3 of 3 Vulnerability Assessment Jobs in Yorkshire

SQL Developer

Hiring Organisation
Stratacent
Location
West Yorkshire, England, United Kingdom
Implement rollback, validation, and release strategies for database changes. Security & Compliance Manage user access, roles, and permissions. Implement auditing, encryption, and compliance standards. Support vulnerability assessments and security reviews. Collaboration & Support Partner with application, infrastructure, and DevOps teams. Provide L3 support for production issues and root‐cause analysis. Create ...

Technology Operational Resilience Lead / ITSM SME

Hiring Organisation
Hydrogen Group
Location
Sheffield, South Yorkshire, England, United Kingdom
Employment Type
Contractor
Contract Rate
£850 - £1,000 per day
join a growing team focused on strengthening technology resilience and third-party risk management. This role will sit across both: Operational Resilience - supplier mapping, vulnerability assessments, and resilience frameworks ITSM/IT Controls - assessing supplier controls, ITIL environments, and technology resilience standards You'll be working closely with senior ...

IT Security Analyst

Hiring Organisation
Elevation Recruitment Group
Location
Great Kelk, Driffield, North Humberside, England, United Kingdom
Employment Type
Full-Time
Salary
£40,000 - £48,000 per annum
platforms) to strengthen overall security posture Lead on the investigation of security alerts and incidents, ensuring appropriate triage, escalation, and resolution Carry out regular vulnerability assessments, track remediation progress, and provide clear reporting on risk exposure Support the configuration of secure systems and ensure infrastructure is aligned with security … data protection measures Skills & Experience: Demonstrable experience in a cybersecurity or infrastructure-focused security role Practical, hands-on exposure to SIEM platforms and vulnerability management tools Strong understanding of endpoint detection and response technologies (EDR, XDR, MDR) Good working knowledge of common cyber threats, attack methods, and core security ...