Vulnerability Management Jobs

1 to 25 of 510 Vulnerability Management Jobs

Cyber Vulnerability Management Analyst

London, UK
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very … Cyber Security Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic More ❯
Posted:

Cyber Vulnerability Management Analyst

City of London, London, United Kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very … Cyber Security Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic More ❯
Posted:

Tenable Vulnerability Management Analyst - Banking sector

London, UK
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very … Cyber Security Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic More ❯
Posted:

Tenable Vulnerability Management Analyst - Banking sector

City of London, London, United Kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very … Cyber Security Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic More ❯
Posted:

ASPIRE Global Service Centre Vulnerability & Security Compliance Lead

Belfast, UK
Version 1
partnering with customers to go beyond expectations through the power of cutting-edge technology and expert teams.Our deep expertise in cloud, data and AI, application modernisation, and service delivery management has redefined businesses globally, helping shape the future for large public sector organisations and major global, private brands. We put users and user-centric design at the heart of … Services Practice: Services Reliability Group Vetting Requirements: SC Clearance/CTC Clearance level is mandatory. Role Summary: Our ASPIRE Global Service Centre is the central hub of our Service Management operations. Beyond a traditional Service Desk, it stands as the central authority and shared service delivery hub, orchestrating all operational workflows, processes, procedures, and tooling. Its a core delivery … we utilise the best digital capabilities of the ServiceNow ITSM tooling product to provide the very best Experience to our Customers. We are seeking an experienced and results-driven Vulnerability & Security Compliance Lead who plays a critical role in ensuring the security and reliability of our customers IT infrastructure. This role is responsible for leading efforts to identify, assess More ❯
Posted:

Vulnerability & Security Compliance Lead

Belfast, UK
Version 1
partnering with customers to go beyond expectations through the power of cutting-edge technology and expert teams.Our deep expertise in cloud, data and AI, application modernisation, and service delivery management has redefined businesses globally, helping shape the future for large public sector organisations and major global, private brands. We put users and user-centric design at the heart of … Services Practice: Services Reliability Group Vetting Requirements: SC Clearance/CTC Clearance level is mandatory. Role Summary: Our ASPIRE Global Service Centre is the central hub of our Service Management operations. Beyond a traditional Service Desk, it stands as the central authority and shared service delivery hub, orchestrating all operational workflows, processes, procedures, and tooling. Its a core delivery … we utilise the best digital capabilities of the ServiceNow ITSM tooling product to provide the very best Experience to our Customers. We are seeking an experienced and results-driven Vulnerability & Security Compliance Lead who plays a critical role in ensuring the security and reliability of our customers IT infrastructure. This role is responsible for leading efforts to identify, assess More ❯
Posted:

Information Security Analyst - Audit, Compliance & Cybersecurity

Southampton, Hampshire, United Kingdom
Hybrid / WFH Options
NICE
activities, including incident monitoring and response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits. Gap Assessments: Facilitate and/or conduct internal gap assessments and audit readiness … of compliance processes. Audit Findings: Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security Monitoring: Use tools such as … and implementing recommendations to improve the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. Vulnerability Management: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong expertise in audit and compliance More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SecOps Engineer

Bristol, Gloucestershire, United Kingdom
Unite Foundation
secure network architectures. Monitor network traffic for suspicious activity and respond to security incidents. Conduct regular network security assessments and audits to ensure compliance with security policies and standards. Vulnerability Analysis: Conduct regular vulnerability assessments and penetration testing to identify and mitigate security risks. Develop and implement strategies to address vulnerabilities. Track and report on the status of … are properly configured and updated. Evaluate and recommend new security tools and technologies to enhance security operations. Documentation: Create and maintain detailed documentation of security incidents, forensic analysis, and vulnerability assessments. Prepare reports for management and stakeholders. Collaboration: Work closely with other IT and Digital teams to ensure comprehensive security coverage. Provide security guidance to projects and programs … solutions. Network Security: Strong understanding of network protocols, VPNs, and network security architecture. Incident Response: Ability to detect, analyse, and respond to security incidents, including forensics and malware analysis. Vulnerability Management: Experience in identifying, assessing, and mitigating vulnerabilities in systems and applications. Automation: Skills in scripting and automation for security tasks (e.g. Python, PowerShell). Information Security Frameworks More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cloud Security Engineer Tombola

Sunderland, United Kingdom
CyberNorth
infrastructure. You'll be hands-on, designing, implementing, and managing top-notch security solutions across all our cloud environments. You'll also play a key part in developing our vulnerability management program, working closely with our operational support, infrastructure, and development teams. Plus, you'll be right in the thick of security event monitoring, threat intelligence, and incident … management - keeping us one step ahead! What you'll be doing: Delivering SOC Capabilities: You'll be a key team member in delivering ongoing Security Operations Centre (SOC) capabilities for the business. Driving Automation: You'll push for security automation wherever possible and play a big part in evolving our security tooling and services. Policy & Standards: You'll champion … security, including firewalls, WAF, anti-virus, and O365 compliance & security centre. Familiarity with NIST (CSF Framework 2.0), ISO 27001, PCI-DSS, and GDPR. Experience operating and managing SIEM solutions, vulnerability management tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and/or SecOps oriented teams. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cloud Security Engineer - Sunderland (Hybrid) Sunderland, UK

