Central London, London, United Kingdom Hybrid/Remote Options
Colt Technology Services
Company description: We are seeking a dynamic and motivated Vulnerability Management Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The Vulnerability Management Lead will play a crucial role in tracking and managing the identification, assessment, and remediation of security vulnerabilities across the organizations … infrastructure and monitoring and reporting on vulnerability and other security compliance status. The role requires collaboration with various partners to ensure that vulnerability assessments and emerging threats are prioritized and advanced. Additionally, the successful candidate will work with management to continuously evolve the vulnerability management program. Job description: You will be responsible for supporting CSOC in order … to achieve the below: The development and implementation of the Colt Vulnerability Management Framework. Enhancing the scope and efficiency of current vulnerabilityscanning and management tools and integration between them. Design and manage the periodic penetration testing exercise. Collaborating with identified stakeholders to provide specialist guidance and support, ensuring effective vulnerability identification, prioritisation and remediation activity More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Context Recruitment Limited
industry best practice * Perform security reviews, identify gaps in security architecture and apply appropriate remediation * Ensure appropriate technical measures are in place to comply with regulations/legislations * Conduct vulnerabilityscanning, analysis and remediation * Patch management * Identify root cause of security issues and design appropriate solutions Required Experience: * Prior experience working within the security industry, with a strong … M365 infrastructure. * Experience of working with SIEM tools * Exposure to email security tools (Sophos, O365 etc) * Excellent patch management skills (Intune SCCM, MECM Endpoint Manager and WSUS) * Experience with vulnerabilityscanning and management (Insight VM) * Experience with Endpoint Security * Exposure to Cloud technologies (AWS, Azure etc.) * Excellent networking skills (TCP/IP, SMB, DNS, DHCP etc) Central London More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Urbanberry Recruitment Ltd
response activities Manage security projects including DPIAs, supplier assurance, penetration testing, and remediation Support evaluation and implementation of emerging technology, including AI security tools Conduct threat hunting and support vulnerabilityscanning and patch management Develop and refine security policies, playbooks, and response procedures Provide leadership and guidance to two direct reports Essential Experience & Knowledge Experience in Security Operations … Incident Response, or similar role Strong understanding of networking, Windows/Linux, and cybersecurity fundamentals Experience with SIEM (e.g., Sentinel, Splunk), EDR tools, and vulnerability platforms Understanding of security frameworks (ISO 27001, NIST, CIS) Working knowledge of Microsoft InTune Familiarity with GDPR and data protection requirements Desirable Certifications such as Security+, CEH, GIAC Experience with cloud security (Azure/ More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Urbanberry Recruitment Ltd
response activities Manage security projects including DPIAs, supplier assurance, penetration testing, and remediation Support evaluation and implementation of emerging technology, including AI security tools Conduct threat hunting and support vulnerabilityscanning and patch management Develop and refine security policies, playbooks, and response procedures Provide leadership and guidance to two direct reports Essential Experience & Knowledge Experience in Security Operations … Incident Response, or similar role Strong understanding of networking, Windows/Linux, and cybersecurity fundamentals Experience with SIEM (e.g., Sentinel, Splunk), EDR tools, and vulnerability platforms Understanding of security frameworks (ISO 27001, NIST, CIS) Working knowledge of Microsoft InTune Familiarity with GDPR and data protection requirements Desirable Certifications such as Security+, CEH, GIAC Experience with cloud security (Azure/ More ❯
a secure, fast-moving environment. Real alerts. Real incidents. No babysitting. What You'll Do Monitor and respond to SIEM/EDR alerts. Triage and investigate security incidents. Support vulnerability management and remediation. Assist with IA tasks: risk, audits, and compliance. Maintain access controls, reviews, and security documentation. Essential: 1-2 years in security/SOC/IT security. … threats. Experience with SIEM/EDR tools. Understanding of ISO 27001/NIST. SC cleared Government or Military background Nice to Have: Cloud security exposure (Azure/AWS). Vulnerabilityscanning tools (Nessus/Qualys). Basic scripting (PowerShell/Python). Security+ or similar. More ❯
