Remote Permanent Vulnerability Management Jobs

1 to 25 of 51 Remote Permanent Vulnerability Management Jobs

Cyber Threat Intelligence and Vulnerability Management Specialist (VP)

London Area, United Kingdom
Hybrid / WFH Options
DWS Group
Employer: DWS Group Title: Cyber Threat Intelligence and Vulnerability Management Specialist (VP) Location: London About DWS: Today, markets face a whole new set of pressures – but also a whole lot of opportunity too. Opportunity to innovate differently. Opportunity to invest responsibly. And opportunity to make change. Join us … and productive procedures, policies and processes are in place, and aligned and agreed with relevant stakeholders. Role Details: As a Cyber Threat Intelligence and Vulnerability Management Specialist you will (be): Lead the DWS Cyber Threat Intelligence and Vulnerability Management capability, liaising closely with the central Threat … Vulnerability Management function to provide relevant reports on threats to the sector; Tailor threat intelligence to the needs of a world-leading asset management firm operating across geographical regions; Provide threat intelligence to technical and non-technical stakeholders across tactical, operational, and strategic lines; Identify priority vulnerabilities more »
Posted:

Vulnerability Coordinator

York, North Yorkshire, United Kingdom
Hybrid / WFH Options
Concept Resourcing
Vulnerability Coordinator Location: [3 days a week in the office (York), 2 days a week work from home] Department: Cyber Security Type: Full-time Salary: £48,000 Reports To: Cyber Security Manager About the Role: Concept IT are seeking a skilled and proactive Vulnerability Coordinator to join our … Clients Cyber Security team. The ideal candidate will have extensive experience with Tenable One Vulnerability Management, Microsoft Defender Threat and Vulnerability Management (TVM) and the entire vulnerability management lifecycle across various platforms (Windows, Linux, Applications, security appliances). Experience working with UK government or … NHS organisations is highly desirable. As a Vulnerability Coordinator, you will be responsible for identifying, assessing, and managing vulnerabilities to ensure the security and integrity of systems and data. Education: Associate degree in Computer Science, Information Security, or a related field (or equivalent experience). Experience: Minimum of more »
Employment Type: Permanent
Salary: £42000 - £48000/annum
Posted:

Lead Vulnerability Management

Milton Keynes, England, United Kingdom
Hybrid / WFH Options
Proprius Recruitment
Manager, Vulnerability Management/SME/Lead is responsible for leading and coaching team of subject matter experts specialised in vulnerability management. Oversee and coordinate end-to-end vulnerability management & security testing activities by collaboratively working with colleagues. Close collaboration with global Vulnerability Management. … Bi-directional feedback with technology & business teams. Create, develop and maintain operational procedures and processes in coordination with colleagues to ensure vulnerability management services are clearly documented. Manager, Vulnerability Management/SME/Lead To £96,000 + Benefits + Bonus Hybrid Working x3 days a … for managing relationships with 3rd party penetration testing providers and hold them accountable to quality and SLA standards. Responsible for escalating and highlighting thematic vulnerability patterns to Threat Management team and involved in strategic risk reduction planning discussions. Responsible for measuring effectiveness and proposing tactical and strategic improvements more »
Posted:

ENDPOINT PROTECTION SECURITY EXPERT

Wiltshire, United Kingdom
Hybrid / WFH Options
Adecco
is part of a global technology organisation with a strong focus on cybersecurity. The ideal candidate will work across various cybersecurity areas such as vulnerability management, endpoint security, and will collaborate with clients. No remote working is allowed for this position, and the candidate must have DV clearance. … requirement. 2. Endpoint Security Expertise: Strong background in cyber security, specifically in Endpoint Protection across a range of devices from laptops to IoT. 3. Vulnerability Management: Experience with tools used to detect and respond to vulnerabilities across an organisation, including research into CVEs (Common Vulnerabilities and Exposures). … of governance and compliance aspects related to cyber security. Desired Skills: * Analytical mindset to proactively find solutions to potential risks. * Ability to work with vulnerability management tools and conduct research into vulnerabilities and their impacts. Role Overview: The position involves a mix of vulnerability management and more »
Employment Type: Permanent
Salary: £65000 - £75000/annum benefits
Posted:

Head of Security

Welwyn Garden City, England, United Kingdom
Hybrid / WFH Options
PayPoint plc
overall delivery and strategic oversight of all PayPoint Group IT security systems and services. This includes providing leadership for the Security Operations Center (SOC), Vulnerability Management and Security teams, ensuring alignment with organizational goals. Collaborating closely with the managers of the respective departments within the team, the successful … security services across physical and cloud infrastructures, ensuring compliance with regulatory and organizational requirements. • Provide strategic leadership and oversight for the Security, SOC and Vulnerability Management teams, enabling their success through effective planning, guidance, and support. • Develop close working relationships with internal audit teams and act as the … and guide team members, fostering professional growth and building a high-performing security function. • Actively participate as a key member of the Cyber Security Management Team, contributing to the development and execution of the organization's cyber security strategy, policies, and initiatives. • Play a leading role in the response more »
Posted:

Information Security & Cyber Security Analyst - Banking - £60,000-£75,000 + Bonus

London Area, United Kingdom
Hybrid / WFH Options
Hunter Bond
Analyst Client: Banking Salary: £60,000-£75,000 + Bonus Location: London/Hybrid Skills: Information Security, Cyber Security, SIEM, EDR, Wireshark, Incident Response, Vulnerability Management The role: My client are seeking a knowledgeable Information & Cyber Security Analyst to join their team. This role is focused on the … will ideally have 5+ years experience working in Information/Cyber Security. The position is broadly split into a few core areas Incident Response Vulnerability Management SIEM Security Monitoring You will advise on Security best practices, and act as SME when assisting other teams. The ideal candidate will … have: Incident Response experience Security Monitoring experience Vulnerability Management experience Knowledge and understanding of technical Security tools: SIEM, EDR, DLP, Wireshark, Burp Suite etc. Understanding of threat modelling advantageous Investigation experience into Information and Cyber security incidents Broad technical understanding – Windows, Linux, Networks, VMware etc. Appreciation of GCIA more »
Posted:

Head of Technical Support

London, United Kingdom
Hybrid / WFH Options
Feedback plc
delivery and deployment of new features, enhancements, and fixes to customers. • Implement and enforce ITIL best practices, standards, and procedures for support, including incident management, problem management, change management, and knowledge management. • Proactively identify and recommend opportunities to improve processes, tools, and systems. • Build and maintain strong … and customers through regular engagement to enhance service delivery. • Collate records and generate reports on product and service performance, presenting findings to the senior management team. Customer and Employee Support: • Provide high-quality support to Feedback Medical's customers and staff via phone, email, and remote desktop, assisting both … Assist in problem investigations, including root cause analysis and prevention identification. Process and Compliance: • Comply with processes and procedures within Feedback Medical's Integrated Management System (IMS), which aligns with ISO 13485 quality management standards and ISO 27001 Information Security standards. • Work alongside the Information Security team to more »
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information System Security Engineer (ISSE) III - Hybrid with Security Clearance

Philadelphia, Pennsylvania, United States
Hybrid / WFH Options
ISHPI Information Technologies, Inc
System Security Engineer ( ISSE ) support. These duties include but are not limited to: Assessment & Authorization (A&A) Cybersecurity Compliance and Audit Readiness Information Assurance Vulnerability Management (IAVM) Vulnerability Scanning and Remediation Application and Implementation of Security Technical Implementation Guides (STIGs) and Security Requirements Guide (SRGs) Shall assist … with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans which include System Categorization Forms, Platform Information Technology (PIT) Determination Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams, Privacy Impact Assessments … Identify and tailor IT and CS security control baselines based on RMF guidelines and categorization of the RMF boundary Perform Ports, Protocols, and Services Management (PPSM). Perform IT and CS vulnerability-level risk assessments. Execute security control testing as required by a risk assessment or annual security more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information System Security Engineer (ISSE) II - Hybrid with Security Clearance

