asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced VulnerabilityManagement Engineer to join our Cyber Security team. As a VulnerabilityManagement Engineer, your primary responsibility will be to manage existing … vulnerabilitymanagement-specific tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerabilitymanagement tooling and solutions Implement automation to remove manual processes and increase efficiency Work … with internal remediators to prioritise vulnerabilitymanagement activities Process vulnerability data to provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by More ❯
Cyber VulnerabilityManagement Analyst Fixed Term Contract (Maternity Cover) 18 months FirstBank UK is a globally recognised, top-tier bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business with over … is the oldest African bank in the UK. Due to business requirements, we are now looking to acquire the services of an experienced Cyber VulnerabilityManagement Analyst Please note that this is a hybrid role with 3 days in the office and 2 days working from home. Key … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber VulnerabilityManagement Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The More ❯
We are currently seeking an experienced Qualys Subject Matter Expert (SME) to lead the ongoing customisation, optimisation, and management of our client's Qualys vulnerabilitymanagement platform. This is a critical role focused on improving the organisation's security posture across on-premise, cloud, and hybrid environments. … Responsibilities: Customise Qualys for reporting and real-time data capture across organisational assets and infrastructure. Utilise and optimise Qualys Cloud Connectors for effective cloud vulnerability management. Mature the Qualys platform into a centralised view of vulnerabilitymanagement across environments. Troubleshoot and resolve issues including agent communication, inventory … stakeholder needs. Engage with internal customers to gather requirements, provide recommendations, and drive continuous improvements. Configure and maintain the Qualys platform to support ongoing vulnerability scans, compliance checks, and security assessments. Collaborate with IT and infrastructure teams to ensure seamless integration of Qualys into the broader security ecosystem. Deploy More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Thames Water offices as required Working More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
You will need to login before you can apply for a job. Security Support Engineer, VulnerabilityManagement and Remediation Operations DESCRIPTION Embark on a Mission to Fortify Amazon's Defenses as a Support Engineer with the VulnerabilityManagement & Remediation Operations team! Amazon Security is seeking an … experienced and innovative Support Engineer specialising in cybersecurity to join our VulnerabilityManagement and Remediation Operations (VMRO) team in London, UK. The VMRO team is a global team that is responsible for assessing, detecting, and driving the remediation of vulnerabilities across the Amazon ecosystem. Key job responsibilities - Support … vulnerability detection campaigns by working closely with Campaign Owners to launch and continuously improve the quality of campaigns across Amazon. - Assess and negotiate with customers to drive down security risk by engaging with teams to remediate critical security vulnerabilities in their environments. - Collaborate with builder teams to implement security More ❯
a diverse and complex digital estate. You'll shape the direction of our security operations, optimise the use of key platforms, develop our threat management approach, and drive improvements in our incident response and vulnerabilitymanagement capabilities. You'll also take the lead in developing meaningful KPIs … Operations Centre (SOC), managing a team of analysts, engineers and external partners to ensure effective monitoring, detection, and response to cyber threats. Provide line management and leadership to the SOC team, including performance management, mentoring, and professional development, while fostering a collaborative and high-performing culture aligned with … escalation paths, and workflows. Define and report on KPIs, SLAs, and performance metrics to measure operational effectiveness and support strategic decision-making. Oversee threat management, SIEM optimisation, and vulnerabilitymanagement activities, ensuring tools and workflows are continually tuned for impact. Serve as the main point of contact More ❯
Cyber VulnerabilityManagement Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber VulnerabilityManagement Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/ More ❯
Role Purpose: This is an exciting opportunity to join a dynamic security solutions team in which you will be responsible for the management and delivery of client security programs. As part of a passionate delivery team, you should have a strong passion for IT security and a customer-centric … approach to providing high-quality service to our clients. Solid experience of running Vulnerability Exposure Management programs is essential. Summary: This is an opportunity to work in a fun and challenging environment, using market-leading security testing tools and platforms to provide security testing services to our large … with the development of new service lines offered by the company. Client Security Programs: Design and set up security programs tailored to client requirements. Vulnerability Scans: Conduct network and application vulnerability scans. Validation: Manually verify vulnerabilities identified in scans. Reporting: Write and deliver comprehensive client reports. Client Support More ❯
Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk - ideally from within the banking or … Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational … when required) and have a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust More ❯
Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk - ideally from within the banking or … Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational … when required) and have a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management • Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. • Oversee the adoption of zero-trust More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
James Adams
as part of a wider tech transformation. As part of this growth, we’re looking for an Information Security Analyst (VM) to join their VulnerabilityManagement team. This role will play a pivotal part in protecting the business by owning the vulnerability scanning and assessment process, coordinating … third-party testing, and helping drive remediation plans. It’s a great opportunity for someone with hands-on technical experience in vulnerabilitymanagement who’s looking to deepen their expertise in a fast-paced, hybrid environment. Responsibilities: Conducting vulnerability scanning across all business endpoints using class-leading … tools Reviewing and assessing scan results through a risk-based lens Coordinating third-party vulnerability and penetration testing Acting as an escalation point for security issues within the business Liaising with technical and non-technical teams to explain risks and support remediation Contributing to audits and supporting compliance with More ❯
Buckinghamshire, England, United Kingdom Hybrid / WFH Options
identifi Global Resources
ll thrive in a change-oriented environment, stay ahead of emerging threats through horizon scanning, and push for continuous improvement across key areas like vulnerabilitymanagement, incident response, and SOC assurance. If you don't settle for second best and are passionate about embedding a culture of excellence … is your opportunity to make a meaningful impact. Key Responsibilities Security Operations Oversight: Lead day-to-day security operations including monitoring, threat analysis, and vulnerability management. Provide updates to the Head of Information Security and Executive Security Steering Group. Drive Key Improvements: Lead strategic efforts to enhance vulnerabilitymanagement confidence, improve incident response capability, and increase assurance around SOC operations. Change Leadership: Actively contribute to the implementation of the new Security TOM, championing change, innovation, and security best practice. Risk & Compliance: Collaborate with Privacy, Risk, and Audit teams to ensure compliance with regulatory requirements and internal More ❯
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
Runcorn, England, United Kingdom Hybrid / WFH Options
Swissport
detect, investigate, and address insecure features and malicious activity across Swissport’s networks and infrastructure. Run security controls such as email security gateway and vulnerabilitymanagement systems. As well as contributing to user awareness and training throughout Swissport. Job Responsibilities: Monitoring, investigating, and responding to security alerts, including … and EDR platforms. Managing and fine-tunning email security gateways, reviewing quarantined messages and adjusting rules to reduce false positives. Supporting the organisation’s vulnerabilitymanagement process, from detection through to tracking remediation. Assisting with cyber risk assessments for new software and services. Conducting phishing simulations and analyse … involving security operations, system/network monitoring, or incident response. Familiarity with core information security concepts, such as email security, endpoint detection and response, vulnerabilitymanagement, and SIEM. Understanding of at least one information security framework (e.g., ISO 27001, NIST) and general awareness of regulations such as GDPR. More ❯
a challenging, vastly interesting, and technically diverse role. Key Responsibilities and Tasks Leading shifts throughout 24/7 SOC Service Delivery Providing oversight and management to Junior Analysts Monitoring of Systems for Security Alerts, Intrusions or activity considered to be unauthorised, unexpected or illegal Responding to incidents, utilising a … incidents to Tier 2 Incident Response Teams Review and develop existing security controls in line with a constantly growing technical environment Triage and Review Vulnerability Scanning Reports, feeding results back into technical teams Review Secure Configurations, feeding back into technical teams for remediations of issues Generate recurring service and … develop understanding of security as a discipline Experience (Essential) Previous experience in Security, SOC or related technical field with desired, specific focus on Incident ManagementVulnerabilityManagement Relevant qualification(s) in Cyber Security, or other related technical roles Examples Degree in Cyber Security, Computer Science, Networks etc. More ❯
We have an exciting new role for a proactive and technically capable Security Vulnerability Lead to join our VulnerabilityManagement team on a 1-year fixed-term contract to cover maternity leave. We are seeking a candidate with experience in a similar security vulnerability-focused role … engagement with business units, ensuring a robust security posture for high-value assets. The role requires strong organizational skills and a solid understanding of vulnerabilitymanagement practices, with the ability to communicate effectively with both technical and non-technical stakeholders. Who we are Virgin Media O2 is the … and inclusion into everything we do, supporting you to be your authentic self throughout your application journey. The must-haves Proven experience in a vulnerabilitymanagement-focused role Strong organizational and prioritization skills, especially in fast-paced, high-risk IT/security environments Ability to interpret technical vulnerabilityMore ❯
