Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Thames Water offices as required Working More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Buckinghamshire, England, United Kingdom Hybrid / WFH Options
identifi Global Resources
ll thrive in a change-oriented environment, stay ahead of emerging threats through horizon scanning, and push for continuous improvement across key areas like vulnerabilitymanagement, incident response, and SOC assurance. If you don't settle for second best and are passionate about embedding a culture of excellence … is your opportunity to make a meaningful impact. Key Responsibilities Security Operations Oversight: Lead day-to-day security operations including monitoring, threat analysis, and vulnerability management. Provide updates to the Head of Information Security and Executive Security Steering Group. Drive Key Improvements: Lead strategic efforts to enhance vulnerabilitymanagement confidence, improve incident response capability, and increase assurance around SOC operations. Change Leadership: Actively contribute to the implementation of the new Security TOM, championing change, innovation, and security best practice. Risk & Compliance: Collaborate with Privacy, Risk, and Audit teams to ensure compliance with regulatory requirements and internal More ❯
We have an exciting new role for a proactive and technically capable Security Vulnerability Lead to join our VulnerabilityManagement team on a 1-year fixed-term contract to cover maternity leave. We are seeking a candidate with experience in a similar security vulnerability-focused role … engagement with business units, ensuring a robust security posture for high-value assets. The role requires strong organizational skills and a solid understanding of vulnerabilitymanagement practices, with the ability to communicate effectively with both technical and non-technical stakeholders. Who we are Virgin Media O2 is the … and inclusion into everything we do, supporting you to be your authentic self throughout your application journey. The must-haves Proven experience in a vulnerabilitymanagement-focused role Strong organizational and prioritization skills, especially in fast-paced, high-risk IT/security environments Ability to interpret technical vulnerabilityMore ❯
SOC) , with one analyst reporting to you Oversee incident response , manage security incidents from detection to resolution Work closely with the compliance manager on vulnerabilitymanagement Architect secure solutions, validate baseline configurations, and recommend improvements to stay compliant Collaborate with key stakeholders including Compliance and Infrastructure teams Required … network security and firewalls Exposure to PenTesting methodologies or practices (desirable) Experience with NAC solutions like Cisco ISE , ForeScout , or similar Strong grasp of vulnerabilitymanagement processes Desired Certifications Microsoft Security certifications (preferred) CISM or CISSP (beneficial, not essential) Apply now or reach out for a confidential chat More ❯
of best-in-class security operations across the business. 🔍 Microsoft Security Engineer Key Responsibilities: Oversee the end-to-end security monitoring process, including log management, threat detection, and response using tools like Microsoft Sentinel . Drive vulnerabilitymanagement efforts and support remediation in collaboration with IT teams. … and external partners as needed. Maintain and continuously improve security controls across Microsoft Defender, Azure, Intune, and Purview. Design and implement identity and access management solutions with a security-first mindset. Support compliance initiatives across ISO 27001, Cyber Essentials, GDPR, and DPA. Align system configurations (Windows, Linux, network) with More ❯
procedures Work collaboratively with cross-functional teams to align IT operations with business needs and objectives Ensure IT security best practices, performing risk assessments, vulnerabilitymanagement, and maintaining compliance with frameworks such as ISO 27001, NIST & CIS. Contribute to IT infrastructure projects, ensuring on-time delivery, documentation, and … VLANs, routing protocols VPNs, zero-trust and firewall administration Proficient cloud experience with AWS and/or Azure, including networking, security, IaaS and performance management Strong communication skills, capable of translating technical concepts to non-technical audiences Experience in team leadership or technical mentoring, supporting the development of junior … automation and Infrastructure as Code (IaC) tools such as Terraform, Ansible, or Salt Strong scripting skills (e.g. PowerShell, Bash, Python) for automation and system management Knowledge of virtualization and containerization technologies, including Hyper-V, Docker and Kubernetes (K8s) Experience with Microsoft Defender and Microsoft Purview for threat protection, security More ❯
of best-in-class security operations across the business. Microsoft Security Engineer Key Responsibilities: Oversee the end-to-end security monitoring process, including log management, threat detection, and response using tools like Microsoft Sentinel . Drive vulnerabilitymanagement efforts and support remediation in collaboration with IT teams. More ❯
High Wycombe, England, United Kingdom Hybrid / WFH Options
identifi Global Resources
ll thrive in a change-oriented environment, stay ahead of emerging threats through horizon scanning, and push for continuous improvement across key areas like vulnerabilitymanagement, incident response, and SOC assurance. If you don't settle for second best and are passionate about embedding a culture of excellence More ❯
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
comply with Baseline Security Requirements and security policy. Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & Access Management, SIEM and Vulnerability Management. Ensure internal customers, external suppliers and delivery partners are aware of security standards and future … of IT and telecommunications solutions. Competent in applying security policies and principles defined in security architecture to real world scenarios. Understands and applies risk management principles. Effective communication skills to influence stakeholders and explain complex security requirements in simple terms. Stakeholder Management - established as the go-to person More ❯