Permanent Vulnerability Management Jobs in London

1 to 25 of 39 Permanent Vulnerability Management Jobs in London

Senior Security Engineer, Infrastructure

London, England, United Kingdom
Ripple Labs
and strategic related issues related to information security systems and services Collaborate with product owners and engineering teams to ensure smooth transition of the Vulnerability Management technologies into production and ensure maximum visibility into a variety of environments Work closely with engineering to identify opportunities for automation eliminating … service available across AWS, GPC and other public cloud providers Responsible for maintaining current versions of functionalities and technologies in production by effecting change management processes Proactively participate in compliance support activities such as trainings, audit prep, playbook authoring and ensure business as usual (BAU) activities are completed accurately … Familiarity with the CIS benchmarks and how to monitor and remidiate deficiencies Experience in Cloud Computing like AWS, GCP with emphasis on Cloud Baseline management tools like Lacework Experience in Information Security frameworks and best practices for Vulnerability management, Risk Analysis, Reporting Metrics and Assessments Problem solving more »
Posted:

Senior IT Infrastructure Analyst

City of London, London, United Kingdom
Hybrid / WFH Options
Amtis Professional Ltd
System Centre Configuration Manager and Intune. Administer Fortinet VPN, RSA authentication, Ivanti Security Controls, and Carbon Black anti-malware systems. Manage Intune mobile device management and Wandera security systems. Create automated deployments of technical/line-of-business applications for Microsoft System Centre Configuration Manager and Intune. Administer various … third-party applications and systems, including USS Web Filtering, Rapid7 InsightIDR, Darktrace IDS/IPS, Egress email protection, Mimecast email gateway, Tenable Vulnerability Management and Nessus, Meraki Switches and APs, and others. Effectively manage and resolve third-line Service Desk tickets. Escalate technical issues to third-parties/… ensure resolution in line with Service Level Agreements. Support IT Service Desk Lead/Coordinator/Head of IT Operations with change and problem management processes and attend CAB meetings. Document solutions as appropriate. Mentor and cross-train IT support analysts. Participate in the implementation of new technical systems more »
Employment Type: Permanent, Work From Home
Salary: £60,000
Posted:

Senior IT Infrastructure Analyst

London, Walbrook, United Kingdom
Hybrid / WFH Options
Amtis Professional Ltd
System Centre Configuration Manager and Intune. Administer Fortinet VPN, RSA authentication, Ivanti Security Controls, and Carbon Black anti-malware systems. Manage Intune mobile device management and Wandera security systems. Create automated deployments of technical/line-of-business applications for Microsoft System Centre Configuration Manager and Intune. Administer various … third-party applications and systems, including USS Web Filtering, Rapid7 InsightIDR, Darktrace IDS/IPS, Egress email protection, Mimecast email gateway, Tenable Vulnerability Management and Nessus, Meraki Switches and APs, and others. Effectively manage and resolve third-line Service Desk tickets. Escalate technical issues to third-parties/… ensure resolution in line with Service Level Agreements. Support IT Service Desk Lead/Coordinator/Head of IT Operations with change and problem management processes and attend CAB meetings. Document solutions as appropriate. Mentor and cross-train IT support analysts. Participate in the implementation of new technical systems more »
Employment Type: Permanent
Salary: £60000 - £65000/annum
Posted:

Security Architect, Consulting

London, United Kingdom
Cognizant
architecture framework, roadmap, and strategy. Design and implement security solutions and controls for IT systems and networks, such as firewalls, encryption, identity and access management, vulnerability management, and incident response. Conduct security assessments and audits to identify and remediate security gaps and weaknesses. Provide guidance and support … and participate in security projects and initiatives and ensure compliance with security policies and regulations. Prepare and deliver security reports and presentations to senior management and stakeholders. Knowledge of threat modelling techniques such as STRIDE. Experience and Qualifications Required Bachelor's degree in computer science, information systems, cybersecurity, or … Strong knowledge and skills in security architecture, design, and implementation. Experience with various security technologies and tools, such as firewalls, encryption, identity and access management, vulnerability management, and incident response. Ability to analyse and solve complex security problems and challenges. Excellent communication and presentation skills, both written more »
Employment Type: Permanent
Posted:

Senior Infrastructure Security Engineer

London, United Kingdom
Blue Octopus Recruitment
IT strategy from an operational security perspective and support the framework of the IT Security Manager where applicable. Responsibilities Mentor colleagues and perform line management duties to ensure the team operate with a security-first mindset. Oversee a service queue ensuring the team are managing and resolving incidents and … changes in a timely manner. Advise the Management team of significant emerging threats and recommend tactical steps to counteract these threats. Respond to threats across multi-cloud environments and protect the integrity of our information assets. Conduct peer reviews of documentation supporting security workstreams both current and past. Lead … the monthly vulnerability management forum from an Operational perspective. Skills and Experience Required Excellent analytical and problem-solving skills. Strong Security first mindset. 5 years+ of front-line experience working in a cyber role supporting multi-cloud environments. Strong understanding of cyber security principles, best practices, attack vectors more »
Employment Type: Permanent
Salary: £75,000
Posted:

