Digital Vulnerability oversight manager London 6 month contract Inside ir35 Purpose of Job • Support the oversight, governance, and enhancement of vulnerabilitymanagement activities within BI Plc. • Lead smaller-scale projects independently, analysing and developing frameworks and procedures, ensuring alignment with regulatory requirements and industry best practices. • Analysing reporting on vulnerabilitymanagement from third parties, identifying … areas of risk for escalation and ensuring their posture remains within our risk appetite. • Refining metrics and reporting on vulnerabilitymanagement, ensuring effective reporting and understanding of resilience risks. • Engage with stakeholders on operational and tactical matters, supporting the VP in strategic initiatives and remediation oversight. Background Security and Operations exist to ensure that the Bank’s security … preventing harm, damage, or loss to its people, information, or assets. This AVP role within the Cyber Resilience Team offers an opportunity to drive the enhancement of oversight of vulnerabilitymanagement activities and contribute to the bank’s ongoing regulatory compliance under DORA and other regimes. The AVP will work closely with the Threat and VulnerabilityManagementMore ❯
Central London, London, United Kingdom Hybrid/Remote Options
Colt Technology Services
Company description: We are seeking a dynamic and motivated VulnerabilityManagement Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The VulnerabilityManagement Lead will play a crucial role in tracking and managing the identification, assessment, and remediation of security vulnerabilities across … the organizations infrastructure and monitoring and reporting on vulnerability and other security compliance status. The role requires collaboration with various partners to ensure that vulnerability assessments and emerging threats are prioritized and advanced. Additionally, the successful candidate will work with management to continuously evolve the vulnerabilitymanagement program. Job description: You will be responsible for … supporting CSOC in order to achieve the below: The development and implementation of the Colt VulnerabilityManagement Framework. Enhancing the scope and efficiency of current vulnerability scanning and management tools and integration between them. Design and manage the periodic penetration testing exercise. Collaborating with identified stakeholders to provide specialist guidance and support, ensuring effective vulnerabilityMore ❯
VULNERABILITYMANAGEMENT ANALYST/VM ANALYST Up to £75,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a … major driving forces behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a VulnerabilityManagement Analyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's VulnerabilityManagement Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes … Schedules related to Vulnerability Scanning of All Endpoints of the business. As a VulnerabilityManagement Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of VulnerabilityManagement Analyst role would include More ❯
means investing in talent, technologies, and tools that empower you to own your career.Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.The Threat and VulnerabilityManagement Team Lead is responsible for defining, developing, and leading the strategic direction for safeguarding the organisation's infrastructure and applications. This is achieved by proactively identifying, assessing … sits within the Digital Engineering Services & Solutions (DES) department of the Technology Division.The role is part of the Digital Engineering Services & Solutions (DES) department, which encompasses Infrastructure and Service Management across EMEA Bank, International Securities, and the 15+ countries in which these entities operate. The position is responsible for leading the Threat and VulnerabilityManagement function, including … standards. It plays a critical role in governance, audit readiness, and the continuous improvement of MUFG's security posture, while also serving as the central coordination point for all vulnerability-related activities across DES.The successful candidate must demonstrate proven experience in leading teams and fostering a culture of technical excellence. They will be expected to establish best practices for More ❯
Manchester, Lancashire, England, United Kingdom Hybrid/Remote Options
Searchability
