Permanent Vulnerability Management Jobs in the East of England

21 of 21 Permanent Vulnerability Management Jobs in the East of England

Vulnerability Analyst

Hatfield, Hertfordshire, South East, United Kingdom
COMPUTACENTER (UK) LIMITED
Life on the team The Vulnerability Governance Analyst role will manage processes to detect, prevent and correct vulnerabilities to devices in a customers environment. The SC-cleared analyst will aim to mitigate business risks arising from both regulatory & security noncompliance. What youll do Integrate with customer and third-party security operations centre reporting as well as integration with security … incident procedures Build, manage and update Vulnerability Lifecycle Management Product Lists (VLMPLs) for all supported customers Responding to and helping to co-ordinate the response to Major Vulnerability incidents Sending out notifications and communications related to security vulnerabilities that affect multiple technologies Creation and ownership of vulnerability incidents providing a Start to Finish level of incident … management Proactive identification of vulnerabilities Provide supporting information on potential impacts and mitigating actions for new threats or vulnerabilities from vendor, threat intelligence and subscriptions Establishing good practice vulnerability treatment throughout the customer estate, this includes implementing policy, hardening, patching and fixes of all supported technology Working closely with technical and non-technical teams to coordinate changes and More ❯
Employment Type: Permanent
Posted:

Security Consultant

Bedford, Bedfordshire, UK
Cyberteam
Secure by Design, RMADs, risk assessments •Cloud Security: Architecture documentation, mapping controls, compliance automation •Cyber Operations in MoD: SOC tool evaluation, SIEM use cases, reporting metrics, tech integration •Cyber Vulnerability Investigations •Identity & Access Management: IAM reviews, privileged access, authentication technology, Zero Trust •Operational Technology (OT) Security: OT risk assessments, vulnerability management Key Strengths •Strong attention to More ❯
Employment Type: Full-time
Posted:

Security Consultant

Colchester, Essex, UK
Cyberteam
Secure by Design, RMADs, risk assessments •Cloud Security: Architecture documentation, mapping controls, compliance automation •Cyber Operations in MoD: SOC tool evaluation, SIEM use cases, reporting metrics, tech integration •Cyber Vulnerability Investigations •Identity & Access Management: IAM reviews, privileged access, authentication technology, Zero Trust •Operational Technology (OT) Security: OT risk assessments, vulnerability management Key Strengths •Strong attention to More ❯
Employment Type: Full-time
Posted:

Security Consultant

Stevenage, Hertfordshire, UK
Cyberteam
Secure by Design, RMADs, risk assessments •Cloud Security: Architecture documentation, mapping controls, compliance automation •Cyber Operations in MoD: SOC tool evaluation, SIEM use cases, reporting metrics, tech integration •Cyber Vulnerability Investigations •Identity & Access Management: IAM reviews, privileged access, authentication technology, Zero Trust •Operational Technology (OT) Security: OT risk assessments, vulnerability management Key Strengths •Strong attention to More ❯
Employment Type: Full-time
Posted:

Security Consultant

Watford, Hertfordshire, UK
Cyberteam
Secure by Design, RMADs, risk assessments •Cloud Security: Architecture documentation, mapping controls, compliance automation •Cyber Operations in MoD: SOC tool evaluation, SIEM use cases, reporting metrics, tech integration •Cyber Vulnerability Investigations •Identity & Access Management: IAM reviews, privileged access, authentication technology, Zero Trust •Operational Technology (OT) Security: OT risk assessments, vulnerability management Key Strengths •Strong attention to More ❯
Employment Type: Full-time
Posted:

Security Consultant

Ipswich, Suffolk, UK
Cyberteam
Secure by Design, RMADs, risk assessments •Cloud Security: Architecture documentation, mapping controls, compliance automation •Cyber Operations in MoD: SOC tool evaluation, SIEM use cases, reporting metrics, tech integration •Cyber Vulnerability Investigations •Identity & Access Management: IAM reviews, privileged access, authentication technology, Zero Trust •Operational Technology (OT) Security: OT risk assessments, vulnerability management Key Strengths •Strong attention to More ❯
Employment Type: Full-time
Posted:

Security Consultant

Peterborough, Cambridgeshire, UK
Cyberteam
Secure by Design, RMADs, risk assessments •Cloud Security: Architecture documentation, mapping controls, compliance automation •Cyber Operations in MoD: SOC tool evaluation, SIEM use cases, reporting metrics, tech integration •Cyber Vulnerability Investigations •Identity & Access Management: IAM reviews, privileged access, authentication technology, Zero Trust •Operational Technology (OT) Security: OT risk assessments, vulnerability management Key Strengths •Strong attention to More ❯
Employment Type: Full-time
Posted:

Security Consultant

Luton, Bedfordshire, UK
Cyberteam
Secure by Design, RMADs, risk assessments •Cloud Security: Architecture documentation, mapping controls, compliance automation •Cyber Operations in MoD: SOC tool evaluation, SIEM use cases, reporting metrics, tech integration •Cyber Vulnerability Investigations •Identity & Access Management: IAM reviews, privileged access, authentication technology, Zero Trust •Operational Technology (OT) Security: OT risk assessments, vulnerability management Key Strengths •Strong attention to More ❯
Employment Type: Full-time
Posted:

Security Consultant

Chelmsford, Essex, UK
Cyberteam
Secure by Design, RMADs, risk assessments •Cloud Security: Architecture documentation, mapping controls, compliance automation •Cyber Operations in MoD: SOC tool evaluation, SIEM use cases, reporting metrics, tech integration •Cyber Vulnerability Investigations •Identity & Access Management: IAM reviews, privileged access, authentication technology, Zero Trust •Operational Technology (OT) Security: OT risk assessments, vulnerability management Key Strengths •Strong attention to More ❯
Employment Type: Full-time
Posted:

Security Consultant

Basildon, Essex, UK
Cyberteam
Secure by Design, RMADs, risk assessments •Cloud Security: Architecture documentation, mapping controls, compliance automation •Cyber Operations in MoD: SOC tool evaluation, SIEM use cases, reporting metrics, tech integration •Cyber Vulnerability Investigations •Identity & Access Management: IAM reviews, privileged access, authentication technology, Zero Trust •Operational Technology (OT) Security: OT risk assessments, vulnerability management Key Strengths •Strong attention to More ❯
Employment Type: Full-time
Posted:

Security Consultant

Norwich, Norfolk, UK
Cyberteam
Secure by Design, RMADs, risk assessments •Cloud Security: Architecture documentation, mapping controls, compliance automation •Cyber Operations in MoD: SOC tool evaluation, SIEM use cases, reporting metrics, tech integration •Cyber Vulnerability Investigations •Identity & Access Management: IAM reviews, privileged access, authentication technology, Zero Trust •Operational Technology (OT) Security: OT risk assessments, vulnerability management Key Strengths •Strong attention to More ❯
Employment Type: Full-time
Posted:

Security Consultant

Cambridge, Cambridgeshire, UK
Cyberteam
Secure by Design, RMADs, risk assessments •Cloud Security: Architecture documentation, mapping controls, compliance automation •Cyber Operations in MoD: SOC tool evaluation, SIEM use cases, reporting metrics, tech integration •Cyber Vulnerability Investigations •Identity & Access Management: IAM reviews, privileged access, authentication technology, Zero Trust •Operational Technology (OT) Security: OT risk assessments, vulnerability management Key Strengths •Strong attention to More ❯
Employment Type: Full-time
Posted:

Security Consultant

Hemel Hempstead, Hertfordshire, UK
Cyberteam
Secure by Design, RMADs, risk assessments •Cloud Security: Architecture documentation, mapping controls, compliance automation •Cyber Operations in MoD: SOC tool evaluation, SIEM use cases, reporting metrics, tech integration •Cyber Vulnerability Investigations •Identity & Access Management: IAM reviews, privileged access, authentication technology, Zero Trust •Operational Technology (OT) Security: OT risk assessments, vulnerability management Key Strengths •Strong attention to More ❯
Employment Type: Full-time
Posted:

IT Service Operations Manager

Stevenage, Hertfordshire, England, United Kingdom
Hybrid / WFH Options
MBDA
Stevenage An exciting opportunity for a passionate Service Operations Manager to join a unique, multi-national Information Management function. Ideal candidates should be committed to the future of IT Operations, outstanding customer service and have the dedication in supporting our community in a dynamic, fast-paced environment. Job Title : Service Operations Manager Salary : Circa £70000 depending on experience Location … the role include leading the continuous delivery of workplace & infrastructure technical operations ensuring effective, reliable and performant operations meeting our evolving business needs. You will oversee and drive forward vulnerability management across our workplace and infrastructure ensuring proactive risk mitigation, compliance with security standards and continuous improvement to safeguard MBDA operations. Become part of a unique, well respected … under pressure, with the ability to quickly resolve escalated issues & problems. Very Good experience of workplace & infrastructure technology & services including compliance, improvement & innovation. Proven leadership and hands on team management skills across diverse disciplines, international teams and including those in supplier partnerships Strong knowledge of data centre/computer room management including capacity, service, incident & asset management More ❯
Employment Type: Full-Time
Salary: £70,000 per annum
Posted:

Cyber Defence Operations Director

Cambridge, Cambridgeshire, United Kingdom
Arm Limited
Job overview: This is an opportunity to lead global Security Operations focused on safeguarding Arm's digital environment through exemplary threat detection, incident response, and vulnerability management capabilities. This senior role, reporting directly into the CISO, is accountable for driving the strategic direction of Arm's Detect & Response function, delivering outstanding performance and ensuring we are resilient against … an evolving threat landscape! In addition to operations, you will lead cyber crisis management, C-Suite level stress testing, team development, and top-level cybersecurity thought leadership. Responsibilities: Own and deliver the strategic roadmap for cyber incident and vulnerability detection & response in line with Arm's threat profile and business objectives. You will guide and develop a high … of enterprise security domains and how they can be used as a force multiplier for a technology business strategy, with the ability to influence at all levels. Extensive people management experience, fostering a culture focused on mentoring, wellbeing, and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant security-related subject. Certifications such More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Solution Architect - DevSecOps

Hatfield, Hertfordshire, United Kingdom
Computacenter AG & Co. oHG
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerability management solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Lead Infrastructure Engineer - Linux

Hemel Hempstead, Hertfordshire, United Kingdom
Sopra Steria Group
controls, including host firewalls, SELinux, and intrusion detection. Knowledge of networking fundamentals, especially from a security perspective. Experience working in highly governed environments with tight SLAs. Skilled in patch management and system update procedures. It would be great if you had: Experience with secure environments and familiarity with JSP 440 and SCIDA requirements. Proficiency in scripting (e.g., Bash, Python … for secure automation. Familiarity with vulnerability management tools such as OpenSCAP and Nessus. Exposure to Red Hat deployment tools and secure system state management. If you are interested in this role but not sure if your skills and experience are exactly what we're looking for, please do apply, we'd love to hear from you! Employment Type More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Lead Infrastructure Engineer - Linux

Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
controls , including host firewalls , SELinux , and intrusion detection. Knowledge of networking fundamentals , especially from a security perspective. Experience working in highly governed environments with tight SLAs. Skilled in patch management and system update procedures. It would be great if you had: Experience with secure environments and familiarity with JSP 440 and SCIDA requirements. Proficiency in scripting (e.g., Bash , Python … for secure automation. Familiarity with vulnerability management tools such as OpenSCAP and Nessus . Exposure to Red Hat deployment tools and secure system state management. If you are interested in this role but not sure if your skills and experience are exactly what were looking for, please do apply, wed love to hear from you! Employment Type: Full More ❯
Employment Type: Permanent
Salary: £70,000
Posted:

Cyber Tooling and Automations specialist

Cambridge, Cambridgeshire, United Kingdom
Jagex Limited
detections to improve efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline operations, including incident response, threat hunting, cyber threat intelligence, and vulnerability management. Collaborate with analysts to identify repetitive tasks and automate them to improve operational efficiency. Work with Threat Intelligence, Incident Response, and Attack Surface Management teams to build More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Tooling and Automations specialist

Cambridge, Cambridgeshire, United Kingdom
Jagex Ltd
to improve the efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to build and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Operations Analyst

Watford, Hertfordshire, United Kingdom
ECS Resource Group Ltd
Server, Active Directory, networking, and cloud services . Support day-to-day operations of Azure IaaS/PaaS , Microsoft 365 , Exchange Online , and related platforms. Administer and improve endpoint management via Intune , SCCM , and Autopilot. Ensure security compliance through MFA , Microsoft Defender , and proactive vulnerability management. Collaborate with internal support teams and third-party vendors to drive service … Azure AD) , and Microsoft 365 services . Experience managing Windows Server environments , Active Directory , GPOs , Hyper-V , and networking (DNS, DHCP, VPN, firewalls) . Skilled in endpoint and device management tools such as Intune , SCCM , and Jamf (for macOS) . Scripting and automation ability (e.g., PowerShell ). Understanding of ITIL principles and familiarity with ITSM platforms like ServiceNow or More ❯
Employment Type: Permanent
Salary: £41000 - £45000/annum
Posted:
Vulnerability Management
the East of England
10th Percentile
£22,500
25th Percentile
£41,280
Median
£42,085
75th Percentile
£44,000
90th Percentile
£66,250