Sunderland, United Kingdom
Hybrid / WFH Options
Tombola
infrastructure. You'll be hands-on, designing, implementing, and managing top-notch security solutions across all our cloud environments. You'll also play a key part in developing our vulnerability management program, working closely with our operational support, infrastructure, and development teams. Plus, you'll be right in the thick of security event monitoring, threat intelligence, and incident … management - keeping us one step ahead! What you'll be doing: Delivering SOC Capabilities: You'll be a key team member in delivering ongoing Security Operations Centre (SOC) capabilities for the business. Driving Automation: You'll push for security automation wherever possible and play a big part in evolving our security tooling and services. Policy & Standards: You'll champion … firewalls, WAF, anti-virus, and O365 compliance & security centre . Familiarity with NIST (CSF Framework 2.0), ISO 27001, PCI-DSS, and GDPR . Experience operating and managing SIEM solutions , vulnerability management tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and/or SecOps oriented teams More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer

England, United Kingdom
Hybrid / WFH Options
Cerebras
CaptivateIQ is the leading Sales Performance Management solution, recognized by Forrester and G2, and trusted by customers including Affirm, Gong, and Figma. With solutions for Sales Planning and Incentives, we help revenue teams automate processes, hit revenue targets, and adapt with business change, ultimately driving efficient growth. It's time to rethink ROI - your return on incentives - with CaptivateIQ. … and remediate application and cloud security vulnerabilities (e.g., XSS, SSRF, CSRF, CORS, SQL Injection, broken authentication/authorization, encryption flaws). Provide expert guidance on secure coding practices, common vulnerability classes (e.g., OWASP Top 10), and threat modeling for modern web applications. Conduct security reviews of design and architecture documents; lead threat modeling exercises using frameworks such as STRIDE … tooling (e.g., Burp Suite, ZAP, Amass, Nmap). Assess and mitigate static (SAST) and dynamic (DAST) vulnerabilities across services and components. Evaluate, implement, and maintain security tooling to support vulnerability management, secure development, and event detection workflows. Define and track metrics related to application security, vulnerability remediation, detection coverage, and incident response effectiveness. Support compliance initiatives (e.g. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Enterprise Security Architect

East London, London, United Kingdom
HMRC
patterns and reference architectures that will drive adoption of modern technology meeting HMRCs business driven need towards rationalised strategic platforms. In addition, you may be encouraged to undertake line management responsibilities developing and managing a team. You may be expected to own and develop CSTS capabilities and/or services. Person specification Ideal candidate: A business and technology leader … development and delivery of technical security controls and services. Focused expertise to develop and lead within one or many security technology domains aligning capability to security tooling. Key stakeholder management experience across senior business and technical environments including vendors, partners and other government departments. Able to demonstrate a proven history of delivering high value outcomes in challenging and complex … the Secure by Design Lifecycle. Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors, and programs. Essential Criteria: You More ❯
Employment Type: Permanent
Salary: £80,000
Posted:

Enterprise Security Architect

Edinburgh, Midlothian, Scotland, United Kingdom
HMRC
patterns and reference architectures that will drive adoption of modern technology meeting HMRCs business driven need towards rationalised strategic platforms. In addition, you may be encouraged to undertake line management responsibilities developing and managing a team. You may be expected to own and develop CSTS capabilities and/or services. Person specification Ideal candidate: A business and technology leader … development and delivery of technical security controls and services. Focused expertise to develop and lead within one or many security technology domains aligning capability to security tooling. Key stakeholder management experience across senior business and technical environments including vendors, partners and other government departments. Able to demonstrate a proven history of delivering high value outcomes in challenging and complex … the Secure by Design Lifecycle. Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors, and programs. Essential Criteria: You More ❯
Employment Type: Permanent
Salary: £80,000
Posted:

Enterprise Security Architect

Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
patterns and reference architectures that will drive adoption of modern technology meeting HMRCs business driven need towards rationalised strategic platforms. In addition, you may be encouraged to undertake line management responsibilities developing and managing a team. You may be expected to own and develop CSTS capabilities and/or services. Person specification Ideal candidate: A business and technology leader … development and delivery of technical security controls and services. Focused expertise to develop and lead within one or many security technology domains aligning capability to security tooling. Key stakeholder management experience across senior business and technical environments including vendors, partners and other government departments. Able to demonstrate a proven history of delivering high value outcomes in challenging and complex … the Secure by Design Lifecycle. Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors, and programs. Essential Criteria: You More ❯
Employment Type: Permanent
Salary: £80,000
Posted:

Cyber Vulnerability Management Analyst

London Area, United Kingdom
Hybrid / WFH Options
FirstBank UK Limited
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months FirstBank UK is a globally recognised, top-tier bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business with over 10 million active customers in over 700 business locations is the … oldest African bank in the UK. Due to business requirements, we are now looking to acquire the services of an experienced Cyber Vulnerability Management Analyst Please note that this is a hybrid role with 3 days in the office and 2 days working from home. Key Responsibilities: In this fixed term contract role, you will be part of … the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all More ❯
Posted:

Cyber Vulnerability Management Analyst

City of London, London, United Kingdom
Hybrid / WFH Options
FirstBank UK Limited
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months FirstBank UK is a globally recognised, top-tier bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business with over 10 million active customers in over 700 business locations is the … oldest African bank in the UK. Due to business requirements, we are now looking to acquire the services of an experienced Cyber Vulnerability Management Analyst Please note that this is a hybrid role with 3 days in the office and 2 days working from home. Key Responsibilities: In this fixed term contract role, you will be part of … the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all More ❯
Posted:

Information Systems Security Engineer (ISSE) with Security Clearance

Chantilly, Virginia, United States
Executive Management Services, LLC
Mission Partner Capabilities Office (MPCO) also known as SAF/CDMX Directorate. The Mission Partner Capabilities Office provides design, configuration, accreditation and implementation of mission and R&D information management systems and cloud-based solutions that support defense and intelligence priorities as well as internal business processes and mission functions, network communications, database management, security accreditation, and workflow … such that the ISSE is responsible for compliance-based cybersecurity engineering to include but not limited to cybersecurity engineering and generation of body of evidence requirements per DoD Risk Management Framework (RMF). Additionally, the ISSE shall provide management and professional support, assistance, advice, to support the efficient and effective management and operation of the organization, activities … to: • Provide expertise and recommendations in applying security requirements to complex combatant command projects, identifying gaps, and while integrating new technologies. • Develop secure system architectures and hardening solutions. • Conduct vulnerability assessments, security testing, and continuous monitoring. • Implement security controls per RMF and NIST guidelines. • Support risk assessments and incident response efforts. • Ensure security policies and best practices are integrated More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Operations and Security Lead

London
Nexus Jobs Limited
Security Lead In summary the Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk ?" ideally from within the banking or insurance sector. The IT Operational … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … technically augment the team capabilities (when required) and have a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection More ❯
Employment Type: Permanent
Posted:

Senior Information Systems Security Engineer SME (Advisor - SME) with Security Clearance

Chantilly, Virginia, United States
Gemini Industries Inc
GEMINI INDUSTRIES INC. provides technical, management and operations services to support National Security projects. We provide rapid response to the critical needs of our customers and those they serve. We perform analyses and develop operations plans to anticipate and prepare for the future. And we deliver advanced technology to improve our customer's success in executing its mission. Gemini … days and exceed requirements within 90 days. Responsibilities: The Senior Information Systems Security Engineer (SME) will directly support the Secretary of the Air Force (SAF)/Concept Development Management Office (CDM)/(CDMM) Mission Architecture Innovation Directorate. The Mission Architecture Innovation Directorate provides design, configuration, accreditation and implementation of mission and R&D information management systems and cloud … based solutions that support defense and intelligence priorities as well as internal business processes and mission functions, network communications, database management, security accreditation, and workflow management. The Information Systems Security Engineer (ISSE) (SME) is responsible for designing, implementing, and maintaining security controls to protect the organization's information systems in accordance with Department of Defense (DoD) requirements. This role More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer (f/m/d)

Guildford, Surrey, United Kingdom
Allianz Popular SL
for tomorrow. At Allianz Global Investors we foster a culture of professionalism, fulfilment, and an inclusive working environment. Do you want to be part of a leading active asset management company? Then join us now! This position sits within the Core IT Services department, which provides an IT infrastructure platform for the business. The team has two primary focuses … close alignment with our global Information Security team Act as a point of contact to third-party(-ies), service providers as well as within the Core IT Services, Risk Management, Enterprise Architecture, IT Support/Workplace, IT Compliance, Information Security, Business Resilience, Procurement, Finance and other cross-functions What you bring Required Hands-on experience implementing, managing, and improving …/IDS, WAF, EDR, etc., experience with the Microsoft Security Suite is ideal Deep technical expertise and relevant experience in security operations (threat intelligence, security monitoring, incident/crisis management, vulnerability management and security engineering), with the ability to run consistent global operations across these areas Hands-on experience responding to incidents, including use of various response More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Manager

