The Role: The VulnerabilityManagement Analyst is a global role within ION's central services division and will support the Group Security strategy and operational excellence through the identification, mitigation and remediation of information security vulnerabilities, misconfigurations and risks to the business. This role reports to the VulnerabilityManagement Manager who reports to the Global Head … of IT Security. As a member of the ION Security team, you will build and lead a team of Security professionals specialising in VulnerabilityManagement along with managing the partners and technology vendor deliverables and of course building and owning the strategy to deliver a world class VulnerabilityManagement program. The candidate must understand their role … in the broader vulnerabilitymanagement program and your team will regularly perform discovery scanning, risk/exposure assessments, mitigation support activities, continuous validation assessments, and lessons learned workshops and improvement projects to continuously improve our process across Group Security and all other Verticals. We are looking for a diligent, dedicated, creative and motivated individual. Excellent communication skills are More ❯
VulnerabilityManagement Architect 5 Month Contract - Outside IR35 Hybrid - travel to Bracknell and London, Pimlico as and when required Our Retail client is seeking a VulnerabilityManagement Architect to join their team on a 5-month contract basis. As a VulnerabilityManagement Architect, you will play a crucial role in modernising the company's … vulnerabilitymanagement capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerabilitymanagement architecture Capture our vulnerabilitymanagement requirements and usage scenarios, captured as a set of patterns that a future solution will need to support Build … evaluate the drivers and benefits for change Provide market assessment as appropriate, partnering with our procurement teams as needed Provide a validated and recommended strategy solution architecture for our vulnerabilitymanagement services (i.e. this is all about explaining how the elements of the solution will work together, vendor agnostic) Compile vendor solution options to address the above (with More ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced VulnerabilityManagement Engineer to join our Cyber Security team. As a VulnerabilityManagement Engineer, your primary responsibility will be to manage existing vulnerabilitymanagement-specific … tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerabilitymanagement tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerabilitymanagement activities Process vulnerability data to … provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerabilityMore ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced VulnerabilityManagement Engineer to join our Cyber Security team. As a VulnerabilityManagement Engineer, your primary responsibility will be to manage existing vulnerabilitymanagement-specific … tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerabilitymanagement tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerabilitymanagement activities Process vulnerability data to … provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerabilityMore ❯
The VulnerabilityManagement Manager is a global role within ION's central services division, supporting the Group Security strategy through the identification, mitigation, and remediation of information security vulnerabilities, misconfigurations, and risks. This role reports to the Global Head of IT Security, who reports to the Group CISO. As a member of the ION Security team, you will … build and lead a team of Security professionals specializing in VulnerabilityManagement, managing partners and vendor deliverables, and developing a strategy for a world-class VulnerabilityManagement program. Your team will perform discovery scanning, risk assessments, mitigation activities, continuous validation, and lessons learned workshops to improve processes across Group Security and Verticals. We seek a diligent … capable of building relationships with teams of varying technical abilities. The ideal candidate will have extensive cybersecurity experience, at least 10+ years in security roles, with a focus on Vulnerability Management. Key Responsibilities: This role may require out-of-hours work for 24x7 global operations. Ensure team objectives and development plans align with company OKRs. Act as escalation point More ❯
VULNERABILITYMANAGEMENT ANALYST Up to £70,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a major driving forces … behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a VulnerabilityManagement/SOCAnalyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's VulnerabilityManagement Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes & Schedules related … to Vulnerability Scanning of All Endpoints of the business. As a VulnerabilityManagement/SOC Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of SOC/VulnerabilityManagement Analyst role More ❯
the country. It is the largest news publisher on TikTok with over 28 million total followers and nearly 45 billion views in the past year. We are seeking a Vulnerability Engineer to help build and drive our vulnerabilitymanagement function. This is a key role for someone with the technical skills, automation mindset, and proactive attitude to … someone who thrives on ownership, brings ideas to life through automation, and collaborates effectively with teams across the business. Main Responsibilities Develop, implement, and maintain an automated and scalable vulnerabilitymanagement program using Tenable and related tools. Establish and enforce vulnerabilitymanagement policies, scan configurations, and best practices, aligned to frameworks such as ISO 27001, NIST … and CIS. Integrate vulnerability scanning and remediation into CI/CD pipelines and development workflows to ensure security at speed. Automate data collection, triage, reporting, and ticketing processes using scripting languages such as Python, Bash, PowerShell, or Go. Collaborate with IT, DevOps, and engineering teams to remediate identified vulnerabilities quickly and effectively. Scope and coordinate penetration testing activities; track More ❯
