Cloud infrastructure- ability to effectively deploy and manage cloud environments and integrate technologies that are part of customer stacks, to accurately replicate and resolve customer issues Knowledge of SIEM, vulnerabilitymanagement tools, firewalls, malware, exploits, operating system structure and behavior Strong consulting and project management skills, with validated results working as a trusted advisor to drive business More ❯
experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python, JavaScript … GoLang, Terraform, CloudFormation (AWS), and AWS CDK. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Desired Ability to work independently, take initiative, and maintain a keen attention to detail, ensuring high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. Why More ❯
IT. You take a hands-on approach. You have a ‘can do’ outlook. You can communicate effectively based on the audience. You proactively deal with issues. You approach change management professionally, considering and communicating potential service impacts. You are flexible to work out of hours as needed. Minimum Criteria: Good knowledge of Microsoft Defender Suite (Defender for servers Plan … including hybrid onboarding and threat/vulnerability management. Excellent knowledge of Defender for Cloud portal. Good knowledge of Azure ARC. Experience with Microsoft Windows Operating Systems (2012, 2016, 2019, 2022). Strong analytical and problem-solving skills. Experience delivering complex infrastructure change projects. Knowledge sharing capabilities. Good knowledge of Active Directory. Intermediate knowledge of M365, Exchange, and Azure AD. More ❯
candidates across the UK, with travel into London around once or twice a month (expenses-paid). Responsibilities: * Implement and manage security controls for Microsoft and Azure infrastructure. * Lead vulnerabilitymanagement and incident response. * Enhance security monitoring and IAM with Microsoft tools. * Drive security architecture and ensure endpoint security. * Support M&A security assessments and maintain compliance. Requirements More ❯
candidates across the UK, with travel into London around once or twice a month (expenses-paid). Responsibilities: * Implement and manage security controls for Microsoft and Azure infrastructure. * Lead vulnerabilitymanagement and incident response. * Enhance security monitoring and IAM with Microsoft tools. * Drive security architecture and ensure endpoint security. * Support M&A security assessments and maintain compliance. Requirements More ❯
candidates across the UK, with travel into London around once or twice a month (expenses-paid). Responsibilities: * Implement and manage security controls for Microsoft and Azure infrastructure. * Lead vulnerabilitymanagement and incident response. * Enhance security monitoring and IAM with Microsoft tools. * Drive security architecture and ensure endpoint security. * Support M&A security assessments and maintain compliance. Requirements More ❯
travel into London around once or twice a month depending on where you live (expenses-paid). Responsibilities: * Implement and manage security controls for Microsoft and Azure infrastructure. * Lead vulnerabilitymanagement and incident response. * Enhance security monitoring and IAM with Microsoft tools. * Drive security architecture and ensure endpoint security. * Support M&A security assessments and maintain compliance. Requirements More ❯
coding errors, and vulnerabilities, providing guidance and recommendations for remediation. Security Testing: Plan and execute security testing activities, including SAST/DAST/IAST, penetration testing, fuzz testing, and vulnerability scanning to evaluate the effectiveness of security controls and identify weaknesses. Security Compliance: Ensure that applications comply with relevant security standards, regulations, and industry best practices, such as OWASP … with secure software development methodologies, such as Secure SDLC and DevSecOps. Understanding of IDEs, Code repositories & CI/CD Solutions. Proven experience in application security assessment, penetration testing, and vulnerability management. Strong understanding of web application security concepts, including secure coding practices, authentication mechanisms, and common vulnerabilities. Proficiency in security testing tools and techniques, such as Burp Suite, SonarQube More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
BAE Systems - Applied Intelligence
collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Cyber Threat Intelligence and Vulnerability Lead Job Title: Cyber Threat Intelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to the nature of the project … relevant potential cyber threat and key vulnerabilities are detected, triaged and reported on daily Accountable for all regular reporting and ensuring the efficient delivery of all threat intelligence and vulnerability products by their respective deadlines Where there is not established schedule for a product the lead is responsible for ensuring that an achievable deadline is set and the work … tailored collection plan and implementation of both to ensure that the intelligence products are relevant to the client’s interests Accountable for the quality of all Threat Intelligence and Vulnerability Reports, ensuring that when a product is delivered it is at the highest possible standard Accountable for ensuring that all relevant process are effectively documented and regularly reviewed Responsible More ❯
