Vulnerability Management Jobs in the UK excluding London

26 to 50 of 70 Vulnerability Management Jobs in the UK excluding London

Solutions Designer - Utilities

Portsmouth, England, United Kingdom
Hybrid / WFH Options
TalentHawk
for a contract position. The ideal candidate will have experience in software, hardware, network, and Operational Technology (OT) . Key Projects: OT Asset Discovery & Vulnerability Management OT AD Audit Tool Both projects are currently at the high-level design stage. The successful candidate will be responsible for advancing more »
Posted:

Infrastructure Services Analyst

York, Yorkshire, United Kingdom
Investigo Change Solutions
limited to: * Server OS. * Group Policy. * File systems (on-premises and cloud). * Exchange (on-premises and cloud). * M365. * SQL. * Active Directory. * Server Vulnerability Management. * Identity and Access Management. * Multi-Factor Authentication. * Active Directory. * Azure Active Directory. * ADFS (Active Directory Federation Services). * Azure Active Directory Privileged Identity … Management (PIM). more »
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Operations Manager

Liverpool, Merseyside, United Kingdom
Hybrid / WFH Options
Sanderson Recruitment Plc
timely resolution of complex issues. Reporting and Documentation : Produce security metrics and reports, maintain comprehensive documentation, and develop new procedures as necessary. Security Platforms Management : Support, maintain, and govern all security platforms, including SIEM, NAC, Firewalls, endpoint security, and more. Threat Analysis and Response : Conduct advanced analysis of network … endpoint, and log data to determine root causes and impacts of security incidents. Vulnerability Management : Lead the remediation of system vulnerabilities through patching and updates, ensuring the organisation's infrastructure remains secure. Technical Mentorship : Provide guidance and mentorship to the team, fostering a positive and professional work environment. … Stakeholder Engagement : Engage regularly with key stakeholders, facilitating open and collaborative communication across departments. Policy and Procedure Governance : Assist senior management in maintaining and updating security policies and procedures. Key Requirements: Proven experience in leading and mentoring a technical team within an IT function. Strong expertise in using and more »
Employment Type: Permanent
Salary: GBP 70,000 Annual
Posted:

Senior Information Technology Engineer

High Wycombe, England, United Kingdom
Arden Resourcing Limited
role will be a hands-on senior role within the organisation to implement and manage the entire companies’ internal infrastructure including desktop security, endpoint management, vulnerability management, asset management and working to provide security operations. The role will involve control and deployment of all processes for more »
Posted:

Senior Security Analyst

Welwyn Garden City, England, United Kingdom
Tesco
Tesco Technology are looking for a Senior Security Analyst reporting into the Vulnerability Management team. This is an exciting opportunity for a highly motivated security focused individual to join our expanding organisation. The scale and complexity of Tesco creates a huge opportunity for someone to apply their existing … public cloud environments. Following our Business Code of Conduct and always acting with integrity and due diligence and have these specific risk responsibilities: Maintaining vulnerability scanning platforms to identify and analyse vulnerabilities. Taking a risk-based approach to prioritise remediation efforts. Working with engineering teams to remediate issues. Building … security incidents and reporting about relevant security threats to contribute to our internal detection engineering programme. Work alongside our analysts to upskill them in Vulnerability Management and look for patterns and issues that can be fixed centrally. POC assessments from our active Bug Bounty Program. You will need more »
Posted:

Technical Services Manager

Leeds, England, United Kingdom
Talion
and Managed Services. Our suite of services blends together best-in-breed technologies to provide real time 24×7 monitoring, triage, remediation, threat assessment, vulnerability management, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our Security Operations Centre (SOC … levels of service. Collaboration with the Customer at both technical and business levels to underpin the activities of sub-contractors or service provisioning teams. Management of small enhancement projects utilising capabilities within the service team. Management of the handling of incidents, problems and change in their area of … of performance, collection of performance data and investigation of problems and trends. Resolution or escalation of problems, implementation of service improvement actions and programmes, management of these to agreed timelines and ownership of communication to both the Customer and internal management teams. Provision of feedback on service portfolio more »
Posted:

Security Analyst

Hampshire, England, United Kingdom
Shaw Daniels Solutions
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and … monitor for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular Vulnerability Scanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. … Asses the urgency and severity of incidents. Determine whether an incident requires immediate action or further investigation. Escalate incidents to higher tiers when necessary. Vulnerability Scanning: scan systems for vulnerabilities. and manage vulnerabilities discovered during scans. Security Tool Management: Configure and manage security tools (e.g., SIEM, IDS/ more »
Posted:

Cyber Security Consultant/Architect

Reading, England, United Kingdom
Project People
evolve your technical expertise. Create, review, and approve architecture, design, delivery, and test documentation to ensure effective governance and technical assurance. Ensure effective capacity management and planning for security services and solutions, integrating these into our technical and budget roadmaps. Support Programme and Project Managers in project planning, risk … management, and budgeting processes.What experince do you need: A mix of security consulting, architecture/design, and professional services experience. Proven ability to lead the design and review of secure system architectures, challenging existing norms to set new directions. Deep knowledge of system architectures and an understanding of the … vulnerabilities. Expertise in one or more technical domains: Cloud/Hybrid security, Infrastructure and data centre security, Network security, Application security, Identity and access management, Vulnerability Management. Familiarity with common information security management frameworks (NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF SoGP, COBIT).Project People is more »
Posted:

Senior Cyber Security Analyst

Brighton, England, United Kingdom
Hybrid / WFH Options
Hays
infrastructure for the organisation. The role responsibilities: You will be supporting the Head of IT and Cyber Security with the day-to-day operational management of the cyber security function. You will work with the Senior Cyber Security Manager to define and evolve the cyber strategy across the organisation. … and analyse security incidents and breaches, and lead incident response efforts to contain and mitigate the impact in a timely manner. Reporting to senior management on Cyber related metrics and improvement needs. Foster a culture of security awareness and compliance amongst team members and stakeholders through training, education, and … initiatives. Leading any major cyber incidents should they arise. Escalating security concerns that are not being adequately addressed through the established risk/issue management framework. You will need: You will need to be able to influence and collaborate with other teams in the organisation, and the ability to more »
Posted:

Information Security Officer

Farnborough, England, United Kingdom
Hybrid / WFH Options
Shaw Daniels Solutions
with stakeholders, to uncover emerging risks and opportunities for malicious actors. Produce written reports, status updates, actions, minutes to support decision making within the management systems governance programme. Conduct annual Business Impact Assessments with relevant teams Ensure and track that staff get the infosec training required Annual infosec and … the document review period. Compile a list of actions to address any lapses and track to conclusion. Assist with the monitoring of our platform vulnerability management systems and logging of identified vulnerabilities In the event of any security event, be part of the response team, by providing infosec more »
Posted:

Presales Consultant

Manchester Area, United Kingdom
Hybrid / WFH Options
GS Solutions
have worked within a Networking/Security setting recently. Experience solutioning Cisco, Fortinet, Juniper, Palo Alto, Netskope, Zscaler, CrowdStrike (At-least two or more) Vulnerability Management/EDR/DDoS/WAF/PAM – Beneficial MUST have an excellent understanding of current cyber security trends. more »
Posted:

Cyber Security Team Lead

Liverpool, England, United Kingdom
Forward Role Recruitment
and escalations, manage 3rd-party technical support. Provide security metrics, maintain documentation, and collaborate on technology design. Oversee security platform support, incident response, and vulnerability management. Track cyber threats, support vulnerability analysis, and lead system patching and updates. Integrate security into BAU processes, maintain technical design documentation. Act more »
Posted:

Security Engineer - Linux/MDE

Knutsford, Cheshire, North West, United Kingdom
Hybrid / WFH Options
Experis
and managing MDE on Linux platforms (preferably macOS/Windows) Experience with MDE AV, EDR, and TVM Experience with Linux system administration, including package management (rpm/yum), systemd, and troubleshooting Desirable experience with Chef management Excellent analytical and troubleshooting skills across complex systems Ability to articulate complicated … that will help you in the role: Experience with specific tooling such as Microsoft Defender for Endpoint, including AV, EDR, and TVM (Threat and Vulnerability Management) Linux Systems Administration & Troubleshooting experience Experience with various other OS types - macOS & Windows Experience with Chef, including Cookbooks & package creation, deployment, and more »
Employment Type: Permanent, Work From Home
Posted:

Information Security Manager

Leatherhead, England, United Kingdom
Hybrid / WFH Options
Zest
to processing personal data with the highest level of diligence, and you’ll play a pivotal role in maintaining and enhancing our robust infosec management system, acquiring and upholding security certifications, fulfilling the role of our Data Protection Officer and ensuring we have appropriate controls to mitigate risk. You … Simultaneously, your comfort with detail will see you managing the day-to-day operations, keeping our platform and business secure. Key responsibilities Information Security Management & Certifications ISMS Oversight: Maintain and enhance Zest’s Information Security Management System. This includes maintaining documentation, conducting and documenting risk assessments, driving improvements … latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of security systems, controls and infrastructure. Incident Management: Take charge of the response to all information security and data protection incidents and collaborate with various business units to understand, document and learn more »
Posted:

Security Analyst

Doncaster, England, United Kingdom
Forward Role Recruitment
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and Vulnerability Management tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Posted:

Devops Engineer

Romsey, England, United Kingdom
Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
Java * Python * node.js * SQL Data technologies: * Relational databases (e.g. PostgreSQL) * NoSQL databases (e.g. MongoDB) * Data streaming (e.g. kafka) * Big data (e.g. Hadoop) Cyber security * Vulnerability management (e.g. tenable) * IDAM (e.g Azure AD, Keycloak) * Static and Dynamic Analysis (e.g. SonarQube) Architectural styles * Microservices * Serverless * On premise virtualization * Cloud * Edge … compute * Containerisation (e.g. Docker, Podman) * Container management (e.g. Kubernetes) * APIs (e.g. RESTful) DevSecOps tooling * Version control (e.g. Git) * Continuous Integration/Deployment (e.g. Gitlab CI/CD) * Unit testing (e.g. JUnit) * Behaviour Driven Development (e.g. Cucumber) * Infrastructure as code (e.g. Terraform, Puppet, Ansible) If you would like to discuss more »
Posted:

Senior System Engineer

Corby, England, United Kingdom
Iron Mountain
us and see how you can elevate the power of your work at Iron Mountain. We provide expert, sustainable solutions in records and information management, digital transformation services, data centers, asset lifecycle management, and fine art storage, handling, and logistics. We proudly partner every day with our … skills in a culture that will welcome your unique contributions? If so, let's start the conversation. The Role: Senior System Engineer, IT Systems Vulnerability & Patch Management In this role, the Vulnerability & Patch Management Engineer will lead high priority projects and day-to-day activities related … to our Vulnerability & Patch Management Program. The Vulnerability Management Engineer is expected to deliver results while maintaining positive relationships with other IT infrastructure teams and project sponsors. The Vulnerability & Patch Management Engineer will work in a team based environment performing technical duties supporting Vulnerability more »
Posted:

Senior Security Engineer

Welwyn Garden City, England, United Kingdom
Tesco Technology
About the Role Tesco Technology are looking for a Security Engineer reporting into the Vulnerability Management and Pentesting team. This is an exciting opportunity for a highly motivated security focused engineer to join our expanding organisation. The role will involve being hands on with a focus on the … alongside other security colleagues bringing your experience to help. You will be responsible for: Building our detection, data correlation and response capabilities in the Vulnerability Management space. As a team we also feed into the standards and patterns for our engineering community. Create tooling and reporting to help … manage our external attack surface. Build a range of capabilities to inform our stakeholders on the status and progress of Vulnerability Management remediation efforts across the company. Automate integrations between platforms and tooling. Use your observations from security incidents and reporting about relevant security threats to contribute to more »
Posted:

Cyber Security Engineer

Reading, England, United Kingdom
Hybrid / WFH Options
The People Network
with organisational goals Assist with the development and maintenance of cyber security engineering documentation, policies, and procedures Integrate cyber security solutions (e.g. privileged access management tools) with existing systems, applications, and infrastructure Perform assessments on cloud security and create documentation that enables the business to use the cloud securely … Liaise and coordinate with technology and business stakeholders about cyber security patching and vulnerability management issues/actions Develop and maintain dashboards with cyber security engineering metrics Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Reporting into … infrastructure, network security and application security Good knowledge of MS Stack including exposure to Active Directory, Entra ID and Sentinel Knowledge of Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Linux/Unix is desirable but not essential Ideally more »
Posted:

Information Security Cloud Analyst

Northampton, England, United Kingdom
Peaple Talent
maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat intelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerability management programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of Information Security Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring more »
Posted:

Vulnerability Analyst

Glasgow, Scotland, United Kingdom
TRIA
Information Security Vulnerability Analyst £50,000 - £55,000 Hybrid - 2 days per week in either Horley/Portsmouth/Glasgow office depending on location We are looking for a brilliant Vulnerability Analyst to join a constantly growing UK utilities company as they embark on a 5 year long … for an individual that has: At least 2 years’ cyber security experience, with a background in IT infrastructure or networking Experience or knowledge of vulnerability management tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for more »
Posted:

Information Security Manager

Mansfield, England, United Kingdom
Emberleigh
security posture. Playing a pivotal role in minimising risks & protecting assets. Here’s a taste of what the role will involve: Collaborating with senior management to develop and refine the organisation’s information security strategy, aligning it with business objectives and regulatory requirements. Developing, implementing, and maintaining information & data … as the company subject-matter expert for all security-related matters and develop campaigns/strategies to improve security posture. Manage technical risks via vulnerability management oversight & gap analysis, whilst also overseeing DLP alerts and creating reports. Develop and generate metrics & dashboards for senior management review. What more »
Posted:

Lead Cloud Security Engineer

Reading, England, United Kingdom
Opus Recruitment Solutions
IaC) for secure cloud deployments Implement and manage cloud security tools, including CSPM, CWPP, and CNAPP solutions Conduct security risk assessments, threat modeling, and vulnerability management Develop and enforce security policies, standards, and best practices Automate security processes and workflows using scripting and programming languages Collaborate with cross more »
Posted:

Presales Consultant

Manchester Area, United Kingdom
Hybrid / WFH Options
InfoSec People Ltd
Excellent understanding of cybersecurity trends Ability to interpret customer landscape and challenges Strong presentation and client-facing skills Desired Skills: Knowledge across EDR, SIEM, Vulnerability Management Operational experience with security technologies Existing relationships in Manchester area Self-motivation and ability to work autonomously Job Specifics: This is a more »
Posted:

Head of Product Cyber Security SME

Hemel Hempstead, England, United Kingdom
Smiths Detection
various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in-depth … security assessments, penetration testing, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for product cyber security initiatives across the organization. Collaborate with senior management to establish product cyber security goals, policies, and procedures aligned with … business objectives. Stay current with evolving cyber threats and industry best practices to ensure the organization's readiness and resilience. Team Leadership: Matrix management of a diverse team of product cyber security professionals across different geographical locations. Foster a collaborative and inclusive work culture that encourages innovation and excellence. more »
Posted:
Vulnerability Management
the UK excluding London
10th Percentile
£36,250
25th Percentile
£45,000
Median
£52,500
75th Percentile
£71,063
90th Percentile
£91,250