Permanent Vulnerability Management Jobs in Berkshire

1 to 25 of 67 Permanent Vulnerability Management Jobs in Berkshire

Cyber Vulnerability Management Analyst

slough, south east england, United Kingdom
Hybrid / WFH Options
FirstBank UK Limited
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months FirstBank UK is a globally recognised, top-tier bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business with over … is the oldest African bank in the UK. Due to business requirements, we are now looking to acquire the services of an experienced Cyber Vulnerability Management Analyst Please note that this is a hybrid role with 3 days in the office and 2 days working from home. Key … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The More ❯
Posted:

Senior Cyber Threat Intelligence Analyst

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
Thames Water Utilities Limited
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerability management (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Thames Water offices as required Working More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Threat Intelligence Analyst

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerability management (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Employment Type: Permanent
Salary: GBP 60,000 - 65,000 Annual
Posted:

Cyber Threat Intelligence Analyst

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerability management (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Employment Type: Permanent
Salary: £60000 - £65000/annum Company benefits
Posted:

Senior IT Security Engineer

slough, south east england, United Kingdom
Americold Logistics, LLC
with global business risk/objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security … security services and deploy new tools in support of the security roadmap. Must be capable of interacting effectively with various internal teams, peers, and management staff. Support the information security manager with creating information security metrics for the respective supported security products. This will be done monthly. Deploy new … processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security operations, legal, compliance, incident response teams More ❯
Posted:

Senior IT Security Engineer

reading, south east england, United Kingdom
Americold Logistics, LLC
with global business risk/objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security … security services and deploy new tools in support of the security roadmap. Must be capable of interacting effectively with various internal teams, peers, and management staff. Support the information security manager with creating information security metrics for the respective supported security products. This will be done monthly. Deploy new … processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security operations, legal, compliance, incident response teams More ❯
Posted:

Senior IT Security Engineer

slough, south east england, United Kingdom
Tradition
IT Security Engineer to be based in our London office. Main responsibilities within the Senior IT Security Engineer position include: Support Information Security risk management, compliance activities, and governance initiatives. Collaborate with stakeholders to identify, document, and mitigate security risks through effective controls. Work with key software and service … manage security products and solutions. Lead and support security incident response, including investigation, containment, and remediation. Deploy, manage, and continuously improve security tools, including vulnerability management, identity management, and attack surface monitoring. Analyse emerging threats and vulnerabilities, leveraging threat intelligence to proactively mitigate risks Perform proactive threat … principles, practices and standards and how they translate into real world technical solutions. Significant experience in the field of Information Security including Governance, Risk management and Compliance frameworks, Security Awareness and Threat Intelligence. Ability to effectively communicate complex security or intelligence related information to both technical and non-technical More ❯
Posted:

DevSecOps Engineer

slough, south east england, United Kingdom
Hazeltree
to safeguard critical business operations by design and default. You will be responsible for security automation, CI/CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI/CD pipeline to enhance development security. Work … secure AWS cloud infrastructure for clients and internal operations. Automate AWS infrastructure builds following CIS hardening standards . Ensure top-tier security configuration, access management, and incident response on cloud platforms. Operational Support & Incident Response: Support business-critical Windows and Linux-based environments. Monitor and respond to security alerts … across Infosec, servers, firewalls, and applications. Conduct continuous monitoring of internal and third-party information security controls. Threat & Vulnerability Management: Assess SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) scans. Implement remediation and mitigation strategies in collaboration with development teams. Maintain network security protocols, firewalls More ❯
Posted:

Security Consultant

slough, south east england, United Kingdom
Albany Beck
Albany Beck is looking for an experienced Security Consultant with a strong background in Security Risk Management, GRC, Vulnerability Analysis, and Compliance to join a high-impact programme within a leading global investment bank. This is an exciting opportunity to play a key role in the design and … a Security Consultant, you’ll be working in the client’s security team, contributing to critical workstreams that span governance, risk and compliance (GRC), vulnerability management, and security control design. You'll work closely with cross-functional stakeholders including technology, audit, and operations teams to ensure the organisation … and continuous improvement of security governance frameworks and GRC processes. Design and enhance security controls across infrastructure, applications, and cloud environments. Lead or support vulnerability analysis activities, including risk-based prioritisation and remediation tracking. Ensure alignment with global security standards and frameworks (e.g. NIST, ISO 27001, CIS). Partner More ❯
Posted:

Cybersecurity Risk Analyst

slough, south east england, United Kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/ More ❯
Posted:

Head of Information Security

slough, south east england, United Kingdom
Emeria
and Information Security functions. You have a deep understanding of technical and governance-based security practices, with the ability to balance operational resilience, risk management, and business enablement. In this role which reports to our Chief Information Officer, you will drive the overall security strategy, ensuring that security controls … Responsibilities Define, implement, and oversee technical security controls across the organisation’s Microsoft and Azure-based infrastructure, ensuring robust protection against cyber threats. Lead vulnerability management and remediation efforts, ensuring timely identification and mitigation of risks across cloud and on-premises environments. Enhance and manage security monitoring, detection … security features. Drive the security architecture and engineering strategy, ensuring secure design principles are embedded across cloud and hybrid infrastructure. Oversee identity and access management (IAM), enforcing least privilege principles and securing authentication processes across Microsoft platforms. Coordinate and lead incident response activities, working with internal teams and third More ❯
Posted:

Security Analyst

slough, south east england, United Kingdom
NDK Cyber
years' experience working in a corporate, structured environment in a security analyst or security operations role. You'll focus on daily log analysis, vulnerability management support, antivirus monitoring, and helping to close security-related incidents. Key Responsibilities: 🔍 Security Monitoring & Analysis Review, monitor, and analyze daily security logs using … positives, escalate true positives, and assist in incident investigations. Support service desk and IT teams with closing out security-related calls and incidents. 🛠️ Threat & Vulnerability Management Assist with running and analyzing vulnerability scans; help track remediation. Monitor and manage endpoint protection and antivirus alerts. Collaborate with infrastructure … Support Maintain security incident logs, reports, and operational documentation. Support periodic health checks of security tools and systems. Work closely with firewall and access management processes (basic reviews and requests). Who This Role Would Suit: A candidate with 2–3 years of security analyst experience in a structured More ❯
Posted:

Senior Information Security Analyst

slough, south east england, United Kingdom
Clearwater People Solutions Ltd
someone with broad security expertise who enjoys variety and continual development. You’ll take the lead on: First and second line security operations, including vulnerability management Investigating and responding to security incidents Ensuring policies and procedures remain aligned to industry best practice Providing assurance that security controls are … Key skills for the Senior Information Security Analyst: Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerability management, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid More ❯
Posted:

Senior Information Security Analyst

reading, south east england, United Kingdom
Clearwater People Solutions Ltd
someone with broad security expertise who enjoys variety and continual development. You’ll take the lead on: First and second line security operations, including vulnerability management Investigating and responding to security incidents Ensuring policies and procedures remain aligned to industry best practice Providing assurance that security controls are … Key skills for the Senior Information Security Analyst: Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerability management, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid More ❯
Posted:

IT Security & Vulnerability Engineer - Investment Bank - 654/day GBP

slough, south east england, United Kingdom
Hybrid / WFH Options
Hawksworth
Position: IT Security & Vulnerability Management Engineer Industry: Investment Banking (Global Financial) Day rate contract position: 654/day (inside IR35) Initial contract length of 6 months Location: Central London Hybrid working: 3 days at their London office Do you have experience leading vulnerability management in large … life cycle of security assessments, threat identification, and mitigation Experience in security assessments, particularly within complex enterprise environments Security risk oversight, applying technical security vulnerability remediation practices Identification, prioritization, remediation and reporting of security risks. Knowledge of vulnerability remediation practices Monitoring and capacity planning of local systems as … part of the global framework A nice to have.... Experience with Tenable and Flexera Background in RedHat Linux, Microsoft Windows including WSUS and GPO management This day rate contract is initially for 6 months with a view to extend. The day rate is 654/day GBP inside IR35. More ❯
Posted:

Vulnerability Analyst - OT

slough, south east england, United Kingdom
TalentHawk
Our client are leading the way in energy delivery and are looking to add to their talented security team. Key Responsibilities: OT Security & Vulnerability Management: Hands-on involvement in OT vulnerabilities, discovery, and security assessments . Test Lab Involvement: Contribute to the development of two security test labs … security) and maintain compliance. Network & Workstation Security: Support OT security architecture, network security, and cyber resilience initiatives . Tool & Process Improvement: Identify and implement vulnerability tracking tools and work closely with engineers on daily checks and reporting . Reporting & Communication: Provide structured updates to the Information Security & Vulnerability Manager. ensuring clear progress tracking. Ideal Candidate Profile: Experience: 2+ years in OT security and vulnerability management . Technical Skills: Hands-on experience with GIEC Enterprise Assessor, GIRA, TIA + Security+, CCNA, ICS security, SCADA. Soft Skills: Self-managed and proactive , capable of planning ahead. Strong under More ❯
Posted:

IT Infrastructure Engineer

slough, south east england, United Kingdom
identifi Global Resources
to leverage your skills and make positive impact? We are looking for an experienced IT professional to join during the transition of legacy case management systems to modern, cloud-based solutions. Your role will focus on maintaining and supporting on prem legacy systems during ongoing transformation to cloud-based … support. Therefore we are looking for all-arounder, with good SQL knowledge. What You Will Do Provide expert support and maintenance for legacy case management systems (Extranet, CMS, DTS, EKS2, and ADMS) in collaboration with the IT teams. Ensure the legacy systems continue to run smoothly during the transition … patches, and general system maintenance for both legacy and cloud-based systems. What do you need to be successful? Strong experience in SQL server management and replication. Experience in writing and optimising SQL scripts for system management and troubleshooting. Strong knowledge of SharePoint (on-premise & cloud). Experience More ❯
Posted:

IT Infrastructure Engineer

reading, south east england, United Kingdom
identifi Global Resources
to leverage your skills and make positive impact? We are looking for an experienced IT professional to join during the transition of legacy case management systems to modern, cloud-based solutions. Your role will focus on maintaining and supporting on prem legacy systems during ongoing transformation to cloud-based … support. Therefore we are looking for all-arounder, with good SQL knowledge. What You Will Do Provide expert support and maintenance for legacy case management systems (Extranet, CMS, DTS, EKS2, and ADMS) in collaboration with the IT teams. Ensure the legacy systems continue to run smoothly during the transition … patches, and general system maintenance for both legacy and cloud-based systems. What do you need to be successful? Strong experience in SQL server management and replication. Experience in writing and optimising SQL scripts for system management and troubleshooting. Strong knowledge of SharePoint (on-premise & cloud). Experience More ❯
Posted:

Security Governance, Risk and Assurance Specialist

slough, south east england, United Kingdom
Hybrid / WFH Options
CLS Group
in which everyone is encouraged to be open and forward-thinking. Job information: Functional title - AVP, IT Security Specialist Department – Security Governance and Risk Management Corporate level – Associate Vice President Report to – Director of Security Location - London, onsite 2 days per week About the role: The individual will be … consultation on remediation approaches to address gaps and continue ongoing monitoring of remediation, re-assess until reduced to an acceptable level. Supporting Cybersecurity Risk Management strategies based on security findings and observations. Including informing improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all … written communication skills to convey complex technical information clearly and effectively. Presenting data insights to non-technical stakeholders Base level understanding of security risk management and taxonomy principles, to reduce risk to an acceptable level. Knowledge of vulnerability management and incident management practices. Ability to learn More ❯
Posted:

Vulnerability Analyst

reading, south east england, United Kingdom
Searchstone Ltd
Vulnerability Analyst - up to £50K - Manchester (3 days in office) *** We are currently recruiting for an well known consulting organisation, who are looking for an internal facing Vulnerability Analyst to join their team. This role will form part of a growing team, providing a crucial service to secure … their internal IT Estate. This is a Junior - Mid level position, so we're looking for a minimum of 2+ years of vulnerability management experience. Key responsibilities are as follows: Identification and ongoing management of vulnerabilities within the IT estate. Analysing identified vulnerabilities through infrastructure scans and … penetration testing. They work with Tenable as their VM platform, but experience with any tooling is fine. Prioritisation of vulnerabilities. Stakeholder management, to engage with business and technical stakeholder to effectively mitigate/resolve issues. Participation in ongoing process improvement activities. This is a great opportunity to join a More ❯
Posted:

Vulnerability Analyst

slough, south east england, United Kingdom
Searchstone Ltd
Vulnerability Analyst - up to £50K - Manchester (3 days in office) *** We are currently recruiting for an well known consulting organisation, who are looking for an internal facing Vulnerability Analyst to join their team. This role will form part of a growing team, providing a crucial service to secure … their internal IT Estate. This is a Junior - Mid level position, so we're looking for a minimum of 2+ years of vulnerability management experience. Key responsibilities are as follows: Identification and ongoing management of vulnerabilities within the IT estate. Analysing identified vulnerabilities through infrastructure scans and … penetration testing. They work with Tenable as their VM platform, but experience with any tooling is fine. Prioritisation of vulnerabilities. Stakeholder management, to engage with business and technical stakeholder to effectively mitigate/resolve issues. Participation in ongoing process improvement activities. This is a great opportunity to join a More ❯
Posted:

Security Architects (DV Security Clearance)

Reading, South East
CGI
frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management More ❯
Employment Type: Permanent
Posted:

GRC Lead

slough, south east england, United Kingdom
BGC Group
risk, ensuring compliance with regulatory requirements, and maintaining corporate controls. This role will be primarily responsible for leading efforts related to third-party risk management, client due diligence, awareness training, and regulatory compliance. The ideal candidate will have a strong grasp of cybersecurity threats and hands-on experience. Key … Responsibilities Governance Risk and Compliance Advise project teams, application owners, infrastructure services, and other IT teams on information security controls, such as access management, incident handling, business continuity, system development lifecycle, threat and vulnerability management, and data protection. Identify and manage risks and vulnerabilities, providing strategic mitigation … recommendations. Continuously improve policies and procedures related to controls and operational processes. Develop and deliver precise and timely metrics and reports. Third-Party Risk Management: Conduct risk assessments of new and existing third-party vendors to ensure compliance with company policies and regulatory requirements. This includes reviewing security controls More ❯
Posted:

Security Consultant (Security Operations / SOC)

slough, south east england, United Kingdom
Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Posted:

Security Consultant (Security Operations / SOC)

reading, south east england, United Kingdom
Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Posted:
Vulnerability Management
Berkshire
25th Percentile
£47,500
Median
£50,000
75th Percentile
£52,500