asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced VulnerabilityManagement Engineer to join our Cyber Security team. As a VulnerabilityManagement Engineer, your primary responsibility will be to manage existing … vulnerabilitymanagement-specific tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerabilitymanagement tooling and solutions Implement automation to remove manual processes and increase efficiency Work … with internal remediators to prioritise vulnerabilitymanagement activities Process vulnerability data to provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by More ❯
We are currently seeking an experienced Qualys Subject Matter Expert (SME) to lead the ongoing customisation, optimisation, and management of our client's Qualys vulnerabilitymanagement platform. This is a critical role focused on improving the organisation's security posture across on-premise, cloud, and hybrid environments. … Responsibilities: Customise Qualys for reporting and real-time data capture across organisational assets and infrastructure. Utilise and optimise Qualys Cloud Connectors for effective cloud vulnerability management. Mature the Qualys platform into a centralised view of vulnerabilitymanagement across environments. Troubleshoot and resolve issues including agent communication, inventory … stakeholder needs. Engage with internal customers to gather requirements, provide recommendations, and drive continuous improvements. Configure and maintain the Qualys platform to support ongoing vulnerability scans, compliance checks, and security assessments. Collaborate with IT and infrastructure teams to ensure seamless integration of Qualys into the broader security ecosystem. Deploy More ❯
You will need to login before you can apply for a job. Security Support Engineer, VulnerabilityManagement and Remediation Operations DESCRIPTION Embark on a Mission to Fortify Amazon's Defenses as a Support Engineer with the VulnerabilityManagement & Remediation Operations team! Amazon Security is seeking an … experienced and innovative Support Engineer specialising in cybersecurity to join our VulnerabilityManagement and Remediation Operations (VMRO) team in London, UK. The VMRO team is a global team that is responsible for assessing, detecting, and driving the remediation of vulnerabilities across the Amazon ecosystem. Key job responsibilities - Support … vulnerability detection campaigns by working closely with Campaign Owners to launch and continuously improve the quality of campaigns across Amazon. - Assess and negotiate with customers to drive down security risk by engaging with teams to remediate critical security vulnerabilities in their environments. - Collaborate with builder teams to implement security More ❯
Role Purpose: This is an exciting opportunity to join a dynamic security solutions team in which you will be responsible for the management and delivery of client security programs. As part of a passionate delivery team, you should have a strong passion for IT security and a customer-centric … approach to providing high-quality service to our clients. Solid experience of running Vulnerability Exposure Management programs is essential. Summary: This is an opportunity to work in a fun and challenging environment, using market-leading security testing tools and platforms to provide security testing services to our large … with the development of new service lines offered by the company. Client Security Programs: Design and set up security programs tailored to client requirements. Vulnerability Scans: Conduct network and application vulnerability scans. Validation: Manually verify vulnerabilities identified in scans. Reporting: Write and deliver comprehensive client reports. Client Support More ❯
Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk - ideally from within the banking or … Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational … when required) and have a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust More ❯
Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk - ideally from within the banking or … Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational … when required) and have a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management • Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. • Oversee the adoption of zero-trust More ❯
We have an exciting new role for a proactive and technically capable Security Vulnerability Lead to join our VulnerabilityManagement team on a 1-year fixed-term contract to cover maternity leave. We are seeking a candidate with experience in a similar security vulnerability-focused role … engagement with business units, ensuring a robust security posture for high-value assets. The role requires strong organizational skills and a solid understanding of vulnerabilitymanagement practices, with the ability to communicate effectively with both technical and non-technical stakeholders. Who we are Virgin Media O2 is the … and inclusion into everything we do, supporting you to be your authentic self throughout your application journey. The must-haves Proven experience in a vulnerabilitymanagement-focused role Strong organizational and prioritization skills, especially in fast-paced, high-risk IT/security environments Ability to interpret technical vulnerabilityMore ❯
