8 of 8 Permanent Vulnerability Management Jobs in Reading

Risk & Assurance Manager - IT & Cyber

Hiring Organisation
Audit & Risk Recruitment
Location
Reading, Berkshire, UK
Employment Type
Full-time
Information Security risk landscape. Reporting directly to the Head of Risk and Assurance, you will play a key role in embedding effective risk management practices across the company's technology and cybersecurity domains. As a Risk & Assurance Manager, you'll be responsible for and have ownership for: Partnering with … senior IT, Security, and business leaders to embed risk management practices into operational processes and strategic initiatives. Owning and maintaining IT Risk and Control Matrices (RCMs), ensuring they remain current, comprehensive, and aligned with industry standards and audit expectations. Reviewing effectiveness of first line functions in testing and validation ...

Security & Compliance Specialist

Hiring Organisation
Complexio
Location
Reading, Berkshire, UK
Employment Type
Full-time
interacting and using it. Automation can then replicate and improve these actions independently. Complexio is a joint venture between Hafnia, in partnership with Marfin Management, C Transport Maritime, Trans Sea Transport and BW Epic Kosan and Símbolo We are looking for a Security & Compliance Speciallist to own and drive … relevant compliance frameworks (e.g., CIS Benchmarks, EU AI Act, GDPR) and adapt processes accordingly. Operational Security Oversee day-to-day security operations, including vulnerability management, access reviews, and incident response readiness. Provide insights and triage signals from security tooling (SAST, DAST, dependency scanning, SIEM). Work hands ...

Cyber Security Analyst

Hiring Organisation
Milestone Technologies, Inc
Location
Reading, Berkshire, UK
Employment Type
Full-time
responsible for ensuring continuous infrastructure reliability for multiple revenue-generating services. How You Will Make an Impact: Provide support through security operations incident management processes to protect and/or restore service operations as quickly as possible and minimize impact on customers. What You Will Need to Succeed: Minimum … different aspects such as source/destination addresses, usernames, and process names) Demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerability management A sound understanding of TCP/IP and networking concepts Understanding of network design principles with and knowledge of the OSI model. Flexibility ...

Product Owner - Cloud & SaaS Platform & Security SPOC

Hiring Organisation
Ipsotek, an Eviden business
Location
Reading, Berkshire, UK
Employment Type
Full-time
scaling secure cloud-native/SaaS platforms. Strong understanding of: Cloud architectures (AWS, Azure, GCP) Microservices, containers, CI/CD pipelines Secure SDLC and vulnerability management Experience coordinating penetration tests and working with CISOs/security leadership. Familiarity with compliance frameworks (ISO 27001, SOC2, GDPR). Preferred Skills … Excellent communication and stakeholder management skills. Ability to translate technical concepts for non-technical audiences. Strong organizational skills to manage multiple streams (product, security, compliance). Agile mindset with experience in scrum or kanban delivery. Key Attributes Visionary & pragmatic: Sets bold goals while delivering incremental value. Customer-focused: Prioritizes ...

Presales Engineer - Cyber Security

Hiring Organisation
Areti Group | B Corp™
Location
Reading, England, United Kingdom
client-facing role. Ideal Background: Proven experience in cyber security design, architecture, or consultancy. Hands-on expertise across domains such as SIEM, SOAR, EDR, Vulnerability Management, WAF, IDAM , and Cloud Security . Strong understanding of vendor technologies (e.g., Fortinet, Palo Alto, Juniper ). Excellent communication and stakeholder engagement ...

Senior Customer Success Engineer

Hiring Organisation
Veracode
Location
Reading, Berkshire, UK
Employment Type
Full-time
Veracode is a global leader in Application Risk Management for the AI era. Powered by trillions of lines of code scans and a proprietary AI-generated remediation engine, the Veracode platform is trusted by organizations worldwide to build and maintain secure software from code creation to cloud deployment. … with us. What you will be responsible for: Discover and understand the technologies, solutions, constraints, and challenges for a cloud security, application security, and vulnerability management program Match Veracode solutions to customer's technical, security, and business needs. Assist and advise on the effective use of Veracode security ...

Offensive Security Engineer

Hiring Organisation
CHAMP Cargosystems
Location
Reading, England, United Kingdom
CHAMP Cargosystems provides the most comprehensive range of integrated IT solutions and distribution services for the air cargo transport chain. Our portfolio spans core management systems, messaging services, and eCargo solutions. These include applications designed to meet customs and security requirements, quality optimization, as well as e-freight … Engineer to establish and guide our Product Security Team. The successful candidate will drive our penetration testing capability, our secure software development practices, oversee vulnerability remediation, and build automated offensive security capabilities integrated into our agile CI/CD environment. Working within the SCRUM methodology, the Offensive Security Engineer ...

Software Factory Administrator

Hiring Organisation
Mastek
Location
Reading, England, United Kingdom
Administration: • Lead the creation and maturation of the Software Factory and its supporting toolchain, including GitLab and associated CI/CD environments. • Undertake associated management activities, including user training, administration, onboarding, and ongoing operational support. • Manage and maintain Software Factory environments, ensuring security, performance, and availability across multiple projects. … Oversee configuration, access control, and repository management across GitLab, Nexus, Jenkins, or similar systems. • Monitor systems, manage infrastructure, automate routine tasks, and collaborate with software teams to ensure the smooth operation of software development and deployment pipelines. • Maintain integration with monitoring and logging tools (e.g. Prometheus, Grafana, ELK stack ...