Permanent Vulnerability Management Jobs in the Thames Valley

12 of 12 Permanent Vulnerability Management Jobs in the Thames Valley

Senior Cyber Threat Intelligence Analyst

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
Thames Water Utilities Limited
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerability management (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Thames Water offices as required Working More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Threat Intelligence Analyst

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerability management (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Employment Type: Permanent
Salary: GBP 60,000 - 65,000 Annual
Posted:

Cyber Threat Intelligence Analyst

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerability management (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Employment Type: Permanent
Salary: £60000 - £65000/annum Company benefits
Posted:

Security Operations Manager

Buckinghamshire, England, United Kingdom
Hybrid / WFH Options
identifi Global Resources
ll thrive in a change-oriented environment, stay ahead of emerging threats through horizon scanning, and push for continuous improvement across key areas like vulnerability management, incident response, and SOC assurance. If you don't settle for second best and are passionate about embedding a culture of excellence … is your opportunity to make a meaningful impact. Key Responsibilities Security Operations Oversight: Lead day-to-day security operations including monitoring, threat analysis, and vulnerability management. Provide updates to the Head of Information Security and Executive Security Steering Group. Drive Key Improvements: Lead strategic efforts to enhance vulnerability management confidence, improve incident response capability, and increase assurance around SOC operations. Change Leadership: Actively contribute to the implementation of the new Security TOM, championing change, innovation, and security best practice. Risk & Compliance: Collaborate with Privacy, Risk, and Audit teams to ensure compliance with regulatory requirements and internal More ❯
Posted:

Security Vulnerability Lead - 12 month maternity cover

Reading, Oxfordshire, United Kingdom
Virgin Media Ltd
We have an exciting new role for a proactive and technically capable Security Vulnerability Lead to join our Vulnerability Management team on a 1-year fixed-term contract to cover maternity leave. We are seeking a candidate with experience in a similar security vulnerability-focused role … engagement with business units, ensuring a robust security posture for high-value assets. The role requires strong organizational skills and a solid understanding of vulnerability management practices, with the ability to communicate effectively with both technical and non-technical stakeholders. Who we are Virgin Media O2 is the … and inclusion into everything we do, supporting you to be your authentic self throughout your application journey. The must-haves Proven experience in a vulnerability management-focused role Strong organizational and prioritization skills, especially in fast-paced, high-risk IT/security environments Ability to interpret technical vulnerability More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Manager

Buckinghamshire, England, United Kingdom
McGregor Boyall
SOC) , with one analyst reporting to you Oversee incident response , manage security incidents from detection to resolution Work closely with the compliance manager on vulnerability management Architect secure solutions, validate baseline configurations, and recommend improvements to stay compliant Collaborate with key stakeholders including Compliance and Infrastructure teams Required … network security and firewalls Exposure to PenTesting methodologies or practices (desirable) Experience with NAC solutions like Cisco ISE , ForeScout , or similar Strong grasp of vulnerability management processes Desired Certifications Microsoft Security certifications (preferred) CISM or CISSP (beneficial, not essential) Apply now or reach out for a confidential chat More ❯
Posted:

Security Architects (DV Security Clearance)

Reading, South East
CGI
frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management More ❯
Employment Type: Permanent
Posted:

Senior Microsoft Security Engineer

Buckinghamshire, England, United Kingdom
X4 Technology
of best-in-class security operations across the business. 🔍 Microsoft Security Engineer Key Responsibilities: Oversee the end-to-end security monitoring process, including log management, threat detection, and response using tools like Microsoft Sentinel . Drive vulnerability management efforts and support remediation in collaboration with IT teams. … and external partners as needed. Maintain and continuously improve security controls across Microsoft Defender, Azure, Intune, and Purview. Design and implement identity and access management solutions with a security-first mindset. Support compliance initiatives across ISO 27001, Cyber Essentials, GDPR, and DPA. Align system configurations (Windows, Linux, network) with More ❯
Posted:

Information Technology Operations Engineer

Buckinghamshire, England, United Kingdom
Pen Test Partners
procedures Work collaboratively with cross-functional teams to align IT operations with business needs and objectives Ensure IT security best practices, performing risk assessments, vulnerability management, and maintaining compliance with frameworks such as ISO 27001, NIST & CIS. Contribute to IT infrastructure projects, ensuring on-time delivery, documentation, and … VLANs, routing protocols VPNs, zero-trust and firewall administration Proficient cloud experience with AWS and/or Azure, including networking, security, IaaS and performance management Strong communication skills, capable of translating technical concepts to non-technical audiences Experience in team leadership or technical mentoring, supporting the development of junior … automation and Infrastructure as Code (IaC) tools such as Terraform, Ansible, or Salt Strong scripting skills (e.g. PowerShell, Bash, Python) for automation and system management Knowledge of virtualization and containerization technologies, including Hyper-V, Docker and Kubernetes (K8s) Experience with Microsoft Defender and Microsoft Purview for threat protection, security More ❯
Posted:

Senior Microsoft Security Engineer

High Wycombe, England, United Kingdom
X4 Technology
of best-in-class security operations across the business. Microsoft Security Engineer Key Responsibilities: Oversee the end-to-end security monitoring process, including log management, threat detection, and response using tools like Microsoft Sentinel . Drive vulnerability management efforts and support remediation in collaboration with IT teams. More ❯
Posted:

Security Operations Manager

High Wycombe, England, United Kingdom
Hybrid / WFH Options
identifi Global Resources
ll thrive in a change-oriented environment, stay ahead of emerging threats through horizon scanning, and push for continuous improvement across key areas like vulnerability management, incident response, and SOC assurance. If you don't settle for second best and are passionate about embedding a culture of excellence More ❯
Posted:

Cyber Security Consultant IT & Digital

Newbury, Berkshire, United Kingdom
Hybrid / WFH Options
Vodafone
comply with Baseline Security Requirements and security policy. Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & Access Management, SIEM and Vulnerability Management. Ensure internal customers, external suppliers and delivery partners are aware of security standards and future … of IT and telecommunications solutions. Competent in applying security policies and principles defined in security architecture to real world scenarios. Understands and applies risk management principles. Effective communication skills to influence stakeholders and explain complex security requirements in simple terms. Stakeholder Management - established as the go-to person More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Vulnerability Management
the Thames Valley
10th Percentile
£47,000
25th Percentile
£63,125
Median
£90,500
75th Percentile
£93,250