Senior Vulnerability Analyst £50,000 - £57,000 + bonus and extensive benefits Full Time/Permanent West Midlands/Hybrid - 1-2 days a month in the office on average The Role and Company: I am looking for a driven Senior Vulnerability Analyst to join a large nationally recognised brand head quartered in the West Midlands. As a … Senior Vulnerability Analyst you will be joining a highly skilled Cyber Defence team. As a key part if this team you will manage threats to the organisation and safeguard systems that enable the business to function safely and effectively. We are ideally looking for someone Midlands based who can be on site in Warwickshire 1-2 days a month … on average. Responsibilities: Conducting regular vulnerability assessments using automated scanning tools, manual testing techniques, and security best practices to identify vulnerabilities in systems, networks, and applications Managing the lifecycle of vulnerabilities from discovery to remediation, including vulnerability triage, prioritisation, tracking, and reporting Analysing the impact and severity of identified vulnerabilities based on factors such as the likelihood of More ❯
Leominster, Herefordshire, West Midlands, United Kingdom Hybrid / WFH Options
Kingspan
available, you will be able to commute to your nearest site ideally twice a week. As the Website Platform Manager you will be responsible for the end-to-end management, performance, and evolution of our global website platform, which combines a headless CMS with an integrated Logik-powered product hub. You will ensure the platform delivers a seamless, high … and meets enterprise performance, security, and scalability standards. Responsibilities of our Website Platform Manager Platform Ownership Serve as the primary owner for the global website platform, overseeing its content management system, product hub integration, and related services. Maintain the platform roadmap, balancing global business priorities, regional needs, and technical improvements. Business continuity planning. Technical Oversight Liaise with development partners … content publishing, quality standards, and approval workflows. Provide CMS training and support for global and regional content teams. Data privacy (GDPR/CCPA) and cookie & consent management. Domain & DNS Management (e.g SSL certification) Cyber security operations including vulnerabilitymanagement and penetration testing. Regulatory compliance in local markets. Code quality & security including release management and change controls. More ❯
Chesterfield, Derbyshire, East Midlands, United Kingdom Hybrid / WFH Options
Hays
in developing and implementing information security strategies, policies, and procedures to safeguard the organisation's digital assets and mitigating potential risks. You will oversee information security, compliance, and risk management practices based on industry-accepted information security and risk management frameworks, whilst establishing and maintaining an incident response plan, including incident detection, response, investigation, and resolution, to minimise … incidents. What you'll need to succeed Demonstrable experience of implementing and maintaining information security frameworks e.g. ISO27001 within a medium/large sized public sector organisation Solid stakeholder management and mentoring skills Information Security,Cyber Security, Assurance and vulnerabilitymanagement would be ideal Comprehensive knowledge of Information Security Management Systems with the ability to scope … design, and implement such systems Strong ICT infrastructure, application, and cloud technical skills would be advantageous Evidenced knowledge and understanding of ISO270001, ITIL, and Prince 2 management practices Ability to lead the workforce, increasing their skills and knowledge in relation to information security What you'll get in return This exciting position is paying between £50,000 and More ❯
Load Balancers, VPN, WAF etc., align with the organization's strategies, policies, and standards. Design and manage firewall policies, network access controls, AAA mechanisms, MFA, IAM solutions, RBAC, Privilege Management etc., In-depth understanding of cloud network security, different network architectures (e.g., LAN, WAN, DMZ) and topologies, network protocols, routing, switching, and subnetting. Ensure network security measures are aligned … frameworks like NIST Cybersecurity Framework, ISO 27001, and CIS Critical Security Controls. Familiarity with the use of standard security technology solutions and processes such as user provisioning, directory, SIEM, vulnerabilitymanagement, Cloud Security (OCI/Azure/AWS), Web Security, Email Security, Logging and Monitoring, General PKI and Cryptography. Evaluate and recommend security technologies, tools, and methodologies to More ❯
across multiple UK energy generation and storage sites? We're looking for a Cyber Security OT Specialist with strong first-line technical skills and a solid grounding in risk management frameworks, ideally with experience in the energy sector. This is a key role within the cyber risk function, supporting critical infrastructure and helping shape secure and resilient OT environments … aligned with IEC62443 standards. Key Responsibilities Lead the implementation of new technical security controls across OT environments. Contribute to the assessment of OT network architecture, protocols, and change management processes. Lead incident response and remediation for cyber events detected by OT SIEM systems. Actively support vulnerabilitymanagement and ensure threat exposure is minimised. Provide hands-on leadership … in data and asset management, including backup and removable media deployments. Apply and track security metrics to ensure the ongoing effectiveness of controls. Deliver awareness training and cyber security guidance across OT engineering teams. Champion collaboration across cyber, IT, and engineering teams-bridging gaps between tech, process, and people. What We're Looking For The ability to work independently More ❯
Employment Type: Permanent
Salary: £57000 - £60000/annum Pension,Medical,Incentive Plan,25 Ho
Immingham, Lincolnshire, North East, United Kingdom
Rullion Limited
across multiple UK energy generation and storage sites? We're looking for a Cyber Security OT Specialist with strong first-line technical skills and a solid grounding in risk management frameworks, ideally with experience in the energy sector. This is a key role within the cyber risk function, supporting critical infrastructure and helping shape secure and resilient OT environments … aligned with IEC62443 standards. Key Responsibilities Lead the implementation of new technical security controls across OT environments. Contribute to the assessment of OT network architecture, protocols, and change management processes. Lead incident response and remediation for cyber events detected by OT SIEM systems. Actively support vulnerabilitymanagement and ensure threat exposure is minimised. Provide hands-on leadership … in data and asset management, including backup and removable media deployments. Apply and track security metrics to ensure the ongoing effectiveness of controls. Deliver awareness training and cyber security guidance across OT engineering teams. Champion collaboration across cyber, IT, and engineering teams-bridging gaps between tech, process, and people. What We're Looking For The ability to work independently More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
Wolverhampton, West Midlands, England, United Kingdom
Newto Training
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Birmingham, West Midlands, England, United Kingdom
Newto Training
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
is embedded throughout the development lifecycle of Technology Assets by using Deloitte's Secure System Development Lifecyle (SSDLC) to assure paths to production. Oversee that security testing activities like vulnerability scanning, penetration testing, and code reviews are completed to identify weaknesses and potential exploits on the identified security requirements. Identify potential information security risks within a project, analyse their … information security principles, including confidentiality, integrity, and availability. Demonstrable understanding of Cybersecurity risk and controls inherent in various technologies, and related best practices. This includes OWASP Top 10 and vulnerability management. Have strong knowledge in cybersecurity frameworks and standards like ISO 27001, NIST, COBIT, and Cyber Essentials+ or equivalent. Experience with risk management methodologies, techniques, and being able … to clearly understand and articulate risk. Demonstrable ability to identify risks associated with business processes, operations, and the roll out of technology projects. An understanding of project management to manage security aspects within a project timeline and budget. Knowledge and understanding of cybersecurity technologies - mobile threat defense, endpoint protection, data loss prevention, insider threat protection, device hardening, classification, key More ❯