Trust in digital transactions and financial technologies is crucial for the smooth functioning of modern society. Neelam Kadbane, our next pathbreaker, Senior Vulnerability Analyst at Mastercard, identifies and addresses security vulnerabilities within Mastercard’s environment & products by conducting network penetration tests. Neelam talks to Shyam Krishnamurthy fromThe Interview Portal about the innumerable challenges and the satisfacation of her work … . It was a significant achievement for me, especially since it’s rare for companies to hire freshers directly into the InfoSec domain. At Qualys, I worked with the VulnerabilityManagement team, where we researched new CVEs and zero-day vulnerabilities, and developed signatures for vulnerability scanners. A zero-day vulnerability is a security flaw in … software or hardware that is unknown to the vendor or developer. Since the vendor is unaware of the vulnerability, no patch or fix is available, making it highly dangerous. The term “zero-day” comes from the fact that once the vulnerability is discovered by malicious actors, the vendor has zero days to fix it before it can be More ❯
We are seeking a technically proficient Remediation Engineer - Security & VulnerabilityManagement to support our vulnerabilitymanagement and threat remediation efforts. The successful candidate will play a pivotal role in analysing security vulnerabilities, coordinating with cross-functional teams, and implementing timely, effective remediation to reduce the organization's risk exposure-including on-premise environments, AWS, and Azure … through effective vulnerability lifecycle management, stakeholder engagement, and comprehensive tracking and reporting. Key Responsibilities Lead the identification, assessment, and remediation of vulnerabilities across all operating systems (Windows, Linux, macOS) and platforms (on-premise and cloud). Analyze vulnerability scan results from tools such as Qualys, Nessus and cloud native tools. Collaborate with system, application, and infrastructure teams … and application patching using tools such as SCCM, Ansible, Tanium, or Satellite. Contribute to remediation playbooks, SOPs, and security incident response plans. Manage and support secure configurations, patching, and vulnerability remediation across AWS and Azure environments. Remediate security misconfigurations or threats in AWS, Azure, and/or GCP using cloud-native security tools (e.g., AWS Inspector, Azure Security Center More ❯
Key Responsibilities Lead the identification, assessment, and remediation of vulnerabilities across all operating systems (Windows, Linux, macOS) and platforms (on-premise and cloud). Analyze vulnerability scan results from tools such as Qualys, Nessus and cloud native tools. Collaborate with system, application, and infrastructure teams to prioritize and remediate vulnerabilities across on-premise and cloud environments. Prioritize vulnerabilities based … and application patching using tools such as SCCM, Ansible, Tanium, or Satellite. Contribute to remediation playbooks, SOPs, and security incident response plans. Manage and support secure configurations, patching, and vulnerability remediation across AWS and Azure environments. Remediate security misconfigurations or threats in AWS, Azure, and/or GCP using cloud-native security tools (e.g., AWS Inspector, Azure Security Center … . Collaborate with IT, DevOps, and application teams to track and verify remediation efforts. Maintain and enhance tools and processes for vulnerability tracking, reporting, and dashboard metrics. Develop and deliver regular status updates, risk reports, and executive summaries to stakeholders. Create automation scripts (PowerShell, Bash, Python) to assist in large-scale remediation efforts. Support integration of remediation workflows into More ❯
Albany Beck is looking for an experienced Security Consultant with a strong background in Security Risk Management, GRC, Vulnerability Analysis, and Compliance to join a high-impact programme within a leading global investment bank. This is an exciting opportunity to play a key role in the design and implementation of security controls, frameworks, and processes to strengthen the … s overall security posture. As a Security Consultant, you’ll be working in the client’s security team, contributing to critical workstreams that span governance, risk and compliance (GRC), vulnerabilitymanagement, and security control design. You'll work closely with cross-functional stakeholders including technology, audit, and operations teams to ensure the organisation’s security strategy aligns with … appetite. Support the development, implementation, and continuous improvement of security governance frameworks and GRC processes. Design and enhance security controls across infrastructure, applications, and cloud environments. Lead or support vulnerability analysis activities, including risk-based prioritisation and remediation tracking. Ensure alignment with global security standards and frameworks (e.g. NIST, ISO 27001, CIS). Partner with compliance, audit, and internal More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing Ltd
months, Inside IR35 £400-£450 per day Edinburgh Financial Services A small Edinburgh Financial Services organisation is currently seeking an experienced Information Security Analyst with a strong background in vulnerabilitymanagement , to join their team on an initial 6 month Contract & working from their office based in Edinburgh (hybrid). The Contract will involve assessing vulnerability reports … and collaborating with cross-functional teams to ensure timely mitigation & to be successful, key knowledge & experience should include: Recent experience working as an Information Security Analyst, Security Engineer or Vulnerability Analyst with strong experience with complex information security projects . In-depth knowledge & expertise of Information Security standards, technologies & methodologies etc (e.g., ISO27001 ). Strong grasp of security best … practices , risk management , and compliance . Particular focus on VulnerabilityManagement utilising SAST/DAST tools , especially Tenable . Familiarity with Azure DevOps for tracking work items. Ability to work independently and in agile teams. Excellent communication and stakeholder management skills are a must as always. Any formal certifications like CISA, CISM , or ISO27001 Lead Implementer More ❯
