asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability … active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process … vulnerability data to provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and More ❯
asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability … active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process … vulnerability data to provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and More ❯
incidents to Tier 2 Incident Response Teams Review and develop existing security controls in line with a constantly growing technical environment Triage and Review VulnerabilityScanning Reports, feeding results back into technical teams Review Secure Configurations, feeding back into technical teams for remediations of issues Generate recurring service … understanding of security as a discipline Experience (Essential) Previous experience in Security, SOC or related technical field with desired, specific focus on Incident Management Vulnerability Management Relevant qualification(s) in Cyber Security, or other related technical roles Examples Degree in Cyber Security, Computer Science, Networks etc. Professional Qualifications from … organisations such as CompTIA, ISACA etc. Technical qualifications in security and technology such as (but not limited to) cloud computing, SIEM, VulnerabilityScanning/Management etc. Understanding of some (or all) of the following: Key Concepts of Cloud Computing Security Incident Management Risk Management Information Security (CIA) Phishing More ❯
tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as key management, vulnerabilityscanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the continuous integration … In-depth knowledge of DevSecOps tools such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerabilityscanning, encryption, authentication, and secrets management (Vault, Key Management Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat More ❯
detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerabilityscanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA … organization. Participates in change management meetings and provides expert input to ensure security is maintained. Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering. Ability to manage and continuously improve upon vulnerability management program. Ability More ❯
experience of leading of leading Cyber Security Operations teams. In this role you will be responsible for delivering robust threat detection and response capabilities, vulnerability management scanning, and configuration of core security tooling. You will also be expected to ensure the alignment to industry standards such as ISO … matrix management structure. You will also have strong technical knowledge of security technologies and processes related to EDR, NDR, web proxies, SIEM, SOAR, and vulnerabilityscanning platforms. We want you to be able to have a growth mindset, take ownership and accountability for what you are doing, be … In-depth understanding of ISO 27001, NIST CSF, and CIS Controls frameworks, and experience applying them in an operational context. Hands on experience with vulnerability management, major incident handling, and threat hunting. Relevant certifications such as CISSP, CISM or equivalent. Ability to assess technical reports and develop remediation solutions. More ❯
experience of leading of leading Cyber Security Operations teams. In this role you will be responsible for delivering robust threat detection and response capabilities, vulnerability management scanning, and configuration of core security tooling. You will also be expected to ensure the alignment to industry standards such as ISO … matrix management structure. You will also have strong technical knowledge of security technologies and processes related to EDR, NDR, web proxies, SIEM, SOAR, and vulnerabilityscanning platforms. We want you to be able to have a growth mindset, take ownership and accountability for what you are doing, be … In-depth understanding of ISO 27001, NIST CSF, and CIS Controls frameworks, and experience applying them in an operational context. Hands on experience with vulnerability management, major incident handling, and threat hunting. Relevant certifications such as CISSP, CISM or equivalent. Ability to assess technical reports and develop remediation solutions. More ❯
and least-privilege enforcement across Microsoft Entra and AWS IAM. Support incident response processes including investigation, containment, eradication, and recovery of security events. Conduct vulnerabilityscanning and remediation follow-ups using tools. Develop and maintain security baselines, configuration hardening, and patch compliance reporting across endpoints and cloud systems. … reporting using PowerShell or Python. Working knowledge of network security protocols, VPNs, firewalls, and web filtering tools. Understanding of patch management, application control, and vulnerability remediation. Desirable Qualifications Certifications such as CISSP, CISM, Security+, AWS Security Specialty, AZ-500, or MS-500 . Experience working in or with a More ❯
Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance … Solutions including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerabilityscanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location More ❯
Alerts – Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and refine disaster recovery plans to enhance business resilience. Compliance … Solutions – including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerabilityscanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location More ❯
of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security … in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & Vulnerability Assessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including demonstrating … date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerability management program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work with stakeholders to develop mitigation strategies. Conduct regular security More ❯
cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, data leakage prevention, patching, encryption, vulnerabilityscanning, and configuration of security tools. Prior experience in an international enterprise environment is essential. Responsibilities Collaborate with IT teams to design and … Develop, test, and implement disaster recovery procedures. Manage cybersecurity projects to ensure timely delivery within budget. Perform or coordinate security assessments, penetration tests, and vulnerability scans. Ensure compliance with frameworks like COBIT, NIST, ISO, PCI, GDPR, HIPAA, etc. Provide internal support for security issues within SLAs. Evaluate and implement More ❯
