Vulnerability Management Job Vacancies

501 to 525 of 1,013 Vulnerability Management Jobs

Information Security Manager - Corporation

London, England, United Kingdom
Hybrid / WFH Options
ZipRecruiter
Job Description Role Overview We're looking for a pragmatic, risk-focused Information Security Manager to work within Nest and maintain our ISO 27001 certified corporation Information Security Management System (ISMS). We sit in the second line of defence and advise the business on security risks, incidents, audits, assurance, and the implementation and monitoring of security controls that … protect Nest. You'll have a solid background in information security management systems, technology, and love communicating technical concepts to non-technical people. Please note the minimum criteria for this role is: Practical experience of operating certified ISMS using ISO 27001/2, NIST CSF, and other security standards in the design and management of information security controls. … to audit and evidence compliance with security policies, standards, etc. Understanding and experience of various Information Security domains including Security Architecture, Information Security Governance, Network Security, Data Protection, Risk Management, Access Management, Vulnerability Management, Anti-Malware, Mobile Device Management, and Cloud Security. We are open to discussing working patterns. We welcome all internal applicants to More ❯
Posted:

Senior Cyber Security Analyst - Microsoft Security Stack

London Area, United Kingdom
Harrington Starr
training offered. This is an all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerability management (tenable is tool used) and patching Security policy, compliance, and user More ❯
Posted:

Senior Cyber Security Analyst - Microsoft Security Stack

City of London, London, United Kingdom
Harrington Starr
training offered. This is an all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerability management (tenable is tool used) and patching Security policy, compliance, and user More ❯
Posted:

Cybersecurity Director - UK Region

London, United Kingdom
LGBT Great
GCS) controls. The role acts as a primary contact for all Cybersecurity matters, requiring a broad understanding of security controls and their effective implementation in corporate environments. Strong relationship management skills across the region/sub-region are essential to facilitate business adoption. As a Director within the Regional Security Office (RSO) service, you will be accountable for service … delivery to the assigned region/sub-region and solution lines. Effective relationships with senior leadership are crucial to support regional business goals and maintain an effective security risk management regime aligned with a security risk mitigation strategy. The role involves presenting to local leaders, regulators, and clients as needed, with prior regulatory management experience required. This highly … colleague security culture programs. Represent the region/sub-region in security incident management. Manage remediation efforts, e.g., internal audit findings. Oversee cybersecurity compliance and conduct management. Cybersecurity Risk Management: Manage a cybersecurity risk committee to support cyber risk management. Track remediation of audit and compliance findings. Review cybersecurity metrics and lead remediation programs. Lead or sponsor cybersecurity initiatives. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cybersecurity Engineer 6 with Security Clearance

Chantilly, Virginia, United States
M.C. Dean
employee at M.C. Dean, you will join forces with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the … systems Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process Conducting ICS/SCADA system inventories following DoD guidance Conducting vulnerability scanning and document system vulnerabilities Supporting ISO standardization and Quality inspections Participating in continuous improvement of organizational cybersecurity posture Provide system security engineering services and/or products to … trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the program life cycle. Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations. Review assessment and accreditation (A&A) documentation, provide feedback on completeness and compliance of its content. Apply system security engineering More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Space Force - Senior Software Engineer - Cloud with Security Clearance