Senior Security Engineer

London, United Kingdom
Hybrid / WFH Options
Confidential
tools such as Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerability management, and penetration testing. Risk Management and Compliance Identify and assess security risks and develop mitigation strategies. Ensure compliance with relevant security more »
Posted:

Business Continuity Lead

London, United Kingdom
Confidential
s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH, CEH, or OSCP. Proficiency in SIEM Platforms, vulnerability management tools, and incident management processes. Experience in managing security functions or SOC capabilities. Strong analytical skills to analyze security monitoring data more »
Posted:

DevSecOps Engineer

East London, London, United Kingdom
Hybrid / WFH Options
MECS Communications Ltd
out Splunk software across the platforms & infrastructure managed by the Engineering & Run & Operate teams. The DevSecOps Engineer will also oversee logging & Security Information & Event Management (SIEM) aspects of infrastructure, collaborating with application development teams to resolve issues & enhance security measures within the CI/CD pipeline. If you have … day London office, 4 days remote working, work from home Key Skills: Continuous Integration (CI), Continuous Deployment (CD), Infrastructure as Code (IaC), Security Automation, Vulnerability Management, Threat Intelligence, Secure Software Development Lifecycle (SSDLC), Compliance as Code, Security Orchestration, Container Security, Microservices Security, Threat Modelling, Secure Configuration Management, Secure DevOps Practices, Security Scanning & Testing, Security Incident Response, Identity & Access Management (IAM), Secure Cloud Environments, Secure Code Reviews Nature: Permanent, Full Time Hours: Monday - Friday 09.00 -17.30 Gross pay rate: £55,000 - £70,000 basic + 20% bonus, Health Care, Discounts & other benefits Key Activity: * Develop more »
Employment Type: Permanent, Work From Home
Salary: £65,000
Posted:

Office 365 Infrastructure Security Engineer-Azure Mcafee

City, London, United Kingdom
e-resourcing Limited
program as well as ongoing security projects that address information security risks and compliance requirements. Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information. You will need to have ideally worked within a global business and dealt more »
Employment Type: Permanent
Salary: GBP 35,000 Annual
Posted:

Senior Sales Engineer - Vulnerability Management

London, United Kingdom
Confidential
With the recent acquisition of Avalor we are looking for a Senior Sales Engineer with significant experience in Vulnerability Management/Risk to join the team in the UK. Avalor s Data Fabric for Security ingests, normalizes, and unifies data across enterprise security and business systems to deliver … up to 10,000 users. As a Zscaler Senior Sales Engineer, you and your Regional Sales Managers will be responsible for presenting the Zscaler Vulnerability management solution to prospective customers, creating and delivering demonstrations of the products, gathering customer technical requirements, creating evaluation test plans with customers, and … of successful Enterprise Cyber Technical Solutions selling Strong knowledge of the entire Security stack, with deep expertise in VM, SECops, DevSecOps. Strong Background in Vulnerability Management/Risk Strong partner ecosystem - rolodex Ability to successfully manage and run POV's from beginning to end Technical/hands on more »
Posted:

VP of Information Security

London, United Kingdom
Confidential
strategies, ensuring policies are communicated and enforced. This role involves hands-on technical work and collaboration across the enterprise. Key Responsibilities Provide information risk management and security guidance to security teams, internal groups, and development teams. Advise on industry leading practices and internal best practices for secure deployments, security … objectives. Advise operations teams supporting computer security incident response activities related to intrusion detection monitoring, scanning, cyber threat reporting, and development/implementation of vulnerability mitigation strategies. Develop trusted advisor relationships for information risk management and security with key stakeholders and internal groups. Education, Experience, Abilities You will … others) 8+ years of experience in critical security concepts, functions and tools including: Security by Design Network and Infrastructure Security End point security controls Vulnerability management Configuration and compliance management Risk management Policy and standards management Incident handling Application security (WAFs, Static and Dynamic analysis more »
Posted:

Global Head of Cyber Threat

London, United Kingdom
Confidential
to ensure technology teams are aware of threats and become accountable for addressing them within the technologies they manage. Integrate Threat Intelligence to the vulnerability management program to ensure new vulnerabilities are remediated Provide senior stakeholder and board level briefings. Your teams key responsibilities: Monitoring darkweb and other … fits-all solution. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Head of MS UK Security Solutions Sales

