VULNERABILITYMANAGEMENT ANALYST/VM ANALYST Up to £75,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a … major driving forces behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a VulnerabilityManagement Analyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's VulnerabilityManagement Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes … Schedules related to Vulnerability Scanning of All Endpoints of the business. As a VulnerabilityManagement Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of VulnerabilityManagement Analyst role would include More ❯
Stoke-on-Trent, Staffordshire, England, United Kingdom
Searchability
VulnerabilityManagement & Penetration Testing Specialist Hands on technical specialist role, the chance to spearhead a technical red team operation. Working Hybrid within one of the most innovative and fastest growing technological companies in the country in the West Midlands. £80,000 p/a + 15% bonus and car scheme. Perfect for candidates that like a challenge and … is a chance to be a pivotal part of that process. What will you be doing? You will be responsible for both being the technical go to person for vulnerabilitymanagement on the clients applications, as well as being able to talk this through with your peers both technical and non-technical. This is a big multi discipline … needed. You will bring your Cyber Security and InfoSec knowledge to a point and spearhead a new 'red team' function by being the go to for penetration testing and vulnerability management. What do you need? Hands on vulnerability testing and evaluations, as well as the 'hands off' ability to discuss this with peers. PCI DSS Pen testing specialist More ❯
Stoke-On-Trent, Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
Searchability (UK) Ltd
VulnerabilityManagement & Penetration Testing Specialist Hands on technical specialist role, the chance to spearhead a technical red team operation. Working Hybrid within one of the most innovative and fastest growing technological companies in the country in the West Midlands. £80,000 p/a + 15% bonus and car scheme. Perfect for candidates that like a challenge and … is a chance to be a pivotal part of that process. What will you be doing? You will be responsible for both being the technical go to person for vulnerabilitymanagement on the clients applications, as well as being able to talk this through with your peers both technical and non-technical. This is a big multi discipline … needed. You will bring your Cyber Security and InfoSec knowledge to a point and spearhead a new 'red team' function by being the go to for penetration testing and vulnerability management. What do you need? Hands on vulnerability testing and evaluations, as well as the 'hands off' ability to discuss this with peers. PCI DSS Pen testing specialist More ❯
VulnerabilityManagement & Penetration Testing Specialist Hands on technical specialist role, the chance to spearhead a technical red team operation. Working Hybrid within one of the most innovative and fastest growing technological companies in the country in the West Midlands. £80,000 p/a + 15% bonus and car scheme click apply for full job details More ❯
security initiatives, influence secure design standards, and mentor colleagues in best practices. Key Responsibilities Lead application and cloud security initiatives, ensuring systems and software are secure by design. Drive vulnerabilitymanagement and implement a risk-based approach across the technology stack. Perform security testing (SAST, DAST, SCA) and work with developers to remediate findings. Support cloud security controls … hands-on experience in application and cloud security engineering. Deep understanding of web app vulnerabilities (OWASP Top 10, CWE) and secure coding practices. Proficiency with security testing tools and vulnerabilitymanagement platforms. Broad knowledge of network and infrastructure security concepts (WAFs, ACLs, VPNs, etc.). Familiarity with security frameworks and principles such as Zero Trust and risk-based More ❯
ensuring effective integration. Baseline and conduct regular reviews with an incoming 3rd party managed SOC and the security tools in the Cloud environment (Defender and Sentinel) Oversee security architecture, vulnerabilitymanagement, incident response, and threat intelligence Lead security risk assessments and manage remediation plans for identified gaps Ensure compliance with financial regulations (e.g. GDPR, PCI DSS, SOX, FCA … talent Experience/Skills Required Managing security for cloud-first environments specifically Microsoft Azure Implementing Security Operations Centres (SOC) and automated security monitoring Collaborate with the third-party risk management and vendor security programmes Experience with DevSecOps practices and secure software development lifecycle (SDLC) Proven leadership experience in information security within financial services Deep understanding of regulatory and compliance … implementing security frameworks (ISO 27001, NIST) Hands-on experience with SIEM, DLP, IAM, and endpoint security technologies, specifically Microsoft Defender XDR, Purview and Sentinel Excellent risk assessment and incident management skills Outstanding communication skills with the ability to influence stakeholders at all levels Strategic mindset with the capability to balance security controls and business agility SM&CR Responsibilities As More ❯
