Permanent Vulnerability Management Jobs in the UK

76 to 100 of 120 Permanent Vulnerability Management Jobs in the UK

Cyber Security Lead

Greater Bristol Area, United Kingdom
Peaple Talent
Security Experience of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerability management, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent more »
Posted:

Security Engineer

United Kingdom
Thomson Keene
Title: Security Engineer Salary: £80,000 to £100,000 We are seeking a Security Engineer, for a fast-growing FinTech firm, specialising in Wealth Management and Financial Advisory. As the first dedicated cybersecurity professional you'll play a pivotal role in establishing and fortifying the firm's cybersecurity infrastructure … development processes. Conduct thorough reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerability management, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Develop and … Familiarity with distributed event stores such as Apache Kafka. Proficiency with operating systems (e.g., Linux) and command-line interfaces. Experience with network security, incident management, and penetration testing. Familiarity with automated cloud-based CI/CD pipelines and secure software design principles. In addition to your technical prowess, we more »
Posted:

SOC Engineer

Doncaster, England, United Kingdom
Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ✨Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ✨Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and Vulnerability Management tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
Posted:

Cyber Security Technical Lead

Peterhead, Aberdeenshire, Scotland, United Kingdom
PIVT Group Ltd
on Operational Technology. This will range from complex gas terminals to simpler Above Ground Installations. Cyber data checks and updates to the Cyber Asset Management system. Ensure we have the correct asset management data is key to cyber risk management. This shall include network drawing assurance. Support the … across the Operational Technology. This reduces the risk from unauthorised access to our assets. Upgrade configurable devices as directed by security in line with vulnerability management requirements. An example could be upgrading an operating system on an industrial PC to an approved version. Where assets have been approved more »
Employment Type: Permanent
Salary: £45,000
Posted:

Security Operations Specialist

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerability management platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
Posted:

Cyber Security IT Analyst

England, United Kingdom
Hybrid / WFH Options
Larbey Evans
latest security principles, techniques, and protocols Detailed technical knowledge related to endpoints, servers, infrastructure and networking technologies Strong experience in supporting security systems, including vulnerability management, SIEM, DLP,SOAR, EDR solution, Network Firewalls etc. Working knowledge of IT processes (i.e., ITIL) including incident, problem, defect, change and release … management The Cyber Security IT Analyst requirements: 3+ years’ experience in Cyber Security IT operations (law firm preferable, professional services advantageous) Bachelor’s degree or higher in Computer Science or Information Security (essential) Advanced ability to organize, prioritize, coordinate, and work as part of a team Excellent written and more »
Posted:

Security Engineer - Linux/MDE

Knutsford, Cheshire, North West, United Kingdom
Hybrid / WFH Options
Experis
and managing MDE on Linux platforms (preferably macOS/Windows) Experience with MDE AV, EDR, and TVM Experience with Linux system administration, including package management (rpm/yum), systemd, and troubleshooting Desirable experience with Chef management Excellent analytical and troubleshooting skills across complex systems Ability to articulate complicated … that will help you in the role: Experience with specific tooling such as Microsoft Defender for Endpoint, including AV, EDR, and TVM (Threat and Vulnerability Management) Linux Systems Administration & Troubleshooting experience Experience with various other OS types - macOS & Windows Experience with Chef, including Cookbooks & package creation, deployment, and more »
Employment Type: Permanent, Work From Home
Posted:

Cloud Infrastructure Engineer

Bath, England, United Kingdom
Hybrid / WFH Options
Peaple Talent
Azure Landing Zones Azure architecture Azure Entra ID (Enterprise applications, conditional access etc.) Azure storage accounts Azure Virtual Machines Azure performance, security, and cost management MS365 Applications with certification and/or demonstrable experience of: Sharepoint MS Exchange Online On-prem infrastructure experience including: Building and configuration of MS … Windows Servers Active Directory domain knowledge Hypervisor virtualisation management (ideally VMWare) Backup solutions (ideally VEEAM) Infrastructure performance monitoring Additional Technologies: Vulnerability Management SIEM Technologies Powershell Infrastructure As Code (ideally Terraform and Ansible) Essential Desirable Knowledge and Experience: SQL Networking experience (Cisco switch, firewalls) Cisco Umbrella Nutanix Hyperconverged more »
Posted:

Security Engineer

Rugby, Warwickshire, United Kingdom
Beat My Salary
Purpose The Senior Cyber Security Engineering SME (Endpoint/Engineering Security SME) to provide strong subject matter expertise within the component area of Endpoint Management (Antivirus/DLP, endpoint security and Forensics), including, Disk Encryption, Anti-Malware, Device and Application Control, event collection & monitoring and SIEM platform guidance methodologies. … Security products within the scope of the MM contract, i.e., Encryption techniques, Event monitoring, Anti-Malware & Endpoint Protection tooling. A working knowledge of the management/fault rectification of recent product versions in relation to the subject matter field. Experience communicating across multiple stakeholder levels including End users, Suppliers … security engineering prospective. Should have knowledge & experience of implementing Security Controls & Configuration of Network appliances. (Routers, Switches, Firewall) Working knowledge & experience of Tenable SC. (Vulnerability Management, Scanning, Remediation more »
Employment Type: Permanent
Posted:

Senior Cyber Security Operations (SOC Lead)

United Kingdom
Milestone Technologies, Inc
on different aspects such as source/destination addresses, usernames, and process names) Demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerability management A sound understanding of TCP/IP and networking concepts Understanding of network design principles with and knowledge of the OSI model. more »
Posted:

Cyber Security Manager

London Area, United Kingdom
Eames Consulting
and implement complex security solutions in line with company policies and standards. • Familiarity with various security techniques and methodologies, such as threat modeling and vulnerability management. • Proficiency in automation and scripting using Python, Shell, Ansible, Jenkins, etc. • Industry certifications in information security or information technology preferred, such as CISSP more »
Posted:

Senior Infrastructure Engineer

Leeds, United Kingdom
NHS West Yorkshire Integrated Care Board
comprehensive in-house delivered training plan covering: Cisco VPN Azure Active Directory/Entra Meraki Wi-Fi Intune/Autopilot (in development) Mobile Device Management and deployment Windows 10 Office 365 and Power BI Microsoft Always On VPN (in development) Microsoft Defender for Endpoint Strong understanding of cyber and … demonstrate that you have actively been developing a journey in reducing on-premise hardware to drive cloud-based benefits. Experience with Microsoft Azure, SaaS, vulnerability management, and the ability to work effectively alone or as part of a small busy team are essential for our operational development. The … with other places to enhance Network, WAN, VPN, Telephony, Mobile devices, cyber approach and modern workspace environments. Person Specification Additional Requirements Essential Mobile Device Management and deployment Qualifications Essential Degree in a computing science or equivalent experience delivering IT infrastructure Desirable A certification which confirms ongoing self development Experience more »
Employment Type: Permanent
Salary: £35392.00 - £42618.00 a year
Posted:

Cyber Security Engineering SME

Rugby, Warwickshire, West Midlands, United Kingdom
Upbeat Ideas UK Ltd
Purpose The Senior Cyber Security Engineering SME (Endpoint/Engineering Security SME) to provide strong subject matter expertise within the component area of Endpoint Management (Antivirus/DLP, endpoint security and Forensics), including, Disk Encryption, Anti-Malware, Device and Application Control, event collection & monitoring and SIEM platform guidance methodologies. … Security products within the scope of the MM contract, i.e., Encryption techniques, Event monitoring, Anti-Malware & Endpoint Protection tooling. A working knowledge of the management/fault rectification of recent product versions in relation to the subject matter field. Experience communicating across multiple stakeholder levels including End users, Suppliers … security engineering prospective. Should have knowledge & experience of implementing Security Controls & Configuration of Network appliances. (Routers, Switches, Firewall) Working knowledge & experience of Tenable SC. (Vulnerability Management, Scanning, Remediation more »
Employment Type: Permanent
Posted:

Product Security Engineer

United Kingdom
Noa Recruitment Ltd
application security reviews and support the wider team with security best practice, testing and troubleshooting. Own the security posture of the solution, overseeing application vulnerability management, incident response and recovery process, and ensuring mitigation and escalation approaches are in place. Skill & Experience Minimum of 3 years’ experience in more »
Posted:

Lead Cloud Security Engineer

Reading, England, United Kingdom
Opus Recruitment Solutions
IaC) for secure cloud deployments Implement and manage cloud security tools, including CSPM, CWPP, and CNAPP solutions Conduct security risk assessments, threat modeling, and vulnerability management Develop and enforce security policies, standards, and best practices Automate security processes and workflows using scripting and programming languages Collaborate with cross more »
Posted:

Cyber Security Engineer

Birmingham, West Midlands, West Midlands (County), United Kingdom
Hybrid / WFH Options
Delaney & Bourton
approach threat actors take to attacking a network, phishing, port scanning, web application attacks, DDoS, lateral movement. Experience with security monitoring, incident response, and vulnerability management. Understanding of malware analysis, intrusion detection/prevention systems, and endpoint security solutions. Ability to analyze and interpret security logs and data. Role more »
Employment Type: Permanent
Salary: £55000 - £65000/annum + Benefits Package
Posted:

Threat and Vulnerability Lead

United Kingdom
Xpertise Recruitment
Xpertise are working with a client in the Insurance industry who are searching for a talented Threat and Vulnerability Lead to join their team. Job Title: Threat and Vulnerability Lead Salary: £75,000 - £90,000 Location: 3 days a week in the Central London office About the role … Security teams to assess the vulnerabilities and reduce the Cyber related risks. My client is looking for people with the following skillset: - Familiarity with vulnerability scanning and detection technologies. - Familiarity with MITRE ATT&CK framework - Excellent ability to present information and results to the business - Pen testing experience Key … responsibilities in this role will include: - This role will involve working closely with the Enterprise Security team - Great understanding of Threat and vulnerability management practices. - Working closely with, and reporting into the BISO If keen please apply more »
Posted:

Infrastructure Manager

London Area, United Kingdom
KDR Talent Solutions
and departments to align infrastructure initiatives with business goals and priorities. Monitor infrastructure performance and capacity, and proactively address any issues or bottlenecks. Manage vulnerability management What we’re looking for: Proven experience leading Infrastructure Teams Strong technical skills across a broad range of IT disciplines, including network … administration, system architecture, cybersecurity, and cloud computing. Experience delivering on a migration to Azure cloud Experience with ITIL or other IT service management frameworks is highly desirable. Knowledge of Microsoft Windows server and desktop operating systems PowerShell scripting, process automation using terraform. A good understanding of networking principles as more »
Posted:

Cyber Security Technical Lead

Millbreck, Scotland, United Kingdom
PIVT Group
on Operational Technology. This will range from complex gas terminals to simpler Above Ground Installations. Cyber data checks and updates to the Cyber Asset Management system. Ensure we have the correct asset management data is key to cyber risk management. This shall include network drawing assurance. Support the … across the Operational Technology. This reduces the risk from unauthorised access to our assets. Upgrade configurable devices as directed by security in line with vulnerability management requirements. An example could be upgrading an operating system on an industrial PC to an approved version. Where assets have been approved more »
Posted:

Information Security Consultant

City Of London, England, United Kingdom
Barclay Simpson
security risk for the whole project life cycle Perform security activities, including but not limited to, security design reviews, risk assessments, threat modelling, and vulnerability management and risk mitigation on internally & externally developed software Embedding security within DevOps (eg CI/CD pipelines), developing security requirements On-demand more »
Posted:

Cyber Security Specialist

United Kingdom
Hybrid / WFH Options
Recruit with Purpose
security principles are applied during project design to reduce risk. Education, Qualifications & Experience Required: proficiency in security technologies such as Microsoft XDR stack and vulnerability management tools. in SIEMS (Azure Sentinel) and Powershell Automation. exposure to enterprise networking and infrastructure technologies. one of more relevant Cyber Security qualification more »
Posted:

Azure SecOps Engineer

Bournemouth, Dorset, South West, United Kingdom
Hybrid / WFH Options
Interact Consulting Limited
pipelines and integrating security tooling. Scripting Responsibilities will include Lead efforts to assess the current security posture of Azure infrastructure, encompassing Azure resources, processes, vulnerability management tools, and techniques. Collaborate with the wider Infosec team and any third-party consultants engaged by the client to provide recommendations based … into CI/CD pipelines. Maintain an active risk registry and devise a plan to address identified issues in order of priority, ensuring proactive management of security risks. Please apply now. more »
Employment Type: Permanent, Work From Home
Posted:

SOC lead

Greater Manchester, England, United Kingdom
Gamma
different data sources and tools for analysis. · Previous experience of mentoring or leading SOC analysts is desirable but not essential. · Experience of risk-based vulnerability management is desirable. What do we offer? 25 days PTO + bank holidays Your birthday off Private Medical Insurance Electric Vehicle (EV) scheme more »
Posted:

Senior DevSecOps Consultant

England, United Kingdom
Computacenter
and if applicable direct reports Manage and implement projects relevant to specialist area Manages, develops and coaches team of staff and implement s performance management solutions where required Develop and motivate team to help ensure the delivery of function and business targets Acting as a point of escalation on … Liaise with colleagues to ensure best practice and continual improvement in delivery of service to the business Establishes productive relationships and networks at Senior Management level to build and maintain customer relationships Responsible for managing budget/P&L to maintain spend in line with budgetary limitations Responsible for … Orchestration, CI/CD, Testing etc.) An understanding of Agile Delivery (Kanban/SCRUM/XP/Lean/SAFe) An understanding of DevOps Management (JIRA, Confluence) Awareness of CI/CD tooling such as Jenkins, GitLab or similar Experience of Hashicorp Terraform Experience of Hashicorp Vault Awareness of more »
Posted:

Senior Cyber Security Analyst

Brighton, England, United Kingdom
Hybrid / WFH Options
Hays
infrastructure for the organisation. The role responsibilities: You will be supporting the Head of IT and Cyber Security with the day-to-day operational management of the cyber security function. You will work with the Senior Cyber Security Manager to define and evolve the cyber strategy across the organisation. … and analyse security incidents and breaches, and lead incident response efforts to contain and mitigate the impact in a timely manner. Reporting to senior management on Cyber related metrics and improvement needs. Foster a culture of security awareness and compliance amongst team members and stakeholders through training, education, and … initiatives. Leading any major cyber incidents should they arise. Escalating security concerns that are not being adequately addressed through the established risk/issue management framework. You will need: You will need to be able to influence and collaborate with other teams in the organisation, and the ability to more »
Posted:
Vulnerability Management
10th Percentile
£40,000
25th Percentile
£51,250
Median
£65,000
75th Percentile
£86,063
90th Percentile
£97,375