Vulnerability Management Jobs with Hybrid or Work from Home (WFH) Options

1 to 25 of 58 Vulnerability Management Jobs with Hybrid or WFH Options

Cloud Infrastructure Engineer

Bath, England, United Kingdom
Hybrid / WFH Options
Peaple Talent
Azure Landing Zones Azure architecture Azure Entra ID (Enterprise applications, conditional access etc.) Azure storage accounts Azure Virtual Machines Azure performance, security, and cost management MS365 Applications with certification and/or demonstrable experience of: Sharepoint MS Exchange Online On-prem infrastructure experience including: Building and configuration of MS … Windows Servers Active Directory domain knowledge Hypervisor virtualisation management (ideally VMWare) Backup solutions (ideally VEEAM) Infrastructure performance monitoring Additional Technologies: Vulnerability Management SIEM Technologies Powershell Infrastructure As Code (ideally Terraform and Ansible) Essential Desirable Knowledge and Experience: SQL Networking experience (Cisco switch, firewalls) Cisco Umbrella Nutanix Hyperconverged more »
Posted:

IT Infrastructure Security Engineer

Greater Cheshire West and Chester Area, United Kingdom
Hybrid / WFH Options
psd group
take ownership of identifying signs of compromise in cyber security services, IT systems, and related infrastructure. This will be a hands-on approach to vulnerability management reduction across all IT Systems and you will work with the SOC to assist in the coordination and management of cyber … log storage are provided to the Cyber Security team. Working alongside the Cyber Security Team, take ownership and develop a hands-on approach to vulnerability and threat management reduction across all IT Systems. Monitor changes in cyber security threats, and appropriately respond to changes in threat profile. Identify … requests, use of new software or hardware facilities and report findings to the Cyber Security Team. Take ownership and a hands-on approach to vulnerability management reduction across all IT Systems Essential Skills & Experience: Experience with analysing event logs and recognizing cyber intrusions or attacks. Experience using tools more »
Posted:

Security Operations Specialist

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerability management platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
Posted:

IT Systems Administrator

Bath, England, United Kingdom
Hybrid / WFH Options
Peaple Talent
as a System Administrator, Infrastructure Engineer, or similar role at a minimum of 2nd line level. MS Azure knowledge, with experience of: Entra ID Management Azure storage accounts Azure Virtual Desktop (AVD) Azure Virtual machine management MS Exchange Management (Ideally Exchange Online) On-premises infrastructure experience including … Building and configuration of MS Windows Servers Active Directory domain knowledge Hypervisor virtualisation management (ideally VMWare) Backup solutions (ideally VEEAM) Desirable: Knowledge and experience of: MS 365 applications e.g. SharePoint, Teams, OneDrive, etc. SSL certificate management Vulnerability management SIEM experience (Ideally MS Sentinel) Infrastructure As Code more »
Posted:

Vulnerability REG Remediation Lead ( Remote)

Atlanta, Georgia, United States
Hybrid / WFH Options
Cognizant
V ulnerability REG Remediation Leader Location : Atlanta GA/Remote Roles and responsibilities :- • Business Acumen: Expert knowledge of vulnerability management and the stakeholders engaged to deliver it • Best Practices: Proven track record of implementing FFIEC, NIST and CRI frameworks to assess gaps and deploy solutions • Business Outcomes: Experience … Prepares, orchestrates, and presents complex messages in simple terms to IT, business and regulatory leaders SNo Primary Skill Proficiency Level Rqrd./Dsrd. 1 Vulnerability Management PL1 Required 2 Networking PL4 Required 3 Qualys PL4 Required 4 Cyber Security & Cloud PL1 Required 5 Oracle Linux PL4 Desired Salary more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Risk and Compliance Engineer

Bellevue, Washington, United States
Hybrid / WFH Options
The Pokémon Company International
International The Pokémon Company International, a subsidiary of The Pokémon Company in Japan, manages the property outside of Asia and is responsible for brand management, licensing, marketing, the Pokémon Trading Card Game, the animated TV series, home entertainment, and the official Pokémon website. Pokémon was launched in Japan in … with internal and external stakeholders to resolve compliance issues. Maintain up-to-date knowledge of industry regulations and trends. Prepare and present reports to management on overall compliance status. Provide security expertise and consulting to partner teams in Tech and across the enterprise. Alongside the Information Security team, responsible … or similar enterprise applications. Experience with securing technology solutions relating to a company's supply chain. Strong knowledge in the application of Identity & Access Management, Segregation of Duties, and Least Privilege concepts. Familiarity with process improvement methodology. Up to date with security attacks and latest security research. Excellent analytical more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Tenable Nessus Vulnerability Management Scanning Engineer

