Employer: DWS Group Title: Cyber Threat Intelligence and VulnerabilityManagement Specialist (VP) Location: London About DWS: Today, markets face a whole new set of pressures – but also a whole lot of opportunity too. Opportunity to innovate differently. Opportunity to invest responsibly. And opportunity to make change. Join us … and productive procedures, policies and processes are in place, and aligned and agreed with relevant stakeholders. Role Details: As a Cyber Threat Intelligence and VulnerabilityManagement Specialist you will (be): Lead the DWS Cyber Threat Intelligence and VulnerabilityManagement capability, liaising closely with the central Threat … VulnerabilityManagement function to provide relevant reports on threats to the sector; Tailor threat intelligence to the needs of a world-leading asset management firm operating across geographical regions; Provide threat intelligence to technical and non-technical stakeholders across tactical, operational, and strategic lines; Identify priority vulnerabilities more »
York, North Yorkshire, United Kingdom Hybrid / WFH Options
Concept Resourcing
Vulnerability Coordinator Location: [3 days a week in the office (York), 2 days a week work from home] Department: Cyber Security Type: Full-time Salary: £48,000 Reports To: Cyber Security Manager About the Role: Concept IT are seeking a skilled and proactive Vulnerability Coordinator to join our … Clients Cyber Security team. The ideal candidate will have extensive experience with Tenable One VulnerabilityManagement, Microsoft Defender Threat and VulnerabilityManagement (TVM) and the entire vulnerabilitymanagement lifecycle across various platforms (Windows, Linux, Applications, security appliances). Experience working with UK government or … NHS organisations is highly desirable. As a Vulnerability Coordinator, you will be responsible for identifying, assessing, and managing vulnerabilities to ensure the security and integrity of systems and data. Education: Associate degree in Computer Science, Information Security, or a related field (or equivalent experience). Experience: Minimum of more »
Milton Keynes, England, United Kingdom Hybrid / WFH Options
Proprius Recruitment
Manager, VulnerabilityManagement/SME/Lead is responsible for leading and coaching team of subject matter experts specialised in vulnerability management. Oversee and coordinate end-to-end vulnerabilitymanagement & security testing activities by collaboratively working with colleagues. Close collaboration with global Vulnerability Management. … Bi-directional feedback with technology & business teams. Create, develop and maintain operational procedures and processes in coordination with colleagues to ensure vulnerabilitymanagement services are clearly documented. Manager, VulnerabilityManagement/SME/Lead To £96,000 + Benefits + Bonus Hybrid Working x3 days a … for managing relationships with 3rd party penetration testing providers and hold them accountable to quality and SLA standards. Responsible for escalating and highlighting thematic vulnerability patterns to Threat Management team and involved in strategic risk reduction planning discussions. Responsible for measuring effectiveness and proposing tactical and strategic improvements more »
is part of a global technology organisation with a strong focus on cybersecurity. The ideal candidate will work across various cybersecurity areas such as vulnerabilitymanagement, endpoint security, and will collaborate with clients. No remote working is allowed for this position, and the candidate must have DV clearance. … requirement. 2. Endpoint Security Expertise: Strong background in cyber security, specifically in Endpoint Protection across a range of devices from laptops to IoT. 3. VulnerabilityManagement: Experience with tools used to detect and respond to vulnerabilities across an organisation, including research into CVEs (Common Vulnerabilities and Exposures). … of governance and compliance aspects related to cyber security. Desired Skills: * Analytical mindset to proactively find solutions to potential risks. * Ability to work with vulnerabilitymanagement tools and conduct research into vulnerabilities and their impacts. Role Overview: The position involves a mix of vulnerabilitymanagement and more »
Welwyn Garden City, England, United Kingdom Hybrid / WFH Options
PayPoint plc
overall delivery and strategic oversight of all PayPoint Group IT security systems and services. This includes providing leadership for the Security Operations Center (SOC), VulnerabilityManagement and Security teams, ensuring alignment with organizational goals. Collaborating closely with the managers of the respective departments within the team, the successful … security services across physical and cloud infrastructures, ensuring compliance with regulatory and organizational requirements. • Provide strategic leadership and oversight for the Security, SOC and VulnerabilityManagement teams, enabling their success through effective planning, guidance, and support. • Develop close working relationships with internal audit teams and act as the … and guide team members, fostering professional growth and building a high-performing security function. • Actively participate as a key member of the Cyber Security Management Team, contributing to the development and execution of the organization's cyber security strategy, policies, and initiatives. • Play a leading role in the response more »