programs and mentoring others. Can demonstrate ownership of an ISO 27001 program; practical exposure to SOC 2 and Cyber Essentials Plus. Comfortable overseeing SIEM/logging, EDR/XDR, vulnerabilityscanning, patch governance, IAM, and secure configuration. Cloud experience (AWS/Azure/GCP) and light scripting (e.g., Python) are a plus. Hands-on with GDPR workflows (DPIAs … risk register current; drive risk treatment, exceptions, and change control with clear owners and timelines. Security operations oversight: Govern daily log review for critical systems; run weekly alert/vulnerability triage; coordinate patch cycles; oversee SIEM/EDR/XDR; enforce IAM standards (RBAC, least privilege). Resilience & recovery: Lead annual BCP/DR/IR exercises (tabletops, restore More ❯
ethical hackers, helping test systems, applications, and networks for vulnerabilities - working alongside seasoned professionals while sharpening your offensive security skills.Expect to contribute to hands-on pen testing engagements, conduct vulnerability assessments, and support threat hunting within a well-established SOC. You'll develop your skills using industry-standard tools, investigate incidents, and provide actionable remediation advice.Role: Junior Penetration TesterLocation … London/HybridSalary: £30,000 - £50,000 (DOE)Ideally, you’ll have: 6+ months of proven penetration or security testing experience Knowledge of Metasploit, Burp Suite, and vulnerabilityscanning tools Experience with Windows, Linux and Mac operating systems Interest in threat hunting, incident response, and security monitoring CRT/OSCP/Cyber Scheme training or aspirations to achieve More ❯
City, London, United Kingdom Hybrid/Remote Options
Big Red Recruitment Midlands Limited
hackers, helping test systems, applications, and networks for vulnerabilities - working alongside seasoned professionals while sharpening your offensive security skills. Expect to contribute to hands-on pen testing engagements, conduct vulnerability assessments, and support threat hunting within a well-established SOC. You'll develop your skills using industry-standard tools, investigate incidents, and provide actionable remediation advice. Role: Junior Penetration … Location: London/Hybrid Salary: £30,000 - £50,000 (DOE) Ideally, you ll have: 6+ months of proven penetration or security testing experience Knowledge of Metasploit, Burp Suite, and vulnerabilityscanning tools Experience with Windows, Linux and Mac operating systems Interest in threat hunting, incident response, and security monitoring CRT/OSCP/Cyber Scheme training or aspirations More ❯
London, Fleet Street, United Kingdom Hybrid/Remote Options
Big Red Recruitment Midlands Limited
hackers, helping test systems, applications, and networks for vulnerabilities - working alongside seasoned professionals while sharpening your offensive security skills. Expect to contribute to hands-on pen testing engagements, conduct vulnerability assessments, and support threat hunting within a well-established SOC. You'll develop your skills using industry-standard tools, investigate incidents, and provide actionable remediation advice. Role: Junior Penetration … Location: London/Hybrid Salary: £30,000 - £50,000 (DOE) Ideally, you’ll have: 6+ months of proven penetration or security testing experience Knowledge of Metasploit, Burp Suite, and vulnerabilityscanning tools Experience with Windows, Linux and Mac operating systems Interest in threat hunting, incident response, and security monitoring CRT/OSCP/Cyber Scheme training or aspirations More ❯
the day-to-day operation of security systems and tools, including firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus, anti-malware, SIEM (Security Information and Event Management), vulnerability scanners, and data encryption solutions. Manage vulnerability management programs, including regular scanning, penetration testing, and remediation of identified weaknesses. Lead and manage security incident response, including detection … Strong understanding of information security principles, frameworks (e.g., ISO 27001, NIST, Cyber Essentials), and best practices. Hands-on experience with security technologies such as firewalls, SIEM, IDS/IPS, vulnerability scanners, endpoint detection and response (EDR), and identity management solutions. Experience with cloud security (e.g., Azure Security). Proven experience in managing security incidents and conducting incident response. Familiarity More ❯
in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, Sentinel, ELK, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in Protective Monitoring & SOC operation Experience in network security principles, firewalls, and access control mechanisms. Preferred Qualifications: - Industry certifications such as CompTIA Security+, CISSP, CISM, CEH, or More ❯