federal facilities in: Washington, DC; Huntsville, AL; and Clarksburg, WV. A current TOP SECRET clearance is required to be considered. We are seeking a Mid-level Cybersecurity Analyst - Enterprise Vulnerability Assessment Program (EVAP) Team, to conduct Enterprise Vulnerability Assessment Program (EVAP) tasks. This role requires candidate to have technical experience to assist the EVAP Team and the government … customer to maintain a proactive and resilient vulnerabilitymanagement posture across its enterprise systems and infrastructure. Key Responsibilities: Serve as the administrator for enterprise vulnerability assessment tools and practices Helps maintain the architecture, engineering, and operation of the EVAP scanning infrastructure Assist with configuring and optimizing scanning solutions to ensure accuracy and effectiveness Continue to stay current … Operation Procedures (SOP) to ensure tasks are performed within Cybersecurity policies Operational Oversight Performs daily operations of EVAP allowing EVAP, Red and Blue Teams to perform timely and effective vulnerability assessments Provide hands-on support for complex scans, troubleshooting, and result analysis Align scanning activities with organizational priorities for maximum impact Tool and Infrastructure Management Maintain and enhance More ❯
Be among the first 25 applicants Lead the identification, assessment, and remediation of vulnerabilities across all operating systems (Windows, Linux, macOS) and platforms (on-premise and cloud). Analyze vulnerability scan results from tools such as Qualys, Nessus and cloud native tools. Collaborate with system, application, and infrastructure teams to prioritize and remediate vulnerabilities across on-premise and cloud … and application patching using tools such as SCCM, Ansible, Tanium, or Satellite. Contribute to remediation playbooks, SOPs, and security incident response plans. Manage and support secure configurations, patching, and vulnerability remediation across AWS and Azure environments. Remediate security misconfigurations or threats in AWS, Azure, and/or GCP using cloud-native security tools (e.g., AWS Inspector, Azure Security Center … . Collaborate with IT, DevOps, and application teams to track and verify remediation efforts. Maintain and enhance tools and processes for vulnerability tracking, reporting, and dashboard metrics. Develop and deliver regular status updates, risk reports, and executive summaries to stakeholders. Create automation scripts (PowerShell, Bash, Python) to assist in large-scale remediation efforts. Support integration of remediation workflows into More ❯
secured federal facilities in: Washington, DC; Huntsville, AL; and Clarksburg, WV. A current TOP SECRET clearance is required to be considered. We are seeking a Senior Cybersecurity Analyst - Enterprise Vulnerability Assessment Program (EVAP). This role combines strategic oversight and technical expertise to ensure the government customer maintains a proactive and resilient vulnerabilitymanagement posture across its … enterprise systems and infrastructure. Key Responsibilities: Serve as the technical authority for enterprise vulnerability assessment tools and practices Manage the architecture, engineering, and operation of the EVAP scanning infrastructure Configure and optimize scanning solutions to ensure accuracy and effectiveness Stay current with emerging tools, technologies, and threat landscapes to refine methodologies Operational Oversight: Performs daily operations of EVAP allowing … EVAP, Red and Blue Teams to perform timely and effective vulnerability assessments Provide hands-on support for complex scans, troubleshooting, and result analysis Align scanning activities with organizational priorities for maximum impact Tool and Infrastructure Management: Maintain and enhance the FBI's enterprise vulnerability scanning tools and infrastructure Ensure tools are secure, up to date, and effectively More ❯
various components. While having experience with implementing the Tenable solution key, this job also requires full-time hands-on administration of the Tenable system as well as managing the vulnerabilitymanagement aspect of the tool. Installing and Configuring Nessus, Nessus Manager, Nessus Agents, Log Correlation Engine, Nessus Network Monitor, and Security Center on both Linux/Unix and … Responsible for the Analysis and validation of the scan results. Responsible the Monitoring the dashboards. Responsible for defining and configuring dashboards Technical Skills & Competencies: 5+ years of experience in Vulnerabilitymanagement domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues Experience in the design and implementation of enterprise-wide security … controls to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. Demonstrated understanding of TCP/IP networking concepts and DNS. 3+ years of related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with More ❯
various components. While having experience with implementing the Tenable solution key, this job also requires full-time hands-on administration of the Tenable system as well as managing the vulnerabilitymanagement aspect of the tool. Installing and Configuring Nessus, Nessus Manager, Nessus Agents, Log Correlation Engine, Nessus Network Monitor, and Security Center on both Linux/Unix and … Responsible for the Analysis and validation of the scan results. Responsible the Monitoring the dashboards. Responsible for defining and configuring dashboards Technical Skills & Competencies: 5+ years of experience in Vulnerabilitymanagement domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues Experience in the design and implementation of enterprise-wide security … controls to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. Demonstrated understanding of TCP/IP networking concepts and DNS. 3+ years of related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with More ❯
