Permanent 'Vulnerability Management' Job Vacancies

101 to 125 of 286 Permanent Vulnerability Management Jobs

IT Operations & Cyber Lead

United Kingdom
Hybrid/Remote Options
Humanoid
corporate IT environment, ensuring it is secure, reliable, and scalable as the company grows.This is a hands-on leadership role , combining responsibility for end-user computing, identity and access management, corporate networking, and cyber security operations . What You’ll Do Manage Humanoid’s corporate IT infrastructure, endpoints, office networks, connectivity, and productivity platforms (Google Workspace, Slack, Miro etc. … . Oversee endpoint lifecycle management, across sourcing, procurement, deployment, patching, and recovery. Maintain monitoring, alerting, and performance reporting for corporate systems. Lead vendor management for hardware, software, and managed services. Ensure operational standards for backup, configuration, and change management. Engineering team , who manage product infrastructure (AWS, CI/CD, robotics environments); ITSM Lead , who manages service process, management … maturity with business growth. We’re Looking For Manage Humanoid’s corporate IT infrastructure, endpoints, office networks, connectivity, and productivity platforms (Google Workspace, Slack, Miro etc.) Oversee endpoint lifecycle management, across sourcing, procurement, deployment, patching, and recovery. Maintain monitoring, alerting, and performance reporting for corporate systems. Lead vendor management for hardware, software, and managed services. Ensure operational standards More ❯
Posted:

Technical Services Manager

England, United Kingdom
Talion Cyber Security
maintain compliance through practical Consulting and Managed Services. Our suite of services blends together best-in-breed technologies to provide real time 24×7 monitoring, triage, remediation, threat assessment, vulnerability management, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our Security Operations Centre (SOC) delivers an array of services … to maintain or improve the levels of service. Collaboration with the Customer at both technical and business levels to underpin the activities of sub-contractors or service provisioning teams. Management of small enhancement projects utilising capabilities within the service team. Management of the handling of incidents, problems and change in their area of service. Preparation of service delivery … improve levels of service. Monitoring of performance, collection of performance data and investigation of problems and trends. Resolution or escalation of problems, implementation of service improvement actions and programmes, management of these to agreed timelines and ownership of communication to both the Customer and internal management teams. Provision of feedback on service portfolio components based on industry trends More ❯
Posted:

Security Engineer

England, United Kingdom
Colt Technology Services
Why we need this role? This role is critical to protecting both internal telecom infrastructure and customer-facing security services. It ensures the secure deployment and management of technologies across backbone, edge, and cloud environments, while supporting the delivery and integration of managed security solutions for customers. The role plays a key part in incident response, vulnerability management … to secure IP/MPLS transport, SDN platforms, automation tools, and cloud workloads. Monitor and analyse security events and alerts, responding to incidents and escalating as appropriate. Assist with vulnerability assessments, patch management validation, and configuration hardening. Document and maintain infrastructure security standards, configurations, and runbooks. Support & Collaboration: Participate in security incident response, root cause analysis, and remediation … IP, routing, firewalls, VPN, and network segmentation principles. Hands-on experience with security tools such as firewalls (Fortinet, Palo Alto, etc.), SIEM/SOAR, IDS/IPS, EDR, or vulnerability scanners. Familiarity with Linux, scripting (Python, Bash), and infrastructure-as-code concepts. Knowledge of secure configuration standards (e.g., CIS benchmarks) and common protocols (e.g., BGP, DNS, SNMP). Experience More ❯
Posted:

Sr. Cloud Security Architect

london, south east england, united kingdom
Cognizant Technology Solutions
Sr. Cloud Security Architect professionals to be part of leading-edge technology projects. Cognizant's Cloud, Infrastructure & Security Services Practice provides end-to-end solutions covering architecture, design, implementation, management, and on-going support across the entire enterprise technology infrastructure. Our services include a spectrum of management, consulting, and systems integration services to help our clients maximize value … Shield Advanced, AWS Secrets Manager, AWS Inspector, AWS Macie, AWS GuardDuty, AWS Detective, AWS CloudTrail, and AWS Security Hub. Ensure cloud environments meet organizational and compliance security standards, Firewall Management Manage, configure, and troubleshoot Checkpoint Firewall to maintain network perimeter security and prevent unauthorized access, Infrastructure as Code (IaC) Develop and maintain IaC using AWS CloudFormation or Terraform for … automated deployment, configuration management, and consistent infrastructure provisioning. Security Configuration and Optimization Configure and optimize security measures, including IAM policies, security groups, network access controls, and encryption protocols. Monitoring and Incident Response Monitor AWS security alerts and incidents using AWS tools. Respond to and mitigate threats in real-time, conducting post-incident analysis and documentation. Risk and Compliance Management More ❯
Posted:

Information Technology Security Manager

City of London, London, United Kingdom
Prism Digital
networks, SSO, and network segregation principles Strong communicator: able to advise IT teams on practical security steps, not just theory Experience mentoring staff or junior analysts (no direct line management required) Adaptability to a medium-sized, SME environment What you’ll be doing: Security oversight: Guide InfoSec operations with practical, hands-on input on incidents and risk mitigation Data … use: Microsoft Purview – Data governance and compliance Azure (and AWS) – IAM, monitoring, encryption Defender, web proxy, CrowdStrike-equivalent – Endpoint & email protection Panorays – Third-party risk Protecht – Enterprise risk & audit management Rapid7/Armis – Vulnerability management and threat detection Why this role? Hands-on, high-impact role in a dynamic SME environment Influence across security operations, governance, and … data management Work alongside experienced InfoSec leadership in a culture that values mentoring, collaboration, and ethical practice IT Security Manager | Zero Trust, Azure Security, ISO27001 | Global Payments Company More ❯
Posted:

Information Technology Security Manager

London Area, United Kingdom
Prism Digital
networks, SSO, and network segregation principles Strong communicator: able to advise IT teams on practical security steps, not just theory Experience mentoring staff or junior analysts (no direct line management required) Adaptability to a medium-sized, SME environment What you’ll be doing: Security oversight: Guide InfoSec operations with practical, hands-on input on incidents and risk mitigation Data … use: Microsoft Purview – Data governance and compliance Azure (and AWS) – IAM, monitoring, encryption Defender, web proxy, CrowdStrike-equivalent – Endpoint & email protection Panorays – Third-party risk Protecht – Enterprise risk & audit management Rapid7/Armis – Vulnerability management and threat detection Why this role? Hands-on, high-impact role in a dynamic SME environment Influence across security operations, governance, and … data management Work alongside experienced InfoSec leadership in a culture that values mentoring, collaboration, and ethical practice IT Security Manager | Zero Trust, Azure Security, ISO27001 | Global Payments Company More ❯
Posted:

Cyber Security Technician

Tunbridge Wells, Kent, South East, United Kingdom
Henderson Scott
systems proactively for suspicious activity. Maintain and update cyber security procedures and documentation. Provide IT support when required, including first, second, and third line assistance. Attend monthly cyber/vulnerability meetings and contribute expertise as needed. Essential Skills & Experience: Minimum 2 years' experience in an IT security-related role ???. Experience with vulnerability management and reporting tools. … verbal communication skills to explain risks to both technical and non-technical stakeholders. CompTIA Security+ or equivalent qualification ??. Desirable: Experience with SIEM systems, EDR, IDS/IPS, and vulnerability scanners. Previous experience in a law firm or professional services environment. Familiarity with Practice Management Systems (PMS) and Document Management Systems (DMS). Personal Attributes: Methodical, thorough More ❯
Employment Type: Permanent
Salary: £55,000
Posted:

Cybersecurity Engineering Lead

Düsseldorf, Nordrhein-Westfalen, Germany
TTC Global
Microsoft 365, including identity services and end-user devices. As the primary point of contact for security-related matters, the person will manage our external SOC, oversee patch and vulnerability management, coordinate penetration tests, and lead the operation of the Microsoft Defender XDR suite including Sentinel. It will also play a key role in incident handling and serve … for all internal and external security-related inquiries. Manage and coordinate with the external Security Operations Center ensuring comprehensive monitoring and timely response to potential threats. Support the Security Management team in the development, validation, and ongoing improvement of security playbooks, ensuring processes remain up to date with evolving threats. Take an active role in incident response efforts, leading … the detection, investigation, and remediation of security incidents. For example, this includes organising post-incident reviews and reporting on root-cause analysis. Lead patch management processes, ensuring that critical vulnerabilities are identified and remediated within agreed service-level timelines. Manage externally conducted penetration testing activities, including planning, oversight, and tracking remediation of findings to closure. Administer and operate the More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Security Operations Specialist

City of London, London, United Kingdom
Hybrid/Remote Options
Cititec
SecOps Lead , you will act as the main liaison between internal security, engineering, and IT teams, and an external Managed Detection and Response (MDR) partner. You’ll oversee incident management, enhance detection and response processes, and strengthen the company’s overall security posture. Key Responsibilities Serve as the primary contact for the MDR partner, managing the relationship, conducting service … plan (IRP) and playbooks in collaboration with the MDR provider. Translate technical security risks into actionable business recommendations for stakeholders at all levels. Contribute to broader cybersecurity initiatives , including vulnerability management, cloud security, data protection, and governance, risk & compliance (GRC). Requirements In-depth understanding of the incident response lifecycle — preparation, detection, containment, eradication, recovery, and lessons learned. More ❯
Posted:

Security Operations Specialist

London Area, United Kingdom
Hybrid/Remote Options
Cititec
SecOps Lead , you will act as the main liaison between internal security, engineering, and IT teams, and an external Managed Detection and Response (MDR) partner. You’ll oversee incident management, enhance detection and response processes, and strengthen the company’s overall security posture. Key Responsibilities Serve as the primary contact for the MDR partner, managing the relationship, conducting service … plan (IRP) and playbooks in collaboration with the MDR provider. Translate technical security risks into actionable business recommendations for stakeholders at all levels. Contribute to broader cybersecurity initiatives , including vulnerability management, cloud security, data protection, and governance, risk & compliance (GRC). Requirements In-depth understanding of the incident response lifecycle — preparation, detection, containment, eradication, recovery, and lessons learned. More ❯
Posted:

Risk & Assurance Manager - IT & Cyber

Maidenhead, England, United Kingdom
Hybrid/Remote Options
Audit & Risk Recruitment
managing and enhancing the IT and Information Security risk landscape. Reporting directly to the Head of Risk and Assurance, you will play a key role in embedding effective risk management practices across the company's technology and cybersecurity domains. As a Risk & Assurance Manager, you'll be responsible for and have ownership for: Partnering with senior IT, Security, and … business leaders to embed risk management practices into operational processes and strategic initiatives. Owning and maintaining IT Risk and Control Matrices (RCMs) , ensuring they remain current, comprehensive, and aligned with industry standards and audit expectations. Reviewing effectiveness of first line functions in testing and validation of key IT controls (e.g., access management, change control, incident response, vulnerability management), ensuring effectiveness and consistency. Leading in the review and enhancement of IT and infosec risk and control frameworks (e.g., ISO 27001, ITIL, ISO22301, NIST), ensuring alignment with business objectives and regulatory requirements. Coordinating and representing IT risk in internal, external audits and certification processes (e.g., ISO 27001, Cyber Essentials, ISO22301, etc.), acting as the primary point of More ❯
Posted:

Penetration Tester

City of London, London, United Kingdom
Hybrid/Remote Options
Advanced Resource Managers
Exceptional written and verbal communication skills, with the ability to articulate complex technical findings and nuanced threat intelligence insights clearly and concisely to diverse audiences. Strong organizational and time management skills, with a proven ability to effectively manage and prioritize multiple concurrent engagements. Current CREST CTL certification or higher is essential. Desirable Skills: Experience with Breach Attack Simulation tools … and methodologies. Experience in Vulnerability Management processes and integrating threat intelligence. Understanding of Risk Management frameworks and how threat intelligence informs risk assessments. Hands-on experience with security reviews of AWS, Azure, and GCP environments, incorporating cloud-specific threats. Experience with ISO 27001 auditing/implementation, understanding the role of threat intelligence in compliance. Other advanced cybersecurity More ❯
Posted:

Penetration Tester

London Area, United Kingdom
Hybrid/Remote Options
Advanced Resource Managers
Exceptional written and verbal communication skills, with the ability to articulate complex technical findings and nuanced threat intelligence insights clearly and concisely to diverse audiences. Strong organizational and time management skills, with a proven ability to effectively manage and prioritize multiple concurrent engagements. Current CREST CTL certification or higher is essential. Desirable Skills: Experience with Breach Attack Simulation tools … and methodologies. Experience in Vulnerability Management processes and integrating threat intelligence. Understanding of Risk Management frameworks and how threat intelligence informs risk assessments. Hands-on experience with security reviews of AWS, Azure, and GCP environments, incorporating cloud-specific threats. Experience with ISO 27001 auditing/implementation, understanding the role of threat intelligence in compliance. Other advanced cybersecurity More ❯
Posted:

Information Security Officer

Milton Keynes, Buckinghamshire, South East, United Kingdom
Oscar Associates (UK) Limited
for an Information Security Officer to lead the organisation's security strategy, operations, and compliance efforts. This hands-on role blends strategic security architecture with day-to-day operational management and regulatory compliance oversight. The ideal candidate will establish and maintain security standards across the product portfolio, oversee secure system environments, and act as the primary contact for ISO … for new features and system changes. Evaluate and recommend security technologies and tools. Operational (40%) Manage security environments across Azure and AWS infrastructure. Lead incident response efforts and coordinate vulnerability remediation activities. Manage continuous security monitoring, alerting, and detection systems. Administer vulnerability management and penetration testing programs. Maintain strong identity, access, and privilege management controls. Compliance More ❯
Employment Type: Permanent
Salary: £60,000
Posted:

Senior Incident Responder – SOC Analyst (L3)

Birmingham, England, United Kingdom
Anson McCade
years’ experience in cybersecurity operations, ideally within a SOC or incident response environment. Proven expertise with QRadar (key focus), Splunk, or Microsoft Sentinel. Strong grasp of network traffic analysis, vulnerability management, and ethical hacking techniques. Solid understanding of DFIR principles and evidence handling. Knowledge of ITIL processes – Incident, Problem, and Change Management. Comfortable working autonomously in a More ❯
Posted:

IT Security Officer

United Kingdom
Hybrid/Remote Options
Hamilton Barnes 🌳
matter expert for IT security operations, policies, and risk management. Monitor and respond to security alerts and incidents, working closely with internal SOC and Cyber teams. Conduct security reviews, vulnerability assessments, and compliance checks across infrastructure and cloud platforms. Ensure adherence to security frameworks, policies, and procedures (ISO27001, NCSC guidelines, etc.). Review and enhance access controls, identity management … detection use cases. What You Will Ideally Bring Proven experience in an IT Security Officer or similar role within a complex IT environment. Strong understanding of cybersecurity frameworks, risk management, and compliance. Knowledge of patch and vulnerability management processes. Ability to interpret security findings and translate them into actionable recommendations. Excellent communication and stakeholder management skills. More ❯
Posted:

Senior Hybrid Identity and Security Engineer

Richmond, Virginia, United States
Hybrid/Remote Options
GENWORTH
and in the future. We are seeking a highly skilled Senior Hybrid Identity and Security Engineer to join our enterprise IT team. This role combines expertise in hybrid identity management, security architecture, advanced access control within Microsoft Entra ID (formerly Azure AD), and role-based access control management in Microsoft Purview. The ideal candidate will design, implement, and … on-premises Active Directory and cloud services. The position requires collaboration with operations, governance, and compliance teams in a large enterprise setting. What you will be doing Hybrid Identity Management: Create, manage, and deploy provisioning configurations from on-premises Active Directory to Microsoft Entra ID using Cloud Provisioning and Azure AD Connect. Configure and troubleshoot pass-through authentication (PTA … password hash synchronization (PHS), seamless single sign-on (SSO), and federation settings. Monitor and resolve identity synchronization issues, including logs, while ensuring secure integration. Role-Based Access Control Management in Purview: Design, implement, and manage Role-Based Access Control (RBAC) policies within Microsoft Purview. Ensure appropriate access controls are in place for data governance, compliance, and privacy requirements. Collaborate More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cloud Architect

Oxford, England, United Kingdom
Experis UK
Kubernetes platforms (AKS/EKS/GKE), service mesh (Istio/Linkerd), ingress, and autoscaling. Implement CI/CD (GitHub Actions/Azure DevOps/GitLab), environment promotion, secrets management, artifact repos. Security & Compliance Define guardrails (CIS benchmarks), cloud security posture management (Defender for Cloud, AWS Security Hub, GCP SCC). Vaulting and KMS (AWS KMS, Azure Key … Vault, GCP KMS), key rotation, data classification & encryption. Threat modelling, zero trust patterns, vulnerability management, incident runbooks. Data & Integration Reference architectures for streaming/batch (Kafka/MSK, Event Hubs, Pub/Sub), data lakes, warehouses (BigQuery, Synapse, Redshift), ETL/ELT. API strategy (APIM/API Gateway/Apigee), messaging (SQS/SNS/Service Bus/…/SLIs, error budgets. Governance & Cost Landing zone governance, tagging/labels, budget alerts, reserved/savings plans. Operating model definition (RACI), platform backlog, roadmap, and risk management. Stakeholder Management Run workshops, architecture reviews, and design clinics. Collaborate with InfoSec, Network, Data, and App teams; mentor engineers. Required Experience 8+ years in cloud architecture/engineering; 3+ years multi More ❯
Posted:

Enhanced DV Cyber Security Lead

England, United Kingdom
83zero
delivery of SIEM, SOAR, and XDR platforms (e.g., Microsoft Sentinel, IBM QRadar, CrowdStrike Falcon). Architect and deploy cloud security solutions across Azure and AWS environments. Manage and optimise vulnerability management tools (e.g., Tenable.SC, Rapid7, Qualys). Support the development and operation of Cyber Security Operations Centres (CSOCs) . Conduct threat modelling, risk assessments, and incident response . … Implement and manage identity and access management (IAM) solutions using SailPoint, OKTA, and BeyondTrust. Collaborate with internal teams to ensure compliance with NIST, MITRE ATT&CK, and ISO27001 frameworks. Provide mentoring, documentation, and knowledge transfer to junior engineers and SOC analysts. Liaise with external vendors, clients, and cross-functional teams to resolve security issues. Essential Skills & Experience Proven experience … Expertise in cloud security (Azure & AWS) . Demonstrated success leading or building CSOCs or security programmes . Strong documentation and design skills (HLD/LLD). Excellent communication, stakeholder management, and project leadership. Certifications (Highly Desirable) CISM – Certified Information Security Manager Microsoft Certified: Azure Security Engineer CCNP/CCIE (Security/R&S) CCSA/CCSE (Checkpoint) JNCIA (Juniper More ❯
Posted:

SOC Operations Manager

Hemel Hempstead, Hertfordshire, England, United Kingdom
Fynity
Manage and optimise SIEM and SOAR platforms (Splunk, Sentinel, Elastic) to enhance detection and automation capabilities. Drive continuous improvement through ITIL-aligned processes and adherence to CREST standards. Oversee vulnerability management, threat intelligence, and incident response plans. Communicate security posture, risks, and incident outcomes clearly to senior stakeholders. Ensure operational readiness and contribute to maintaining industry accreditations. Have … bring a number of the following to this SOC Operations Manager role: Proven experience leading SOC operations in a 24×7 or multi-client environment. Strong background in incident management, threat detection, and escalation processes. Technical depth across SIEM/SOAR tooling, preferably Splunk or Microsoft Sentinel. A passion for developing teams — coaching analysts and building collaborative, high-performing More ❯
Employment Type: Full-Time
Salary: £80,000 - £90,000 per annum
Posted:

Head of IT Security - West London

United Kingdom
Adecco
GDPR, PCI DSS, Cyber Essentials Plus, and ISO/IEC 27001:2022 aligned practices. Lead Data Protection Impact Assessments (DPIAs), data mapping, classification, and retention programs. Oversee incident response, vulnerability management, patch compliance, and secure configuration baselines using SCCM, Ivanti, Intune, GPO, and Azure Defender. Drive SOC integration, threat intelligence, and monitoring to continuously improve detection and response … Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in Zero Trust security models. Experienced in security tooling selection and implementation. Deep understanding of data protection legislation, risk management frameworks, and compliance requirements. Exceptional leadership, stakeholder engagement, and influencing skills. More ❯
Employment Type: Permanent
Salary: GBP 90,000 - 100,000 Annual
Posted:

Senior Incident Responder

West Midlands, United Kingdom
Anson Mccade
years' experience in cybersecurity operations, ideally within a SOC or incident response environment. Proven expertise with QRadar (key focus), Splunk, or Microsoft Sentinel. Strong grasp of network traffic analysis, vulnerability management, and ethical hacking techniques. Solid understanding of DFIR principles and evidence handling. Knowledge of ITIL processes - Incident, Problem, and Change Management. Comfortable working autonomously in a More ❯
Employment Type: Permanent
Posted:

Security Solutions Architect

Sheffield, England, United Kingdom
Wipro
the end-to-end journey. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at More ❯
Posted:

IT SECURITY SPECIALIST - SECURITY, CYBER, AZURE

Manchester, United Kingdom
Hybrid/Remote Options
Adecco
such as antivirus, content filtering, firewalls, and intrusion detection systems. *Proficiency in Microsoft Azure and associated cloud security services. *Familiarity with Windows and Linux operating systems. *Experience with log management and security monitoring platforms. *Critical thinking and problem-solving skills in complex technical environments. *Knowledge of ITIL practices and security compliance standards. *Must have access to own transport. *Willingness … Computer Science, Cybersecurity, or a related field. *Postgraduate qualification in an IT-related subject. *Professional certifications such as CISSP, CompTIA Security+, or equivalent. *Experience with governance frameworks and risk management tools. Key Responsibilities *Operate and maintain security systems including firewalls, antivirus, intrusion detection/prevention, and authentication platforms. *Monitor system logs and network traffic to identify suspicious activity and … potential threats. *Respond to security incidents and support forensic investigations. *Develop and maintain security protocols, policies, and procedures. *Conduct vulnerability assessments and recommend mitigation strategies. *Deliver cybersecurity awareness training and guidance to staff. *Maintain the information security risk register and support audit processes. *Collaborate with IT and operational teams to ensure secure system configurations. *Assist in compliance with frameworks More ❯
Employment Type: Permanent
Salary: £35000 - £45000/annum Benefits
Posted:

Director of Engineering (Cybersecurity)

United Kingdom
RemoteStar
through mentorship, training, and clear performance frameworks. Execution & Delivery: Translate business and product goals into clear engineering OKRs, milestones, and sprint objectives. Ensure timely delivery of features, technical debt management, and continuous improvement of development velocity. Implement effective engineering processes, agile practices, sprint planning, retrospectives, and release cycles. Collaborate with Product Management to balance feature delivery with technical … health, security, and infrastructure priorities. Manage vendor relationships and oversee outsourcing or partner engagements when needed. Security, Compliance & Reliability: Lead the adoption of secure coding standards , vulnerability management, and security-by-design practices. Ensure compliance with relevant frameworks (ISO 27001, SOC 2, GDPR). Drive observability, monitoring, and incident response strategies to ensure reliability and uptime. Work closely … time data processing (Kafka, Spark, GraphDBs, etc.). Familiarity with AI/ML integration , large-scale data architecture, and analytics platforms is a strong plus. Strong communication and stakeholder management skills, able to work with executive leadership and external partners. Proven ability to deliver high-impact features in a start-up or growth-stage environment. Bachelor’s or Master More ❯
Posted:
Vulnerability Management
10th Percentile
£35,650
25th Percentile
£47,500
Median
£68,500
75th Percentile
£90,000
90th Percentile
£97,500