Manchester, Lancashire, England, United Kingdom Hybrid/Remote Options
Searchability
VulnerabilityManagement Analyst KEY POINTS * Hybrid working arrangement - Up to £55,000 p/a* Opportunity to work across vulnerabilitymanagement and wider security operations* Exposure to class-leading scanning tools and third-party penetration testing* Competitive package (DOE) ABOUT THE CLIENT We're supporting an established organisation with a strong technical footprint that is continuing … to invest in its security posture. They are now looking to add an Information Security Analyst to their vulnerabilitymanagement function, supporting the secure operation of systems across a large and complex environment. THE BENEFITS * Hybrid working pattern* Clear progression pathways and training opportunities* Exposure to a broad range of security tooling and methodologies* Collaborative culture working alongside … governance, compliance, and wider IT teams THE INFORMATION SECURITY ANALYST ROLE: In this role, you'll support the organisation's vulnerabilitymanagement processes, ensuring endpoints and systems are scanned, monitored, and assessed for risk. You'll review and interpret vulnerability scan results, assist with scheduling and planning internal and external testing activities, and support the collation and More ❯
Cyber Security Risk Lead Cyber Security Risk Lead - Cyber Security Risk Assessments, Audits, GRC, Information Security Management, CRISK, CISM, CompTIA Security+, NIS, NIST, ISO 27001 - Hybrid (Manchester) - to £61,500 + excellent bonus + bens This is an outstanding opportunity to become my clients primary Cyber Security Risk Advisor working within a high-profile and growing Cyber Security function … very closely with my clients Information Security Manager to provide a full Cyber Security Risk advisory and consulting function across the business - Play a key role in the ongoing management of Cyber Security Risk boards and Risk Management platforms - Carrying out detailed assessments of the current threat landscape including risks/threats and supporting Cyber Security audits - Creating … and presenting detailed Cyber Security reporting including the management of escalations - Contribute to Cyber Security testing, training and company-wide communication - Use and interpretation of penetration testing data and vulnerabilitymanagement platform to verify the security of systems, networks and applications Cyber Security Risk Lead Skills and Experience: - In-depth experience in a Cyber Security Risk Lead More ❯
Paddington, Warrington, United Kingdom Hybrid/Remote Options
Morson Edge
relationships with other organisations across the civil nuclear sector for Threat Intelligence information sharing Co-ordination with stakeholders, build and maintain positive working relationships with them. Including: Perform threat management, threat modelling, identify threat vectors and develop use cases for security monitoring with the wider CISO team Support Cyber Security incident response process Support VulnerabilityManagement Process … Support RFI for wider stakeholders What do you need to thrive in this role? Knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc Experience in threat management Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix Knowledge of applications, databases, middleware to address security More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid/Remote Options
AJ BELL BUSINESS SOLUTIONS LIMITED
and respond to security incidents, underpinned by an ability to translate cyber risk in to business risk and vice versa. This role will be responsible for the leadership and management of the team delivering ongoing proactive cyber defence and response to security threats targeting AJ Bell systems and information. The Security Operations Team is the first point of contact … landscape, delivering and disseminating actionable intelligence to operations teams and key stakeholders. Ensure operational processes for managing AJ Bells supply chain risk are effective Own the end-to-end vulnerabilitymanagement process, including penetration testing, mitigation assessment and remediation tracking. Effectively communicate the security posture of AJ Bell with the development and delivery of regular MI and reporting … environment of continuous improvement to grow and develop AJ Bells security capability by establishing repeatable, managed and measured processes. About you: Expert understanding and knowledge of Information Security risk management tools and techniques Extensive experience of Information Security standards and frameworks Awareness and understanding of the Information Security threat landscape Knowledge of security investigations best practice including the use More ❯
giving the Board and executive team confidence that cyber risk is managed effectively. This role combines strategic leadership, security architecture governance, cyber operations oversight, and governance, risk & compliance (GRC) management to ensure that the company’s digital estate remains protected, resilient, and compliant. The role provides visibility and assurance to executive management and the Audit & Risk Committee, balancing … as the primary escalation point for significant security events and coordinate executive communication. Manage security service partners to ensure performance, value, and continuous improvement against SLAs and KPIs. Oversee vulnerabilitymanagement, threat intelligence, and continuous monitoring programmes. Champion automation and analytics within the security stack to enhance speed and accuracy of response. Track and report operational metrics (MTTD … MTTR, vulnerability closure %, incident trends). Partnership & Collaboration Align closely with the Director of Infrastructure & Operations, Technical Operations, Service Delivery, and Application Support teams to ensure security controls are consistently implemented, maintained, and improved across the estate. Work collaboratively with the Director of Infrastructure & Operations to embed cybersecurity into IT strategy, operational planning, and transformation initiatives. Engage proactively with More ❯
with in-depth experience of ensuring that Physical Security is fully compliant with security policy. This will entail acting in an advisory role, working closely with multiple stakeholders and management to mature my clients security posture. Information Security Lead Role and Responsibilities: - Work very closely with the Information Security Manager to form a Cyber Security advisory service to the … compliance schedule - Carrying out detailed assessments of the current threat landscape including risks/threats and supporting Cyber Security audits - Creating and presenting detailed Cyber Security reporting including the management of escalations - Contribute to Cyber Security testing, training and company-wide communication - Use and interpretation of penetration testing data and vulnerabilitymanagement platform Information Security Lead Skills … Experience: - In-depth experience in an Information Security Lead role - Strong expertise with Cyber Security technologies within a Physical Security setting (Intrusion Detection Systems IDS, Intrusion Prevention Systems IPS, vulnerability detection, log collection systems, SIEM solutions, CCTV, ACS) - Experience of carrying out detailed Cyber Security assessments across the full Physical Security environment - Excellent relationship-building and stakeholder managementMore ❯
Manchester, North West, United Kingdom Hybrid/Remote Options
DWP Digital
industry standards like NIST and CIS controls. You'll be hands-on with a range of technologies, from cloud security and web application firewalls to threat intelligence, automation and vulnerability management. Your work will include managing platforms, solving problems, adding new features and creating alerts and controls to keep us protected If you enjoy working with cutting-edge security More ❯
Blackpool, Lancashire, North West, United Kingdom Hybrid/Remote Options
DWP Digital
industry standards like NIST and CIS controls. You'll be hands-on with a range of technologies, from cloud security and web application firewalls to threat intelligence, automation and vulnerability management. Your work will include managing platforms, solving problems, adding new features and creating alerts and controls to keep us protected If you enjoy working with cutting-edge security More ❯
Wigan, Greater Manchester, North West, United Kingdom Hybrid/Remote Options
Police Digital Services
partner for law enforcement, we deliver cutting-edge services and strategic guidance to help forces maximize their tech investments, improve public safety, and ensure value for money. The National Management Centre (NMC) is a core part of Police Digital Service (PDS), providing 24/7/365 cyber threat detection, response, and risk management capabilities across UK policing. … workloads, and ensuring service continuity. Drive innovation in threat hunting practices, evaluating new tools, techniques, and methodologies to enhance capability. Engage with internal teams (Detect and Respond, Malware Analysis, VulnerabilityManagement, Threat Hunting) to ensure a threat hunting mentality is integrated across all cyber defense functions. Translate complex threat intelligence into clear, concise insights tailored to operational, strategic More ❯
Worsley Mesnes, Greater Manchester, UK Hybrid/Remote Options
Police Digital Services
partner for law enforcement, we deliver cutting-edge services and strategic guidance to help forces maximize their tech investments, improve public safety, and ensure value for money. The National Management Centre (NMC) is a core part of Police Digital Service (PDS), providing 24/7/365 cyber threat detection, response, and risk management capabilities across UK policing. … workloads, and ensuring service continuity. Drive innovation in threat hunting practices, evaluating new tools, techniques, and methodologies to enhance capability. Engage with internal teams (Detect and Respond, Malware Analysis, VulnerabilityManagement, Threat Hunting) to ensure a threat hunting mentality is integrated across all cyber defense functions. Translate complex threat intelligence into clear, concise insights tailored to operational, strategic More ❯
in Cyber Security, PCI DSS within a cloud environment Have good Security architecture experience, ideally with a DevSecOps environment Excellent experience with PCI DSS and able to lead design Vulnerabilitymanagement & Compliance Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, and NIST Confidence when speaking with More ❯
in Cyber Security, PCI DSS within a cloud environment Have good Security architecture experience, ideally with a DevSecOps environment Excellent experience with PCI DSS and able to lead design Vulnerabilitymanagement & Compliance Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, and NIST Confidence when speaking with More ❯
Knowledge of container security , including Docker and Kubernetes Excellent communication and documentation abilities Wiz Experience Essential Candidates must have demonstrable hands-on experience with Wiz , including: Cloud security posture management across AWS, Azure, and/or GCP Understanding of cloud-native security risks, misconfiguration detection, and vulnerabilitymanagement Ability to interpret Wiz findings and integrate them into More ❯
Manchester, North West, United Kingdom Hybrid/Remote Options
Searchstone Ltd
global teams. Assist Senior Architects on impactful security programmes. What Youll Bring 23 years experience in InfoSec or related fields. Knowledge of core security domains: IAM, network security, encryption, vulnerabilitymanagement, data/app security. Ability to create/read architecture diagrams and write clear security requirements. Strong communication skills and the ability to work with both technical More ❯
BAE Systems, 1st Floor, Main Shipyard Offices, Barrow-in-Furness, Cumbria, England
BAE SYSTEMS PLC
risks and issues to business managers and other stakeholders and then applies and maintains specific security controls as required by organisational policy and local risk assessments Supporting incidents and vulnerabilitymanagement Supports the Investigation of minor security breaches in accordance with established procedures Assists users in defining their access rights and privileges Performs non-standard security administration tasks More ❯