Permanent Vulnerability Scanning Jobs in England

1 to 25 of 126 Permanent Vulnerability Scanning Jobs in England

Lead Devops

London Area, United Kingdom
Tata Consultancy Services
Balancers, network firewalls, SSL/TLS/mTLS, along with AWS Shield for DDoS protection, AWS WAF for web security, VPC segmentation, and automated vulnerability scanning Container Security & Orchestration: Expertise in Docker, ECS, EKS, Kubernetes, implementing security best practices like image vulnerability scanning, Kubernetes RBAC, IAM … SIEM integrations CI/CD Security & Automation: Proficient in Jenkins, Git, GitHub Actions, ensuring secure CI/CD pipelines with artifact encryption, automated security scanning, and DevSecOps best practices Cloud-Based Database Security: Experience managing Amazon RDS, DynamoDB, ElastiCache, enforcing database encryption (KMS), automated backups, fine-grained access controls … Plans, cost forecasting strategies) Threat Intelligence & Compliance (ISO 27001, SOC2, GDPR, NIST frameworks) AWS-native Security Services (Macie for sensitive data discovery, Inspector for vulnerability scanning, GuardDuty for threat detection) Programming & Scripting (proficiency in Python and Shell Scripting for automation, cloud resource management, and infrastructure monitoring) AWS Database More ❯
Posted:

Lead Devops

london, south east england, United Kingdom
Tata Consultancy Services
Balancers, network firewalls, SSL/TLS/mTLS, along with AWS Shield for DDoS protection, AWS WAF for web security, VPC segmentation, and automated vulnerability scanning Container Security & Orchestration: Expertise in Docker, ECS, EKS, Kubernetes, implementing security best practices like image vulnerability scanning, Kubernetes RBAC, IAM … SIEM integrations CI/CD Security & Automation: Proficient in Jenkins, Git, GitHub Actions, ensuring secure CI/CD pipelines with artifact encryption, automated security scanning, and DevSecOps best practices Cloud-Based Database Security: Experience managing Amazon RDS, DynamoDB, ElastiCache, enforcing database encryption (KMS), automated backups, fine-grained access controls … Plans, cost forecasting strategies) Threat Intelligence & Compliance (ISO 27001, SOC2, GDPR, NIST frameworks) AWS-native Security Services (Macie for sensitive data discovery, Inspector for vulnerability scanning, GuardDuty for threat detection) Programming & Scripting (proficiency in Python and Shell Scripting for automation, cloud resource management, and infrastructure monitoring) AWS Database More ❯
Posted:

Lead Devops

slough, south east england, United Kingdom
Tata Consultancy Services
Balancers, network firewalls, SSL/TLS/mTLS, along with AWS Shield for DDoS protection, AWS WAF for web security, VPC segmentation, and automated vulnerability scanning Container Security & Orchestration: Expertise in Docker, ECS, EKS, Kubernetes, implementing security best practices like image vulnerability scanning, Kubernetes RBAC, IAM … SIEM integrations CI/CD Security & Automation: Proficient in Jenkins, Git, GitHub Actions, ensuring secure CI/CD pipelines with artifact encryption, automated security scanning, and DevSecOps best practices Cloud-Based Database Security: Experience managing Amazon RDS, DynamoDB, ElastiCache, enforcing database encryption (KMS), automated backups, fine-grained access controls … Plans, cost forecasting strategies) Threat Intelligence & Compliance (ISO 27001, SOC2, GDPR, NIST frameworks) AWS-native Security Services (Macie for sensitive data discovery, Inspector for vulnerability scanning, GuardDuty for threat detection) Programming & Scripting (proficiency in Python and Shell Scripting for automation, cloud resource management, and infrastructure monitoring) AWS Database More ❯
Posted:

Information Security Analyst

Manchester Area, United Kingdom
Hybrid / WFH Options
James Adams
as part of a wider tech transformation. As part of this growth, we’re looking for an Information Security Analyst (VM) to join their Vulnerability Management team. This role will play a pivotal part in protecting the business by owning the vulnerability scanning and assessment process, coordinating … third-party testing, and helping drive remediation plans. It’s a great opportunity for someone with hands-on technical experience in vulnerability management who’s looking to deepen their expertise in a fast-paced, hybrid environment. Responsibilities: Conducting vulnerability scanning across all business endpoints using class-leading … tools Reviewing and assessing scan results through a risk-based lens Coordinating third-party vulnerability and penetration testing Acting as an escalation point for security issues within the business Liaising with technical and non-technical teams to explain risks and support remediation Contributing to audits and supporting compliance with More ❯
Posted:

Information Security Analyst

warrington, cheshire, north west england, United Kingdom
Hybrid / WFH Options
James Adams
as part of a wider tech transformation. As part of this growth, we’re looking for an Information Security Analyst (VM) to join their Vulnerability Management team. This role will play a pivotal part in protecting the business by owning the vulnerability scanning and assessment process, coordinating … third-party testing, and helping drive remediation plans. It’s a great opportunity for someone with hands-on technical experience in vulnerability management who’s looking to deepen their expertise in a fast-paced, hybrid environment. Responsibilities: Conducting vulnerability scanning across all business endpoints using class-leading … tools Reviewing and assessing scan results through a risk-based lens Coordinating third-party vulnerability and penetration testing Acting as an escalation point for security issues within the business Liaising with technical and non-technical teams to explain risks and support remediation Contributing to audits and supporting compliance with More ❯
Posted:

Information Security Analyst

bolton, greater manchester, north west england, United Kingdom
Hybrid / WFH Options
James Adams
as part of a wider tech transformation. As part of this growth, we’re looking for an Information Security Analyst (VM) to join their Vulnerability Management team. This role will play a pivotal part in protecting the business by owning the vulnerability scanning and assessment process, coordinating … third-party testing, and helping drive remediation plans. It’s a great opportunity for someone with hands-on technical experience in vulnerability management who’s looking to deepen their expertise in a fast-paced, hybrid environment. Responsibilities: Conducting vulnerability scanning across all business endpoints using class-leading … tools Reviewing and assessing scan results through a risk-based lens Coordinating third-party vulnerability and penetration testing Acting as an escalation point for security issues within the business Liaising with technical and non-technical teams to explain risks and support remediation Contributing to audits and supporting compliance with More ❯
Posted:

Senior Information Security Analyst

London
Hybrid / WFH Options
Nexus Jobs Limited
detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA … organization. Participates in change management meetings and provides expert input to ensure security is maintained. Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering. Ability to manage and continuously improve upon vulnerability management program. Ability More ❯
Employment Type: Permanent
Salary: £70,000 - £85,000
Posted:

Information Security Analyst

nottingham, midlands, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

telford, midlands, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

newport, midlands, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

northampton, midlands, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

worcester, midlands, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

birmingham, midlands, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

wolverhampton, midlands, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

shrewsbury, midlands, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

derby, midlands, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

chesterfield, midlands, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

lincoln, midlands, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

west midlands, midlands, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

coventry, midlands, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

leicester, midlands, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

wakefield, yorkshire and the humber, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

colchester, east anglia, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

cambridge, east anglia, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:

Information Security Analyst

stevenage, east anglia, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving More ❯
Posted:
Vulnerability Scanning
England
10th Percentile
£42,300
25th Percentile
£52,500
Median
£70,000
75th Percentile
£98,125
90th Percentile
£120,000