Permanent Vulnerability Management Jobs in the South West

1 to 25 of 86 Permanent Vulnerability Management Jobs in the South West

EUC Engineer

bristol, south west england, United Kingdom
Wipro
of application patching schedules for the client estate Keeping up to date with and leveraging the latest Microsoft technologies into our policy and systems management Manage end user system builds, images and remote deployment and asset management toolsets Support and maintain telephony systems and other corporate IT services … a wide breadth and depth of desktop and hardware support experience in a similar technical role. You will have a robust background in the management and provision of Microsoft Windows clients and end user systems, with experience in Microsoft 365 and Exchange Online tenant administration. 1st/2nd line … things through, end to end, including the investigation of possible solutions, documenting processes and contributing to the success of the team. Desirable: Mobile Device Management experience using Intune/Endpoint Manager Foundation certification or knowledge of the ITIL framework Experience in management/support of telecoms systems Microsoft More ❯
Posted:

EUC Engineer

taunton, south west england, United Kingdom
Wipro
of application patching schedules for the client estate Keeping up to date with and leveraging the latest Microsoft technologies into our policy and systems management Manage end user system builds, images and remote deployment and asset management toolsets Support and maintain telephony systems and other corporate IT services … a wide breadth and depth of desktop and hardware support experience in a similar technical role. You will have a robust background in the management and provision of Microsoft Windows clients and end user systems, with experience in Microsoft 365 and Exchange Online tenant administration. 1st/2nd line … things through, end to end, including the investigation of possible solutions, documenting processes and contributing to the success of the team. Desirable: Mobile Device Management experience using Intune/Endpoint Manager Foundation certification or knowledge of the ITIL framework Experience in management/support of telecoms systems Microsoft More ❯
Posted:

EUC Engineer

bath, south west england, United Kingdom
Wipro
of application patching schedules for the client estate Keeping up to date with and leveraging the latest Microsoft technologies into our policy and systems management Manage end user system builds, images and remote deployment and asset management toolsets Support and maintain telephony systems and other corporate IT services … a wide breadth and depth of desktop and hardware support experience in a similar technical role. You will have a robust background in the management and provision of Microsoft Windows clients and end user systems, with experience in Microsoft 365 and Exchange Online tenant administration. 1st/2nd line … things through, end to end, including the investigation of possible solutions, documenting processes and contributing to the success of the team. Desirable: Mobile Device Management experience using Intune/Endpoint Manager Foundation certification or knowledge of the ITIL framework Experience in management/support of telecoms systems Microsoft More ❯
Posted:

Information Security Engineer Engineering Team Bristol Office

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
Duel
Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerability scanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development process. Assist in securing … to security compliance frameworks such as ISO 27001 or SOC 2, even if not previously responsible for certification processes. Experience working within security risk management, vulnerability tracking, or operational security efforts. Prior experience working with engineering teams on security topics is beneficial, particularly around secure development practices. Ability … or Vanta. Experience working with pen testing and bug bounties a plus. Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerability management solutions. Experience or knowledge of cloud security (AWS, GCP, or Azure). Awareness of security best practices in application and infrastructure security. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cyber Security Consultant Benefact Group Gloucester

Gloucester, Gloucestershire, United Kingdom
Hybrid / WFH Options
Benefact Group plc
solutions that align with security and project requirements by articulating the real-world cyber security risks associated. You will also be responsible for our Vulnerability Management program ensuring that agreed SLAs are achieved and provide consultation when solutions are not straight forward. As the Senior Cyber Security Consultant … matter expertise for internal projects and stakeholders, identifying risks and advising on the correct approach to mitigate those risks You will have responsibility for Vulnerability Management managing outputs from internal tooling and external vendors in order to prioritise remediation by relevant internal parties in order to ensure the … inclusive, supportive and engaged learning environment, being a key contributor to a high performing and professional Security Team. Knowledge, skills and experience Strong stakeholder management skills A strong understanding of enterprise ICT and security principles A strong understanding of cloud security concepts and technologies Understanding of the CI/ More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IP Network Engineer

Devon, United Kingdom
Search-Select LTD
Our client seeks a IP Network Engineer to join their team. Role Profile: To be responsible for the engineering provision, development, management, and maintenance of the IP & MPLS networks, Corporate LAN, broadband RADIUS & BNGs, DDoS protection and related systems and platforms. To propose and develop appropriate operational, maintenance and … testing and implementation of enhancements and new technologies for IP & MPLS networks Implement and evaluate IP & MPLS related solutions/technologies Liaise with Product Management, Service Management and other internal teams as required Assist the management team, as required, with the preparation of performance, growth, and budgeting … strategy is implemented. If/when potential weaknesses, attacks, intrusions, unusual, unauthorised or illegal activity are identified, assist in the implementation of mitigations, including vulnerability management Investigate security alerts and provide incident response within the IP domain Support as required, from within the IP domain, integration with the More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Enterprise Security Architect - HMRC - G6

Bristol, North Somerset, South West
Government Digital & Data
of modern technology meeting HMRC's business driven need towards rationalised strategic platforms.

In addition, you may be encouraged to undertake line management responsibilities developing and managing a team.??

You may be expected to own and develop CSTS capabilities and/or services.

Focused expertise to develop and lead within one or many security technology domains aligning capability to security tooling. Key stakeholder management experience across senior business and technical environments including vendors, partners and other government departments. Able to demonstrate a proven history of delivering … Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors More ❯
Employment Type: Permanent
Salary: £68,966 - £84,854
Posted:

Security Architects (DV Security Clearance)

Bristol, South West
CGI
frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management and More ❯
Employment Type: Permanent
Posted:

Security Architect

Thornbury, Gloucestershire, United Kingdom
Applicable Limited
to market' propositions and service offerings. Leading in the development and presentation of compelling client proposals collaborating with teams across our business. Strong stakeholder management and relationship building skills at senior levels that will enable consensus building in the shaping of secure client solutions Shaping, leading and delivering value … engagements. Providing security expertise across security standards and accreditations, measure and control the effectiveness of the security controls framework and maintain the Information Security Management System. Deriving and delivering documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies. Standards and … identification of identified risks and emerging cyber security vulnerabilities and threats. The subsequent analysis to quantify and lead risk mitigation plans Work with Service Management to ensure that partners and suppliers adhere to agreed standards, policies and verify/evidence appropriate compliance and security KPIs Work closely with 1st More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Consultant (Security Operations / SOC)

bristol, south west england, United Kingdom
Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Posted:

Security Consultant (Security Operations / SOC)

bath, south west england, United Kingdom
Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Posted:

Security Consultant (Security Operations / SOC)

plymouth, south west england, United Kingdom
Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Posted:

Security Consultant (Security Operations / SOC)

exeter, south west england, United Kingdom
Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Posted:

Security Consultant (Security Operations / SOC)

cheltenham, south west england, United Kingdom
Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Posted:

Security Consultant (Security Operations / SOC)

gloucester, south west england, United Kingdom
Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Posted:

Security Consultant (Security Operations / SOC)

bournemouth, south west england, United Kingdom
Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Posted:

Security Consultant (Security Operations / SOC)

south west london, south east england, United Kingdom
Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Posted:

Security Consultant (Security Operations / SOC)

swindon, wiltshire, south west england, United Kingdom
Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Posted:

Senior Network and Infrastructure Engineer

South West London, London, United Kingdom
Hybrid / WFH Options
La Fosse
environment as well as experience in firewall upgrades, network upgrades and wifi upgrades. This role will also manage a couple of junior engineers (no management experience necessary). The role is based in Westminster with 1-2 days working from home. Further detail: To configure, maintain, secure & develop the … models for membership services, commercial activities, Events & Charity. To provide technical infrastructure support of all server, cloud, security and networking platforms. Maintain effective data management, backup and DR capabilities, and provide elevated support assistance to helpdesk where needed, both within local offices and remote sites to enable all users … daily job functions to the optimum level. To manage the MIS Servicedesk. Responsible for the configuration and maintenance of the group helpdesk ticketing platform. Management of ticket lifecycles, technician work load balancing and reporting. IT Infrastructure Management : Oversee the smooth operation of the Group IT infrastructure, ensuring stability More ❯
Employment Type: Permanent, Work From Home
Salary: £70,000
Posted:

Security Architect

Luton, south west england, United Kingdom
Hybrid / WFH Options
Advanced Resource Managers
with infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerability management Your skillset may include: Proven experience as a Security Architect supporting major infrastructure transformation … with cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation, communication, and stakeholder engagement More ❯
Posted:

Cyber Security Engineer

Stroud, England, United Kingdom
Hybrid / WFH Options
Ecotricity
Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Linux Operating Systems On-Premise Active Directory Networking - Cisco/Fortigate Penetration Testing & Vulnerability Management Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate for this … be working towards a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (ie. NIST or Cyber Security Essentials). Knowledge of vulnerability databases (ie. NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tooling. Experience using Code Security scanning More ❯
Posted:

Cyber Security Engineer

Stroud, south east england, United Kingdom
Hybrid / WFH Options
Ecotricity
Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Linux Operating Systems On-Premise Active Directory Networking - Cisco/Fortigate Penetration Testing & Vulnerability Management Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate for this … be working towards a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (ie. NIST or Cyber Security Essentials). Knowledge of vulnerability databases (ie. NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tooling. Experience using Code Security scanning More ❯
Posted:

Microsoft Cloud Security Engineer

bristol, south west england, United Kingdom
Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
Posted:

Microsoft Cloud Security Engineer

bath, south west england, United Kingdom
Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
Posted:

Microsoft Cloud Security Engineer

plymouth, south west england, United Kingdom
Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
Posted:
Vulnerability Management
the South West
10th Percentile
£44,375
25th Percentile
£46,250
Median
£55,000
75th Percentile
£57,543
90th Percentile
£62,585