Vulnerability Management Job Vacancies

376 to 400 of 1,013 Vulnerability Management Jobs

Sr. Technical Support Engineer, Focused Services

London, England, United Kingdom
Palo Alto Networks
Cloud infrastructure- ability to effectively deploy and manage cloud environments and integrate technologies that are part of customer stacks, to accurately replicate and resolve customer issues Knowledge of SIEM, vulnerability management tools, firewalls, malware, exploits, operating system structure and behavior Strong consulting and project management skills, with validated results working as a trusted advisor to drive business More ❯
Posted:

Senior Cloud Security Engineer

London, England, United Kingdom
Vimdesign
experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python, JavaScript … GoLang, Terraform, CloudFormation (AWS), and AWS CDK. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Desired Ability to work independently, take initiative, and maintain a keen attention to detail, ensuring high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. Why More ❯
Posted:

Infrastructure Analyst Inside IR35

London, England, United Kingdom
Motability Operations
IT. You take a hands-on approach. You have a ‘can do’ outlook. You can communicate effectively based on the audience. You proactively deal with issues. You approach change management professionally, considering and communicating potential service impacts. You are flexible to work out of hours as needed. Minimum Criteria: Good knowledge of Microsoft Defender Suite (Defender for servers Plan … including hybrid onboarding and threat/vulnerability management. Excellent knowledge of Defender for Cloud portal. Good knowledge of Azure ARC. Experience with Microsoft Windows Operating Systems (2012, 2016, 2019, 2022). Strong analytical and problem-solving skills. Experience delivering complex infrastructure change projects. Knowledge sharing capabilities. Good knowledge of Active Directory. Intermediate knowledge of M365, Exchange, and Azure AD. More ❯
Posted:

Head of Cyber Security

Manchester, England, United Kingdom
Nigel Frank
candidates across the UK, with travel into London around once or twice a month (expenses-paid). Responsibilities: * Implement and manage security controls for Microsoft and Azure infrastructure. * Lead vulnerability management and incident response. * Enhance security monitoring and IAM with Microsoft tools. * Drive security architecture and ensure endpoint security. * Support M&A security assessments and maintain compliance. Requirements More ❯
Posted:

Head of Cyber Security

Northampton, England, United Kingdom
Nigel Frank
candidates across the UK, with travel into London around once or twice a month (expenses-paid). Responsibilities: * Implement and manage security controls for Microsoft and Azure infrastructure. * Lead vulnerability management and incident response. * Enhance security monitoring and IAM with Microsoft tools. * Drive security architecture and ensure endpoint security. * Support M&A security assessments and maintain compliance. Requirements More ❯
Posted:

Head of Cyber Security

Lewes, England, United Kingdom
Nigel Frank
candidates across the UK, with travel into London around once or twice a month (expenses-paid). Responsibilities: * Implement and manage security controls for Microsoft and Azure infrastructure. * Lead vulnerability management and incident response. * Enhance security monitoring and IAM with Microsoft tools. * Drive security architecture and ensure endpoint security. * Support M&A security assessments and maintain compliance. Requirements More ❯
Posted:

Head of Cyber Security - Microsoft Defender & Sentinel

London, England, United Kingdom
Nigel Frank
travel into London around once or twice a month depending on where you live (expenses-paid). Responsibilities: * Implement and manage security controls for Microsoft and Azure infrastructure. * Lead vulnerability management and incident response. * Enhance security monitoring and IAM with Microsoft tools. * Drive security architecture and ensure endpoint security. * Support M&A security assessments and maintain compliance. Requirements More ❯
Posted:

Security Architect

London, England, United Kingdom
Albany Beck
and infrastructure design. Technical Toolkit: Strong command of Azure Log Analytics, KQL, and Azure-based security tools. Scripting: Python, PowerShell, Shell. Experience with IDS/IPS, firewalls, SIEMs, and vulnerability management tools. Strong grasp of Active Directory, Azure AD, and identity access governance. Familiarity with secure infrastructure platforms: SQL Server, Oracle, HA clustering. Seniority level Seniority level Mid More ❯
Posted:

