Security Architect - VulnerabilityManagement IOVENDO Southampton, England, United Kingdom Join or sign in to find your next job Join to apply for the Security Architect - VulnerabilityManagement role at IOVENDO Security Architect - VulnerabilityManagement IOVENDO Southampton, England, United Kingdom 3 weeks ago Be among … the first 25 applicants Join to apply for the Security Architect - VulnerabilityManagement role at IOVENDO Get AI-powered advice on this job and more exclusive features. Security Architect Tenable or Qualys BPSS min requirement We are looking for a Security Architect, min requirement is to be BPSS … cleared and happy to go through Security Clearance. We need someone with experience of VulnerabilityManagement solutions such as Tenable or Qualys with a strong knowledge of network security solutions, ITIL and Service Management all within a Cisco environment. The project is a large-scale network refresh More ❯
more exclusive features. We are seeking a dynamic and detail-oriented Cyber Security Business Analyst to join our clients team for an OT Asset & Vulnerability Project. This pivotal initiative aims to enhance our operational technology infrastructure by improving asset management and vulnerability processes. The project is preparing … feedback, and driving improvements during the implementation phase. Key Responsibilities Collaborate with stakeholders to define project objectives, scope, and deliverables for the OT Asset & Vulnerability Project. Conduct requirements gathering sessions with users and translate these into detailed functional specifications. Analyze current workflows and identify areas for improvement in asset … and vulnerabilitymanagement processes. Support the pilot phase by documenting outcomes, challenges, and insights to inform process adjustments. Facilitate workshops and feedback sessions to ensure user needs are met and processes are optimized. Develop comprehensive documentation, including user stories, process maps, and reporting templates. Work closely with technical More ❯
Farnborough, England, United Kingdom Hybrid / WFH Options
GardPass Consulting
be responsible for planning and implementing appropriate security controls to ensure that the information within the client is kept secure. Key functions/outputs: Vulnerability Scanning & Reporting Endpoint Security Incident Management & Tickets System Hardening Change Work Participation in Regular Meetings Documentation Main Objectives: Vulnerability Scanning & Reporting Perform … regular vulnerability scans and generate reports utilising the below tool sets or similar. The process should be focused on ensuring that the below tool sets are kept up to date and ensure that scans are performed regularly to help assist the Vulnerability and Patch Manager with identifying weaknesses … in the system. Code Scans: perform regular code scans to audit code quality metrics, potential bugs, and security vulnerabilities. VulnerabilityManagement Tooling: perform regular VulnerabilityManagement Scans and ensure that the warehouse and plugins are kept up to date to capture new vulnerabilities. Reporting: assist the More ❯
security operations, implementing security measures, and leveraging Microsoft Azure’s security features to safeguard the organization’s data and infrastructure. Key Responsibilities: Security Operations Management: Be the Technical Expert to support and advance the objectives of IT Security and the wider group In conjunction with the leadership team, develop … in continuous monitoring and protection of networks, systems, and applications Technical Security Implementation: Design, implement and support new and existing security solutions. (Privileged Access Management, VulnerabilityManagement, Threat Intelligence, etc) Expert in Microsoft Azure’s security tools and services. (Entra, Privileged Identity Management, conditional access, Microsoft … defender, Sentinel, etc) Perform security input and guidance on tools being adopted within the organisation. Oversee and assess the outputs of the vulnerabilitymanagement platforms to effectively identify and mitigate vulnerabilities Ensure documentation of all solutions and designs are up to date, including technical design documents and associated More ❯
wide Job Description: We are seeking a dynamic and detail-oriented Cyber Security Business Analyst to join our clients team for an OT Asset & Vulnerability Project. This pivotal initiative aims to enhance our operational technology infrastructure by improving asset management and vulnerability processes. The project is preparing … feedback, and driving improvements during the implementation phase. Key Responsibilities Collaborate with stakeholders to define project objectives, scope, and deliverables for the OT Asset & Vulnerability Project. Conduct requirements gathering sessions with users and translate these into detailed functional specifications. Analyze current workflows and identify areas for improvement in asset … and vulnerabilitymanagement processes. Support the pilot phase by documenting outcomes, challenges, and insights to inform process adjustments. Facilitate workshops and feedback sessions to ensure user needs are met and processes are optimized. Develop comprehensive documentation, including user stories, process maps, and reporting templates. Work closely with technical More ❯
