Vulnerability Scanning Jobs in the UK

1 to 25 of 58 Vulnerability Scanning Jobs in the UK

Security Engineer

Warrington, England, United Kingdom
Hybrid / WFH Options
Tata Consultancy Services
Configure and manage Microsoft security solutions for optimal protection. Perform data profiling and analysis to identify patterns, trends, and insights. Conduct security assessments and vulnerability scanning. Respond to security incidents and participate in incident response activities. Stay updated on evolving security threats and Microsoft security solutions. Act as a more »
Posted:

Cyber Security Manager

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Head Resourcing
team engagements to tune and validate detection tooling. Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetration testing, and vulnerability scanning. Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams. Manage the delivery of daily more »
Posted:

System Support Engineer

Redhill, England, United Kingdom
Tiger Resourcing Group
platforms. Support Windows patching process through the creation/update of ad-hoc scripting (Shell, PowerShell) on Windows Server/Desktop platforms. Assist with vulnerability scanning of devices utilizing standard security scanning tools. Manage customer expectations and resolve queries by working closely with Information Security through effective more »
Posted:

DevOps Engineer

United Kingdom
Jefferson Frank
and a pioneering mindset. Responsibilities Deploy, maintain, and enhance highly scalable multi-cloud infrastructure for blockchain nodes Contribute to hardening, logging and monitoring, and vulnerability scanning for infrastructure Identify where automation can enhance infrastructure scalability Qualifications 5+ years of experience as a DevOps Engineer Experience with AWS and more »
Posted:

Security Engineer

United Kingdom
Hybrid / WFH Options
Secure Source
identifying vulnerabilities, enhancing security measures, and ensuring the safety of our clients’ digital environments. Your responsibilities will span a wide range of tasks, from vulnerability scanning to technical content creation. Responsibilities: Vulnerability Detection and Automation: Collaborate with our security team to scan customer systems for critical vulnerabilities. … Develop new vulnerability checks using tools like Nuclei. Curate crowd-sourced checks for inclusion in our Intruder platform. Automate penetration testing processes to scale across multiple clients simultaneously. Rapid Response and Custom Scanning: Conduct custom scans on customer targets to identify emerging critical weaknesses. Provide rapid response solutions … Occasionally participate in industry events and conferences. Qualifications and Experience: Industry Experience: Minimum of 2 years in offensive security roles. Proven track record in vulnerability assessment and penetration testing. Educational Background: Technical academic background in software engineering or cyber security. Certifications (One or More): OSCP OSWE OSEP CRT CCT more »
Posted:

1st Line Support

London Area, United Kingdom
Senitor Associates
after the status and configuration of shared computers in the meeting rooms. Support the IT Team’s Cyber-Security policy by working with the vulnerability scanner and resolving issues where possible, with the support of the team. To work closely with the team in the provision of technical support more »
Posted:

Cyber Security Ops Lead

Edinburgh, Midlothian, Scotland, United Kingdom
Harvey Nash
work reactively to respond to alerts and incidents, making rapid decisions and recommendations given risk and business context. The team gather threat intelligence and vulnerability data, configure proactive monitoring rules, and are part of the handover to live for all new digital systems. The SecOps lead will balance the … the current cyber threat landscape and industry best practices and standards. Lead on scope and health of data gathering such as event monitoring and vulnerability scanning Interpret threat intelligence and vulnerability data to prioritise findings Act as technical escalation for analyst on alerts, incidents, investigations, including hands … Application platforms (MS Dynamics, Power Platform) Cloud platforms (Azure) Detection engineering (Log Ingestion, Rule Development, Tuning and Maintenance) Skills Required Security and Risk assessment Vulnerability detection, prioritisation and reporting. Ability to communicate on technical issues with users and senior managers Recent experience in incident response Ability to work well more »
Employment Type: Contract
Posted:

Security Analyst

Hampshire, England, United Kingdom
Shaw Daniels Solutions
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and monitor … for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular Vulnerability Scanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. … Asses the urgency and severity of incidents. Determine whether an incident requires immediate action or further investigation. Escalate incidents to higher tiers when necessary. Vulnerability Scanning: scan systems for vulnerabilities. and manage vulnerabilities discovered during scans. Security Tool Management: Configure and manage security tools (e.g., SIEM, IDS/ more »
Posted:

Senior Security Analyst

Welwyn Garden City, England, United Kingdom
Tesco
Tesco Technology are looking for a Senior Security Analyst reporting into the Vulnerability Management team. This is an exciting opportunity for a highly motivated security focused individual to join our expanding organisation. The scale and complexity of Tesco creates a huge opportunity for someone to apply their existing skills … public cloud environments. Following our Business Code of Conduct and always acting with integrity and due diligence and have these specific risk responsibilities: Maintaining vulnerability scanning platforms to identify and analyse vulnerabilities. Taking a risk-based approach to prioritise remediation efforts. Working with engineering teams to remediate issues. … security incidents and reporting about relevant security threats to contribute to our internal detection engineering programme. Work alongside our analysts to upskill them in Vulnerability Management and look for patterns and issues that can be fixed centrally. POC assessments from our active Bug Bounty Program. You will need: 5+ more »
Posted:

Vulnerability Analyst

England, United Kingdom
Bestman Solutions
Information Security Vulnerability Analyst – Permanent - £50,000 Annual Bestman Solutions is working with a leading energy company in their search for a Vulnerability Analyst. As a Vulnerability Analyst, you will play a vital role in identifying, prioritizing, and addressing vulnerabilities in the organization’s networks, applications, and … systems. Key responsibilities: and implement appropriate vulnerability scanning tools for both IT and OT environments. these tools to scan all assets regularly (e.g., daily, weekly) and identify potential vulnerabilities. with security teams during assessments and cyber exercises to identify vulnerabilities. the identified vulnerabilities based on severity, exploitability, and … potential impact. regular reports summarizing outstanding vulnerabilities, remediation plans, applied exceptions, and associated security risks. the vulnerability manager in navigating approval processes for remediation efforts. Qualifications: in IT Infrastructure, or Network, with a focus in cloud infrastructure and hybrid environments. experience in identifying and managing security vulnerabilities. Prior experience more »
Posted:

Senior Security Engineer

United Kingdom
identifi Global Resources
response efforts/playbooks. -You will be monitoring, remediating, and reporting on security events. -You will be Security incident Manager (SIM). -You will vulnerability configure and scan reviews & improvements -You will ensure asset management across tools is accurate. -You will review security codes and security approvals. -You will … CloudTrail, Guardduty), Qualys tools and SIEM experience, to detect and respond to security events/incidents. -Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, Vulnerability Scanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. -Proven track record of ensuring more »
Posted:

Business Analyst

United Kingdom
Hybrid / WFH Options
PURVIEW
knowledge of web application security practices, including OWASP Top Ten vulnerabilities. Experience with security tools and technologies such as SIEM, IDS/IPS, and vulnerability scanners. Analytical and Problem-Solving Skills: Ability to analyze complex security issues and develop effective solutions. Strong attention to detail and the ability to more »
Posted:

DevSecOps Engineer

Scotland, United Kingdom
Hybrid / WFH Options
Locke and McCloud
tools (Terraform, CloudFormation, etc.) Expertise in configuration management (Ansible, Chef, Puppet) and container orchestration (Kubernetes, Docker Swarm) Deep understanding of security principles, threat modelling, vulnerability scanning, and secure coding practices Familiarity with mobile development frameworks (React Native, Flutter) and application security testing (SAST, DAST, IAST) Strong problem-solving more »
Posted:

Cyber Defence Principal Consultant

London, England, United Kingdom
Jobleads-UK
essential Security transformation programmes – design and management of security solution implementations and/or remediation programmes to address risks across AV, patching, secure build, vulnerability scanning & remediation, logging, and monitoring, & threat management. Security around emerging technology platforms – primarily Cloud security & Big Data Analytics. Breach and incident management, design more »
Posted:

Information Security Specialist

London Area, United Kingdom
Hybrid / WFH Options
WPR
detection, analysis, and remediation of technical security risk. You will ideally have: • Excellent knowledge of security technologies and domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. • Familiarity with DevOps principals and technologies such as Infrastructure as Code (IaC). • Experience working within more »
Posted:

IT Security Engineer

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Sanderson Recruitment Plc
incidents relating to internal and customer assets. Designing and developing SIEM security use cases. Designing and implementing security controls and secure configurations. Maintaining proactive vulnerability scanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and more »
Posted:

Senior Account Executive

Altrincham, England, United Kingdom
Oscar
Senior Account Executive - £100k Base Salary + OTE 5 days a week in South Manchester office. The Role Selling enterprise web vulnerability scanning software to application security teams at some of the largest organizations in the world. Being the primary contact for qualified and non-qualified inbound leads more »
Posted:

Security Operations Specialist

London Area, United Kingdom
Eames Consulting
documentation, and procedures. Resolve security operations support incidents promptly. Assist Information Security Architecture team with technical security matters. Support Internal Control Framework (ICF) development, vulnerability management, and technical audits. Promote security awareness and best practices within the company Collaborate with technical teams and third-party security partners on key … projects. Technical Requirements: Expertise in security technologies (endpoint protection, vulnerability scanners, network security, cloud security, etc.). Knowledge of Privileged Access Management (PAM) best practices and technologies. Proficiency with Microsoft technologies (Windows Server, Active Directory, SQL Server). Experience with Linux distributions (Ubuntu, Red Hat, Rocky). Familiarity with more »
Posted:

DevSecOps Engineer

United Kingdom
Locke and McCloud
pipeline to ensure secure code deployment and infrastructure management. Design and implement automated security testing, including static code analysis, dynamic application security testing, and vulnerability scanning. Collaborate with development and operations teams to identify and mitigate security risks throughout the software development lifecycle. Implement and manage security controls for … Strong knowledge of security principles, practices, and technologies, including encryption, authentication, and access control. Experience with security tools and technologies such as SAST, DAST, vulnerability scanners, SIEM, and WAF. Proficiency with CI/CD tools like Jenkins, GitLab, CircleCI, or similar, and infrastructure-as-code tools like Terraform, CloudFormation more »
Posted:

DevSecOps Engineer

London Area, United Kingdom
Locke and McCloud
pipeline to ensure secure code deployment and infrastructure management. Design and implement automated security testing, including static code analysis, dynamic application security testing, and vulnerability scanning. Collaborate with development and operations teams to identify and mitigate security risks throughout the software development lifecycle. Implement and manage security controls for … Strong knowledge of security principles, practices, and technologies, including encryption, authentication, and access control. Experience with security tools and technologies such as SAST, DAST, vulnerability scanners, SIEM, and WAF. Proficiency with CI/CD tools like Jenkins, GitLab, CircleCI, or similar, and infrastructure-as-code tools like Terraform, CloudFormation more »
Posted:

DevOps Engineer

Wilmslow, England, United Kingdom
The Citation Group
security 5. Security and Compliance: Collaborate with the security team to implement best practices for securing cloud resources, including IAM policies, network security, and vulnerability scanning. 6. Collaboration: Work closely with development and operations teams to identify opportunities for automation, performance optimization, and cost savings. 7. Troubleshooting: Troubleshoot infrastructure … Docker, Kubernetes). Strong understanding of infrastructure as code (IaC) principles and tools. (Terraform, CloudFormation) Knowledge of security best practices for cloud environments. (Security scanning, patching etc. ) Knowledge and good understanding for Ideal path to live Excellent problem-solving and communication skills. Relevant certifications in Azure and AWS (e.g. more »
Posted:

macOS IT Consultant

West End, London, Oxford Circus, United Kingdom
Hybrid / WFH Options
Eligo Recruitment Ltd
IT audits, risk assessments, and ensure compliance (ISO27001, SOC2, Cyber Essentials+), and formulate IT policies. IT Security: Manage malware, AV, password security, MFA, SSO, vulnerability scanning, penetration testing, and encryption. Device Management: Handle Mobile Device Management (MDM) using Kandji, Apple Device Enrolment Program (DEP), and asset management. Business more »
Employment Type: Permanent
Salary: £45000 - £55000/annum Benefits
Posted:

Graduate Sales Executive

Leeds, West Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
AppCheck Ltd
for you. We have a comprehensive training plan that we will tailor around you. About AppCheck: AppCheck is a B2B cyber security software platform (vulnerability scanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability scan for security vulnerabilities in more »
Employment Type: Permanent, Work From Home
Posted:

DevOps & Automation Engineer

Corsham, Wiltshire, South West, United Kingdom
Envitia Ltd
core services design, deploy and troubleshoot. Familiar with ITIL service management. Security best practices, system and OS level security hardening (CISCAT benchmarking etc) security vulnerability scanning tools such as Nessus. GITOPs experience. Experience in Terraform, Ansible and ideally packer in an air gapped environment. Desirable knowledge:k8/ more »
Employment Type: Permanent
Salary: 25 days AL, buy / sell 5 days AL, birthday off, private healthcare
Posted:

Sales Executive - SaaS / Tech Sales

Leeds, West Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
AppCheck Ltd
for you. We have a comprehensive training plan that we will tailor around you. About AppCheck: AppCheck is a B2B cyber security software platform (vulnerability scanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability scan for security vulnerabilities in more »
Employment Type: Permanent, Work From Home
Posted:
Vulnerability Scanning
10th Percentile
£39,975
25th Percentile
£45,000
Median
£61,250
75th Percentile
£80,000
90th Percentile
£82,500