Permanent Vulnerability Management Jobs in the South East

1 to 20 of 20 Permanent Vulnerability Management Jobs in the South East

Penetration Test Manager

Crawley, West Sussex, United Kingdom
Morson Talent
enhance a comprehensive red and purple team penetration testing program, aligning it with major threat information and industry cybersecurity intelligence. Establish and maintain a vulnerability management process to identify, assess, prioritise, and track remediation of security vulnerabilities and weaknesses in accordance with UKPN policy. Ensure that robust IT … disaster recovery and business continuity strategies and plans are in place, with regular testing to verify their effectiveness. Key Skills and Qualifications Leadership and Management: Experience: in a leadership role within a Cybersecurity Assurance function or similar, such as Cybersecurity Integration or Engineering, with a focus on assurance testing … techniques and methodologies. Team Management: Proven track record in leading a security team or function, with an emphasis on collaboration across partners with varying levels of technical security competency. Educational Background: Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM more »
Employment Type: Permanent
Posted:

Penetration Test Manager

Hampshire, South East, United Kingdom
Morson Talent
enhance a comprehensive red and purple team penetration testing program, aligning it with major threat information and industry cybersecurity intelligence. Establish and maintain a vulnerability management process to identify, assess, prioritise, and track remediation of security vulnerabilities and weaknesses in accordance with UKPN policy. Ensure that robust IT … disaster recovery and business continuity strategies and plans are in place, with regular testing to verify their effectiveness. Key Skills and Qualifications Leadership and Management: Experience: in a leadership role within a Cybersecurity Assurance function or similar, such as Cybersecurity Integration or Engineering, with a focus on assurance testing … techniques and methodologies. Team Management: Proven track record in leading a security team or function, with an emphasis on collaboration across partners with varying levels of technical security competency. Educational Background: Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM more »
Employment Type: Permanent
Posted:

Cyber Security Engineer (IT digital systems)

South East, United Kingdom
Hudson Shribman
Engineer role will support the systems and applications that deliver enterprise security services for a global organisation. With a focus on identity and access management, the Security Engineer will provide expert knowledge to support the planning, design, development, and deployment of centralized IAM and PAM solutions and the delivery … of the enterprise-level Privileged Access Management program. The role will also support the implementation and management of all cyber security technologies and services in use at the company Role & Accountabilities KEY Identity access management, experience/involvement with Security services such as SIEM and Vulnerability … a subject matter expert on key principles of (IAM) with an in-depth knowledge in the areas of authentication and authorization systems, identity lifecycle management, and identity governance. Build the IAM strategy, and ensure its implementation is a success across the business. Staying up-to-date on current IAM more »
Employment Type: Permanent
Salary: £49000 - £61000/annum
Posted:

Information Security Manager

Leatherhead, England, United Kingdom
Hybrid / WFH Options
Zest
to processing personal data with the highest level of diligence, and you’ll play a pivotal role in maintaining and enhancing our robust infosec management system, acquiring and upholding security certifications, fulfilling the role of our Data Protection Officer and ensuring we have appropriate controls to mitigate risk. You … Simultaneously, your comfort with detail will see you managing the day-to-day operations, keeping our platform and business secure. Key responsibilities Information Security Management & Certifications ISMS Oversight: Maintain and enhance Zest’s Information Security Management System. This includes maintaining documentation, conducting and documenting risk assessments, driving improvements … latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of security systems, controls and infrastructure. Incident Management: Take charge of the response to all information security and data protection incidents and collaborate with various business units to understand, document and learn more »
Posted:

Senior Information Technology Engineer

High Wycombe, England, United Kingdom
Arden Resourcing Limited
role will be a hands-on senior role within the organisation to implement and manage the entire companies’ internal infrastructure including desktop security, endpoint management, vulnerability management, asset management and working to provide security operations. The role will involve control and deployment of all processes for more »
Posted:

Threat and Vulnerability Analyst Reading 2 days PW to £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
Cyber Threat & Vulnerability Analyst - Reading 2 days PW, to £50k Are you ready to dive into the world of cyber security and protect critical digital landscapes? We are looking for a passionate and skilled Cyber Threat & Vulnerability Analyst to join a great team and help us safeguard systems … Play a pivotal role in our digital transformation journey. Collaborate with a dynamic team to enhance security measures. Engage in proactive threat hunting and vulnerability management. Key Responsibilities: Support enterprise-wide vulnerability management, ensuring effective identification, categorization, and mitigation. Develop and maintain threat assessment and vulnerability management (TVM) documentation, policies, and procedures. Integrate advanced cyber security solutions with existing systems and infrastructure. Investigate and mitigate newly identified cyber security vulnerabilities. Coordinate with stakeholders on cyber security patching and vulnerability management. Participate in major incident response when necessary. Perform proactive threat hunting for emerging more »
Employment Type: Permanent
Salary: £40,000
Posted:

Infrastructure Engineer (Security Career Development Opportunity)

Brighton, England, United Kingdom
JNC Recruitment Limited
systems and applications Responding to incidents and delivering fixes in line with SLAs and corporate processes Technical experience required includes: Comprehensive experience in SCCM management and administration Active Directory administration including DNS, DHCP, PKI and Group Policy Strong Microsoft Windows Server 2008 – 2022 Administration in a hybrid cloud environment … and Endpoint Manager PowerShell scripting ITIL Networking Fundamentals - Palo Alto and Cisco Bonus extra skills include: MS Defender/MS Defender for Cloud Tenable Vulnerability Management, or other Vulnerability Management tool Knowledge of monitoring tools such as Splunk, Netcrunch or Solarwinds (or others) This opportunity would … suit an engineer with an inherent interest in IT Security, as the role will develop the post holder's Monitoring and Vulnerabilty Management skills on the job. The role is available on a hybrid basis remotely and from the offices in easy to get to Central Brighton 1 day more »
Posted:

Cyber Security Testing Manager

Crawley, England, United Kingdom
Vallum Associates
related field or equivalent training and/or experience. Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+). Track … had to collaborate across partners with differing levels of technical security competency. Advanced knowledge and an understanding of operational excellence in Cloud Security Posture Management and Vulnerability Management programs. Understanding risk, resource availability and business objectives at a group level is necessary. Putting our customer's interests more »
Posted:

Cyber Engineer, PAM Cyberark 2 days PW Reading - £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What We more »
Employment Type: Permanent
Salary: £40,000
Posted:

Head of Information Security

Reading, England, United Kingdom
Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
Posted:

Cyber Security Consultant

Horsham, England, United Kingdom
83zero
relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, Vulnerability Management utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain more »
Posted:

Cyber Security Manager

South East London, London, United Kingdom
The Fortune Group (Recruitment) Limited
business on what is good practice, what are the current threats and how to avoid appearing in the news. Providing specialist security advice to management, project teams and internal stakeholders. Continuous improvement of MI reporting up to and including board level audience. Monitoring the vendor and product landscape to … know what products are available. Perform threat identification and vulnerability management duties. Responsible for ensuring that security vulnerabilities are raised to internal teams and/or 3rd parties suppliers and remediated according to agree timescales. Working with internal and external teams to mitigate and/or control Cyber … Cyber Security risks within IT Operations and escalating as required. Liaising with stakeholders to determine impacts, workarounds, analytical services and recommendations for improvement. Monitoring vulnerability and intelligence feeds for the latest news and alerts in the Cyber Security space. Required You need a proven track record in Security. You more »
Employment Type: Permanent
Salary: £75,000
Posted:

Security Analyst

Hampshire, England, United Kingdom
Shaw Daniels Solutions
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and … monitor for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular Vulnerability Scanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. … Asses the urgency and severity of incidents. Determine whether an incident requires immediate action or further investigation. Escalate incidents to higher tiers when necessary. Vulnerability Scanning: scan systems for vulnerabilities. and manage vulnerabilities discovered during scans. Security Tool Management: Configure and manage security tools (e.g., SIEM, IDS/ more »
Posted:

Cyber Security Manager

Maidstone, Kent, South East, United Kingdom
Pearson Whiffin Recruitment Ltd
organisations assets and information. Role & Responsibilities: To act as a trusted advisor on information security matters. Oversee, manage , and maintain the companys information security management system and associated security certifications ( currently ISO 27001 and Cyber Essentials Plus in the UK) Support internal business teams with client and 3rd party … business. Manage and lead on security events and incidents reported or highlighted through internal processes and controls. Organise and support internal and external audits, vulnerability management processes, penetration testing and business continuity/disaster recovery planning. Contribute towards the annual budget and forecasting process for Infosec related items. … and communicate this appropriately to your audience. The ability to embrace and encourage change and provide continual improvement. Implementation of and/or ongoing management of security policies and associated documentation. A pragmatic view of information security and its relationship with the wider business objectives. A willingness to self more »
Employment Type: Permanent
Posted:

Information Security Manager

Crawley, England, United Kingdom
TalentHawk
of the ever-evolving threat landscape. Here's what you'll be doing: Develop and implement a comprehensive information security program: Think risk assessments, vulnerability management, incident response, access control, the whole enchilada. Lead and empower a team of security professionals: Guide, mentor, and inspire your team to more »
Posted:

Cyber Security Consultant

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
one or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identity and access management , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and negotiating technical outcomes … with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group – Carbon positive tech recruitment more »
Posted:

Lead Cloud Security Engineer

Reading, England, United Kingdom
Opus Recruitment Solutions
IaC) for secure cloud deployments Implement and manage cloud security tools, including CSPM, CWPP, and CNAPP solutions Conduct security risk assessments, threat modeling, and vulnerability management Develop and enforce security policies, standards, and best practices Automate security processes and workflows using scripting and programming languages Collaborate with cross more »
Posted:

Senior Principal Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help engineering teams identify security-related weaknesses … IT security in one or more of the following areas: software/product security assessments, penetration testing, red teaming, web application assessments Interest in vulnerability research and exploit development Demonstrable experience in designing and evaluating complex systems for security Aptitude for self-study, setting and achieving long term goals … for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances are not required, and more »
Posted:

Information Security Officer

Farnborough, England, United Kingdom
Hybrid / WFH Options
Shaw Daniels Solutions
with stakeholders, to uncover emerging risks and opportunities for malicious actors. Produce written reports, status updates, actions, minutes to support decision making within the management systems governance programme. Conduct annual Business Impact Assessments with relevant teams Ensure and track that staff get the infosec training required Annual infosec and … the document review period. Compile a list of actions to address any lapses and track to conclusion. Assist with the monitoring of our platform vulnerability management systems and logging of identified vulnerabilities In the event of any security event, be part of the response team, by providing infosec more »
Posted:

Senior Cyber Security Analyst

Brighton, England, United Kingdom
Hybrid / WFH Options
Hays
infrastructure for the organisation. The role responsibilities: You will be supporting the Head of IT and Cyber Security with the day-to-day operational management of the cyber security function. You will work with the Senior Cyber Security Manager to define and evolve the cyber strategy across the organisation. … and analyse security incidents and breaches, and lead incident response efforts to contain and mitigate the impact in a timely manner. Reporting to senior management on Cyber related metrics and improvement needs. Foster a culture of security awareness and compliance amongst team members and stakeholders through training, education, and … initiatives. Leading any major cyber incidents should they arise. Escalating security concerns that are not being adequately addressed through the established risk/issue management framework. You will need: You will need to be able to influence and collaborate with other teams in the organisation, and the ability to more »
Posted:
Vulnerability Management
the South East
10th Percentile
£40,250
25th Percentile
£50,938
Median
£60,000
75th Percentile
£73,750
90th Percentile
£85,000