Vulnerability Management Jobs in Staffordshire

5 of 5 Vulnerability Management Jobs in Staffordshire

Security Consultant (Security Operations / SOC)

Stoke-on-Trent, Staffordshire, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Data Protection Manager

Birmingham, Staffordshire, United Kingdom
Inspired Thinking Group
our organisation's data and IT infrastructure. This role focusses on the operational aspects of data protection - from technical risk assessments and secure system configuration reviews to incident response, vulnerability remediation tracking, and regulatory compliance audits. You will work closely with engineering, DevOps, and IT teams to embed privacy and information security controls into our technology stack. This is … a full-time position. Occasional after-hours work may be required to support incident response, high-priority vulnerability fixes, or audit activities. Develop and implement data protection governance: Design, implement, and enforce data protection and information security policies and procedures aligned with business objectives and regulatory requirements Support the development of strategies to mitigate and monitor data protection risks … a strategy to mitigate, manage, and monitor data protection risks and incidents Work collaboratively with other departments to ensure the alignment of security efforts with wider business objectives Risk management: Identify, assess, and document data protection risks across systems and processes Support administration of data protection systems and risk reporting. Provide advice and guidance to teams on how to More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SIEM Application Engineer

Birmingham, Staffordshire, United Kingdom
Hybrid / WFH Options
BT Group
with expertise in Elasticsearch to join our dynamic team. As a SIEM engineer, you will play a critical role in designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threat detection, incident response, and overall security posture. This role is hybrid (3 days in … Logstash: Design, develop, and maintain data pipelines using Logstash, part of the Elastic Stack. Automate data ingestion, transformation, and loading tasks. Beats for Data Collection: Agent and Agent Policy Management: Proficiency in configuring and managing agents, including setting up agent policies for various operation systems. Ensure seamless data flow from endpoints to the Elastic Stack. Data Cleaning and Enrichment … Collaborate with data analysts to create meaningful search experiences. Database Architecture and Scaling with Elasticsearch: Optimize data storage and retrieval mechanisms within Elasticsearch clusters. Implement sharding, replication, and index management strategies. End-to-End Solution Delivery: Expertise in taking ownership of a requirement from start to finish, including gathering detailed requirements, designing, and implementing robust, innovative solutions. Experience Required More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Computer Security System Specialist

Stafford, Staffordshire, United Kingdom
Centurum Inc
Centurum is seeking a Computer Security System Specialist who will provide expertise following the Risk Management Framework (RMF) and applying it across program and system cybersecurity activities. Apply federal and agency policies to cybersecurity processes, documentation, and continuous monitoring. Assist with preparing packages for system Authority to Operate (ATO). Perform Assessment and Authorization (A&A) and Independent Verification … and Validation (IV&V) tasks. Manage and update cybersecurity documentation and artifacts and post them in required data repositories. Perform system scans and vulnerability management. Manage system Plan of Action and Milestones (POA&Ms). Ensure access controls and elevated user privileges are monitored and tracked. Assist with cyber inspections, audits, and readiness reviews. This will be a hybrid … DoD security clearance. Required Experience: Six (6) years of information assurance/cybersecurity experience with military automated information systems and information technology. (Substitution: None) Working knowledge of the Risk Management Framework (RMF) for Information Technology. (Substitution: None) Certification: Information Assurance Manager level II EOE M/F/Disability/Veteran Benefits Full-time employees are eligible for the More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Analyst (Stoke)

Stoke-on-Trent, Staffordshire, United Kingdom
Hybrid / WFH Options
Who we are looking for An Information Security Analyst, who will work within our vulnerability management team, which focuses on the technical side, ensuring IT systems are operated in a secure manner. The Information Security department monitor our live operation, creating and reacting to alerts and other anomalies identified through automated tools or manual analysis. You will review … the results in terms of risk and impact assessment, additionally you will own the scheduling of, and planning for specialist third-party vulnerability and penetration testing, in addition to the collation of reports. Liaising with parts of the Business, will aid your understanding of the risk profile then advice on options to resolve any issues identified. You will work … its requirements on regulatory matters. This role is eligible for inclusion in the Company s hybrid working from home policy. Ability to demonstrate hands-on technical experience of conducing vulnerability scanning, evaluation of results and articulation of the risk vulnerabilities may pose. Experience of security related technical investigations. Working knowledge of industry standard information security practices. Knowledge of developments More ❯
Posted:
Vulnerability Management
Staffordshire
10th Percentile
£50,369
25th Percentile
£50,922
Median
£51,844
75th Percentile
£52,766
90th Percentile
£53,319