Vulnerability Management Job Vacancies

101 to 125 of 1,262 Vulnerability Management Jobs

Platform Security Lead

London, England, United Kingdom
ION Group
a strong focus on automation, detection and secure by design principles. Additionally, as part of the role you will be leading and participating in threat detection, incident response and vulnerability management remediation. You will be serving as both a technical leader and operational responder, working closely with Product, infrastructure and Security Operations teams. We are looking for a … system visibility by expanding logging coverage and implementing additional monitoring capabilities. Maintain, update, and regularly test incident response runbooks, containment strategies, and escalation protocols. Lead the end-to-end vulnerability management process for ION Markets systems, from identification to remediation. Provide support for security architecture reviews of developed systems to ensure alignment with best practices. Stay up to … or operating security technologies is preferred, such as endpoint security (e.g. AV/EPP/EDR), SIEM, DLP, SWG, CASB, UEBA, IDS, IPS, firewalls, IAM/PIM/PAM, vulnerability management, MDM, etc. About us We’re a diverse group of visionary innovators who provide trading and workflow automation software, high-value analytics, and strategic consulting to corporations More ❯
Posted:

Information Systems Security Manager with Security Clearance

Fairfax, Virginia, United States
M.C. Dean
employee at M.C. Dean, you will join forces with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the … for effective and efficient execution of business functions. 3. Provide effective leadership to identify, assess, and mitigate cybersecurity risks; exercise direct ownership of system monitoring and auditing, threat intelligence, vulnerability management, incident response, cybersecurity awareness, and other critical continuous monitoring processes. 4. Lead investigations of computer security violations and incidents, reporting as necessary to both the Facility Security … operations teams to design, implement, and maintain cybersecurity controls and secure system development practices consistent with the established policies and standards. 6. Provide organizational leadership including expertise development, budget management, and resource allocation in support of the established policies, plans, and strategic direction, and to enable effective extension of cybersecurity capabilities to customer-facing operations. 7. Establish and maintain More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Consultant

Brussel (Stad), Brussel, Belgium
Hybrid / WFH Options
Proximus Group
company with start-up mentality? Eager to learn continuously? Join Proximus Ada! Within this Proximus' newly created centre of excellence for AI and Cybersecurity, the mission of the Security Management and CSIRT teams is to protect Proximus, its customers, its business, its operations and reputation against external and internal threats. You will be fascinated by a highly dynamic environment … the strong collaboration and some deep technical aspects. Within the Security Management team, we are looking for a Senior Information Security Officer to reinforce the team. Your Role: Provide CISO-as-a-Service (CISOaaS) to entities of the Proximus Group to assist with the overall reinforcement of their security posture. Help them in maintaining their ISO27001 certification or in … compliance to information security legal, contractual, or internal requirements. Assist IT teams with the implementation of projects acting as an interim security officer, execute risk assessments. Define, test crisis management, business continuity, or disaster recovery planning. Set up reporting activities related to the status of information security. Organize security awareness programs. Respond to customer due diligence requests for the More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Information Security Analyst

London, England, United Kingdom
K2 Integrity Holdings, Inc
best practices, as well as a working knowledge of policies, procedures, controls, and regulatory requirements. Responsibilities Maintain and support internal security systems including access control, anti-malware, EDR, log management, and vulnerability management systems; Troubleshooting and correcting issues with security vendors as required. Participation in incident response and access review processes. Act as lead support contact for More ❯
Posted:

Cyber Security Engineer

London Area, United Kingdom
Hybrid / WFH Options
Infinigate UK & Ireland
To be successful in this role, you will wield a broad range of skills and deep understanding within Cloud network and security architecture (Azure), and excellent communication and stakeholder management skills. This role will see you taking ownership of for the delivery of security solutions within the group to support and enhance our security strategies. Please note this role … security technologies. Installing, configuring, updating, and monitoring security tools and software, such as antivirus, encryption, authentication, SIEM etc. Evaluate, research and manage emerging cyber security threats. Support the incident management process, through Root Cause Analysis. Responding to and resolving security incidents and events, such as malware infections, phishing attempts, denial-of-service attacks, data breaches, etc. Liaise with stakeholders … with internal and external audits relating to information security. Conducting security awareness training and education for staff and users on best practices and emerging trends in cyber security. Use vulnerability management to improve Infinigate’s security landscape. Performing risk assessments and vulnerability scans to identify and mitigate potential threats to the network, devices, applications, and data. Complete More ❯
Posted:

Cyber Security Engineer

City of London, London, United Kingdom
Hybrid / WFH Options
Infinigate UK & Ireland
To be successful in this role, you will wield a broad range of skills and deep understanding within Cloud network and security architecture (Azure), and excellent communication and stakeholder management skills. This role will see you taking ownership of for the delivery of security solutions within the group to support and enhance our security strategies. Please note this role … security technologies. Installing, configuring, updating, and monitoring security tools and software, such as antivirus, encryption, authentication, SIEM etc. Evaluate, research and manage emerging cyber security threats. Support the incident management process, through Root Cause Analysis. Responding to and resolving security incidents and events, such as malware infections, phishing attempts, denial-of-service attacks, data breaches, etc. Liaise with stakeholders … with internal and external audits relating to information security. Conducting security awareness training and education for staff and users on best practices and emerging trends in cyber security. Use vulnerability management to improve Infinigate’s security landscape. Performing risk assessments and vulnerability scans to identify and mitigate potential threats to the network, devices, applications, and data. Complete More ❯
Posted:

Information Security Systems Officer with Security Clearance

King George, Virginia, United States
Kitty Hawk Technologies
contracts, you will be responsible for maintaining the cybersecurity posture of classified and unclassified information systems. You will ensure compliance with DoD cybersecurity policies and standards, including the Risk Management Framework (RMF), NIST Special Publications, and DoD Instructions (e.g., DoDI 8500.01 and 8510.01). The ISSO works closely with the FSO, IT staff, and program stakeholders to ensure systems … Assessment and Authorization (A&A) activities to obtain and maintain Authority to Operate (ATO). • Conduct and document regular security reviews, risk assessments, and audit log analysis. • Assist with vulnerability scanning and remediation (e.g., ACAS, Nessus, STIGs, SCAP). • Enforce security policies, procedures, and guidelines for users, developers, and administrators. • Report and respond to security incidents in coordination with … 3+ years of experience in DoD cybersecurity, including RMF and NIST 800-53 compliance. • Active DoD Secret security clearance or higher. • Familiarity with DISA STIGs, SCAP tools, eMASS, and vulnerability management tools. • Experience with A&A processes and associated documentation and submission of RMF packages. • Experience coordinating with DCSA • DoD 8570 IAT Level II or IAM Level I More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Director of Security Assurance and Remediation

London, England, United Kingdom
Robert Walters
of evidence related to remediation plans, producing regular reporting at relevant levels confirming direction of travel of risk improvement or decline. Collaborate with security and IT teams on monitoring vulnerability and patch management progress against standards and controls guidelines, with oversight of remediation and timing to reduce risk to an acceptable level. Direct, coach and rollout training for … processes with Cyber Threat Intelligence to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies, aligning toa 3 lines of defence model and enforcing alignment of risk taxonomy to organizational cybersecurity risk management processes, procedures and activities are identified across all security … the Security Operations team and all associated stakeholders. Identify risks : Able to synthesize capability gaps and articulate them so the Firm can manage risk in alignment with its risk management strategy. Manages ambiguity: operating effectively and decisively, even when things are not certain, or the way forward is unclear. Collaborates : building partnerships and working collaboratively with others to meet More ❯
Posted:

Director of Security Assurance and Remediation (London)

