Vulnerability Management Jobs in Yorkshire

1 to 25 of 53 Vulnerability Management Jobs in Yorkshire

Information Security Analyst L2 ( Talent pool )

Selby, England, United Kingdom
SBV South Africa
desired outcomes and success criteria which is to be the baseline for post project review and benefit realisation validation, as well as measuring positive effects. Contribute to project risk management consulting and technical reviews, drafting mitigation plans and delivering on any actionable items allocated Draft procedures and or policies with regards to cyber security submitting them to the Information … intrusion detection and prevention, situational awareness of: network intrusions. security events. data spillage; and. Incident response actions. Identify and resolve vulnerabilities in networks, servers, systems, and applications by performing vulnerability scans Investigate improper access to ensure proper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements including but not limited to privilege account management. Provide … daily operational effectiveness reporting to the Information Security Officer Create and update weekly dashboard view of cyber risk ratings in the organisation. Prepare reports for circulation to the management teams related to investigations and threats for the month, this will also be rolled up into quarterly reporting. Support with managing vendor resource deliverables to ensure quality and consistency of More ❯
Posted:

SEC OPS ENGINEER / CYBER SECURITY ENGINEER

Leeds, England, United Kingdom
Hybrid / WFH Options
Secure Recruitment LTD
Award Winning Offices Complete with Restaurant , Free Bar , Gym/Private (Family) Healthcare/Regular Funding Towards Professional Development Hybrid Working Our Client is a leading Fintech, delivering Risk Management & Payment Solutions to some of the world's most respected organisations, backed by a number of globally respected institutions and responsible for transacting £Billions. They are now looking for … fast-growing SecOps Team . You will be monitoring & maintaining secure systems & networks as well as mitigating & containing real-time risks & identified threats. You will also be involved in vulnerability management, threat hunting, playbook designing & detection rule staging. Key Responsibilities of the role would include: Provide SecOps support capability working with information security alerts using Security Information & Event … Management (SIEM) to triage, mitigate & escalate issues as needed while capturing essential details and artefacts. Perform analysis of security alerts to evaluate risk, determine containment action & identify required preventative measures. Review & triage security vulnerabilities detection. Identify trends, potential new technologies & emerging threats which may impact the business. Implement technical controls to mitigate against security risk. Development & integration of security More ❯
Posted:

Cyber Security Engineer

Leeds, West Yorkshire, United Kingdom
Elevate Technology Group Ltd
role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems and resolving … security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of … make an impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Employment Type: Permanent
Salary: £55000 - £70000/annum
Posted:

Security Analyst

York, England, United Kingdom
Darkshield Technologies Ltd
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, incident response, and compliance. Our mission is to protect businesses from cyber threats by delivering tailored security solutions that keep them resilient and secure. The Role We … threats and attack techniques, and the ability to implement effective security controls to mitigate risks. This role involves proactively monitoring security events, investigating potential breaches, and supporting clients with vulnerability management and security best practices. About You You are passionate about cybersecurity and have a strong ability to think critically, solve complex problems, and anticipate security threats before … to mitigate security risks. Conduct digital forensics and root cause analysis on security breaches. Work closely with internal teams and clients to ensure swift containment and resolution of threats. Vulnerability Management & Security Operations Perform regular vulnerability scans and assessments, identifying security gaps and misconfigurations. Recommend and implement security improvements based on assessment findings. Optimize security configurations and More ❯
Posted:

Head of Cyber Security Operations

Leeds, England, United Kingdom
QA Ltd
for safeguarding QA from intrusion, security threats, security weaknesses, software bugs and exploits. You will be responsible for direct and virtual teams involved in keeping QA secure. Role Responsibilities Management of the Security Operations Centre service, ensuring resources are aligned to monitor and protect QA IT assets including 24/7 out of hours on call coverage. Responsible for … to a successful conclusion. Ensure that the monitoring, logging, and prevention toolsets are aligned to the needs of the security function/the business and are delivering best value. Management of direct and virtual security related IT teams for the delivery of the security operations service and security related projects. Work proactively to understand the threat landscape, how it … enhance the security of IT systems both on-prem and cloud. Creation of reports, dashboards, metrics for SOC operations and presentation to senior management. Oversight, planning and execution of vulnerability assessments, penetration tests, audits or related security assessment exercises (eg Red Team) to improve the security posture of the infrastructure, applications and services. Manage the remediation of identified vulnerabilities More ❯
Posted:

Cybersecurity Engineer

York, Yorkshire, United Kingdom
Darkshield Technologies Ltd
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role We … ability to work collaboratively with clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits and risk assessments to identify … alignment with industry standards and regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages (e.g., Python, Bash, PowerShell) for More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cybersecurity Analyst

Ripon, England, United Kingdom
Alliance Laundry Systems LLC
Overview Reporting to the Director - Cybersecurity, the Cybersecurity Analyst is responsible for the day-to-day administration of the Information Security Management System (ISMS). This role will also involve performing key Security Operations duties, including system and application audits and reporting. Responsibilities Monitor and support all internal and external systems infrastructure (Incident & Problem Management), collaborating with colleagues … defining and testing specific information security controls and policies. Contribute to the global information security awareness program and ensure company-wide compliance. Conduct security assessments for projects and change management initiatives. Maintain the threat and information risk register and recommend appropriate remediation measures. Develop comprehensive documentation detailing system specifications and operating instructions. Ensure infrastructure, applications, and data security/… out-of-hours support coverage on a rotational basis (one week per month). Qualifications 1-3 years’ experience in security operations in the capacity of incident response and vulnerability management; implementing and managing core Microsoft stack (MCSE equivalent certification); administering and supporting virtualization platforms (VMWare); implementing and managing with Linux operating systems. Experience in scripting technologies such More ❯
Posted:

Cyber Security Engineer - MSSP

Yorkshire, United Kingdom
Hamilton Barnes Associates Limited
Work for an award-winning provider of Security Services, specialising in Cyber Security Services such as Vulnerability Management, Information Security, Penetration Testing, and Managed Security Services. We boast a fully managed Security Operations Centre (SOC) staffed by dedicated professionals. We're seeking a skilled Cyber Security Engineer to join our clients eam. The ideal candidate will have expertise More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cybersecurity Consultant

Leeds, England, United Kingdom
TieTalent
security capabilities across its global infrastructure. This role is vital in ensuring the integrity and resilience of the company’s IT environment against cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents effectively. Perform regular security checks, including monitoring of systems and resolving vulnerabilities. Assist with compliance checks, ensuring … security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning and risk mitigation. Knowledge of security auditing and incident response processes. Experience with event and log analysis. Solid understanding of Disaster Recovery and Business Continuity principles. Excellent communication … make an impact in a global organization, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery, Business Continuity Nice-to-have skills: ISO 27001 Vulnerability Scanning Disaster Recovery Work More ❯
Posted:

Cyber Threat Analyst - National Security West

Leeds, England, United Kingdom
Hybrid / WFH Options
BAE Systems Applied Intelligence
Threat groups and the ability to conduct in-depth research Able to independently verify the results of Threat Hunts, refining the queries where necessary Experienced in Incident Response and Management Responsible for the quality of all Threat Hunt Reports, ensuring that output is delivered it is at the highest possible standard Responsible for ensuring that all relevant process is … rules/analytics Requirements Technical 3+ years’ experience in Cyber Threat Intelligence, and conducting research and investigating cyber threats in a technical capacity Experience in technical incident response and management An expert understanding of current and emerging threats related to government and CNI Demonstrate a high-level knowledge of Windows operating systems and the Azure Landscape Demonstrate a high … high-level knowledge of and experience operating within cloud platforms Non-Technical Bachelor’s Degree in Cybersecurity, Computer Science or equivalent Experience in a SOC/Threat Intelligence/Vulnerability Management field Excellent written and verbal communication skills with the ability to communicate the risk, potential impact and importance of detailed technical information to non-technical and senior More ❯
Posted:

Cyber Threat Analyst - National Security West

Leeds, England, United Kingdom
Hybrid / WFH Options
Babcock
Threat groups and the ability to conduct in-depth research Able to independently verify the results of Threat Hunts, refining the queries where necessary Experienced in Incident Response and Management Responsible for the quality of all Threat Hunt Reports, ensuring that output is delivered it is at the highest possible standard Responsible for ensuring that all relevant process is … rules/analytics Requirements Technical 3+ years' experience in Cyber Threat Intelligence, and conducting research and investigating cyber threats in a technical capacity Experience in technical incident response and management An expert understanding of current and emerging threats related to government and CNI Excellent Open-Source research skills Demonstrate a high-level knowledge of Windows operating systems and the … high-level knowledge of and experience operating within cloud platforms Non-Technical Bachelor's Degree in Cybersecurity, Computer Science or equivalent Experience in a SOC/Threat Intelligence/Vulnerability Management field Excellent written and verbal communication skills with the ability to communicate the risk, potential impact and importance of detailed technical information to non-technical and senior More ❯
Posted:

IT Information Security Consultant

Yorkshire, United Kingdom
Headway Recruitment
as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. They re looking for an experienced Information Security Consultant … with expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert … guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development Create More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Information Security Consultant

LS18 4GH, Rodley, West Yorkshire, United Kingdom
Headway Recruitment
as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. They’re looking for an experienced Information Security Consultant … with expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management – Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring – Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts – Handle security alerts and inquiries, providing expert … guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development – Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development – Create More ❯
Employment Type: Permanent
Posted:

IT Information Security Consultant

Pudsey, West Yorkshire, Yorkshire, United Kingdom
CIIH Ltd T/A Headway Recruitment
as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. Theyre looking for an experienced Information Security Consultant with … expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. … Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development Create and More ❯
Employment Type: Permanent
Salary: £55,000
Posted:

Security Consultant (Security Operations / SOC)

Sheffield, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Security Consultant (Security Operations / SOC)

Leeds, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Security Consultant (Security Operations / SOC)

York, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Doncaster, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Bradford, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Hull, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Wakefield, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Threat Intelligence Analyst

Leeds, United Kingdom
BAE Systems (New)
collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Cyber Threat Intelligence and Vulnerability Lead Job Title: Cyber Threat Intelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to the nature of the project … relevant potential cyber threats and key vulnerabilities are detected, triaged and reported on daily. Accountable for all regular reporting and ensuring the efficient delivery of all threat intelligence and vulnerability products by their respective deadlines. Where there is not established schedule for a product, the lead is responsible for ensuring that an achievable deadline is set and the work … tailored collection plan and implementation of both to ensure that the intelligence products are relevant to the client's interests. Accountable for the quality of all Threat Intelligence and Vulnerability Reports, ensuring that when a product is delivered it is at the highest possible standard. Accountable for ensuring that all relevant processes are effectively documented and regularly reviewed. Responsible More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Information Technology Analyst

Leeds, England, United Kingdom
Harvey Nash
chance to directly shape strategy within a national institution. This is a hands-on, strategic role with a focus on Microsoft Entra ID Governance and Microsoft Purview – including lifecycle management, RBAC, data classification, DLP and compliance tooling. You’ll play a key part in designing and maintaining secure practices across Microsoft 365, Azure, and broader security operations. Working within … a small, agile security team, you’ll also contribute to regulatory compliance (ISO 27001, GDPR, Cyber Essentials+), risk assessments, vulnerability management, and stakeholder engagement at all levels. Experience of Interest: Practical experience implementing Microsoft Entra ID Governance (or similar Okta) Hands-on and demonstrable use of Microsoft Purview for compliance, data classification, and DLP Strong security operations knowledge More ❯
Posted:

Head of Cyber Security

Leeds, England, United Kingdom
Nigel Frank
candidates across the UK, with travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerability management and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security assessments and maintain compliance. Requirements More ❯
Posted:

Cyber Threat Intelligence and Vulnerability Lead

Leeds, England, United Kingdom
BAE Systems Digital Intelligence
Cyber Threat Intelligence and Vulnerability Lead Join to apply for the Cyber Threat Intelligence and Vulnerability Lead role at BAE Systems Digital Intelligence . Location: Leeds, UK (100% office-based due to project requirements) BAE Systems Digital Intelligence employs 4,500 experts across digital, cyber, and intelligence fields, collaborating in 10 countries to analyze complex data for governments … to the Service Delivery Manager. Key Responsibilities Ensure detection, triage, and reporting of cyber threats and vulnerabilities daily. Manage reporting processes and ensure timely delivery of threat intelligence and vulnerability assessments. Identify and prioritize threat actors posing significant risks. Develop and review Priority Intelligence Requirements (PIRs) and collection plans to ensure relevance. Maintain high standards in Threat Intelligence and … Vulnerability Reports. Document and review processes regularly. Provide analysis, context, and predictions in deliverables. Assess and improve the maturity of client functions, implementing enhancements. Oversee personal development within the Threat Intelligence and Vulnerability team. Ensure timely completion of all products during capacity constraints. Minimum Requirements Technical Skills 5+ years in threat intelligence, vulnerability management, or cyber More ❯
Posted:
Vulnerability Management
Yorkshire
10th Percentile
£31,250
25th Percentile
£32,500
Median
£38,750
75th Percentile
£53,750
90th Percentile
£90,000