VulnerabilityManagement Analyst KEY POINTS * Hybrid working arrangement - Up to £55,000 p/a* Opportunity to work across vulnerabilitymanagement and wider security operations* Exposure to class-leading scanning tools and third-party penetration testing* Competitive package (DOE) ABOUT THE CLIENT We're supporting an established organisation with a strong technical footprint that is continuing … to invest in its security posture. They are now looking to add an Information Security Analyst to their vulnerabilitymanagement function, supporting the secure operation of systems across a large and complex environment. THE BENEFITS * Hybrid working pattern* Clear progression pathways and training opportunities* Exposure to a broad range of security tooling and methodologies* Collaborative culture working alongside … governance, compliance, and wider IT teams THE INFORMATION SECURITY ANALYST ROLE: In this role, you'll support the organisation's vulnerabilitymanagement processes, ensuring endpoints and systems are scanned, monitored, and assessed for risk. You'll review and interpret vulnerability scan results, assist with scheduling and planning internal and external testing activities, and support the collation and More ❯
Stoke-on-Trent, Staffordshire, England, United Kingdom Hybrid/Remote Options
Searchability
VulnerabilityManagement Analyst KEY POINTS * Hybrid working arrangement - Up to £55,000 p/a* Opportunity to work across vulnerabilitymanagement and wider security operations* Exposure to class-leading scanning tools and third-party penetration testing* Competitive package (DOE) ABOUT THE CLIENT We're supporting an established organisation with a strong technical footprint that is continuing … to invest in its security posture. They are now looking to add an Information Security Analyst to their vulnerabilitymanagement function, supporting the secure operation of systems across a large and complex environment. THE BENEFITS * Hybrid working pattern* Clear progression pathways and training opportunities* Exposure to a broad range of security tooling and methodologies* Collaborative culture working alongside … governance, compliance, and wider IT teams THE INFORMATION SECURITY ANALYST ROLE: In this role, you'll support the organisation's vulnerabilitymanagement processes, ensuring endpoints and systems are scanned, monitored, and assessed for risk. You'll review and interpret vulnerability scan results, assist with scheduling and planning internal and external testing activities, and support the collation and More ❯
security tools across enterprise endpoints. This role focuses on ensuring robust protection against threats through advanced solutions such as: Antivirus (AV) Endpoint Detection & Response (EDR) Cyber Asset Attack Surface Management (CAASM) VulnerabilityManagement platforms Required Skills & Qualifications Bachelor's degree in Computer Science, Cybersecurity, or related field (or equivalent experience) 3+ years of experience in cybersecurity engineering … with a focus on endpoint security Hands-on experience with AV and EDR platforms (e.g., CrowdStrike, SentinelOne, Microsoft Defender) Familiarity with CAASM tools and vulnerabilitymanagement solutions (e.g., Tenable, Qualys) Strong understanding of Windows, macOS, and Linux endpoint environments Knowledge of incident response processes and threat detection techniques Excellent problem-solving and communication skills Preferred Qualifications Relevant certifications … e.g., CISSP, CEH, CompTIA Security+) Experience with scripting and automation (PowerShell, Python) Exposure to SIEM platforms and integration with endpoint tools Key Responsibilities Endpoint Security Deployment & Management Implement and maintain enterprise-grade AV and EDR solutions across all endpoints Configure policies, rules, and alerts to ensure optimal security posture Monitor and troubleshoot endpoint security tools for performance and compliance More ❯
Pontefract, West Yorkshire, England, United Kingdom
VIQU IT Recruitment
Senior VulnerabilityManagement Engineer Pontefract, West Yorkshire – Permanent | £50,000 – £65,000 | 3 days in the office VIQU are partnering with a leading organisation to recruit a Senior VulnerabilityManagement Engineer to join their Information Security team. This is a hands-on role focusing on Vulnerability and Threat Management across the organisation’s technology … estate, with particular attention to the Warehouse environment. You’ll take ownership of identifying, assessing, and communicating vulnerabilities, managing vulnerability tools, and reviewing threat intelligence to proactively mitigate risks. This role also includes mentoring team members and participating in a shift rota. Key Responsibilities: • Manage and maintain vulnerability scanning and risk reporting tools. • Identify, triage, risk assess, and … technical documentation, metrics, and reporting to a high standard. • Act as a subject matter expert and mentor less experienced team members. Key Skills & Experience: • Strong experience managing and maintaining vulnerabilitymanagement tools. • In-depth understanding of Information Security, malware, attacks, and vulnerability management. • IT knowledge including network protocols, server infrastructure, Windows Server, and Linux. • Familiarity with change More ❯