to safeguard critical business operations by design and default. You will be responsible for security automation, CI/CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI/CD pipeline to enhance development security. Work … secure AWS cloud infrastructure for clients and internal operations. Automate AWS infrastructure builds following CIS hardening standards . Ensure top-tier security configuration, access management, and incident response on cloud platforms. Operational Support & Incident Response: Support business-critical Windows and Linux-based environments. Monitor and respond to security alerts … across Infosec, servers, firewalls, and applications. Conduct continuous monitoring of internal and third-party information security controls. Threat & VulnerabilityManagement: Assess SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) scans. Implement remediation and mitigation strategies in collaboration with development teams. Maintain network security protocols, firewalls More ❯
teams to establish and enforce network access policies, ensuring that only authorized individuals and devices have the correct access privileges. Proactive Security Testing and VulnerabilityManagement Conduct vulnerability assessments and penetration testing to identify and address security weaknesses in mobile network architectures. Develop and enforce security policies … together with system administrators and application owners to resolve discovered vulnerabilities by applying necessary patches or making configuration adjustments. Create and sustain a thorough vulnerabilitymanagement program that includes tracking vulnerabilities, assessing risks, and planning remediation strategies. Engage in network security incident response efforts by providing technical expertise … and mobile network security. Understanding of 3GPP mobile network CORE and RAN architectures and security requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks More ❯
Albany Beck is looking for an experienced Security Consultant with a strong background in Security Risk Management, GRC, Vulnerability Analysis, and Compliance to join a high-impact programme within a leading global investment bank. This is an exciting opportunity to play a key role in the design and … a Security Consultant, you’ll be working in the client’s security team, contributing to critical workstreams that span governance, risk and compliance (GRC), vulnerabilitymanagement, and security control design. You'll work closely with cross-functional stakeholders including technology, audit, and operations teams to ensure the organisation … and continuous improvement of security governance frameworks and GRC processes. Design and enhance security controls across infrastructure, applications, and cloud environments. Lead or support vulnerability analysis activities, including risk-based prioritisation and remediation tracking. Ensure alignment with global security standards and frameworks (e.g. NIST, ISO 27001, CIS). Partner More ❯
for utilization on scorecards and related to governance reporting across the cybersecurity space related to Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM), and Threat and VulnerabilityManagement (TVM) within the State … Street environment. This role requires an individual with deep knowledge of CIM and TVM, including cyber incident detection, assessment, response, and recovery, Patch Management, and infrastructure penetration testing within a corporate environment. What you will be responsible for As a Reporting and Analytics Analyst you will: Produce regular reporting … governance related to encryption and data loss prevention, or related functions demonstrated through work, military, or education Experience using ticket tracking tools for change management, tracking, and reporting demonstrated through work, military, or education Strong background in cybersecurity, cybersecurity governance, including DLP, KCEM, SDLC, CS, CIM, and TVM Why More ❯
and forums, as well as representing the team where required. Critical Work Support the ongoing and periodic regulatory and compliance responses and engagements. Audit management and coordination. Issue remediation oversight and closure validation. Responding to customer RFIs using standardised formats and frameworks. Quality assurance on library of responses required … Cyber security qualification e.g. CISMP/Apprenticeship (desirable). Demonstrable working knowledge and understanding of key technology and cyber security controls such as Incident Management, Backup & Recovery, Capacity Management, VulnerabilityManagement, Identity & Access Management, Authentication and Authorisation systems, Data Protection, Application Security, Secure Application Development … and standards. Operational risk frameworks. Regulatory compliance. Operational Resilience. Good understanding of data protection controls. Financial Services sector experience. Technology & Cyber Security. Leadership and management experience Not essential but experience will be recognised, greater focus on work experiences and ability to engage and drive initiatives. Personal skills and capabilities More ❯
We are committed to making the world more secure by harnessing a talented, vetted community of security researchers to deliver continuous penetration testing and vulnerabilitymanagement, with actionable results. Synack's PTaaS platform has uncovered more than 71,000 exploitable vulnerabilities to date, protecting a growing list of … with internal teams to determine, develop, and analyze the client's assets, such as: Their digital attack surface and value at risk Their existing vulnerability programs, tools, and methods Their security program, including requirements and goals Work independently and provide technical product expertise to build the appropriate solution for … technical SME expertise to internal stakeholders and the client on their strategic goals and testing requirements Proactively review assessment health to provide technical findings, vulnerability details, and insights to improve overall test quality/outcomes and mitigate risk Assist customers in managing and optimizing their long-term pentesting programs More ❯