We have an exciting new role for a proactive and technically capable Security Vulnerability Lead to join our VulnerabilityManagement team on a 1-year fixed-term contract to cover maternity leave. We are seeking a candidate with experience in a similar security vulnerability-focused role … engagement with business units, ensuring a robust security posture for high-value assets. The role requires strong organizational skills and a solid understanding of vulnerabilitymanagement practices, with the ability to communicate effectively with both technical and non-technical stakeholders. Who we are Virgin Media O2 is the … and inclusion into everything we do, supporting you to be your authentic self throughout your application journey. The must-haves Proven experience in a vulnerabilitymanagement-focused role Strong organizational and prioritization skills, especially in fast-paced, high-risk IT/security environments Ability to interpret technical vulnerabilityMore ❯
We have an exciting new role for a proactive and technically capable Security Vulnerability Lead to join our VulnerabilityManagement team on a 1-year fixed-term contract to cover maternity leave. We are seeking a candidate with experience in a similar security vulnerability-focused role … engagement with business units, ensuring a robust security posture for high-value assets. The role requires strong organizational skills and a solid understanding of vulnerabilitymanagement practices, with the ability to communicate effectively with both technical and non-technical stakeholders. Who we are Virgin Media O2 is the … and inclusion into everything we do, supporting you to be your authentic self throughout your application journey. The must-haves Proven experience in a vulnerabilitymanagement-focused role Strong organizational and prioritization skills, especially in fast-paced, high-risk IT/security environments Ability to interpret technical vulnerabilityMore ❯
to safeguard critical business operations by design and default. You will be responsible for security automation, CI/CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI/CD pipeline to enhance development security. Work … secure AWS cloud infrastructure for clients and internal operations. Automate AWS infrastructure builds following CIS hardening standards . Ensure top-tier security configuration, access management, and incident response on cloud platforms. Operational Support & Incident Response: Support business-critical Windows and Linux-based environments. Monitor and respond to security alerts … across Infosec, servers, firewalls, and applications. Conduct continuous monitoring of internal and third-party information security controls. Threat & VulnerabilityManagement: Assess SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) scans. Implement remediation and mitigation strategies in collaboration with development teams. Maintain network security protocols, firewalls More ❯
teams to establish and enforce network access policies, ensuring that only authorized individuals and devices have the correct access privileges. Proactive Security Testing and VulnerabilityManagement Conduct vulnerability assessments and penetration testing to identify and address security weaknesses in mobile network architectures. Develop and enforce security policies … together with system administrators and application owners to resolve discovered vulnerabilities by applying necessary patches or making configuration adjustments. Create and sustain a thorough vulnerabilitymanagement program that includes tracking vulnerabilities, assessing risks, and planning remediation strategies. Engage in network security incident response efforts by providing technical expertise … and mobile network security. Understanding of 3GPP mobile network CORE and RAN architectures and security requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks More ❯
for utilization on scorecards and related to governance reporting across the cybersecurity space related to Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM), and Threat and VulnerabilityManagement (TVM) within the State … Street environment. This role requires an individual with deep knowledge of CIM and TVM, including cyber incident detection, assessment, response, and recovery, Patch Management, and infrastructure penetration testing within a corporate environment. What you will be responsible for As a Reporting and Analytics Analyst you will: Produce regular reporting … governance related to encryption and data loss prevention, or related functions demonstrated through work, military, or education Experience using ticket tracking tools for change management, tracking, and reporting demonstrated through work, military, or education Strong background in cybersecurity, cybersecurity governance, including DLP, KCEM, SDLC, CS, CIM, and TVM Why More ❯
and forums, as well as representing the team where required. Critical Work Support the ongoing and periodic regulatory and compliance responses and engagements. Audit management and coordination. Issue remediation oversight and closure validation. Responding to customer RFIs using standardised formats and frameworks. Quality assurance on library of responses required … Cyber security qualification e.g. CISMP/Apprenticeship (desirable). Demonstrable working knowledge and understanding of key technology and cyber security controls such as Incident Management, Backup & Recovery, Capacity Management, VulnerabilityManagement, Identity & Access Management, Authentication and Authorisation systems, Data Protection, Application Security, Secure Application Development … and standards. Operational risk frameworks. Regulatory compliance. Operational Resilience. Good understanding of data protection controls. Financial Services sector experience. Technology & Cyber Security. Leadership and management experience Not essential but experience will be recognised, greater focus on work experiences and ability to engage and drive initiatives. Personal skills and capabilities More ❯