Vulnerability Management Jobs in Scotland

25 of 25 Vulnerability Management Jobs in Scotland

Cyber Incident Management and Threat and Vulnerability Management Governance Analyst

City, Edinburgh, United Kingdom
STATE STREET CORPORATION
Who we are looking for State Street seeks to recruit a Cyber Incident Management (CIM) and Threat and Vulnerability Management (TVM) Governance Analyst responsible for a variety of functions within the Fusion & Security Operations (F&SO) Governance Program at State Street. This includes gathering, analyzing, and enriching … State Street environment. This role requires an individual with deep knowledge of CIM and TVM, including cyber incident detection, assessment, response, and recovery, Patch Management, and infrastructure penetration testing within a corporate environment. What you will be responsible for As a CIM and TVM Governance Analyst you will: Produce … governance related to encryption and data loss prevention, or related functions demonstrated through work, military, or education Experience using ticket tracking tools for change management, tracking, and reporting demonstrated through work, military, or education Strong background in cybersecurity, Cyber Incident Management, and Threat and Vulnerability Management More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Solutions Architect

Glasgow, Scotland, United Kingdom
Be-IT
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Vulnerability Management : Collaborate with SecOps to develop and implement vulnerability management programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
Posted:

Cyber Security Solutions Architect

Edinburgh, City of Edinburgh, United Kingdom
Be-IT Resourcing Ltd
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Vulnerability Management : Collaborate with SecOps to develop and implement vulnerability management programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
Employment Type: Permanent
Salary: £60000 - £70000/annum
Posted:

Cyber Security Solutions Architect

Glasgow, City of Glasgow, United Kingdom
Be-IT Resourcing Ltd
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Vulnerability Management : Collaborate with SecOps to develop and implement vulnerability management programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
Employment Type: Permanent
Salary: £60000 - £70000/annum
Posted:

IT Security Engineer

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Sanderson
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation and management of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use cases. … Designing and implementing security controls and secure configurations. Maintaining proactive vulnerability scanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and … and audits of our information security information security policies, procedures, and systems. Identifying, assessing, managing, remediating, and tracking information security risks through our risk management framework and ensuring key risks are reported to the CISO. Performing regular internal security audits aligned to ISO/IEC 27001 and SOC2 controls. More ❯
Posted:

IT Security Engineer

Glasgow, Lanarkshire, Scotland, United Kingdom
Hybrid / WFH Options
Sanderson Recruitment
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation and management of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use cases. … Designing and implementing security controls and secure configurations. Maintaining proactive vulnerability scanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and … and audits of our information security information security policies, procedures, and systems. Identifying, assessing, managing, remediating, and tracking information security risks through our risk management framework and ensuring key risks are reported to the CISO. Performing regular internal security audits aligned to ISO/IEC 27001 and SOC2 controls. More ❯
Employment Type: Permanent, Work From Home
Salary: £65,000
Posted:

Cybersecurity Solutions Architect

Dundee, Angus, United Kingdom
Hybrid / WFH Options
DC Thomson
which forms a core component of our commercial driven revenue operations function. Working alongside expert solution architects in VMware, AWS, Microsoft Cloud and Data Management solutions, you will collaborate directly with customers to understand their business needs and technical requirements. This role involves supporting our sales engagements with a … potential security threats and design mitigation strategies Oversee the implementation of security solutions, including firewalls, intrusion detection/prevention systems, security information and event management (SIEM) tools, and data loss prevention (DLP) solutions Adhere to relevant security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR) Work with … our SecOps team to develop and implement vulnerability management programs, including regular security assessments, penetration testing, and remediation planning Maintain expertise in cloud security best practices including secure configuration, access management, and data protection Work closely with product lead, solution architects and engineering teams to integrate security More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Vulnerability Analyst