of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security … in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & Vulnerability Assessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including demonstrating … developers and system administrators. Keep up to date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerabilitymanagement program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work More ❯
and globally coordinated security operations that protect the organisation's people, systems, and data. This includes direct ownership of security controls, security testing, vendor management, vulnerability and threat management, and incident response. You will work daily with the Group CISO to support consistent, high-assurance security practices … across all regions, in-line with regional regulation and to support the management of cyber incidents. It is essential the individual who will fill this role has prior management experience, has supported building security teams previously and has knowledge around their responsibility at this level to report incidents … been supporting the Group CISO by managing the security team and programmes of work in your responsibility area. You will be responsible for the management of any global Cyber Incidents by supporting the CISO team. Additionally, you will be: Working collaboratively with the SOC to ensure 24/ More ❯
challenges, applying agile methodologies to adapt to new regulations, compliance requirements, and business changes. Advise on and foster continuous improvement of GRC processes, improving management information for better prioritization and risk-based decisions. Lead initiatives that build a culture of accountability and responsibility across engagements. Enhance governance processes and … Design). Provide security expertise across standards and accreditations, measure and control the effectiveness of the security controls framework, and maintain the Information Security Management System. Develop and deliver documented Information Security Management Plans, incorporating regulatory, legal, and compliance considerations. Assist in identifying risks, emerging cybersecurity vulnerabilities, and … threats, and lead risk mitigation plans. Work with Service Management to ensure partners and suppliers adhere to standards, policies, and security KPIs. Collaborate with 1st, 2nd, and 3rd lines of defense on cybersecurity, information assurance, risk, and compliance matters. Lead the development and enhancement of GRC aligned with policies More ❯
Role Title: Cyber Security Engineer - Penetration & Vulnerability Testing Client Details: Oliver James has partnered with a leading distribution organisation with a strong market presence and significant investment in their IT security strategy. They are expanding their Cybersecurity team to enhance their vulnerabilitymanagement and testing capabilities. This … is an exciting opportunity for an experienced Cyber Security Engineer to contribute to strengthening the organisation's security posture through targeted vulnerability assessments and penetration testing, primarily focused on Microsoft Azure and associated technologies. Description: The Cyber Security Engineer will play a critical role in identifying and mitigating security … vulnerabilities across the organisation's technology estate. You will lead regular vulnerability assessments, conduct penetration tests, and work collaboratively with IT teams to address risks and improve security standards. Key Responsibilities: Perform penetration testing and vulnerability assessments across cloud and on-premises environments. Focused security testing within Microsoft More ❯
City of London, London, United Kingdom Hybrid / WFH Options
BRITISH ARAB COMMERCIAL BANK PUBLIC LIMITED COMPANY
of Information Security, the role will support the delivery of the Banks IT Security strategy through implementation of the Cyber security programme, configuration and management of cyber security solutions, and proactive collaboration with the Banks security operations functions. Key Work Outputs and Accountabilities Assist with the delivery of the … the collection, collation and presentation of assurance that the Banks security controls are operating as intended and within the Banks risk tolerance (including organising vulnerabilitymanagement and penetration testing exercises) Lead the Bank's collection, interpretation and dissemination of the current Cyber threat landscape and help with the … as Firewalls, AV, Proxies and IDS/IPS operate Familiar with the Microsoft stack including desktops, servers and cloud services. Understanding of Patching and Vulnerabilitymanagement Experience Working with security technologies such as Firewalls, Proxies, IDS and AV Planning and scoping security vulnerability assessments and penetration tests More ❯
Position: IT Security & VulnerabilityManagement Engineer Industry: Investment Banking (Global Financial) Day rate contract position: 654/day (inside IR35) Initial contract length of 6 months Location: Central London Hybrid working: 3 days at their London office Do you have experience leading vulnerabilitymanagement in large … life cycle of security assessments, threat identification, and mitigation Experience in security assessments, particularly within complex enterprise environments Security risk oversight, applying technical security vulnerability remediation practices Identification, prioritization, remediation and reporting of security risks. Knowledge of vulnerability remediation practices Monitoring and capacity planning of local systems as … part of the global framework A nice to have.... Experience with Tenable and Flexera Background in RedHat Linux, Microsoft Windows including WSUS and GPO management This day rate contract is initially for 6 months with a view to extend. The day rate is 654/day GBP inside IR35. More ❯
