Delivery & Operations function. Our Service Delivery & Operations function operates in accordance with ITIL best practice and Group Global standards for Service Desk operation, Request Management, Change Management, Incident Management, Configuration Management, Problem management, Disaster Recovery, Site Management and Reporting. What will you be doing … the relationships between CIs and the services they support. Continuous improvement will also be required to document the existing process and identify improvements. Asset Management – Maintaining an accurate inventory of all IT Assets. Establish process documentation with defines the audit process to verify data accuracy. Working with disparate teams … to ensure compliance with existing IT Controls & Policies. Configuration Management –Defining the process for regularly auditing and maintaining the CMDB in its entirety. Support IT Service Management by providing accurate configuration data, which will supplement improvement actions. Lifecycle Management – Monitoring the lifecycle of IT Assets from acquisition More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Morgan Hunt
Morgan Hunt are currently recruiting for the University of Glasgow, who require a Threat and Vulnerability Analyst on a permanent basis. The Threat and Vulnerability Analyst will lead and support the organisation's vulnerabilitymanagement operations. This involves using specialist tools to identify, assess, and respond … threat intelligence to enrich assessments and spot emerging risks. Key Responsibilities: Monitor multiple threat intelligence sources to identify emerging risks and recommend mitigations. Oversee vulnerability scanning processes, ensuring compliance across all assets. Evolve and embed the organisation's vulnerability policy and strategic direction. Operate and manage security infrastructure … focusing on vulnerability and endpoint protection tools. Collaborate with technical and business units to ensure the integration of vulnerability solutions. Act as a subject matter expert, supporting threat reporting and coordinating technical remediation with peers. Plan and oversee remediation efforts based on risk analysis and organisational priorities. Design More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Morgan Hunt
Morgan Hunt are currently recruiting for the University of Glasgow, who require a Threat and Vulnerability Specialist on a permanent basis. You will be responsible for supporting and operating the organisation's vulnerabilitymanagement function. Uses scanning tools and threat intelligence to identify risks, drive remediation efforts … to improve security posture and develop policies, procedures, and reporting. Key Responsibilities: Monitor threat feeds to identify risks and propose mitigations. Manage and configure vulnerability scans; ensure policy compliance. Maintain and enhance vulnerabilitymanagement policies and strategy. Operate key security tools (e.g., endpoint protection, scanners). Collaborate … apply insights to strategy. Essential Criteria: Knowledge & Qualifications: Relevant degree/HND or equivalent experience in a technical/security role. Strong understanding of vulnerability tools, techniques, and best practices. Skills: Able to solve complex problems independently. Strong planning, analytical, and communication abilities. Comfortable translating technical issues for non More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Net Talent
in-depth technical support for the identification, investigation, and resolution of security vulnerabilities and threats Work with internal support teams to advise and guide vulnerability remediation , improving organisational resilience Collaborate with the Group and the Information Security Leader to support key security processes and contribute to agreed security objectives … timely response, mitigation, and lessons learned 🧠 Skills & Experience Required Strong background in technical information security, with a focus on security controls, system hardening, and vulnerabilitymanagement Demonstrated experience managing and operating enterprise-grade security tools and platforms (e.g., SIEM, DLP, endpoint protection, identity & access management) Familiarity with More ❯
Glasgow, Renfrewshire, United Kingdom Hybrid / WFH Options
Hymans Robertson LLP
in advisory capacity, to external audits and due diligence questionnaires. Key Technologies: Strong practical knowledge of M365 stack from a security perspective (Defender, Azure) VulnerabilityManagement Web Application Filtering DLP Cloudflare Secure File Transfer Firewalls Remote Access/VPN PKI Infrastructure DNS Email Gateways Security Audits ISO27001 Azure More ❯