Vulnerability Management Job Vacancies

401 to 425 of 1,013 Vulnerability Management Jobs

Cybersecurity Specialist 4 with Security Clearance

Milwaukee, Wisconsin, United States
M.C. Dean
a multidisciplinary team, you will be responsible for coordinating and implementing technical controls and configuration settings and will work in a team environment alongside other cybersecurity engineers and Risk Management Framework (RMF) analysts responsible for supporting Information System Security Engineering efforts Responsibilities Working closely and supporting team members, vendors, and government customers Implementing DoD Security Technical Implementation Guides (STIGs … systems Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process Conducting ICS/SCADA system inventories following DoD guidance Conducting vulnerability scanning and document system vulnerabilities Supporting ISO standardization and Quality inspections Participating in continuous improvement of organizational cybersecurity posture Qualifications Education: 5+ Years of Experience with a Master's … Degree in Information Technology, Risk Management, Cybersecurity 7+ Years of Experience with a Bachelor's Degree in Information Technology, Risk Management, Cybersecurity 10+ Years of Experience with an Associate's Degree in Information Technology, Risk Management, Cybersecurity 12+ Years with a High School Diploma Required Progressive Experience: Working with industry and government agencies on the design of More ❯
Employment Type: Permanent
Salary: USD 124,880 Annual
Posted:

IT Security & Compliance Manager

Leatherhead, England, United Kingdom
Hybrid / WFH Options
Hyundai Motor UK
adherence to policies, processes and standards related to organisational and technical security. Being a SPOC for all aspects of cybersecurity within HMUK and leading incidents resolution. Risk Assessment and Management - Assess and identify potential security threats, vulnerabilities and developing strategies to mitigate these risks. Establish a vulnerability management process aligned with headquarters guidelines. Policy Development and Enforcement … have access to HMUK data/systems and any other activities that will require security measures review and approval Be a key member of Data Breach Task force , Disaster management team , Business continuity team etc to manage and resolve all issues related to cybersecurity aspects of the incident. Maintain an up-to-date understanding of regulatory requirements, industry changes … and standards related to organisational and technical security. Being a SPOC for all aspects of cybersecurity within HMUK and leading incidents resolution. We Want You To: Risk Assessment and Management - Assess and identify potential security threats, vulnerabilities and developing strategies to mitigate these risks. Establish a vulnerability management process aligned with headquarters guidelines. Policy Development and Enforcement More ❯
Posted:

Cyber Security Lead

London, England, United Kingdom
InfraView Ltd
will be responsible for technically leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a “people manager” as well as someone who can drive … for 2024 and the whole business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerability management, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and Reporting. Responsibilities Own the evolution … Security+, CISM, CEH, Microsoft Security (SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerability management tools, SIEMs including Sentinel. Previous experience of delivering security projects. Experience of overseeing and leading remediation of security assessments including Cyber Essentials, Cyber Essentials Plus, and NIST More ❯
Posted:

Principal Cyber Security Consultant - Hybrid

London, England, United Kingdom
Hybrid / WFH Options
ZipRecruiter
Security Consultant is a senior leader specialising in designing, implementing and managing advanced security solutions. With expertise in SOC engineering tools and one of either Cloud Security, and Access Management (IAM) or Threat Modelling, this role focuses on enhancing the security posture of organisations. The consultant will lead strategic security initiatives, collaborate with clients or stakeholders to solve complex … feeds. Skills Extensive experience in Cyber Security, with a significant portion in a leadership role. A background in SOC engineering tools combined with expertise in either cloud security, & Access Management or threat modelling. Proficiency in cloud platforms and services (AWS, Azure, GCP) with deep knowledge of security tools. Hands-on experience designing and implementing SIEM solutions in enterprise environments. … Skilled in scripting and automation (e.g., Python, PowerShell) for security processes. Familiarity with tools for threat modelling, vulnerability management, and incident response. SIEM-specific certifications like Splunk Certified Architect, Sentinel Expert, or equivalent. IAM certifications (e.g., Okta Certified Consultant, SailPoint IdentityNow, or CyberArk Defender) are highly desirable. #J-18808-Ljbffr More ❯
Posted:

Information Security Lead

London, United Kingdom
Burns Sheehan
Security Lead will be responsible for: Owning and leading the information security function, working collaboratively across all departments. Maintaining and evolving ISO 27001 certification and managing the Information Security Management System (ISMS) lifecycle. Performing regular risk assessments, developing and managing remediation plans, and conducting internal security audits. Ensuring compliance with data protection laws (e.g., GDPR) and addressing customer security … DevOps teams to implement security controls across cloud infrastructure (ideally AWS), including access control, encryption, and logging. Leading the incident response process and managing third-party penetration testing and vulnerability management activities. The ideal Information Security Lead will have experience with the following: 3-5 years of hands-on experience in an information security or IT risk/… solid understanding of cloud environments (AWS preferred) and common security risks associated with SaaS platforms. Hands-on knowledge of security tooling, including endpoint protection, SIEMs, DLP, identity and access management (IAM), and SSO. A clear understanding of data privacy laws, particularly GDPR. Familiarity with a range of security tools for endpoint protection, SSO/IAM, monitoring/logging, and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

System Administrator with Security Clearance

Hill Afb, Utah, United States
Golden Tech Systems Inc
system changes Develop, execute, and improve documentation for installation, configuration, hardening, and operations and maintenance tasks Document activities, status, and issues worked on Provide input to and follow Configuration Management processes Ensure adherence to IT infrastructure standards, policies, and procedures Perform root cause analysis and resolve system and application faults and errors Maintain working knowledge of Microsoft Active Directory … Group Policy Objects (GPOs), DHCP, DNS, and PowerShell General understanding of antivirus and vulnerability scanning software Basic understanding of Security Information and Event Management (SIEM) tools Ensure compliance of assigned operating systems and applications with Department of Defense (DoD) directives, including DISA Security Technical Implementation Guide (STIG) and Information Assurance Vulnerability Management (IAVM) bulletins What's … s) Microsoft Certification(s) Application Skills Experience with software applications, including but not limited to: Analytical Graphics - STK (Systems Tool Kit) Dassault Systemes - Cameo Enterprise Architecture, SolidWorks Flexera - FlexNet Management Suite for Engineering Applications IBM - DOORS ERM MathWorks - MATLAB Oracle - Primavera P6 EPPM Siemens - NX, Teamcenter PLM Tableau - Server and Desktop More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Global IT Infrastructure Manager

London, England, United Kingdom
Hybrid / WFH Options
ITRS Group
for the departments and liaising with all staff and clients to implement appropriate IT infrastructure balanced against regulation requirements, risks, and cost. As part of the IT global senior management team, you will lead a global team of Infrastructure Technicians, ensuring that efficient and high-quality IT services and projects are delivered to support the continued growth of our … you’ll ensure they are available and fit for purpose to meet our needs as we scale our business. As a Global IT Infrastructure Manager, you will: Provide line management for the Global infrastructure staff. Lead the strategy, scalability, innovation, and best practices for local and global infrastructure solutions with service improvement reviews and guide improving and tuning infrastructure … services delivered. Directly contribute to ITRS Group’s goal for achieving and maintaining ISO 27001 accreditation across the group. Be responsible for Problem management and helping in finding solutions. Integrate future acquisitions into the existing ITRS Group Infrastructure, systems, and processes Identity and Access Management (IAM) for infrastructure. Monitor and Event management for infrastructure Ensure the compliance More ❯
Posted:

Cybersecurity Risk & Governance Analyst

London, England, United Kingdom
Euroclear
Expertise 4–6 years’ experience in cybersecurity, with a focus on IT risk or governance Solid understanding of cybersecurity frameworks (ISO 27001, NIST, DORA) Familiarity with identity/access management, secure software development, vulnerability management Experience with tools such as ServiceNow, Excel, and basic security testing platforms Strong organizational, communication, and documentation skills Bachelor’s or master More ❯
Posted:

Head of Cyber Security

City of London, England, United Kingdom
JR United Kingdom
will be responsible for technically leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a “people manager” as well as someone who can drive … for 2024 and the whole business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerability management, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and Reporting. Responsibilities Own the evolution … Security+, CISM, CEH, Microsoft Security (SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerability management tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials, Cyber Essentials Plus, and NIST More ❯
Posted:

Senior IT Operations Manager

London, England, United Kingdom
Salt
housing of our MSP-managed infrastructure in-house, resetting and rebuilding our Azure environment, embedding cyber security practices, and supporting business-as-usual (BAU) operations. Key Responsibilities: Leadership & People Management Lead and mentor the Helpdesk and Infrastructure teams through their respective leads.Ensure effective resource planning, performance management, and development across the teams.Foster a culture of accountability, collaboration, and … continuous improvement. Operational Management Oversee daily IT operations, ensuring high availability, performance, and user satisfaction.Manage escalations and prioritisation of support issues.Monitor and report on key operational metrics ( SLAs, uptime, incident response). Project Delivery Lead the transition of managed services infrastructure and service desk from MSP to in-house.Oversee the reset and rebuild of the Microsoft Azure environment to … Cyber Security & Governance Embed cyber security practices into operational and project workflows.Collaborate with relevant stakeholders to ensure compliance with policies, standards, and regulations ( ISO27001, Cyber Essentials).Manage risk assessments, vulnerability management, and incident response processes. Stakeholder Engagement Act as a senior point of contact for internal stakeholders regarding IT operations and service delivery.Work closely with other business units More ❯
Posted:

Lead Cyber Security Specialist

London Area, United Kingdom
Ant International
SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements , including due diligence, contract oversight … Audit & Assurance: Participate in internal/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management , endpoint security (EDR/XDR) , and cloud compliance . Good understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged access management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: 5+ years More ❯
Posted:

Lead Cyber Security Specialist

City of London, London, United Kingdom
Ant International
SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements , including due diligence, contract oversight … Audit & Assurance: Participate in internal/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management , endpoint security (EDR/XDR) , and cloud compliance . Good understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged access management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: 5+ years More ❯
Posted:

Senior IT Operations Manager

London, South East, England, United Kingdom
Salt Search
housing of our MSP-managed infrastructure in-house, resetting and rebuilding our Azure environment, embedding cyber security practices, and supporting business-as-usual (BAU) operations. Key Responsibilities: Leadership & People Management Lead and mentor the Helpdesk and Infrastructure teams through their respective leads. Ensure effective resource planning, performance management, and development across the teams. Foster a culture of accountability … collaboration, and continuous improvement. Operational Management Oversee daily IT operations, ensuring high availability, performance, and user satisfaction. Manage escalations and prioritisation of support issues. Monitor and report on key operational metrics (e.g. SLAs, uptime, incident response). Project Delivery Lead the transition of managed services infrastructure and service desk from MSP to in-house. Oversee the reset and rebuild … Embed cyber security practices into operational and project workflows. Collaborate with relevant stakeholders to ensure compliance with policies, standards, and regulations (e.g. ISO27001, Cyber Essentials). Manage risk assessments, vulnerability management, and incident response processes. Stakeholder Engagement Act as a senior point of contact for internal stakeholders regarding IT operations and service delivery. Work closely with other business More ❯
Employment Type: Contractor
Rate: £375 - £400 per day
Posted:

Cybersecurity Specialist 3 - Chantilly, VA with Security Clearance

Chantilly, Virginia, United States
M.C. Dean
employee at M.C. Dean, you will join forces with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the … a multidisciplinary team, you will be responsible for coordinating and implementing technical controls and configuration settings and will work in a team environment alongside other cybersecurity engineers and Risk Management Framework (RMF) analysts responsible for supporting Information System Security Engineering efforts. Working closely and supporting team members, vendors, and government customers Implementing DoD Security Technical Implementation Guides (STIGs) on … systems Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process Conducting ICS/SCADA system inventories following DoD guidance Conducting vulnerability scanning and document system vulnerabilities Supporting ISO standardization and Quality inspections Participating in continuous improvement of organizational cybersecurity posture Qualifications Clearance/Citizen Type: Applicants selected will be subject More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Lead