Senior VulnerabilityManagement Engineer Pontefract, West Yorkshire Permanent £50,000 £65,000 3 days in the office VIQU are partnering with a leading organisation to recruit a Senior VulnerabilityManagement Engineer to join their Information Security team. This is a hands-on role focusing on Vulnerability and Threat Management across the organisation s technology … estate, with particular attention to the Warehouse environment. You ll take ownership of identifying, assessing, and communicating vulnerabilities, managing vulnerability tools, and reviewing threat intelligence to proactively mitigate risks. This role also includes mentoring team members and participating in a shift rota. Key Responsibilities: • Manage and maintain vulnerability scanning and risk reporting tools. • Identify, triage, risk assess, and … technical documentation, metrics, and reporting to a high standard. • Act as a subject matter expert and mentor less experienced team members. Key Skills & Experience: • Strong experience managing and maintaining vulnerabilitymanagement tools. • In-depth understanding of Information Security, malware, attacks, and vulnerability management. • IT knowledge including network protocols, server infrastructure, Windows Server, and Linux. • Familiarity with change More ❯
Pontefract, Knottingley, West Yorkshire, United Kingdom
VIQU IT
Senior VulnerabilityManagement Engineer Pontefract, West Yorkshire – Permanent | £50,000 – £65,000 | 3 days in the office VIQU are partnering with a leading organisation to recruit a Senior VulnerabilityManagement Engineer to join their Information Security team. This is a hands-on role focusing on Vulnerability and Threat Management across the organisation’s technology … estate, with particular attention to the Warehouse environment. You’ll take ownership of identifying, assessing, and communicating vulnerabilities, managing vulnerability tools, and reviewing threat intelligence to proactively mitigate risks. This role also includes mentoring team members and participating in a shift rota. Key Responsibilities: • Manage and maintain vulnerability scanning and risk reporting tools. • Identify, triage, risk assess, and … technical documentation, metrics, and reporting to a high standard. • Act as a subject matter expert and mentor less experienced team members. Key Skills & Experience: • Strong experience managing and maintaining vulnerabilitymanagement tools. • In-depth understanding of Information Security, malware, attacks, and vulnerability management. • IT knowledge including network protocols, server infrastructure, Windows Server, and Linux. • Familiarity with change More ❯
recent experience of using Vulcan, to be considered for the role, you will need Vulcan and the following: - Assist with the deployment of Vulcan Cyber for orchestrating and automating vulnerabilitymanagement workflows, prioritisation, and remediation tracking. Assist with the vulnerabilitymanagement lifecycle, from detection to remediation, ensuring robust protection against threats. Operate and optimise vulnerabilitymanagement tools, including Vulcan Cyber, to conduct comprehensive vulnerability assessments and generate actionable reports. Develop and deliver regular vulnerability reporting, metrics, and dashboards for management and technical teams via Vulcan Cyber, Tenable and Defender. Collaborate with incident response teams using CrowdStrike and Microsoft Defender to correlate vulnerability data with threat intelligence and active security … business stakeholders. Work closely with IT operations, development, and compliance teams to ensure timely remediation of identified vulnerabilities and adherence to regulatory standards. Contribute to the continuous improvement of vulnerabilitymanagement processes and integration with other security platforms. If this could be your next role, please forward your CV in the first instance. Due to the volume of More ❯
educate staff on common threats and misconceptions. You will also provide oversight and support for SOC operations and may participate in security-related projects. This role requires expertise in vulnerabilitymanagement, patch management, and security platforms, with a strong general knowledge of IT services. We uphold three core behaviours that guide all our actions: Love Our Customers … you save for a secure retirement. Your Impact and Responsibilities Design, implement, and maintain security measures to protect information and network infrastructure. Conduct regular security audits, risk assessments, and vulnerability scans (using tools such as Qualys). Manage and monitoring of technical vulnerabilities and manage remediation across IT assets. Monitor systems and networks for security breaches, irregular behavior, and … security-related projects as required. Stay current with emerging threats, technologies, and industry trends. Skills and Knowledge A minimum of 10 years experience in IT. Hands-on experience with vulnerabilitymanagement, patch management, and security platforms. Experience developing and auditing governance, risk, and compliance controls. Experience in incident response and security project delivery. Experience managing or participating More ❯
