asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced VulnerabilityManagement Engineer to join our Cyber Security team. As a VulnerabilityManagement Engineer, your primary responsibility will be to manage existing … vulnerabilitymanagement-specific tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerabilitymanagement tooling and solutions Implement automation to remove manual processes and increase efficiency Work … with internal remediators to prioritise vulnerabilitymanagement activities Process vulnerability data to provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
to take the lead in defending the UK’s critical energy infrastructure from cyber threats? We’re looking for an experienced Cyber Threat Intelligence & VulnerabilityManagement Lead to join our clients dynamic Cyber Security team. This is your chance to make a real impact—shaping and leading the … threat intelligence and vulnerabilitymanagement strategy for one of the UK’s essential energy companies. If you’re passionate about security, thrive on staying ahead of emerging threats, and have a solid background in OT/ICS environments , we want to hear from you. What You’ll Be … Doing: Lead our cyber threat intelligence and vulnerabilitymanagement functions across both IT and OT environments . Monitor and analyse threats specific to industrial control systems and operational technology —from ransomware to nation-state actors. Develop actionable intelligence and provide early warning to security operations and risk teams. More ❯
We are currently seeking an experienced Qualys Subject Matter Expert (SME) to lead the ongoing customisation, optimisation, and management of our client's Qualys vulnerabilitymanagement platform. This is a critical role focused on improving the organisation's security posture across on-premise, cloud, and hybrid environments. … Responsibilities: Customise Qualys for reporting and real-time data capture across organisational assets and infrastructure. Utilise and optimise Qualys Cloud Connectors for effective cloud vulnerability management. Mature the Qualys platform into a centralised view of vulnerabilitymanagement across environments. Troubleshoot and resolve issues including agent communication, inventory … stakeholder needs. Engage with internal customers to gather requirements, provide recommendations, and drive continuous improvements. Configure and maintain the Qualys platform to support ongoing vulnerability scans, compliance checks, and security assessments. Collaborate with IT and infrastructure teams to ensure seamless integration of Qualys into the broader security ecosystem. Deploy More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Thames Water offices as required Working More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
You will need to login before you can apply for a job. Security Support Engineer, VulnerabilityManagement and Remediation Operations DESCRIPTION Embark on a Mission to Fortify Amazon's Defenses as a Support Engineer with the VulnerabilityManagement & Remediation Operations team! Amazon Security is seeking an … experienced and innovative Support Engineer specialising in cybersecurity to join our VulnerabilityManagement and Remediation Operations (VMRO) team in London, UK. The VMRO team is a global team that is responsible for assessing, detecting, and driving the remediation of vulnerabilities across the Amazon ecosystem. Key job responsibilities - Support … vulnerability detection campaigns by working closely with Campaign Owners to launch and continuously improve the quality of campaigns across Amazon. - Assess and negotiate with customers to drive down security risk by engaging with teams to remediate critical security vulnerabilities in their environments. - Collaborate with builder teams to implement security More ❯
a diverse and complex digital estate. You'll shape the direction of our security operations, optimise the use of key platforms, develop our threat management approach, and drive improvements in our incident response and vulnerabilitymanagement capabilities. You'll also take the lead in developing meaningful KPIs … Operations Centre (SOC), managing a team of analysts, engineers and external partners to ensure effective monitoring, detection, and response to cyber threats. Provide line management and leadership to the SOC team, including performance management, mentoring, and professional development, while fostering a collaborative and high-performing culture aligned with … escalation paths, and workflows. Define and report on KPIs, SLAs, and performance metrics to measure operational effectiveness and support strategic decision-making. Oversee threat management, SIEM optimisation, and vulnerabilitymanagement activities, ensuring tools and workflows are continually tuned for impact. Serve as the main point of contact More ❯
Role Purpose: This is an exciting opportunity to join a dynamic security solutions team in which you will be responsible for the management and delivery of client security programs. As part of a passionate delivery team, you should have a strong passion for IT security and a customer-centric … approach to providing high-quality service to our clients. Solid experience of running Vulnerability Exposure Management programs is essential. Summary: This is an opportunity to work in a fun and challenging environment, using market-leading security testing tools and platforms to provide security testing services to our large … with the development of new service lines offered by the company. Client Security Programs: Design and set up security programs tailored to client requirements. Vulnerability Scans: Conduct network and application vulnerability scans. Validation: Manually verify vulnerabilities identified in scans. Reporting: Write and deliver comprehensive client reports. Client Support More ❯
Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk - ideally from within the banking or … Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational … when required) and have a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust More ❯
Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk - ideally from within the banking or … Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational … when required) and have a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management • Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. • Oversee the adoption of zero-trust More ❯