Surbiton, England, United Kingdom
Robert Walters
of evidence related to remediation plans, producing regular reporting at relevant levels confirming direction of travel of risk improvement or decline. Collaborate with security and IT teams on monitoring vulnerability and patch management progress against standards and controls guidelines, with oversight of remediation and timing to reduce risk to an acceptable level. Direct, coach and rollout training for … processes with Cyber Threat Intelligence to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies, aligning toa 3 lines of defence model and enforcing alignment of risk taxonomy to organizational cybersecurity risk management processes, procedures and activities are identified across all security … the Security Operations team and all associated stakeholders. Identify risks : Able to synthesize capability gaps and articulate them so the Firm can manage risk in alignment with its risk management strategy. Manages ambiguity: operating effectively and decisively, even when things are not certain, or the way forward is unclear. Collaborates : building partnerships and working collaboratively with others to meet More ❯
Posted:

Part-time Senior Cyber Risk Analyst

Watford, Hertfordshire, England, United Kingdom
Hybrid / WFH Options
Hays Specialist Recruitment Limited
purpose-driven organisation on a part-time basis . In this role, you'll take the lead in strengthening the organisation's security posture by driving forward incident response, vulnerability management, and compliance initiatives. You'll be a key player in embedding security best practices across the business and ensuring alignment with industry standards. Responsibilities Work 7-hour … information security matters, supporting projects, solution development, and change initiatives with expert guidance. Perform regular risk evaluations to uncover and address potential security gaps. Lead the end-to-end management of security incidents, ensuring swift and effective resolution. Design and deliver engaging training sessions to raise awareness and promote a security-first mindset across the organisation. Monitor the evolving … technical vulnerabilities into business-relevant language for diverse audiences. Hands-on experience operating in or collaborating with a Security Operations Centre (SOC). Well-versed in applying recognised risk management methodologies such as ISO 27005 and NIST Risk Management Framework. Strong written and verbal communication abilities, with a focus on clear reporting and stakeholder engagement. Possession of industry More ❯
Employment Type: Contractor
Rate: £28.49 - £36.98 per hour
Posted:

Information Security Manager

London, England, United Kingdom
Autologyx Limited
year, all of this is delivered via enterprise-grade infrastructure with state-of-the-art data security and ability to handle large scale complex processes. Key Responsibilities Information Security Management: Lead the implementation and management of the company’s Information Security Management System (ISMS) in line with ISO 27001 standards. Migrate the company from ISO … are in place for AWS-hosted applications and services, including S3, EC2, Route53, EBS, RDS, and EKS, as well as Microsoft Azure and Office 365. Conduct regular security assessments, vulnerability management, and penetration testing to identify and mitigate risks. Security in Development Pipeline: Collaborate closely with Engineering and Product teams to integrate security into the development lifecycle using … such as STRIDE threat modeling and security testing (SCA and SAST) in CI/CD pipelines. Promote secure-by-design principles and best practices within the company culture. Risk Management: Facilitate risk workshops and document information security risks and treatments using tools like Eramba GRC. Monitor the threat landscape and perform regular risk assessments to ensure appropriate controls are More ❯
Posted:

Information Security Analyst

Bromsgrove, England, United Kingdom
Hybrid / WFH Options
Pure Jobs US
Analyst to join our team based in Bromsgrove, reporting to the Cybersecurity Operations Manager. The core responsibilities of an experienced Information Security Analyst include supporting governance, planning, and risk management functions, verifying policies and controls are in place for effective service delivery, supporting Release and Change Management, and maintaining the organization's information security posture by implementing, monitoring … check. Flexibility to work occasional weekends and out-of-hours. Desirable Criteria: ITIL Foundation Level or above. ISO:27001 Implementor, Auditor, or related security certification. Experience with SIEM tools, vulnerability management, scripting (PowerShell, Python). Microsoft Azure Security Engineer Associate certification. Additional certifications: Security+, Network+, Linux+, Data+, DataSys+. Full UK Driving Licence. The Company: The Best Connection, established More ❯
Posted:

Infrastructure Security Engineer

London, England, United Kingdom
Hybrid / WFH Options
Sumsub
Design and implement robust infrastructure security measures utilizing modern security solutions such as SIEM platforms, host-based intrusion detection systems (HIDS), endpoint detection and response (EDR), AWS Security Hub, vulnerability scanning tools, and intrusion detection systems (IDS) Proactively research, evaluate, and integrate emerging security tools/technologies to strengthen infrastructure defences, ensuring alignment with industry best practices and evolving … and fine-tune SIEM alert configurations to maximize detection accuracy, reduce false positives, and streamline incident response workflows Design, implement, and maintain security automation workflows utilizing Ansible for configuration management, Terraform for infrastructure-as-code, and GitLab CI/CD pipelines to enforce consistent security policies Implement and maintain Kubernetes (K8s) security protocols Execute comprehensive security assessments and audits … cybersecurity innovations About You: Proven experience in information security. Knowledge of cloud infrastructures, with a focus on AWS In-depth knowledge and hands-on experience with SIEM systems and vulnerability management tools Proficiency in using Terraform and Ansible for infrastructure automation Experience in Kubernetes security, including the use of tools for monitoring and securing containers Knowledge of DevSecOps More ❯
Posted:

Staff Security Engineer

London, England, United Kingdom
ZipRecruiter
and events using SIEM tools to identify and respond to potential threats * Implement and manage cloud security controls in AWS and other cloud environments * Conduct security risk assessments and vulnerability management activities * Ensure compliance with financial industry regulations and frameworks including PCI DSS, SOC 2, and other relevant standards * Develop and maintain security documentation, including policies, procedures, and … progressive responsibility * Strong experience with SIEM platforms, EDR solutions, and security automation tools * Demonstrated expertise in cloud security, particularly with AWS security controls and architecture * Experience with and access management solutions such as Okta, SailPoint, or similar IAM platforms * Proficiency in security monitoring, log analysis, and threat hunting * Experience with implementation and management of DLP solutions * Knowledge of … following: Self-motivated and able to handle tasks with minimal supervision. Superb analytical and problem-solving skills. Excellent collaboration and communication (Verbal and written) skills. Outstanding organizational and time management skills. Company Benefits & Perks Competitive salary, annual performance-based bonus and stock grant Retirement plan 401(k) with a competitive company match Excellent health and wellness benefits, including medical More ❯
Posted:

Associate Director Infrastructure Service Operations EMEA

London, England, United Kingdom
Hybrid / WFH Options
Simpson Thacher & Bartlett LLP
requires a blend of strategic thinking, hands-on execution, and strong leadership skills, with a focus on technical proficiency across network, server, and platform operations. Responsibilities/Duties Operational Management and Leadership: Associate Director of Business Services and Transformation, in formulating and implementing operational policies and procedures. Oversee the day-to-day operations of assigned areas, ensuring smooth and … Manage and evaluate staff performance, including performance reviews, coaching, and development. Contribute to strategic planning for assigned areas, aligning with the overall departmental and organizational strategic plan. Technical Operations Management: Partner with technical engineering teams and their leadership to manage and optimize the performance of network, server, and platform infrastructure in the region to ensure high availability, security, and … implementation, maintenance, and troubleshooting of IT systems and in the region as directed and coordinated by appropriate engineering teams. Ensure compliance with IT security policies and best practices, including vulnerability management, access control, and data protection.# Manage relationships with technology vendors and service providers within the region. Drive the adoption of new technologies to improve operational efficiency and More ❯
Posted:

Cryptographic Platform Engineer, Vice President, Hybrid

Edinburgh, Scotland, United Kingdom
Hybrid / WFH Options
State Street
Views: 5 Posted: 29.06.2025 Expiry Date: 13.08.2025 col-wide Job Description: Who we are looking for We are seeking a skilled Cryptographic Platform Engineer with expertise in cryptographic key management to design, develop, and maintain automation solutions that enhance the security, efficiency, and scalability of our enterprise cryptographic infrastructure. This role will focus on integrating key management systems … the secure automation, scripting, API development, and integrating cryptographic solutions within financial or highly regulated environments. What you will be responsible for Design and implement integrations between cryptographic key management systems and enterprise applications, cloud platforms, and security tools. Develop and maintain APIs, microservices, and automation scripts to streamline cryptographic operations. Enable seamless integration with multi-cloud key management services (AWS KMS, Azure Key Vault, OCI KMS) Collaborate with security architects, application teams, and DevSecOps engineers to embed encryption management into CI/CD pipelines. Automate key lifecycle processes such as key generation, rotation, distribution, revocation and decommissioning. Build monitoring and alerting mechanisms to detect cryptographic anomalies and improve operational efficiency. Ensure automation and integrations align with More ❯
Posted:

Cryptographic Software Integration Engineer, Vice President, Hybrid

London, England, United Kingdom
Hybrid / WFH Options
State Street
Cryptographic Software Integration Engineer to design, develop, and implement solutions that enhance the security, efficiency, and scalability of our enterprise cryptographic infrastructure. This role will focus on integrating key management systems (KMS) and hardware security modules (HSMs) with enterprise applications, cloud environments, IoT and DevSecOps workflows. The Ideal candidate has experience with secure practices for automation, scripting, API development … and integration of solutions within financial or highly regulated environments. What you will be responsible for Design and implement integrations between cryptographic key management systems and enterprise applications, cloud platforms, and security tools. Develop and maintain APIs, microservices, and automation scripts to streamline cryptographic operations. Enable seamless integration with multi-cloud key management services (AWS KMS, Azure Key … Vault, OCI KMS) Collaborate with security architects, application teams, and DevSecOps engineers to embed encryption management into CI/CD pipelines. Automate key lifecycle processes for key generation, rotation, distribution, revocation, and decommissioning. Build monitoring and alerting mechanisms to detect cryptographic anomalies and improve operational efficiency. Ensure automation and integrations align with cryptographic policies, compliance, and regulations (PCI DSS More ❯
Posted:

Network Security Architect

Luton, Bedfordshire, United Kingdom
ARM
ASA), NAC, IPS/IDS, and SD-WAN. Understanding of Zero Trust Architecture, microsegmentation, and secure cloud networking (e.g., Azure, AWS, GCP). Experience with security information and event management (SIEM), threat intelligence, and vulnerability management. Excellent communication and documentation skills, with the ability to influence and educate stakeholders. Relevant certifications strongly preferred (e.g., CISSP, CCNP Security, CCIE … is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically More ❯
Employment Type: Contract
Rate: £98 - £108/hour
Posted:

Security Architect

London, England, United Kingdom
NTT DATA
deliver value through security advisory services and secure transformational delivery engagements Provide expertise on security standards and certifications, measure and control security controls effectiveness, and maintain the Information Security Management System Develop and deliver Security Management Plans incorporating regulatory, legal, and compliance considerations Identify and analyze cyber security vulnerabilities and threats, leading risk mitigation plans Work with Service … Management to ensure partners and suppliers adhere to standards and policies, and verify compliance and security KPIs Collaborate with the first, second, and third lines of defense on cyber security, data privacy, and compliance matters Enhance governance, risk, and compliance frameworks aligned with policies and industry best practices Continuously assess, analyze, and report security metrics to support informed risk … or Microsoft Azure), including native security features and best practices Deep knowledge of modern security concepts, attack vectors, malware, security analytics, and threat intelligence Understanding of security testing and vulnerability management, including pen testing, CVSS, and CVE Experience with security standards such as ISO 27001, 27002, 27017, and 27108 DESIRABLE SKILLS AND EXPERIENCE CISSP, CISM, CCSP, CRISC, or More ❯
Posted:

Security Analyst Specialist

London, England, United Kingdom
LivaNova
with business goals—without compromising operational performance. Duties and Responsibilities Support LivaNova’s cybersecurity tools and platforms. Investigate potential threats and incidents; conduct triage and escalate as needed. Support vulnerability management efforts by scanning, reporting, and tracking remediation. Assist in the implementation of security controls across infrastructure, endpoints, and cloud environments. Respond to phishing, malware, and unauthorized access … Familiarity with security and compliance frameworks (ISO 27001, NIST CSF/800-53/800-171, HIPAA, etc.). Understanding and experience with computer networking fundamentals, operating systems, SIEM, vulnerability scanning, EDR, email and cloud security platforms. Experience with platforms such as CrowdStrike and Splunk is a plus. Experience in penetration testing, threat/vulnerability assessments, and operational More ❯
Posted:

Information Security Engineer

London, United Kingdom
Hybrid / WFH Options
Ashdown Group
be advantageous to your application, as would CISSP and/or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Engineer

Stroud, England, United Kingdom
Ecotricity
inc. Sentinel, Purview suite of tools, Exchange Online, SharePoint, Teams VMware Server and Storage Hardware Microsoft Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Penetration Testing & Vulnerability Management Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate for this role will have a demonstrable … years. Have obtained or be working towards a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (ie. NIST or Cyber Security Essentials). Knowledge of vulnerability databases (ie. NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tooling. Experience using Code Security scanning tooling. Educational Requirements This role isn More ❯
Posted:

Cyber Security Analyst

Belfast, Northern Ireland, United Kingdom
Hybrid / WFH Options
Version 1
Network Traffic: Keeping an eye on network traffic to detect and respond to security incidents in real-time. Incident Response: Investigating security breaches and writing detailed reports on incidents. Vulnerability Management: Identifying and fixing vulnerabilities in the network and systems. Conducting Risk Assessments: Performing periodic risk assessments and penetration tests to evaluate the security posture. Threat Research: Staying … on the latest cyber threats and trends to anticipate potential risks. Qualifications Technical Knowledge: Familiarity with operating systems (Windows, Mac, Linux), firewalls, VPNs, proxies, and security information and event management systems (SIEMs). Analytical Skills: Ability to analyse complex data and identify potential security threats. Problem-Solving: Strong problem-solving skills to address and mitigate security issues. Communication: Good More ❯
Posted:

Information Security Manager

London, England, United Kingdom
Hybrid / WFH Options
Story Terrace Inc
enhance compliance, and proactively manage risks. Key Responsibilities Develop and implement security strategy : aligning security plans with business goals. Own our security program: building and maintaining an information security management system. Promote security culture : working closely with IT to educate and enable teams across Attest. Support with compliance : partner with our Legal team to ensure adherence to ISO … owning an ISO 27001 security framework . Hands-on expertise in network security, application security, IAM, and incident response . Proficiency with SIEM, IDS/IPS, WAFs, EDR, and vulnerability management tools . Understanding of secure coding practices and ability to collaborate with engineering teams. Strong communication skills to articulate security risks effectively to technical and non-technical More ❯
Posted:

Senior Information Security Analyst

Maidstone, England, United Kingdom
Tiger Resourcing Group
suit someone with a blend of hands-on technical skills and strategic thinking. What You'll Be Doing: Support and improve day-to-day security operations, incident response, and vulnerability management. Lead on security investigations and ensure remediation is aligned with industry best practices. Conduct risk assessments and provide security consultancy for technical projects and service design. Help maintain More ❯
Posted:
Vulnerability Management
10th Percentile
£40,000
25th Percentile
£50,000
Median
£60,000
75th Percentile
£78,750
90th Percentile
£92,500