East and Africa, Asia and Oceania, and East Asia. The group has over 150,000 employees, offering services including commercial banking, trust banking, securities, credit cards, consumer finance, asset management, and leasing.As one of the top financial groups globally with a vision to be the world's most trusted, we want to attract, nurture and retain the most talented … better world.Please visit our website for more information - Risk, Security & Control department covers cyber security strategy maintenance and tactical planning and operations to provide IT Security protection, governance, risk management and reporting. This includes promoting the global Information Security Standards and Procedures (ISSP) requirements and local security requirements.The department deploys, supports and monitors security solutions such as virus protection … vulnerabilitymanagement, complianfce monitoring and threat/incident management activities to reduce risk. MAIN PURPOSE OF THE ROLE To lead a team of Governance Risk and Control SMEs responsible for carrying out IT Security Assessments (Secure-by-Design) on technology projects. To ensure that all projects comply with IT security policies and requirements. KEY RESPONSIBILITIES In this More ❯
with senior stakeholders across Technology, Risk and Security to deliver independent, forward-looking assurance over the firm’s Cyber Security and Resilience framework. You’ll have visibility with senior management and the Audit Committee, helping to protect the organisation against an evolving and sophisticated threat landscape. You’ll be involved in all aspects of the audit lifecycle – from risk … and deliver high-quality Cyber Security audits, providing clear, practical insights and recommendations Assess the design and effectiveness of controls across areas such as network security, identity and access management, vulnerabilitymanagement, data security, incident response and cyber resilience Stay ahead of emerging technology and regulatory developments impacting cyber risk management Partner with control owners and … senior management to influence positive change and strengthen the control environment Contribute to innovation in the audit approach, leveraging analytics and automation where possible What we’re looking for Experience in a Cyber, IT Audit or assurance function, with strong understanding of risk and control assessment Knowledge across multiple domains such as data security, network security, vulnerabilitymanagementMore ❯
Description The Senior Leader of Cyber Engineering and Identity & Access Management (IAM) will provide enterprise-wide leadership to secure critical assets, enable digital transformation, and ensure compliance with regulatory expectations. As a designated Senior Management Function (SMF) under the Financial Conduct Authority's Senior Managers & Certification Regime (SM&CR), this role carries personal accountability for the effectiveness of … the Board, shaping the organization's defense strategy while enabling secure growth. We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & Access Management (IAM), and Data Loss Prevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable … will combine deep technical expertise with strong leadership skills to shape the future of cybersecurity, identity, and data protection within the organization. This position is designated as a Senior Management Function (SMF) under the Financial Conduct Authority regime, carrying personal accountability for compliance, operational resilience, and security effectiveness. As an FCA Senior Management Function holder, this leader is More ❯
We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & Access Management (IAM), and Data Loss Prevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable, and resilient identity and data protection services. The ideal candidate will combine … deep technical expertise with strong leadership skills to shape the future of cybersecurity, identity, and data protection within the organization. This position is designated as a Senior Management Function (SMF) under the Financial Conduct Authority regime, carrying personal accountability for compliance, operational resilience, and security effectiveness. The Role: Strategic Leadership Define and execute the global strategy for Cyber Engineering … NYDFS), Sarbanes-Oxyley (SOX), and the Financia Conduct Authority(FCA). Cyber Engineering Oversight Lead engineering teams responsible for core security platforms, including endpoint protection, cloud security, network defense, vulnerabilitymanagement, and DevSecOps integrations. Build and mature a comprehensive vulnerabilitymanagement program, including continuous scanning, risk-based prioritization, remediation tracking, and Board-level reporting. Drive innovation More ❯
