secure network architectures. Monitor network traffic for suspicious activity and respond to security incidents. Conduct regular network security assessments and audits to ensure compliance with security policies and standards. Vulnerability Analysis: Conduct regular vulnerability assessments and penetration testing to identify and mitigate security risks. Develop and implement strategies to address vulnerabilities. Track and report on the status of … vulnerabilities and remediation efforts. Forensic Analysis: Perform forensic analysis of security incidents to determine the root cause and impact. Collect and preserve evidence in accordance with legal and regulatory requirements. Provide detailed forensic reports and recommendations for improving security posture. Incident Response: Lead and coordinate incident response efforts, including detection, containment, eradication, and recovery. Support development and maintenance of … are properly configured and updated. Evaluate and recommend new security tools and technologies to enhance security operations. Documentation: Create and maintain detailed documentation of security incidents, forensic analysis, and vulnerability assessments. Prepare reports for management and stakeholders. Collaboration: Work closely with other IT and Digital teams to ensure comprehensive security coverage. Provide security guidance to projects and programs as More ❯
and manage environments Collaborate with cross-functional teams to embed security at every phase of delivery Deploy and manage containerised applications using platforms such as Docker and Kubernetes Support vulnerabilityremediation, compliance reporting, and secure configuration management Monitor system performance and respond to security events within DevOps workflows Essential Skills & Experience: Current SC (Security Check) Clearance is required More ❯
and manage environments Collaborate with cross-functional teams to embed security at every phase of delivery Deploy and manage containerised applications using platforms such as Docker and Kubernetes Support vulnerabilityremediation, compliance reporting, and secure configuration management Monitor system performance and respond to security events within DevOps workflows Essential Skills & Experience: Current SC (Security Check) Clearance is required More ❯
Bournemouth, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Principal Security Engineer (Vulnerability Management), bournemouth col-narrow-left Client: Oracle Location: bournemouth, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 5 Posted: 26.06.2025 Expiry Date: 10.08.2025 col-wide Job Description: Do you have a passion for high scale services and working with … some of Oracle's most critical customers? We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in vulnerability management and cloud security. This position is designed for technical security engineers adept at navigating the complexities of cloud security and leading efforts to increase security posture. In this key role, you will critically assess … and create the future of software assurance at scale together. What You’ll Bring A minimum of 8 years of experience in the cybersecurity field, with a focus on vulnerability management, cloud security, and security architecture analysis. Strong understanding of vulnerability management processes, remediation workflows, and validation of security findings Experience designing and managing security metrics, dashboards More ❯
Exeter, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Principal Security Engineer (Vulnerability Management), exeter col-narrow-left Client: Oracle Location: exeter, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 5 Posted: 26.06.2025 Expiry Date: 10.08.2025 col-wide Job Description: Do you have a passion for high scale services and working with … some of Oracle's most critical customers? We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in vulnerability management and cloud security. This position is designed for technical security engineers adept at navigating the complexities of cloud security and leading efforts to increase security posture. In this key role, you will critically assess … and create the future of software assurance at scale together. What You’ll Bring A minimum of 8 years of experience in the cybersecurity field, with a focus on vulnerability management, cloud security, and security architecture analysis. Strong understanding of vulnerability management processes, remediation workflows, and validation of security findings Experience designing and managing security metrics, dashboards More ❯
Bath, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Principal Security Engineer (Vulnerability Management), bath col-narrow-left Client: Oracle Location: bath, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 4 Posted: 26.06.2025 Expiry Date: 10.08.2025 col-wide Job Description: Do you have a passion for high scale services and working with … some of Oracle's most critical customers? We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in vulnerability management and cloud security. This position is designed for technical security engineers adept at navigating the complexities of cloud security and leading efforts to increase security posture. In this key role, you will critically assess … and create the future of software assurance at scale together. What You’ll Bring A minimum of 8 years of experience in the cybersecurity field, with a focus on vulnerability management, cloud security, and security architecture analysis. Strong understanding of vulnerability management processes, remediation workflows, and validation of security findings Experience designing and managing security metrics, dashboards More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Forward Role
Cyber Vulnerability Engineer – eDV cleared Package - £55,000 - £95,000 (depending in experience level) Benefits – DV Bonus plus excellent benefits Relocation assistance for UK based candidates to Manchester, Cheltenham or London. Join a trusted leader in National Security technology solutions. Are you passionate about using cutting-edge cyber technology to protect the UK? Do you enjoy solving technical cyber … they work, but to identify weaknesses, assess risks, and develop mitigation strategies. What You'll Be Doing Researching, designing, and building resilient systems to support National Security objectives. Conducting vulnerability assessments and threat modelling on software and hardware components. Reverse engineering a wide range of technologies to uncover vulnerabilities and improve security. Writing secure, high-performance code that integrates … Proficiency in one or more of C, C++, or C#. Familiarity with scripting and automation using Python. Experience working with Linux or Windows-based systems. Hands-on experience with vulnerability scanning tools (e.g., Nessus, OpenVAS, Burp Suite, or similar). Familiarity with CVSS scoring, vulnerability databases (e.g., NVD, MITRE ATT&CK), and risk prioritization frameworks. Understanding of patch More ❯
