VULNERABILITYMANAGEMENT ANALYST Up to £75,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a major driving forces … behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a VulnerabilityManagement Analyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's VulnerabilityManagement Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes & Schedules related to … Vulnerability Scanning of All Endpoints of the business. As a VulnerabilityManagement Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of VulnerabilityManagement Analyst role would include: Conducting VulnerabilityMore ❯
and is instrumental in delivering robust, scalable, and compliant security operations aligned with FCA Consumer Duty and broader regulatory obligations. You will play a key role in the operational management of security technologies, incident response processes, and the continuous enhancement of our detection and response capabilities. The successful candidate will bring hands-on expertise in, cloud security operations, threat … within operational workflows and cloud-native architectures. What you will do: Operate and optimise core cyber security tools and platforms, including SIEM, XDR, EDR, DLP, IAM, PAM, ZTNA and vulnerabilitymanagement solutions Lead or support the detection and response lifecycle, including triage of alerts, investigation of incidents, root cause analysis, and coordination of response actions. Implement and administrate … applying cloud security principles and governance controls across AWS and Azure, leveraging native monitoring tools to maintain regulatory compliance and operational visibility. Skilled in the administration and optimisation of vulnerabilitymanagement platforms within operational environments. Strong understanding of network architecture and protocols, including the OSI model, with the ability to apply layered security controls across infrastructure and cloud More ❯
love to have you on the team. What you will do: Operate and optimise a wide range of security platforms, including SIEM, XDR, EDR, IAM, DLP, PAM, ZTNA, and vulnerabilitymanagement tools Take ownership of the detection and response lifecycle - triaging alerts, investigating incidents, identifying root causes, and coordinating response actions Implement and manage security controls across AWS … servers, and systems operate so you can secure them effectively Solid knowledge of network architecture and protocols, including the OSI model, and how to apply layered security Experience with vulnerabilitymanagement, security assessments, and working within ITSM/ITIL frameworks A proactive mindset - you're always looking for ways to improve, automate, and enhance how security is delivered … should contact Intrum Talent Acquisition team via as soon as possible before the closing date to discuss your needs. About Intrum : Intrum is the industry-leading provider of credit management services across 20 markets in Europe. By helping companies to get paid and support people with their late payments, Intrum leads the way to a sound economy and plays More ❯
Crewe, Cheshire, England, United Kingdom Hybrid / WFH Options
DCS Recruitment
Security Analyst to play a key role in protecting our client's systems, networks, and data. This is an exciting opportunity to lead on threat detection, incident response, and vulnerabilitymanagement , while driving continuous improvement across the organisation's security posture. You'll collaborate closely with infrastructure, development, and compliance teams to maintain high standards of cyber resilience … and uphold key frameworks such as ISO 27001 and Cyber Essentials Plus . Key Responsibilities: * Lead threat detection, incident response, and vulnerabilitymanagement activities * Strengthen cyber security posture across cloud, infrastructure, and applications * Provide expert guidance to development teams on secure SDLC practices * Maintain compliance with ISO 27001 and Cyber Essentials Plus standards * Mentor junior analysts and support More ❯
and frameworks (e.g. NIST, ISO 27001, CIS). Experience working with DevOps tools and practices (e.g. JIRA, Confluence, Azure DevOps). Familiarity with enterprise security domains such as identity management, cloud security, network defence, vulnerabilitymanagement, or security operations. Demonstrated ability to work within structured governance and change control frameworks . Experience managing third-party suppliers and … delivery partners. Strong knowledge of project delivery methodologies : PRINCE2 , APM PMQ , Agile/Scrum , or Hybrid delivery models. Understanding of ITIL and service management principles. Experience applying Change Management and Lean Six Sigma techniques is beneficial. Skills & Attributes Excellent leadership, stakeholder management, and communication skills. Strong analytical, problem-solving, and decision-making capabilities. Highly organized, adaptable, and … Committed to continuous improvement and professional development. Can-do attitude with strong ownership and accountability. Qualifications Degree in Information Technology, Cyber Security, Engineering, or a related field. Formal project management training: PRINCE2 Practitioner , APM PMQ , or Agile Project Management . Additional certifications desirable: ITIL , Lean Six Sigma , Change Management , CISSP , CISM , or CompTIA Security+ . Please note More ❯
and frameworks (e.g. NIST, ISO 27001, CIS). Experience working with DevOps tools and practices (e.g. JIRA, Confluence, Azure DevOps). Familiarity with enterprise security domains such as identity management, cloud security, network defence, vulnerabilitymanagement, or security operations. Demonstrated ability to work within structured governance and change control frameworks . Experience managing third-party suppliers and … delivery partners. Strong knowledge of project delivery methodologies : PRINCE2 , APM PMQ , Agile/Scrum , or Hybrid delivery models. Understanding of ITIL and service management principles. Experience applying Change Management and Lean Six Sigma techniques is beneficial. Skills & Attributes Excellent leadership, stakeholder management, and communication skills. Strong analytical, problem-solving, and decision-making capabilities. Highly organized, adaptable, and … Committed to continuous improvement and professional development. “Can-do” attitude with strong ownership and accountability. Qualifications Degree in Information Technology, Cyber Security, Engineering, or a related field. Formal project management training: PRINCE2 Practitioner , APM PMQ , or Agile Project Management . Additional certifications desirable: ITIL , Lean Six Sigma , Change Management , CISSP , CISM , or CompTIA Security+ . Please note More ❯