computing, modelling, simulation, software engineering, business systems, data acquisition, and core IT services. Within the Computing Division, the Enterprise Infrastructure Solutions unit is responsible for the design, delivery, and management of centrally supported IT infrastructure and applications. This includes enterprise compute platforms, data networks, UNIX/Linux/Windows environments, cloud services, data centres, commercial software solutions, and end … matter expertise in security architecture, cyber risk governance, and assurance frameworks. This is a cross-functional role with both advisory and hands-on responsibilities, focusing on security assurance, risk management and supporting architecture reviews, vulnerabilitymanagement, risk assessments, cyber defence posture, driving technical assurance, and embedding risk-aligned security controls across IT and OT systems and secure … Azure AD), Microsoft 365 E5, Azure IaaS/PaaS, Windows/Linux/Unix. o Strong knowledge of security tooling such as SIEM, endpoint detection (EDR/XDR), and vulnerabilitymanagement platforms. o Hands-on experience with policy development, access control models (RBAC, ABAC), and logging standards. o Experience supporting assurance activities or government-mandated reviews (e.g. GovAssure More ❯
Stoke-on-Trent, Staffordshire, England, United Kingdom
Searchability
VulnerabilityManagement & Penetration Testing Specialist Hands on technical specialist role, the chance to spearhead a technical red team operation. Working Hybrid within one of the most innovative and fastest growing technological companies in the country in the West Midlands. £80,000 p/a + 15% bonus and car scheme. Perfect for candidates that like a challenge and … is a chance to be a pivotal part of that process. What will you be doing? You will be responsible for both being the technical go to person for vulnerabilitymanagement on the clients applications, as well as being able to talk this through with your peers both technical and non-technical. This is a big multi discipline … needed. You will bring your Cyber Security and InfoSec knowledge to a point and spearhead a new 'red team' function by being the go to for penetration testing and vulnerability management. What do you need? Hands on vulnerability testing and evaluations, as well as the 'hands off' ability to discuss this with peers. PCI DSS Pen testing specialist More ❯
Stoke-On-Trent, Staffordshire, West Midlands, United Kingdom Hybrid/Remote Options
Searchability (UK) Ltd
VulnerabilityManagement & Penetration Testing Specialist Hands on technical specialist role, the chance to spearhead a technical red team operation. Working Hybrid within one of the most innovative and fastest growing technological companies in the country in the West Midlands. £80,000 p/a + 15% bonus and car scheme. Perfect for candidates that like a challenge and … is a chance to be a pivotal part of that process. What will you be doing? You will be responsible for both being the technical go to person for vulnerabilitymanagement on the clients applications, as well as being able to talk this through with your peers both technical and non-technical. This is a big multi discipline … needed. You will bring your Cyber Security and InfoSec knowledge to a point and spearhead a new 'red team' function by being the go to for penetration testing and vulnerability management. What do you need? Hands on vulnerability testing and evaluations, as well as the 'hands off' ability to discuss this with peers. PCI DSS Pen testing specialist More ❯
VulnerabilityManagement & Penetration Testing Specialist Hands on technical specialist role, the chance to spearhead a technical red team operation. Working Hybrid within one of the most innovative and fastest growing technological companies in the country in the West Midlands. £80,000 p/a + 15% bonus and car scheme. Perfect for candidates that like a challenge and … is a chance to be a pivotal part of that process. What will you be doing? You will be responsible for both being the technical go to person for vulnerabilitymanagement on the clients applications, as well as being able to talk this through with your peers both technical and non-technical. This is a big multi discipline … needed. You will bring your Cyber Security and InfoSec knowledge to a point and spearhead a new ‘red team’ function by being the go to for penetration testing and vulnerability management. What do you need? Hands on vulnerability testing and evaluations, as well as the ‘hands off’ ability to discuss this with peers. PCI DSS Pen testing specialist More ❯