Terraform/Bicep for AKS, container registries, application services, and networking Implement monitoring, alerting, and observability frameworks with SLOs and diagnostic tools Enforce security through access controls, secrets management, vulnerabilityscanning, and policy-as-code Manage environment consistency and optimise cloud costs through performance monitoring and capacity planning Create reusable automation tools, templates, and documentation for developer self More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Computappoint
Terraform/Bicep for AKS, container registries, application services, and networking Implement monitoring, alerting, and observability frameworks with SLOs and diagnostic tools Enforce security through access controls, secrets management, vulnerabilityscanning, and policy-as-code Manage environment consistency and optimise cloud costs through performance monitoring and capacity planning Create reusable automation tools, templates, and documentation for developer self More ❯
robust monitoring and alerting solutions Contributing to and maintaining CI/CD pipelines Driving ISO 27000 implementation and supporting ongoing compliance initiatives Introducing and managing cybersecurity tools such as vulnerability scanners, endpoint protection, SIEM, and cloud security monitoring solutions Requirements: Extensive experience in a DevOps team lead role using AWS, (IAM, S3, EKS). Experience with IaC such as More ❯
robust monitoring and alerting solutions Contributing to and maintaining CI/CD pipelines Driving ISO 27000 implementation and supporting ongoing compliance initiatives Introducing and managing cybersecurity tools such as vulnerability scanners, endpoint protection, SIEM, and cloud security monitoring solutions Requirements: Extensive experience in a DevOps team lead role using AWS, (IAM, S3, EKS). Experience with IaC such as More ❯
City, London, United Kingdom Hybrid/Remote Options
The Bridge IT Recruitment
Investigate and resolve cyber incidents promptly and effectively. Implement and manage security measures including firewalls, encryption, and endpoint protection. Maintain clear documentation of breaches, assessments, and remediation actions. Conduct vulnerability testing, penetration testing, and risk assessments. Collaborate with the IT Security Manager to identify and mitigate network vulnerabilities. Analyse logs from multiple sources to detect and respond to abnormal … a SOC (Security Operations Centre) or NOC (Network Operations Centre). Strong understanding of incident response methodologies and the MITRE ATT&CK framework. Experience using SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. Technical expertise in Microsoft Defender, EDR (Endpoint Detection and Response), and network architecture. Practical experience managing cyber incidents and implementing secure configurations. Excellent analytical More ❯
London, Fleet Street, United Kingdom Hybrid/Remote Options
The Bridge IT Recruitment
Investigate and resolve cyber incidents promptly and effectively. Implement and manage security measures including firewalls, encryption, and endpoint protection. Maintain clear documentation of breaches, assessments, and remediation actions. Conduct vulnerability testing, penetration testing, and risk assessments. Collaborate with the IT Security Manager to identify and mitigate network vulnerabilities. Analyse logs from multiple sources to detect and respond to abnormal … a SOC (Security Operations Centre) or NOC (Network Operations Centre). Strong understanding of incident response methodologies and the MITRE ATT&CK framework. Experience using SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. Technical expertise in Microsoft Defender, EDR (Endpoint Detection and Response), and network architecture. Practical experience managing cyber incidents and implementing secure configurations. Excellent analytical More ❯
principles. Implement proactive security measures and controls to prevent security breaches and minimize potential impact, including managing and implementing various security technologies and tools (e.g., SIEM, IDS/IPS, vulnerability scanners). Lead the cloud security strategy, ensuring robust configuration, monitoring, and protection of our client's cloud infrastructure and services. Financial Management and Justification: Develop business cases that … and implement security awareness training programs for all staff. Metrics and KPIs: Develop and track relevant Key Performance Indicators (KPIs) such as incident response times, compliance audit results, and vulnerability management metrics. Cross-functional Collaboration: Work closely with the Engineering team and other technical departments to ensure security is integrated into all development and operational processes. More ❯