Vulnerability Scanning Jobs

26 to 50 of 87 Vulnerability Scanning Jobs

IT Security Engineer

Stockport, England, United Kingdom
MBA
ideal candidate will have hands-on experience with security tools such as Trend Anti-virus, Cloudflare, Email filtering, Microsoft 365 security, and Nessus Tenable scanning solutions. As part of our clients Cloud first strategy, you must have a strong working knowledge of Amazon Web Services (AWS) and be proficient … IT Security Engineer: Manage and administer day-to-day security tools, including Trend Anti-virus, Forescout, Email filtering, Microsoft 365 security, and Nessus Tenable scanning solutions. Maintain a strong working knowledge of AWS services and manage security aspects related to AWS, such as Active Directory, Entra, etc. Align company … access policies with the Zero Trust networking model, using SASE technologies like Cloudflare. Regularly review vulnerability scanning tool outputs and oversee the remediation process with multiple teams. Ensure compliance with our clients security policies, including ISO27001 requirements and customer-specific security requirements. Collaborate with cross-functional teams to more »
Posted:

Security Engineer

United Kingdom
Hybrid / WFH Options
Secure Source
identifying vulnerabilities, enhancing security measures, and ensuring the safety of our clients’ digital environments. Your responsibilities will span a wide range of tasks, from vulnerability scanning to technical content creation. Responsibilities: Vulnerability Detection and Automation: Collaborate with our security team to scan customer systems for critical vulnerabilities. … Develop new vulnerability checks using tools like Nuclei. Curate crowd-sourced checks for inclusion in our Intruder platform. Automate penetration testing processes to scale across multiple clients simultaneously. Rapid Response and Custom Scanning: Conduct custom scans on customer targets to identify emerging critical weaknesses. Provide rapid response solutions … Occasionally participate in industry events and conferences. Qualifications and Experience: Industry Experience: Minimum of 2 years in offensive security roles. Proven track record in vulnerability assessment and penetration testing. Educational Background: Technical academic background in software engineering or cyber security. Certifications (One or More): OSCP OSWE OSEP CRT CCT more »
Posted:

DevSecOps Engineer

East London, London, United Kingdom
Hybrid / WFH Options
MECS Communications Ltd
day London office, 4 days remote working, work from home Key Skills: Continuous Integration (CI), Continuous Deployment (CD), Infrastructure as Code (IaC), Security Automation, Vulnerability Management, Threat Intelligence, Secure Software Development Lifecycle (SSDLC), Compliance as Code, Security Orchestration, Container Security, Microservices Security, Threat Modelling, Secure Configuration Management, Secure DevOps … Practices, Security Scanning & Testing, Security Incident Response, Identity & Access Management (IAM), Secure Cloud Environments, Secure Code Reviews Nature: Permanent, Full Time Hours: Monday - Friday 09.00 -17.30 Gross pay rate: £55,000 - £70,000 basic + 20% bonus, Health Care, Discounts & other benefits Key Activity: * Develop & Deploy Security Protocols … to integrate security best practices into our DevOps processes. * Collaborate with application development teams to refine logging processes for valuable insights. * Automate security testing & vulnerability scanning within our CI/CD pipelines. * Conduct regular security assessments & audits to identify & mitigate risks. * Respond to security incidents & conduct post-incident more »
Employment Type: Permanent, Work From Home
Salary: £65,000
Posted:

Systems Administrator - Cyber Security

Reading, Pennsylvania, United States
Penske Truck Leasing
including reliability, performance, recoverability and security for applications/solutions. You will maintain network, server and workstation firewall protection and provide network and application scanning, security logging, and intrusion detection capabilities. You will also provide security reviews and define security models for new systems. Penske Responsibilities: Responsible for daily … for new systems. Analyze and recommend security products based on their performance. Maintain network, server and workstation firewall protection and provide network and application scanning, security logging, and intrusion detection capabilities Audit access to mission critical applications and to maintain compliance documentation for SOX and PCI. Analyze and review … Proxy Filtering (e.g. Blue Coat Proxy). Centralized Log configuration and analysis(e.g. Splunk). IDS/IPS configuration and analysis. SSO Infrastructure Network Vulnerability Scanning (e.g. Nessus/Tenable). Advanced User Authentication Structures (e.g. Cisco ACS and RSA ACE servers). OS Hardening and Security: IBM more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Security Engineer (IT/OT)

Reading, Berkshire, South East, United Kingdom
Sanderson Recruitment
security technologies, such as firewalls, intrusion detection/prevention systems, SIEM, antivirus, and data loss prevention. Experience with security assessment tools and techniques, including vulnerability scanning and penetration testing. Proven experience as an IT Security Engineer with exposure to OT security - Claroty For more details, please reach out more »
Employment Type: Permanent
Posted:

Cyber Security Manager

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Head Resourcing
team engagements to tune and validate detection tooling. Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetration testing, and vulnerability scanning. Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams. Manage the delivery of daily more »
Posted:

Senior Cyber Security Analyst

Norwich, England, United Kingdom
Workday
management, application security & cloud security and associated compliance frameworks such as SOX, PCI-DSS etc. Previous use of security technologies (firewalls, WAFs, DLP, cryptography, vulnerability scanning, identity and access management, etc). The ability to carry out threat modelling, vulnerability assessment, control effectiveness review and risk assessment more »
Posted:

IT Security Specialist

Leeds, West Yorkshire, Yorkshire, United Kingdom
OpenTech Partners
ISO 27001, 27002, as well as regulations such as the Data Protection Act and GDPR Proficiency in Microsoft O365 Security solutions, networking, security operations, vulnerability management, and security auditing Solid grasp of security testing principles, including hands-on experience with vulnerability scanning, risk identification, resolution, and reporting more »
Employment Type: Permanent
Salary: £65,000
Posted:

Cyber Threat & Vulnerability Lead

London Area, United Kingdom
La Fosse
About this Role Role Title: Threat & Vulnerability Lead Location: UK- London La Fosse Associates are working with a global Insurance business who are looking to add a Threat & Vulnerability Lead to their strong internal security function. You will report directly into the BISO and be a senior individual … within their existing team. You will be joining the UK entity of their Security team to lead on vulnerability scanning and threat intelligence reporting. They are a large organisation with a huge amount of vulnerabilities and need somebody who understands how to approach on this scale. You will … in the business to ensure security is prioritised Work on and lead penetration tests across the global estate Requirements: Hands on experience working with vulnerability management technology- preferably Qualys Direct experience working within a regulated in-house security team Understanding and knowledge of different security frameworks- MITRE ATT&CK more »
Posted:

Cloud Engineer

WA1, Higher Walton, Warrington, Cheshire, United Kingdom
PAM Group Ltd
technical IT projects ·Experience with O365/M365 Administration including Intune/Endpoint Manager, PowerShell, Power Apps. Experienced with security controls such as SIEM, Vulnerability Scanning, Server and Client Security, SASE solutions and CloudFront/AWS WAF Good working knowledge of PowerShell and Automation tools Good knowledge of more »
Employment Type: Permanent
Salary: £42000/annum
Posted:

Senior Technical Architect

Warrington, Cheshire, North West, United Kingdom
National Nuclear Laboratory
including Hyper-V and VMWare. Practical experience in Storage Solutions, Backup and Replication Services (DFS, VEEAM, ASR). Experienced with security controls including SIEM, Vulnerability Scanning, Server and Client Security, ZScaler and Microsoft Defender for Cloud. Demonstrable experience of similar position/role or working within established architecture more »
Employment Type: Permanent
Salary: £60,000
Posted:

Junior SOC Engineer

Nottingham, Nottinghamshire, United Kingdom
Proactive Appointments
cyber security architecture. - Deliver subject matter expertise to key stakeholders to drive the implementation of security controls to meet the target architecture. - Accountable for vulnerability scanning, including the prioritisation of unpatched vulnerabilities and reporting against agreed KPIs and KRIs. - Support the annual penetration testing schedule by arranging penetration … improvement work to automate and improve critical cyber security processes such as monitoring, patching, and hardening. - Develop and maintain process documentation for security architecture, vulnerability management, cyber incident response, and playbooks. - Provide security representation across multiple geographies, business units and teams to achieve objectives, including engagement with the Information more »
Employment Type: Permanent
Posted:

Information Security Officer

Nationwide, United Kingdom
Hybrid / WFH Options
Distinct Consultancy
Officer & wider compliance team to promote good security practices amongst stakeholders. The successful candidate will cover the full information security spectrum, from questionnaires to vulnerability management & everything in between. Main duties include: Be approachable and provide subject matter expert knowledge to colleagues, increasing their awareness of good security practices … within the group to ensure all accreditation requirements are fulfilled and any remediations are tracked through to completion Day-to-day management of the vulnerability management programme Review applications, suppliers, and proposed features from a security perspective What We Are Looking For The Information Security Officer will be an … high performing organisation. Ideally you will be/have: Experience in an Information Security role or similar Knowledge of information security good practice and vulnerability management programmes Demonstrable experience in an information security and privacy management environment, identifying risks and proposing viable solutions Broad understanding of security policies and more »
Employment Type: Permanent
Salary: £40000 - £48000/annum + Annual Bonus
Posted:

Information Security Engineer - Hybrid- £90K

Greater London, England, United Kingdom
Hybrid / WFH Options
Oliver Bernard
Great experience with PCI DSS. Good SIEM knowledge (Splunk is ideal) Great understanding of logs and log events across Linux, Windows, AWS, AV and Vulnerability scanning etc Good experience of Security Operations (SOC) Ideally a solid infrastructure understanding - Linux, networking, DevOps TCP/IP, Cloud etc Information Security more »
Posted:

Lead Cyber Security Consultant

United Kingdom, London
Ncounter
five case model would be a plus and certifications such as: CCP, CISMP, CISSP, Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master's degree or alternatively STEM degree are needed with an ability to more »
Employment Type: Permanent
Salary: £100,000 - £120,000
Posted:

Application Security Manager

Greater London, England, United Kingdom
Reward Gateway
individual will be the key enabler between security, product, and engineering teams. You will need to understand security requirements from a variety of outputs (vulnerability scanners, pen testing, code scans, regulatory requirements), triage and prioritize the findings, and then work with Product Managers to implement changes to improve the more »
Posted:

Network Security Engineer

Manchester Area, United Kingdom
Cloud Decisions
and maintain security measures across the Network infrastructure Reviewing network configurations and device hardening Ensuring compliance with industry best practice Development and maintenance of vulnerability management programs (Pen-testing, risk assessment, remediation planning) Designing and implementing network segmentation strategies to enhance network security and isolate sensitive data Conducting and … organising security assessments including vulnerability scanning and penetration testing Providing expert guidance on security related alerts and incidents Key Experience: experience in network security engineering (Cisco & Fortinet experience desired) with access control, VLANS and network segmentation techniques with pen-testing frameworks, security assessments and scanning tools to more »
Posted:

Senior IT Executive

Greater London, England, United Kingdom
Hybrid / WFH Options
Premier Group Recruitment
management (LAN/WAN/Wi-Fi/Mobile) Solid understanding of IT security practices (email security, anti-virus/endpoint protection, patch management, vulnerability scanning, network security, MFA, SSO, DLP, etc.) Commitment to data security and privacy (GDPR, UK Data Protection Act, and Cyber Essentials Plus) Excellent more »
Posted:

IT Systems Administrator

Winchester, England, United Kingdom
MFK Recruitment
desktops, physical and virtual servers Network services, firewall, switches, wireless and network access control Network storage and backup Cloud services System and network analysis, vulnerability scanning, health monitoring and logging services. To act as higher-tier support to our team of IT Technicians, however excellent customer service skills more »
Posted:

Technical Supply Chain Risk Consultant

Cardiff, South Glamorgan, Wales, United Kingdom
Hybrid / WFH Options
Hays
and implement risk treatment plans. - Support Project Manager and Cyber Risk Consultant in delivery of project activities. - Scope, Arrange and Support penetration testing and vulnerability testing. - Support development of Supply Chain Security Policy and Processes. SKILLS - Extensive security risk management knowledge. - Experience with SIEM Monitoring, AV, DDoS Protection, vulnerability scanning and EDR. - Knowledge of authentication and authorisation techniques, network sniffing and working with remote access technologies. - Familiarity with NIST Cybersecurity Framework, CIS Critical Security controls, and ISO27001. What you need to do now If you're interested in this role, click 'apply now' to forward an up more »
Employment Type: Contract, Work From Home
Rate: £500.0 - £550.0 per day + £500-£550 Per Day Inside IR35
Posted:

Technical Supply Chain Risk Consultant

Cardiff, South Glamorgan, United Kingdom
Hays Technology
and implement risk treatment plans. - Support Project Manager and Cyber Risk Consultant in delivery of project activities. - Scope, Arrange and Support penetration testing and vulnerability testing. - Support development of Supply Chain Security Policy and Processes. SKILLS - Extensive security risk management knowledge. - Experience with SIEM Monitoring, AV, DDoS Protection, vulnerability scanning and EDR. - Knowledge of authentication and authorisation techniques, network sniffing and working with remote access technologies. - Familiarity with NIST Cybersecurity Framework, CIS Critical Security controls, and ISO27001. What you need to do now If you're interested in this role, click 'apply now' to forward an up more »
Employment Type: Contract
Rate: £500 - £550/day £500-£550 Per Day Inside IR35
Posted:

Physical Embedded and Control Systems Security - Technical

Washington, Washington DC, United States
Department of Homeland Security
and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with … other experts in cybersecurity risk assessment, automated information sharing, threat analysis, vulnerability management, and network defense to enable holistic, integrated views of security threats to an organization, the Department, or the nation's security posture Applying knowledge of computer-controlled systems that monitor and impact industrial processes across physical more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Physical Embedded and Control Systems Security - Technical

Pensacola, Florida, United States
Department of Homeland Security
and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with … other experts in cybersecurity risk assessment, automated information sharing, threat analysis, vulnerability management, and network defense to enable holistic, integrated views of security threats to an organization, the Department, or the nation's security posture Applying knowledge of computer-controlled systems that monitor and impact industrial processes across physical more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Physical Embedded and Control Systems Security - Technical

Idaho Falls, Idaho, United States
Department of Homeland Security
and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with … other experts in cybersecurity risk assessment, automated information sharing, threat analysis, vulnerability management, and network defense to enable holistic, integrated views of security threats to an organization, the Department, or the nation's security posture Applying knowledge of computer-controlled systems that monitor and impact industrial processes across physical more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Physical Embedded and Control Systems Security - Technical

Arlington, Virginia, United States
Department of Homeland Security
and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with … other experts in cybersecurity risk assessment, automated information sharing, threat analysis, vulnerability management, and network defense to enable holistic, integrated views of security threats to an organization, the Department, or the nation's security posture Applying knowledge of computer-controlled systems that monitor and impact industrial processes across physical more »
Employment Type: Permanent
Salary: USD Annual
Posted:
Vulnerability Scanning
10th Percentile
£39,300
25th Percentile
£46,250
Median
£60,000
75th Percentile
£80,000
90th Percentile
£82,500