Application Security Specialist

London, England, United Kingdom
Help Me Settle Ltd
coding errors, and vulnerabilities, providing guidance and recommendations for remediation. Security Testing: Plan and execute security testing activities, including SAST/DAST/IAST, penetration testing, fuzz testing, and vulnerability scanning to evaluate the effectiveness of security controls and identify weaknesses. Security Compliance: Ensure that applications comply with relevant security standards, regulations, and industry best practices, such as OWASP … with secure software development methodologies, such as Secure SDLC and DevSecOps. Understanding of IDEs, Code repositories & CI/CD Solutions. Proven experience in application security assessment, penetration testing, and vulnerability management. Strong understanding of web application security concepts, including secure coding practices, authentication mechanisms, and common vulnerabilities. Proficiency in security testing tools and techniques, such as Burp Suite, SonarQube More ❯
Posted:

Cyber Threat Intelligence and Vulnerability Lead

Leeds, England, United Kingdom
Hybrid / WFH Options
BAE Systems - Applied Intelligence
collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Cyber Threat Intelligence and Vulnerability Lead Job Title: Cyber Threat Intelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to the nature of the project … relevant potential cyber threat and key vulnerabilities are detected, triaged and reported on daily Accountable for all regular reporting and ensuring the efficient delivery of all threat intelligence and vulnerability products by their respective deadlines Where there is not established schedule for a product the lead is responsible for ensuring that an achievable deadline is set and the work … tailored collection plan and implementation of both to ensure that the intelligence products are relevant to the client’s interests Accountable for the quality of all Threat Intelligence and Vulnerability Reports, ensuring that when a product is delivered it is at the highest possible standard Accountable for ensuring that all relevant process are effectively documented and regularly reviewed Responsible More ❯
Posted:

Vulnerability Analyst Interview

London, England, United Kingdom
The Interview Portal
Trust in digital transactions and financial technologies is crucial for the smooth functioning of modern society. Neelam Kadbane, our next pathbreaker, Senior Vulnerability Analyst at Mastercard, identifies and addresses security vulnerabilities within Mastercard’s environment & products by conducting network penetration tests. Neelam talks to Shyam Krishnamurthy fromThe Interview Portal about the innumerable challenges and the satisfacation of her work … . It was a significant achievement for me, especially since it’s rare for companies to hire freshers directly into the InfoSec domain. At Qualys, I worked with the Vulnerability Management team, where we researched new CVEs and zero-day vulnerabilities, and developed signatures for vulnerability scanners. A zero-day vulnerability is a security flaw in … software or hardware that is unknown to the vendor or developer. Since the vendor is unaware of the vulnerability, no patch or fix is available, making it highly dangerous. The term “zero-day” comes from the fact that once the vulnerability is discovered by malicious actors, the vendor has zero days to fix it before it can be More ❯
Posted:

Remediation Engineer

London, United Kingdom
TestYantra Software Solutions
We are seeking a technically proficient Remediation Engineer - Security & Vulnerability Management to support our vulnerability management and threat remediation efforts. The successful candidate will play a pivotal role in analysing security vulnerabilities, coordinating with cross-functional teams, and implementing timely, effective remediation to reduce the organization's risk exposure-including on-premise environments, AWS, and Azure … through effective vulnerability lifecycle management, stakeholder engagement, and comprehensive tracking and reporting. Key Responsibilities Lead the identification, assessment, and remediation of vulnerabilities across all operating systems (Windows, Linux, macOS) and platforms (on-premise and cloud). Analyze vulnerability scan results from tools such as Qualys, Nessus and cloud native tools. Collaborate with system, application, and infrastructure teams … and application patching using tools such as SCCM, Ansible, Tanium, or Satellite. Contribute to remediation playbooks, SOPs, and security incident response plans. Manage and support secure configurations, patching, and vulnerability remediation across AWS and Azure environments. Remediate security misconfigurations or threats in AWS, Azure, and/or GCP using cloud-native security tools (e.g., AWS Inspector, Azure Security Center More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Remediation Engineer

Hounslow, England, United Kingdom
Vallum Associates
Key Responsibilities Lead the identification, assessment, and remediation of vulnerabilities across all operating systems (Windows, Linux, macOS) and platforms (on-premise and cloud). Analyze vulnerability scan results from tools such as Qualys, Nessus and cloud native tools. Collaborate with system, application, and infrastructure teams to prioritize and remediate vulnerabilities across on-premise and cloud environments. Prioritize vulnerabilities based … and application patching using tools such as SCCM, Ansible, Tanium, or Satellite. Contribute to remediation playbooks, SOPs, and security incident response plans. Manage and support secure configurations, patching, and vulnerability remediation across AWS and Azure environments. Remediate security misconfigurations or threats in AWS, Azure, and/or GCP using cloud-native security tools (e.g., AWS Inspector, Azure Security Center … . Collaborate with IT, DevOps, and application teams to track and verify remediation efforts. Maintain and enhance tools and processes for vulnerability tracking, reporting, and dashboard metrics. Develop and deliver regular status updates, risk reports, and executive summaries to stakeholders. Create automation scripts (PowerShell, Bash, Python) to assist in large-scale remediation efforts. Support integration of remediation workflows into More ❯
Posted:

Security Consultant

London, England, United Kingdom
JR United Kingdom
Albany Beck is looking for an experienced Security Consultant with a strong background in Security Risk Management, GRC, Vulnerability Analysis, and Compliance to join a high-impact programme within a leading global investment bank. This is an exciting opportunity to play a key role in the design and implementation of security controls, frameworks, and processes to strengthen the … s overall security posture. As a Security Consultant, you’ll be working in the client’s security team, contributing to critical workstreams that span governance, risk and compliance (GRC), vulnerability management, and security control design. You'll work closely with cross-functional stakeholders including technology, audit, and operations teams to ensure the organisation’s security strategy aligns with … appetite. Support the development, implementation, and continuous improvement of security governance frameworks and GRC processes. Design and enhance security controls across infrastructure, applications, and cloud environments. Lead or support vulnerability analysis activities, including risk-based prioritisation and remediation tracking. Ensure alignment with global security standards and frameworks (e.g. NIST, ISO 27001, CIS). Partner with compliance, audit, and internal More ❯
Posted:

Information Security Analyst

Edinburgh, Scotland, United Kingdom
Hybrid / WFH Options
Head Resourcing Ltd
months, Inside IR35 £400-£450 per day Edinburgh Financial Services A small Edinburgh Financial Services organisation is currently seeking an experienced Information Security Analyst with a strong background in vulnerability management , to join their team on an initial 6 month Contract & working from their office based in Edinburgh (hybrid). The Contract will involve assessing vulnerability reports … and collaborating with cross-functional teams to ensure timely mitigation & to be successful, key knowledge & experience should include: Recent experience working as an Information Security Analyst, Security Engineer or Vulnerability Analyst with strong experience with complex information security projects . In-depth knowledge & expertise of Information Security standards, technologies & methodologies etc (e.g., ISO27001 ). Strong grasp of security best … practices , risk management , and compliance . Particular focus on Vulnerability Management utilising SAST/DAST tools , especially Tenable . Familiarity with Azure DevOps for tracking work items. Ability to work independently and in agile teams. Excellent communication and stakeholder management skills are a must as always. Any formal certifications like CISA, CISM , or ISO27001 Lead Implementer More ❯
Posted:

Mid-Level Cybersecurity Analyst - EVAP Team with Security Clearance

Washington, Washington DC, United States
Paradyme Management
federal facilities in: Washington, DC; Huntsville, AL; and Clarksburg, WV. A current TOP SECRET clearance is required to be considered. We are seeking a Mid-level Cybersecurity Analyst - Enterprise Vulnerability Assessment Program (EVAP) Team, to conduct Enterprise Vulnerability Assessment Program (EVAP) tasks. This role requires candidate to have technical experience to assist the EVAP Team and the government … customer to maintain a proactive and resilient vulnerability management posture across its enterprise systems and infrastructure. Key Responsibilities: Serve as the administrator for enterprise vulnerability assessment tools and practices Helps maintain the architecture, engineering, and operation of the EVAP scanning infrastructure Assist with configuring and optimizing scanning solutions to ensure accuracy and effectiveness Continue to stay current … Operation Procedures (SOP) to ensure tasks are performed within Cybersecurity policies Operational Oversight Performs daily operations of EVAP allowing EVAP, Red and Blue Teams to perform timely and effective vulnerability assessments Provide hands-on support for complex scans, troubleshooting, and result analysis Align scanning activities with organizational priorities for maximum impact Tool and Infrastructure Management Maintain and enhance More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Remediation Engineer