aligned with global business risk/objectives. This role focuses on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. The position will support the Director of IT Security in reviewing … basis. Deploy new security tools, services, processes, and procedures. Support security services such as SIEM, MDR, endpoint technology, secure email gateways, cloud security, certificate management, network security, and vulnerability management. Respond promptly to critical incidents in collaboration with security operations, legal, compliance, incident response teams, etc. Qualifications & Experience … Bachelor’s degree in Management Information Systems, Computer Science, Engineering, or related field. 5-10 years of experience in information security and IT. Strong written and verbal communication skills. Industry certifications preferred: CISSP, CompTIA+, CEH, SSCP, Security+, etc. Solid understanding of IT and security practices, including host security, platform More ❯
with global business risk/objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security … security services and deploy new tools in support of the security roadmap. Must be capable of interacting effectively with various internal teams, peers, and management staff. Support the information security manager with creating information security metrics for the respective supported security products. This will be done monthly. Deploy new … processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security operations, legal, compliance, incident response teams More ❯
Southampton, Hampshire, South East, United Kingdom
Pearson Whiffin IT & Digital
for a Security Architect, min requirement is to be BPSS cleared and happy to go through Security Clearance. We need someone with experience of VulnerabilityManagement solutions such as Tenable or Qualys with a strong knowledge of network security solutions, ITIL and Service Management all within a … Experience: Strong background in IT Security design, ability to look over blueprints and make suggested technical changes to meet business needs. Strong background in vulnerabilitymanagement with strong Tenalbe or Qualys. Happy to go through security clearance, with current BPSS (Baseline Personnel Security Standard) a minimum. Strong knowledge More ❯
and manage customer IT Health Checks and associated remediation activities. Deliver and implement security information assurance work packages. Lead and manage an Information Security Management System to ISO27001 standards. Handle VulnerabilityManagement, Security Incident Management, and Security Risk Management. Manage documentation and guide junior team members … Experience working directly with large organisations on complex technical delivery projects. Additional Information Seniority level: Mid-Senior level. Employment type: Contract. Job functions include Management and Manufacturing. Industry: Staffing and Recruiting. #J-18808-Ljbffr More ❯
Basingstoke, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security More ❯
Southampton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits. Gap Assessments: Facilitate and/or conduct internal … Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security … the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. VulnerabilityManagement: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong More ❯
Job Title: Vulnerability Manager Overview: Responsible for safeguarding the organization's systems by identifying, assessing, and mitigating security vulnerabilities. Key Responsibilities: Conduct regular vulnerability scans and coordinate remediation with IT teams. Analyze and prioritize risks; provide clear reporting to stakeholders. Integrate threat intelligence to proactively address vulnerabilities. Support … and addressing root causes. Ensure alignment with security policies, regulations, and best practices. Maintain documentation and promote continuous improvement. Deliver training and awareness on vulnerability management. Qualifications: Bachelor's degree in Computer Science, Information Security, or equivalent. Relevant certifications (e.g., CISSP, CISM). Strong experience in vulnerabilitymanagementMore ❯
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerabilitymanagement tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerabilitymanagement tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
incidents triggered from correlated via analysis and various tools. Acknowledge, analyse and validate incidents received through other reporting mechanisms such as email, phone calls, management directions, etc. Collection of necessary logs that could help in the incident containment and security investigation. Be able to make high quality decisions, often … to automate and improve security posture across the group. Help improve and develop documentation. Skills and Competencies Required Knowledge and hands-on experience in management of IDS/IPS, Firewall, VPN, EDR/XDR, mail filtering and other security products. Experience in Security Information Event Management (SIEM) tools … expertise on TCP/IP network traffic and event log analysis. Network Troubleshooting skills required. Knowledge and hands-on experience in penetration testing/vulnerability scanning, security tools like Tenable Nessus, Kali Linux. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Experience of infrastructure design and More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
suite of services including: MDR (Managed Detection and Response) XDR (Extended Detection and Response) EDR (Endpoint Detection and Response) SIEM (Security Information and Event Management) Penetration Testing & VulnerabilityManagement Governance, Risk & Compliance (GRC) support Phishing Simulation & Security Awareness Training Threat Intelligence and Continuous Monitoring As demand for More ❯
Southampton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