England, United Kingdom
Hybrid / WFH Options
GlobalLogic
Tenable Nessus Vulnerability Management Scanning Engineer GlobalLogic have a new role for an Vulnerability Management Scanning Enginee r with Tenable Nessus expertise. This role is working INSIDE IR35 for an initial 6 months and will be a Hybrid working pattern, 2 days per week onsite at … either Cheshire or Glasgow offices. Any Banking or financial services experience would be an advantage. The core skill is Tenable Nessus Vulnerability Management, and we are looking for someone who can be responsible for maintaining the Tenable product suite and ensure meeting scanning coverage across the organisation .The … ideal candidatehas the following skills and expertise: years of experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues years of experience with performing systems administration in Windows, Linux, VMware environments, including performing troubleshooting, installation or configuration more »
Posted:

Vulnerability Management Installation and configuration Engineer

England, United Kingdom
Hybrid / WFH Options
GlobalLogic
Vulnerability Management (TVM) Installation and configuration Engineer GlobalLogic have a new role for an Installation and configuration Enginee r with Tenable Nessus expertise ideally. This role is working INSIDE IR35 for an initial 6 months and will be a Hybrid working pattern, 2 days per week onsite at … to someone with either CyberArk or Splunk and we are looking for someone who has the following skills and expertise: years of experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues in the design and implementation … controls to secure systems, applications, network, or infrastructure services experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. understanding of TCP/IP networking concepts and DNS./Unix/Windows Operating systems experience years of related more »
Posted:

Cyber Security Analyst

United Kingdom
Hybrid / WFH Options
Franklin Fitch
measures, monitoring for security incidents, and responding promptly to security breaches. As a Cyber Security Analyst you will be gain exposure across: Security Infrastructure Vulnerability Management Incident Response Ideally you will have experience across: Security principles, techniques, and protocols Endpoints, servers, infrastructure and networking technologies Experience in supporting … security systems, including vulnerability management, SIEM, DLP,SOAR, EDR solution, Network Firewalls etc The client is based in London, however will consider candidates on a remote basis. Sound interesting? Click apply now and I will be in touch to discuss further more »
Posted:

Head of Information Security

Reading, England, United Kingdom
Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
Posted:

Senior Security Engineer

London Area, United Kingdom
Hybrid / WFH Options
Cognitive Group | Part of the Focus Cloud Group
tools such as Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerability management, and penetration testing. Risk Management and Compliance Identify and assess security risks and develop mitigation strategies. Ensure compliance with relevant security more »
Posted:

Cyber Security IT Analyst

England, United Kingdom
Hybrid / WFH Options
Larbey Evans
latest security principles, techniques, and protocols Detailed technical knowledge related to endpoints, servers, infrastructure and networking technologies Strong experience in supporting security systems, including vulnerability management, SIEM, DLP,SOAR, EDR solution, Network Firewalls etc. Working knowledge of IT processes (i.e., ITIL) including incident, problem, defect, change and release … management The Cyber Security IT Analyst requirements: 3+ years’ experience in Cyber Security IT operations (law firm preferable, professional services advantageous) Bachelor’s degree or higher in Computer Science or Information Security (essential) Advanced ability to organize, prioritize, coordinate, and work as part of a team Excellent written and more »
Posted:

InfoSec Analyst I

London, United Kingdom
Hybrid / WFH Options
MongoDB
The worldwide data management software market is massive (According to IDC, the worldwide database software market, which it refers to as the database management systems software market, was forecasted to be approximately $82 billion in 2023 growing to approximately $137 billion in 2027. This represents a 14% compound … reflect the current state of MongoDB’s productsCoordinate responses to high-profile supply chain eventsRequirementsBasic understanding of the following security concepts: encryption, access controls, vulnerability management, SSDLC, incident response, and business continuity/disaster recovery as they apply in a cloud environmentBasic understanding of the following cloud networking more »
Salary: £ 70 K
Posted:

Cyber Security Consultant

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
one or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identity and access management , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and negotiating technical outcomes … with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group – Carbon positive tech recruitment more »
Posted:

Information Security Consultant

Romsey, England, United Kingdom
Hybrid / WFH Options
CBSbutler Holdings
to a wide range of defence clients. You will contribute to the development of security capabilities ranging from Security & Assurance services to leading edge Vulnerability Management and Protective Monitoring capabilities. Based in Romsey/Gloucester (Remote working available) £55,000 - £60,000 per annum + 6% bonus Must … be eligible for Security Clearance Key Responsiblities: Production and maintenance of security documentation including, Secure by Design Documentation, Security Management Plans, RMADS, Security Operating Procedures, Security Cases and Test Security Instructions (TSI). Coordinate Security Risk Analysis and Management activity to support design and accreditation of solutions. This … includes creation and maintenance of the security risk register and management of Risk Balance Cases. Supporting the team lead in the development and deployment of cyber services. Acting as the Security SME for proposals and ITT/ITN responses. Working as part of an Integrated Delivery Team including: Technical more »
Posted:

Information Security Officer

Farnborough, England, United Kingdom
Hybrid / WFH Options
Shaw Daniels Solutions
with stakeholders, to uncover emerging risks and opportunities for malicious actors. Produce written reports, status updates, actions, minutes to support decision making within the management systems governance programme. Conduct annual Business Impact Assessments with relevant teams Ensure and track that staff get the infosec training required Annual infosec and … the document review period. Compile a list of actions to address any lapses and track to conclusion. Assist with the monitoring of our platform vulnerability management systems and logging of identified vulnerabilities In the event of any security event, be part of the response team, by providing infosec more »
Posted:

Senior Cyber Security Analyst

Brighton, England, United Kingdom
Hybrid / WFH Options
Hays
infrastructure for the organisation. The role responsibilities: You will be supporting the Head of IT and Cyber Security with the day-to-day operational management of the cyber security function. You will work with the Senior Cyber Security Manager to define and evolve the cyber strategy across the organisation. … and analyse security incidents and breaches, and lead incident response efforts to contain and mitigate the impact in a timely manner. Reporting to senior management on Cyber related metrics and improvement needs. Foster a culture of security awareness and compliance amongst team members and stakeholders through training, education, and … initiatives. Leading any major cyber incidents should they arise. Escalating security concerns that are not being adequately addressed through the established risk/issue management framework. You will need: You will need to be able to influence and collaborate with other teams in the organisation, and the ability to more »
Posted:

Presales Consultant

Manchester Area, United Kingdom
Hybrid / WFH Options
GS Solutions
have worked within a Networking/Security setting recently. Experience solutioning Cisco, Fortinet, Juniper, Palo Alto, Netskope, Zscaler, CrowdStrike (At-least two or more) Vulnerability Management/EDR/DDoS/WAF/PAM – Beneficial MUST have an excellent understanding of current cyber security trends. more »
Posted:

Information Security Risk and Compliance Engineer

Renton, Washington, United States
Hybrid / WFH Options
The Pokémon Company International
International The Pokémon Company International, a subsidiary of The Pokémon Company in Japan, manages the property outside of Asia and is responsible for brand management, licensing, marketing, the Pokémon Trading Card Game, the animated TV series, home entertainment, and the official Pokémon website. Pokémon was launched in Japan in … with internal and external stakeholders to resolve compliance issues. Maintain up-to-date knowledge of industry regulations and trends. Prepare and present reports to management on overall compliance status. Provide security expertise and consulting to partner teams in Tech and across the enterprise. Alongside the Information Security team, responsible … or similar enterprise applications. Experience with securing technology solutions relating to a company's supply chain. Strong knowledge in the application of Identity & Access Management, Segregation of Duties, and Least Privilege concepts. Familiarity with process improvement methodology. Up to date with security attacks and latest security research. Excellent analytical more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Risk and Compliance Engineer

Redmond, Washington, United States
Hybrid / WFH Options
The Pokémon Company International
International The Pokémon Company International, a subsidiary of The Pokémon Company in Japan, manages the property outside of Asia and is responsible for brand management, licensing, marketing, the Pokémon Trading Card Game, the animated TV series, home entertainment, and the official Pokémon website. Pokémon was launched in Japan in … with internal and external stakeholders to resolve compliance issues. Maintain up-to-date knowledge of industry regulations and trends. Prepare and present reports to management on overall compliance status. Provide security expertise and consulting to partner teams in Tech and across the enterprise. Alongside the Information Security team, responsible … or similar enterprise applications. Experience with securing technology solutions relating to a company's supply chain. Strong knowledge in the application of Identity & Access Management, Segregation of Duties, and Least Privilege concepts. Familiarity with process improvement methodology. Up to date with security attacks and latest security research. Excellent analytical more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Risk and Compliance Engineer

