Devoteam Cyber Trust | Vulnerability Manager| Banking
May be filledDevoteam Cyber Trust is the Cybersecurity specialist arm of the Devoteam Group. Knowledge of network cybersecurity ...
593 curated roles with verified salaries.
Opens the subscribe dialog so you can join the weekly newsletter.
Data from 593 live listings · Full salary tools →
+ Add your salary & see your percentileListings older than ~30 days may already be filled or paused. We flag them so you can prioritise fresher roles.
Devoteam Cyber Trust is the Cybersecurity specialist arm of the Devoteam Group. Knowledge of network cybersecurity ...
In this role, you will support the CISO function, manage day to day requests and approvals, support and troubleshoot cyber related incidents dedicated to the Swiss environment, support the Identity and Access Management…
In this role, you will support the CISO function, manage day to day requests and approvals, support and troubleshoot cyber related incidents dedicated to the Swiss environment, support the Identity and Access Management (I&AM) function, support the review of our on-premise and cloud infrastructure guardrails, and ensure compliance with Swiss data protection laws and international security standards. Support the local and wider CISO function Review Cyber guardrails on a regular basis Document and improve the local Cyber processes Maintain compliance Support the team within the: I&AM user lifecycle function Phishing campaigns Day to day Cyber operations Respond to security incidents and support vulnerability management Collaborate with cloud architects, compliance officers, and cross-functional teams Propose and implement improvements that strengthen security controls and add tangible value.
Project Delivery Model (PDM) is a talent model that is tailored specifically for long-term, onsite client service delivery. Qualifications Required Bachelor's degree, preferably in Computer Science, Information…
Project Delivery Model (PDM) is a talent model that is tailored specifically for long-term, onsite client service delivery. Qualifications Required Bachelor's degree, preferably in Computer Science, Information Technology, Computer Engineering, or related IT discipline; or equivalent experience 3+ years of proven SOC experience Experience evaluating vulnerabilities and patch management.
Oversee the delivery of ServiceNow-based cyber risk solutions, ensuring alignment with best practices and evolving client needs. Lead and mentor global teams to ensure high-quality delivery of ServiceNow cyber risk…
Oversee the delivery of ServiceNow-based cyber risk solutions, ensuring alignment with best practices and evolving client needs. Lead and mentor global teams to ensure high-quality delivery of ServiceNow cyber risk management services.
Work You'll Do The Database and Endpoint Detection & Response (EDR) Lead provides oversight of database security and endpoint protection operations. Team members focus on delivering services to clients, without…
Work You'll Do The Database and Endpoint Detection & Response (EDR) Lead provides oversight of database security and endpoint protection operations. Team members focus on delivering services to clients, without additional expectations related to business development or promotion.
What You’ll Do In The Role Lead proactively on platform reliability and security, identifying and resolving technical/security issues before they become critical; drive a strong security hygiene culture. Own risk…
What You’ll Do In The Role Lead proactively on platform reliability and security, identifying and resolving technical/security issues before they become critical; drive a strong security hygiene culture. Own risk management for the environment, running regular risk assessments, identifying vulnerabilities, and partnering with Risk, Audit, and Compliance to mitigate risk.
Basic knowledge of network security principles (firewalls, segmentation, access control). CompTIA Security+ – for foundational cybersecurity knowledge.
Job Responsibilities Design, build, and maintain modular, maintainable data pipelines for data ingestion and transformation in Python Develop and maintain data pipelines for analytics and reporting in Python, SQL, or…
Job Responsibilities Design, build, and maintain modular, maintainable data pipelines for data ingestion and transformation in Python Develop and maintain data pipelines for analytics and reporting in Python, SQL, or Power Query Optimize data storage and retrieval by leveraging Paraquets columnar format using Python Utilize Jupyter Notebooks to accomplish tasks such as exploratory data analysis, prototyping data transformations, and validating data pipeline outputs Query data using Python and SQL to support ad-hoc business requests and identify actionable insights Work with diverse data formats including relational databases, structured files, and unstructured data Analyze and manage diverse data sets to improve federal and national risk insights; understand how partner organizations receive and use information from the client to drive down cyber risk. Provide advice and guidance on data analysis, processing, and data cleansing activities using innovative tools and approaches to organize qualitative and quantitative data for analysis.
