Vulnerability Scanning Jobs in Scotland

20 of 20 Vulnerability Scanning Jobs in Scotland

Senior SOC Analyst

Glasgow, United Kingdom
Applicable Limited
Strong interpersonal and presentation skills. Strong analytical skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Analyst

Edinburgh, Scotland, United Kingdom
Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerability scanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
Posted:

Information Technology Engineer

Glasgow, Scotland, United Kingdom
Jones Whyte
hardware refreshes, system migrations, and software deployments. Cyber Security Act as a first responder to security incidents—triaging alerts, containing threats, and escalating to our SOC where appropriate. Support vulnerability management through patching, configuration management, and reporting. Assist with endpoint detection and response (EDR) tools and threat monitoring platforms (e.g., Microsoft Defender for Endpoint). Work alongside internal teams … Azure AD, and Windows Server environments. Solid networking knowledge (TCP/IP, DNS, DHCP, VPNs, VLANs, firewalls). Experience with IT security principles, practices, and tooling (e.g., EDR, MFA, vulnerability scanners). Ability to script or automate tasks using PowerShell or similar tools. Strong troubleshooting and analytical skills with a methodical approach. Ability to work with a hands-on More ❯
Posted:

Tableau Server Administrator

Edinburgh, Scotland, United Kingdom
JR United Kingdom
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
Posted:

Cyber Security Operations Lead

Edinburgh, United Kingdom
Hybrid / WFH Options
Harvey Nash Group
apply theory to practice. Be aware of the current cyber threat landscape and industry best practices and standards. Lead on improvement to coverage and depth of security monitoring and vulnerability scanning Design vulnerability data gathering and prioritisation procedures Act as technical escalation point for analysts on significant incidents, investigations, including hands on experience Establish procedures for intelligence … related product delivery evidence Key Skills Security products (M365 Defender stack, Sentinel/SIEM, email filtering (including authentication protocols), AV, firewalls, WAFs, Defender for Cloud) Security Testing (SAST, DAST, vulnerability scanning, configuration compliance scanning) Virtualisation platforms and operating systems, including Hyper-V and Windows Server. Enterprise Systems (Azure, M365, Intune, email, PKI, AD, GP, SCCM) Application platforms … MS Dynamics, Power Platform) Cloud platforms (Azure) Detection engineering (Log Ingestion, Rule Development, Tuning and Maintenance, detection testing) Security monitoring service delivery and improvement Vulnerability detection service improvement, finding prioritisation and reporting. Ability to communicate on technical issues with users and senior managers Recent experience in incident response Ability to work well in small team with internal colleagues and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Solutions Architect

Paisley, Scotland, United Kingdom
JR United Kingdom
solid understanding of the Microsoft stack Entra, Defender & Azure Sentinel and hands on experience with a wide range of security technologies, including firewalls, intrusion detection/prevention, SIEM and vulnerability scanners. Experience with cloud security environments is required for this role (AWS or Azure) As part of the role, you will support the sales engagements with a deep understanding More ❯
Posted:

DevOps Engineer

Dundee, Angus, United Kingdom
Hybrid / WFH Options
WARACLE
tools. Configure and manage infrastructure components using automation tools and monitor system performance, identify bottlenecks, and implement optimisations for improved resource utilisation . Implement security tools and practices, including vulnerability scanning and static code analysis. Communicate effectively with development teams to understand their requirements and align DevOps processes. Configure and maintain monitoring systems for log aggregation and lead More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

DevOps Engineer

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Waracle
and deployment processes using relevant tools. Configure and manage infrastructure components using automation tools and monitor system performance, identify bottlenecks, and implement optimisations. Implement security tools and practices, including vulnerability scanning and static code analysis. Communicate with development teams to understand their requirements and align DevOps processes. Configure and maintain monitoring systems for log aggregation and lead incident More ❯
Posted:

SOC Analyst

Glasgow, Scotland, United Kingdom
JR United Kingdom
Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerability management platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be rewarded More ❯
Posted:

SOC Analyst

Aberdeen, Scotland, United Kingdom
JR United Kingdom
Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerability management platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be rewarded More ❯
Posted:

DevOps Engineer

Glasgow, Scotland, United Kingdom
Waracle
to clients. Configuring and integrating DevOps tools and developing automation scripts. Implementing CI/CD pipelines. Managing infrastructure with automation tools and monitoring system performance. Applying security practices like vulnerability scanning. Collaborating with development teams to align DevOps processes. Monitoring systems and leading incident responses. Documenting configurations and procedures. Minimum Requirements: Experience with AWS and Azure cloud platforms. Knowledge More ❯
Posted:

Cyber Security Operations Lead

Edinburgh, Scotland, United Kingdom
Hybrid / WFH Options
Venesky Brown
apply theory to practice. - Be aware of the current cyber threat landscape and industry best practices and standards. - Lead on improvement to coverage and depth of security monitoring and vulnerability scanning - Design vulnerability data gathering and prioritisation procedures - Act as technical escalation point for analysts on significant incidents, investigations, including hands on experience - Establish procedures for intelligence … reporting, and the gathering of data in support of them - Own completion and accuracy of all SecOps-related product delivery evidence Essential Skills: - Security monitoring service delivery and improvement - Vulnerability detection service improvement, finding prioritisation and reporting. - Ability to communicate on technical issues with users and senior managers - Recent experience in incident response - Ability to work well in small More ❯
Posted:

IT Security Manager

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Nine Twenty Recruitment
providing IT Security input into IT strategy and subsequent projects to implement strategy. Responsible for IT security incident response, investigation, reporting and forensics. Understand, implement and monitor security systems (vulnerability scanning, boundary protection, intrusion detection, antivirus, logfile analysis etc.). Investigate and document security breaches, other cyber security incidents and assess the damage they cause. Regular reporting against More ❯
Posted:

Cyber Security Technician

East Kilbride, Lanarkshire, United Kingdom
Coca-cola European Partners
with engineering, maintenance and central teams, you'll ensure robust protection of our electrical, automation, and industrial network systems. You'll also drive key initiatives like cyber hygiene programmes, vulnerability assessments, and network monitoring - keeping us ahead of threats and ready to respond. KEY RESPONSIBILITIES Ensure OT assets and industrial control systems are protected against cyber threats. Implement and … support cyber security tools and practices defined in our global OT Cyber Strategy. Lead cyber hygiene and vulnerability management programmes, coordinating remediation where needed. Monitor OT network activity, detect insecure configurations or malicious activity, and take appropriate action. Own the site-level cyber incident response plan - coordinating with stakeholders and ensuring timely resolution. Support compliance efforts related to OT … and SCADA, and have strong knowledge of industrial networks. You have solid grounding in cyber security principles - TCP/IP, common protocols, OSI model, and cyber tooling such as vulnerability scanning, antivirus and endpoint protection. You can lead, influence and guide others - from site technicians to external contractors. You're confident working independently and as part of a More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

OT Cyber Security Consultant

East Kilbride, Lanarkshire, United Kingdom
Coca-Cola Europacific Partners
with engineering, maintenance and central teams, you'll ensure robust protection of our electrical, automation, and industrial network systems. You'll also drive key initiatives like cyber hygiene programmes, vulnerability assessments, and network monitoring - keeping us ahead of threats and ready to respond. KEY RESPONSIBILITIES Ensure OT assets and industrial control systems are protected against cyber threats. Implement and … support cyber security tools and practices defined in our global OT Cyber Strategy. Lead cyber hygiene and vulnerability management programmes, coordinating remediation where needed. Monitor OT network activity, detect insecure configurations or malicious activity, and take appropriate action. Own the site-level cyber incident response plan - coordinating with stakeholders and ensuring timely resolution. Support compliance efforts related to OT … and SCADA, and have strong knowledge of industrial networks. You have solid grounding in cyber security principles - TCP/IP, common protocols, OSI model, and cyber tooling such as vulnerability scanning, antivirus and endpoint protection. You can lead, influence and guide others - from site technicians to external contractors. You're confident working independently and as part of a More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