London, England, United Kingdom
Ant Group
SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA's outsourcing requirements , including due diligence, contract oversight … Audit & Assurance: Participate in internal/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management , endpoint security (EDR/XDR) , and cloud compliance . Good understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged access management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: 5+ years More ❯
Posted:

Senior/Staff Application Security Analyst (Bangkok based, relocation provided)

Liverpool, England, United Kingdom
Hybrid / WFH Options
Agoda
Harnessing our innovative technologies and strong partnerships, we aim to make travel easy and rewarding for everyone. Get to Know our Team: The Security Department oversees security, governance, risk management, and compliance, and security operations for all Agoda. We are vigilant in ensuring there is no breach or vulnerability threatening our company or endangering our employees to keep … advanced environment. The Opportunity: As a Security Analyst, you will focus on identifying, analyzing, and remediating vulnerabilities across our environment. You will be hands-on with penetration testing and vulnerability management, ensuring our systems remain secure and resilient. In this Role, you’ll get to: Develop Security Automation Tools to implement solutions at scale Triage security findings from … multiple tools and work with hundreds of teams to get them remediated within the right SLA Conduct security assessments through code reviews, vulnerability assessments, penetration testing and risk analysis Research on the negative effects of a vulnerability, from minimizing the impact to altering security controls for future prevention Identify potential threats so that the organization can protect itself More ❯
Posted:

Senior Cyber Security Engineer

Aldershot, Hampshire, South East, United Kingdom
Hybrid / WFH Options
JLA Resourcing Ltd
Your role will be pivotal in ensuring the secure delivery of new systems into live service, as well as ongoing protection, compliance, and incident response. You will: Own the vulnerability management strategy across platforms, leading scanning, remediation, and reporting activities Design and enforce endpoint security policies, access controls, and malware protections Lead incident identification and response efforts, ensuring … skills & experience: Extensive hands-on experience in cyber security engineering roles, ideally in defence, government, or secure sectors Advanced knowledge of AWS security services, network security, endpoint protection, and vulnerability management Strong working knowledge of compliance frameworks and standards (CIS, STIG, NIST, Government Functional Standard 007) Proven ability to lead security planning, risk assessments, and incident response activities More ❯
Employment Type: Permanent, Work From Home
Salary: £75,000
Posted:

Cybersecurity Specialist Sr Lead with Security Clearance

Springfield, Virginia, United States
Softek International Inc
Cybersecurity Specialist Senior Level(Key Person Task Area Lead) Task Area 6: Component Risk Management and Compliance/Senior Risk Analyst Certification Required: CISSP or CISM or CSSP or CAP Security Clearance Required: Top Secret Required Years of Experience: 8 Job Location: Currently remote due to COVID and building renovations. Must be in or willing to move to the … and DHS Component feedback. Participate in Performance Plan Working Group by reviewing current metrics, recommending updates with justification. Organize, prepare, participate in, and sometimes run the monthly Organizational Risk Management Board (ORMB) meeting to include release of meeting minutes to attendeesMethodologies, Strategic Plans, Guidance documents and policy memos with security authorizations, inventory, security training program, policy, and procedures and … and action items on POA&M Meetings Report weekly and monthly with a summary of the PRB progress as defined by Federal POA&M Lead. Analyze continuous monitoring, configuration management, vulnerability management, asset management, software management and self-reported data to identify trends and anomalies cybersecurity performance and mitigation of risk. Provide research and development More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Director - UK Region | London, UK