Scottsdale, Arizona, United States
GeoLogics Corporation
a Department of Defense (DoD) Secret security clearance. Desired Skills & Qualifications: Python/Java programming languages Understanding of DevOps principles: Knowledge of CI/CD pipelines, GitOps, automation, configuration management, and infrastructure as code Familiar with Scaled Agile methodology and its best practice Security knowledge: Familiarity with security best practices, risk, compliance & vulnerability management, encryption & PKI, incident … Architect strongly preferred) and its services (including fundamental AWS networking), knowing Azure is a plus Containerization: Knowledge of Docker and Kubernetes Strong understanding of API Design, testing, development and management Collaboration and communication: Ability to communicate and work effectively with development team members, operations, and security teams Problem-solving and analytical skills: Ability to identify issues and develop effective … to accelerate workload Desired Tools: CI/CD tools: Gitlab, Nexus Managed Artifacts, AWS: AWS EKS, EC2, Lambda, S3, EBS/EFS, VPC, DNS, IAM, KMS, CloudWatch, CloudTrail Configuration management: Ansible, Terragrunt, ArgoCD Build/Development: VS Code, Maven Event streaming platform (nice to have): Kafka messaging Container orchestration: Kubernetes, Docker, Security, Monitoring and logging: ACAS/Grype vulns More ❯
Employment Type: Permanent
Salary: USD 90 Hourly
Posted:

Sr. Systems Administrator with Security Clearance

Maryland, United States
August Schell Enterprises
focused, and motivated candidate who can adapt to a constantly changing environment. What you will do - Manage and maintain a complex server-based enclave. Performing and mitigating system scans, vulnerability management activities, and active directory configuration. - Plan and implement IT enhancements needed for system optimization. - Identify and remediate hardware and/or software issues. - Create and update clear … concise, and accurate incident resolution documentation. - Support overlapping projects and maintain good inter-departmental relations. - Communicate and publish statuses of system outages, as needed. - Manage information assurance vulnerability alerts (IAVAs) and system security scanning of equipment suites in accordance with System Security Plans. - Actively identify and initiate IAVA responses and system security scans for remediation, deploy IAVA patches and … Experience documenting and providing information for security accreditation and certification. - Experience using Splunk tools in infrastructure planning, data collection and comprehension, development, integration, configuring data inputs and forwarders, data management, and/or monitoring. - Experience with Network Security Technologies such as Multiple Domain, PKI, SSP, and/or Vulnerability Assessment. - Experience with High Assurance Internet Protocol Encryptor (HAIPE More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Mid-Level Cyber Defense Incident Responder with Security Clearance

Washington, Washington DC, United States
Paradyme Management
moments. The ideal candidate has hand-on experience with advanced threat detection, incident response, and collaborative security assessments to protect critical government customer systems and infrastructure. Key Responsibilities: Perform vulnerability assessments, incident response, and threat hunting operations Support Purple Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies Able to execute strategic security plans aligned with … Teams to enhance overall security posture Work closely with Senir Analysts across technical domains to ensure comprehensive assessments and planning Tools and Techniques Use approved tools and techniques for vulnerability assessments and threat detection Stay connected with on-going evaluation of new tools and technologies to enhance team capabilities Required Qualifications: Bachelor's or Master's degree in Cybersecurity … Computer Science, Information Technology, or related field 3-5 years of experience in Cybersecurity operations Proven experience in incident response, threat hunting, and vulnerability management Understanding of threat intelligence, risk assessment methodologies, and adversary tactics (MITRE ATT&CK, etc.) Knowledge of SIEMs, EDRs, forensic tools, and scripting languages (e.g., Python, PowerShell) Excellent communication and collaboration skills Preferred Qualifications More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Mid-Level Cyber Defense Incident Responder with Security Clearance

Huntsville, Alabama, United States
Paradyme Management
moments. The ideal candidate has hand-on experience with advanced threat detection, incident response, and collaborative security assessments to protect critical government customer systems and infrastructure. Key Responsibilities: Perform vulnerability assessments, incident response, and threat hunting operations Support Purple Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies Able to execute strategic security plans aligned with … Teams to enhance overall security posture Work closely with Senir Analysts across technical domains to ensure comprehensive assessments and planning Tools and Techniques Use approved tools and techniques for vulnerability assessments and threat detection Stay connected with on-going evaluation of new tools and technologies to enhance team capabilities Required Qualifications: Bachelor's or Master's degree in Cybersecurity … Computer Science, Information Technology, or related field 3-5 years of experience in Cybersecurity operations Proven experience in incident response, threat hunting, and vulnerability management Understanding of threat intelligence, risk assessment methodologies, and adversary tactics (MITRE ATT&CK, etc.) Knowledge of SIEMs, EDRs, forensic tools, and scripting languages (e.g., Python, PowerShell) Excellent communication and collaboration skills Preferred Qualifications More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Security Engineer

