Permanent Vulnerability Management Jobs in the UK

1 to 25 of 122 Permanent Vulnerability Management Jobs in the UK

Senior Security Engineer, Infrastructure

London, England, United Kingdom
Ripple Labs
and strategic related issues related to information security systems and services Collaborate with product owners and engineering teams to ensure smooth transition of the Vulnerability Management technologies into production and ensure maximum visibility into a variety of environments Work closely with engineering to identify opportunities for automation eliminating … service available across AWS, GPC and other public cloud providers Responsible for maintaining current versions of functionalities and technologies in production by effecting change management processes Proactively participate in compliance support activities such as trainings, audit prep, playbook authoring and ensure business as usual (BAU) activities are completed accurately … Familiarity with the CIS benchmarks and how to monitor and remidiate deficiencies Experience in Cloud Computing like AWS, GCP with emphasis on Cloud Baseline management tools like Lacework Experience in Information Security frameworks and best practices for Vulnerability management, Risk Analysis, Reporting Metrics and Assessments Problem solving more »
Posted:

Security Analyst

Doncaster, England, United Kingdom
Forward Role Recruitment
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and Vulnerability Management tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Posted:

Infrastructure security engineer

London Area, United Kingdom
Lorien
includes the provision of escalation security support to the Service Desk, Desktop Support, participation in Infrastructure Security projects and being responsible for Information Security Management System (ISMS) maintenance. Key Responsibilities/Accountabilities Taking responsibility for leading, guiding, supporting and delivering secure architectural design for the group cyber security maturity … or multiple offices location in order to complete your tasks for off the network countries. Knowledge and Experience Experience in Azure cloud and identity management solutions. Specific focus on network equipment. Palo Alto Firewall, Imperva WAF and NAC experience Netskope proxy and CASB experience Microsoft Defender and Crowdstrike experience … SSO & MFA gateway Data loss prevention tools experience Azure security centre and Wiz io experience Cymulate and Ping Castel experience SCCM or enterprise patch management tools TenableOne or enterprise vulnerability management tools Sound knowledge of industry best practices such as OWASP, Cyber security framework and NCSC guidance more »
Posted:

Information Security Manager

Leatherhead, England, United Kingdom
Hybrid / WFH Options
Zest
to processing personal data with the highest level of diligence, and you’ll play a pivotal role in maintaining and enhancing our robust infosec management system, acquiring and upholding security certifications, fulfilling the role of our Data Protection Officer and ensuring we have appropriate controls to mitigate risk. You … Simultaneously, your comfort with detail will see you managing the day-to-day operations, keeping our platform and business secure. Key responsibilities Information Security Management & Certifications ISMS Oversight: Maintain and enhance Zest’s Information Security Management System. This includes maintaining documentation, conducting and documenting risk assessments, driving improvements … latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of security systems, controls and infrastructure. Incident Management: Take charge of the response to all information security and data protection incidents and collaborate with various business units to understand, document and learn more »
Posted:

Cyber Engineer, PAM Cyberark 2 days PW Reading - £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What We more »
Employment Type: Permanent
Salary: £40,000
Posted:

Cyber Security Engineer (IT digital systems)

South East, United Kingdom
Hudson Shribman
Engineer role will support the systems and applications that deliver enterprise security services for a global organisation. With a focus on identity and access management, the Security Engineer will provide expert knowledge to support the planning, design, development, and deployment of centralized IAM and PAM solutions and the delivery … of the enterprise-level Privileged Access Management program. The role will also support the implementation and management of all cyber security technologies and services in use at the company Role & Accountabilities KEY Identity access management, experience/involvement with Security services such as SIEM and Vulnerability … a subject matter expert on key principles of (IAM) with an in-depth knowledge in the areas of authentication and authorization systems, identity lifecycle management, and identity governance. Build the IAM strategy, and ensure its implementation is a success across the business. Staying up-to-date on current IAM more »
Employment Type: Permanent
Salary: £60,000
Posted:

Technical Analyst

West Bromwich, West Midlands, United Kingdom
Hybrid / WFH Options
West Bromwich Building Society
across a range of varied functions, such as M365 Migration, application upgrades and device refreshes. IT Security focused work including patch updates and general vulnerability management The Key Responsibilities Are: Windows 10/11 build automation and image management. Endpoint device set-up and configuration. Hardware and software … and processes are fully followed and advise on IT security related issues. Liaise with 3rd party service providers to resolve problems within agreed timescales. Vulnerability Management to identify and fix Security vulnerabilities. MDM solution administration. Support the Society branch network across 34 locations and our head office functions. … Experience of Windows based administration tools such as Active Directory and Group Policy. Strong troubleshooting, analytical and fault-finding skills Able to automate system management tasks. Excellent communication and interpersonal skills. A strong customer focus. Ability to produce clear and detailed technical documentation. Knowledge of network environments and concepts more »
Employment Type: Permanent, Work From Home
Salary: £35,000
Posted:

Senior Cloud Security Engineer (Azure / M365 / EDR)

United Kingdom
Hybrid / WFH Options
DGH Recruitment
record in high level delivery. Required Skills/Experience; - A broad range of technology experience including Cloud Security (Azure, 365 E5 suite), Internet Protection, Vulnerability Management, SIEM, Firewalls, CASB, WAF and EDR products. - Experience in managing, supporting, and improving enterprise security solutions with a strong understanding of the more »
Employment Type: Permanent, Work From Home
Salary: £70,000
Posted:

IT Asset Manager

Bradford, West Yorkshire, Yorkshire, United Kingdom
Yorkshire Water
a key part of how we plan to meet the changing expectations of customers and regulators. Where you fit in: As our IT Asset Management Manager you will Develop and mature the IT Asset Management strategy Design and maintain Asset Management policies, procedures and process Ensure our … systems of record and management are maintained and up to to date Provide standard and ad hoc reporting of software and hardware inventory, equipment inventory and other ad hoc reporting of hardware and software estates Monitor and manage software licenses to ensure they comply with license agreements and useage … software harvesting programme, recovering and redeploying unused licences. What skills & qualifications you will need: Considerable experience working in a leadership role in IT Asset Management Demonstratable background knowledge within licence management and software audit management Good understanding of mega vendors including SAP, Oracle, IBM and Microsoft licencing more »
Employment Type: Permanent
Posted:

Threat and Vulnerability Analyst Reading 2 days PW to £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
Cyber Threat & Vulnerability Analyst - Reading 2 days PW, to £50k Are you ready to dive into the world of cyber security and protect critical digital landscapes? We are looking for a passionate and skilled Cyber Threat & Vulnerability Analyst to join a great team and help us safeguard systems … Play a pivotal role in our digital transformation journey. Collaborate with a dynamic team to enhance security measures. Engage in proactive threat hunting and vulnerability management. Key Responsibilities: Support enterprise-wide vulnerability management, ensuring effective identification, categorization, and mitigation. Develop and maintain threat assessment and vulnerability management (TVM) documentation, policies, and procedures. Integrate advanced cyber security solutions with existing systems and infrastructure. Investigate and mitigate newly identified cyber security vulnerabilities. Coordinate with stakeholders on cyber security patching and vulnerability management. Participate in major incident response when necessary. Perform proactive threat hunting for emerging more »
Employment Type: Permanent
Salary: £40,000
Posted:

Senior Security Manager

Manchester, North West, United Kingdom
Hybrid / WFH Options
Raytheon
including IPSA, FSC and IVCO and in line with Raytheon policies, strategy, applicable contractual commitments, legal requirements and industry good practice. Ensuring personnel security management compliance for employees and contractors including correct vetting procedures and the security management of visitors and contractors to meet HMG, UKSV and IPSA … risk and threat assessments including regular practical exercises to assure effectiveness of measures to meet FSC and IPSA requirements, proactively managing threat detection and vulnerability management and driving the required remediation. Creation and maintenance of security culture in line with UK Government Security requirements providing regular reports and … critical metrics that demonstrate the compliance and effectiveness of security operations. Implementation and management of an effective Raytheon UK incident management system, developing strong internal and external relationships to promote the early identification and resolution of incidents and lead on any associated investigations. Implementation and management of more »
Employment Type: Permanent, Work From Home
Posted:

Senior Infrastructure Security Engineer

London, United Kingdom
Blue Octopus Recruitment
IT strategy from an operational security perspective and support the framework of the IT Security Manager where applicable. Responsibilities Mentor colleagues and perform line management duties to ensure the team operate with a security-first mindset. Oversee a service queue ensuring the team are managing and resolving incidents and … changes in a timely manner. Advise the Management team of significant emerging threats and recommend tactical steps to counteract these threats. Respond to threats across multi-cloud environments and protect the integrity of our information assets. Conduct peer reviews of documentation supporting security workstreams both current and past. Lead … the monthly vulnerability management forum from an Operational perspective. Skills and Experience Required Excellent analytical and problem-solving skills. Strong Security first mindset. 5 years+ of front-line experience working in a cyber role supporting multi-cloud environments. Strong understanding of cyber security principles, best practices, attack vectors more »
Employment Type: Permanent
Salary: £75,000
Posted:

Senior System Engineer

Corby, England, United Kingdom
Iron Mountain
us and see how you can elevate the power of your work at Iron Mountain. We provide expert, sustainable solutions in records and information management, digital transformation services, data centers, asset lifecycle management, and fine art storage, handling, and logistics. We proudly partner every day with our … skills in a culture that will welcome your unique contributions? If so, let's start the conversation. The Role: Senior System Engineer, IT Systems Vulnerability & Patch Management In this role, the Vulnerability & Patch Management Engineer will lead high priority projects and day-to-day activities related … to our Vulnerability & Patch Management Program. The Vulnerability Management Engineer is expected to deliver results while maintaining positive relationships with other IT infrastructure teams and project sponsors. The Vulnerability & Patch Management Engineer will work in a team based environment performing technical duties supporting Vulnerability more »
Posted:

Security Engineer

London Area, United Kingdom
Marcus Donald People
Office 365, Defender for Cloud, Defender for Cloud Apps (CASB) Preferrable: Defender for Identity, Azure MFA), IBM QROC/QRadar. Desirable: Any experience of Vulnerability Management Optimisation at scale in an enterprise environment. (e.g., Kenna. VM/Cisco Vulnerability Management, Nucleus, Rapid 7, Armis – other similar … Vulnerability Management Optimisation platforms also considered) In addition you must have Prior experience in Security Engineering and track record in carrying out technical security risk assessments. Good understanding for how to assess third-party suppliers of cloud/SaaS based technology platforms. Experience in vulnerability management optimisation (e.g., Kenna. VM/Cisco Vulnerability Management, Nucleus, Rapid 7, Armis – other similar Vulnerability Management Optimisation platforms also accepted). Data Classification and Labelling, Microsoft Purview. Bachelor's degree in a security related field is preferred (i.e., Security Analysis, Penetration Testing, Malware Analysis, Digital more »
Posted:

Senior Security Engineer

Welwyn Garden City, England, United Kingdom
Tesco Technology
About the Role Tesco Technology are looking for a Security Engineer reporting into the Vulnerability Management and Pentesting team. This is an exciting opportunity for a highly motivated security focused engineer to join our expanding organisation. The role will involve being hands on with a focus on the … alongside other security colleagues bringing your experience to help. You will be responsible for: Building our detection, data correlation and response capabilities in the Vulnerability Management space. As a team we also feed into the standards and patterns for our engineering community. Create tooling and reporting to help … manage our external attack surface. Build a range of capabilities to inform our stakeholders on the status and progress of Vulnerability Management remediation efforts across the company. Automate integrations between platforms and tooling. Use your observations from security incidents and reporting about relevant security threats to contribute to more »
Posted:

Security Engineer

London Area, United Kingdom
Hybrid / WFH Options
Cognitive Group | Part of the Focus Cloud Group
objectives. WHAT WILL YOU BE DOING? Mitigating security risks associated with Bring Your Own Device, securing personal devices in a corporate environment. Ownership of vulnerability management strategy. Preventing security breaches and ensuring system integrity Responsibility of deploying an Endpoint Detection and Response platform - which will involve configuring the … + years of working in IT, Network, and/or Security Engineering ● Experience in designing/deploying BYOD controls, for example Mobile Application Management solutions on iOS and Android ● Experience with Vulnerability Management ● Experience with EDR platforms (SentinelOne, CrowdStrike etc) Desirable ● Experience with Kandji, Jamf, Intune, Landscape more »
Posted:

Cyber Security Engineer

London Area, United Kingdom
Provide
Cyber Security Engineer, M&A, £635(inside) 10 months +Extension – SIEM, SOAR, IdAM, Vulnerability Management, Trellix Are you a Cyber Security Engineer and ready to take on a pivotal role in a global business? Working on a M&A, the largest in its sector. You will be joining … management. Create and maintain cyber action plan. Track and communicate progress, risks, and issues. Review, report, and sign-off Infrastructure designs. Security Tooling (EDR, Vulnerability Management, IdAM, SIEM, SOAR). Input/review into cyber security design artefacts (HLD/LLD) and provide security engineering consultancy. Implementation cyber more »
Posted:

Application Security Specialist

England, United Kingdom
Dragonfly People
Application Security Specialist Security | Application | DevSecOps | CI/CD | Burp Suite | Penetration Testing | Vulnerability Management | Fin-Tech An Application Security Specialist is required by a rapidly growing consumer Fin-Tech business who are based in London. The Application Security Specialist will need to have advanced knowledge of secure … well as understanding of IDE's & CI/CD solutions. The Application Security Specialist will have experience with application security assessment, penetration testing, and vulnerability management. Application Security Specialist Requirements: Experience with Application Security. Experience with SDLC and DevSecOps. Penetration Testing and Vulnerability Management experience. Used to more »
Posted:

Cyber Security Engineer

Reading, England, United Kingdom
Hybrid / WFH Options
The People Network
with organisational goals Assist with the development and maintenance of cyber security engineering documentation, policies, and procedures Integrate cyber security solutions (e.g. privileged access management tools) with existing systems, applications, and infrastructure Perform assessments on cloud security and create documentation that enables the business to use the cloud securely … Liaise and coordinate with technology and business stakeholders about cyber security patching and vulnerability management issues/actions Develop and maintain dashboards with cyber security engineering metrics Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Reporting into … infrastructure, network security and application security Good knowledge of MS Stack including exposure to Active Directory, Entra ID and Sentinel Knowledge of Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Linux/Unix is desirable but not essential Ideally more »
Posted:

Cyber Security Specialist

United Kingdom
Dragonfly People
functional teams to ensure compliance with security policies, assess vulnerabilities, and recommend remediation strategies to mitigate risks effectively. Key Responsibilities : Endpoint Protection Deployment and Management: Install, configure, and maintain endpoint protection solutions such as antivirus software, anti-malware tools, host-based intrusion detection/prevention systems (HIDS/HIPS … prevent further spread across the organization. Document incident details, response actions, and lessons learned to improve incident response procedures and enhance endpoint security posture. Vulnerability Management: Conduct vulnerability assessments and scans on endpoints to identify software vulnerabilities, misconfigurations, and security weaknesses. Prioritize vulnerabilities based on risk assessment … a strong understanding of security principles, technologies, and best practices. Proficiency in using security tools such as SIEM, IDS/IPS, antivirus, firewalls, and vulnerability scanners. Hands-on experience with Microsoft Defender Security & Compliance Suite, Exchange Online Protection, CASB, Mimecast, Inutne Policy Deployment, Microsoft Entra ID etc… Hands-on more »
Posted:

Security Engineer

Alconbury, England, United Kingdom
MM Flowers
in teams and with our customers, They can be used as a guide and a reference to support processes such as team development, performance management, recruitment, identification of talent, and on-going coaching to support the delivery of our ambitious growth plans. Creating Meaningful Moments that do good for … and the role they play. Relentless focus to reducing vulnerabilities with a continuous improvement mindset. Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk. Work with key vendors to design and build a cyber … into any cyber incidents. Understanding the current risk profile of the organisation by executing a programme of awareness and detection initiatives including Penetration Testing, Vulnerability Analysis, reviewing as-built documentation, security assessments and improvement programmes. Monitoring and managing a 3rd party Security Operations Centre (SOC), reviewing and monitoring SIEM more »
Posted:

Information Security Cloud Analyst

Northampton, England, United Kingdom
Peaple Talent
maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat intelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerability management programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of Information Security Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring more »
Posted:

Information & Cyber Security Analyst - Financial Services - £50,000-£70,000 + Bonus

London Area, United Kingdom
Hybrid / WFH Options
Hunter Bond
and compliance Detecting any issues or security breaches across global infrastructure Monitoring of devices and infrastructure, including reporting Investigating potential threats and issues Risk management and analysis Utilising tooling such as packet inspection and security forensics to resolve and report issues Security & Best Practice Working with various other Security … Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threat management frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerability management You will advise on Security best practices, and act more »
Posted:

Information Security Operations Specialist

City Of London, England, United Kingdom
i3
per week in office) Permanent £68,000 – 92,000 per annum + benefits + bonus Information Security – Specialist – Network Security – Cloud Security - Privileged Access Management - Windows Server - Active Directory - SQL Server A great opportunity has arisen for an Information Security Operations Specialist to join a well-respected London Market … timely manner. Assisting the Information Security Architecture team in matters of technical security at. Liaising with 3rd party security partners and working with project management teams on key projects. Supporting the wider Information Security team in building the Internal Control Framework (ICF), vulnerability management, and responding to … security awareness and best practice throughout the Group. Required skills/experience: Excellent knowledge of security technologies and domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. Working knowledge of Privileged Access Management (PAM) best practice, technologies, and procedures. Working knowledge of more »
Posted:

Vulnerability Analyst

Glasgow, Scotland, United Kingdom
TRIA
Information Security Vulnerability Analyst £50,000 - £55,000 Hybrid - 2 days per week in either Horley/Portsmouth/Glasgow office depending on location We are looking for a brilliant Vulnerability Analyst to join a constantly growing UK utilities company as they embark on a 5 year long … for an individual that has: At least 2 years’ cyber security experience, with a background in IT infrastructure or networking Experience or knowledge of vulnerability management tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for more »
Posted:
Vulnerability Management
10th Percentile
£40,000
25th Percentile
£51,250
Median
£65,000
75th Percentile
£86,063
90th Percentile
£97,375