Your primary responsibilities will include: Conduct Event Investigations: Investigate security incidents using SIEM, SOAR, EDR, and XDR platforms to identify and analyze potential threats. Analyze Network and Endpoint…
Your primary responsibilities will include: Conduct Event Investigations: Investigate security incidents using SIEM, SOAR, EDR, and XDR platforms to identify and analyze potential threats. Analyze Network and Endpoint Events: Interpret security tools and logs from Windows, MAC, and Linux systems to identify potential security threats.
Job Description What you’ll do: Cybersecurity Risk Assessment: conduct and manage comprehensive risk assessments of suppliers, vendors, and partners to identify and mitigate cybersecurity threats in the supply chain…
Job Description What you’ll do: Cybersecurity Risk Assessment: conduct and manage comprehensive risk assessments of suppliers, vendors, and partners to identify and mitigate cybersecurity threats in the supply chain Service Team Collaboration: support and assist Service Teams with the security aspects of their procurement needs, ensuring that appropriate information and cyber security requirements are included in tender documents, specifications and contracts Liaise with Commercial and Legal functions to ensure the requirements are included in tender and contract documentation Vendor Due Diligence: collaborate with procurement and legal teams to assess vendor security practices during onboarding and throughout the vendor lifecycle ensure third-party vendors comply with the organisation’s cybersecurity policies and standards Supply Chain Risk Management (SCRM): develop and maintain a robust cybersecurity supply chain risk management (SCRM) program, including standardised supply chain risk logging, continuous monitoring, auditing, and evaluating third-party risk exposure individually, by category and in aggregate Compliance and Standards: ensure supply chain activities comply with relevant cybersecurity frameworks and regulations (e.g., NCSC Cyber Assessment Framework, GovS007, ISO 27001, GDPR/DPA18) Implement best practices from industry standards to secure supply chain operations Third-Party Contract Management: work with the legal and commercial teams to ensure cybersecurity clauses are included in supplier contracts Define key performance indicators (KPIs) and service level agreements (SLAs) around vendor cybersecurity responsibilities Periodically audit contracts for security terms, in order to understand any gaps in live contracts Incident Response: support the development of processes and protocols for managing third-party cybersecurity incidents, including coordinating with vendors during a breach, ensuring timely communication, and mitigating the impact on the organisation Vendor Cybersecurity Audits: lead or co-ordinate periodic cybersecurity audits of vendors and third parties to ensure they maintain high security standards Identify gaps and work with vendors to implement remediation plans Training and Awareness: provide training and support to internal stakeholders on supply chain cybersecurity risks and vendor management best practices Increase awareness of supply chain threats and trends within the organisation Collaboration and Communicatio...
This is a genuinely hybrid role, blending deep technical understanding with consultative sales ability. Your role as Cyber Security Solutions Consultant You’ll work hand-in-hand with the Sales Team and the wider…
This is a genuinely hybrid role, blending deep technical understanding with consultative sales ability. Your role as Cyber Security Solutions Consultant You’ll work hand-in-hand with the Sales Team and the wider Solutions team, supporting customers throughout the full pre-sales cycle.
Responsibilities Design and implement effective cyber governance structures and risk management processes. Develop organisational models that strengthen governance and streamline cybersecurity operations.
| Title | Company | Location | Salary Range | vs Median | Posted | |
|---|---|---|---|---|---|---|
| Devoteam Cyber Trust | Vulnerability Manager| Banking May be filled | Devoteam Cyber Trust | Lisboa, Lisboa, Portugal | EUR 30k–60k | ▲ 0% | 2026-02-08 | Apply |
| Deloitte sucht Cyber Analyst May be filled | Deloitte | Lausana, Vaud, Suiza | - | - | 2026-02-08 | Apply |
| Deloitte hiring SOC Analyst May be filled | Deloitte | Nashville, Tennessee, Estados Unidos | - | - | 2026-02-08 | Apply |
| Deloitte hiring ServiceNow Senior Manager May be filled | Deloitte | Pittsburgh, Pennsylvania, Estados Unidos | - | - | 2026-02-08 | Apply |
| Database & Endpoint Detection & Response Lead May be filled | Deloitte | Indianapolis y alrededores | - | - | 2026-02-08 | Apply |
| Cybersecurity Engineer - Morgan Stanley May be filled | Morgan Stanley | Glasgow, Escocia, Reino Unido | - | - | 2026-02-08 | Apply |
| Cybersecurity Consultant - PDMFC May be filled | PDMFC | Área metropolitana de Lisboa | - | - | 2026-02-08 | Apply |
| Cybersecurity Analytics Engineer - Lafayette Group May be filled | Lafayette Group | Washington DC-Baltimore y alrededores | - | - | 2026-02-08 | Apply |
| Cyber Threat Intelligence & Incident Response Analyst - IBM May be filled | IBM | Amberes, Flandes, Bélgica | - | - | 2026-02-08 | Apply |
| Cyber Security Supply Chain Risk Manager May be filled | Manchester Digital | Mánchester, Inglaterra, Reino Unido | - | - | 2026-02-08 | Apply |
| Cyber Security Solutions Consultant - Nomios UK&I May be filled | Nomios UK&I | Mánchester, Inglaterra, Reino Unido | - | - | 2026-02-08 | Apply |
| Cyber Security Governance Consultant - Nortal May be filled | Nortal | Reino Unido | - | - | 2026-02-08 | Apply |
Salary insights
Salary tags blend employer provided ranges with Catalitium estimates. We mark ranges with Est. labels, note any missing data, and never inflate compensation to boost clicks.