London, UK
Disability Solutions
security posture of our commercial business units in alignment with the ISO-27001 security framework. The ideal candidate will have practical experience in various information security responsibilities, such as vulnerability management, infrastructure hardening, security investigation, and security governance. This role requires an inquisitive personality with problem-solving capabilities to guide and support our commercial business unit's security … posture in enabling our customer's needs. Responsibilities Review and analyse outputs from Qualys, or equivalent, vulnerability and compliance scans. Actively monitor and respond to alerts from our SIEM (Security Information and Event Management) platform. Monitor and react to activity from Antivirus and EDR (Endpoint Detection and Response) tools. Define and document security requirements for new development efforts. More ❯
Posted:

Senior Cyber Security Analyst - Microsoft Security Stack

City of London, England, United Kingdom
JR United Kingdom
training offered. This is an all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerability management (tenable is tool used) and patching Security policy, compliance, and user More ❯
Posted:

Senior Cyber Defense Incident Responder with Security Clearance

Washington, Washington DC, United States
Paradyme Management
will have the experience to determine strategies and lead efforts to advance cyber defense capability. Key Responsibilities: A member of Leadership and Strategic Planning group Lead and coordinate advanced vulnerability assessments, incident response, and threat hunting operations Support Purple Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies Help develop and execute strategic security plans aligned … security posture Work closely with SMEs across technical domains to ensure comprehensive assessments and planning Tools and Techniques: Help teams in the use of approved tools and techniques for vulnerability assessments and threat detection Assist with the evaluation of new tools and technologies to enhance team capabilities Required Qualifications: Bachelor's or Master's degree in Cybersecurity, Computer Science … Technology, or related field 5-8 years of experience in Cybersecurity operations, including Blue Team, Red Team, or Purple Team roles Proven leadership in incident response, threat hunting, and vulnerability management Strong understanding of threat intelligence, risk assessment methodologies, and adversary tactics (MITRE ATT&CK, etc.) Experience with SIEMs, EDRs, forensic tools, and scripting languages (e.g., Python, PowerShell More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Program Manager, Regional Risk and Compliance

London, England, United Kingdom
Google
Risk and Compliance in London, United Kingdom Minimum Qualifications: Bachelor's degree or equivalent practical experience. 5 years of experience in program management. 5 years of experience with risk management or compliance in regulated industries (i.e., financial services, public sector, healthcare). 5 years of experience in program definition and management with a focus on audit compliance or … cross-functional or cross-team projects. Experience in one or more of the following: data protection, threat modeling, incident/emergency response, security risk mitigation or evaluation, OS hardening, vulnerability management, pen testing, access management, or cryptographic concepts. Experience with ISO 27k family, SOC reports, PCI DSS, FedRAMP, or equivalent information security and privacy compliance certifications. Experience More ❯
Posted:

CYBERSECURITY SUBJECT MATTER EXPERT - LEAD - SECRET / DoD with Security Clearance

Fort Belvoir, Virginia, United States
Hybrid / WFH Options
Woodside Staffing Solutions & Consulting
years' experience supporting DoD or Federal Cyber/IT initiatives. Current and active SECRET clearance Five (5) years IA (Information Assurance) experience Three (3) years of experience with DOD Vulnerability Management System Bachelor's degree preferred DoD 8570.01-M Certification: DFARS Information Assurance Contractor DISA FSO certified CCRI Team Lead and certification in penetration testing, such as: o … Penetration Tester (LPT) o Certified Expert Penetration Tester (CEPT) o Certified Ethical Hacker (CEH) o Global Information Assurance Certification Penetration Tester (GPEN) Additional Qualifications: • Proven proficiency performing CCRI/vulnerability assessment/penetration testing on networks, databases, computer applications and IT frameworks. • Strong analytical and problem-solving skills for resolving security issues. • Strong skills implementing and configuring networks and … of DOD security regulations, DISA STIGs. • Strong knowledge of SCAP • Strong knowledge of RMF • Excellent knowledge of and proficiency with: o VULNERATOR o USCYBERCOM CTO Compliance Program o Wireless vulnerability assessment o Web Services (IIS, Apache, Proxy) o Database (SQL Server, Oracle) o Email Services (Exchange) o Vulnerability Scans (NESSUS, SCCM) o Knowledge of Phishing exercises o USB More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Team Leader