London, United Kingdom
Confidential
empowering team to focus on learning; partner and collaborate with other teams. Qualifications Required Qualifications (RQs) 7+ years of technology-related sales or account management experience AND leading sales organization OR Bachelors Degree in Computer Science, Information Technology, Business Administration, or related field AND 6+ years of technology-related … sales or account management experience OR equivalent experience Preferred Qualifications 9+ years of technology-related sales or account management experience OR Bachelors Degree in IT, or related field AND 8+ years of technology-related sales or account management experience OR Masters Degree in Business Administration, IT, or … related field AND 5+ years of technology-related sales or account management experience Experience with competitive Security solutions (e.g. Palo Alto, Splunk, CrowdStrike, etc.) is a plus. 6+ years of solution or services sales experience. Sales Management: Proven history of leading security sales team and driving business growth more »
Posted:

CDAITO Information Security Assistant Manager

London, United Kingdom
Confidential
of the state of information security and cybersecurity and provide periodic reports (at least annually) on the state of information security to/Top management Adopt, implement and update Cybersecurity policies, rules, processes and procedures in line with Head Office regulatory Framework In reporting to the Top Management … the Group model. Work with information owners in business units to determine appropriate security objectives Monitor network activity for malicious activity Monitor and evaluates vulnerability reports, vendor hot-fixes, and vendor patches for applicability to deployed technologies Monitor the process of creating, changing, or removing user access across all … Bachelor's in computer science, Information Technology or related field Master's degree a plus CISSP/CISM certification preferable Experience in application security, vulnerability management Solid background in assuring high level of Information Security management and Business Continuity management in an organization I.T./Info more »
Posted:

Principal Security Engineer

London, United Kingdom
Hybrid / WFH Options
Confidential
and access policies appropriate to the security needs of the business Provide security guidance and drive infrastructure decisions in collaboration with other technical and management teams, ensuring Security principles are being upheld. Advanced knowledge of layer 7 firewall technologies and capabilities (e.g., Application awareness, user identities, advanced threat detection … etc.) Provides vulnerability assessment of cloud assets, delivers remediation recommendations, and provides knowledgeable assistance in resolving identified vulnerabilities. Develop and implement security measures, policies, and procedures to protect systems and networks against unauthorized access, data breaches, and other security incidents. Monitor and analyse security logs and events, and respond … Cyber Principles, ISO27001, SoC, NIST, PCI, and GDPR. Hands-on experience with security technologies, SIEM , IDS/IPS, EDR, NDR, network forensics, antivirus, and vulnerability scanning tools. (preferably Crowdstrike Falcon, Wiz, Datadog) Up-to-date understanding of testing the security of software and infrastructure using appropriate security tools including more »
Posted:

IT Security Solutions Architect

London, United Kingdom
Confidential
interpersonal skills, with the ability to effectively collaborate with cross-functional teams. Experience with security tools and technologies such as firewalls, SIEM , DLP, Identity Management and encryption solutions. A variety of career development tools, resources and opportunities The chance to work on some of the most challenging, relevant issues … of our company. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Senior Cyber Detection Engineer – Cloud Technical Lead

London, United Kingdom
Confidential
requesting an accommodation. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Information Security Manager

London, United Kingdom
Hybrid / WFH Options
Confidential
compliance with key data and security policies. Expertise in planning and delivering roadmaps, contributing to our cloud security strategy Good understanding of security risk management in a cloud security context, and of cloud security principles Knowledge of multiple regulatory requirements e.g UK GDPR, CCPA Expertise in security and compliance … Architecture Knowledge of Infrastructure as Code Knowledge of Azure, Google, AWS, and Kubernetes cloud native services Securing GitOps and Continuous Deployment Identity and Access Management, including securing privileged access Relevant certifications such as SABSA, CISSP, CCSK, AZ 500, GIAC, CISM, ISO Lead Auditor/Implementer, CISLA, CISMP, Security + … to light subsequently. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Senior Security Consultant(P2PE Application and SSF Assessor)

London, United Kingdom
Hybrid / WFH Options
Confidential
industry best practices for systems hardening. Expertise in data encryption and data privacy. Proficiency in incident response, business continuity planning, physical security, risk assessments, vulnerability scanning, and penetration testing report reviews. Standards and Best Practices: Solid understanding of industry standards such as PCI DSS, CIS, ISO27001, and NIST. Client … independently lead client engagements or collaborate with a team, including scoping, planning, governance review, onsite assessment activities, status reporting, report writing, and client resource management, with support from our project management team. Certifications: At least one Information Security certification from the following is a must: PCI P2PE or … industry leading certifications. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Information Security Service Manager