Currency harmonized to USD/EUR/GBP/CHF to avoid surprises.
Outliers are reviewed manually before they appear on a card.
Sponsored employers follow the same disclosure and pay rules.
Yes. Remote-friendly AI and ML roles in the EU have grown over 30% year-on-year. Germany, France, the Netherlands, and Spain lead in volume. Use the AI and EU filters together to surface them quickly, and check the salary estimate badge to ensure the range meets your expectations.
Listings are refreshed continuously from employer feeds and normalised daily. Each card shows a posted date pill so you can see exactly how old a listing is. Jobs posted within the last 7 days receive a green New badge. Listings older than 30 days receive a May be filled warning.
Yes. Most listings show an Est. salary pill derived from Catalitium's location-based salary database, blended with any employer-disclosed range. Senior and lead roles receive an automatic seniority uplift. If a salary range is genuinely unknown we leave the field blank rather than show a misleading estimate.
A ghost job is a listing that has been live for 30+ days and is likely already filled, on hold, or was never a real opening. Research suggests up to 40% of active listings at any time are ghost jobs. Catalitium flags every listing older than 30 days with a triangle May be filled badge so you can prioritise your energy on fresh openings.
AI and ML engineer roles currently command the highest median salaries on Catalitium, around $150k–$200k USD in the US and EUR 100k–EUR 160k in Europe. Principal and Staff Engineer roles come close, followed by senior full-stack and cloud infrastructure engineers. Use the >100k filter to see only high-compensation listings.
Reference Catalitium's salary data when negotiating: show the employer the market range for your role and region. Studies show engineers who negotiate receive 10–20% more than the initial offer on average. If base salary is fixed, push on equity, signing bonus, remote allowance, and learning budget. See our Salary Negotiation Guide in the Resources section.
Zurich and Geneva (Switzerland) consistently top European tech salaries, followed by London, Amsterdam, Berlin, Paris, and Stockholm. Swiss salaries are typically quoted in CHF and translate to EUR 100k–160k for mid-senior roles. London follows at GBP 70k–110k. Berlin and Amsterdam are competitive at EUR 70k–100k for comparable experience levels.
Yes. Our free Application Tracker lets you move roles through a Kanban pipeline: Applied, Phone Screen, Interview, Offer, and Closed. It requires no account and stores everything privately in your browser. Hit the Track button on any job card to add it. You can also export your full pipeline as a CSV.
LinkedIn optimises for engagement and premium upgrades. Catalitium is built exclusively for tech candidates who want signal over noise: every listing shows salary estimates, ghost jobs are flagged, AI-powered summaries save you time reading descriptions, and the application tracker replaces the black-hole Easy Apply experience. No premium paywall, no recruiter spam.
Yes. Choose Remote in the location/country field or tap a Remote shortcut chip. Results are limited to roles that advertise remote or hybrid where the listing text supports it, and remote-friendly rows show a Remote badge.
Across Catalitium tech listings, Python, TypeScript/JavaScript, Go, Java, and cloud platforms (AWS, GCP, Azure, Kubernetes) recur most often; AI and data roles add PyTorch, TensorFlow, and LLM tooling. Title and AI summary chips reflect the employer's stated stack.
Zurich and Geneva typically lead Switzerland for software, data, and platform engineering compensation; smaller hubs follow at a discount. Swiss ranges often sit above neighbouring EU markets for comparable seniority—check Est. salary on each card when you filter by Switzerland.
Save this search and get a weekly digest of top matches. Includes salary signal. No spam.