Required: Tenable Nessus Engineers IR35 Status: Inside Duration: 12 month initial contract Location: 1-2 days onsite in either Central London or Knutsford Role 1 As an experienced Vulnerability Assessment Engineer responsible for maintaining the Vulnerability Assessment toolsets and products. Primary Responsibilities The ability to review requirements, undertake product design followed by Implementation/deployment/support of … Vulnerability Assessment tools suite (e.g Tenable, Rapid7, Qualys etc) and peripherals with Engineering. Maintains local and network credentials and provisions access to vulnerability scanning systems. Responsible for integration of Vulnerability assessment tooling with other security and IT systems management tools (i.e. Splunk, ServiceNow) Responsible for developing and maintaining standard processes and operating procedures, creating technical architecture … diagrams and system build documentation. Responsible for operating the scanning tools and maintaining coverage along with supporting the vulnerabilitymanagement and remediation teams in understating how to remediate vulnerabilities (i.e. laptops, VMs, wireless devices) Works with vulnerabilitymanagement team to build asset repositories and asset scan policies Work closely with customer delivery managers to prioritize daily More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Capgemini
including: identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role VulnerabilityManagement Understand the VulnerabilityManagement end to end process and reporting and Have working experience of VulnerabilityManagement tools Conduct vulnerability analysis and … create impact assessments including risk assessment of vulnerability reports and impact risks to service Collate conclusions and recommendations and Identify and communicate current and emerging information security threats Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement and notify requirements to address security deficiencies Report audit findings, including corrective action suggestions, Conducts follow up remediation … part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Strong understanding of vulnerabilitymanagement frameworks and tools. Experience in conducting risk assessments and interpreting vulnerability reports. Familiarity with audit processes, compliance standards, and security governance. Skilled in delivering security training More ❯
work model-preferably, team members should be within commuting distance of an office to facilitate in-person collaboration. About the Role We are looking for a passionate and experienced Vulnerability Lead to develop and oversee our vulnerabilitymanagement program. This role offers a unique chance to establish a vital security function, define best practices, and improve our … security posture. The role involves managing and enhancing the vulnerabilitymanagement lifecycle, including defining scanning strategies, triaging risks, overseeing remediation, and reporting to improve security. What you'll do: Conduct regular vulnerability scans and validate findings. Prioritize vulnerabilities based on risk and enrich findings with threat intelligence and business impact analysis. Facilitate resolution by triaging vulnerabilities for … and ensure timely patching of critical vulnerabilities. Maintain visibility across all technology environments, including cloud, data centers, containers, and web apps. Generate reports and metrics to support risk-based vulnerability management. Identify gaps in scan coverage and asset inventory. Stay updated on zero-day vulnerabilities and emerging threats. Maintain dashboards and reports on vulnerability trends, KPIs, and SLAs. More ❯
Farnborough, Hampshire, United Kingdom Hybrid / WFH Options
Leidos
of attacks and vulnerabilities. You will be responsible for planning and implementing appropriate security controls to ensure that the information within is kept secure. Key functions/outputs: 1. Vulnerability Scanning & Reporting 2. Endpoint Security 3. Incident Management & Tickets 4. System Hardening 5. Change Work 6. Participation in Regular Meetings 7. Documentation Main Objectives: Vulnerability Scanning & Reporting … Perform regular vulnerability scans and generate reports utilising the below tool sets or similar. The process should be focused on ensuring that the below tool sets are kept up to date and ensure that scans are performed regularly to help assist the Vulnerability and Patch Manager with identifying weaknesses in the system. Code Scans: perform regular code scans … to audit code quality metrics, potential bugs, and security vulnerabilities. VulnerabilityManagement Tooling: perform regular VulnerabilityManagement Scans and ensure that the warehouse and plugins are kept up to date to capture new vulnerabilities. Reporting: assist the Vulnerability and Patch Manager with generating regular vulnerabilitymanagement reports, which are to be provided to More ❯
IT Operation s Platforms and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation's IT operations, ensuring the stability, continuity, security, and efficiency of its technology … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … and systems, driving transformative operational change, enhancing IT processes and ensuring compliance with governance bodies and industry regulations. Due to the nature of the role, complexity Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection More ❯
IT Infrastructure Operation s and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation's IT operations, ensuring the stability, continuity, security, and efficiency of its technology … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and … access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such More ❯
environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. The role requires the ability to "lead by example" and perform line management for direct reports and manage service partners reporting into the function. Additional responsibilities are to respond to support requests by Key Responsibilities: IT Operations & Cloud Platform Management Lead … business continuity (BC) and disaster recovery (DR) plans, ensuring cloud- based solutions support resilience and rapid recovery. Manage Global Infrastructure (Cloud, On-prem and Virtual product) Solution Life Cycle Management and removal (via decommissioning and succession planning) of technical debt. Drive a document first culture to new and legacy platforms/solutions. Oversee management of the End User More ❯
Cyber Threat Intelligence and Vulnerability Lead £55,000- 65,000 GBP Onsite WORKING Location: Leeds, Yorkshire and the Humber - United Kingdom Type: Permanent Cyber Threat Intelligence and Vulnerability Lead Location: Leeds - on site Clearance Required: DV (Developed Vetting) Salary: £55,000- 65,000 Grade: GG10 - GG11 A major UK Critical National Infrastructure (CNI) programme is seeking a highly … skilled Cyber Threat Intelligence and Vulnerability Lead to join a dedicated Security Operations Centre (SOC). This role is central to protecting hundreds of cloud-hosted systems from advanced cyber threats and ensuring the continuous improvement of threat intelligence and vulnerabilitymanagement capabilities. Key Responsibilities: Lead the detection, triage, and reporting of cyber threats and vulnerabilities on … a daily basis. Oversee the timely delivery of all threat intelligence and vulnerability reports, ensuring high quality and relevance. Select and monitor key threat actors posing the greatest risk to the organisation. Develop and maintain Priority Intelligence Requirements (PIRs) and a tailored collection plan. Provide clear, well-reasoned analysis and predictive insights to support decision-making. Continuously assess and More ❯
bradford, yorkshire and the humber, united kingdom
Anson Mccade
Cyber Threat Intelligence and Vulnerability Lead £55,000- 65,000 GBP Onsite WORKING Location: Leeds, Yorkshire and the Humber - United Kingdom Type: Permanent Cyber Threat Intelligence and Vulnerability Lead Location: Leeds - on site Clearance Required: DV (Developed Vetting) Salary: £55,000- 65,000 Grade: GG10 - GG11 A major UK Critical National Infrastructure (CNI) programme is seeking a highly … skilled Cyber Threat Intelligence and Vulnerability Lead to join a dedicated Security Operations Centre (SOC). This role is central to protecting hundreds of cloud-hosted systems from advanced cyber threats and ensuring the continuous improvement of threat intelligence and vulnerabilitymanagement capabilities. Key Responsibilities: Lead the detection, triage, and reporting of cyber threats and vulnerabilities on … a daily basis. Oversee the timely delivery of all threat intelligence and vulnerability reports, ensuring high quality and relevance. Select and monitor key threat actors posing the greatest risk to the organisation. Develop and maintain Priority Intelligence Requirements (PIRs) and a tailored collection plan. Provide clear, well-reasoned analysis and predictive insights to support decision-making. Continuously assess and More ❯
Darlington, County Durham, United Kingdom Hybrid / WFH Options
Sellick Partnership
You will be responsible for documentation, take an analytical approach and be able to translate complex technical risks into clear and actionable insights for the organisation. Responsibilities: Development and management of the security operational roadmap, ensuring vulnerabilitymanagement, threat detection and effective incident management. Be the primary point of escalation for security events and incidents in the … organisation. Leading on, developing and implementing the cyber security strategy across the organisation. Responsible for process improvements, policy and security architecture. Management of the cyber security budget and allocation of resources to ensure priorities are met. Resonsible for building, leading and management of a newly formed, high performing cyber security team. Ensure compliance standards across the organisation such … certifications in security such as CISM, CISSP, CISA. Proven experience as a cyber security leader, responsible for security strategy with a strong technical understanding. Strong knowledge of cyber risk management, vulnerabilitymanagement and threat intelligence. Knowledge of compliance and regulatory frameworks such as Cyber Essentials, GDPR and ISO 27001. Certifications in Microsoft security such as AZ More ❯
Security Lead In summary the Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk - ideally from within the banking or insurance sector. The IT Operational … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … technically augment the team capabilities (when required) and have a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management • Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection More ❯
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. Skills & Experience Required: 3+ years of experience working in Cyber Security within … an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when speaking with stakeholders and clients, as well as the ability to provide … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
threat modelling exercises for cloud-native applications, microservices, and infrastructure components. Manage internal and external penetration testing engagements for Funding Circle applications, services, and cloud infrastructure. Oversee and enhance vulnerabilitymanagement processes, focusing on strategic remediation, root cause analysis, and preventative measures. Contribute to drive implementation of security automation across cloud infrastructure configuration, vulnerabilitymanagement, and … expertise in designing, implementing, securing, and managing a wide range of AWS security services . Proven, hands-on experience architecting, building, and integrating security tooling (SAST, DAST, SCA, secrets management, IAST) and automated security controls within CI/CD pipelines (e.g., GitLab CI, Jenkins, GitHub Actions). Strong track record of defining, implementing, measuring, and supporting the adoption of … as Code (IaC) , particularly Terraform, and implementing relevant security checks. Solid experience with container security and securing container orchestration platforms (Kubernetes/EKS). Proven ability contributing significantly to vulnerabilitymanagement programs, including advanced triaging, root cause analysis, risk assessment, and strategic remediation planning. Strong communication and influencing skills, with the ability to articulate complex security concepts clearly More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Crone Corkill
including the implementation and full ownership of Splunk Enterprise Security, coverage of L3 & L4 incidents in collaboration with the security team, Defender for Endpoint security, Mimecast email security and vulnerabilitymanagement via Nessus, to name a few.Collaboration is key within this position, and you’ll regularly correspond with stakeholders, technical teams, non-technical teams and other businesses within … with occasional travel to the office on an ad-hoc basis. What will you do as a Senior Security Engineer? Take over the full lifecycle of Splunk Enterprise Security management, followed by the ownership of the SIEM once implemented Onboard Splunk log sources, proactively support Splunk, liaise with stakeholders and improve efficiency Partner with the new MSSP as the … business transitions – Covering SOC duties on an ad-hoc basis until the move has been completed Maintain Nessus vulnerabilitymanagement, update systems, run scans and provide reports Cover email security using Mimecast Enterprise Real world threat modelling and incident response (mainly L3/L4 when required) Make suggestions and influence various areas of the business/group from More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Robert Walters
working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerabilitymanagement activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party … Assist in managing third party risk processes by evaluating external partners' security postures and ensuring compliance with internal requirements. Work closely with Security Operations and IT teams to oversee vulnerability assessments and coordinate remediation efforts effectively. Conduct thorough reviews of security architecture for new systems and services to ensure robust protection measures are in place from the outset. Evaluate … necessary, and help implement new solutions as required. Contribute to the deployment of advanced security tools and technologies that enhance the organisation's overall cyber resilience. Oversee the incident management process by supporting detection, response, reporting, and resolution of security incidents. Prepare clear security metrics reports for stakeholders at all levels to inform decision-making and demonstrate progress against More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Robert Walters
working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerabilitymanagement activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party … Assist in managing third party risk processes by evaluating external partners' security postures and ensuring compliance with internal requirements. Work closely with Security Operations and IT teams to oversee vulnerability assessments and coordinate remediation efforts effectively. Conduct thorough reviews of security architecture for new systems and services to ensure robust protection measures are in place from the outset. Evaluate … necessary, and help implement new solutions as required. Contribute to the deployment of advanced security tools and technologies that enhance the organisation's overall cyber resilience. Oversee the incident management process by supporting detection, response, reporting, and resolution of security incidents. Prepare clear security metrics reports for stakeholders at all levels to inform decision-making and demonstrate progress against More ❯
a strong focus on automation, detection and secure by design principles. Additionally, as part of the role you will be leading and participating in threat detection, incident response and vulnerabilitymanagement remediation. You will be serving as both a technical leader and operational responder, working closely with Product, infrastructure and Security Operations teams. We are looking for a … system visibility by expanding logging coverage and implementing additional monitoring capabilities. Maintain, update, and regularly test incident response runbooks, containment strategies, and escalation protocols. Lead the end-to-end vulnerabilitymanagement process for ION Markets systems, from identification to remediation. Provide support for security architecture reviews of developed systems to ensure alignment with best practices. Stay up to … or operating security technologies is preferred, such as endpoint security (e.g. AV/EPP/EDR), SIEM, DLP, SWG, CASB, UEBA, IDS, IPS, firewalls, IAM/PIM/PAM, vulnerabilitymanagement, MDM, etc. About us We're a diverse group of visionary innovators who provide trading and workflow automation software, high-value analytics, and strategic consulting to corporations More ❯
and enhance the operations of a high-performing Security Operations Centre (SOC). This is a leadership role at the sharp end of service delivery - managing complex security incidents, vulnerabilitymanagement programmes, and client relationships across enterprise environments. What you'll be doing: Acting as the key liaison between the client and operational delivery teams Leading on incident … escalation and coordination with SOC and IR teams Managing post-incident investigations and reporting Supporting and driving improvements to vulnerabilitymanagement workflows Overseeing IDS/IPS updates, firewall security, and policy alignment Running regular service reviews and ensuring SLA/KPI performance Collaborating with senior delivery leadership on best practice and optimisation What we're looking for: 10+ … years of experience in a SOC or technical security operations environment Proven track record in vulnerabilitymanagement and incident response Strong understanding of IDS, IPS, and endpoint protection technologies Excellent stakeholder management and communication skills Ability to lead and coordinate teams through critical incidents UK SC clearance (or eligibility to obtain it) Relevant security certifications (e.g. CISSP More ❯