a "best-practice" program is in place to manage and maintain our security response procedures. Proactively develop and deliver new incident response capabilities, tooling, and processes. Develop an incident management strategy, focusing on regular reviews and exercises. Create and deliver tabletop and simulated exercises focusing on areas of risk identified by our Threat Intelligence team. Ensure the operational security … process is consistently maintained across our global regions, considering different regulatory requirements and rules. Act as the point of contact for our global business incident management team for all security-related incidents. Run Post Incident Reviews and track and manage issues to delivery. Experience and Skills Required Experience and strong understanding of frontline security operations. Experience running a vulnerability remediation program or overseeing vulnerability teams is advantageous. Experience managing complex security incidents at a global scale. Experience creating or improving incident management programs. Strong reporting skills and ability to tailor reports to show improvements and learnings. In-depth understanding of modern attack techniques and flows. Understanding of NIST and MITRE ATT&CK Frameworks. Experience in cloud More ❯
exciting opportunity for an experienced Cybersecurity Delivery Manager to lead large-scale security operations across global enterprise environments. Key Responsibilities: Manage delivery across cybersecurity domains such as Cloud Security, VulnerabilityManagement, Security Architecture, and Incident Response. Oversee service operations, issue resolution, SLA adherence, and client communications. Lead and mentor delivery teams, manage performance, and support training. Support service … program governance, and financial oversight. Requirements: Extensive IT experience, including cybersecurity delivery management. Strong understanding of IT security frameworks (ISO27002, NIST, ITIL, PCI DSS). Excellent stakeholder and team management skills. Must have: CISM, CISSP, CEH, or CompTIA CySA+ certification. Nice to have: ITIL V3/4 certification. Apply now to explore further. More ❯
of safeguarding Industrial Control Systems and SCADA networks from evolving cyber threats.Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threat analysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerabilitymanagement initiatives and penetration testing exercises. Contribute to policy … communicator with proven ability to influence and collaborate across functions. Comfortable working autonomously and leading small projects. Desirable: Background in cyber investigations or law enforcement protocols. Familiarity with project management principles. Ability to deliver awareness campaigns and contribute to continuous improvement. This is a unique opportunity to make a tangible impact on the UK’s energy resilience. If you More ❯
a multidisciplinary team, you will be responsible for coordinating and implementing technical controls and configuration settings and will work in a team environment alongside other cybersecurity engineers and Risk Management Framework (RMF) analysts responsible for supporting Information System Security Engineering efforts Responsibilities Working closely and supporting team members, vendors, and government customers Implementing DoD Security Technical Implementation Guides (STIGs … systems Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process Conducting ICS/SCADA system inventories following DoD guidance Conducting vulnerability scanning and document system vulnerabilities Supporting ISO standardization and Quality inspections Participating in continuous improvement of organizational cybersecurity posture Qualifications Education: 5+ Years of Experience with a Master's … Degree in Information Technology, Risk Management, Cybersecurity 7+ Years of Experience with a Bachelor's Degree in Information Technology, Risk Management, Cybersecurity 10+ Years of Experience with an Associate's Degree in Information Technology, Risk Management, Cybersecurity 12+ Years with a High School Diploma Required Progressive Experience: Working with industry and government agencies on the design of More ❯
Leatherhead, England, United Kingdom Hybrid / WFH Options
Hyundai Motor UK
adherence to policies, processes and standards related to organisational and technical security. Being a SPOC for all aspects of cybersecurity within HMUK and leading incidents resolution. Risk Assessment and Management - Assess and identify potential security threats, vulnerabilities and developing strategies to mitigate these risks. Establish a vulnerabilitymanagement process aligned with headquarters guidelines. Policy Development and Enforcement … have access to HMUK data/systems and any other activities that will require security measures review and approval Be a key member of Data Breach Task force , Disaster management team , Business continuity team etc to manage and resolve all issues related to cybersecurity aspects of the incident. Maintain an up-to-date understanding of regulatory requirements, industry changes … and standards related to organisational and technical security. Being a SPOC for all aspects of cybersecurity within HMUK and leading incidents resolution. We Want You To: Risk Assessment and Management - Assess and identify potential security threats, vulnerabilities and developing strategies to mitigate these risks. Establish a vulnerabilitymanagement process aligned with headquarters guidelines. Policy Development and Enforcement More ❯