Vulnerability Specialist Jobs in the UK excluding London

2 of 2 Vulnerability Specialist Jobs in the UK excluding London

Threat and Vulnerability Specialist

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Morgan Hunt
Morgan Hunt are currently recruiting for the University of Glasgow, who require a Threat and Vulnerability Specialist on a permanent basis. You will be responsible for supporting and operating the organisation's vulnerability management function. Uses scanning tools and threat intelligence to identify risks, drive remediation efforts … to improve security posture and develop policies, procedures, and reporting. Key Responsibilities: Monitor threat feeds to identify risks and propose mitigations. Manage and configure vulnerability scans; ensure policy compliance. Maintain and enhance vulnerability management policies and strategy. Operate key security tools (e.g., endpoint protection, scanners). Collaborate across … apply insights to strategy. Essential Criteria: Knowledge & Qualifications: Relevant degree/HND or equivalent experience in a technical/security role. Strong understanding of vulnerability tools, techniques, and best practices. Skills: Able to solve complex problems independently. Strong planning, analytical, and communication abilities. Comfortable translating technical issues for non More ❯
Posted:

Threat and Vulnerability Specialist

Glasgow, Scotland, United Kingdom
Morgan Hunt
Job Description Morgan Hunt are currently recruiting for the University of Glasgow, who require a Threat and Vulnerability Specialist on a permanent basis. You will be responsible for supporting and operating the organisation's vulnerability management function. Uses scanning tools and threat intelligence to identify risks, drive … to improve security posture and develop policies, procedures, and reporting. Key Responsibilities: Monitor threat feeds to identify risks and propose mitigations. Manage and configure vulnerability scans; ensure policy compliance. Maintain and enhance vulnerability management policies and strategy. Operate key security tools (e.g., endpoint protection, scanners). Collaborate across More ❯
Posted: