Permanent Vulnerability Management Jobs in the South East

1 to 25 of 35 Permanent Vulnerability Management Jobs in the South East

Senior Cyber Threat Intelligence Analyst

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
Thames Water Utilities Limited
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerability management (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Thames Water offices as required Working More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Threat Intelligence Analyst

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerability management (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Employment Type: Permanent
Salary: GBP 60,000 - 65,000 Annual
Posted:

Cyber Threat Intelligence Analyst

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerability management (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Employment Type: Permanent
Salary: £60000 - £65000/annum Company benefits
Posted:

Security Operations Manager

Buckinghamshire, England, United Kingdom
Hybrid / WFH Options
identifi Global Resources
ll thrive in a change-oriented environment, stay ahead of emerging threats through horizon scanning, and push for continuous improvement across key areas like vulnerability management, incident response, and SOC assurance. If you don't settle for second best and are passionate about embedding a culture of excellence … is your opportunity to make a meaningful impact. Key Responsibilities Security Operations Oversight: Lead day-to-day security operations including monitoring, threat analysis, and vulnerability management. Provide updates to the Head of Information Security and Executive Security Steering Group. Drive Key Improvements: Lead strategic efforts to enhance vulnerability management confidence, improve incident response capability, and increase assurance around SOC operations. Change Leadership: Actively contribute to the implementation of the new Security TOM, championing change, innovation, and security best practice. Risk & Compliance: Collaborate with Privacy, Risk, and Audit teams to ensure compliance with regulatory requirements and internal More ❯
Posted:

SOC Analyst

Farnborough, Hampshire, United Kingdom
Sixworks
a challenging, vastly interesting, and technically diverse role. Key Responsibilities and Tasks Leading shifts throughout 24/7 SOC Service Delivery Providing oversight and management to Junior Analysts Monitoring of Systems for Security Alerts, Intrusions or activity considered to be unauthorised, unexpected or illegal Responding to incidents, utilising a … incidents to Tier 2 Incident Response Teams Review and develop existing security controls in line with a constantly growing technical environment Triage and Review Vulnerability Scanning Reports, feeding results back into technical teams Review Secure Configurations, feeding back into technical teams for remediations of issues Generate recurring service and … develop understanding of security as a discipline Experience (Essential) Previous experience in Security, SOC or related technical field with desired, specific focus on Incident Management Vulnerability Management Relevant qualification(s) in Cyber Security, or other related technical roles Examples Degree in Cyber Security, Computer Science, Networks etc. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Vulnerability Lead - 12 month maternity cover

Reading, Oxfordshire, United Kingdom
Virgin Media Ltd
We have an exciting new role for a proactive and technically capable Security Vulnerability Lead to join our Vulnerability Management team on a 1-year fixed-term contract to cover maternity leave. We are seeking a candidate with experience in a similar security vulnerability-focused role … engagement with business units, ensuring a robust security posture for high-value assets. The role requires strong organizational skills and a solid understanding of vulnerability management practices, with the ability to communicate effectively with both technical and non-technical stakeholders. Who we are Virgin Media O2 is the … and inclusion into everything we do, supporting you to be your authentic self throughout your application journey. The must-haves Proven experience in a vulnerability management-focused role Strong organizational and prioritization skills, especially in fast-paced, high-risk IT/security environments Ability to interpret technical vulnerability More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Information Security Analyst

West Malling, England, United Kingdom
Clearwater People Solutions Ltd
someone with broad security expertise who enjoys variety and continual development. You’ll take the lead on: First and second line security operations, including vulnerability management Investigating and responding to security incidents Ensuring policies and procedures remain aligned to industry best practice Providing assurance that security controls are … Key skills for the Senior Information Security Analyst: Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerability management, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid More ❯
Posted:

Senior Cyber Security Consultant

Dartford, Kent, United Kingdom
Goaco Ltd
working with the Ministry of Defence (MOD). The ideal candidate must possess DV Clearance and have a deep understanding of secure systems, risk management, and cyber security best practices within a defence environment. RESPONSIBILITIES Provide technical cyber security consultancy to public and private sector clients. Perform security assessments … penetration testing, and vulnerability management to protect critical systems. Design, implement, and maintain security architectures and frameworks aligned with government standards. Lead and support risk assessments, threat modelling, and incident response initiatives. Work closely with stakeholders to ensure compliance with NCSC and other relevant security policies. Develop and … Ministry of Defence. Strong technical expertise in areas such as network security, endpoint security, cloud security, and secure system architecture. Experience in penetration testing, vulnerability management, and cyber threat intelligence. Solid knowledge of security technologies such as SIEM, IDS/IPS, firewalls, and endpoint detection and response (EDR More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Manager

Buckinghamshire, England, United Kingdom
McGregor Boyall
SOC) , with one analyst reporting to you Oversee incident response , manage security incidents from detection to resolution Work closely with the compliance manager on vulnerability management Architect secure solutions, validate baseline configurations, and recommend improvements to stay compliant Collaborate with key stakeholders including Compliance and Infrastructure teams Required … network security and firewalls Exposure to PenTesting methodologies or practices (desirable) Experience with NAC solutions like Cisco ISE , ForeScout , or similar Strong grasp of vulnerability management processes Desired Certifications Microsoft Security certifications (preferred) CISM or CISSP (beneficial, not essential) Apply now or reach out for a confidential chat More ❯
Posted:

Director Tech Control Management Risk Advisor

Burgess Hill, Sussex, United Kingdom
American Express
Risk related activities which arise based on the needs of the business unit or broader Technology Risk and Information Security organization Assist regulatory exam management related to Technology Risk and Information Security Assess the needs of the Business Unit to ensure sufficient understanding of Operational Risk Management and … communication, early engagement in new products and projects, regulatory engagement, information security and technology risk consultation. Minimum Qualifications: 5+ years' experience in operational risk management (e.g., within Risk and/or Internal Audit function) with strong understanding of critical operational risk management lifecycle activities Excellent project management … and evaluate risk scenarios effectively Experience in Information Security Risk and Technology Audit. Relevant Experience and Skills: Information Security, Operational Risk or Technology Risk Management leadership experience Experience working with Regulators and in complex regulated businesses is an asset Broad understanding of information security disciplines with emphasis on vulnerability More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Architect

Southampton, England, United Kingdom
Pearson Whiffin Recruitment Group
for a Security Architect, min requirement is to be BPSS cleared and happy to go through Security Clearance. We need someone with experience of Vulnerability Management solutions such as Tenable or Qualys with a strong knowledge of network security solutions, ITIL and Service Management all within a … Experience: Strong background in IT Security design, ability to look over blueprints and make suggested technical changes to meet business needs. Strong background in vulnerability management with strong Tenalbe or Qualys. Happy to go through security clearance, with current BPSS (Baseline Personnel Security Standard) a minimum. Strong knowledge More ❯
Posted:

Junior SOC Analyst

Farnborough, Hampshire, United Kingdom
Sixworks
established playbooks Escalating complex incidents to Tier 2 Incident Response Teams Reviewing and developing security controls in a growing technical environment Triaging and reviewing vulnerability scanning reports, providing feedback to technical teams Reviewing secure configurations and feeding back for remediations Generating recurring security reports for stakeholders Providing feedback for … a degree in Cyber Security, Computer Science, Networks, etc. Professional qualifications from organizations like CompTIA, ISACA, etc. Technical qualifications such as cloud computing, SIEM, vulnerability management, etc. Experience (Nice to have) Understanding of concepts like cloud computing, incident management, risk management, information security (CIA), phishing, ransomware … and skilled IT professionals, committed to digital innovation. We excel in areas like Secure-by-Design, cloud computing, network design, rapid application development, cyber vulnerability mitigation, and intelligence systems. We offer independent consultancy and champion open-source technologies. A word on UK Security Clearance Due to the secure nature More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Architects (DV Security Clearance)

Reading, South East
CGI
frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management More ❯
Employment Type: Permanent
Posted:

Senior Microsoft Security Engineer

Buckinghamshire, England, United Kingdom
X4 Technology
of best-in-class security operations across the business. 🔍 Microsoft Security Engineer Key Responsibilities: Oversee the end-to-end security monitoring process, including log management, threat detection, and response using tools like Microsoft Sentinel . Drive vulnerability management efforts and support remediation in collaboration with IT teams. … and external partners as needed. Maintain and continuously improve security controls across Microsoft Defender, Azure, Intune, and Purview. Design and implement identity and access management solutions with a security-first mindset. Support compliance initiatives across ISO 27001, Cyber Essentials, GDPR, and DPA. Align system configurations (Windows, Linux, network) with More ❯
Posted:

Information Security Analyst - Audit, Compliance & Cybersecurity

Southampton, Hampshire, United Kingdom
Hybrid / WFH Options
NICE
response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits. Gap Assessments: Facilitate and/or conduct internal … Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security … the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. Vulnerability Management: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Consultant

Dartford, Kent, United Kingdom
Goaco Ltd
across various platforms. The consultant will play a critical role in evaluating and strengthening our clients' cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with … develop, document, and implement security policies, standards, and guidelines aligned with industry standards (e.g., ISO 27001, NIST). Assist in the deployment, configuration, and management of security infrastructure and technologies, including firewalls, intrusion detection/prevention systems, and secure network architectures. Provide guidance and support on Azure security practices … including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerability management, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Consultant

Crawley, England, United Kingdom
Gattaca
tailored for experienced professionals with a strong track record in delivering complex cybersecurity projects. This role demands in-depth expertise in threat intelligence, risk management, incident response, compliance, and security architecture. The consultant will lead project teams, shape technical strategies, and mentor junior team members while working cross-functionally … collaboration. Business Development Support Contribute to business development efforts by supporting proposal creation, presentations, and identifying areas for growth in cyber resilience services. Knowledge Management Promote and contribute to the creation of reusable assets, documentation, and best practices to strengthen the knowledge base within the cyber resilience practice. Required … Skills & Qualifications Technical Expertise Deep understanding of threat intelligence, risk management, incident response, compliance (e.g., GDPR, ISO 27001), and security architecture. Experience with a range of security technologies including: SIEM (e.g., Rapid7 InsightIDR) XDR (e.g., SentinelOne) Firewalls (e.g., Fortinet) Vulnerability Management (e.g., Rapid7 InsightVM) PAM (e.g., Delinea More ❯
Posted:

Senior Information Security Analyst

Maidstone, England, United Kingdom
Hybrid / WFH Options
Tiger Resourcing Group
of hands-on technical skills and strategic thinking. 🔧 What You'll Be Doing: Support and improve day-to-day security operations, incident response, and vulnerability management. Lead on security investigations and ensure remediation is aligned with industry best practices. Conduct risk assessments and provide security consultancy for technical projects More ❯
Posted:

Lead Software Security Engineer

Middlesex, United Kingdom
BDO UK
companies that are Britain's economic engine - ambitious, entrepreneurially-spirited and high growth businesses that fuel the economy - and directly advise the owners and management teams that lead them. We'll broaden your horizons To ensure our services and applications are fit for the modern market, our IT team … join our team. You will have a strong background in software development, security, and operations. This role is required to support the Digital Product Management team in embedding security requirements and best practices into new Digital Products and Services. You will work closely with the Digital Product Management … etc. Collaborate with development teams to integrate security best practices into the secure software development lifecycle (SDLC) and ensure products are built securely Oversee vulnerability management and remediation efforts, including leading responses to pen test findings and security assessments Experience conducting risk assessments and threat modelling for software More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Technology Operations Engineer

Buckinghamshire, England, United Kingdom
Pen Test Partners
procedures Work collaboratively with cross-functional teams to align IT operations with business needs and objectives Ensure IT security best practices, performing risk assessments, vulnerability management, and maintaining compliance with frameworks such as ISO 27001, NIST & CIS. Contribute to IT infrastructure projects, ensuring on-time delivery, documentation, and … VLANs, routing protocols VPNs, zero-trust and firewall administration Proficient cloud experience with AWS and/or Azure, including networking, security, IaaS and performance management Strong communication skills, capable of translating technical concepts to non-technical audiences Experience in team leadership or technical mentoring, supporting the development of junior … automation and Infrastructure as Code (IaC) tools such as Terraform, Ansible, or Salt Strong scripting skills (e.g. PowerShell, Bash, Python) for automation and system management Knowledge of virtualization and containerization technologies, including Hyper-V, Docker and Kubernetes (K8s) Experience with Microsoft Defender and Microsoft Purview for threat protection, security More ❯
Posted:

Cyber Engineer

Farnborough, Hampshire, United Kingdom
Hybrid / WFH Options
Thebusinessyear
expertise and strategic planning to prevent attacks and vulnerabilities. Your responsibilities include planning and implementing security controls to safeguard information. Key functions/outputs: Vulnerability Scanning & Reporting Change Work Participation in Regular Meetings Documentation Main Objectives: Vulnerability Scanning & Reporting Conduct regular vulnerability scans, generate reports, and ensure … tools are current to identify system weaknesses. Perform code scans, vulnerability management scans, and assist in reporting to the cyber security team. Update endpoint protection, ensure antivirus and anti-malware are current, and audit network controls and access permissions. Recognize and respond to potential incidents, including containment and … SITT and perform security testing and assurance activities during planning phases. Participation in Regular Meetings: Lead or attend meetings such as Security Working Groups, Vulnerability Triage, Security Workshops, PI Planning, and Daily Standups, providing cybersecurity input. Documentation: Create and maintain detailed security documentation including design documents, SOPs, and compliance More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer

Portsmouth, Hampshire, United Kingdom
Hybrid / WFH Options
G2 Ops, Inc
plus benefits Openings: 2 Full-Time Roles Knowledge Requirements: Understanding of C4ISR architectures and information-assurance principles Familiarity with DoD Risk Management Framework (RMF) and accreditation processes Experience with system and network security analysis on NIPRNet, SIPRNet, etc. Knowledge of DoD 8570.01-M IAT requirements Proficiency with cybersecurity tools … a motivated, team-oriented Information Systems Security Engineer to work on cybersecurity governance, risk, and compliance, supporting DoD projects involving security controls, risk assessments, vulnerability management, cloud security, policy development, and system analysis. Must have or be eligible for a DoD Secret clearance and IA Technical II certification More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Information Security Analyst

Kings Hill, Kent, United Kingdom
Pearson Whiffin Recruitment Ltd
Information Security Analyst working as part of a central team supporting a mixture of security operations ensuring compliance with business needs. This will involve vulnerability management, making sure security controls are functioning, mentorship of more junior members and working as part of a 24 x 7 remote support More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Information Security Analyst

Maidstone, West Malling, Kent, United Kingdom
Pearson Whiffin Recruitment Ltd
Information Security Analyst working as part of a central team supporting a mixture of security operations ensuring compliance with business needs. This will involve vulnerability management, making sure security controls are functioning, mentorship of more junior members and working as part of a 24 x 7 remote support More ❯
Employment Type: Permanent
Posted:

Senior Microsoft Security Engineer

High Wycombe, England, United Kingdom
X4 Technology
of best-in-class security operations across the business. Microsoft Security Engineer Key Responsibilities: Oversee the end-to-end security monitoring process, including log management, threat detection, and response using tools like Microsoft Sentinel . Drive vulnerability management efforts and support remediation in collaboration with IT teams. More ❯
Posted:
Vulnerability Management
the South East
10th Percentile
£41,850
25th Percentile
£49,000
Median
£55,000
75th Percentile
£57,500
90th Percentile
£87,650