Permanent Vulnerability Management Jobs in the UK

51 to 75 of 145 Permanent Vulnerability Management Jobs in the UK

Cyber Security Engineer - Firewall

Teddington, London, United Kingdom
Matchtech
number of Cyber Security Engineers to join our client, a leading technology company. As a Cyber Security Engineer you will be focused on Firewall management, network security and Vulnerability Management. You will play a vital role in protecting our client's systems and data from cyber threats. About … the Role As a Cyber Security Engineer your primary responsibility will be Firewall Management, Network Security, Network Segmentation and Vulnerability Management. In addition, you will work closely with the Cyber Security Manager and Security Architect to independently resolve complex issues. Key Responsibilities Experience with enterprise networks including next … generation firwalls, network segmentation technology (Forescout preferred) and internet connectivity. Experience with EDR, M365 security, SIEM, Vulnerability management, MITRE attack framework and Incident response. Experience of providing knowledge transfer to Service Delivery teams and developing other cybersecurity team members. Having an in-depth understanding of threats in a more »
Employment Type: Permanent
Salary: £50000 - £60000/annum
Posted:

Technology Infrastructure Engineer

Nationwide, United Kingdom
Adecco
Zscaler support, managing security vulnerabilities, user accounts and privileges, and managing all Enterprise tooling (SAAS) requirements. The post holder will be responsible for security vulnerability management, testing & deployment of patches, supporting technical projects & provide technical guidance & support to other team members. Skills & Experience Can work autonomously as part … paced environment Cisco Meraki Hardware and cloud administration Networking experience (Proxy, LAN, WIFI, 802.1x, EAP) Zscaler Admin in ZIA, ZPA & ZDX including configuration and management of alerts Amazon Web Services admin including EC2 and S3 admin Domain management including setting up and maintaining SSL, DNS records Vulnerability and Security management with change control Good working knowledge of Virtual desktop environments HubSpot cloud - administration System Administration in Microsoft Stack (Azure AD, Endpoint MDM, Exchange, SharePoint) PowerShell/Linux scripting Windows, Apple macOS & iPad/iPhones device setup and configuration WordPress VIP backend support and administration Laptop more »
Employment Type: Permanent
Salary: £70000 - £80000/annum
Posted:

SOC Engineer

Bournemouth, Dorset, South West, United Kingdom
IP People Ltd
for hidden threats and vulnerabilities within the organization's network and systems. Employing various security tools and methodologies to address potential weaknesses before exploitation. Vulnerability Management: Assisting in vulnerability assessments and penetration testing. Collaborating with IT and system administrators to prioritize and remediate identified vulnerabilities. Security Reporting … Documentation: Generating detailed reports on security incidents, response actions, and improvement recommendations. Maintaining accurate records of incidents, investigations, and security-related activities. Security Tools Management: Configuring, updating, and maintaining security tools such as firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM solutions. more »
Employment Type: Permanent
Salary: £60,000
Posted:

Information Security Assistant Manager - 18903

London Area, United Kingdom
Saxton Leigh
of the state of information security and cybersecurity and provide periodic reports (at least annually) on the state of information security to/Top management Adopt, implement and update Cybersecurity policies, rules, processes and procedures in line with Head Office regulatory Framework In reporting to the Top Management … the Group model. Work with information owners in business units to determine appropriate security objectives Monitor network activity for malicious activity Monitor and evaluates vulnerability reports, vendor hot-fixes, and vendor patches for applicability to deployed technologies Monitor the process of creating, changing, or removing user access across all … maintained and approved Responsible for the Cybersecurity and Business Continuity Training Programs EXPERIENCE REQUIRED: Minimum 2-3 years in the cybersecurity and business continuity management environment, preferably in a Financial Institution Experience in developing and Cybersecurity awareness programs Bachelor's in computer science, Information Technology or related field Experience more »
Posted:

Cyber Engineer, PAM Cyberark 2 days PW Reading - £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What We more »
Employment Type: Permanent
Salary: £40,000
Posted:

Cloud Security Engineer

EC3V, Candlewick, Greater London, Walbrook, United Kingdom
Hybrid / WFH Options
Ignite Digital Search Limited
into the Head of Information Security, eventually building and leading a new security team. Key Responsibilities: Implement and manage security controls and countermeasures. Perform vulnerability management and remediation. Collaborate with software engineering and product teams. Manage Active Directory, Azure, Office 365, and Defender services. Respond to new vulnerabilities … IDS, IPS). Knowledge of Microsoft Security Centre and Sentinel. Understanding of ISO27001:22, NIST, and secure software development. Attributes: Excellent communication and stakeholder management skills. Strong leadership and time management abilities. Collaborative approach and relationship-building skills. Why Join Us? Be part of a dynamic start-up more »
Employment Type: Permanent
Salary: £80000 - £95000/annum 10% pension,medical, bonus
Posted:

Information Security Cloud Analyst

Northampton, England, United Kingdom
Peaple Talent
maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat intelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerability management programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of Information Security Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring more »
Posted:

Head of Information Security

Reading, England, United Kingdom
Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
Posted:

Information Security Manager

EC3V, Walbrook, Greater London, United Kingdom
Hybrid / WFH Options
Ignite Digital Search Limited
into the Head of Information Security, eventually building and leading a new security team. Key Responsibilities: Implement and manage security controls and countermeasures. Perform vulnerability management and remediation. Collaborate with software engineering and product teams. Manage Active Directory, Azure, Office 365, and Defender services. Respond to new vulnerabilities … IDS, IPS). Knowledge of Microsoft Security Centre and Sentinel. Understanding of ISO27001:22, NIST, and secure software development. Attributes: Excellent communication and stakeholder management skills. Strong leadership and time management abilities. Collaborative approach and relationship-building skills. Why Join Us? Be part of a dynamic start-up more »
Employment Type: Permanent
Salary: £85000 - £95000/annum 10% pension, bonus, medical
Posted:

Security Engineer

Alconbury, England, United Kingdom
MM Flowers
in teams and with our customers, They can be used as a guide and a reference to support processes such as team development, performance management, recruitment, identification of talent, and on-going coaching to support the delivery of our ambitious growth plans. Creating Meaningful Moments that do good for … and the role they play. Relentless focus to reducing vulnerabilities with a continuous improvement mindset. Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk. Work with key vendors to design and build a cyber … into any cyber incidents. Understanding the current risk profile of the organisation by executing a programme of awareness and detection initiatives including Penetration Testing, Vulnerability Analysis, reviewing as-built documentation, security assessments and improvement programmes. Monitoring and managing a 3rd party Security Operations Centre (SOC), reviewing and monitoring SIEM more »
Posted:

IT Infrastructure Manager

Northamptonshire, England, United Kingdom
Tech4
and critical thinking techniques. Solid understanding of IT security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerability management, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments; willingness to share knowledge … knowledge in the use and support of M365 suite particularly Excel, Word, Teams and SharePoint. Essential Criteria Significant experience in a leadership or technical management role is crucial - this includes all elements of managing and motivating technical teams. Significant experience of project management in a technical management more »
Posted:

Latest IT Security Jobs

London, United Kingdom
Hybrid / WFH Options
Ashdown Group
research, code/script analysis, reverse engineering, exploitation, and documentation.- Identifying, testing, and implementing cutting-edge automated tools or enhancing existing ones to optimize vulnerability management efficiency and effectiveness.- Developing and refining code/scripts to bolster vulnerability detection, remediation/mitigation, and operational functions.- Integrating vulnerability scanning and configuration hardening in cloud environments (e.g., AWS, Microsoft Azure, Google Cloud Platform).- Conducting vulnerability scanning and reporting in alignment with the application development continuous integration and continuous delivery pipeline, streamlining work efforts through efficient use of security tools.- Spearheading security initiatives and projects with a more »
Salary: £ 80 K
Posted:

Technical Security Analyst

Nationwide, United Kingdom
Portare Solutions Limited
Support the continuous improvement of security policies, procedures, standards and guidelines Implement and improve technical processes to create efficient and secure methodologies Support the management and investigation of security events including post incident reviews in conjunction with other IT teams and members of the Information Security function Develop awareness … materials to ensure continuous improvements to the security culture for the organisation Identification, mitigation, and management of security threats, vulnerabilities and risks Providing support and guidance within IT and the Wider Business to ensure compliance with security policy and standards Research security enhancements and make recommendations Stay current on … of security principles surrounding SIEM, Antivirus, DLP, Firewalls, Open Source Filtering tools, Cloud security (Azure), IdAM (PAM on-prem/cloud), EDR, Scanning/vulnerability tools, etc. Windows Server & Networking Incident response Endpoint and network security technologies Extensive knowledge of IT Security and Governance best practices and industry standards more »
Employment Type: Permanent
Salary: £55000 - £65000/annum Strong benefits package
Posted:

Information Security Analyst

London, United Kingdom
Barclay Simpson Corporate Governance Recruitment
and contribute to overall security strategy.Responsibilities:Third Party Security: Manage client due diligence questionnaires, support onboarding new suppliers, and maintain third-party questionnaires.Information Risk Management: Collaborate with ERM, Audit, and other teams to manage risks, close audit findings, and implement risk frameworks.Policy and Standards Maintenance: Maintain ISMS-related policies … and procedures, support the Information Security GRC roadmap, and ensure compliance with ISO27001.Incident Management: Liaise with the Security Operations Team, manage technical risks, oversee vulnerability management, and handle DLP incidents.Data Privacy: Develop the Personal Information Management System (PIMS) in line with ISO 27701, manage data privacy more »
Salary: £ 70 K
Posted:

Technical Services Manager

Leeds, England, United Kingdom
Talion
and Managed Services. Our suite of services blends together best-in-breed technologies to provide real time 24×7 monitoring, triage, remediation, threat assessment, vulnerability management, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our Security Operations Centre (SOC … levels of service. Collaboration with the Customer at both technical and business levels to underpin the activities of sub-contractors or service provisioning teams. Management of small enhancement projects utilising capabilities within the service team. Management of the handling of incidents, problems and change in their area of … of performance, collection of performance data and investigation of problems and trends. Resolution or escalation of problems, implementation of service improvement actions and programmes, management of these to agreed timelines and ownership of communication to both the Customer and internal management teams. Provision of feedback on service portfolio more »
Posted:

Data Security Manager

London Area, United Kingdom
Arcus Search
you. Join them by being a key player in their innovative and forward-thinking team! Responsibilities: Partner with key stakeholders from Global Technology, Risk Management, Data Protection Officer, and Information Security to ensure products and processes are compliant, resilient, and audit-ready Ensure products comply with GDPR, CFIUS, and … end ownership of Data Controls projects to achieve success with relevant stakeholders Manage current projects related to Cloud Secure Design and Data Access Rights Management improvement to proactively meet future strategic requirements, focusing on Process, People, and Technology Strong communication and negotiation skills are essential to ensure that key … Proven business acumen and commercial awareness Experience with the '3 Lines of Defense' Governance Model Working knowledge of IT security best practices, penetration testing, vulnerability management, Incident, Problem & Change Management, and Business Continuity Robust experience in project management, analytical skills, and continuous improvement methodologies Strategic thinking more »
Posted:

Cyber Security Consultant - DV Cleared

Corsham, Wiltshire, South West, United Kingdom
83zero Limited
relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, Vulnerability Management utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain more »
Employment Type: Permanent
Posted:

Senior Security Engineer

London Area, United Kingdom
Hybrid / WFH Options
Cognitive Group | Part of the Focus Cloud Group
tools such as Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerability management, and penetration testing. Risk Management and Compliance Identify and assess security risks and develop mitigation strategies. Ensure compliance with relevant security more »
Posted:

Cyber Security Consultant

Horsham, England, United Kingdom
83zero
relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, Vulnerability Management utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain more »
Posted:

Cyber Security Manager

South East London, London, United Kingdom
The Fortune Group (Recruitment) Limited
business on what is good practice, what are the current threats and how to avoid appearing in the news. Providing specialist security advice to management, project teams and internal stakeholders. Continuous improvement of MI reporting up to and including board level audience. Monitoring the vendor and product landscape to … know what products are available. Perform threat identification and vulnerability management duties. Responsible for ensuring that security vulnerabilities are raised to internal teams and/or 3rd parties suppliers and remediated according to agree timescales. Working with internal and external teams to mitigate and/or control Cyber … Cyber Security risks within IT Operations and escalating as required. Liaising with stakeholders to determine impacts, workarounds, analytical services and recommendations for improvement. Monitoring vulnerability and intelligence feeds for the latest news and alerts in the Cyber Security space. Required You need a proven track record in Security. You more »
Employment Type: Permanent
Salary: £75,000
Posted:

Vulnerability Analyst

Glasgow, Scotland, United Kingdom
TRIA
Information Security Vulnerability Analyst £50,000 - £55,000 Hybrid - 2 days per week in either Horley/Portsmouth/Glasgow office depending on location We are looking for a brilliant Vulnerability Analyst to join a constantly growing UK utilities company as they embark on a 5 year long … for an individual that has: At least 2 years’ cyber security experience, with a background in IT infrastructure or networking Experience or knowledge of vulnerability management tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for more »
Posted:

Information & Cyber Security Analyst - Financial Services - £50,000-£70,000 + Bonus

London Area, United Kingdom
Hybrid / WFH Options
Hunter Bond
and compliance Detecting any issues or security breaches across global infrastructure Monitoring of devices and infrastructure, including reporting Investigating potential threats and issues Risk management and analysis Utilising tooling such as packet inspection and security forensics to resolve and report issues Security & Best Practice Working with various other Security … Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threat management frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerability management You will advise on Security best practices, and act more »
Posted:

SOC Manager

City of London, London, United Kingdom
Adecco
Center (SOC) team. Your role will involve managing both external and internal SOC personnel, overseeing security monitoring and analysis, incident response, threat intelligence, and vulnerability management activities. Key Responsibilities: Act as the subject matter expert on SOC matters for the organization. Manage the external SOC team and a more »
Employment Type: Permanent
Salary: £85000 - £90000/annum
Posted:

Security Analyst

Hampshire, England, United Kingdom
Shaw Daniels Solutions
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and … monitor for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular Vulnerability Scanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. … Asses the urgency and severity of incidents. Determine whether an incident requires immediate action or further investigation. Escalate incidents to higher tiers when necessary. Vulnerability Scanning: scan systems for vulnerabilities. and manage vulnerabilities discovered during scans. Security Tool Management: Configure and manage security tools (e.g., SIEM, IDS/ more »
Posted:

2nd Line Network Engineer

Nottingham, Nottinghamshire, East Midlands, United Kingdom
Hybrid / WFH Options
COMPUTACENTER (UK) LIMITED
You will be exposed to many technologies and situations which will help your career grow. The successful candidate will provide proactive and reactive network management, including resolution of network incidents, root cause analysis and completion of change requests. The role will focus on remotely resolving incidents, performing platform upgrades … relationships within IT Services and Business Change, additionally interacting with business teams, as and when required Maintain good customer relationships Managing compliance and patching, vulnerability management, ITIL BAU Queue management, small project work within the customers time frames, providing technical advice and recommendations where required Managing documentation … required Liaising with 3rd Line team members to enable any service improvement to reduce incidents on customer environments. Roles and Responsibilities: Call and incident Management Delivery of network configuration tasks on LAN, WAN and security devices Implement and manage disaster recovery and back-up of network devices Monitoring the more »
Employment Type: Permanent
Posted:
Vulnerability Management
10th Percentile
£40,000
25th Percentile
£50,500
Median
£65,000
75th Percentile
£85,000
90th Percentile
£97,500