Permanent Vulnerability Management Jobs in England

26 to 50 of 68 Permanent Vulnerability Management Jobs in England

Technical Analyst

West Bromwich, West Midlands, United Kingdom
Hybrid / WFH Options
West Bromwich Building Society
across a range of varied functions, such as M365 Migration, application upgrades and device refreshes. IT Security focused work including patch updates and general vulnerability management The Key Responsibilities Are: Windows 10/11 build automation and image management. Endpoint device set-up and configuration. Hardware and software … and processes are fully followed and advise on IT security related issues. Liaise with 3rd party service providers to resolve problems within agreed timescales. Vulnerability Management to identify and fix Security vulnerabilities. MDM solution administration. Support the Society branch network across 34 locations and our head office functions. … Experience of Windows based administration tools such as Active Directory and Group Policy. Strong troubleshooting, analytical and fault-finding skills Able to automate system management tasks. Excellent communication and interpersonal skills. A strong customer focus. Ability to produce clear and detailed technical documentation. Knowledge of network environments and concepts more »
Employment Type: Permanent, Work From Home
Salary: £35,000
Posted:

Senior Sales Engineer - Vulnerability Management

London, United Kingdom
Confidential
With the recent acquisition of Avalor we are looking for a Senior Sales Engineer with significant experience in Vulnerability Management/Risk to join the team in the UK. Avalor s Data Fabric for Security ingests, normalizes, and unifies data across enterprise security and business systems to deliver … up to 10,000 users. As a Zscaler Senior Sales Engineer, you and your Regional Sales Managers will be responsible for presenting the Zscaler Vulnerability management solution to prospective customers, creating and delivering demonstrations of the products, gathering customer technical requirements, creating evaluation test plans with customers, and … of successful Enterprise Cyber Technical Solutions selling Strong knowledge of the entire Security stack, with deep expertise in VM, SECops, DevSecOps. Strong Background in Vulnerability Management/Risk Strong partner ecosystem - rolodex Ability to successfully manage and run POV's from beginning to end Technical/hands on more »
Posted:

VP of Information Security

London, United Kingdom
Confidential
strategies, ensuring policies are communicated and enforced. This role involves hands-on technical work and collaboration across the enterprise. Key Responsibilities Provide information risk management and security guidance to security teams, internal groups, and development teams. Advise on industry leading practices and internal best practices for secure deployments, security … objectives. Advise operations teams supporting computer security incident response activities related to intrusion detection monitoring, scanning, cyber threat reporting, and development/implementation of vulnerability mitigation strategies. Develop trusted advisor relationships for information risk management and security with key stakeholders and internal groups. Education, Experience, Abilities You will … others) 8+ years of experience in critical security concepts, functions and tools including: Security by Design Network and Infrastructure Security End point security controls Vulnerability management Configuration and compliance management Risk management Policy and standards management Incident handling Application security (WAFs, Static and Dynamic analysis more »
Posted:

Global Head of Cyber Threat

London, United Kingdom
Confidential
to ensure technology teams are aware of threats and become accountable for addressing them within the technologies they manage. Integrate Threat Intelligence to the vulnerability management program to ensure new vulnerabilities are remediated Provide senior stakeholder and board level briefings. Your teams key responsibilities: Monitoring darkweb and other … fits-all solution. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Head of MS UK Security Solutions Sales

London, United Kingdom
Confidential
empowering team to focus on learning; partner and collaborate with other teams. Qualifications Required Qualifications (RQs) 7+ years of technology-related sales or account management experience AND leading sales organization OR Bachelors Degree in Computer Science, Information Technology, Business Administration, or related field AND 6+ years of technology-related … sales or account management experience OR equivalent experience Preferred Qualifications 9+ years of technology-related sales or account management experience OR Bachelors Degree in IT, or related field AND 8+ years of technology-related sales or account management experience OR Masters Degree in Business Administration, IT, or … related field AND 5+ years of technology-related sales or account management experience Experience with competitive Security solutions (e.g. Palo Alto, Splunk, CrowdStrike, etc.) is a plus. 6+ years of solution or services sales experience. Sales Management: Proven history of leading security sales team and driving business growth more »
Posted:

CDAITO Information Security Assistant Manager

London, United Kingdom
Confidential
of the state of information security and cybersecurity and provide periodic reports (at least annually) on the state of information security to/Top management Adopt, implement and update Cybersecurity policies, rules, processes and procedures in line with Head Office regulatory Framework In reporting to the Top Management … the Group model. Work with information owners in business units to determine appropriate security objectives Monitor network activity for malicious activity Monitor and evaluates vulnerability reports, vendor hot-fixes, and vendor patches for applicability to deployed technologies Monitor the process of creating, changing, or removing user access across all … Bachelor's in computer science, Information Technology or related field Master's degree a plus CISSP/CISM certification preferable Experience in application security, vulnerability management Solid background in assuring high level of Information Security management and Business Continuity management in an organization I.T./Info more »
Posted:

Principal Security Engineer

London, United Kingdom
Hybrid / WFH Options
Confidential
and access policies appropriate to the security needs of the business Provide security guidance and drive infrastructure decisions in collaboration with other technical and management teams, ensuring Security principles are being upheld. Advanced knowledge of layer 7 firewall technologies and capabilities (e.g., Application awareness, user identities, advanced threat detection … etc.) Provides vulnerability assessment of cloud assets, delivers remediation recommendations, and provides knowledgeable assistance in resolving identified vulnerabilities. Develop and implement security measures, policies, and procedures to protect systems and networks against unauthorized access, data breaches, and other security incidents. Monitor and analyse security logs and events, and respond … Cyber Principles, ISO27001, SoC, NIST, PCI, and GDPR. Hands-on experience with security technologies, SIEM , IDS/IPS, EDR, NDR, network forensics, antivirus, and vulnerability scanning tools. (preferably Crowdstrike Falcon, Wiz, Datadog) Up-to-date understanding of testing the security of software and infrastructure using appropriate security tools including more »
Posted:

Head of Information Security Operations - Contract - URGENT - Reading/Thames Valley/Oxford

Reading, Berkshire, United Kingdom
Confidential
the confidentiality, integrity, and availability of information systems are maintained to protect customer, corporate, and third-party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC partners. This is a hybrid position with … required on site each week. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are … is maintained and in line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes, and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Experience Minimum 5+ years commercial experience more »
Posted:

IT Security Solutions Architect

London, United Kingdom
Confidential
interpersonal skills, with the ability to effectively collaborate with cross-functional teams. Experience with security tools and technologies such as firewalls, SIEM , DLP, Identity Management and encryption solutions. A variety of career development tools, resources and opportunities The chance to work on some of the most challenging, relevant issues … of our company. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Senior Cyber Detection Engineer – Cloud Technical Lead

London, United Kingdom
Confidential
requesting an accommodation. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Information Security Manager

London, United Kingdom
Hybrid / WFH Options
Confidential
compliance with key data and security policies. Expertise in planning and delivering roadmaps, contributing to our cloud security strategy Good understanding of security risk management in a cloud security context, and of cloud security principles Knowledge of multiple regulatory requirements e.g UK GDPR, CCPA Expertise in security and compliance … Architecture Knowledge of Infrastructure as Code Knowledge of Azure, Google, AWS, and Kubernetes cloud native services Securing GitOps and Continuous Deployment Identity and Access Management, including securing privileged access Relevant certifications such as SABSA, CISSP, CCSK, AZ 500, GIAC, CISM, ISO Lead Auditor/Implementer, CISLA, CISMP, Security + … to light subsequently. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Senior Security Consultant(P2PE Application and SSF Assessor)