requirements Automate infrastructure provisioning using Infrastructure as Code (IaC) tools such as Terraform or CloudFormation Monitor systems and applications for performance, security and reliability Assist in incident response and vulnerabilityremediation processes Provide guidance and mentorship on secure coding and DevSecOps practices Essential Skills & Experience: Active SC Clearance (mandatory) Strong experience with DevOps tools such as Jenkins, GitLab More ❯
requirements Automate infrastructure provisioning using Infrastructure as Code (IaC) tools such as Terraform or CloudFormation Monitor systems and applications for performance, security and reliability Assist in incident response and vulnerabilityremediation processes Provide guidance and mentorship on secure coding and DevSecOps practices Essential Skills & Experience: Active SC Clearance (mandatory) Strong experience with DevOps tools such as Jenkins, GitLab More ❯
Bath, Somerset, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Infrastructure Security Analyst, SCCM, Vulnerability, Patch management, Qualys/Nessus Our client, a leading private sector business based in Bath, is looking to hire contractor with a background in infrastructure and related security. The successful candidate will be responsible for ensuring security and integrity for our clients IT infrastructure, taking responsibility for patching and vulnerabilityremediation for … patch management systems to ensure all systems are up to date and protected from security threats. Server hardening to Windows systems, both physical and virtual. Maintain accurate documentation of remediation activities Assist in incident response by applying emergency patches and remediations Contribute to disaster recovery and business continuity plans Skills and experience required: - Windows server including patching processes Server …/security hardening. Vulnerability management tools e.g. Nessus, Qualys, for conducting vulnerability assessments Hands-on experience in patch management systems - SCCM, WSUS, or Azure Update Management - for deploying patches in both on-premises and cloud Proficiency in cloud security Experience with security frameworks and best practices for ensuring compliance in patching and vulnerability management. Reasonable Adjustments: Respect More ❯
Mission Systems, Phantom Works, F-22, and Flight Simulation initiatives. You will help provide enterprise capabilities within closed networks, encompassing standard office environments, application development stacks, engineering workflows, and vulnerability remediation. If you’re passionate about leveraging your Linux skills to enhance operational efficiency and support cutting-edge aerospace programs, we want you on our team! Join us in More ❯
Salisbury, England, United Kingdom Hybrid / WFH Options
Finsbury Food Group Plc
term career development. This is what you’ll actually do! As Group IT Risk Security Lead they will conduct security audits, risk assessments and investigations, identifying vulnerabilities and proposing remediation strategies. They will develop and enforce cybersecurity policies aligned with regulatory frameworks and best practices, and lead cross-functional cyber incident planning sessions, collaborating with key business units to … demonstrable experience in: Leading cybersecurity governance, risk management, and compliance initiatives within an enterprise environment. Managing incident response frameworks, including cross-functional planning and coordination. Conducting security audits and vulnerability assessments, with a proven track record of risk mitigation. Designing and implementing cybersecurity awareness programs to enhance company-wide security culture. Handling third-party cybersecurity risk, ensuring secure vendor More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating More ❯
security posture. This role is ideal for someone who understands the intersection of engineering, operations, and cybersecurity and wants to make a meaningful impact in complex, real-world environments. Vulnerability Management Security Assessment Policy Development Compliance and Regulations: Ensuring compliance and providing SME support to programmes of work delivering transformation in line industry standards such as IEC62443 and Industry … regulations (NIS, CAF, OG86 and HSE). Network Security Key Responsibilities Support the development and implementation of OT cyber security practices Contribute to the identification and remediation of vulnerabilities in OT systems Work with engineering, operations, and IT teams to embed cyber resilience across environments Help monitor and improve security controls, networks, and access policies Assist in the response More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating More ❯
security posture. This role is ideal for someone who understands the intersection of engineering, operations, and cybersecurity and wants to make a meaningful impact in complex, real-world environments. Vulnerability Management Security Assessment Policy Development Compliance and Regulations: Ensuring compliance and providing SME support to programmes of work delivering transformation in line industry standards such as IEC62443 and Industry … regulations (NIS, CAF, OG86 and HSE). Network Security Key Responsibilities Support the development and implementation of OT cyber security practices Contribute to the identification and remediation of vulnerabilities in OT systems Work with engineering, operations, and IT teams to embed cyber resilience across environments Help monitor and improve security controls, networks, and access policies Assist in the response More ❯
security posture. This role is ideal for someone who understands the intersection of engineering, operations, and cybersecurity and wants to make a meaningful impact in complex, real-world environments. Vulnerability Management Security Assessment Policy Development Compliance and Regulations: Ensuring compliance and providing SME support to programmes of work delivering transformation in line industry standards such as IEC62443 and Industry … regulations (NIS, CAF, OG86 and HSE). Network Security Key Responsibilities Support the development and implementation of OT cyber security practices Contribute to the identification and remediation of vulnerabilities in OT systems Work with engineering, operations, and IT teams to embed cyber resilience across environments Help monitor and improve security controls, networks, and access policies Assist in the response More ❯
focal point for the organisation outside of hours, covering our emergency support hours, 24 hours a day, 7 days a week. Supporting in DR tests across multiple virtual platforms. Remediation security vulnerabilities highlighted by our compliance team. Performing scheduled planned change work outside of hours. Helping with the setup, configuration, and support of our Linux and Windows servers. Innovating More ❯
week ago DE&S Information Assurance Analyst – Crypto Bristol, England, United Kingdom 1 day ago Data Centre Technician, Operations, IT, & Support Engineering Bristol, England, United Kingdom 2 weeks ago VulnerabilityRemediation Management Analyst Bristol, England, United Kingdom 2 weeks ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with More ❯
Social network you want to login/join with: Senior Application Security Architect, plymouth col-narrow-left Client: Opus Recruitment Solutions Location: plymouth, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 3 Posted More ❯