skills and shift coverage are always available. Monitor ticket queues and ensure SLAs are exceeded Evaluate and recommend service desk tools, technologies, and ways of working to improve service management, ensuring optimal use of existing IT Service Management & Service Desk tools. Analyse Service Desk metrics to identify trends and improve performance, reporting findings to the Service Operations Management team to support collaborative continual improvement of the Service management offerings Track customer satisfaction relating to resolved Service Desk tickets and, where required, contact end-users directly to improve customer satisfaction. Prioritise the ongoing NOC health monitoring, maintain patch compliance lisaing with Change Management & customer facing functions Liase with Security Ops to ensure vulnerabilitymanagement … patch status reports at least monthly and escalate exceptions or delays promptly Ensure minimal downtime and service disruption during patch deployment. Manage Patch exceptions and mitigations. Collaborate with Transition Management to facilitate the transition of new services and processes into operational use. Contribute to the planning, execution, and monitoring of transition projects to ensure they meet predefined objectives and More ❯
years’ experience in cybersecurity operations, ideally within a SOC or incident response environment. Proven expertise with QRadar (key focus), Splunk, or Microsoft Sentinel. Strong grasp of network traffic analysis, vulnerabilitymanagement, and ethical hacking techniques. Solid understanding of DFIR principles and evidence handling. Knowledge of ITIL processes – Incident, Problem, and Change Management. Comfortable working autonomously in a More ❯
years' experience in cybersecurity operations, ideally within a SOC or incident response environment. Proven expertise with QRadar (key focus), Splunk, or Microsoft Sentinel. Strong grasp of network traffic analysis, vulnerabilitymanagement, and ethical hacking techniques. Solid understanding of DFIR principles and evidence handling. Knowledge of ITIL processes - Incident, Problem, and Change Management. Comfortable working autonomously in a More ❯
Birmingham, West Midlands, England, United Kingdom
Robert Walters
Robert Walters is working in partnership with a leading financial services business. They specialise in providing experts services across pensions, wealth management and financial planning across both personal and commercial services. In addition, they offer tailored services across retirement, tax and estate planning. They are considered market leaders in providing customer and client-centric services, operating across multiple locations. … with hands-on expertise across critical systems. Information Security Manager: Duties Experience of business acquisitions - Highly desirable Develop/Maintain enterprise InfoSec strategy aligned business goals Oversee security architecture, vulnerabilitymanagement, incident response and threat intelligence Lead security risk assessments and manage remediation plans for gaps Financial regulation compliance - GDRP, PCI DSS, SOX, FCA Establish security policies, standards … Manager: Experience Experience within a financial services environment - Highly desirable Manage security for cloud-first environments - AWS, Azure, Google Cloud Implement SOC & Automated security monitoring Lead third-party risk management & vendor security programmes Experience of DevSecOps practises and SDLC Design/Implement security frameworks - ISO 27001, NIST Hands-on experience of SIEM, DLP, IAM, Endpoint Technology The permanent opportunity More ❯
DE14, Burton upon Trent, Staffordshire, United Kingdom
Trent and dove
Upon Trent Salary: Up to £55,000 Benefits include Company Pension Scheme, Company Healthcare scheme, Flexible Working The successful candidate will be responsible for leading and managing threat and vulnerabilitymanagement within the organisation. They will monitor, analyse and respond to security incidents and alerts. You will act as a security champion within the organisation, ensuring that security … procedures, and upskill the wider business to ensure heightened awareness in day-to-day activities. To be successful in the role you will have: Proven experience in threat and vulnerability management. Strong working knowledge of Microsoft Defender, MDM solutions, Azure Security Centre and Entra. One or more relevant security qualifications, such as: CISSP, CISM, CompTIA Security +, Microsoft SC More ❯
Bromsgrove, Worcestershire, United Kingdom Hybrid / WFH Options
First Choice Recruitment Services
working to protect the company from a range of cyber and security threats. Candidates will need 2/3 years’ experience of working as a Security Analyst, including monitoring vulnerability and threats, risk mitigation and implementation of robust security policies. This role is to be based at the Bromsgrove office but regular travel to Tewkesbury as required. Hybrid working … to contain and resolve threats. Keep incident logs, reports, and tickets updated within incident tracking systems. Assist in threat intelligence gathering and analysis to enhance detection capabilities. Participate in vulnerabilitymanagement activities. Update and oversee the software inventory. Support compliance reporting and audits. Assist in IT service desk activities. Stay updated with emerging cyber threats, attack techniques, and … security trends. Perform any additional duties delegated by the IT Manager to ensure efficient management of the Company. Key skills: Candidates will need recent work history of working in a similar role. Degree Educated would be an advantage A strong understanding of firewalls, intrusion detection systems and other security technologies is essential. Familiar with ethical hacking and penetration testing More ❯
Group CISO and support them in the delivery of their significant security strategy. In addition supporting the strategy execution, you'll lead day to day team leadership and vendor management across Security Operations, Incident Management, and Threat & Vulnerability Management. You will take the lead on operational and strategic delivery, ensuring the group’s security posture is mature … aligned to business objectives. The organisation has a Group operating model across a large number of geographically dispersed divisions, it is essential that this interim appointment has excellent stakeholder management and communication skills to ensure effective strategy adoption. The ideal profile: Senior experience leading Information or Cyber Security in large, distributed enterprises. We are very open to appoint a … strong 'Senior Manager' who has the broad InfoSec experience we require, and has deputised for the 'Head of/CISO' previously Strong capability across Security Operations, Incident Management, and Threat & Vulnerability Management. Company size matters here. As the client is a £multi-bn bluechip, the right individual will have experience working in similarly large, complex environments (say £1bn+ More ❯
Group CISO and support them in the delivery of their significant security strategy. In addition supporting the strategy execution, you'll lead day to day team leadership and vendor management across Security Operations, Incident Management, and Threat & Vulnerability Management. You will take the lead on operational and strategic delivery, ensuring the group’s security posture is mature … aligned to business objectives. The organisation has a Group operating model across a large number of geographically dispersed divisions, it is essential that this interim appointment has excellent stakeholder management and communication skills to ensure effective strategy adoption. The ideal profile: Senior experience leading Information or Cyber Security in large, distributed enterprises. We are very open to appoint a … strong 'Senior Manager' who has the broad InfoSec experience we require, and has deputised for the 'Head of/CISO' previously Strong capability across Security Operations, Incident Management, and Threat & Vulnerability Management. Company size matters here. As the client is a £multi-bn bluechip, the right individual will have experience working in similarly large, complex environments (say £1bn+ More ❯
Group CISO and support them in the delivery of their significant security strategy. In addition supporting the strategy execution, you'll lead day to day team leadership and vendor management across Security Operations, Incident Management, and Threat & Vulnerability Management. You will take the lead on operational and strategic delivery, ensuring the group’s security posture is mature … aligned to business objectives. The organisation has a Group operating model across a large number of geographically dispersed divisions, it is essential that this interim appointment has excellent stakeholder management and communication skills to ensure effective strategy adoption. The ideal profile: Senior experience leading Information or Cyber Security in large, distributed enterprises. We are very open to appoint a … strong 'Senior Manager' who has the broad InfoSec experience we require, and has deputised for the 'Head of/CISO' previously Strong capability across Security Operations, Incident Management, and Threat & Vulnerability Management. Company size matters here. As the client is a £multi-bn bluechip, the right individual will have experience working in similarly large, complex environments (say £1bn+ More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
COMPUTACENTER (UK) LIMITED
team members Ensure accurate documentation and incident records Participate in team meetings and contribute to service improvements Use monitoring tools to track and resolve incidents Support compliance, patching, and vulnerabilitymanagement Liaise with 3rd Line teams to drive service enhancements Deliver small project work to customer timelines What youll need Were looking for a team player with a More ❯
your typical day looks like: Leading and managing the cyber security team, providing professional guidance, mentorship, and development. Overseeing DHU's cyber operations including threat monitoring, incident response, and vulnerability management. Managing and maintaining cyber assurance aligned with DSPT, Cyber Essentials, ISO27001, and NHS Digital frameworks. Acting as the escalation point for cyber incidents, coordinating investigations, and ensuring lessons … learned are embedded. Maintaining and reporting on cyber risks, incidents, and compliance to senior leadership and the Board. Leading the continual development of cyber governance, risk management, and security improvement initiatives. Supporting business continuity, disaster recovery, and regular testing of the Cyber Incident Response Plan. Championing cyber awareness through organisation-wide training, campaigns, and engagement. Building effective relationships with … CISSP, CISM, CEH, or ISO27001 Lead Implementer (or working towards these). Significant experience leading cyber security operations in a large or complex organisation. Proven expertise in cyber risk management, incident response, and compliance with DSPT, ISO27001, or similar frameworks. Strong technical understanding of network security, O365, Active Directory, and cloud environments. Excellent leadership, analytical, and communication skills with More ❯