london, south east england, united kingdom Hybrid / WFH Options
Hawksworth
Position: IT Security & VulnerabilityManagement Engineer Industry: Investment Banking (Global Financial) Day rate contract position: 654/day (inside IR35) Initial contract length of 6 months Location: Central London Hybrid working: 3 days at their London office Do you have experience leading vulnerabilitymanagement in large … life cycle of security assessments, threat identification, and mitigation Experience in security assessments, particularly within complex enterprise environments Security risk oversight, applying technical security vulnerability remediation practices Identification, prioritization, remediation and reporting of security risks. Knowledge of vulnerability remediation practices Monitoring and capacity planning of local systems as … part of the global framework A nice to have.... Experience with Tenable and Flexera Background in RedHat Linux, Microsoft Windows including WSUS and GPO management This day rate contract is initially for 6 months with a view to extend. The day rate is 654/day GBP inside IR35. More ❯
the charge in deploying high-tech solutions that not only meet compliance with regulations and industry standards but also exceed expectations. Oversee incident response, vulnerabilitymanagement, and cyber threat hunting. Execute security solutions applying cutting-edge technologies like firewalls, intrusion detection and prevention systems, antivirus software, and vulnerability … s - (Qradar Preferred) (e.g. ArcSight/AlienVault/Microsoft Sentinel/LogRhythm). Enterprise level Operating Systems RedHat Linux & Windows Server command line required. VulnerabilityManagement Technologies (e.g. Qualys, Tenable, Rapid7) or MDR Technologies (e.g. TrendMicro, SentinelOne, CrowdStrike). Ability to achieve SC & NPPV3 Clearances. Preferred Skills and More ❯
clients, ensuring they achieve maximum value from our platform while driving retention and expansion opportunities. This role requires deep cybersecurity industry knowledge, exceptional relationship management skills, and the ability to navigate complex enterprise environments. What you'll be doing Serve as the primary point of contact for a portfolio … stakeholders. Mentor junior CSMs and share best practices for enterprise account management. What you'll bring Essential 5+ years of customer success or account management experience with at least 3 years focused on enterprise clients. Proven track record of managing strategic relationships with enterprise organizations. Deep understanding of the … cybersecurity landscape, vulnerabilitymanagement, and security testing methodologies. Experience with enterprise security programs, compliance frameworks (ISO 27001, SOC 2, GDPR, etc.), and risk management. Strong business acumen and ability to translate technical concepts into business value for C-level executives. Excellent project management skills with experience managing More ❯
Our client are leading the way in energy delivery and are looking to add to their talented security team. Key Responsibilities: OT Security & VulnerabilityManagement: Hands-on involvement in OT vulnerabilities, discovery, and security assessments . Test Lab Involvement: Contribute to the development of two security test labs … security) and maintain compliance. Network & Workstation Security: Support OT security architecture, network security, and cyber resilience initiatives . Tool & Process Improvement: Identify and implement vulnerability tracking tools and work closely with engineers on daily checks and reporting . Reporting & Communication: Provide structured updates to the Information Security & Vulnerability Manager. ensuring clear progress tracking. Ideal Candidate Profile: Experience: 2+ years in OT security and vulnerabilitymanagement . Technical Skills: Hands-on experience with GIEC Enterprise Assessor, GIRA, TIA + Security+, CCNA, ICS security, SCADA. Soft Skills: Self-managed and proactive , capable of planning ahead. Strong under More ❯
Our client are leading the way in energy delivery and are looking to add to their talented security team. Key Responsibilities: OT Security & VulnerabilityManagement: Hands-on involvement in OT vulnerabilities, discovery, and security assessments . Test Lab Involvement: Contribute to the development of two security test labs … security) and maintain compliance. Network & Workstation Security: Support OT security architecture, network security, and cyber resilience initiatives . Tool & Process Improvement: Identify and implement vulnerability tracking tools and work closely with engineers on daily checks and reporting . Reporting & Communication: Provide structured updates to the Information Security & Vulnerability Manager. ensuring clear progress tracking. Ideal Candidate Profile: Experience: 2+ years in OT security and vulnerabilitymanagement . Technical Skills: Hands-on experience with GIEC Enterprise Assessor, GIRA, TIA + Security+, CCNA, ICS security, SCADA. Soft Skills: Self-managed and proactive , capable of planning ahead. Strong under More ❯
MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status More ❯