Edinburgh, Scotland, United Kingdom
Bestman Solutions
Operational Technology Vulnerability Analyst - Hyrbid - Permanent We're working with a market leader in the UK's energy transition who is on a mission to deliver a zero-emission future—and they need a Vulnerability Analyst like you to help protect it. As a Vulnerability Analyst, you … in a regulated critical infrastructure environment where your insights will directly impact the company — from cloud infrastructure to industrial control systems. Key Responsibilities: Conduct vulnerability assessments across OT systems, networks, and assets. Evaluate and prioritise risks specific to industrial control systems (ICS), SCADA, and other OT environments. Collaborate with … and cybersecurity teams to mitigate vulnerabilities and drive remediation. Maintain awareness of emerging OT threats, vulnerabilities, and attack vectors. Assist in developing and enhancing vulnerability management processes and tooling tailored for OT environments. Qualifications: Experience performing vulnerability assessments in Operational Technology or industrial environments. Familiarity with OT More ❯
Posted:

Graduate Security Operations Centre Analyst Glasgow

Glasgow, Renfrewshire, United Kingdom
Proact IT (UK) Ltd
At Proact, we're a pan European data management specialist with a focus on unlocking the power of data through strategy, storage, connectivity, and security. But that's only part of our story . We're also here to break the mould. To stake new ground. To do things … Windows and Linux) Hosting platforms, enterprise systems and infrastructure Virtual environments Security products such as anti-virus, IDS, IPS, SIEM, APT detection, VA systems Vulnerability management (network scanning, ethical hacking, penetration testing) Malware, virus, botnet, MITRE ATT&CK framework techniques, etc. Security standards, including ISO-27001, PCI/… required Excellent communication skills The ability to document and explain technical details clearly and concisely to both technical peers and senior (non-technical) business management Solid attention to detail The ability to think "outside the box" and identify opportunities to improve current processes To be flexible - shift patterns may More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Technology Security Specialist

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Net Talent
in-depth technical support for the identification, investigation, and resolution of security vulnerabilities and threats Work with internal support teams to advise and guide vulnerability remediation , improving organisational resilience Collaborate with the Group and the Information Security Leader to support key security processes and contribute to agreed security objectives … timely response, mitigation, and lessons learned 🧠 Skills & Experience Required Strong background in technical information security, with a focus on security controls, system hardening, and vulnerability management Demonstrated experience managing and operating enterprise-grade security tools and platforms (e.g., SIEM, DLP, endpoint protection, identity & access management) Familiarity with More ❯
Posted:

Cyber Security Lead

Glasgow, Renfrewshire, United Kingdom
Hybrid / WFH Options
Hymans Robertson LLP
in advisory capacity, to external audits and due diligence questionnaires. Key Technologies: Strong practical knowledge of M365 stack from a security perspective (Defender, Azure) Vulnerability Management Web Application Filtering DLP Cloudflare Secure File Transfer Firewalls Remote Access/VPN PKI Infrastructure DNS Email Gateways Security Audits ISO27001 Azure More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cyber Security Engineer

Aberdeen, Aberdeenshire, United Kingdom
Hybrid / WFH Options
Cammach Bryant
Ensure compliance with CR GR SSI 001, CR GR SSI 023, GS EP INS 135, and L2-OPS-17-001 across all assets. Incident Management: Review, investigate, mitigate, and resolve cybersecurity incidents, anomalies, and threats promptly. Cyber Security Road Map: Assist in delivering key activities and act as a … assessment reports. Solution Support: Roll out HQ security solutions, including administration and troubleshooting. Audits: Conduct site audits, recommend improvements, and track actions to completion. Vulnerability Management: Manage the industrial cybersecurity vulnerability process and ensure timely patching. Training: Develop and maintain industrial cybersecurity training materials and competence procedures. … REQUIREMENTS: Education: Relevant degree in Instrumentation and Controls, Computer Science, or Cyber Security. Experience: Prior relevant industry experience. Knowledge: Understanding of offshore operations, project management, and UK industry regulations. Expertise: In-depth understanding of IEC/ISA 62443 and OG-86. Management Skills: Experience managing contractors, vendors, and More ❯
Employment Type: Temporary
Salary: GBP Annual
Posted:

Senior Cyber Security Engineer

Aberdeen, City of Aberdeen, United Kingdom
Hybrid / WFH Options
Cammach Bryant
Ensure compliance with CR GR SSI 001, CR GR SSI 023, GS EP INS 135, and L2-OPS-17-001 across all assets. Incident Management: Review, investigate, mitigate, and resolve cybersecurity incidents, anomalies, and threats promptly. Cyber Security Road Map: Assist in delivering key activities and act as a … assessment reports. Solution Support: Roll out HQ security solutions, including administration and troubleshooting. Audits: Conduct site audits, recommend improvements, and track actions to completion. Vulnerability Management: Manage the industrial cybersecurity vulnerability process and ensure timely patching. Training: Develop and maintain industrial cybersecurity training materials and competence procedures. … REQUIREMENTS: Education: Relevant degree in Instrumentation and Controls, Computer Science, or Cyber Security. Experience: Prior relevant industry experience. Knowledge: Understanding of offshore operations, project management, and UK industry regulations. Expertise: In-depth understanding of IEC/ISA 62443 and OG-86. Management Skills: Experience managing contractors, vendors, and More ❯
Employment Type: Temporary
Posted:

Senior Cyber Security Engineer

Aberdeen, Scotland, United Kingdom
Hybrid / WFH Options
Cammach Bryant
Ensure compliance with CR GR SSI 001, CR GR SSI 023, GS EP INS 135, and L2-OPS-17-001 across all assets. Incident Management: Review, investigate, mitigate, and resolve cybersecurity incidents, anomalies, and threats promptly. Cyber Security Road Map: Assist in delivering key activities and act as a … assessment reports. Solution Support: Roll out HQ security solutions, including administration and troubleshooting. Audits: Conduct site audits, recommend improvements, and track actions to completion. Vulnerability Management: Manage the industrial cybersecurity vulnerability process and ensure timely patching. Training: Develop and maintain industrial cybersecurity training materials and competence procedures. More ❯
Posted:

Application Logging & Monitoring Consultant, Security

Edinburgh, MLN, United Kingdom
NatWest
early as possible Making sure that decisions are based on robust data, return on investment and value measures that demonstrate thoughtful and intelligent cost management Encouraging the identification of ideas and driving the delivery of initiatives that will reduce cost and simplify the bank Building and leveraging relationships with … architecture principles and practices, including secure design and implementation. Hands-on experience with security tools and technologies, such as SIEM, IDS/IPS, and vulnerability management systems. The ability to communicate technical issues in a clear and concise manner to senior stakeholders More ❯
Employment Type: Full Time
Posted:

OT Cyber Security Analyst

Glasgow, UK
Hybrid / WFH Options
Drax
prioritize responses accordingly. Incident Response: Developing and implementing incident response plans for handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. Vulnerability Management: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate … be self-motivated and have the ability to think outside the box when working on complex problems. This role requires strong communication and stakeholder management skills, with the ability to influence beyond your sphere of control. Rewards and benefits As you help us to shape the future, we’ve More ❯
Employment Type: Full-time
Posted:

OT Cyber Security Analyst

Edinburgh, UK
Hybrid / WFH Options
Drax
prioritize responses accordingly. Incident Response: Developing and implementing incident response plans for handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. Vulnerability Management: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate … be self-motivated and have the ability to think outside the box when working on complex problems. This role requires strong communication and stakeholder management skills, with the ability to influence beyond your sphere of control. Rewards and benefits As you help us to shape the future, we’ve More ❯
Employment Type: Full-time
Posted:

OT Cyber Security Analyst

Stirling, UK
Hybrid / WFH Options
Drax
prioritize responses accordingly. Incident Response: Developing and implementing incident response plans for handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. Vulnerability Management: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate … be self-motivated and have the ability to think outside the box when working on complex problems. This role requires strong communication and stakeholder management skills, with the ability to influence beyond your sphere of control. Rewards and benefits As you help us to shape the future, we’ve More ❯
Employment Type: Full-time
Posted:

OT Cyber Security Analyst

Greenock, Inverclyde, UK
Hybrid / WFH Options
Drax
prioritize responses accordingly. Incident Response: Developing and implementing incident response plans for handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. Vulnerability Management: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate … be self-motivated and have the ability to think outside the box when working on complex problems. This role requires strong communication and stakeholder management skills, with the ability to influence beyond your sphere of control. Rewards and benefits As you help us to shape the future, we’ve More ❯
Employment Type: Full-time
Posted:

OT Cyber Security Analyst

Paisley, Renfrewshire, UK
Hybrid / WFH Options
Drax
prioritize responses accordingly. Incident Response: Developing and implementing incident response plans for handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. Vulnerability Management: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate … be self-motivated and have the ability to think outside the box when working on complex problems. This role requires strong communication and stakeholder management skills, with the ability to influence beyond your sphere of control. Rewards and benefits As you help us to shape the future, we’ve More ❯
Employment Type: Full-time
Posted:

OT Cyber Security Analyst

California, Falkirk, UK
Hybrid / WFH Options
Drax
prioritize responses accordingly. Incident Response: Developing and implementing incident response plans for handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. Vulnerability Management: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate … be self-motivated and have the ability to think outside the box when working on complex problems. This role requires strong communication and stakeholder management skills, with the ability to influence beyond your sphere of control. Rewards and benefits As you help us to shape the future, we’ve More ❯
Employment Type: Full-time
Posted:

OT Cyber Security Analyst

Motherwell, North Lanarkshire, UK
Hybrid / WFH Options
Drax
prioritize responses accordingly. Incident Response: Developing and implementing incident response plans for handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. Vulnerability Management: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate … be self-motivated and have the ability to think outside the box when working on complex problems. This role requires strong communication and stakeholder management skills, with the ability to influence beyond your sphere of control. Rewards and benefits As you help us to shape the future, we’ve More ❯
Employment Type: Full-time
Posted:

IT Security Officer - VR/30795

City, Aberdeen, United Kingdom
Thorpe Molloy McCulloch Recruitment Ltd
architecture for IT security and end-user service domains, ensuring security is integrated into all aspects of the organisation's IT. Driving and facilitating vulnerability management and secure the design of IT services. Monitoring, identifying, resolution activities, and reporting IT security KPI's and incidents. Liaising with the More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Network Delivery Lead

Erskine, Renfrewshire, United Kingdom
DXC Technology Inc
for the represented network service capability. The network delivery lead represents all DXC Network Services seamlessly and provides a conduit between our DXC account management team, network operations, project, engineering, architecture, other DXC support groups, client counterparts, and other third-party network service providers or suppliers where required. The … reporting line to the account delivery executive (ADE) directly or through the account run lead (ARL) and a hard line to the Network Delivery Management Organization. Practice 'extreme ownership' of everything DXC network services manage, to an extreme degree. Be responsible for not just those tasks which you directly … DXC GNS should be accompanied by a formal Risk Acceptance Form or similar signed by the persons who have accepted the risk. Ensure proactive management of network performance and operability. Work with ASO to ensure compliance with contractually agreed security vulnerability management and or security report findings. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Software Development Manager

Glasgow, Renfrewshire, United Kingdom
Nine Twenty
clients Work directly with our Compliance, Legal and IT teams to ensure issues and problems are escalated swiftly, for example; security incident, breaches, and vulnerability management activities Plan, manage and support Disaster Recovery testing activities and reporting Ensure that appropriate actions are taken to maintain our departmental and … are in place to meet capacity demands Work with Head of Compliance and Head of IT to ensure the maintenance of our Information Security Management System meets the expectations of the business and external stakeholders Monitor team annual leave to ensure that appropriate team capacity and capability is available … the business year-round. Support Business Development in pre-sales and pitching Deliver maximum profitability by ensuring a high level of performance and quality Management Managing a team of 35 Software Engineers, Testers and Architects Mentor, motivate and support your team to reach their full potential Manage recruitment for More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Vulnerability Management
Scotland
10th Percentile
£46,875
25th Percentile
£55,000
Median
£66,250
75th Percentile
£78,313
90th Percentile
£95,000