dunfermline, north east scotland, united kingdom Hybrid / WFH Options
Venesky Brown
aware of the current cyber threat landscape and industry best practices and standards. - Lead on improvement to coverage and depth of security monitoring and vulnerabilityscanning - Design vulnerability data gathering and prioritisation procedures - Act as technical escalation point for analysts on significant incidents, investigations, including hands on … data in support of them - Own completion and accuracy of all SecOps-related product delivery evidence Essential Skills: - Security monitoring service delivery and improvement - Vulnerability detection service improvement, finding prioritisation and reporting. - Ability to communicate on technical issues with users and senior managers - Recent experience in incident response - Ability More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and … Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerabilityscanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers More ❯
regulations, identifying potential compliance issues and contributing to mitigation strategies. Technology Evaluation, Deployment, and Management: Conduct security architecture reviews and perform security assessments, including vulnerabilityscanning, configuration reviews, and cloud security posture assessments, identifying vulnerabilities and recommending detailed remediation strategies. Contribute to the development of security architecture roadmaps More ❯
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 Information … NIST Framework, OWASP top ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerabilityscanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to More ❯
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 Information … NIST Framework, OWASP top ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerabilityscanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to More ❯
warrington, cheshire, north west england, united kingdom
SearchWorks
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 Information … NIST Framework, OWASP top ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerabilityscanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to More ❯
bolton, greater manchester, north west england, united kingdom
SearchWorks
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 Information … NIST Framework, OWASP top ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerabilityscanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to More ❯
Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess … Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerabilityscanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development process. Assist in … security compliance frameworks such as ISO 27001 or SOC 2, even if not previously responsible for certification processes. Experience working within security risk management, vulnerability tracking, or operational security efforts. Prior experience working with engineering teams on security topics is beneficial, particularly around secure development practices. Ability to clearly … or Vanta. Experience working with pen testing and bug bounties a plus. Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerability management solutions. Experience or knowledge of cloud security (AWS, GCP, or Azure). Awareness of security best practices in application and infrastructure security. Some More ❯
architects to shape tooling, processes, and strategic security operations. Key Responsibilities: Lead day-to-day SecOps activities and act as technical escalation. Improve detection, vulnerabilityscanning, and response processes. Design KPIs, dashboards, and threat monitoring rules. Oversee handovers from new digital services into live operations. Mentor analysts and … support continual service improvement. Tech Environment: M365 Defender, Sentinel, firewalls, WAFs, Defender for Cloud Vulnerability tools (e.g. Qualys), SAST/DAST, configuration scanning Azure, AD, Intune, SCCM, Power Platform, MS Dynamics Detection engineering: log ingestion, rule tuning, threat hunting Requirements: Strong SecOps leadership with hands-on IR experience … Skilled in vulnerability management and threat detection Clear communicator across technical and business levels Experience in public sector or enterprise environments Desirable: Microsoft/SANS certifications, experience with Qualys/Fortinet/Power Platform 📩 Apply now to be considered or reach out for more details. More ❯
articulating complex information clearly. Self-starting, detail-oriented, and adept at task management. Ability to translate complex vulnerabilities into deployable security remediations. Experience with; Vulnerability detection and scanning. Vulnerability remediation across both cloud and on-premises infrastructure. Understanding complex technical issues and managing them within a fast-paced … Demonstrates Knowledge Of: Data collection and correlation from on-premise and cloud infrastructure into SIEM platforms. Expertise in a range of security products, including Vulnerabilityscanning, firewalls, networks, URL Filtering, EDR platforms, DLP, Auditing, and controls. Holds These Qualifications: A Computer Science/IT/Business/Technology More ❯
articulating complex information clearly. Self-starting, detail-oriented, and adept at task management. Ability to translate complex vulnerabilities into deployable security remediations. Experience with; Vulnerability detection and scanning. Vulnerability remediation across both cloud and on-premises infrastructure. Understanding complex technical issues and managing them within a fast-paced … Demonstrates Knowledge Of: Data collection and correlation from on-premise and cloud infrastructure into SIEM platforms. Expertise in a range of security products, including Vulnerabilityscanning, firewalls, networks, URL Filtering, EDR platforms, DLP, Auditing, and controls. Holds These Qualifications: A Computer Science/IT/Business/Technology More ❯
articulating complex information clearly. Self-starting, detail-oriented, and adept at task management. Ability to translate complex vulnerabilities into deployable security remediations. Experience with; Vulnerability detection and scanning. Vulnerability remediation across both cloud and on-premises infrastructure. Understanding complex technical issues and managing them within a fast-paced … Demonstrates Knowledge Of: Data collection and correlation from on-premise and cloud infrastructure into SIEM platforms. Expertise in a range of security products, including Vulnerabilityscanning, firewalls, networks, URL Filtering, EDR platforms, DLP, Auditing, and controls. Holds These Qualifications: A Computer Science/IT/Business/Technology More ❯