London, United Kingdom
Hybrid / WFH Options
Confidential
experience, skills and knowledge Essential Information Security Expertise : Must have experience in managing security services in a cloud -first environment. Security Principles and Risk Management : Must possess a solid understanding of information security principles and risk management practices. The ability to apply these concepts effectively in real-world … strong communication skills and the ability to explain complex security issues to a wide range of audiences, helping to align technical teams and senior management on security priorities and strategies. Analytical and Detail-Oriented : The role requires an analytical mindset and an eye for detail while maintaining an overall … happy to accommodate. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Information Security Manager UKI

London, United Kingdom
Hybrid / WFH Options
Confidential
policy. As Information Security Manager UKI you contribute directly to BAM s objectives by strengthening the design and effectiveness of the BAM Information Security Management Framework.You will support Divisional management, Segments and underlying projects within UKI with the implementation and compliance with the required information security policies. You … Your mission Managing the UKI information security agenda in line with the Group Security agenda, including reporting to key stakeholders Managing the Information Security Management System (ISMS) within UKI as part of the ISO27001 certification and Cyber Essentials requirements Identifying emerging data and information security risks and trends and … information security incidents and closure of identified remedial action as required Perform periodic internal control assessments regarding information security (via the BRIC tool). Management of the UK Information Security Project Manager Deliver Security Standards within the organisation and on projects, including certifications (ISO27001 and Cyber Essentials) Implementation of more »
Posted:

Senior Cybersecurity Technical Delivery Manager

London, United Kingdom
Confidential
inspired is expected and making a meaningful impact is rewarded. EDUCATION Degree or equivalent work experience equally preferable. Degree in information technology, cybersecurity, risk management, business administration, or related field Master's degreeCERTIFICATIONS Certified Information Systems Security Professional (CISSP) certificationWORK EXPERIENCE Experience in IT security and risk management … firm's executive leadership and risk committees Drive complex, firm-wide initiatives towards successful completion and develop reports to communicate the progress to senior management, risk committees, and board of directors Understand current cybersecurity strategy and help evolve it on a continuous basis through targeted initiatives Collaborate with stakeholders … cause analysis, cost/benefits, feasibility analysis and research of sound industry practices Drive progress in executing the overall cyber strategy through analysis, stakeholder management, leadership communication, and provide recommendations on how to execute strategic goals including: Partnering with stakeholders to monitor and achieve annual targets Identifying and driving more »
Posted:

Information Security Manager

London, United Kingdom
Confidential
capability to ensure our services are delivered effectively and in line with Sainsbury s future ways of working. What you need to do Line management of a small team of colleagues. Assuring that security controls are met in conjunction with our Product Assurance Framework through the product lifecycle. Articulating … scoped and vulnerabilities are remediated in line with SLA. Work with business and external suppliers. Track and manage the delivery of actions for example vulnerability mitigation for business owned & managed products. What you need to know and show Demonstrative experience of providing InfoSec consultancy to business teams who are … Confidentiality, Integrity and Availability are adhered to. Understanding of Data and Cyber related risks in a complex organisation (including regulatory requirements) Experience of people management of small teams including setting team strategy. Ability to motivate a small team of individuals to be high performers, celebrate success and help develop more »
Posted:

Regional Intelligence Manager, Compliance, Safety and Risk Management

London, United Kingdom
Confidential
Regional Intelligence Manager, Compliance, Safety and Risk Management Google Google s mission is to organize the world's information and make it universally accessible and useful. View company page Bachelor's degree or equivalent practical experience. Candidates will typically have 7 years of experience developing and deploying processes to … of our offices. You're an expert who shares our seriousness about security and our commitment to confidentiality. You'll collaborate with our Facilities Management team to create innovative security strategies, investigate breaches and create risk assessment plans for the future. You believe that providing effective security doesn't … bodyguard (and our long lost pal). The Threat Analysis and Crisis Services (TACS) team within Google Data Center's Compliance, Safety, and Risk Management (CSRM) organization, provides 24x7 threat monitoring, intelligence analysis and crisis reporting of potential threats to Technical Infrastructure s personnel, operations, assets, and supply chain more »
Posted:

Information Security Manager

London, United Kingdom
Confidential
ongoing security of products delivered by engineering teams Managing the security portfolio of technology products including Single Sign On, Data Loss Prevention, AntiVirus, and vulnerability management Keeping a finger on the pulse of current threats from a variety of sources to highlight those that pose a risk to more »
Posted:
Vulnerability Management
London
10th Percentile
£52,500
25th Percentile
£62,500
Median
£80,000
75th Percentile
£95,000
90th Percentile
£112,125