Hounslow, England, United Kingdom
Vallum Associates
Be among the first 25 applicants Lead the identification, assessment, and remediation of vulnerabilities across all operating systems (Windows, Linux, macOS) and platforms (on-premise and cloud). Analyze vulnerability scan results from tools such as Qualys, Nessus and cloud native tools. Collaborate with system, application, and infrastructure teams to prioritize and remediate vulnerabilities across on-premise and cloud … and application patching using tools such as SCCM, Ansible, Tanium, or Satellite. Contribute to remediation playbooks, SOPs, and security incident response plans. Manage and support secure configurations, patching, and vulnerability remediation across AWS and Azure environments. Remediate security misconfigurations or threats in AWS, Azure, and/or GCP using cloud-native security tools (e.g., AWS Inspector, Azure Security Center … . Collaborate with IT, DevOps, and application teams to track and verify remediation efforts. Maintain and enhance tools and processes for vulnerability tracking, reporting, and dashboard metrics. Develop and deliver regular status updates, risk reports, and executive summaries to stakeholders. Create automation scripts (PowerShell, Bash, Python) to assist in large-scale remediation efforts. Support integration of remediation workflows into More ❯
Posted:

Senior Cybersecurity Analyst - EVAP Team with Security Clearance

Washington, Washington DC, United States
Paradyme Management
secured federal facilities in: Washington, DC; Huntsville, AL; and Clarksburg, WV. A current TOP SECRET clearance is required to be considered. We are seeking a Senior Cybersecurity Analyst - Enterprise Vulnerability Assessment Program (EVAP). This role combines strategic oversight and technical expertise to ensure the government customer maintains a proactive and resilient vulnerability management posture across its … enterprise systems and infrastructure. Key Responsibilities: Serve as the technical authority for enterprise vulnerability assessment tools and practices Manage the architecture, engineering, and operation of the EVAP scanning infrastructure Configure and optimize scanning solutions to ensure accuracy and effectiveness Stay current with emerging tools, technologies, and threat landscapes to refine methodologies Operational Oversight: Performs daily operations of EVAP allowing … EVAP, Red and Blue Teams to perform timely and effective vulnerability assessments Provide hands-on support for complex scans, troubleshooting, and result analysis Align scanning activities with organizational priorities for maximum impact Tool and Infrastructure Management: Maintain and enhance the FBI's enterprise vulnerability scanning tools and infrastructure Ensure tools are secure, up to date, and effectively More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Tenable Nessus Engineer

Knutsford, Cheshire, North West, United Kingdom
Experis
various components. While having experience with implementing the Tenable solution key, this job also requires full-time hands-on administration of the Tenable system as well as managing the vulnerability management aspect of the tool. Installing and Configuring Nessus, Nessus Manager, Nessus Agents, Log Correlation Engine, Nessus Network Monitor, and Security Center on both Linux/Unix and … Responsible for the Analysis and validation of the scan results. Responsible the Monitoring the dashboards. Responsible for defining and configuring dashboards Technical Skills & Competencies: 5+ years of experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues Experience in the design and implementation of enterprise-wide security … controls to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. Demonstrated understanding of TCP/IP networking concepts and DNS. 3+ years of related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with More ❯
Employment Type: Contract
Rate: £600 - £660 per day
Posted:

Tenable Nessus Engineer

Warrington, Cheshire, UK
Experis
various components. While having experience with implementing the Tenable solution key, this job also requires full-time hands-on administration of the Tenable system as well as managing the vulnerability management aspect of the tool. Installing and Configuring Nessus, Nessus Manager, Nessus Agents, Log Correlation Engine, Nessus Network Monitor, and Security Center on both Linux/Unix and … Responsible for the Analysis and validation of the scan results. Responsible the Monitoring the dashboards. Responsible for defining and configuring dashboards Technical Skills & Competencies: 5+ years of experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues Experience in the design and implementation of enterprise-wide security … controls to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. Demonstrated understanding of TCP/IP networking concepts and DNS. 3+ years of related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with More ❯
Posted:

Cyber Security Operational Incident Manager - Technical Consultant

Hull, England, United Kingdom
Fidelity International
a "best-practice" program is in place to manage and maintain our security response procedures. Proactively develop and deliver new incident response capabilities, tooling, and processes. Develop an incident management strategy, focusing on regular reviews and exercises. Create and deliver tabletop and simulated exercises focusing on areas of risk identified by our Threat Intelligence team. Ensure the operational security … process is consistently maintained across our global regions, considering different regulatory requirements and rules. Act as the point of contact for our global business incident management team for all security-related incidents. Run Post Incident Reviews and track and manage issues to delivery. Experience and Skills Required Experience and strong understanding of frontline security operations. Experience running a vulnerability remediation program or overseeing vulnerability teams is advantageous. Experience managing complex security incidents at a global scale. Experience creating or improving incident management programs. Strong reporting skills and ability to tailor reports to show improvements and learnings. In-depth understanding of modern attack techniques and flows. Understanding of NIST and MITRE ATT&CK Frameworks. Experience in cloud More ❯
Posted:

Cybersecurity Delivery Manager

Milton Keynes, England, United Kingdom
SmartChoice International Limited
exciting opportunity for an experienced Cybersecurity Delivery Manager to lead large-scale security operations across global enterprise environments. Key Responsibilities: Manage delivery across cybersecurity domains such as Cloud Security, Vulnerability Management, Security Architecture, and Incident Response. Oversee service operations, issue resolution, SLA adherence, and client communications. Lead and mentor delivery teams, manage performance, and support training. Support service … program governance, and financial oversight. Requirements: Extensive IT experience, including cybersecurity delivery management. Strong understanding of IT security frameworks (ISO27002, NIST, ITIL, PCI DSS). Excellent stakeholder and team management skills. Must have: CISM, CISSP, CEH, or CompTIA CySA+ certification. Nice to have: ITIL V3/4 certification. Apply now to explore further. More ❯
Posted:

OT Cyber Security Analyst

North East, England, United Kingdom
SR2
of safeguarding Industrial Control Systems and SCADA networks from evolving cyber threats.Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threat analysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerability management initiatives and penetration testing exercises. Contribute to policy … communicator with proven ability to influence and collaborate across functions. Comfortable working autonomously and leading small projects. Desirable: Background in cyber investigations or law enforcement protocols. Familiarity with project management principles. Ability to deliver awareness campaigns and contribute to continuous improvement. This is a unique opportunity to make a tangible impact on the UK’s energy resilience. If you More ❯
Employment Type: Full-Time
Salary: £36,000 - £45,000 per annum
Posted:

Cybersecurity Specialist 4 with Security Clearance

Milwaukee, Wisconsin, United States
M.C. Dean
a multidisciplinary team, you will be responsible for coordinating and implementing technical controls and configuration settings and will work in a team environment alongside other cybersecurity engineers and Risk Management Framework (RMF) analysts responsible for supporting Information System Security Engineering efforts Responsibilities Working closely and supporting team members, vendors, and government customers Implementing DoD Security Technical Implementation Guides (STIGs … systems Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process Conducting ICS/SCADA system inventories following DoD guidance Conducting vulnerability scanning and document system vulnerabilities Supporting ISO standardization and Quality inspections Participating in continuous improvement of organizational cybersecurity posture Qualifications Education: 5+ Years of Experience with a Master's … Degree in Information Technology, Risk Management, Cybersecurity 7+ Years of Experience with a Bachelor's Degree in Information Technology, Risk Management, Cybersecurity 10+ Years of Experience with an Associate's Degree in Information Technology, Risk Management, Cybersecurity 12+ Years with a High School Diploma Required Progressive Experience: Working with industry and government agencies on the design of More ❯
Employment Type: Permanent
Salary: USD 124,880 Annual
Posted:

IT Security & Compliance Manager

Leatherhead, England, United Kingdom
Hybrid / WFH Options
Hyundai Motor UK
adherence to policies, processes and standards related to organisational and technical security. Being a SPOC for all aspects of cybersecurity within HMUK and leading incidents resolution. Risk Assessment and Management - Assess and identify potential security threats, vulnerabilities and developing strategies to mitigate these risks. Establish a vulnerability management process aligned with headquarters guidelines. Policy Development and Enforcement … have access to HMUK data/systems and any other activities that will require security measures review and approval Be a key member of Data Breach Task force , Disaster management team , Business continuity team etc to manage and resolve all issues related to cybersecurity aspects of the incident. Maintain an up-to-date understanding of regulatory requirements, industry changes … and standards related to organisational and technical security. Being a SPOC for all aspects of cybersecurity within HMUK and leading incidents resolution. We Want You To: Risk Assessment and Management - Assess and identify potential security threats, vulnerabilities and developing strategies to mitigate these risks. Establish a vulnerability management process aligned with headquarters guidelines. Policy Development and Enforcement More ❯
Posted:
Vulnerability Management
10th Percentile
£39,500
25th Percentile
£49,813
Median
£60,000
75th Percentile
£78,750
90th Percentile
£92,500