Worthing, West Sussex, England, United Kingdom Hybrid / WFH Options
VIQU IT Recruitment
Vulnerability Analyst – 6 Months – Remote - Qualys A client is seeking a Vulnerability analyst/Patching Engineer to help tackle a critical security backlog across 2,700 devices. This is a hands-on contract role focused on patching end users and security remediation to ensure systems are up to date and secure. Key Skills of the Vulnerability Analyst … Strong experience in vulnerability management and patching within enterprise environments. Hands-on experience with Qualys for vulnerabilityscanning and reporting. Solid Windows 10/11 expertise with a focus on security hardening and patching. Proficient with SCCM is beneficial but not necessary. Excellent documentation skills. Strong verbal and written communication skills. Responsibilities of the Vulnerability Analyst … end patching for end user devices. Support and transfer knowledge of Qualys alerts and patching workflows. Ensure all systems run on the latest and most secure versions. The successful Vulnerability t Analyst will be working remotely however may require occasional ad hoc travel to Worthing. Apply now to speak with VIQU IT in confidence. Or reach out to Matt More ❯
automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript More ❯
automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript More ❯
Cyber Security Engineer CyberSec Engineer/IT Security Specialist – Disaster Recovery, Resilience Testing, CyberSec Improvements, VulnerabilityScanning/Management, Infrastructure, Nutanix, Commvault, VMware, Azure, PowerShell, Python; Law Firm, Permanent, London/Hybrid (3/2). £80k - £95k (On Experience) +Bonus +Benefits Global Low Firm seeks experienced Cyber Security Engineer/IT Security Specialist to join the IT … infrastructure tooling and at least one scripting language (PowerShell or Python preferred). Experience with Nutanix, VMware, Commvault, and hybrid cloud platforms Azure (preferred), AWS or GCP. Understanding of vulnerability management, monitoring, and orchestration tools. Relevant certifications such as Microsoft SC-200, Certified Ethical Hacker (CEH), CBCP/CBCI or equivalent. We are open to receiving applications from across More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerabilityscanning Data Loss Prevention (DLP) Candidate Profile Proven experience delivering large-scale cyber and information security programmes Strong hands-on background in cyber security and technical delivery Deep More ❯
for the MSP's own security posture ensuring tools, processes, and teams meet the same standards we deliver to clients. They monitor measurable posture metrics (e.g., Microsoft Secure Score, Vulnerability etc.), ensure continuous improvement, and keep the MSP's security practice relevant through ongoing training, certifications, and emerging threat awareness. While day-to-day execution is delegated to Security … the Security Lead owns security end-to-end: identifying risks, embedding controls, and ensuring compliance is demonstrable. Key Responsibilities Client-Facing Lead Quarterly Security Reviews (QSRs), presenting patch/vulnerability posture, incidents, compliance status, and risk register updates. Translate technical security risks into clear business impact and outcomes. Own the client exception process, ensuring risks are documented, communicated, and … escalation point for clients when risks require senior involvement. Internal MSP Security Own the MSP's internal security frameworks and certifications (e.g., CE+, ISO, SOC 2). Oversee patching, vulnerability, and risk management of MSP-owned infrastructure and tools. Ensure MSP's technology stack (RMM, XDR, PSA, backup, etc.) is securely deployed and monitored. Drive staff security awareness, training More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerabilityscanning tools Data Loss Prevention (DLP) solutions Candidate Profile: Strong hands-on experience in cyber and information security Deep understanding of Microsoft Azure security architecture Experience managing vendor More ❯
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding … a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Clydebank, Dunbartonshire, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment Ltd
Maintains awareness of industry best practices and applies them to organisational security policies. Implements and monitors security systems such as firewalls, intrusion detection systems, endpoint protection, log monitoring, and vulnerability scanning. Investigates and documents security breaches and cyber incidents, including assessment of impact and coordination of remediation efforts. Coordinates penetration testing with internal or external parties as appropriate. Drives More ❯
clydebank, central scotland, united kingdom Hybrid / WFH Options
Nine Twenty Recruitment Ltd
Maintains awareness of industry best practices and applies them to organisational security policies. Implements and monitors security systems such as firewalls, intrusion detection systems, endpoint protection, log monitoring, and vulnerability scanning. Investigates and documents security breaches and cyber incidents, including assessment of impact and coordination of remediation efforts. Coordinates penetration testing with internal or external parties as appropriate. Drives More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment Ltd
Maintains awareness of industry best practices and applies them to organisational security policies. Implements and monitors security systems such as firewalls, intrusion detection systems, endpoint protection, log monitoring, and vulnerability scanning. Investigates and documents security breaches and cyber incidents, including assessment of impact and coordination of remediation efforts. Coordinates penetration testing with internal or external parties as appropriate. Drives More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