We are seeking a dynamic and detail-oriented Cyber Security Business Analyst to join our clients team for an OT Asset & Vulnerability Project. This pivotal initiative aims to enhance our operational technology infrastructure by improving asset management and vulnerability processes. The project is preparing to enter the … feedback, and driving improvements during the implementation phase. Key Responsibilities Collaborate with stakeholders to define project objectives, scope, and deliverables for the OT Asset & Vulnerability Project. Conduct requirements gathering sessions with users and translate these into detailed functional specifications. Analyze current workflows and identify areas for improvement in asset … and vulnerabilitymanagement processes. Support the pilot phase by documenting outcomes, challenges, and insights to inform process adjustments. Facilitate workshops and feedback sessions to ensure user needs are met and processes are optimized. Develop comprehensive documentation, including user stories, process maps, and reporting templates. Work closely with technical More ❯
Portsmouth, yorkshire and the humber, united kingdom
TalentHawk
We are seeking a dynamic and detail-oriented Cyber Security Business Analyst to join our clients team for an OT Asset & Vulnerability Project. This pivotal initiative aims to enhance our operational technology infrastructure by improving asset management and vulnerability processes. The project is preparing to enter the … feedback, and driving improvements during the implementation phase. Key Responsibilities Collaborate with stakeholders to define project objectives, scope, and deliverables for the OT Asset & Vulnerability Project. Conduct requirements gathering sessions with users and translate these into detailed functional specifications. Analyze current workflows and identify areas for improvement in asset … and vulnerabilitymanagement processes. Support the pilot phase by documenting outcomes, challenges, and insights to inform process adjustments. Facilitate workshops and feedback sessions to ensure user needs are met and processes are optimized. Develop comprehensive documentation, including user stories, process maps, and reporting templates. Work closely with technical More ❯
Buckinghamshire, England, United Kingdom Hybrid / WFH Options
identifi Global Resources
ll thrive in a change-oriented environment, stay ahead of emerging threats through horizon scanning, and push for continuous improvement across key areas like vulnerabilitymanagement, incident response, and SOC assurance. If you don't settle for second best and are passionate about embedding a culture of excellence … is your opportunity to make a meaningful impact. Key Responsibilities Security Operations Oversight: Lead day-to-day security operations including monitoring, threat analysis, and vulnerability management. Provide updates to the Head of Information Security and Executive Security Steering Group. Drive Key Improvements: Lead strategic efforts to enhance vulnerabilitymanagement confidence, improve incident response capability, and increase assurance around SOC operations. Change Leadership: Actively contribute to the implementation of the new Security TOM, championing change, innovation, and security best practice. Risk & Compliance: Collaborate with Privacy, Risk, and Audit teams to ensure compliance with regulatory requirements and internal More ❯
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
Runcorn, England, United Kingdom Hybrid / WFH Options
Swissport
detect, investigate, and address insecure features and malicious activity across Swissport’s networks and infrastructure. Run security controls such as email security gateway and vulnerabilitymanagement systems. As well as contributing to user awareness and training throughout Swissport. Job Responsibilities: Monitoring, investigating, and responding to security alerts, including … and EDR platforms. Managing and fine-tunning email security gateways, reviewing quarantined messages and adjusting rules to reduce false positives. Supporting the organisation’s vulnerabilitymanagement process, from detection through to tracking remediation. Assisting with cyber risk assessments for new software and services. Conducting phishing simulations and analyse … involving security operations, system/network monitoring, or incident response. Familiarity with core information security concepts, such as email security, endpoint detection and response, vulnerabilitymanagement, and SIEM. Understanding of at least one information security framework (e.g., ISO 27001, NIST) and general awareness of regulations such as GDPR. More ❯
We have an exciting new role for a proactive and technically capable Security Vulnerability Lead to join our VulnerabilityManagement team on a 1-year fixed-term contract to cover maternity leave. We are seeking a candidate with experience in a similar security vulnerability-focused role … engagement with business units, ensuring a robust security posture for high-value assets. The role requires strong organizational skills and a solid understanding of vulnerabilitymanagement practices, with the ability to communicate effectively with both technical and non-technical stakeholders. Who we are Virgin Media O2 is the … and inclusion into everything we do, supporting you to be your authentic self throughout your application journey. The must-haves Proven experience in a vulnerabilitymanagement-focused role Strong organizational and prioritization skills, especially in fast-paced, high-risk IT/security environments Ability to interpret technical vulnerabilityMore ❯
We have an exciting new role for a proactive and technically capable Security Vulnerability Lead to join our VulnerabilityManagement team on a 1-year fixed-term contract to cover maternity leave. We are seeking a candidate with experience in a similar security vulnerability-focused role … engagement with business units, ensuring a robust security posture for high-value assets. The role requires strong organizational skills and a solid understanding of vulnerabilitymanagement practices, with the ability to communicate effectively with both technical and non-technical stakeholders. Who we are Virgin Media O2 is the … and inclusion into everything we do, supporting you to be your authentic self throughout your application journey. The must-haves Proven experience in a vulnerabilitymanagement-focused role Strong organizational and prioritization skills, especially in fast-paced, high-risk IT/security environments Ability to interpret technical vulnerabilityMore ❯