OT Cyber Security Consultant

East Kilbride, South Lanarkshire, UK
Coca-Cola Europacific Partners
with engineering, maintenance and central teams, you’ll ensure robust protection of our electrical, automation, and industrial network systems. You’ll also drive key initiatives like cyber hygiene programmes, vulnerability assessments, and network monitoring – keeping us ahead of threats and ready to respond. KEY RESPONSIBILITIES Ensure OT assets and industrial control systems are protected against cyber threats. Implement and … support cyber security tools and practices defined in our global OT Cyber Strategy. Lead cyber hygiene and vulnerability management programmes, coordinating remediation where needed. Monitor OT network activity, detect insecure configurations or malicious activity, and take appropriate action. Own the site-level cyber incident response plan – coordinating with stakeholders and ensuring timely resolution. Support compliance efforts related to OT … and SCADA, and have strong knowledge of industrial networks. You have solid grounding in cyber security principles – TCP/IP, common protocols, OSI model, and cyber tooling such as vulnerability scanning, antivirus and endpoint protection. You can lead, influence and guide others – from site technicians to external contractors. You’re confident working independently and as part of a More ❯
Employment Type: Full-time
Posted:

Co-Founder

Dunfermline, Scotland, United Kingdom
JR United Kingdom
infrastructure: Dockerized services, Kubernetes or AWS Fargate/ECS, managed PostgreSQL, Redis, and S3. Implement robust ESLint/Prettier (JS/TS) in CI, automated tests (Jest, Hardhat), and vulnerability scanning (Snyk or GitHub CodeQL). Ensure all API keys and secrets live in AWS Secrets Manager or GCP Secret Manager, with least-privilege IAM roles. Set up … infrastructure: Dockerized services, Kubernetes or AWS Fargate/ECS, managed PostgreSQL, Redis, and S3. Implement robust ESLint/Prettier (JS/TS) in CI, automated tests (Jest, Hardhat), and vulnerability scanning (Snyk or GitHub CodeQL). Ensure all API keys and secrets live in AWS Secrets Manager or GCP Secret Manager, with least-privilege IAM roles. Set up More ❯
Posted:

Co-Founder

Livingston, Scotland, United Kingdom
JR United Kingdom
infrastructure: Dockerized services, Kubernetes or AWS Fargate/ECS, managed PostgreSQL, Redis, and S3. Implement robust ESLint/Prettier (JS/TS) in CI, automated tests (Jest, Hardhat), and vulnerability scanning (Snyk or GitHub CodeQL). Ensure all API keys and secrets live in AWS Secrets Manager or GCP Secret Manager, with least-privilege IAM roles. Set up … infrastructure: Dockerized services, Kubernetes or AWS Fargate/ECS, managed PostgreSQL, Redis, and S3. Implement robust ESLint/Prettier (JS/TS) in CI, automated tests (Jest, Hardhat), and vulnerability scanning (Snyk or GitHub CodeQL). Ensure all API keys and secrets live in AWS Secrets Manager or GCP Secret Manager, with least-privilege IAM roles. Set up More ❯
Posted:

Senior MLOps/GenAI Infrastructure Engineer

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
BBC Group and Public Services
practices (IAM, encryption, VPC configuration, audit logging) using AWS native services and third-party tools. Embed security throughout the software development lifecycle by integrating static and dynamic code analysis, vulnerability scanning, and policy-as-code tools into CI/CD pipelines—ensuring DevSecOps principles are applied from design to deployment. Promote a culture of continuous learning and knowledge More ❯
Posted:

Full Stack Security Engineer III -[CTC - GRC]

Glasgow, Scotland, United Kingdom
JPMorgan Chase & Co
for internal clients (e.g., product, platform, application owners). Create secure and high-quality production code and maintain algorithms that run synchronously with appropriate systems. Apply specialized tools (e.g., vulnerability scanner) to analyze and correlate incident data, identifying, interpreting, and summarizing the probability and impact of threats when determining specific vulnerabilities. Lead delivery of continuity-related awareness, training, educational More ❯
Posted:
Vulnerability Scanning
Scotland
25th Percentile
£61,250
Median
£62,500
75th Percentile
£63,750