Vulnerability Analyst – 3-month contract My Customer is seeking a proactive and skilled Vulnerability Analyst to join their team in a highly regulated, mission-critical 24/7 environment. Their infrastructure includes over 450 servers operating across both Windows and Linux platforms — making secure access and timely response essential. Hands-on experience with Qualys and its vulnerabilityscanning, assessment, and reporting tools is needed for this role. Key Skills from the Vulnerability Analyst: Demonstrated experience in vulnerability management within large-scale enterprise or corporate environments . Hands-on experience with Qualys and its vulnerabilityscanning, assessment, and reporting tools. Strong working knowledge of Windows and Linux operating systems , including their associated … technology stacks. Able to operate effectively in a secure, complex, and highly regulated setting with restricted access considerations. Key responsibilities for the Vulnerability Analyst: Daily monitoring and analysis of security events and vulnerabilities. Proactively reviewing Qualys reports to identify missing patches, misconfigurations, and other potential threats. Collaborating closely with infrastructure and operations teams to coordinate and apply remediation actions. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Context Recruitment Limited
industry best practice * Perform security reviews, identify gaps in security architecture and apply appropriate remediation * Ensure appropriate technical measures are in place to comply with regulations/legislations * Conduct vulnerabilityscanning, analysis and remediation * Patch management * Identify root cause of security issues and design appropriate solutions Required Experience: * Prior experience working within the security industry, with a strong … M365 infrastructure. * Experience of working with SIEM tools * Exposure to email security tools (Sophos, O365 etc) * Excellent patch management skills (Intune SCCM, MECM Endpoint Manager and WSUS) * Experience with vulnerabilityscanning and management (Insight VM) * Experience with Endpoint Security * Exposure to Cloud technologies (AWS, Azure etc.) * Excellent networking skills (TCP/IP, SMB, DNS, DHCP etc) Central London More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerabilityscanning Data Loss Prevention (DLP) Candidate Profile Proven experience delivering large-scale cyber and information security programmes Strong hands-on background in cyber security and technical delivery Deep More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerabilityscanning tools Data Loss Prevention (DLP) solutions Candidate Profile: Strong hands-on experience in cyber and information security Deep understanding of Microsoft Azure security architecture Experience managing vendor More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
Public Sectors. The Roles Involve: Incident Response : Enhance coordination, assess impact, inform guidance, and develop playbooks. Threat Intelligence : Deliver tailored intelligence, monitorTTPs, and manage tooling (OpenCTI, MISP, sandboxes). Vulnerability Management : Identify and triage vulnerabilities, support remediation, and improve disclosure schemes. Requirements : Proven experience in SOC environments and incident response. Deep understanding of threat actors and intelligence platforms. Expertise … in vulnerabilityscanning and remediation. Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome applications from people of all backgrounds and perspectives. Our success is driven by our people, united by the spirit of partnership to deliver the best resourcing solutions for More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modelling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modelling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