Reading, Oxfordshire, United Kingdom
Hays Technology
and Security functions are central to this position, leading a team of specialist engineers to maintain the secure operation of services and contributing to major projects that impact identity management across the organisation. The post holder also serves as a technical authority within the team and department. What you'll need to succeed Security Operations & Incident Response Lead security … operations services, including monitoring, incident response, threat management, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery efforts with internal teams and vendors. Establish and manage threat intelligence processes to ensure timely remediation of vulnerabilities. Monitor and analyse performance metrics … to support security troubleshooting and continuous improvement. Identity & Access Management Provide expert technical leadership for identity and access management, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of identity services, ensuring reliability and user demand readiness. Shape and deliver a strategic roadmap for identity services, focusing on automation and proactive improvements. More ❯
Employment Type: Permanent
Salary: GBP 57,696 - 73,039 Annual
Posted:

Security Operations Manager

Reading, Berkshire, South East, United Kingdom
Hays
and Security functions are central to this position, leading a team of specialist engineers to maintain the secure operation of services and contributing to major projects that impact identity management across the organisation. The post holder also serves as a technical authority within the team and department. What you'll need to succeed Security Operations & Incident Response Lead security … operations services, including monitoring, incident response, threat management, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery efforts with internal teams and vendors. Establish and manage threat intelligence processes to ensure timely remediation of vulnerabilities. Monitor and analyse performance metrics … to support security troubleshooting and continuous improvement. Identity & Access Management Provide expert technical leadership for identity and access management, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of identity services, ensuring reliability and user demand readiness. Shape and deliver a strategic roadmap for identity services, focusing on automation and proactive improvements. More ❯
Employment Type: Permanent
Salary: £70,000
Posted:

Head of Information Security

Altrincham, England, United Kingdom
Hybrid / WFH Options
Heywood
Board Communicate the information security strategy to relevant parties, as well as developing supporting policies and procedures required to meet the strategy Develop, maintain, and expand the Cyber Risk Management Framework as part of the overall Information Security Management System (“ISMS”) Responsible for the Company’s information security capabilities, including the technical training and awareness of colleagues, ensuring … containment and mitigation activities, as well as preparing for incidents by running threat simulations, tabletop and red team exercises Assess emerging and potential security threats using the Cyber Risk Management Framework and act proactively to mitigate relevant threats End-to-end vulnerability management across the hybrid cloud environment Manage security toolset, including managing the relationship with the … GDPR, etc. Good communication and interpersonal skills, with the ability to effectively communicate security-related questions to technical and non-technical stakeholders (employees, customers, and/or partners) Project management skills, with the ability to manage projects such as processes implementation and improvement, security systems implementation Ability to collaborate cross-functionally and influence stakeholders at all levels of the More ❯
Posted:

Security Architect

Thornbury, Gloucestershire, United Kingdom
Applicable Limited
to support Security Consulting 'go to market' propositions and service offerings. Leading in the development and presentation of compelling client proposals collaborating with teams across our business. Strong stakeholder management and relationship building skills at senior levels that will enable consensus building in the shaping of secure client solutions Shaping, leading and delivering value through security advisory consultancy and … through guiding secure transformational delivery engagements. Providing security expertise across security standards and accreditations, measure and control the effectiveness of the security controls framework and maintain the Information Security Management System. Deriving and delivering documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies. Standards and guidelines Assiting with the identification … of identified risks and emerging cyber security vulnerabilities and threats. The subsequent analysis to quantify and lead risk mitigation plans Work with Service Management to ensure that partners and suppliers adhere to agreed standards, policies and verify/evidence appropriate compliance and security KPIs Work closely with 1st, 2nd and 3rd lines of defence on all matters relating to More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Manager

Cardiff, Wales, United Kingdom
Hybrid / WFH Options
Creditsafe
intelligence accessible to all businesses big and small but most importantly, opened up new avenues of data intelligence for businesses with machine learning, AI and connected data. From risk management through to opportunity identification, our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger, grow faster and thrive. THE … RESPONSIBILITIES • Manage the day-to-day activities of the Security Operations Centre (SOC) and Security Engineering teams. • Produce reports on key security metrics across Security Operations, Application Security and Vulnerability Management. • Conduct regular 1-2-1s, Performance Reviews, and Personal Development Plans of team members. • Develop and implement security policies, processes, and procedures to comply with SOC2 and … ISO27001 standards. • Participate in Steering groups for Identity and Access Management and Data Protection • Setting and aligning team objectives and tasks to help achieve the overall Information Security and Compliance function’s strategy and goals • Participate in Quarterly Business Reviews with our security tooling vendors. Providing feedback to the vendors on product features, feature requests, SLA and reporting requirements More ❯
Posted:
Vulnerability Management
10th Percentile
£40,000
25th Percentile
£50,000
Median
£60,000
75th Percentile
£78,750
90th Percentile
£92,500