Vulnerability Management Job Vacancies

301 to 325 of 395 Vulnerability Management Jobs

Head of Cyber Security

Leeds, West Yorkshire, Yorkshire, United Kingdom
Connected IT
include: Defining and delivering a comprehensive cyber security strategy aligned with business goals and regulations Leading and developing the cyber security operations team Overseeing threat monitoring, incident response, and vulnerability management Managing compliance with frameworks such as Cyber Essentials, NIST, ISO27001, GDPR, and GovAssure Acting as the primary point of contact for cyber matters internally and externally, including … regulators and industry forums Representing Cyber Security at board committees and senior management meetings Supporting bid and tender processes, providing risk-based advice and competitive responses About You Were looking for an experienced cyber security leader with a blend of strategic vision and operational expertise. You should bring: Proven experience defining and executing cyber security strategy at a senior … level Strong knowledge of governance, risk, compliance, and regulatory frameworks Leadership experience managing cyber security operations teams Excellent stakeholder management skills, including board-level engagement The ability to represent the organisation externally with authority and credibility Benefits Competitive salary and benefits package Hybrid/flexible working arrangements Generous annual leave and pension Inclusive, collaborative culture with senior-level visibility More ❯
Employment Type: Permanent
Posted:

Head of Cyber Security

London, South East, England, United Kingdom
Connected IT
include: Defining and delivering a comprehensive cyber security strategy aligned with business goals and regulations Leading and developing the cyber security operations team Overseeing threat monitoring, incident response, and vulnerability management Managing compliance with frameworks such as Cyber Essentials, NIST, ISO27001, GDPR, and GovAssure Acting as the primary point of contact for cyber matters internally and externally, including … regulators and industry forums Representing Cyber Security at board committees and senior management meetings Supporting bid and tender processes, providing risk-based advice and competitive responses About You We’re looking for an experienced cyber security leader with a blend of strategic vision and operational expertise. You should bring: Proven experience defining and executing cyber security strategy at a … senior level Strong knowledge of governance, risk, compliance, and regulatory frameworks Leadership experience managing cyber security operations teams Excellent stakeholder management skills, including board-level engagement The ability to represent the organisation externally with authority and credibility Benefits Competitive salary and benefits package Hybrid/flexible working arrangements Generous annual leave and pension Inclusive, collaborative culture with senior-level More ❯
Employment Type: Full-Time
Salary: Salary negotiable
Posted:

Cybersecurity Engineer

Colorado Springs, Colorado, United States
Rezult Technology
s overall cybersecurity posture and ensuring resilience against evolving threats. We are actively speaking with applicants that have a minimum of: 2-5 years of experience in cybersecurity operations, vulnerability management, or SOC analyst roles. Ability to monitor enterprise networks and systems, analyze SIEM/EDR alerts, perform triage, and support containment/recovery during incidents. (Core day … to-day responsibility of the role.) Skilled at analyzing vulnerability scans (Tenable, Nessus, Qualys, OpenVAS), prioritizing remediation efforts with IT teams, and aligning with compliance frameworks (NIST 800-171, CMMC, ISO 27001). Strong understanding of MITRE ATT&CK, NIST frameworks, and cyber threat landscapes, enabling the candidate to detect, assess, and mitigate risks proactively. Bachelor's degree in More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SENIOR PROGRAM MANAGER - FLORIDA - URGENT with Security Clearance

Boca Raton, Florida, United States
Cyberstrike Group
metrics across the organization by account Provide detailed progress reports, identify challenges, and deliver actionable insights to healthcare clients and internal leadership Requirements 5+ years of program/project management experience, ideally in cybersecurity or healthcare IT environments Knowledge of healthcare-specific cybersecurity challenges, including vulnerability management, GRC tools, IAM in regulated environments, and securing networked medical … verbal and written communication skills to bridge technical and non-technical healthcare stakeholders effectively Preferred PMP, CISSP, CISM, or equivalent certifications with healthcare cybersecurity relevance Background in technical project management to address the intricacies of healthcare IT systems More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Solution Architect - DevSecOps

London, United Kingdom
Computacenter AG & Co. oHG
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerability management solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Solution Architect - DevSecOps

Birmingham, Staffordshire, United Kingdom
Computacenter AG & Co. oHG
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerability management solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Control Assessor with Security Clearance

