3 of 3 Permanent Vulnerability Management Jobs in East Yorkshire

Cloud SecOps Lead

Hiring Organisation
Atos
Location
Hull, East Yorkshire, UK
Employment Type
Full-time
teams on remediation steps and ensure alignment with security best practices. Support WebOps activities including deployment and configuration of SIEM and CNAPP tools. Oversee vulnerability management processes and ensure timely remediation. Manage and maintain LogicMonitor for cloud platform monitoring: Create and update logicmodules Configure alert rules and escalation … Azure Policies for security posture Implement regulatory compliance templates Hands-on experience with LogicMonitor and ServiceNow integrations Proven ability to lead incident response and vulnerability remediation efforts Nice-to-Have Skills: Familiarity with multi-cloud environments (AWS, GCP) Experience in coordinating ITHC assessments and managing audit findings Knowledge ...

24/7 SOC Analyst

Hiring Organisation
Areti Group | B CorpTM
Location
Hull, East Yorkshire, UK
Employment Type
Full-time
investigation workflows. Build clear timelines of activity and maintain accurate investigation notes. Escalate complex cases to Senior and Lead Analysts with appropriate context. Review vulnerability management outputs and provide basic prioritisation insight. Hunt & Improve Participate in directed threat hunting activities. Suggest improvements to detections, dashboards, and SOC runbooks. ...

Cyber Security Analyst

Hiring Organisation
Milestone Technologies, Inc
Location
Hull, East Yorkshire, UK
Employment Type
Full-time
responsible for ensuring continuous infrastructure reliability for multiple revenue-generating services. How You Will Make an Impact: Provide support through security operations incident management processes to protect and/or restore service operations as quickly as possible and minimize impact on customers. What You Will Need to Succeed: Minimum … different aspects such as source/destination addresses, usernames, and process names) Demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerability management A sound understanding of TCP/IP and networking concepts Understanding of network design principles with and knowledge of the OSI model. Flexibility ...