asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability … active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process … vulnerability data to provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and More ❯
tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as key management, vulnerabilityscanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the continuous integration … In-depth knowledge of DevSecOps tools such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerabilityscanning, encryption, authentication, and secrets management (Vault, Key Management Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months FirstBank UK is a globally recognised, top-tier bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business with over 10 million … is the oldest African bank in the UK. Due to business requirements, we are now looking to acquire the services of an experienced Cyber Vulnerability Management Analyst Please note that this is a hybrid role with 3 days in the office and 2 days working from home. Key Responsibilities … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job More ❯
of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security … in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & Vulnerability Assessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including demonstrating … date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerability management program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work with stakeholders to develop mitigation strategies. Conduct regular security More ❯
cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, data leakage prevention, patching, encryption, vulnerabilityscanning, and configuration of security tools. Prior experience in an international enterprise environment is essential. Responsibilities Collaborate with IT teams to design and … Develop, test, and implement disaster recovery procedures. Manage cybersecurity projects to ensure timely delivery within budget. Perform or coordinate security assessments, penetration tests, and vulnerability scans. Ensure compliance with frameworks like COBIT, NIST, ISO, PCI, GDPR, HIPAA, etc. Provide internal support for security issues within SLAs. Evaluate and implement More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
regulations, identifying potential compliance issues and contributing to mitigation strategies. Technology Evaluation, Deployment, and Management: Conduct security architecture reviews and perform security assessments, including vulnerabilityscanning, configuration reviews, and cloud security posture assessments, identifying vulnerabilities and recommending detailed remediation strategies. Contribute to the development of security architecture roadmaps More ❯
and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security. Strong experience in penetration testing and hands-on coding in at least More ❯
and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security br br Strong experience in penetration testing and hands-on coding in More ❯
and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least More ❯
least 2 years in a managerial capacity. Strong knowledge of cybersecurity frameworks, standards, and best practices. Proficiency with security technologies and tools (e.g., SIEM, vulnerability scanners, encryption tools). Hands-on experience with incident response, penetration testing, and threat analysis. Familiarity with secure software development practices and DevSecOps principles. More ❯
least 2 years in a managerial capacity. Strong knowledge of cybersecurity frameworks, standards, and best practices. Proficiency with security technologies and tools (e.g., SIEM, vulnerability scanners, encryption tools). Hands-on experience with incident response, penetration testing, and threat analysis. Familiarity with secure software development practices and DevSecOps principles. More ❯
We have an exciting new role for a proactive and technically capable Security Vulnerability Lead to join our Vulnerability Management team on a 1-year fixed-term contract to cover maternity leave. We are seeking a candidate with experience in a similar security vulnerability-focused role who … engagement with business units, ensuring a robust security posture for high-value assets. The role requires strong organizational skills and a solid understanding of vulnerability management practices, with the ability to communicate effectively with both technical and non-technical stakeholders. Who we are Virgin Media O2 is the UK … and inclusion into everything we do, supporting you to be your authentic self throughout your application journey. The must-haves Proven experience in a vulnerability management-focused role Strong organizational and prioritization skills, especially in fast-paced, high-risk IT/security environments Ability to interpret technical vulnerabilityMore ❯
incident reports. Project Delivery Take part in the team's project delivery initiative, rotating between the following roles on a 1-3 monthly schedule: Vulnerability Management - maintain regular scans, interpret results, identify asset owners, track remediation activities and report on the agreed SLAs. Security Controls Administration - maintain availability and … and standard use cases of technical security products, such as firewalls, anti-virus, web proxies, SIEM, IDS/IPS, DLP, and EDR. Familiarity with vulnerabilityscanning and penetration testing tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but not required): Cyber More ❯
reviews, threat modeling, and risk assessments; strong understanding of information security principles, including confidentiality, integrity, and availability. Experience with security tools and technologies, including vulnerability scanners, intrusion detection systems, and security information and event management (SIEM) systems. Excellent communication and interpersonal skills, with the ability to collaborate effectively with More ❯
documentation and root cause analysis/Assist in managing identity and access controls, including reviews of user entitlements and privileged accounts/Participate in vulnerabilityscanning, patch management and configuration reviews/Maintain and enforce security policies, standards and procedures/Conduct periodic risk assessments and contribute to … organizations that provide 24x7x365 operations/Familiar with networking fundamentals, protocols and network components/Experience with cloud security/Understanding of security tools, vulnerability management, penetration testing and remediation/Working knowledge of Qualys, Defender, Knowbe4 are essential./Exposure to MS Sentinel and Expel MDR are desirable More ❯
to implement security controls across infrastructure (e.g., access control, encryption, logging). Lead the incident response process and manage third-party pen testing and vulnerability management. Customer & Vendor Security: Support security questionnaires, RFPs, and due diligence for customer deals. Review third-party vendors and tools for security posture and … and SSO. Clear understanding of data privacy laws (especially GDPR). Familiarity with security tools (e.g., endpoint protection, SSO/IAM, monitoring/logging, vulnerabilityscanning). Experience with risk assessments, incident response planning, and writing security policies. Strong communication skills, with the ability to explain security concepts More ❯
Familiarity with the MITRE ATT&CK framework SIEM platforms (Microsoft Sentinel, Splunk, Google Chronicle, etc.) Experience with Zero Trust Network Architecture, IDS/IPS, vulnerability scanners, and web proxies Scripting or programming (Python, PowerShell, Bash, etc.) Join a global leader at the forefront of data-driven customer insights, where More ❯
Familiarity with the MITRE ATT&CK framework SIEM platforms (Microsoft Sentinel, Splunk, Google Chronicle, etc.) Experience with Zero Trust Network Architecture, IDS/IPS, vulnerability scanners, and web proxies Scripting or programming (Python, PowerShell, Bash, etc.) Join a global leader at the forefront of data-driven customer insights, where More ❯
of AWS/Azure/GCP cloud security and web application security principles. Strong communication and documentation skills. Experience with tools like SIEM, CSPM, vulnerability scanners, and monitoring platforms. Nice to Have Experience working in or with UK healthcare organisations (e.g., NHS or private providers). CISSP, CISM, or More ❯
security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusion detection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform More ❯
methodology and/or industry certifications. Experience in working in a regulated environment. Experience of; configuration management tools, Jenkins, host virtualisation, containerisation, ELK, Splunk, vulnerability scanners, proxies, WAFs, artefact management, serverless deployments, data streaming and transformation. Experience in secured AWS, or other, Cloud architectures and engineering solutions. What You More ❯