Permanent Vulnerability Management Jobs in the UK excluding London

1 to 25 of 73 Permanent Vulnerability Management Jobs in the UK excluding London

Security Engineer - Azure - Hybrid Work Available - Permanent

Liverpool, Merseyside, United Kingdom
Hybrid / WFH Options
Digital Gurus Recruitment Limited
services, systems and infrastructure for signs of failure or errors, raising IT incidents as needed. Ensure timely resolution in line with SLAs and KPIs. Vulnerability and Threat Management: Take ownership of vulnerability and threat management across IT systems. Monitor changes in threats and respond appropriately, implementing … remediation activities and ensuring compliance with policies. Policy Compliance: Ensure compliance with defined security policies, providing vulnerability and compliance reports to the InfoSec teams. User Access and Software Review: Assist with the review of user access requests and the use of new software or hardware, reporting findings to the … team initiatives and projects, providing hands-on assistance and technical expertise. Skills Technical Proficiency: Hands-on experience with Azure cloud security tools and infrastructure management, including M365, IAM, RBAC, Sentinel, Defender for Cloud, Secure Score and Log Monitoring. Incident Management: Ability to identify, respond to and manage security more »
Employment Type: Permanent
Salary: GBP 55,000 Annual
Posted:

Infrastructure Engineer - Identity and Access Management

Blackpool, Lancashire, North West, United Kingdom
Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability more »
Employment Type: Permanent, Work From Home
Salary: £45,000
Posted:

Cyber Engineer, PAM Cyberark 2 days PW Reading - £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What We more »
Employment Type: Permanent
Salary: £40,000
Posted:

Cyber Security Vulnerability Manager

Cardiff, Wales, United Kingdom
Hybrid / WFH Options
Intaso
Interviews available immediately Intaso’s long standing client are seeking a dynamic individual to join their Security Operations team as the Security Vulnerability Manager, a pivotal role within their organization. This position will focus on identifying, monitoring, analysing, and facilitating the remediation of vulnerabilities across their systems. Key Responsibilities … Develop and document a comprehensive vulnerability management strategy aligned with stakeholder and business need Create intuitive reporting and dashboarding mechanisms to convey threat and risk profiles associated with vulnerabilities to stakeholders Ensure regular vulnerability scans cover all IT and OT assets, maintaining up-to-date coverage. Collaborate … with IT and OT asset owners to execute vulnerability and compliance scans in a controlled manner. Partner with both technical and non-technical stakeholders to devise effective mitigation plans for identified vulnerabilities. Lead cross-functional teams in responding to high-risk or complex vulnerabilities, leveraging technical expertise. Stay informed more »
Posted:

Senior Information Technology Engineer

High Wycombe, England, United Kingdom
Arden Resourcing Limited
role will be a hands-on senior role within the organisation to implement and manage the entire companies’ internal infrastructure including desktop security, endpoint management, vulnerability management, asset management and working to provide security operations. The role will involve control and deployment of all processes for more »
Posted:

Infrastructure Engineer (Security Career Development Opportunity)

Brighton, England, United Kingdom
JNC Recruitment Limited
systems and applications Responding to incidents and delivering fixes in line with SLAs and corporate processes Technical experience required includes: Comprehensive experience in SCCM management and administration Active Directory administration including DNS, DHCP, PKI and Group Policy Strong Microsoft Windows Server 2008 – 2022 Administration in a hybrid cloud environment … and Endpoint Manager PowerShell scripting ITIL Networking Fundamentals - Palo Alto and Cisco Bonus extra skills include: MS Defender/MS Defender for Cloud Tenable Vulnerability Management, or other Vulnerability Management tool Knowledge of monitoring tools such as Splunk, Netcrunch or Solarwinds (or others) This opportunity would … suit an engineer with an inherent interest in IT Security, as the role will develop the post holder's Monitoring and Vulnerabilty Management skills on the job. The role is available on a hybrid basis remotely and from the offices in easy to get to Central Brighton 1 day more »
Posted:

Senior Security Analyst

Welwyn Garden City, England, United Kingdom
Tesco
Tesco Technology are looking for a Senior Security Analyst reporting into the Vulnerability Management team. This is an exciting opportunity for a highly motivated security focused individual to join our expanding organisation. The scale and complexity of Tesco creates a huge opportunity for someone to apply their existing … public cloud environments. Following our Business Code of Conduct and always acting with integrity and due diligence and have these specific risk responsibilities: Maintaining vulnerability scanning platforms to identify and analyse vulnerabilities. Taking a risk-based approach to prioritise remediation efforts. Working with engineering teams to remediate issues. Building … security incidents and reporting about relevant security threats to contribute to our internal detection engineering programme. Work alongside our analysts to upskill them in Vulnerability Management and look for patterns and issues that can be fixed centrally. POC assessments from our active Bug Bounty Program. You will need more »
Posted:

Security Operations Center Analyst

Birmingham, England, United Kingdom
Montash
Security Review (CSR) Compliant Using expert knowledge of Cybersecurity Frameworks and Standards Using legal and regulatory understanding to provide guidance to wider teams Personnel Management & in-house training Stakeholder engagement Management Analysis of vulnerability management tools reverse engineering rule engineering & Crisis Management (Alert Triage) Required … Purple Teaming Understanding of computer forensics History with use of Firewalls and IDS/IPS devices Proven ability with SIEM (Security Information and Event Management) technologies Experience in networking, routing, and switching Use of frameworks such as NIST, ISO 27001,MITRE ATT&CK and CIS. Familiarity with cybersecurity laws more »
Posted:

Head of Information Security

Reading, England, United Kingdom
Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
Posted:

Technical Services Manager

Leeds, England, United Kingdom
Talion
and Managed Services. Our suite of services blends together best-in-breed technologies to provide real time 24×7 monitoring, triage, remediation, threat assessment, vulnerability management, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our Security Operations Centre (SOC … levels of service. Collaboration with the Customer at both technical and business levels to underpin the activities of sub-contractors or service provisioning teams. Management of small enhancement projects utilising capabilities within the service team. Management of the handling of incidents, problems and change in their area of … of performance, collection of performance data and investigation of problems and trends. Resolution or escalation of problems, implementation of service improvement actions and programmes, management of these to agreed timelines and ownership of communication to both the Customer and internal management teams. Provision of feedback on service portfolio more »
Posted:

Security Analyst

Hampshire, England, United Kingdom
Shaw Daniels Solutions
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and … monitor for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular Vulnerability Scanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. … Asses the urgency and severity of incidents. Determine whether an incident requires immediate action or further investigation. Escalate incidents to higher tiers when necessary. Vulnerability Scanning: scan systems for vulnerabilities. and manage vulnerabilities discovered during scans. Security Tool Management: Configure and manage security tools (e.g., SIEM, IDS/ more »
Posted:

Cyber Security Consultant

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
one or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identity and access management , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and negotiating technical outcomes … with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group – Carbon positive tech recruitment more »
Posted:

Information Security Officer

Farnborough, England, United Kingdom
Hybrid / WFH Options
Shaw Daniels Solutions
with stakeholders, to uncover emerging risks and opportunities for malicious actors. Produce written reports, status updates, actions, minutes to support decision making within the management systems governance programme. Conduct annual Business Impact Assessments with relevant teams Ensure and track that staff get the infosec training required Annual infosec and … the document review period. Compile a list of actions to address any lapses and track to conclusion. Assist with the monitoring of our platform vulnerability management systems and logging of identified vulnerabilities In the event of any security event, be part of the response team, by providing infosec more »
Posted:

Senior Cyber Security Analyst

Brighton, England, United Kingdom
Hybrid / WFH Options
Hays
infrastructure for the organisation. The role responsibilities: You will be supporting the Head of IT and Cyber Security with the day-to-day operational management of the cyber security function. You will work with the Senior Cyber Security Manager to define and evolve the cyber strategy across the organisation. … and analyse security incidents and breaches, and lead incident response efforts to contain and mitigate the impact in a timely manner. Reporting to senior management on Cyber related metrics and improvement needs. Foster a culture of security awareness and compliance amongst team members and stakeholders through training, education, and … initiatives. Leading any major cyber incidents should they arise. Escalating security concerns that are not being adequately addressed through the established risk/issue management framework. You will need: You will need to be able to influence and collaborate with other teams in the organisation, and the ability to more »
Posted:

Cyber Security Team Lead

Liverpool, England, United Kingdom
Forward Role Recruitment
and escalations, manage 3rd-party technical support. Provide security metrics, maintain documentation, and collaborate on technology design. Oversee security platform support, incident response, and vulnerability management. Track cyber threats, support vulnerability analysis, and lead system patching and updates. Integrate security into BAU processes, maintain technical design documentation. Act more »
Posted:

Infrastructure Engineer - Identity and Access Management

Manchester, North West, United Kingdom
Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability more »
Employment Type: Permanent, Work From Home
Salary: £45,000
Posted:

Infrastructure Engineer - Identity and Access Management

Leeds, West Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability more »
Employment Type: Permanent, Work From Home
Salary: £45,000
Posted:

Threat and Vulnerability Analyst Reading 2 days PW to £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
Cyber Threat & Vulnerability Analyst - Reading 2 days PW, to £50k Are you ready to dive into the world of cyber security and protect critical digital landscapes? We are looking for a passionate and skilled Cyber Threat & Vulnerability Analyst to join a great team and help us safeguard systems … Play a pivotal role in our digital transformation journey. Collaborate with a dynamic team to enhance security measures. Engage in proactive threat hunting and vulnerability management. Key Responsibilities: Support enterprise-wide vulnerability management, ensuring effective identification, categorization, and mitigation. Develop and maintain threat assessment and vulnerability management (TVM) documentation, policies, and procedures. Integrate advanced cyber security solutions with existing systems and infrastructure. Investigate and mitigate newly identified cyber security vulnerabilities. Coordinate with stakeholders on cyber security patching and vulnerability management. Participate in major incident response when necessary. Perform proactive threat hunting for emerging more »
Employment Type: Permanent
Salary: £40,000
Posted:

Cyber Security Engineer (IT digital systems)

South East, United Kingdom
Hudson Shribman
Engineer role will support the systems and applications that deliver enterprise security services for a global organisation. With a focus on identity and access management, the Security Engineer will provide expert knowledge to support the planning, design, development, and deployment of centralized IAM and PAM solutions and the delivery … of the enterprise-level Privileged Access Management program. The role will also support the implementation and management of all cyber security technologies and services in use at the company Role & Accountabilities KEY Identity access management, experience/involvement with Security services such as SIEM and Vulnerability … a subject matter expert on key principles of (IAM) with an in-depth knowledge in the areas of authentication and authorization systems, identity lifecycle management, and identity governance. Build the IAM strategy, and ensure its implementation is a success across the business. Staying up-to-date on current IAM more »
Employment Type: Permanent
Salary: £60,000
Posted:

Infrastructure Engineer - Identity and Access Management

Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability more »
Employment Type: Permanent, Work From Home
Salary: £45,000
Posted:

OT Cyber Security Testing Manager

Crawley, England, United Kingdom
InfoSec People Ltd
IT Service Providers and partners to implement and optimise cyber security technical assurance capabilities across four main services; Technical Security Compliance, Product Security Assurance, Vulnerability Management (VM), and Disaster Recovery and Business Continuity. Key responsibilities: Define and deliver the cyber security technical assurance strategy, setting out clear policies … variety of technologies and platforms. Ensure the IT estate is compliant with The Client's policies and technical standards to protect company assets having management responsibility for driving the necessary remediation actions and countermeasures to mitigate identified weaknesses and vulnerabilities. Establish and improve a regular red and purple team … penetration testing program aligned to main threat information and industry cyber security intelligence. Establish a Vulnerability Management process to ensure that all known security vulnerabilities and weaknesses are identified, contextually assessed, prioritised and tracked to remediation against The Client's policy. Ensure that an IT Disaster Recovery and more »
Posted:

Information Security Manager

Leatherhead, England, United Kingdom
Hybrid / WFH Options
Zest
to processing personal data with the highest level of diligence, and you’ll play a pivotal role in maintaining and enhancing our robust infosec management system, acquiring and upholding security certifications, fulfilling the role of our Data Protection Officer and ensuring we have appropriate controls to mitigate risk. You … Simultaneously, your comfort with detail will see you managing the day-to-day operations, keeping our platform and business secure. Key responsibilities Information Security Management & Certifications ISMS Oversight: Maintain and enhance Zest’s Information Security Management System. This includes maintaining documentation, conducting and documenting risk assessments, driving improvements … latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of security systems, controls and infrastructure. Incident Management: Take charge of the response to all information security and data protection incidents and collaborate with various business units to understand, document and learn more »
Posted:

Security Analyst

Doncaster, England, United Kingdom
Forward Role Recruitment
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and Vulnerability Management tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Posted:

Senior Principal Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help engineering teams identify security-related weaknesses … IT security in one or more of the following areas: software/product security assessments, penetration testing, red teaming, web application assessments Interest in vulnerability research and exploit development Demonstrable experience in designing and evaluating complex systems for security Aptitude for self-study, setting and achieving long term goals … for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances are not required, and more »
Posted:

Security Consultant

York, Yorkshire, United Kingdom
INFUSED SOLUTIONS LIMITED
partnered with an award winning IT services consultancy based in York, who are looking to take on a Cyber Security Consultant with experience in Vulnerability Management to take the lead on this new project where they will be offering Tenable as a new service. This is a great more »
Employment Type: Full Time
Posted:
Vulnerability Management
the UK excluding London
10th Percentile
£36,250
25th Percentile
£45,000
Median
£52,500
75th Percentile
£71,063
90th Percentile
£88,750