London, United Kingdom
Hybrid / WFH Options
Confidential
industry best practices for systems hardening. Expertise in data encryption and data privacy. Proficiency in incident response, business continuity planning, physical security, risk assessments, vulnerability scanning, and penetration testing report reviews. Standards and Best Practices: Solid understanding of industry standards such as PCI DSS, CIS, ISO27001, and NIST. Client … independently lead client engagements or collaborate with a team, including scoping, planning, governance review, onsite assessment activities, status reporting, report writing, and client resource management, with support from our project management team. Certifications: At least one Information Security certification from the following is a must: PCI P2PE or … industry leading certifications. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Information Security Service Manager

London, United Kingdom
Hybrid / WFH Options
Confidential
experience, skills and knowledge Essential Information Security Expertise : Must have experience in managing security services in a cloud -first environment. Security Principles and Risk Management : Must possess a solid understanding of information security principles and risk management practices. The ability to apply these concepts effectively in real-world … strong communication skills and the ability to explain complex security issues to a wide range of audiences, helping to align technical teams and senior management on security priorities and strategies. Analytical and Detail-Oriented : The role requires an analytical mindset and an eye for detail while maintaining an overall … happy to accommodate. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Information Security Manager UKI

London, United Kingdom
Hybrid / WFH Options
Confidential
policy. As Information Security Manager UKI you contribute directly to BAM s objectives by strengthening the design and effectiveness of the BAM Information Security Management Framework.You will support Divisional management, Segments and underlying projects within UKI with the implementation and compliance with the required information security policies. You … Your mission Managing the UKI information security agenda in line with the Group Security agenda, including reporting to key stakeholders Managing the Information Security Management System (ISMS) within UKI as part of the ISO27001 certification and Cyber Essentials requirements Identifying emerging data and information security risks and trends and … information security incidents and closure of identified remedial action as required Perform periodic internal control assessments regarding information security (via the BRIC tool). Management of the UK Information Security Project Manager Deliver Security Standards within the organisation and on projects, including certifications (ISO27001 and Cyber Essentials) Implementation of more »
Posted:

Senior Cybersecurity Technical Delivery Manager

London, United Kingdom
Confidential
inspired is expected and making a meaningful impact is rewarded. EDUCATION Degree or equivalent work experience equally preferable. Degree in information technology, cybersecurity, risk management, business administration, or related field Master's degreeCERTIFICATIONS Certified Information Systems Security Professional (CISSP) certificationWORK EXPERIENCE Experience in IT security and risk management … firm's executive leadership and risk committees Drive complex, firm-wide initiatives towards successful completion and develop reports to communicate the progress to senior management, risk committees, and board of directors Understand current cybersecurity strategy and help evolve it on a continuous basis through targeted initiatives Collaborate with stakeholders … cause analysis, cost/benefits, feasibility analysis and research of sound industry practices Drive progress in executing the overall cyber strategy through analysis, stakeholder management, leadership communication, and provide recommendations on how to execute strategic goals including: Partnering with stakeholders to monitor and achieve annual targets Identifying and driving more »
Posted:

Information Security Manager

London, United Kingdom
Confidential
capability to ensure our services are delivered effectively and in line with Sainsbury s future ways of working. What you need to do Line management of a small team of colleagues. Assuring that security controls are met in conjunction with our Product Assurance Framework through the product lifecycle. Articulating … scoped and vulnerabilities are remediated in line with SLA. Work with business and external suppliers. Track and manage the delivery of actions for example vulnerability mitigation for business owned & managed products. What you need to know and show Demonstrative experience of providing InfoSec consultancy to business teams who are … Confidentiality, Integrity and Availability are adhered to. Understanding of Data and Cyber related risks in a complex organisation (including regulatory requirements) Experience of people management of small teams including setting team strategy. Ability to motivate a small team of individuals to be high performers, celebrate success and help develop more »
Posted:

Regional Intelligence Manager, Compliance, Safety and Risk Management

London, United Kingdom
Confidential
Regional Intelligence Manager, Compliance, Safety and Risk Management Google Google s mission is to organize the world's information and make it universally accessible and useful. View company page Bachelor's degree or equivalent practical experience. Candidates will typically have 7 years of experience developing and deploying processes to … of our offices. You're an expert who shares our seriousness about security and our commitment to confidentiality. You'll collaborate with our Facilities Management team to create innovative security strategies, investigate breaches and create risk assessment plans for the future. You believe that providing effective security doesn't … bodyguard (and our long lost pal). The Threat Analysis and Crisis Services (TACS) team within Google Data Center's Compliance, Safety, and Risk Management (CSRM) organization, provides 24x7 threat monitoring, intelligence analysis and crisis reporting of potential threats to Technical Infrastructure s personnel, operations, assets, and supply chain more »
Posted:

Information Security Manager

London, United Kingdom
Confidential
ongoing security of products delivered by engineering teams Managing the security portfolio of technology products including Single Sign On, Data Loss Prevention, AntiVirus, and vulnerability management Keeping a finger on the pulse of current threats from a variety of sources to highlight those that pose a risk to more »
Posted:

VP - Information Security

London, United Kingdom
Confidential
and implementing operational policies and standards. Demonstrable experience in a variety of areas such as cloud security, IAM, 3rd party risk, threat assessments and vulnerability management. Strong knowledge of cyber security architecture. Relevant certifications would be beneficial (e.g. TOGAF, SABSA). Ability to interact with and challenge technical teams more »
Posted:

Senior Technical Consultant

London, United Kingdom
Hybrid / WFH Options
Confidential
health to tackle today s social and environmental challenges. Established in 2002, the business provides a range of consultancy and outsourcing capabilities including programme management, market design and governance. We also have extensive and award winning capabilities across cyber security, data privacy and digital transformation. We are a B … Corp, IIP Gold accredited and a Financial Times Leading Management Consultancy for 2021 and 2022. Our purpose is to make things that matter work better for everyone. The nature of what we do means we are very much a people business. The contribution every member of the team makes … are looking for a Senior Consultant to join us who has good knowledge of the smart metering regulatory arrangements and excellent communication and stakeholder management skills. The Role In your role as Senior Technical Consultant, you will be working in a dedicated team whose responsibility is, via the relevant more »
Posted:

Information Security Manager

London, United Kingdom
Hybrid / WFH Options
Confidential
role within InfoSec, with your reach and activity enabling security as a principal consideration across INSTANDA. Responsibilities will include: Overseeing the INSTANDA information security management system (ISMS) including the implementation and maintenance of the ISMS across the business; Be a key member of the ISO27001 Steering Committee; Engage with … InfoSec guidance to Project Managers; Account Managers and individuals who are looking to work with external firms to drive INSTANDA business operations forward. Stakeholder Management: your ability to influence and educate others on InfoSec principals and best practice is fundamental to this role. You ll be engaging laterally and … not contact us. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Global Head of Technical Cyber Incident Response

London, United Kingdom
Confidential
fits-all solution. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Senior Software Engineer (Threat Intelligence)

London, United Kingdom
Confidential
career with us! Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Solution Architect

London, United Kingdom
Confidential
INS-PI. Project will be operated in an Agile approach. Project to be implemented by March 2024 with then a year of remedial activity (vulnerability management in line with March 2025 deadline). Required they need to convert our language to SNOW solution - how it will be integrated more »
Posted:

Senior Security Service Analyst

Stanmore, England, United Kingdom
Hybrid / WFH Options
Sky
What you'll bring Previous experience in Cyber Security/Information Security. Previous experience in analytical/technical role. Working Knowledge of Source Code Management systems, e.g. GitHub. Knowledge of the vulnerability management process. The ability to manage and build relationships with different stakeholders. Excellent verbal and more »
Posted:
Vulnerability Management
England
10th Percentile
£40,000
25th Percentile
£51,000
Median
£65,000
75th Percentile
£88,750
90th Percentile
£97,250