Permanent Vulnerability Management Jobs in Hampshire

1 to 25 of 32 Permanent Vulnerability Management Jobs in Hampshire

SOC Analyst

Farnborough, Hampshire, United Kingdom
Sixworks
a challenging, vastly interesting, and technically diverse role. Key Responsibilities and Tasks Leading shifts throughout 24/7 SOC Service Delivery Providing oversight and management to Junior Analysts Monitoring of Systems for Security Alerts, Intrusions or activity considered to be unauthorised, unexpected or illegal Responding to incidents, utilising a … incidents to Tier 2 Incident Response Teams Review and develop existing security controls in line with a constantly growing technical environment Triage and Review Vulnerability Scanning Reports, feeding results back into technical teams Review Secure Configurations, feeding back into technical teams for remediations of issues Generate recurring service and … develop understanding of security as a discipline Experience (Essential) Previous experience in Security, SOC or related technical field with desired, specific focus on Incident Management Vulnerability Management Relevant qualification(s) in Cyber Security, or other related technical roles Examples Degree in Cyber Security, Computer Science, Networks etc. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Architect

southampton, south east england, United Kingdom
Pearson Whiffin Recruitment Group
for a Security Architect, min requirement is to be BPSS cleared and happy to go through Security Clearance. We need someone with experience of Vulnerability Management solutions such as Tenable or Qualys with a strong knowledge of network security solutions, ITIL and Service Management all within a … Experience: Strong background in IT Security design, ability to look over blueprints and make suggested technical changes to meet business needs. Strong background in vulnerability management with strong Tenalbe or Qualys. Happy to go through security clearance, with current BPSS (Baseline Personnel Security Standard) a minimum. Strong knowledge More ❯
Posted:

Security Architect

portsmouth, hampshire, south east england, United Kingdom
Pearson Whiffin Recruitment Group
for a Security Architect, min requirement is to be BPSS cleared and happy to go through Security Clearance. We need someone with experience of Vulnerability Management solutions such as Tenable or Qualys with a strong knowledge of network security solutions, ITIL and Service Management all within a … Experience: Strong background in IT Security design, ability to look over blueprints and make suggested technical changes to meet business needs. Strong background in vulnerability management with strong Tenalbe or Qualys. Happy to go through security clearance, with current BPSS (Baseline Personnel Security Standard) a minimum. Strong knowledge More ❯
Posted:

Junior SOC Analyst

Farnborough, Hampshire, United Kingdom
Sixworks
established playbooks Escalating complex incidents to Tier 2 Incident Response Teams Reviewing and developing security controls in a growing technical environment Triaging and reviewing vulnerability scanning reports, providing feedback to technical teams Reviewing secure configurations and feeding back for remediations Generating recurring security reports for stakeholders Providing feedback for … a degree in Cyber Security, Computer Science, Networks, etc. Professional qualifications from organizations like CompTIA, ISACA, etc. Technical qualifications such as cloud computing, SIEM, vulnerability management, etc. Experience (Nice to have) Understanding of concepts like cloud computing, incident management, risk management, information security (CIA), phishing, ransomware … and skilled IT professionals, committed to digital innovation. We excel in areas like Secure-by-Design, cloud computing, network design, rapid application development, cyber vulnerability mitigation, and intelligence systems. We offer independent consultancy and champion open-source technologies. A word on UK Security Clearance Due to the secure nature More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Consultant (Security Operations / SOC)

basingstoke, south east england, United Kingdom
Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Posted:

Security Consultant (Security Operations / SOC)

southampton, south east england, United Kingdom
Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Posted:

Security Consultant (Security Operations / SOC)

portsmouth, hampshire, south east england, United Kingdom
Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Posted:

Information Security Analyst - Audit, Compliance & Cybersecurity

Southampton, Hampshire, United Kingdom
Hybrid / WFH Options
NICE
response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits. Gap Assessments: Facilitate and/or conduct internal … Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security … the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. Vulnerability Management: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Microsoft Cloud Security Engineer

basingstoke, south east england, United Kingdom
Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
Posted:

Microsoft Cloud Security Engineer

southampton, south east england, United Kingdom
Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
Posted:

Microsoft Cloud Security Engineer

portsmouth, hampshire, south east england, United Kingdom
Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
Posted:

Cyber Security Consultant

basingstoke, south east england, United Kingdom
Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
Posted:

Cyber Security Consultant

southampton, south east england, United Kingdom
Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
Posted:

Cyber Security Consultant

portsmouth, hampshire, south east england, United Kingdom
Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
Posted:

Cyber Engineer

Farnborough, Hampshire, United Kingdom
Hybrid / WFH Options
Thebusinessyear
expertise and strategic planning to prevent attacks and vulnerabilities. Your responsibilities include planning and implementing security controls to safeguard information. Key functions/outputs: Vulnerability Scanning & Reporting Change Work Participation in Regular Meetings Documentation Main Objectives: Vulnerability Scanning & Reporting Conduct regular vulnerability scans, generate reports, and ensure … tools are current to identify system weaknesses. Perform code scans, vulnerability management scans, and assist in reporting to the cyber security team. Update endpoint protection, ensure antivirus and anti-malware are current, and audit network controls and access permissions. Recognize and respond to potential incidents, including containment and … SITT and perform security testing and assurance activities during planning phases. Participation in Regular Meetings: Lead or attend meetings such as Security Working Groups, Vulnerability Triage, Security Workshops, PI Planning, and Daily Standups, providing cybersecurity input. Documentation: Create and maintain detailed security documentation including design documents, SOPs, and compliance More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer

Portsmouth, Hampshire, United Kingdom
Hybrid / WFH Options
G2 Ops, Inc
plus benefits Openings: 2 Full-Time Roles Knowledge Requirements: Understanding of C4ISR architectures and information-assurance principles Familiarity with DoD Risk Management Framework (RMF) and accreditation processes Experience with system and network security analysis on NIPRNet, SIPRNet, etc. Knowledge of DoD 8570.01-M IAT requirements Proficiency with cybersecurity tools … a motivated, team-oriented Information Systems Security Engineer to work on cybersecurity governance, risk, and compliance, supporting DoD projects involving security controls, risk assessments, vulnerability management, cloud security, policy development, and system analysis. Must have or be eligible for a DoD Secret clearance and IA Technical II certification More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Technical Manager

Portsmouth, yorkshire and the humber, United Kingdom
Hybrid / WFH Options
GTT
viable plans for delivering industry leading solutions on top of standard services and delivering in life support of GTT Enterprise customers. GTT’s Technical Management offering is a consultative, value-add professional services that provides a tailored experience to their client base. As a Technical Manager you will own … solution, understand the wider context of the solution with the customer and how it aligns with their business, bringing a holistic ITIL based Service Management structure to some of GTT’s most important Managed Customers. At any one time you will work on multiple client accounts and must have … excellence, agility, ownership, and responsibility. Becoming an invaluable partner to the client. Monitor industry networking updates, technologies, and best practices to improve overall network management and to remain informed of new technical developments and trends in the industry. Own the customer solution lifecycle from initial customer order onwards, highlighting More ❯
Posted:

Technical Manager

portsmouth, hampshire, south east england, United Kingdom
Hybrid / WFH Options
GTT
viable plans for delivering industry leading solutions on top of standard services and delivering in life support of GTT Enterprise customers. GTT’s Technical Management offering is a consultative, value-add professional services that provides a tailored experience to their client base. As a Technical Manager you will own … solution, understand the wider context of the solution with the customer and how it aligns with their business, bringing a holistic ITIL based Service Management structure to some of GTT’s most important Managed Customers. At any one time you will work on multiple client accounts and must have … excellence, agility, ownership, and responsibility. Becoming an invaluable partner to the client. Monitor industry networking updates, technologies, and best practices to improve overall network management and to remain informed of new technical developments and trends in the industry. Own the customer solution lifecycle from initial customer order onwards, highlighting More ❯
Posted:

Cyber Security Analyst

southampton, south east england, United Kingdom
Network IT Recruitment Limited
platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct forensic investigations, and support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threat intelligence tools to More ❯
Posted:

Cyber Security Analyst

basingstoke, south east england, United Kingdom
Network IT Recruitment Limited
platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct forensic investigations, and support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threat intelligence tools to More ❯
Posted:

Cyber Security Analyst

portsmouth, hampshire, south east england, United Kingdom
Network IT Recruitment Limited
platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct forensic investigations, and support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threat intelligence tools to More ❯
Posted:

Information Security Engineer

Southampton, England, United Kingdom
Ventula Consulting
skills/experience: Strong IT infrastructure background with a security focus Security certifications (CISMP, GSEC, or equivalent) Proven experience with firewalls, encryption, AV, and vulnerability management Familiarity with ISMS, NIS Regulations, GDPR (desirable) Salary is mainly dependent on experience but can stretch up to £50,000pa. This role More ❯
Posted:

Information Security Engineer

portsmouth, hampshire, south east england, United Kingdom
Ventula Consulting
skills/experience: Strong IT infrastructure background with a security focus Security certifications (CISMP, GSEC, or equivalent) Proven experience with firewalls, encryption, AV, and vulnerability management Familiarity with ISMS, NIS Regulations, GDPR (desirable) Salary is mainly dependent on experience but can stretch up to £50,000pa. This role More ❯
Posted:

Customer Success Engineer

basingstoke, south east england, United Kingdom
Locke44
experience working with data and cloud technologies, including databases, cloud infrastructure, and basic cloud administration (e.g., networking, compute and storage resources, identity and access management). Familiarity with APIs, web services, and automation through scripting or programming languages. Practical knowledge and demonstrated experience in areas such as Data Loss … Prevention (DLP), Data Privacy/Protection, DSPM/CSPM, SIEM, or vulnerability management is highly preferred. Proven success in a technical, customer-facing role within a software or SaaS company. Full spec available, please apply to Locke44 for the details. More ❯
Posted:

Customer Success Engineer

southampton, south east england, United Kingdom
Locke44
experience working with data and cloud technologies, including databases, cloud infrastructure, and basic cloud administration (e.g., networking, compute and storage resources, identity and access management). Familiarity with APIs, web services, and automation through scripting or programming languages. Practical knowledge and demonstrated experience in areas such as Data Loss … Prevention (DLP), Data Privacy/Protection, DSPM/CSPM, SIEM, or vulnerability management is highly preferred. Proven success in a technical, customer-facing role within a software or SaaS company. Full spec available, please apply to Locke44 for the details. More ❯
Posted:
Vulnerability Management
Hampshire
10th Percentile
£30,000
25th Percentile
£45,000
Median
£49,000
75th Percentile
£50,000
90th Percentile
£51,500