Analyst Client: Banking Salary: £60,000-£75,000 + Bonus Location: London/Hybrid Skills: Information Security, Cyber Security, SIEM, EDR, Wireshark, Incident Response, VulnerabilityManagement The role: My client are seeking a knowledgeable Information & Cyber Security Analyst to join their team. This role is focused on the … will ideally have 5+ years experience working in Information/Cyber Security. The position is broadly split into a few core areas Incident Response VulnerabilityManagement SIEM Security Monitoring You will advise on Security best practices, and act as SME when assisting other teams. The ideal candidate will … have: Incident Response experience Security Monitoring experience VulnerabilityManagement experience Knowledge and understanding of technical Security tools: SIEM, EDR, DLP, Wireshark, Burp Suite etc. Understanding of threat modelling advantageous Investigation experience into Information and Cyber security incidents Broad technical understanding – Windows, Linux, Networks, VMware etc. Appreciation of GCIA more »
delivery and deployment of new features, enhancements, and fixes to customers. • Implement and enforce ITIL best practices, standards, and procedures for support, including incident management, problem management, change management, and knowledge management. • Proactively identify and recommend opportunities to improve processes, tools, and systems. • Build and maintain strong … and customers through regular engagement to enhance service delivery. • Collate records and generate reports on product and service performance, presenting findings to the senior management team. Customer and Employee Support: • Provide high-quality support to Feedback Medical's customers and staff via phone, email, and remote desktop, assisting both … Assist in problem investigations, including root cause analysis and prevention identification. Process and Compliance: • Comply with processes and procedures within Feedback Medical's Integrated Management System (IMS), which aligns with ISO 13485 quality management standards and ISO 27001 Information Security standards. • Work alongside the Information Security team to more »
Philadelphia, Pennsylvania, United States Hybrid / WFH Options
ISHPI Information Technologies, Inc
System Security Engineer ( ISSE ) support. These duties include but are not limited to: Assessment & Authorization (A&A) Cybersecurity Compliance and Audit Readiness Information Assurance VulnerabilityManagement (IAVM) Vulnerability Scanning and Remediation Application and Implementation of Security Technical Implementation Guides (STIGs) and Security Requirements Guide (SRGs) Shall assist … with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans which include System Categorization Forms, Platform Information Technology (PIT) Determination Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams, Privacy Impact Assessments … Identify and tailor IT and CS security control baselines based on RMF guidelines and categorization of the RMF boundary Perform Ports, Protocols, and Services Management (PPSM). Perform IT and CS vulnerability-level risk assessments. Execute security control testing as required by a risk assessment or annual security more »
Philadelphia, Pennsylvania, United States Hybrid / WFH Options
ISHPI Information Technologies, Inc
System Security Engineer ( ISSE ) support. These duties include but are not limited to: Assessment & Authorization (A&A) Cybersecurity Compliance and Audit Readiness Information Assurance VulnerabilityManagement (IAVM) Vulnerability Scanning and Remediation Application and Implementation of Security Technical Implementation Guides (STIGs) and Security Requirements Guide (SRGs) Shall assist … with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans which include System Categorization Forms, Platform Information Technology (PIT) Determination Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams, Privacy Impact Assessments … Identify and tailor IT and CS security control baselines based on RMF guidelines and categorization of the RMF boundary Perform Ports, Protocols, and Services Management (PPSM). Perform IT and CS vulnerability-level risk assessments. Execute security control testing as required by a risk assessment or annual security more »
top-notch OSS Solutions for network monitoring, performance optimization, and analytics. You will play a crucial role in supporting and managing IP & Data Network Management Systems, covering server hardware, operating systems, applications, backup solutions, and UAM. This hybrid position allows you to work from home, Magdalene offices, or the … customer offices and data centers. As part of Magdalene's Professional Services, you will collaborate closely with Network Security Engineers, Network Engineers, the Network Management Centre, and other support teams to deliver exceptional service. If you are passionate about driving excellence in operational support and have a knack for … role offers a dynamic environment to showcase your skills and contribute to a cutting-edge industry. Join us in shaping the future of network management and support services. Who are we? Magdalene operates as a Telecommunication Infrastructure Services Company and is part of the Telecom Division of M Group more »
Employment Type: Permanent, Work From Home
Salary: 4% Matched pension, Health cash plan, Life assurance, 33 Holidays
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Yolk Recruitment
part of the Information Security function, ensuring critical systems are protected, optimised, and aligned with evolving business objectives. This role emphasises the hands-on management of advanced security tools and platforms to safeguard against emerging threats while supporting internal stakeholders with expert guidance and security strategies. Your Key Responsibilities … guidelines for security tools and their administration. Manage Endpoint Detection and Response (EDR) platforms to detect, investigate, and respond to potential threats efficiently. Lead vulnerabilitymanagement efforts, including risk assessments and collaboration with IT Operations to address findings through timely patching. Configure and manage web security gateways to … understanding of core security principles, including zero trust models, system hardening, and access control strategies. Practical experience with key security technologies, including EDR tools, vulnerabilitymanagement platforms, firewalls, web security gateways, and email security solutions. Familiarity with cloud environments such as Okta and Azure, alongside expertise in traditional more »