framework - ensuring we remain compliant, resilient, and trusted by our customers, partners, and people. This is a highly visible role, blending strategy and delivery. You'll oversee security operations, vulnerabilitymanagement, compliance, and risk governance, while partnering with Technology, Data, Legal, and wider business teams to ensure security is embedded into everything we do - from store systems to … Security policies, standards, and controls, ensuring alignment with frameworks such as ISO 27001, NIST CSF, and the SANS Top 18. Define and report security KPIs/KRIs to senior management to senior leadership representing risk posture, compliance status, and strategic improvement initiatives. Own and manage the Information Security Risk Register; ensure risks are assessed, documented, and mitigated effectively. Lead … Own and govern IAM standards (RBAC, joiner/mover/leaver, privileged access, MFA, SSO) across corporate, store and customer facing platforms. Oversee operational security activities, including threat detection, vulnerabilitymanagement, and incident response. Coordinate penetration testing, red team, and vulnerability remediation across applications, infrastructure, and cloud environments. Develop and maintain incident response playbooks and lead investigations More ❯
operations with a strong focus on automation, detection and secure by design principles. Additionally, as part of the role you will be participating in threat detection, incident response and vulnerabilitymanagement remediation. You will be serving as an operational responder, working closely with Product, infrastructure and Security Operations teams. We are looking for a hard-working, dedicated and … system visibility by expanding logging coverage and implementing additional monitoring capabilities. Maintain, update, and regularly test incident response runbooks, containment strategies, and escalation protocols. Lead the end-to-end vulnerabilitymanagement process for ION Markets systems, from identification to remediation. Provide support for security architecture reviews of developed systems to ensure alignment with best practices. Stay up to … or operating security technologies is preferred, such as endpoint security (e.g. AV/EPP/EDR), SIEM, DLP, SWG, CASB, UEBA, IDS, IPS, firewalls, IAM/PIM/PAM, vulnerabilitymanagement, MDM, etc. About us We're a diverse group of visionary innovators who provide trading and workflow automation software, high-value analytics, and strategic consulting to corporations More ❯
multi-skilled 24/7 Infra Operations team organised by function and focussed on supporting continual improvement. The teams are divided into four core areas providing technical and service management expertise: Hosting Cloud centre of excellence Connectivity Central capabilities RRP (Recruitment and Retention Premia) The post of Technical Consultant has been awarded a Recruitment and Retention Premia (RRP) in … attracts an additional monthly RRP payment equal to 13% per annum. Main duties of the job The Technical Consultant band 7 will work closely with the Technical Operations Manager (Vulnerability and Risk Management) to reduce the overall risk and threat landscape of the NHS England Infrastructure Services estate. This will include but not be limited to: Undertaking patching … and tooling to increase the speed and efficacy of patching Work with the IT Ops team to address data quality shortfalls Work across Directorates to develop reporting capabilities from VulnerabilityManagement tooling. The Vulnerability and Patch Management team is a sub-team, embedded within the Infrastructure Services pillar, working closely with the IT Operations team. The More ❯
Company description: We are seeking a dynamic and motivated VulnerabilityManagement Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The VulnerabilityManagement Lead will play a crucial role in tracking and managing the identification, assessment, and remediation of security vuln click More ❯
research, design, implementation, and support of systems supporting information security tools and services. Participate in the development, maintenance, and utilization of standard operating procedures. Participate in conducting risk and vulnerability assessments of information systems to identity vulnerabilities, risks, and protection needs. Participate in troubleshooting processes during and outside of normal business hours. Assist with mentoring non-security teams regarding … risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS). Assist with information security training and awareness programs. Perform related duties based on departmental need. This job description can be changed at any time. Required Education Associate's Degree … or experience in the field of information security operations. Responsibilities may include, but are not limited to: endpoint security, full-disk encryption, multi-factor authentication, security incident and event management (SIEM), SSL and client certificate management, vulnerabilitymanagement, privileged access management, password management, system/application administration for security related technologies, as well as More ❯