through business development, recruitment, and thought leadership Coaching and mentoring consultants to develop the next generation of cyber leaders Ideal Background Proven experience in cyber strategy, transformation, and risk management within complex organisations Strong knowledge of regulatory and security frameworks (e.g. NIST CSF, ISO27001, GDPR, NIS2, NCSC CAF) Experience across areas such as GRC, security architecture, threat management, or vulnerabilitymanagement Outstanding communication and stakeholder engagement skills, with the ability to influence at C-suite and board level Track record of leading large-scale client engagements and delivery teams in consulting environments Relevant certifications (CISSP, CISM, CISA, MSc Cyber Security) advantageous What You'll Receive Salary: £73,100 - £90,950 + benefits 25 days annual More ❯
security controls. Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerabilitymanagement etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security controls, identify risks and propose treatment plans. Conduct regular vulnerability … Role: Essential: 3-5 years of experience in Information Security. Strong understanding of security principles, technologies, and best practices. Experience in networking, infrastructure (on-prem and in the cloud), vulnerability and incident management. Familiarity with application/device security monitoring (e.g. Firewalls, IDS/IPS, XDR etc.). Experience with SIEM/CNAPP/Log collection platforms (e.g. CrowdStrike … Lacework etc.) and capability to design, implement and manage such solutions. Experience with implementation of identity and access management (IAM) solutions. Ability to work in a team to deliver project outcomes within timeframes and objectives. Self-directed work experience, including planning and organising tasks. AWS experience and/or AWS security/administration certifications (e.g. AWS Certified Security etc. More ❯
Penwortham, Lancashire, United Kingdom Hybrid / WFH Options
JAM Recruitment Ltd
and detailed experience of technologies including but not limited to firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, Linux, TCP/IP, Networks, Cloud, CDN's and Vulnerability Management. - Analytical background, comfortable analysing and interpreting large and complex data sets and articulating the story behind any observations along with providing conclusions and recommendations. - Detailed knowledge of the More ❯
Preston, Lancashire, North West, United Kingdom Hybrid / WFH Options
JAM Recruitment Ltd
and detailed experience of technologies including but not limited to firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, Linux, TCP/IP, Networks, Cloud, CDN's and Vulnerability Management. - Analytical background, comfortable analysing and interpreting large and complex data sets and articulating the story behind any observations along with providing conclusions and recommendations. - Detailed knowledge of the More ❯
threat detection, incident response, and security improvements, working closely with teams across the business to maintain compliance and best practice. What you'll do: Lead threat detection, incident response & vulnerabilitymanagement Strengthen cyber security posture across cloud, infrastructure & applications Advise development teams on security best practice (SDLC) Maintain ISO 27001 & Cyber Essentials Plus standards Mentor junior analysts & develop More ❯
Employment Type: Permanent
Salary: £45000 - £50000/annum discretionary bonus and more
DREAD, STRIDE-LM, OCTAVE, MITRE ATT&CK. • Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. • An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007. • Knowledge of security control (and maturity) frameworks e.g. NIST (e.g. CSMA, CSF), CIS … DFD) and trust boundaries and is able to create one using information provided about an environment. • Familiar with the functions of relevant authorities e.g. NCSC, NPSA. • An understanding of VulnerabilityManagement, Red Teaming, and Breach and Attack Simulation or experience of working within an Active Defence discipline. Experience looking for: • All internal based projects. Backlog of tasks to … work through. • Mitre ATT&CK framework used a lot • Research and understand the tech stacks • Understanding of risk management • Conduct gap analysis • Industry experience or industry-based certifications could be useful • IT degree could be useful • Understand data flow diagrams, pick it up and run with it. More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
DXP Talent Ltd
technical updates and support. The role is hybrid with 3 days a week on site. Key experience/skills: - Linux SME Skills (build and support) - RedHat - VMware - Patching/Vulnerabilitymanagement - Automation (Ansible, Terraform) - Cloud experience (Azure, AWS, GCP) Bonus Experience: - Kubernetes - Windows Server - Openshift - Network knowledge (Firewalls, switches) If you feel you could be a great fit More ❯
DREAD, STRIDE-LM, OCTAVE, MITRE ATT&CK. Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007. Knowledge of security control (and maturity) frameworks e.g. NIST (e.g. CSMA, CSF), CIS … DFD) and trust boundaries and is able to create one using information provided about an environment. Familiar with the functions of relevant authorities e.g. NCSC, NPSA. An understanding of VulnerabilityManagement, Red Teaming, and Breach and Attack Simulation or experience of working within an Active Defence discipline. Security Requirements: SC This role will require you to hold or More ❯
DREAD, STRIDE-LM, OCTAVE, MITRE ATT&CK. Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007. Knowledge of security control (and maturity) frameworks e.g. NIST (e.g. CSMA, CSF), CIS … DFD) and trust boundaries and is able to create one using information provided about an environment. Familiar with the functions of relevant authorities e.g. NCSC, NPSA. An understanding of VulnerabilityManagement, Red Teaming, and Breach and Attack Simulation or experience of working within an Active Defence discipline. Security Requirements: SC This role will require you to hold or More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