slough, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … relevant stakeholders and alleviate the workload of the IT Service desk function when required. The primary responsibilities of the role is to perform daily assessment of vulnerabilities identified by internal and external scans. Evaluate, risk assess and rate the results of the scan, prioritise all vulnerabilities discovered and remediate More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Liberty Global
We’re looking for a Senior Vulnerability Management Analyst to join us in either Amsterdam, London or Reading In this role you will be working closely with one of our Operating companies, Telenet, which will mean regular visits to their site in Mechelen, Belgium. The Threat and Vulnerability … management of vulnerabilities to reduce the attack surface and improve the overall security posture of Liberty Global and their entities. As such the Threat & Vulnerability Management team are looking for talented and passionate security professionals to join their team. As part of TVM our Vulnerability Management Analysts focus … on delivering the end-to-end vulnerability management process, including proactive monitoring and scanning of threats and vulnerabilities in order to protect and defend Liberty Global's interests. With vulnerabilities impacting network, endpoint, and cloud in a diverse global environment, you will be part of a highly collaborative team More ❯
Monitor security tools (firewalls, IDS/IPS, SIEM) to detect threats, investigate security alerts, logs, and incidents, and assist in incident response and remediation. Vulnerability Management: Conduct vulnerability assessments, support penetration testing, and collaborate on patching systems. Network Access Control (NAC): Configure switches and endpoints for NAC, troubleshoot … IT support (network/security/IP telephony). Technical Skills: Experience with OSPF, BGP, STP, NAC, IPT (Cisco), network monitoring tools, NDR, SIEM, vulnerabilityassessment tools, and patch management. Soft Skills: Ability to work under pressure, strong communication, and collaboration skills. Working Conditions: Flexibility for after-hours More ❯
and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC … Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerabilityassessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility More ❯
some of the brightest minds in the industry. Desired Experience (full job spec available): 5+ years experience in a technical security role Experience in vulnerabilityassessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate More ❯
some of the brightest minds in the industry. Desired Experience (full job spec available): 5+ years experience in a technical security role Experience in vulnerabilityassessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate More ❯
with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerabilityassessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate More ❯
Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat More ❯
Reading, England, United Kingdom Hybrid / WFH Options
THAMES WATER UTILITIES LIMITED
As a Senior Security Penetration Tester , you will be responsible for supporting the design, implementation, and maintenance of TVM (Threat & Vulnerability Management) solutions, controls and processes across the organisation. You will be liaising with Digital teams to ensure appropriate mitigation and remediation of vulnerabilities detected across our IT estate. … an internal penetration testing function. Conduct network, application penetration testing, code and security reviews. Identify and exploit vulnerabilities through proof-of-concept testing. Support vulnerability management across the enterprise, ensuring that a framework for identification, categorisation and mitigation exists and is implemented and maintained. Responsible for supporting the creation … of the operating model for vulnerability management, that it is shared, agreed and operates effectively across the business. Develop and maintain penetration testing documentation, policies, and procedures. Integrate cybersecurity solutions (e.g. vulnerability scanning tools) with existing systems, applications, and infrastructure. Evaluate and recommend technologies, tools, and vendors to More ❯
Reading, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and More ❯
Ensure compliance with security policies, regulatory requirements and privacy To proactively implement and develop security best practices to protect IT infrastructure. Performing audits and vulnerability assessments to ensure compliance with industry standards and company policies. Maintain system logs and documentation for compliance reporting. Supporting the groups PCI-DSS and More ❯
s respoinsibilities: Contributing to building world-class security practices and controls within a high-growth financial technology business shaping the future of payments. Conducting vulnerability assessments, leading external penetration testing, and performing risk analysis to proactively identify weaknesses in our applications, systems, and networks. Developing and maintaining comprehensive security More ❯
to protect organization's data and systems - Monitor network traffic for potential security breaches and respond appropriately to incidents - Conduct regular security audits and vulnerability assessments to identify and address security risks - Collaborate with cross-functional teams to implement security policies and procedures - Provide technical support and guidance to More ❯
identity and access management (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. Infrastructure Automation & DevOps : Develop Infrastructure as Code (IaC) using tools to automate infrastructure provisioning and management. Collaborate with DevOps teams More ❯
Reading, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
infrastructures across Python, C++, and Kotlin/Java environments, ensuring robust protection that supports high-speed, data-driven operations. You will conduct threat modelling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle and provide mentorship, guidance and More ❯
Reading, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
in GCP. • Proven background in marketing data environments, understanding infrastructure needs for marketing analytics and CDPs. • Demonstrable experience leading/contributing to security audits, vulnerability assessments, and compliance initiatives (GDPR, ISO 27001) within GCP. • Expertise in IaC with a strong preference for Terraform. • Profound understanding of GCP networking, security More ❯
Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
in GCP. • Proven background in marketing data environments, understanding infrastructure needs for marketing analytics and CDPs. • Demonstrable experience leading/contributing to security audits, vulnerability assessments, and compliance initiatives (GDPR, ISO 27001) within GCP. • Expertise in IaC with a strong preference for Terraform. • Profound understanding of GCP networking, security More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Infinigate Group
relating to information security. Conducting security awareness training and education for staff and users on best practices and emerging trends in cyber security. Use vulnerability management to improve Infinigate’s security landscape. Performing risk assessments and vulnerability scans to identify and mitigate potential threats to the network, devices … Kill Chain, ATT&CK · Knowledge & experience of common program language e.g., Python, C++, PowerShell, JavaScript Being able to perform Root Cause Analysis Experience with vulnerability assessments Ability to discover, design and document security implementations. Strong networking skills. Good understanding of securing Cloud technologies through native and multi-cloud technologies. More ❯
and staying up to date with HMG, MoD, and industry best practices. Supporting solution architects in applying secure design principles and ensuring compliance. Overseeing vulnerability assessments and coordinating formal system accreditations. Acting as a key interface with government technical authorities. What We're Looking For: Essential: CISSP or equivalent. More ❯
efforts. Manage customer security issues by understanding and mitigating risks. Provide first-line operational support for Barracuda's security services. Conduct internal and external vulnerability assessments. Support firewall and mail filtering requests at Tier one level. Address general security inquiries and provide recommendations. Monitor, troubleshoot, escalate, and remediate system More ❯
functional limits. By pioneering autonomous OS and third-party patching - AEM’s foundational use case - through peer-to-peer patch distribution and real-time vulnerabilityassessment without needing a VPN, it eliminates costly, time-consuming routine labor, preempts ransomware and security risks, and protects the digital employee experience. More ❯