring and using vulnerability assessment (such as Tenable and the NCSC’s Active Cyber Defence Toolkit) and Attack Surface Management tools Experience using cloud provider monitoring tools such as AWS CloudWatch, CloudTrail More ❯
Posted:

Application Security Architect

London, England, United Kingdom
JR United Kingdom
portfolio of applications/projects from inception through delivery. Ensure security controls are effectively embedded throughout the SDLC. Maintain up-to-date InfoSec policies and technical security standards. Conduct vulnerability assessments, threat modelling, and architecture reviews. What You’ll Bring Strong ability to translate technical risk into clear, actionable business terms. Hands-on experience with secure DevOps pipelines and … Azure/AWS Security. Working knowledge of GDPR, HIPAA, PCI-DSS. Familiarity with development in .NET, Java, Python, PowerShell, or Bash. Knowledge of tools like SIEM, SOAR, IDS, WAF, vulnerability management platforms. Experience with UI, API, microservices security patterns and cryptographic principles. Threat modelling and dynamic security testing skills. Background in business analysis or requirements engineering. #J-18808-Ljbffr More ❯
Posted:

Security Analyst Specialist

London, England, United Kingdom
LivaNova
with business goals—without compromising operational performance. Duties and Responsibilities Support LivaNova’s cybersecurity tools and platforms. Investigate potential threats and incidents; conduct triage and escalate as needed. Support vulnerability management efforts by scanning, reporting, and tracking remediation. Assist in the implementation of security controls across infrastructure, endpoints, and cloud environments. Respond to phishing, malware, and unauthorized access alerts … Familiarity with security and compliance frameworks (ISO 27001, NIST CSF/800-53/800-171, HIPAA, etc.). Understanding and experience with computer networking fundamentals, operating systems, SIEM, vulnerability scanning, EDR, email and cloud security platforms. Experience with platforms such as CrowdStrike and Splunk is a plus. Experience in penetration testing, threat/vulnerability assessments, and operational More ❯
Posted:

Cyber (Information) Security Consultant

Edinburgh, Midlothian, United Kingdom
Glentzestech
for Assessing security risks, developing robust security policies, and implementing effective solutions to protect sensitive information. You will work closely with clients to understand their unique security needs, conduct vulnerability assessments, and provide recommendations for improving their security posture. Your expertise will be crucial in ensuring compliance with industry standards and regulations, as well as in responding to security … incident response plans. If you are passionate about information security and enjoy solving complex problems, we encourage you to apply for this exciting opportunity Responsibilities: Conduct security assessments and vulnerability analyses. Develop and implement information security policies and procedures. Advise clients on best practices for data protection and risk management. Monitor networks and systems for security breaches and incidents. More ❯
Employment Type: Permanent
Salary: GBP 42,000 - 50,000 Annual
Posted:

Senior Security Engineer

London, England, United Kingdom
Capco
on proactive defense mechanisms. Develop a comprehensive strategy for data protection (encryption, tokenization, masking) across the data lifecycle. Oversee security tool integration in CI/CD pipelines to automate vulnerability detection and resolution. Conduct vulnerability assessments, network security audits, and code reviews to ensure application and infrastructure security. Guide engineering teams to adopt secure development practices and ensure More ❯
Posted:

Head of Cyber Security

Slough, England, United Kingdom
JR United Kingdom
on, focusing on stakeholder engagement. Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat detection and response. Collaborate with More ❯
Posted:

Network Security Engineer

London, England, United Kingdom
Substance
Design and implement secure network architectures, including firewalls, VPNs, and intrusion detection systems. Monitor network traffic and respond to security incidents and breaches in a timely manner. Conduct regular vulnerability assessments and penetration tests to identify and mitigate risks. Develop and maintain security policies and best practices to align with compliance requirements. Collaborate with IT teams to ensure proper More ❯
Posted:

Lead Network Security engineer

Macclesfield, England, United Kingdom
Hybrid / WFH Options
KBC Technologies Group
end to end network infrastructure automation capabilities that are aligned to the strategic goals of the business and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusion detection/prevention systems, and encryption technologies. Adhere to enterprise governance & review More ❯
Posted:

Lead Cyber Security Engineer

Glasgow, United Kingdom
Hybrid / WFH Options
S Three
access, and remote gateway protection at the edge. Security Operations & Threat Defence Act as the technical escalation point for complex threat investigations and incident response. Lead red-teaming simulations, vulnerability assessments, and threat hunting activities. Support proactive telemetry monitoring and improvement of detection logic and alert fidelity. Leadership & Mentoring Provide engineering mentorship to junior analysts and engineers; lead by More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Vulnerability Assessment
10th Percentile
£41,750
25th Percentile
£47,531
Median
£57,500
75th Percentile
£77,500
90th Percentile
£89,875