Tacoma, Washington, United States
Hybrid / WFH Options
The Pokémon Company International
International The Pokémon Company International, a subsidiary of The Pokémon Company in Japan, manages the property outside of Asia and is responsible for brand management, licensing, marketing, the Pokémon Trading Card Game, the animated TV series, home entertainment, and the official Pokémon website. Pokémon was launched in Japan in … with internal and external stakeholders to resolve compliance issues. Maintain up-to-date knowledge of industry regulations and trends. Prepare and present reports to management on overall compliance status. Provide security expertise and consulting to partner teams in Tech and across the enterprise. Alongside the Information Security team, responsible … or similar enterprise applications. Experience with securing technology solutions relating to a company's supply chain. Strong knowledge in the application of Identity & Access Management, Segregation of Duties, and Least Privilege concepts. Familiarity with process improvement methodology. Up to date with security attacks and latest security research. Excellent analytical more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Risk and Compliance Engineer

Seattle, Washington, United States
Hybrid / WFH Options
The Pokémon Company International
International The Pokémon Company International, a subsidiary of The Pokémon Company in Japan, manages the property outside of Asia and is responsible for brand management, licensing, marketing, the Pokémon Trading Card Game, the animated TV series, home entertainment, and the official Pokémon website. Pokémon was launched in Japan in … with internal and external stakeholders to resolve compliance issues. Maintain up-to-date knowledge of industry regulations and trends. Prepare and present reports to management on overall compliance status. Provide security expertise and consulting to partner teams in Tech and across the enterprise. Alongside the Information Security team, responsible … or similar enterprise applications. Experience with securing technology solutions relating to a company's supply chain. Strong knowledge in the application of Identity & Access Management, Segregation of Duties, and Least Privilege concepts. Familiarity with process improvement methodology. Up to date with security attacks and latest security research. Excellent analytical more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security (Subject Matter Expert)

Oxford, Oxfordshire, South East, United Kingdom
Hybrid / WFH Options
Hays
infrastructure and enterprise servicesunderpinning our clients' programme activities. Their project portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral to the delivery of the cyber programme. … relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant information security/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder management skills. Knowledge of Information Security standards … Protection act 2018. Experience with a range of IT systems (bothon-premises and cloud-based). Knowledge of technical areas, such as antivirus,Networking, vulnerability management, encryption (Microsoft & Linuxenvironments are advantageous). Strong problem-solving ability, with flexibility tothink creatively and adapt to and implement constantly evolving systems more »
Employment Type: Contract, Work From Home
Rate: £450.0 - £500.0 per day + Up to £500 Per day
Posted:

Information Security Manager

Leatherhead, England, United Kingdom
Hybrid / WFH Options
Zest
to processing personal data with the highest level of diligence, and you’ll play a pivotal role in maintaining and enhancing our robust infosec management system, acquiring and upholding security certifications, fulfilling the role of our Data Protection Officer and ensuring we have appropriate controls to mitigate risk. You … Simultaneously, your comfort with detail will see you managing the day-to-day operations, keeping our platform and business secure. Key responsibilities Information Security Management & Certifications ISMS Oversight: Maintain and enhance Zest’s Information Security Management System. This includes maintaining documentation, conducting and documenting risk assessments, driving improvements … latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of security systems, controls and infrastructure. Incident Management: Take charge of the response to all information security and data protection incidents and collaborate with various business units to understand, document and learn more »
Posted:

Senior Cyber Security Lead - Cloud, Risk, Technical, Agile, leadership, SC Clearance, Hybrid.

London, United Kingdom
Hybrid / WFH Options
Bangura Solutions
requires a Senior Cyber Security Specialist to work alongside and lead the Cyber Defence team delivering cyber threat intelligence, threat detection, incident response, and vulnerability management capabilities for the organisation.you will be leading the defence function, by providing strategic direction and coordinating day-to-day delivery of threat … intelligence, threat detection, incident response, vulnerability management and ethical hacking capabilities identify and deliver opportunities for continual improvement of the cyber defence function brief senior stakeholders on the cyber threat to the organisation take a leadership role in the cyber security team, the organisation, and the government security … and risk management communitiesSkills and experience you should have a breadth of experience across cyber threat intelligence, detection, and response experience investigating, managing, and coordinating the response to, major cyber incidents have an in-depth understanding of the tools, techniques, and procedures used by threat actors Have experience taking more »
Salary: £ 70 K
Posted:
Vulnerability Management
Work from Home
10th Percentile
£42,547
25th Percentile
£52,500
Median
£61,050
75th Percentile
£80,000
90th Percentile
£115,000