England, United Kingdom
Flamingo Land
prioritise tasks as part of the IT team Previous 1st and 2nd Line support experience Problem solver with the ability to generate new ideas and bring them to the management team Essential Skills/Knowledge Good understanding of IT & network security best practices Able to identify and escalate potential security threats in line with department procedures Working knowledge of … patch and vulnerability management Excellent support experience with Windows 10 and above Windows Server (2016 and above) administration and maintenance Active Directory and group policy experience Experience supporting IT hardware including Servers, Desktops, Laptops, etc. Knowledge of network communication protocols such as TCP/IP, DNS & DHCP Experience working with WAN, LAN, and wireless environments Strong technical and … V & Failover Cluster environments Endpoint protection tools, firewalls, antivirus/SIEM/EDR solutions Knowledge of SAN technologies SQL Server & T-SQL understanding Linux server administration Experience with resort management tools Knowledge of Google Workspace environment Day-to-day duties Lead a team of on-site support technicians, serve as an escalation point for technical support, and work closely More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber & Information Security Manager

Maidstone, England, United Kingdom
Hybrid / WFH Options
Payter B.V
security requirements and oversight for software, cloud infrastructure, and internal IT projects Harden cloud environments and internal IT systems against attacks and vulnerabilities Implement and manage security assessment tools (vulnerability management, SIEM) across all environments Lead comprehensive penetration testing program for payment applications, infrastructure, and internal systems Risk Management & Compliance Perform regular internal security audits and policy … international scale-up, shaping the future in a booming market where you can have impact and growth opportunities. Technical skills: Security Technologies & Tools ● Experience with SIEM solutions ● Proficiency with vulnerability management platforms ● Knowledge of container security solutions ● Experience with secret management solutions Cloud & Infrastructure Security ● Expertise in GCP IAM, security controls, and compliance frameworks ● Experience with infrastructure … services ● Understanding of zero trust network architecture principles Application Security ● Understanding of secure coding practices and code review techniques ● Knowledge of secure CI/CD pipeline implementation Compliance & Risk Management ● Experience implementing security controls for multiple compliance frameworks simultaneously ● Knowledge of payment technologies and standards ● Experience with security risk quantification methodologies ● Understanding of data privacy regulations beyond PCI (e.g. More ❯
Posted:

Cyber & Information Security Manager

London, England, United Kingdom
Hybrid / WFH Options
PAYTER
security requirements and oversight for software, cloud infrastructure, and internal IT projects Harden cloud environments and internal IT systems against attacks and vulnerabilities Implement and manage security assessment tools (vulnerability management, SIEM) across all environments Lead comprehensive penetration testing program for payment applications, infrastructure, and internal systems Risk Management & Compliance Perform regular internal security audits and policy … international scale-up, shaping the future in a booming market where you can have impact and growth opportunities. Technical skills: Security Technologies & Tools • Experience with SIEM solutions • Proficiency with vulnerability management platforms • Knowledge of container security solutions • Experience with secret management solutions Cloud & Infrastructure Security • Expertise in GCP IAM, security controls, and compliance frameworks • Experience with infrastructure … services • Understanding of zero trust network architecture principles Application Security • Understanding of secure coding practices and code review techniques • Knowledge of secure CI/CD pipeline implementation Compliance & Risk Management • Experience implementing security controls for multiple compliance frameworks simultaneously • Knowledge of payment technologies and standards • Experience with security risk quantification methodologies • Understanding of data privacy regulations beyond PCI (e.g. More ❯
Posted:

Information Security Engineer

London, England, United Kingdom
LexisNexis UK
security posture of our commercial business units in alignment with the ISO-27001 security framework. The ideal candidate will have practical experience in various information security responsibilities, such as vulnerability management, infrastructure hardening, security investigation, and security governance. This role requires an inquisitive personality with problem-solving capabilities to guide and support our commercial business unit's security … posture in enabling our customer's needs. Responsibilities Review and analyse outputs from Qualys, or equivalent, vulnerability and compliance scans. Actively monitor and respond to alerts from our SIEM (Security Information and Event Management) platform. Monitor and react to activity from Antivirus and EDR (Endpoint Detection and Response) tools. Define and document security requirements for new development efforts. More ❯
Posted:

Program Manager, Regional Risk and Compliance

London, England, United Kingdom
Google
powered advice on this job and more exclusive features. Bachelor's degree or equivalent practical experience. 5 years of experience in program management. 5 years of experience with risk management or compliance in regulated industries (i.e., financial services, public sector, healthcare). 5 years of experience in program definition and management with a focus on audit compliance or … cloud compliance. Minimum qualifications: Bachelor's degree or equivalent practical experience. 5 years of experience in program management. 5 years of experience with risk management or compliance in regulated industries (i.e., financial services, public sector, healthcare). 5 years of experience in program definition and management with a focus on audit compliance or cloud compliance. Preferred qualifications … cross-functional or cross-team projects. Experience in one or more of the following: data protection, threat modeling, incident/emergency response, security risk mitigation or evaluation, OS hardening, vulnerability management, pen testing, access management, or cryptographic concepts. Experience with ISO 27k family, SOC reports, PCI DSS, FedRAMP, or equivalent information security and privacy compliance certifications. Experience More ❯
Posted:

Lead Cyber Security Analyst (6 month FTC)

London, England, United Kingdom
Simply Business
including security monitoring, incident detection, analysis, and response establishing and documenting robust processes and workflows oversee the continuous improvement and development of security tools and technologies e.g. NDR, EDR,Vulnerability and Exposure Management, SIEM and SOAR work closely with business owners, to proactively identify and reduce cyber security threats and vulnerabilities We’re looking for someone who is … a security operations environment able to showcase a strong understanding of cyber security concepts, technologies, and best practices proven to manage and communicate effectively with diverse stakeholders, including executive management experienced overseeing security tools and technologies (SIEM, IDS/IPS, EDR, vulnerability management) able to work with cloud environments exposure to threat modelling (We know it’s More ❯
Posted:

Senior Security Engineer

Alton, England, United Kingdom
LexisNexis
security posture of our commercial business units in alignment with the ISO-27001 security framework. The ideal candidate will have practical experience in various information security responsibilities, such as vulnerability management, infrastructure hardening, security investigation, and security governance. This role requires an inquisitive personality with problem-solving capabilities to guide and support our commercial business unit's security … posture in enabling our customer's needs. Responsibilities Review and analyse outputs from Qualys, or equivalent, vulnerability and compliance scans. Actively monitor and respond to alerts from our SIEM (Security Information and Event Management) platform. Monitor and react to activity from Antivirus and EDR (Endpoint Detection and Response) tools. Define and document security requirements for new development efforts. More ❯
Posted:

Senior Product Manager (RMM)

