|
1 to 25 of 92 Permanent Vulnerability Management Jobs in the East of England
cambridge, east anglia, United Kingdom Hybrid / WFH Options Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
peterborough, east anglia, United Kingdom Hybrid / WFH Options Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
bedford, east anglia, United Kingdom Hybrid / WFH Options Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
basildon, east anglia, United Kingdom Hybrid / WFH Options Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
chelmsford, east anglia, United Kingdom Hybrid / WFH Options Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
colchester, east anglia, United Kingdom Hybrid / WFH Options Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
ipswich, east anglia, United Kingdom Hybrid / WFH Options Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
norwich, east anglia, United Kingdom Hybrid / WFH Options Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
stevenage, east anglia, United Kingdom Hybrid / WFH Options Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
watford, hertfordshire, east anglia, United Kingdom Hybrid / WFH Options Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
luton, bedfordshire, east anglia, United Kingdom Hybrid / WFH Options Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
hemel hempstead, east anglia, United Kingdom Hybrid / WFH Options Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Luton, England, United Kingdom Hybrid / WFH Options Advanced Resource Managers
with infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerability management Your skillset may include: Proven experience as a Security Architect supporting major infrastructure transformation … with cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation, communication, and stakeholder engagement More ❯
Luton, south east england, United Kingdom Hybrid / WFH Options Advanced Resource Managers
with infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerability management Your skillset may include: Proven experience as a Security Architect supporting major infrastructure transformation … with cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation, communication, and stakeholder engagement More ❯
luton, bedfordshire, east anglia, United Kingdom Hybrid / WFH Options Advanced Resource Managers
with infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerability management Your skillset may include: Proven experience as a Security Architect supporting major infrastructure transformation … with cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation, communication, and stakeholder engagement More ❯
Luton, south west england, United Kingdom Hybrid / WFH Options Advanced Resource Managers
with infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerability management Your skillset may include: Proven experience as a Security Architect supporting major infrastructure transformation … with cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation, communication, and stakeholder engagement More ❯
colchester, east anglia, United Kingdom Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
bedford, east anglia, United Kingdom Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
chelmsford, east anglia, United Kingdom Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
cambridge, east anglia, United Kingdom Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
peterborough, east anglia, United Kingdom Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
stevenage, east anglia, United Kingdom Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
ipswich, east anglia, United Kingdom Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
norwich, east anglia, United Kingdom Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
basildon, east anglia, United Kingdom Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
|
Salary Guide Vulnerability Management the East of England - 10th Percentile
- £22,500
- 25th Percentile
- £36,585
- Median
- £42,085
- 75th Percentile
- £48,729
- 90th Percentile
- £66,625
|