will be expected to cover the initiation through to the design and implementation, across several of the skills and technologies below: Microsoft Sentinel Tenable VulnerabilityManagement (Or similar technology) Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/Related Certifications DESIRED … Training and development in these technologies/solutions may be provided if required. Microsoft Intune (Focused on Security, not the full suite) Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee must be able to … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
business units in alignment with the ISO-27001 security framework. The ideal candidate will have practical experience in various information security responsibilities, such as vulnerabilitymanagement, infrastructure hardening, security investigation, and security governance. This role requires an inquisitive personality with problem-solving capabilities to guide and support our … commercial business unit's security posture in enabling our customer's needs. Responsibilities Review and analyse outputs from Qualys, or equivalent, vulnerability and compliance scans. Actively monitor and respond to alerts from our SIEM (Security Information and Event Management) platform. Monitor and react to activity from Antivirus and More ❯
Havant, Hampshire, United Kingdom Hybrid / WFH Options
Reed Technology
extension to permanent) Salary: 50 - 53K plus benefits We are seeking a Cyber Security Specialist to lead the implementation of a new Information Security Management System (ISMS) and ensure compliance with security standards. This role is crucial in driving security improvements, managing risks, and maintaining regulatory compliance within a … Key Accountabilities: * Lead the implementation of a new ISMS, ensuring alignment with industry security standards. * Develop and maintain cyber security policies, procedures, and risk management frameworks. * Manage compliance with cyber security regulations, standards, and frameworks (ISO27001, CAF/eCAF, Cyber Essentials Plus). * Implement and manage security monitoring tools … ensuring compliance to security frameworks (ISO27001, NIST, eCAF). * Proven experience in implementing security systems and/or monitoring tools. * Strong knowledge of SIEM, VulnerabilityManagement, Threat Intelligence, and IAM systems. * Experience contributing to enterprise-level security initiatives and aligning with industry standards. * Strong collaboration skills, including experience More ❯
Havant, Hampshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
extension to permanent) Salary: 50 - 53K plus benefits We are seeking a Cyber Security Specialist to lead the implementation of a new Information Security Management System (ISMS) and ensure compliance with security standards. This role is crucial in driving security improvements, managing risks, and maintaining regulatory compliance within a … Key Accountabilities: * Lead the implementation of a new ISMS, ensuring alignment with industry security standards. * Develop and maintain cyber security policies, procedures, and risk management frameworks. * Manage compliance with cyber security regulations, standards, and frameworks (ISO27001, CAF/eCAF, Cyber Essentials Plus). * Implement and manage security monitoring tools … ensuring compliance to security frameworks (ISO27001, NIST, eCAF). * Proven experience in implementing security systems and/or monitoring tools. * Strong knowledge of SIEM, VulnerabilityManagement, Threat Intelligence, and IAM systems. * Experience contributing to enterprise-level security initiatives and aligning with industry standards. * Strong collaboration skills, including experience More ❯
including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for … and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerabilitymanagement platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service managementMore ❯
Cybersecurity Software Company Remote £45,000 to £55,000 per annum (depending on experience) Who are we? Titania’s multi-award-winning risk-based vulnerabilitymanagement (RBVM) and network exposure management software has been used by elite cyber teams for over a decade to safeguard critical infrastructure. … qualifications are highly desirable: Experience in the Cybersecurity Industry 3-5years experience managing and executing effective demand/lead generation campaigns Strong project management and communication skills Understanding of B2B buyer journeys and sales funnels Self-motivation and proactive approach Strong ability to manage own time and prioritise … workload Experience managing external agencies to scale campaigns/execution KPI management (e.g. MQLs, MQL to SQL, MQL to customer, Cost per MQL, CAC, CLV) If you are the successful candidate, you will be rewarded with a generous holiday package starting at 25 days (plus bank holidays), including optional More ❯
Cybersecurity Software Company Remote £45,000 to £55,000 per annum (depending on experience) Who are we? Titania’s multi-award-winning risk-based vulnerabilitymanagement (RBVM) and network exposure management software has been used by elite cyber teams for over a decade to safeguard critical infrastructure. … qualifications are highly desirable: Experience in the Cybersecurity Industry 3-5years experience managing and executing effective demand/lead generation campaigns Strong project management and communication skills Understanding of B2B buyer journeys and sales funnels Self-motivation and proactive approach Strong ability to manage own time and prioritise … workload Experience managing external agencies to scale campaigns/execution KPI management (e.g. MQLs, MQL to SQL, MQL to customer, Cost per MQL, CAC, CLV) If you are the successful candidate, you will be rewarded with a generous holiday package starting at 25 days (plus bank holidays), including optional More ❯