Philadelphia, Pennsylvania, United States
Hybrid / WFH Options
ISHPI Information Technologies, Inc
System Security Engineer ( ISSE ) support. These duties include but are not limited to: Assessment & Authorization (A&A) Cybersecurity Compliance and Audit Readiness Information Assurance Vulnerability Management (IAVM) Vulnerability Scanning and Remediation Application and Implementation of Security Technical Implementation Guides (STIGs) and Security Requirements Guide (SRGs) Shall assist … with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans which include System Categorization Forms, Platform Information Technology (PIT) Determination Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams, Privacy Impact Assessments … Identify and tailor IT and CS security control baselines based on RMF guidelines and categorization of the RMF boundary Perform Ports, Protocols, and Services Management (PPSM). Perform IT and CS vulnerability-level risk assessments. Execute security control testing as required by a risk assessment or annual security more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Specialist Engineer

United Kingdom
Hybrid / WFH Options
M Group Services Limited T/A Magdalene Limited
top-notch OSS Solutions for network monitoring, performance optimization, and analytics. You will play a crucial role in supporting and managing IP & Data Network Management Systems, covering server hardware, operating systems, applications, backup solutions, and UAM. This hybrid position allows you to work from home, Magdalene offices, or the … customer offices and data centers. As part of Magdalene's Professional Services, you will collaborate closely with Network Security Engineers, Network Engineers, the Network Management Centre, and other support teams to deliver exceptional service. If you are passionate about driving excellence in operational support and have a knack for … role offers a dynamic environment to showcase your skills and contribute to a cutting-edge industry. Join us in shaping the future of network management and support services. Who are we? Magdalene operates as a Telecommunication Infrastructure Services Company and is part of the Telecom Division of M Group more »
Employment Type: Permanent, Work From Home
Salary: 4% Matched pension, Health cash plan, Life assurance, 33 Holidays
Posted:

Cyber Security Engineer

Cardiff, South Glamorgan, Wales, United Kingdom
Hybrid / WFH Options
Yolk Recruitment
part of the Information Security function, ensuring critical systems are protected, optimised, and aligned with evolving business objectives. This role emphasises the hands-on management of advanced security tools and platforms to safeguard against emerging threats while supporting internal stakeholders with expert guidance and security strategies. Your Key Responsibilities … guidelines for security tools and their administration. Manage Endpoint Detection and Response (EDR) platforms to detect, investigate, and respond to potential threats efficiently. Lead vulnerability management efforts, including risk assessments and collaboration with IT Operations to address findings through timely patching. Configure and manage web security gateways to … understanding of core security principles, including zero trust models, system hardening, and access control strategies. Practical experience with key security technologies, including EDR tools, vulnerability management platforms, firewalls, web security gateways, and email security solutions. Familiarity with cloud environments such as Okta and Azure, alongside expertise in traditional more »
Employment Type: Permanent, Work From Home
Salary: £60,000
Posted:

Security Engineer

Cardiff, Wales, United Kingdom
Hybrid / WFH Options
Creditsafe
wider array of technologies and issues, but primarily covering all Security Toolig, platforms, technology and controls (such as Firewalls, DLP, SIEM, Identity and Access management). To support SIEM by maintaining the integrations with AWS, Azure and other appliances and/or technologies including troubleshooting and building out or … API’s. To support Security Automation, Orchestration and Response activities and building out additional capabilities for the SOC Team. Broader security knowledge on IAM, Vulnerability Management and Zero trust models would be a plus. To further support Security activities, including support to Governance, Risk and Compliance functions. To … configuring SIEM products. Ability to utilise manipulate and utilise API’s and Powershell scripting (Graph API a distinct advantage) Broader security knowledge on IAM, Vulnerability Management and Zero trust models. Clear communicator to security literate and non-security literate stakeholders Qualifications (desired) SC-900/AZ-900/ more »
Posted:

Information Technology Security Manager

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Eden Scott
risk and compliance background . You’ll define processes, ensure compliance with standards and regulations, and oversee daily operations. As part of the IT Management team, you'll manage security strategy, incident response, and system improvements, while also handling budgets and vendor collaboration. A proactive approach to team performance … security assessments. Perform and manage penetration testing and audits. Candidate Criteria: Extensive experience in IT Security within a globally distributed environment. Administration and Service Management experience of the following Infrastructure technologies to expert level: End Point Protection, Vulnerability Management, Privileged Access Management, Certificate Management, Internet … Security – Content Filtering, Cloud Security (Azure), File Security – NTFS, Information Protection/Rights Management, Microsoft Windows, Microsoft/Office 365 platform, Microsoft SQL Strong knowledge of networks and data protection legislation (e.g., GDPR). Be able to identify gaps in the teams' knowledge and implement plans. Experience in coaching more »
Posted:

Cyber Security Training & Internship

United Kingdom
Hybrid / WFH Options
Refonte Learning AI
and deploying CI/CD pipelines for Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST). Vulnerability Assessment & Reconnaissance: Learn to secure systems by evaluating vulnerabilities and performing threat modeling on web application architectures. Security Methodologies: Implement OWASP methodologies to improve … with open-source intelligence and security tools. Data Analysis and System Security: Collect, clean, and analyze data to identify security risks and create effective vulnerability management strategies. Advanced Network Security: Master network scanning techniques with tools like NMAP and NPING to explore, identify, and mitigate threats outside IDS … cutting-edge projects that include: Securing Multi-Cloud AI Infrastructure: Help configure and automate multi-cloud environments with a focus on AI and security. Vulnerability Management & Threat Analysis: Contribute to advanced threat modeling and risk assessment for large-scale applications. Ethical Hacking Techniques: Develop ethical hacking skills by more »
Posted:

VM and Endpoint Management Security Engineer (all genders)

Villach, Kärnten, Austria
Hybrid / WFH Options
Lam Research AG
are the priority and they're inspired to unleash the power of innovation for a better world together, anything is possible. VM and Endpoint Management Security Engineer (all genders) Date: Dec 10, 2024 Location: Villach, AT Req ID: 182191 Worker Category: On-site Flex Aufgaben We are looking for … a highly motivated individual who is interested in working with state-of-the-art tools and techniques in the endpoint management arena. As part of the Global Endpoint Management at Lam, he/she will be responsible for driving critical activities and projects to success as well as … shaping the future of Lam's endpoint management processes and environment. He/she is part of a globally acting team, spread across different continents and time zones. This allows us to be close to our end-users and incorporate their feedback in our immediate activities around keeping the more »
Employment Type: Permanent
Salary: EUR Annual
Posted:

Security Engineer - Qualys

Reading, England, United Kingdom
Hybrid / WFH Options
Hays
hours per week) The must haves: Proven experience in deploying and managing Qualys solutions and working with the Qualys toolset. Familiarity with Agile project management methodologies and tools. Strong understanding of web applications setup and protocols. Excellent troubleshooting and problem-solving skills. Relevant certifications (e.g., Qualys Certifications, networking qualifications … functional teams to integrate Qualys into existing workflows and systems. Provide knowledge and support to the rest of the project team and the Operational Vulnerability Management Team. Ensure what is set up works for the operational Vulnerability management team and that all work is documented to more »
Posted:

L2 SOC Analyst

York, England, United Kingdom
Hybrid / WFH Options
Hamilton Barnes 🌳
development opportunities, ensuring career growth and success. Role Overview: As a Security Analyst, you'll play a pivotal role as the technical lead for vulnerability management within our client's dynamic team. Your primary focus will be on leveraging Tenable solutions, serving as a subject matter expert (SME … support and guidance to valued customers. Additionally, you'll engage with Microsoft Sentinel and Defender, contributing to their holistic security offerings. Key Responsibilities: Lead vulnerability management initiatives, primarily utilizing Tenable technologies. Serve as an SME for customers, offering expert guidance and support. Collaborate with the team to enhance … services, leveraging Microsoft Sentinel and Defender. Contribute to the continuous improvement of security processes and protocols. Requirements: Demonstrable experience in level 2/3 vulnerability management. Proficiency with Tenable solutions is preferred, although experience with Rapid7 and Qualys will also be considered. Microsoft security experience is advantageous. Strong analytical more »
Posted:

Senior Information Security Analyst

London
Hybrid / WFH Options
Nexus Jobs Limited
computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA more »
Employment Type: Permanent
Salary: £70,000 - £85,000
Posted:

AVP - Junior Cybersecurity Technical Delivery Manager

London, United Kingdom
Hybrid / WFH Options
MUFG Bank, Ltd
/SECTION IT Risk, Security & Control department covers cyber security strategy maintenance and tactical planning and operations to provide IT Security protection, governance, risk management and reporting. This includes promoting the global Information Security Standards and Procedures (ISSP) requirements and local security requirements. The department deploys, supports and monitors … security solutions such as virus protection, vulnerability management, compliance monitoring and threat/incident management activities to reduce risk. MAIN PURPOSE OF THE ROLE To manage the technical delivery of various cybersecurity projects and contribute to the overall success of the Cybersecurity programme function by: Ensuring that … wide range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as Identity and Access Management, Threat Intelligence, Risk Evaluation, Security Assessment/Testing, Incidence Management and Vendor/Cloud products assessment. Possessing high level of analytical ability where more »
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer Team Lead with Security Clearance

Dahlgren, Virginia, United States
Hybrid / WFH Options
Absolute Business Solutions Corp
requirements/deliverables. Responsibilities include, but are not limited to: As an integral member of the team, you will work closely with DTP Program Management, Task Order Leads, and Security Engineers on the following key tasks: Provide management oversight and coordination of DTP Security Team across multiple Task … Experience with CNSS publication CNSSI 1253 Experience with incident response plans, plans of actions and milestones (POA&Ms), risk management plans, and vulnerability management plans Experience establishing and maintaining a System Security Engineering (SSE) management process to integrate security and privacy controls into complex hardware and … managing a team of Cyber Security Engineers (CSEs) and Information System Security Officers (ISSOs) Experience supporting DoD/IC systems through the entire Risk Management Framework Plus (RMF) process Experience using Tenable Security Center and all components Experience with technologies such as Linux, Windows, firewalls, gateways, proxies, VPCs, and more »
Employment Type: Permanent
Salary: USD Annual
Posted:

IT & Cyber Analyst

London Area, United Kingdom
Hybrid / WFH Options
Leumi UK
UK? IT Operations: Coordinate IT Operations: Facilitate smooth collaboration between service delivery, information security, and IT teams, ensuring alignment across all functions. Cloud Services Management: Assist with managing cloud infrastructure (Microsoft 365, Azure, AWS), ensuring optimal performance, cost-efficiency, and security. Incident Management: Act as the central point … and procedures are enforced across all IT and cloud platforms, assisting the Information Security Manager in aligning with company-wide security strategies. Compliance & Risk Management: Assist in maintaining compliance with industry standards and regulations (e.g., GDPR). Help conduct risk assessments and internal security audits. Data Protection: Ensure the … threats across cloud and IT environments, helping to respond to incidents and mitigate vulnerabilities. Support the implementation of threat intelligence and security monitoring tools. Vulnerability Management: Assist in the identification and remediation of security vulnerabilities in cloud services and on-premises IT systems through routine assessments and patch more »
Posted:

Security Lead

London Area, United Kingdom
Hybrid / WFH Options
InvitISE Ltd
AWS AWS Cloud Security EC2, S3, VPC, IAM AWS Security Hub GuardDuty Design Security Architecture Security Policies Security best practice Security Strategy Security Operations Vulnerability Management Threat Management/Threat Modelling Incident management Security Assessments Security Audits Security Compliance - ISO 27001, GDPR, HIPAA Terraform/Jenkins … Python/Bash Automation CI/CD AWS Certified Security AWS Solutions Architect Professional AWS Advanced Networking Speciality Encryption Identity and Access Management Interested? Please apply below AWS Security lead, Security Lead, Security Consultant, DevSecOps, DevSecOps Manager, DevSecOps Consultant, DevSecOps Architect, Security Architect, Security Lead, MSP, FinTech, Consultancy more »
Posted:

DevSecOps Lead

EC1A, Mount Pleasant, Greater London, United Kingdom
Hybrid / WFH Options
Invitise
AWS AWS Cloud Security EC2, S3, VPC, IAM AWS Security Hub GuardDuty Design Security Architecture Security Policies Security best practice Security Strategy Security Operations Vulnerability Management Threat Management/Threat Modelling Incident management Security Assessments Security Audits Security Compliance - ISO 27001, GDPR, HIPAA Terraform/Jenkins … Python/Bash Automation CI/CD AWS Certified Security AWS Solutions Architect Professional AWS Advanced Networking Speciality Encryption Identity and Access Management Interested? Please apply below Security Consultant, DevSecOps, DevSecOps Manager, DevSecOps Consultant, DevSecOps Architect, Security Architect, Security Lead, MSP, FinTech, Consultancy more »
Employment Type: Permanent
Salary: £100000 - £110000/annum + Great benefits + Bonus
Posted:

SOC Analyst

Manchester, United Kingdom
Hybrid / WFH Options
TWX
Clarify incident severity Knowledge of security methodologies for investigation Comfortable with RAW output Threat Intel Info - against alerts Threat Hunting Internal Security and Log Management On top of the SOC Management you can be working on other services:- Dark Web monitoring service Guiding and Shaping Ideas for Crisis … Produce incident reports to present activity and outcome of operational security services and activity. Select appropriately from applicable standards, methods, tools and applications. Incident management Aid with the investigation of security breaches following established procedures and make sure any recommended follow up actions are taken to ensure a reduction … Incidents, the operation and optimisation of security tooling/products, including network security (IDS/IPS/Firewalls), logging and auditing, event and incident management, and privileged access management controls. Act on security incidents, requests and events to ensure that threats, vulnerabilities and breaches are managed to minimise more »
Employment Type: Permanent
Salary: £40000 - £60000/annum
Posted:

Information Security Specialist

London Area, United Kingdom
Hybrid / WFH Options
prosource.it
leads to the creation of high quality, secure by design, project deliveries. Examples of projects: *Secure Internet Access *Privileged Remote Access *VPN consolidation *Information Management (Records Management & Data Governance) *Infrastructure Road Mapping *Security Email Gateway Identifying security related risk from projects and leading risk assessment processes Identify divergences … deliveries Technical Experience: *Security Risk Assessment *Network Architecture Principles *Web & email security technologies *Reviewing and assessing security policy configuration within cloud environments (preferably Azure) *Vulnerability Management and Security logging and monitoring tools *Cloud Virtualisation and Containerisation security assessments and review *Edge Security Technology, IAM, PAM *Data Security and … governance *Network Monitoring Tools and SIEM Technology *Risk Management Tools Ability to act proactively, escalating issues as required Strong documentation and communication skills (verbal and written) Excellent problem-solving skills Strong knowledge and experience of IT change management processes and principles Willingness to stay up to date on more »
Posted:
Vulnerability Management
Work from Home
10th Percentile
£42,500
25th Percentile
£44,250
Median
£60,000
75th Percentile
£90,000
90th Percentile
£93,250