We have an exciting new role for a proactive and technically capable Security Vulnerability Lead to join our VulnerabilityManagement team on a 1-year fixed-term contract to cover maternity leave. We are seeking a candidate with experience in a similar security vulnerability-focused role … engagement with business units, ensuring a robust security posture for high-value assets. The role requires strong organizational skills and a solid understanding of vulnerabilitymanagement practices, with the ability to communicate effectively with both technical and non-technical stakeholders. Who we are Virgin Media O2 is the … and inclusion into everything we do, supporting you to be your authentic self throughout your application journey. The must-haves Proven experience in a vulnerabilitymanagement-focused role Strong organizational and prioritization skills, especially in fast-paced, high-risk IT/security environments Ability to interpret technical vulnerabilityMore ❯
to safeguard critical business operations by design and default. You will be responsible for security automation, CI/CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI/CD pipeline to enhance development security. Work … secure AWS cloud infrastructure for clients and internal operations. Automate AWS infrastructure builds following CIS hardening standards . Ensure top-tier security configuration, access management, and incident response on cloud platforms. Operational Support & Incident Response: Support business-critical Windows and Linux-based environments. Monitor and respond to security alerts … across Infosec, servers, firewalls, and applications. Conduct continuous monitoring of internal and third-party information security controls. Threat & VulnerabilityManagement: Assess SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) scans. Implement remediation and mitigation strategies in collaboration with development teams. Maintain network security protocols, firewalls More ❯
teams to establish and enforce network access policies, ensuring that only authorized individuals and devices have the correct access privileges. Proactive Security Testing and VulnerabilityManagement Conduct vulnerability assessments and penetration testing to identify and address security weaknesses in mobile network architectures. Develop and enforce security policies … together with system administrators and application owners to resolve discovered vulnerabilities by applying necessary patches or making configuration adjustments. Create and sustain a thorough vulnerabilitymanagement program that includes tracking vulnerabilities, assessing risks, and planning remediation strategies. Engage in network security incident response efforts by providing technical expertise … and mobile network security. Understanding of 3GPP mobile network CORE and RAN architectures and security requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks More ❯
Albany Beck is looking for an experienced Security Consultant with a strong background in Security Risk Management, GRC, Vulnerability Analysis, and Compliance to join a high-impact programme within a leading global investment bank. This is an exciting opportunity to play a key role in the design and … a Security Consultant, you’ll be working in the client’s security team, contributing to critical workstreams that span governance, risk and compliance (GRC), vulnerabilitymanagement, and security control design. You'll work closely with cross-functional stakeholders including technology, audit, and operations teams to ensure the organisation … and continuous improvement of security governance frameworks and GRC processes. Design and enhance security controls across infrastructure, applications, and cloud environments. Lead or support vulnerability analysis activities, including risk-based prioritisation and remediation tracking. Ensure alignment with global security standards and frameworks (e.g. NIST, ISO 27001, CIS). Partner More ❯
for utilization on scorecards and related to governance reporting across the cybersecurity space related to Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM), and Threat and VulnerabilityManagement (TVM) within the State … Street environment. This role requires an individual with deep knowledge of CIM and TVM, including cyber incident detection, assessment, response, and recovery, Patch Management, and infrastructure penetration testing within a corporate environment. What you will be responsible for As a Reporting and Analytics Analyst you will: Produce regular reporting … governance related to encryption and data loss prevention, or related functions demonstrated through work, military, or education Experience using ticket tracking tools for change management, tracking, and reporting demonstrated through work, military, or education Strong background in cybersecurity, cybersecurity governance, including DLP, KCEM, SDLC, CS, CIM, and TVM Why More ❯
and forums, as well as representing the team where required. Critical Work Support the ongoing and periodic regulatory and compliance responses and engagements. Audit management and coordination. Issue remediation oversight and closure validation. Responding to customer RFIs using standardised formats and frameworks. Quality assurance on library of responses required … Cyber security qualification e.g. CISMP/Apprenticeship (desirable). Demonstrable working knowledge and understanding of key technology and cyber security controls such as Incident Management, Backup & Recovery, Capacity Management, VulnerabilityManagement, Identity & Access Management, Authentication and Authorisation systems, Data Protection, Application Security, Secure Application Development … and standards. Operational risk frameworks. Regulatory compliance. Operational Resilience. Good understanding of data protection controls. Financial Services sector experience. Technology & Cyber Security. Leadership and management experience Not essential but experience will be recognised, greater focus on work experiences and ability to engage and drive initiatives. Personal skills and capabilities More ❯
We are committed to making the world more secure by harnessing a talented, vetted community of security researchers to deliver continuous penetration testing and vulnerabilitymanagement, with actionable results. Synack's PTaaS platform has uncovered more than 71,000 exploitable vulnerabilities to date, protecting a growing list of … with internal teams to determine, develop, and analyze the client's assets, such as: Their digital attack surface and value at risk Their existing vulnerability programs, tools, and methods Their security program, including requirements and goals Work independently and provide technical product expertise to build the appropriate solution for … technical SME expertise to internal stakeholders and the client on their strategic goals and testing requirements Proactively review assessment health to provide technical findings, vulnerability details, and insights to improve overall test quality/outcomes and mitigate risk Assist customers in managing and optimizing their long-term pentesting programs More ❯