|
17 of 17 Permanent Vulnerability Management Jobs in Woking
woking, south east england, United Kingdom Hybrid / WFH Options James Adams
is ideal for someone who thrives on ensuring critical infrastructure stays secure, resilient, and ahead of the curve. You’ll lead key initiatives across vulnerability management, disaster recovery, SOC performance, and more, all while contributing to the broader cyber resilience goals of the business. Role responsibilities: Leading on … all things infrastructure security and resilience across cloud and on-prem environments. Managing a team of Security Analysts Owning and evolving the vulnerability management programme (Tenable experience a plus). Ensuring a robust obsolescence management roadmap aligned to IT budgets and strategy. Acting as a key escalation …/3rd-party alignment. What you need: Solid experience in Cyber Security and Infrastructure (especially working with SOC providers). Hands-on knowledge of vulnerability management tools (e.g. Tenable). Experience managing lifecycle and end-of-life processes across hardware/software/cloud. Proven track record leading More ❯
woking, south east england, United Kingdom Americold Logistics, LLC
with global business risk/objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security … security services and deploy new tools in support of the security roadmap. Must be capable of interacting effectively with various internal teams, peers, and management staff. Support the information security manager with creating information security metrics for the respective supported security products. This will be done monthly. Deploy new … processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security operations, legal, compliance, incident response teams More ❯
woking, south east england, United Kingdom Hybrid / WFH Options Sanderson
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation and management of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use cases. … Designing and implementing security controls and secure configurations. Maintaining proactive vulnerability scanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and … and audits of our information security information security policies, procedures, and systems. Identifying, assessing, managing, remediating, and tracking information security risks through our risk management framework and ensuring key risks are reported to the CISO. Performing regular internal security audits aligned to ISO/IEC 27001 and SOC2 controls. More ❯
woking, south east england, United Kingdom Anson McCade
ensuring adherence to best practices and driving successful outcomes. • Collaborating with external partners to co-create innovative cyber security solutions. • Applying your expertise across vulnerability management, cyber tolerant backup, DORA, NIST, and modern security operations to deliver exceptional client results. Your experience as a Cyber Security Pre-Sales … field. • A minimum of 5 years of experience selling and designing technical solutions across sectors. • Recognised expertise in cyber security pre-sales domains, including vulnerability management and advanced security frameworks. • Proven consultative selling and influencing skills, paired with excellent communication. • A resilient, adaptable mindset and a proactive approach More ❯
woking, south east england, United Kingdom ABL Recruitment
and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control … Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerability assessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for More ❯
woking, south east england, United Kingdom Hybrid / WFH Options Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
woking, south east england, United Kingdom Ant International
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register, prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … on vulnerability management, endpoint security (EDR/XDR), and cloud compliance. Good understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged access management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory More ❯
woking, south east england, United Kingdom Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
woking, south east england, United Kingdom Hybrid / WFH Options Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
woking, south east england, United Kingdom Altura Partners Ltd
or Typescript Ability to write secure-by-default Terraform for cloud deployments Solid understanding of cloud and application security principles Knowledge of network protocols, vulnerability management, and creation of Incident Response programs Willingness to learn and adapt to new security challenges and technologies Relevant certifications such as AWS More ❯
woking, south east england, United Kingdom Hybrid / WFH Options talego
architecture and service management. Introducing and implementing solutions and platforms on cloud technologies (ideally Azure). Set the strategy for the provisioning and lifecycle management of all end-user equipment and software. Own, maintain, and develop the CMDB for all end-user assets to enable effective budget planning and … Entra and AAD (including provisioning). Possesses a good understanding of endpoint security and measures to secure assets and data, including SSO/MFA, vulnerability management, email security, scanning, and pen testing. Experience with managing a hybrid device estate including MACs, Windows, and Linux as well as Intune … managed portable devices. Experience with Enterprise MDM, EPP, EDR, Patch management, and other tools from vendors like Microsoft, JAMF, CrowdStrike, ManageEngine, and Esentire to protect, monitor, and respond to incidents. Familiar with Enterprise service delivery platforms such as ServiceNow, FreshService, or similar, with experience customizing and using reporting for More ❯
woking, south east england, United Kingdom iO Associates - UK/EU
years of experience in cyber security roles, with hands-on involvement in implementing frameworks like NIST, eCAF, or ISO27001 Experience in SIEM, Vulnerability Management, Threat Intelligence, and IAM tools Background in supporting enterprise-level security initiatives aligned with regulatory or certification standards If you're interested in hearing More ❯
woking, south east england, united kingdom Hybrid / WFH Options Bela Recruitment
have ISO 27001 knowledge and experience in and other CSR policies will be an advantage. Occasionally help the IT team with system testing, asset management and other IT tasks & activities, including diagnosing and investigating security events and IT issues. Lead the maintenance & management of ISO standards, including all … Conduct internal audits to ensure compliance and identify areas for improvements. Full job spec on receipt of cv. Requirements Ideally 2+ years ISO 27001 management, auditing and certification/Strong knowledge of ISO standards, including ISO . Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. Ability … to work as part of a team or independently. Proficient in MS Office and ISO management software. Rewards £30,000 - £40,000+depending on experience. Hybrid working 1 day per week option. Professional development & growth opportunities. Pension Scheme Onsite Parking Paid Holidays Job Security How to Apply Click on Apply More ❯
woking, south east england, United Kingdom Network IT Recruitment Limited
platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct forensic investigations, and support remediation efforts. Vulnerability Management – Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence – Leverage SOAR platforms and threat intelligence tools to More ❯
woking, south east england, United Kingdom Locke44
experience working with data and cloud technologies, including databases, cloud infrastructure, and basic cloud administration (e.g., networking, compute and storage resources, identity and access management). Familiarity with APIs, web services, and automation through scripting or programming languages. Practical knowledge and demonstrated experience in areas such as Data Loss … Prevention (DLP), Data Privacy/Protection, DSPM/CSPM, SIEM, or vulnerability management is highly preferred. Proven success in a technical, customer-facing role within a software or SaaS company. Full spec available, please apply to Locke44 for the details. More ❯
woking, south east england, United Kingdom Kyndryl
and stakeholders. Does the work get challenging at times? Yes! But you’ll collaborate with a diverse group of talented people and gain invaluable management and organizational skills, which will come in handy as you move forward in your career. Your future at Kyndryl Every position at Kyndryl offers … operations Experience with Mainframe product installation Willing to learn and grow future Mainframe Skills Eligible for UK Security Clearance (must have) Nice to have: Vulnerability management expertise Familiarity with ticketing tools (SM9, ServiceNow) Mainframe-related certifications are a plus More ❯
woking, south east england, United Kingdom Hybrid / WFH Options Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
|
|