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Creditsafe
wider array of technologies and issues, but primarily covering all Security Toolig, platforms, technology and controls (such as Firewalls, DLP, SIEM, Identity and Access management). To support SIEM by maintaining the integrations with AWS, Azure and other appliances and/or technologies including troubleshooting and building out or … API’s. To support Security Automation, Orchestration and Response activities and building out additional capabilities for the SOC Team. Broader security knowledge on IAM, VulnerabilityManagement and Zero trust models would be a plus. To further support Security activities, including support to Governance, Risk and Compliance functions. To … configuring SIEM products. Ability to utilise manipulate and utilise API’s and Powershell scripting (Graph API a distinct advantage) Broader security knowledge on IAM, VulnerabilityManagement and Zero trust models. Clear communicator to security literate and non-security literate stakeholders Qualifications (desired) SC-900/AZ-900/ more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Eden Scott
risk and compliance background . You’ll define processes, ensure compliance with standards and regulations, and oversee daily operations. As part of the IT Management team, you'll manage security strategy, incident response, and system improvements, while also handling budgets and vendor collaboration. A proactive approach to team performance … security assessments. Perform and manage penetration testing and audits. Candidate Criteria: Extensive experience in IT Security within a globally distributed environment. Administration and Service Management experience of the following Infrastructure technologies to expert level: End Point Protection, VulnerabilityManagement, Privileged Access Management, Certificate Management, Internet … Security – Content Filtering, Cloud Security (Azure), File Security – NTFS, Information Protection/Rights Management, Microsoft Windows, Microsoft/Office 365 platform, Microsoft SQL Strong knowledge of networks and data protection legislation (e.g., GDPR). Be able to identify gaps in the teams' knowledge and implement plans. Experience in coaching more »
and deploying CI/CD pipelines for Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST). Vulnerability Assessment & Reconnaissance: Learn to secure systems by evaluating vulnerabilities and performing threat modeling on web application architectures. Security Methodologies: Implement OWASP methodologies to improve … with open-source intelligence and security tools. Data Analysis and System Security: Collect, clean, and analyze data to identify security risks and create effective vulnerabilitymanagement strategies. Advanced Network Security: Master network scanning techniques with tools like NMAP and NPING to explore, identify, and mitigate threats outside IDS … cutting-edge projects that include: Securing Multi-Cloud AI Infrastructure: Help configure and automate multi-cloud environments with a focus on AI and security. VulnerabilityManagement & Threat Analysis: Contribute to advanced threat modeling and risk assessment for large-scale applications. Ethical Hacking Techniques: Develop ethical hacking skills by more »
are the priority and they're inspired to unleash the power of innovation for a better world together, anything is possible. VM and Endpoint Management Security Engineer (all genders) Date: Dec 10, 2024 Location: Villach, AT Req ID: 182191 Worker Category: On-site Flex Aufgaben We are looking for … a highly motivated individual who is interested in working with state-of-the-art tools and techniques in the endpoint management arena. As part of the Global Endpoint Management at Lam, he/she will be responsible for driving critical activities and projects to success as well as … shaping the future of Lam's endpoint management processes and environment. He/she is part of a globally acting team, spread across different continents and time zones. This allows us to be close to our end-users and incorporate their feedback in our immediate activities around keeping the more »
Reading, England, United Kingdom Hybrid / WFH Options
Hays
hours per week) The must haves: Proven experience in deploying and managing Qualys solutions and working with the Qualys toolset. Familiarity with Agile project management methodologies and tools. Strong understanding of web applications setup and protocols. Excellent troubleshooting and problem-solving skills. Relevant certifications (e.g., Qualys Certifications, networking qualifications … functional teams to integrate Qualys into existing workflows and systems. Provide knowledge and support to the rest of the project team and the Operational VulnerabilityManagement Team. Ensure what is set up works for the operational Vulnerabilitymanagement team and that all work is documented to more »
York, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
development opportunities, ensuring career growth and success. Role Overview: As a Security Analyst, you'll play a pivotal role as the technical lead for vulnerabilitymanagement within our client's dynamic team. Your primary focus will be on leveraging Tenable solutions, serving as a subject matter expert (SME … support and guidance to valued customers. Additionally, you'll engage with Microsoft Sentinel and Defender, contributing to their holistic security offerings. Key Responsibilities: Lead vulnerabilitymanagement initiatives, primarily utilizing Tenable technologies. Serve as an SME for customers, offering expert guidance and support. Collaborate with the team to enhance … services, leveraging Microsoft Sentinel and Defender. Contribute to the continuous improvement of security processes and protocols. Requirements: Demonstrable experience in level 2/3 vulnerability management. Proficiency with Tenable solutions is preferred, although experience with Rapid7 and Qualys will also be considered. Microsoft security experience is advantageous. Strong analytical more »
computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA more »
/SECTION IT Risk, Security & Control department covers cyber security strategy maintenance and tactical planning and operations to provide IT Security protection, governance, risk management and reporting. This includes promoting the global Information Security Standards and Procedures (ISSP) requirements and local security requirements. The department deploys, supports and monitors … security solutions such as virus protection, vulnerabilitymanagement, compliance monitoring and threat/incident management activities to reduce risk. MAIN PURPOSE OF THE ROLE To manage the technical delivery of various cybersecurity projects and contribute to the overall success of the Cybersecurity programme function by: Ensuring that … wide range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as Identity and Access Management, Threat Intelligence, Risk Evaluation, Security Assessment/Testing, Incidence Management and Vendor/Cloud products assessment. Possessing high level of analytical ability where more »
Dahlgren, Virginia, United States Hybrid / WFH Options
Absolute Business Solutions Corp
requirements/deliverables. Responsibilities include, but are not limited to: As an integral member of the team, you will work closely with DTP Program Management, Task Order Leads, and Security Engineers on the following key tasks: Provide management oversight and coordination of DTP Security Team across multiple Task … Experience with CNSS publication CNSSI 1253 Experience with incident response plans, plans of actions and milestones (POA&Ms), risk management plans, and vulnerabilitymanagement plans Experience establishing and maintaining a System Security Engineering (SSE) management process to integrate security and privacy controls into complex hardware and … managing a team of Cyber Security Engineers (CSEs) and Information System Security Officers (ISSOs) Experience supporting DoD/IC systems through the entire Risk Management Framework Plus (RMF) process Experience using Tenable Security Center and all components Experience with technologies such as Linux, Windows, firewalls, gateways, proxies, VPCs, and more »
UK? IT Operations: Coordinate IT Operations: Facilitate smooth collaboration between service delivery, information security, and IT teams, ensuring alignment across all functions. Cloud Services Management: Assist with managing cloud infrastructure (Microsoft 365, Azure, AWS), ensuring optimal performance, cost-efficiency, and security. Incident Management: Act as the central point … and procedures are enforced across all IT and cloud platforms, assisting the Information Security Manager in aligning with company-wide security strategies. Compliance & Risk Management: Assist in maintaining compliance with industry standards and regulations (e.g., GDPR). Help conduct risk assessments and internal security audits. Data Protection: Ensure the … threats across cloud and IT environments, helping to respond to incidents and mitigate vulnerabilities. Support the implementation of threat intelligence and security monitoring tools. VulnerabilityManagement: Assist in the identification and remediation of security vulnerabilities in cloud services and on-premises IT systems through routine assessments and patch more »
Clarify incident severity Knowledge of security methodologies for investigation Comfortable with RAW output Threat Intel Info - against alerts Threat Hunting Internal Security and Log Management On top of the SOC Management you can be working on other services:- Dark Web monitoring service Guiding and Shaping Ideas for Crisis … Produce incident reports to present activity and outcome of operational security services and activity. Select appropriately from applicable standards, methods, tools and applications. Incident management Aid with the investigation of security breaches following established procedures and make sure any recommended follow up actions are taken to ensure a reduction … Incidents, the operation and optimisation of security tooling/products, including network security (IDS/IPS/Firewalls), logging and auditing, event and incident management, and privileged access management controls. Act on security incidents, requests and events to ensure that threats, vulnerabilities and breaches are managed to minimise more »
leads to the creation of high quality, secure by design, project deliveries. Examples of projects: *Secure Internet Access *Privileged Remote Access *VPN consolidation *Information Management (Records Management & Data Governance) *Infrastructure Road Mapping *Security Email Gateway Identifying security related risk from projects and leading risk assessment processes Identify divergences … deliveries Technical Experience: *Security Risk Assessment *Network Architecture Principles *Web & email security technologies *Reviewing and assessing security policy configuration within cloud environments (preferably Azure) *VulnerabilityManagement and Security logging and monitoring tools *Cloud Virtualisation and Containerisation security assessments and review *Edge Security Technology, IAM, PAM *Data Security and … governance *Network Monitoring Tools and SIEM Technology *Risk Management Tools Ability to act proactively, escalating issues as required Strong documentation and communication skills (verbal and written) Excellent problem-solving skills Strong knowledge and experience of IT change management processes and principles Willingness to stay up to date on more »