Vulnerability Management Jobs in the South West

1 to 25 of 48 Vulnerability Management Jobs in the South West

Security Architect

Thornbury, Gloucestershire, United Kingdom
Applicable Limited
to support Security Consulting 'go to market' propositions and service offerings. Leading in the development and presentation of compelling client proposals collaborating with teams across our business. Strong stakeholder management and relationship building skills at senior levels that will enable consensus building in the shaping of secure client solutions Shaping, leading and delivering value through security advisory consultancy and … through guiding secure transformational delivery engagements. Providing security expertise across security standards and accreditations, measure and control the effectiveness of the security controls framework and maintain the Information Security Management System. Deriving and delivering documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies. Standards and guidelines Assiting with the identification … of identified risks and emerging cyber security vulnerabilities and threats. The subsequent analysis to quantify and lead risk mitigation plans Work with Service Management to ensure that partners and suppliers adhere to agreed standards, policies and verify/evidence appropriate compliance and security KPIs Work closely with 1st, 2nd and 3rd lines of defence on all matters relating to More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Engineer

Stroud, England, United Kingdom
JR United Kingdom
of tools including Sentinel, Purview suite, Exchange Online, SharePoint, Teams VMware Server and Storage Hardware Microsoft Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Penetration Testing & Vulnerability Management Applications Cloud-based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption Candidate Profile The right candidate will have a demonstrable background in Cyber … the last 5 years. Working towards or holding a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (e.g., NIST or Cyber Security Essentials). Knowledge of vulnerability databases (e.g., NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tools. Experience with Code Security scanning tools. Educational Requirements This role More ❯
Posted:

Cyber Security Engineer

Stroud, England, United Kingdom
Hybrid / WFH Options
Ecotricity
Server and Storage Hardware Microsoft Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Linux Operating Systems On-Premise Active Directory Networking - Cisco/Fortigate Penetration Testing & Vulnerability Management Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate for this role will behave a demonstrable … years. Have obtained or be working towards a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (ie. NIST or Cyber Security Essentials). Knowledge of vulnerability databases (ie. NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tooling. Experience using Code Security scanning tooling. Educational Requirements This role isn More ❯
Posted:

Cyber Security Engineer

Stroud, England, United Kingdom
Ecotricity
inc. Sentinel, Purview suite of tools, Exchange Online, SharePoint, Teams VMware Server and Storage Hardware Microsoft Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Penetration Testing & Vulnerability Management Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate for this role will have a demonstrable … years. Have obtained or be working towards a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (ie. NIST or Cyber Security Essentials). Knowledge of vulnerability databases (ie. NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tooling. Experience using Code Security scanning tooling. Educational Requirements This role isn More ❯
Posted:

Senior Cyber Security Specialist

Greater Bristol Area, United Kingdom
Naviro
a broad range of domains. The Senior Cyber Security Specialist will operate across Cyber Operations and GRC, ensuring UK-specific compliance and security resilience. Role: Security Incidents: Oversee incident management and response, including root cause analysis, impact assessment, and post-incident reviews. Threat Management: Develop and refine threat intelligence, threat hunting capabilities, and prevention/detection measures. Security … Technologies: Configure, maintain, and optimise security platforms (SIEM/XDR, EDR, vulnerability management, Secure Email Gateway, Application Allowlisting etc.) Security Controls: Implement and maintain security controls, continuously improving detection, prevention, and remediation. Vendor Risk & Audit: Conduct vendor risk assessments, support internal and external audits (e.g. Cyber Essentials, ISO27001), and manage remediation actions. Cyber Security Program: Support the execution … Cyber Essentials, and any industry-specific security requirements. Skills and Experience: 5–7 years' experience in security operations, engineering, or cyber threat management. Strong knowledge of SIEM, XDR, EDR, vulnerability management, firewalls, and network security. Hands-on experience in security control implementation and maintenance (e.g. ISO27001, Cyber Essentials). Familiarity with MITRE ATT&CK, incident response methodologies, and More ❯
Posted:

Technology Risk & Controls Lead - Cloud

Bournemouth, England, United Kingdom
JPMorgan Chase & Co
Control Managers, and Regulators, you will contribute to the reporting of a comprehensive view of technology risk posture and its impact on the business. Your advanced knowledge of risk management principles, practices, and theories will enable you to drive innovative solutions and effectively manage a diverse team in a dynamic and evolving risk landscape. Job responsibilities Ensure effective identification … quantification, communication, and management of technology risk, focusing on root cause analysis and resolution recommendations in Cloud environments Develop and maintain robust relationships, becoming a trusted partner with business technologists, assessments teams, and data officers to facilitate cross-functional collaboration and progress toward shared goals Execute reporting and governance of controls, policies, issue management, and measurements, offering senior … management insights into control effectiveness and inform governance work Proactively monitor and evaluate control effectiveness, identify gaps, and recommend enhancements to strengthen risk posture and regulatory compliance Required qualifications, capabilities, and skills Experience or equivalent expertise in technology risk management, information security, or related field, emphasizing risk identification, assessment, and mitigation Familiarity with risk management frameworks, industry More ❯
Posted:

Technology Risk & Controls Lead - Cloud | Bournemouth, UK

Bournemouth, England, United Kingdom
JPMorgan Chase & Co
Control Managers, and Regulators, you will contribute to the reporting of a comprehensive view of technology risk posture and its impact on the business. Your advanced knowledge of risk management principles, practices, and theories will enable you to drive innovative solutions and effectively manage a diverse team in a dynamic and evolving risk landscape. Job responsibilities Ensure effective identification … quantification, communication, and management of technology risk, focusing on root cause analysis and resolution recommendations in Cloud environments Develop and maintain robust relationships, becoming a trusted partner with business technologists, assessments teams, and data officers to facilitate cross-functional collaboration and progress toward shared goals Execute reporting and governance of controls, policies, issue management, and measurements, offering senior … management insights into control effectiveness and inform governance work Proactively monitor and evaluate control effectiveness, identify gaps, and recommend enhancements to strengthen risk posture and regulatory compliance Required qualifications, capabilities, and skills Experience or equivalent expertise in technology risk management, information security, or related field, emphasizing risk identification, assessment, and mitigation Familiarity with risk management frameworks, industry More ❯
Posted:

Vulnerability Management Manager

Exeter, Devon, United Kingdom
Hybrid / WFH Options
Met Office
The following content displays a map of the jobs location - Exeter We're looking for an exceptional Vulnerability Management Manager to help us make a difference to our planet. As our Vulnerability Management Manager, the job may be suitable for hybrid working, which is where an employee works part of the week in the office and … people are at the heart of what wedoand we'll do our best toagreea working pattern that works for everyone. World changingwork From science to technology, from meteorology to management, and from planning to communication, our expertise helps us stand out as the authority on weather accuracy and climate prediction. We help individuals, industries and government to make better … purpose at the heart ofdecision-making We'rebettertogether-understandingpartnerships and inclusivity make usgreater We keep evolving - pushing boundaries to make tomorrow better for ourcustomers Your world ofexpertise As theVulnerability Management Managerwithin the Security Operations team of the Met Office's Cyber Security Department you will be responsible for driving the vision and operational execution of the organisation's vulnerability More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer

Bristol, England, United Kingdom
Direct Line Group Careers
for your skills but encouraged to build upon them and empowered to do your absolute best. Our CISO function is created by Cyber Defence Centre, Business Resilience, Privacy & Information Management, Strategy & Operating Office and Security Design, Innovation & Enablement. What we look for We are looking for a Security Engineer who will provide security-related technical and functional support for … for securing DLG’s environments in line with compliance commitments. Ensure security technical platforms are configured to optimise the overall security offered to DLG. Improve Security Information and Event Management (SIEM) coverage of DLG’s overall environment. Make sure that all changes to the production environment have been reviewed and approved. Communicate and build relationships at various levels with … routing, TCP/IP, Internet protocols, and network security management. Security Technologies : Expertise in Web Application & Network Firewalls, IDS/IPS, File Integrity Monitoring, SIEM, Advanced Endpoint Protection. Security Management : Advanced skills in vulnerability management, event management, application security, incident response, forensics, and encryption. Technical Proficiency : Strong foundation in algorithms, data structures, databases, networks, and tool More ❯
Posted:

Security Consultant (Security Operations / SOC)

Bristol, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Security Consultant (Security Operations / SOC)

Exeter, Devon, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Security Consultant (Security Operations / SOC)

Bournemouth, Dorset, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Security Consultant (Security Operations / SOC)

Cheltenham, Gloucestershire, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Security Consultant (Security Operations / SOC)

Gloucester, Gloucestershire, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Security Consultant (Security Operations / SOC)

Swindon, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Analyst

Bristol, England, United Kingdom
Capgemini
continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role Monitor security alerts and events using Splunk and other SIEM (Security Information and Event Management) tools. Analyse security incidents to determine their impact and severity and conduct thorough investigations of security breaches and incidents. Develop and implement incident response plans and procedures. Collaborate with … other IT and security teams to resolve security issues. Maintain and update security documentation and incident reports and perform regular security assessments and vulnerability scans. You can bring your whole self to work. At Capgemini building an inclusive future is part of everyday life and will be part of your working reality. We have built a representative and welcoming … environment, for everyone. Your skills and experience Proven experience as a SOC Analyst in a similar cybersecurity role. Experience with Flexera for vulnerability management Strong knowledge of Splunk or other industry standard SIEM tool for security monitoring and analysis. Familiarity with security technologies and understanding of network protocols, firewalls, and intrusion detection/prevention systems. Knowledge of Threat More ❯
Posted:

Information Security Manager

Greater Bristol Area, United Kingdom
TRIA
You’ll Bring CISSP or equivalent + 6-7 years in InfoSec Experience maturing security programs & frameworks ( ISO27001, NIST CAF, OWASP ) Strong knowledge of SIEM, IDS/IPS, RBAC, vulnerability management Understanding of cloud, COTS/SaaS platforms & IoT security Ability to communicate risks & strategies at executive level Full driving license & personal transport What’s On Offer Key More ❯
Posted:

Head of Cyber Security - Remote

Bristol, England, United Kingdom
Hybrid / WFH Options
Nigel Frank
candidates across the UK, with travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerability management and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security assessments and maintain compliance. Requirements More ❯
Posted:

Cyber Security Consultant

Exeter, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
in depth technical understanding. You will be expected to cover the initiation through to the design and implementation, across several of the skills and technologies below: Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/Related Certifications DESIRED KNOWLEDGE, SKILLS & EXPERIENCE The ability … significant value to your application. Training and development in these technologies/solutions may be provided if required. Microsoft Intune (Focused on Security, not the full suite) Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee must be able to demonstrate the following qualities: Autonomy … Quality Focus – Concern for quality, being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in written and verbal communication. The More ❯
Posted:

Cyber Security Consultant

Bournemouth, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
in depth technical understanding. You will be expected to cover the initiation through to the design and implementation, across several of the skills and technologies below: Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/Related Certifications DESIRED KNOWLEDGE, SKILLS & EXPERIENCE The ability … significant value to your application. Training and development in these technologies/solutions may be provided if required. Microsoft Intune (Focused on Security, not the full suite) Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee must be able to demonstrate the following qualities: Autonomy … Quality Focus – Concern for quality, being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in written and verbal communication. The More ❯
Posted:

IT Systems Administrator

Bath, Somerset, South West, United Kingdom
Hybrid / WFH Options
London & Country Mortgages
ensure these systems are fit for purpose and operational. Ideally youll have knowledge and experience with the following: 1. MS Azure knowledge, with experience of the following; Entra ID Management Azure storage accounts Azure Virtual Desktop (AVD) Azure Virtual machine management 2. MS 365 administration of; Teams Sharepoint Intune 3. On prem infrastructure experience i ncluding; Building and … when business needs change. Furthermore, whilst not essential, in addition to the Essential skills it would be desirable to have knowledge and experience of the following technologies; SSL certificate management Vulnerability management SIEM experience (Ideally MS Sentinel) Infrastructure As Code (Ideally Terraform and Ansible) Powershell SQL Cisco Umbrella Nutanix Hyperconverged Infrastructure support Netapp Support Knowledge of and More ❯
Employment Type: Permanent, Work From Home
Salary: £45,000
Posted:

DevOps Engineer

Plymouth, Devon, United Kingdom
Pontoon
objectives. Performance Monitoring : Continuously monitor, analyse, and enhance the reliability of large-scale distributed systems to ensure seamless uptime and operational efficiency. Automation Solutions : Develop automation solutions for configuration management, system provisioning, and deployment, significantly streamlining operations and minimising manual processes. Security Compliance : Implement and maintain robust security protocols, ensuring that systems comply with regulatory standards and best practises … including data encryption, access control, and vulnerability management. Incident Management : Lead efforts in resolving system outages or performance degradation, conduct root cause analysis, and implement preventive measures to mitigate future risks. Collaboration : Work closely with cross-functional teams, including software development, DevOps, and IT operations, to integrate solutions, troubleshoot issues, and enhance overall system performance. Capacity Planning : analyse More ❯
Employment Type: Contract
Rate: £500 - £550/day Inside IR35
Posted:

IT Infrastructure Support Engineer

Tiverton, Devon, United Kingdom
Hawk 3 Talent Solutions
WiFi deployments (802.1X/Certificate-based) as well as guest and BYOD access requirements Familiar with firewall configuration fundamentals and advanced threat hunting Experience with security tools and general vulnerability management, both at the perimeter and client Experience of backup methodologies and management Produce documentation for end users and the support desk IT Helpdesk Experience Bonus Skills More ❯
Employment Type: Permanent
Salary: £30000 - £32000/annum
Posted:

Senior Digital Security Incident Responder (Visa Sponsorship Available)

Cheltenham, Gloucestershire, United Kingdom
Techwaka
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics … and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerability management, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented with the ability to multi-task and prioritize efforts - Ability to express More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Digital Security Incident Responder

Cheltenham, England, United Kingdom
Energy Job Search
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) Understanding of APT, Cyber Crime and other associated tactics Understanding of host forensics … and network analysis techniques and tools Understanding of malware and reverse engineering Understanding of vulnerabilities. Vulnerability management, remediation and implementation techniques. Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) Excellent verbal and written communication skills Excellent organizational and analytical skills Detail oriented with the ability to multi-task and prioritize efforts Ability to express More ❯
Posted:
Vulnerability Management
the South West
10th Percentile
£38,900
25th Percentile
£46,250
Median
£51,729
75th Percentile
£55,000
90th Percentile
£57,670