protocols and secure key lifecycle management- Securing microservices, APIs, and DevSecOps best practices Skilled in penetration testing and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerabilityscanning, remediation, and vendor management Collaborative mindset with the ability to partner across engineering, security, and product teams Desirable Skills: Hands-on configuration, deployment, and operation of ForgeRock More ❯
Employment Type: Full-Time
Salary: £100,000 - £120,000 per annum, Negotiable, Inc benefits
Governance and Data Protection teams to ensure alignment. Vendor & System Assurance Conduct third-party security assessments and manage security clauses in supplier contracts and SLAs. Oversee penetration testing and vulnerabilityscanning of core systems, including client portals and emergency response platforms. People Management Lead and mentor a team of Analysts, ensuring high-quality output and continuous development. Create More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
AJ BELL BUSINESS SOLUTIONS LIMITED
the threats targeting AJ Bell and ensuring our defences provide and effective response. Key responsibilities: Reviewing and assessing Security Operations Centre alerts to ensure an appropriate response taken. Overseeing vulnerabilityscanning to confirm the effectiveness of patching Monitoring systems for compliance with policy and supporting remediation where required. Track and manage penetration testing programs. Investigate and respond to More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
AJ Bell
by our external business partners and those we perform on our suppliers. Key responsibilities: Assessment, planning and co-ordination of patch management activities for internal systems and hardware Overseeing vulnerabilityscanning to confirm the effectiveness of patching Assessing and recommending server hardening activities to be completed by the Infrastructure and Service Delivery teams Undertaking risk profiling of AJ More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
Public Sectors. The Roles Involve: Incident Response : Enhance coordination, assess impact, inform guidance, and develop playbooks. Threat Intelligence : Deliver tailored intelligence, monitorTTPs, and manage tooling (OpenCTI, MISP, sandboxes). Vulnerability Management : Identify and triage vulnerabilities, support remediation, and improve disclosure schemes. Requirements : Proven experience in SOC environments and incident response. Deep understanding of threat actors and intelligence platforms. Expertise … in vulnerabilityscanning and remediation. Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome applications from people of all backgrounds and perspectives. Our success is driven by our people, united by the spirit of partnership to deliver the best resourcing solutions for More ❯
Hampshire Support : Full training and certification support provided Growth : Build on your 2nd line support experience and step confidently into cyber Variety : Get hands-on with patching, threat prevention, vulnerabilityscanning, phishing protection, and more Stability : Join a respected organisation with excellent benefits, including 26% pension and 43 days holiday What you’ll be doing: Managing system patching … perimeter Monitoring and responding using Microsoft Defender and Endpoint Protection tools Running phishing simulations and awareness training for staff Implementing data loss protection controls and securing Microsoft 365 Conducting vulnerability scans and acting on results Supporting continuous improvements in the business’s cyber security posture What we’re looking for: Experience in 2nd line IT support, infrastructure, or a More ❯
maintain system software including operating systems and utilities. Apply security patches and updates in line with organisational policy and vendor guidance. Monitor patch compliance and report on remediation progress. Vulnerability Management Investigate unauthorised access attempts and ensure compliance with relevant legislation. Collaborate with security teams to identify, assess, and remediate vulnerabilities. Support access control monitoring and incident response activities. … alignment. Required Skills & Experience Proven experience in enterprise-scale environments supporting both Windows Server and Linux platforms. Familiarity with patch management tools (eg, WSUS, SCCM, Ansible). Exposure to vulnerabilityscanning tools (eg, Qualys, Tenable, Rapid7). Understanding of ITIL processes and change control. Strong troubleshooting and diagnostic skills. Ability to work collaboratively under direction while managing tasks More ❯
NG1, Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
You are someone who loves to automate mundane tasks, make scalable, highly available, and robust solutions, and making sure whatever you’re working on is secure, through things like vulnerabilityscanning, threat analysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with More ❯
and logging tools (Prometheus, Grafana, ELK stack) Work with a software development team to troubleshoot, build and deploy to environmental issues. Integrate security best practice into DevOps lifecycle including vulnerabilityscanning, secrets management and code quality More ❯
and logging tools (Prometheus, Grafana, ELK stack) Work with a software development team to troubleshoot, build and deploy to environmental issues. Integrate security best practice into DevOps lifecycle including vulnerabilityscanning, secrets management and code quality JBRP1_UKTJ More ❯
and logging tools (Prometheus, Grafana, ELK stack) Work with a software development team to troubleshoot, build and deploy to environmental issues. Integrate security best practice into DevOps lifecycle including vulnerabilityscanning, secrets management and code quality JBRP1_UKTJ More ❯
and logging tools (Prometheus, Grafana, ELK stack) Work with a software development team to troubleshoot, build and deploy to environmental issues. Integrate security best practice into DevOps lifecycle including vulnerabilityscanning, secrets management and code quality JBRP1_UKTJ More ❯