London, England, United Kingdom
Aon Corporation
GCS) controls. The role acts as a primary contact for all Cybersecurity matters, requiring a broad understanding of security controls and their effective implementation in corporate environments. Strong relationship management skills across the assigned region/sub-region are essential to facilitate business adoption. As a Director within the Regional Security Office (RSO) service, you will be accountable for … to the region/sub-region and solution lines. The role necessitates effective relationships with senior leadership to support regional business goals and to operate an effective security risk management regime aligned with a security risk mitigation strategy. The trusted security lead will present to local leaders, regulators, and clients as needed. Prior regulatory management experience is required. … adoption. Oversee the colleague security culture program. Represent the region in security incident management. Manage remediation efforts, e.g., internal audit findings. Ensure cybersecurity compliance and conduct management. Cybersecurity Risk Management: Manage a cybersecurity risk committee. Track remediation of audit and compliance findings. Review cybersecurity metrics and lead remediation programs. Lead or sponsor cybersecurity initiatives. Coordinate with Data Privacy to More ❯
Posted:

Threat Intelligence Lead

Leeds, England, United Kingdom
Anson McCade
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: • Lead the development and delivery of threat intelligence and … vulnerability products. • Select and profile key threat actors posing the greatest risk to the client’s estate. • Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. • Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. • Provide in-depth contextual threat analysis, including actor capability and intent. • Maintain and improve internal documentation and … reporting processes. • Lead, mentor, and support a multidisciplinary team of cyber analysts. • Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: • 5+ years of experience in Threat Intelligence, Vulnerability Management, or cyber research. • Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. • Experience More ❯
Posted:

MANDARIN Network and Security Engineer

London, England, United Kingdom
ABL
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints …/IP telephony). Technical Skills: Hands–on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerability assessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after–hours/weekend support More ❯
Posted:

Information Security Analyst

Rocester, England, United Kingdom
J C Bamford Excavators Ltd
software, systems, services and toolsets such as E-mail Security, EDR, NAC, IT/OT Segmentation, 365 etc along with an understanding of malware prevention, emerging threats, attacks and vulnerability management. · Understanding of Information Security best practice for elements including workstations, servers, cloud, networking, architecture, common protocols and application security. · You have the ability to confidently perform security audits … both internal and external (e.g., third party and supplier assurance) and ensure recommendations are followed for continuous improvement. · You have strong Project Management skills - able to independently manage multiple projects, manage own workload, prioritise and meet tight deadlines. · Strong Incident Response Management skills including threat and vulnerability analysis. · The ability to communicate business and technical risk to … all levels of audience. · Understanding of IT Service Management principles ideally ITIL. What happens next? Ordinarily, our Resourcing Team reviews and shortlists CVs. If shortlisted, you’ll speak to one of our Recruiters to discuss the role further. Our interview process usually consists of an initial teams interview followed by an in-person interview. We’ll keep in touch More ❯
Posted:

Information Security Analyst

Uttoxeter, England, United Kingdom
JCB
software, systems, services and toolsets such as E-mail Security, EDR, NAC, IT/OT Segmentation, 365 etc along with an understanding of malware prevention, emerging threats, attacks and vulnerability management. • Understanding of Information Security best practice for elements including workstations, servers, cloud, networking, architecture, common protocols and application security. • You have the ability to confidently perform security audits … both internal and external (e.g., third party and supplier assurance) and ensure recommendations are followed for continuous improvement. • You have strong Project Management skills - able to independently manage multiple projects, manage own workload, prioritise and meet tight deadlines. • Strong Incident Response Management skills including threat and vulnerability analysis. • The ability to communicate business and technical risk to … all levels of audience. • Understanding of IT Service Management principles ideally ITIL. What happens next? Ordinarily, our Resourcing Team reviews and shortlists CVs. If shortlisted, you'll speak to one of our Recruiters to discuss the role further. Our interview process usually consists of an initial teams interview followed by an in-person interview. We'll keep in touch More ❯
Posted:

MANDARIN Network and Security Engineer

London, England, United Kingdom
JR United Kingdom
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerability assessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend support More ❯
Posted:

MANDARIN Network and Security Engineer

Slough, England, United Kingdom
JR United Kingdom
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerability assessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend support More ❯
Posted:
Vulnerability Management
10th Percentile
£39,500
25th Percentile
£49,813
Median
£60,000
75th Percentile
£78,750
90th Percentile
£92,500