Permanent Vulnerability Scanning Jobs in England

1 to 25 of 114 Permanent Vulnerability Scanning Jobs in England

Information Security Engineer - Vulnerability Management

London, United Kingdom
Hybrid / WFH Options
Starling Bank Limited
asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability … active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process … vulnerability data to provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Software Engineer - Vulnerability Management

London, United Kingdom
Hybrid / WFH Options
Starling Bank
asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability … active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process … vulnerability data to provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SOC Analyst

Farnborough, Hampshire, United Kingdom
Sixworks
incidents to Tier 2 Incident Response Teams Review and develop existing security controls in line with a constantly growing technical environment Triage and Review Vulnerability Scanning Reports, feeding results back into technical teams Review Secure Configurations, feeding back into technical teams for remediations of issues Generate recurring service … understanding of security as a discipline Experience (Essential) Previous experience in Security, SOC or related technical field with desired, specific focus on Incident Management Vulnerability Management Relevant qualification(s) in Cyber Security, or other related technical roles Examples Degree in Cyber Security, Computer Science, Networks etc. Professional Qualifications from … organisations such as CompTIA, ISACA etc. Technical qualifications in security and technology such as (but not limited to) cloud computing, SIEM, Vulnerability Scanning/Management etc. Understanding of some (or all) of the following: Key Concepts of Cloud Computing Security Incident Management Risk Management Information Security (CIA) Phishing More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Lead DevOps Engineer

London, United Kingdom
Hybrid / WFH Options
QiH Group
tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as key management, vulnerability scanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the continuous integration … In-depth knowledge of DevSecOps tools such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerability scanning, encryption, authentication, and secrets management (Vault, Key Management Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Information Security Analyst

London
Hybrid / WFH Options
Nexus Jobs Limited
detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA … organization. Participates in change management meetings and provides expert input to ensure security is maintained. Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering. Ability to manage and continuously improve upon vulnerability management program. Ability More ❯
Employment Type: Permanent
Salary: £70,000 - £85,000
Posted:

Senior Cyber Security Manager (England)

Northamptonshire, UK
OptumUK
experience of leading of leading Cyber Security Operations teams. In this role you will be responsible for delivering robust threat detection and response capabilities, vulnerability management scanning, and configuration of core security tooling. You will also be expected to ensure the alignment to industry standards such as ISO … matrix management structure. You will also have strong technical knowledge of security technologies and processes related to EDR, NDR, web proxies, SIEM, SOAR, and vulnerability scanning platforms. We want you to be able to have a growth mindset, take ownership and accountability for what you are doing, be … In-depth understanding of ISO 27001, NIST CSF, and CIS Controls frameworks, and experience applying them in an operational context. Hands on experience with vulnerability management, major incident handling, and threat hunting. Relevant certifications such as CISSP, CISM or equivalent. Ability to assess technical reports and develop remediation solutions. More ❯
Posted:

Senior Cyber Security Manager

England, United Kingdom
OptumUK
experience of leading of leading Cyber Security Operations teams. In this role you will be responsible for delivering robust threat detection and response capabilities, vulnerability management scanning, and configuration of core security tooling. You will also be expected to ensure the alignment to industry standards such as ISO … matrix management structure. You will also have strong technical knowledge of security technologies and processes related to EDR, NDR, web proxies, SIEM, SOAR, and vulnerability scanning platforms. We want you to be able to have a growth mindset, take ownership and accountability for what you are doing, be … In-depth understanding of ISO 27001, NIST CSF, and CIS Controls frameworks, and experience applying them in an operational context. Hands on experience with vulnerability management, major incident handling, and threat hunting. Relevant certifications such as CISSP, CISM or equivalent. Ability to assess technical reports and develop remediation solutions. More ❯
Posted:

Cloud Security Engineer

London, United Kingdom
Kurt Geiger
and least-privilege enforcement across Microsoft Entra and AWS IAM. Support incident response processes including investigation, containment, eradication, and recovery of security events. Conduct vulnerability scanning and remediation follow-ups using tools. Develop and maintain security baselines, configuration hardening, and patch compliance reporting across endpoints and cloud systems. … reporting using PowerShell or Python. Working knowledge of network security protocols, VPNs, firewalls, and web filtering tools. Understanding of patch management, application control, and vulnerability remediation. Desirable Qualifications Certifications such as CISSP, CISM, Security+, AWS Security Specialty, AZ-500, or MS-500 . Experience working in or with a More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Information Security Consultant

Yorkshire, United Kingdom
Headway Recruitment
Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance … Solutions including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerability scanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Information Security Consultant

LS18 4GH, Rodley, West Yorkshire, United Kingdom
Headway Recruitment
Alerts – Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and refine disaster recovery plans to enhance business resilience. Compliance … Solutions – including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerability scanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location More ❯
Employment Type: Permanent
Posted:

Digital Solutions - Lead InfoSec Consultant

London, United Kingdom
CACI Ltd
of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security … in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & Vulnerability Assessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including demonstrating … date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerability management program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work with stakeholders to develop mitigation strategies. Conduct regular security More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Information Security Analyst

London, United Kingdom
Hybrid / WFH Options
Onyx-Conseil
cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, data leakage prevention, patching, encryption, vulnerability scanning, and configuration of security tools. Prior experience in an international enterprise environment is essential. Responsibilities Collaborate with IT teams to design and … Develop, test, and implement disaster recovery procedures. Manage cybersecurity projects to ensure timely delivery within budget. Perform or coordinate security assessments, penetration tests, and vulnerability scans. Ensure compliance with frameworks like COBIT, NIST, ISO, PCI, GDPR, HIPAA, etc. Provide internal support for security issues within SLAs. Evaluate and implement More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Operations Lead

dunfermline, north east scotland, united kingdom
Hybrid / WFH Options
Venesky Brown
aware of the current cyber threat landscape and industry best practices and standards. - Lead on improvement to coverage and depth of security monitoring and vulnerability scanning - Design vulnerability data gathering and prioritisation procedures - Act as technical escalation point for analysts on significant incidents, investigations, including hands on … data in support of them - Own completion and accuracy of all SecOps-related product delivery evidence Essential Skills: - Security monitoring service delivery and improvement - Vulnerability detection service improvement, finding prioritisation and reporting. - Ability to communicate on technical issues with users and senior managers - Recent experience in incident response - Ability More ❯
Posted:

Cloud Security Engineer

York, Yorkshire, United Kingdom
Darkshield Technologies Ltd
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and … Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerability scanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Lead Security Consultant (Architect)

London, United Kingdom
Applicable Limited
regulations, identifying potential compliance issues and contributing to mitigation strategies. Technology Evaluation, Deployment, and Management: Conduct security architecture reviews and perform security assessments, including vulnerability scanning, configuration reviews, and cloud security posture assessments, identifying vulnerabilities and recommending detailed remediation strategies. Contribute to the development of security architecture roadmaps More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Specialist (Manchester Area)

Manchester, UK
SearchWorks
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 Information … NIST Framework, OWASP top ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to More ❯
Posted:

Cyber Security Specialist

Manchester Area, United Kingdom
SearchWorks
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 Information … NIST Framework, OWASP top ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to More ❯
Posted:

Cyber Security Specialist

warrington, cheshire, north west england, united kingdom
SearchWorks
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 Information … NIST Framework, OWASP top ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to More ❯
Posted:

Cyber Security Specialist

bolton, greater manchester, north west england, united kingdom
SearchWorks
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 Information … NIST Framework, OWASP top ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to More ❯
Posted:

Cyber Security Engineer

Leeds, West Yorkshire, United Kingdom
Elevate Technology Group Ltd
Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess … Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Employment Type: Permanent
Salary: £55000 - £70000/annum
Posted:

Information Security Engineer Engineering Team Bristol Office

Bristol, United Kingdom
Hybrid / WFH Options
Duel
Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerability scanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development process. Assist in … security compliance frameworks such as ISO 27001 or SOC 2, even if not previously responsible for certification processes. Experience working within security risk management, vulnerability tracking, or operational security efforts. Prior experience working with engineering teams on security topics is beneficial, particularly around secure development practices. Ability to clearly … or Vanta. Experience working with pen testing and bug bounties a plus. Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerability management solutions. Experience or knowledge of cloud security (AWS, GCP, or Azure). Awareness of security best practices in application and infrastructure security. Some More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Consultant

dunfermline, north east scotland, united kingdom
ASA RECRUITMENT
architects to shape tooling, processes, and strategic security operations. Key Responsibilities: Lead day-to-day SecOps activities and act as technical escalation. Improve detection, vulnerability scanning, and response processes. Design KPIs, dashboards, and threat monitoring rules. Oversee handovers from new digital services into live operations. Mentor analysts and … support continual service improvement. Tech Environment: M365 Defender, Sentinel, firewalls, WAFs, Defender for Cloud Vulnerability tools (e.g. Qualys), SAST/DAST, configuration scanning Azure, AD, Intune, SCCM, Power Platform, MS Dynamics Detection engineering: log ingestion, rule tuning, threat hunting Requirements: Strong SecOps leadership with hands-on IR experience … Skilled in vulnerability management and threat detection Clear communicator across technical and business levels Experience in public sector or enterprise environments Desirable: Microsoft/SANS certifications, experience with Qualys/Fortinet/Power Platform 📩 Apply now to be considered or reach out for more details. More ❯
Posted:

Security Engineer (East Midlands)

East Midlands, UK
Osmii
articulating complex information clearly. Self-starting, detail-oriented, and adept at task management. Ability to translate complex vulnerabilities into deployable security remediations. Experience with; Vulnerability detection and scanning. Vulnerability remediation across both cloud and on-premises infrastructure. Understanding complex technical issues and managing them within a fast-paced … Demonstrates Knowledge Of: Data collection and correlation from on-premise and cloud infrastructure into SIEM platforms. Expertise in a range of security products, including Vulnerability scanning, firewalls, networks, URL Filtering, EDR platforms, DLP, Auditing, and controls. Holds These Qualifications: A Computer Science/IT/Business/Technology More ❯
Posted:

Security Engineer (East Midlands)

Devon, UK
Osmii
articulating complex information clearly. Self-starting, detail-oriented, and adept at task management. Ability to translate complex vulnerabilities into deployable security remediations. Experience with; Vulnerability detection and scanning. Vulnerability remediation across both cloud and on-premises infrastructure. Understanding complex technical issues and managing them within a fast-paced … Demonstrates Knowledge Of: Data collection and correlation from on-premise and cloud infrastructure into SIEM platforms. Expertise in a range of security products, including Vulnerability scanning, firewalls, networks, URL Filtering, EDR platforms, DLP, Auditing, and controls. Holds These Qualifications: A Computer Science/IT/Business/Technology More ❯
Posted:

Security Engineer

East Midlands, England, United Kingdom
Osmii
articulating complex information clearly. Self-starting, detail-oriented, and adept at task management. Ability to translate complex vulnerabilities into deployable security remediations. Experience with; Vulnerability detection and scanning. Vulnerability remediation across both cloud and on-premises infrastructure. Understanding complex technical issues and managing them within a fast-paced … Demonstrates Knowledge Of: Data collection and correlation from on-premise and cloud infrastructure into SIEM platforms. Expertise in a range of security products, including Vulnerability scanning, firewalls, networks, URL Filtering, EDR platforms, DLP, Auditing, and controls. Holds These Qualifications: A Computer Science/IT/Business/Technology More ❯
Posted:
Vulnerability Scanning
England
10th Percentile
£41,925
25th Percentile
£52,500
Median
£70,000
75th Percentile
£103,438
90th Percentile
£120,000