Bedford, Massachusetts, United States
Hybrid / WFH Options
SkyBridge Aviation
a highly skilled Security Control Assessor to support a U.S. Air Force cyber and electronic warfare contract. The ideal candidate will have extensive experience with cybersecurity assessments and Risk Management Framework (RMF) processes and hold an active Top Secret clearance. This position requires a strong understanding of DoD cybersecurity requirements and the ability to support mission-critical systems in … Air Force systems. • Develop and maintain cybersecurity documentation including System Security Plans (SSPs), POA&Ms, and Security Assessment Reports (SARs). • Perform control validation, security control testing, and system vulnerability assessments. • Support the Authorization and Accreditation (A&A) process in compliance with DoDI 8510.01 and NIST SP 800-53. • Collaborate with system engineers, ISSMs, and other stakeholders to … 8570.01-M IAT Level III certification (e.g., CASP+, CISSP, or equivalent) • 7+ years of cybersecurity experience, including RMF and control assessments • Experience with DoD cybersecurity policies, NIST standards, and vulnerability management tools • Three (3) years of experience in a Certification and Accreditation/A&A role • Demonstrated experience with STIGs, SRGs, POA&Ms and cybersecurity best practices, as More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Analyst

United Kingdom
Zachary Daniels Recruitment
ensuring mitigation plans are in place. Support the development and maintenance of security policies and standards. Assist with third-party security reviews and supplier risk management. Provide oversight of vulnerability assessments. Conduct architecture reviews for new systems and services. Evaluate technical controls and recommend improvements. Support the rollout of new security tools and technologies. Provide input into incident management and security metrics reporting. About You: 2+ years' experience in an security role. Strong understanding of risk assessment methodologies. Knowledge of frameworks such as ISO 27001. Experience with vulnerability management and technical controls. Excellent problem-solving skills with strong attention to detail. Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is More ❯
Employment Type: Permanent
Salary: GBP 35,000 - 45,000 Annual
Posted:

Security Analyst

North West, United Kingdom
Zachary Daniels
ensuring mitigation plans are in place. Support the development and maintenance of security policies and standards. Assist with third-party security reviews and supplier risk management. Provide oversight of vulnerability assessments. Conduct architecture reviews for new systems and services. Evaluate technical controls and recommend improvements. Support the rollout of new security tools and technologies. Provide input into incident management and security metrics reporting. About You: 2+ years' experience in an security role. Strong understanding of risk assessment methodologies. Knowledge of frameworks such as ISO 27001. Experience with vulnerability management and technical controls. Excellent problem-solving skills with strong attention to detail. Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is More ❯
Employment Type: Permanent
Salary: £45,000
Posted:

Security Analyst

Cheshire, England, United Kingdom
Zachary Daniels
ensuring mitigation plans are in place.· Support the development and maintenance of security policies and standards.· Assist with third-party security reviews and supplier risk management.· Provide oversight of vulnerability assessments.· Conduct architecture reviews for new systems and services.· Evaluate technical controls and recommend improvements.· Support the rollout of new security tools and technologies.· Provide input into incident management and security metrics reporting. About You: · 2+ years' experience in an security role.· Strong understanding of risk assessment methodologies.· Knowledge of frameworks such as ISO 27001.· Experience with vulnerability management and technical controls.· Excellent problem-solving skills with strong attention to detail.· Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is More ❯
Employment Type: Full-Time
Salary: £35,000 - £45,000 per annum
Posted:

Cybersecurity System Administrator - DMV with Security Clearance

Milwaukee, Wisconsin, United States
M.C. Dean
hardware/software and optimize performance. Provide Tier 1-3 support, troubleshoot incidents, and maintain operational resilience via regular backups and recovery plans. Load PKI certificates and maintain change management documentation and incident logs.Cybersecurity Operations Serve as the Information System Security Manager (ISSM) for all assigned systems. Monitor networks for real-time threat indicators; investigate and respond to security … events. Implement and operate cybersecurity tools such as ACAS, NESSUS, SCAP, and STIG Checklists. Conduct and remediate vulnerability scans; follow DISA STIGs and IAVA compliance. Manage POA&Ms, deviation lists, and ensure systems maintain Authority to Operate (ATO). Provide FRCS cybersecurity engineering support and continuous monitoring in accordance with DoD and Army standards. Perform penetration testing, threat analysis … to complete the DoD RMF assessment and authorization process. • Implement Implementation of DoD Security Technical Implementation Guides (STIGs) on traditional Information Technology (IT) and Operational Technology (OT) systems. • Conduct vulnerability scanning and document system vulnerabilities. • Work in a team environment alongside other cybersecurity engineers and Risk Management Framework (RMF) analysts. Required Education & Experience: Active TS/SCI w More ❯
Employment Type: Permanent
Salary: USD 104,080 Annual
Posted:

INFORMATION SYSTEMS SECURITY ENGINEER (408) - VIRGINIA - URGENT with Security Clearance

Fort Belvoir, Virginia, United States
Cyberstrike Group
implement RMF system accreditation processes Assess use case and operational risk of integrated open source, and GOTS/COTS software components Provide security planning, assessment, risk analysis, and risk management support Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements Support the enforcement of the design and implementation of … with Masters in related field Working knowledge of TCP/IP suite of protocols and services, computer architectures, and network topologies is required xperience with DISA STIGs and SRGs, vulnerability management systems, mitigation and compliance processes, and reviewing results from automated security scanning tools Ability to work independently and as part of a team is needed Flexibility is More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Data Security/Cybersecurity Risk Subject Matter Expert with Security Clearance

Washington, Washington DC, United States
Dorrean
Matter Expert supporting a Federal Agency in a contract role. The Data Security/Cybersecurity Risk Subject Matter Expert (SME) will serve as the data security, readiness, risk, and vulnerability subject matter expert. In the role, the Data Security SME will: • Assess and analyze data security, readiness, risk, and vulnerability for companies that are subject to the CFIUS …/or export controls; • Experience in producing case summaries and talking points, in-depth knowledge on telecommunication systems, securing telecom applications, and security tools; • Experience with security risk assessments, vulnerability management, and incident response Dorrean provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to any More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior DevSecOps Engineer - 90% remote with Security Clearance

Washington, Washington DC, United States
Hybrid / WFH Options
OMW Consulting
Administer and optimize cloud environments (AWS), ensuring scalability and high availability. Manage containerized applications with Docker, Kubernetes, and EKS. Develop and maintain automation scripts and tools using Python. Perform vulnerability management, security assessments, and incident response. Collaborate with software engineering teams to integrate security throughout the SDLC. Conduct compliance reviews, audits, and continuous monitoring. Provide technical guidance and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SharePoint Administrator with Security Clearance

Quantico, Virginia, United States
ALTA IT Services
Console. • Experience with Windows Server 2019, SQL Server 2019, and VMWare vSphere. • Must have experience with STIGs. • Working knowledge of IT Systems Maintenance Compliance processes to include information assurance vulnerability management (IAVM). • Experience creating, reviewing, and revising security documentation and artifacts. • Strong knowledge of Microsoft Windows technologies, including Active Directory, Windows Administration, PowerShell, SharePoint, scripting, and Windows More ❯
Employment Type: Permanent
Salary: USD 150,000 Annual
Posted:

GCP Architect

Wiltshire, England, United Kingdom
Electus Recruitment Solutions
Secure GCP architecture design (IAM, encryption, VPC Service Controls) Cloud security assessments and gap analyses Compliance with GDPR, NCSC Cloud Security Principles, ISO 27001 Threat modelling, risk assessments, and vulnerability management GCP security tooling (Security Command Center, Cloud Armor, etc.) CI/CD pipeline security integration Infrastructure as Code (Terraform, Deployment Manager) Experience with SIEM tools (Splunk, Chronicle More ❯
Employment Type: Full-Time
Salary: Salary negotiable
Posted:

ServiceNow IRM- Functional Consultant

City of London, London, United Kingdom
HCLTech
for deployment. Ability to demonstrate any IRM solution and SecOps solutions as and when needed. Knowledge of various modules like Policy Mgmt. Compliance & Audit Mgmt., Vendor Mgmt., Business Continuity Management, Vulnerability Response, Incident Response, Security Dashboard on ServiceNow IRM platform Assess as-is IRM processes for maturity and automation on ServiceNow platform Knowledge of Advance risk management … SecOps administrator/consultant (this is mandatory) Must have concluded at least 1 lifecycle of ServiceNow IRM/SecOps implementation. Experience in JavaScript, API, Web Services Working knowledge of Vulnerability Mgmt. process & tools ISO/CISA/CISM/CISSP/CRICS (preferred) PLATFORM/TOOL EXPERTISE ServiceNow GRC & SecOps More ❯
Posted:

ServiceNow IRM- Functional Consultant

London Area, United Kingdom
HCLTech
for deployment. Ability to demonstrate any IRM solution and SecOps solutions as and when needed. Knowledge of various modules like Policy Mgmt. Compliance & Audit Mgmt., Vendor Mgmt., Business Continuity Management, Vulnerability Response, Incident Response, Security Dashboard on ServiceNow IRM platform Assess as-is IRM processes for maturity and automation on ServiceNow platform Knowledge of Advance risk management … SecOps administrator/consultant (this is mandatory) Must have concluded at least 1 lifecycle of ServiceNow IRM/SecOps implementation. Experience in JavaScript, API, Web Services Working knowledge of Vulnerability Mgmt. process & tools ISO/CISA/CISM/CISSP/CRICS (preferred) PLATFORM/TOOL EXPERTISE ServiceNow GRC & SecOps More ❯
Posted:

Senior Cyber Security Advisory Consultant (Defence)

London, United Kingdom
Hybrid / WFH Options
Atos SE
s ecurity controls mapping and c ompliance checking automation MoD Cyber Operations: SOC tool evaluation support, SIEM use case development, Metrics and reporting frameworks, and Technology integration assessment. Cyber Vulnerability Investigations Identity & Access: IAM architecture reviews, p rivileged access solutions, authentication technology assessment, and Zero Trust implementation planning OT Security OT Risk Assessment/Assurance and OT Vulnerability Management Key Strengths Detail-oriented with a strong focus on quality Well-organised and committed to developing customer service skills Enthusiastic about working in a team environment while developing individual capabilities 25 days of Annual leave + an option to purchase more through our Flexible Benefits Flex benefits system - exciting opportunity to choose your own benefits Pension - matching More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Consultant or Manager, Identity Engineer, Cyber, Defence & Security, Government and Publ ...

London, United Kingdom
Hybrid / WFH Options
Deloitte LLP
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, Vulnerability Management, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Consultant or Manager, Identity Engineer, Cyber, Defence & Security, Government and Publ ...

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
Deloitte LLP
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, Vulnerability Management, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cloud Security Engineer

London, South East, England, United Kingdom
Hybrid / WFH Options
Holland & Barrett International Limited
experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python, JavaScript … GoLang, Terraform, CloudFormation (AWS), and AWS CDK. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Desired: Ability to work independently, take initiative, and maintain a keen attention to detail, ensuring high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. Why More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

ISSO with Security Clearance

Cambridge, Massachusetts, United States
Draper
Information System Security Officer for a multitude of information systems. Performs technical audits of assigned information systems as well as periodic monitoring of compliance with established standards. Uses SIEM, vulnerability management, and other tools to actively correlate data and hunt threats. Ensures system is configured in accordance with required standards. Evaluates and creates artifacts which demonstrate system configuration … substitute additional experience for education). • Has or able to obtain required DODM 8570.01-M baseline certification (e.g. CISSP) within 6 months of hire. Preferred Qualifications: • Experience using common vulnerability scanning and SIEM tools. • Previous experience as an ISSO or ISSE in a classified environment. • Previous experience implementing the requirements of the DCSA Assessment and Authorization Process Manual. Security More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Service Desk Analyst

Epsom, Surrey, United Kingdom
Hybrid / WFH Options
Lloyd Recruitment - Epsom
the business. Key Responsibilities: Log, prioritise, and resolve technical issues and requests Deliver excellent customer service across multiple channels Escalate and manage major incidents appropriately Support change and problem management processes Assist with projects and improve internal tools like Power Apps Maintain accurate documentation and asset records Participate in shift patterns, including some weekend/on-call work What … focus Ability to manage competing priorities in a fast-paced environment ITIL knowledge and experience working to SLAs Nice to Have: Experience in the financial services sector Familiarity with vulnerability management tools (e.g., Qualys) Knowledge of remote support tools and collaboration platforms Experience with Power Apps and automating service processes Refer a friend and earn a retail voucher More ❯
Employment Type: Permanent
Posted:

Windows Engineer with Security Clearance

Radford, Virginia, United States
Johnson Technology Systems Inc
on Windows Administrator technology and market capabilities/trends. Manage objects stored in Active Directory as delegated by Active Directory administrators. Perform Active Directory user account, and member server management tasks in assigned OUs. Provide daily administration of the Windows based Virtual Machines and AECC services. Harden the Windows based services per commercial best practices and the required government … skills. Strong troubleshooting skills across the entire technology stack - network, storage, server, and applications. Desired Skills: Working knowledge of DoD Security Technical Implementation Guides (STIG) and the Information Assurance Vulnerability Management (IAVM) process. Required Certifications: Security+ or equivalent DoD 8570.01-M IA Tech Level II certification Must have (or obtain within 6 months of hire) Windows administrator related More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Vulnerability Management
10th Percentile
£32,500
25th Percentile
£47,500
Median
£60,000
75th Percentile
£88,125
90th Percentile
£95,000