London, England, United Kingdom
Acronis
ready to join our mission in creating a #CyberFit future! Our Cybersecurity Product Team is seeking an energetic, growth-oriented Senior Product Manager for Acronis RMM (Remote Monitoring and Management), a solution encompassing endpoint management, network monitoring, M365 security posture, SaaS security posture, and Center for Internet Security (CIS) compliance. As a key member of the product management … understanding of international regulatory compliance for MSPs is highly desirable. WHAT YOU'LL DO Shape Product Strategy : Assist in defining the vision and strategy for Acronis RMM, including endpoint management, network monitoring, M365 security posture, SaaS security posture, and compliance management, aligning with business goals and market trends. Engage Stakeholders : Collaborate with MSPs, customers, and internal teams to … performance and guide product iterations. Present insights and updates to stakeholders. Be a Product Advocate : Promote product features and benefits to clients and internal teams. WHAT YOU BRING Product Management Experience : 3+ years in product management, focusing on security, compliance, or IT governance tools, with a proven ability to identify opportunities and deliver impactful products. Expertise in Development More ❯
Posted:

Senior Cyber Security Analyst

Oak Brook, Illinois, United States
Ace Hardware Corporation
Ace Hardware corporate IT environment. What you'll do Build, test, support and improve the IT security infrastructure by: Reviewing security events for threats and risks Identifying and remediating vulnerability risks within the IT infrastructure Performing compliance analysis to maintain a secure architecture Providing hands on support, update and implementation activities for infrastructure components as necessary Interacting with business … security architecture and technologies typically implemented that protect networks from threats and vulnerabilities Skills & Competency Requirements 1 to 2 years of Microsoft Sentinel experience, including deployment, configuration and component management (Log Analytics workspace, Data Connectors, Analytics rules, Playbooks, etc.) Proficiency in Kusto Query Language (KQL) for creating custom queries and detection rules Fundamental engineering technical skills with Microsoft Active … Directory and authentication technologies Familiarization with engineering and administration concepts relating to access management, Network firewall administration, vulnerability management and end point security technologies Fundamental understanding of network infrastructure concepts, technologies, protocols, and solutions Experience in implementing and supporting engineering projects from inception to implementation Ability to identify, develop and document processes and procedures Demonstrated personal skills More ❯
Employment Type: Permanent
Salary: USD 45 Hourly
Posted:

Sr. Network Engineer

Watford, England, United Kingdom
Insight Global
Role Overview As a Senior Network Engineer, you will be responsible for the design, implementation, management, and optimization of customer network environments, with a strong focus on network security and high availability. You will work closely with international teams to support operations across Europe, with regular travel to our European headquarters in Vienna, Austria. The ideal candidate will bring … manage firewalls (Palo Alto, Cisco), routers and switches (HPE, Cisco). Support and maintain Retail WAN networks using MPLS technology. Work closely with Security Operations (SecOps) team to ensure vulnerability management is maintained. Provide technical leadership in network-related projects, including capacity planning, upgrades, and security enhancements. Monitor network performance, troubleshoot issues, and implement proactive solutions to minimize More ❯
Posted:

Security Engineer, Governance, Risk and Compliance

London, United Kingdom
Duffel
to fostering a culture of security awareness and operational excellence, directly impacting the company's ability to achieve its ambitious goals. Spearhead the development of Duffel's Information Security Management System (ISMS) and guide the organisation through SOC 2 certifications. Implement and continuously improve security policies and technical controls, ensuring alignment with industry best practices and operational excellence. Monitor … de-identification, and data lifecycle management. Develop and execute internal audit programs, and effectively respond to external audits and due diligence requests. Leverage your technical knowledge to define risk management plans, secure vendor solutions and meet third party requirements. Actively contribute to Duffel's security awareness program, fostering a strong security culture throughout the organisation. Manage Vendor Security Assessment … operations and drive continuous improvement of these processes. Support the implementation and enhancement of Incident Management and Vulnerability Management policies. Partner with our Legal team to ensure security practices align with legal and regulatory requirements, particularly concerning data privacy and protection. What we're looking for in you: Strong software and cybersecurity technical background, including experiences with More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Vulnerability Management
10th Percentile
£39,500
25th Percentile
£49,813
Median
£60,000
75th Percentile
£78,750
90th Percentile
£92,500