Vulnerability Management Jobs in the East Midlands

12 of 12 Vulnerability Management Jobs in the East Midlands

Cyber Security Analyst

Lincoln, Lincolnshire, East Midlands, United Kingdom
Hybrid / WFH Options
Walsh Employment
now seeking a Cyber Security Analyst to join the information security function. Reporting to the Information Security Manager , you will support critical activities related to threat monitoring, incident response, vulnerability management and risk mitigation, while also acting as a key advocate for cyber awareness across the wider organisation Key Requirements Essential: 3+ years experience in cyber security Proficiency … in SIEM , antivirus , and vulnerability management tools Understanding of AD , Office 365 , Windows Server , and infrastructure security Strong IT skills with experience across networks, OS, and security protocols Incident response and threat analysis expertise Familiar with Azure/Microsoft Defender and best practice frameworks ITIL Foundation certified (v3 or later) or experience in an ITIL environment Awareness of More ❯
Employment Type: Permanent, Work From Home
Salary: £40,000
Posted:

Security Consultant (Security Operations / SOC)

Leicester, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Security Consultant (Security Operations / SOC)

Nottingham, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Security Consultant (Security Operations / SOC)

Chesterfield, Derbyshire, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Security Consultant (Security Operations / SOC)

Derby, Derbyshire, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Security Consultant (Security Operations / SOC)

Lincoln, Lincolnshire, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Security Consultant (Security Operations / SOC)

Northampton, Northamptonshire, UK
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Head of Cyber Security and Infrastructure

Chesterfield, England, United Kingdom
Hybrid / WFH Options
Hays
design effective controls. You will be leading the Cyber Security operations function, by providing strategic direction and coordinating day-to-day delivery of threat intelligence, threat detection, incident response, vulnerability management, and ethical hacking capabilities. You will be leading a team of Infrastructure Engineers, ensuring strong data controls are in place, whilst working closely with key stakeholders to … experience of creating cyber security roadmaps Experience of building and implementing strong operational processes Excellent communication skills with the ability to translate business requirements into technical solutions Strong stakeholder management skills What you'll get in return This exciting position is paying between £70,000 and £80,000 negotiable on experience and offers an excellent work life balance including More ❯
Posted:

Head of Cyber Security and Infrastructure

Derbyshire, England, United Kingdom
Hybrid / WFH Options
Hays
design effective controls. You will be leading the Cyber Security operations function, by providing strategic direction and coordinating day-to-day delivery of threat intelligence, threat detection, incident response, vulnerability management, and ethical hacking capabilities. You will be leading a team of Infrastructure Engineers, ensuring strong data controls are in place, whilst working closely with key stakeholders to … experience of creating cyber security roadmaps Experience of building and implementing strong operational processes Excellent communication skills with the ability to translate business requirements into technical solutions Strong stakeholder management skills What you'll get in return This exciting position is paying between £70,000 and £80,000 negotiable on experience and offers an excellent work life balance including More ❯
Posted:

Consulting DAS Application Security Lead Professional Multiple Cities

Leicester, Leicestershire, United Kingdom
Avature
Your role and responsibilities As a Cybersecurity Architect, you will specialize in DevSecOps, integrating security into the software development lifecycle, automating security practices, and ensuring robust threat modeling and vulnerability management. Your primary focus will be on cloud-native and on-premises environments, with a strong emphasis on application security, infrastructure as code (IaC) security, and cloud security posture … management. Additionally, you will contribute to data security efforts, securing data at rest, managing key management systems, and ensuring strong governance across data access. Responsibilities: Integrate security into the software development lifecycle, automating security practices into CI/CD pipelines. Implement automated security testing (SCA, SAST, DAST) to identify and remediate vulnerabilities at every stage of development. Secure IaC … configurations, ensuring secure provisioning, configuration management, and continuous monitoring of infrastructure. Utilize CNAPP and CSPM tools to secure cloud-native environments, focusing on application security and cloud posture management. Design and deploy PKI solutions for secure key management, including key generation, key ceremonies, and certificate management. Required education None Preferred education Bachelor's Degree Required technical and professional More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Engineer - ISO Assurance

Nottingham, Nottinghamshire, United Kingdom
Hybrid / WFH Options
Capital One (Europe) plc
order to support strategic decision-making for Cyber and Technology leadership Take the lead in evaluating and recommending standardized risk sloping & scoring methods across Tech and Cyber domains, including Vulnerability Management, Data Security, and Network Security across the enterprise Serve as a point of contact for ISO Assurance Team service offerings and assist with onboarding junior team members. … Standardize the review of mitigating factors and controls in support of risk management activities so that technology and business teams can prioritize risk reduction activities in order to allow teams to focus on the areas of the greatest impact Work cross-functionally with Advisory, Assessment, and Risk Operations functions within the Information Security Office to measure cybersecurity and technology More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Consultant

Nottingham, Nottinghamshire, East Midlands, United Kingdom
Littlefish
of the most exciting technologies in the industry. You will: Designing, implementing and evolving secure, scalable architecture using Microsoft Security solutions (Defender, Sentinel, Entra, Purview, and more). EmbeddingQualysvulnerability management into real-world environments. Leading the charge onautomationandGenerative AIacross our security stack. Setting governance standards and shaping the future of secure service delivery. Collaborating with cross-functional teamsfrom SOC … work expereince in security architecture or engineering, ideally within an MSSP or consultancy. Deep hands-on experience with Microsoft Security technologies. Proven track record in automation, Gen AI, or vulnerability management (especially Qualys). Strong grasp of security frameworks (MITRE ATT&CK, NIST, ISO 27001). Strategic mindset with the ability to communicate clearly across technical and non More ❯
Employment Type: Permanent
Salary: £80,000
Posted:
Vulnerability Management
the East Midlands
10th Percentile
£39,250
25th Percentile
£45,250
Median
£50,000
75th Percentile
£54,063
90th Percentile
£61,750