Vulnerability Management Jobs in Berkshire

26 to 50 of 67 Vulnerability Management Jobs in Berkshire

IT Operational Platforms and Security Lead

slough, south east england, United Kingdom
Hybrid / WFH Options
Pioneer Search
will involve two key projects around the generational cloud migration to Azure based services, as well as driving best practice I Identity and Access Management and defining the organisations cloud security policies. While there is some direct leadership, hands on ability to take ownership of a global infrastructure estate … with confidence. Responsibilities: Lead the shift to a secure, cloud-first infrastructure Owning the security strategy: zero-trust, Oversee global IT operations and lifecycle management Strengthen security controls and ensure regulatory compliance Manage vendor performance and service delivery Drive continuous improvement across platforms and processes Technical Skills: Microsoft … Azure, Defender, Sentinel IAM: Azure AD, MFA, SSO, PAM Security frameworks: ISO 27001, NIST, CIS SIEM, endpoint protection, vulnerability management ITIL-based service management and automation Leadership Skills Proven ability to lead IT operations and transformation projects Strong vendor and budget management experience Resilience in high More ❯
Posted:

Azure Cloud Engineer

slough, south east england, United Kingdom
Hybrid / WFH Options
Albany Beck
deployments. Build and maintain CI/CD pipelines with integrated DevSecOps tools to automate both application and infrastructure deployments. Integrate security capabilities such as vulnerability scanning, static code analysis, and secrets management into the development lifecycle. Work closely with development, architecture, and cybersecurity teams to ensure security and … banking or financial services industry, with a strong understanding of security and regulatory requirements. Strong knowledge of DevSecOps practices, including secure CI/CD, vulnerability management, and secrets management. Experience in container orchestration using AKS and containerisation with Docker. Familiarity with CI/CD tools such as Azure … DevOps and GitHub Actions. Proficiency in scripting languages (PowerShell, Python, Bash). In-depth understanding of cloud security, including identity and access management (Azure AD) and key management solutions. Experience with monitoring and logging tools such as Azure Monitor, Log Analytics, Prometheus, and Grafana. Relevant certifications (AZ More ❯
Posted:

Security Architect

reading, south east england, United Kingdom
Hybrid / WFH Options
Advanced Resource Managers
with infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerability management Your skillset may include: Proven experience as a Security Architect supporting major infrastructure transformation … with cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation, communication, and stakeholder engagement More ❯
Posted:

Security Architect

slough, south east england, United Kingdom
Hybrid / WFH Options
Advanced Resource Managers
with infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerability management Your skillset may include: Proven experience as a Security Architect supporting major infrastructure transformation … with cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation, communication, and stakeholder engagement More ❯
Posted:

Penetration Tester

slough, south east england, United Kingdom
Hybrid / WFH Options
Advanced Resource Managers
skills, with the ability to articulate complex technical findings and nuanced threat intelligence insights clearly and concisely to diverse audiences. Strong organizational and time management skills, with a proven ability to effectively manage and prioritize multiple concurrent engagements. Current CREST CRT certification or higher is essential. Must hold or … be eligible for SC Clearance. Desirable Skills: Experience with Breach Attack Simulation tools and methodologies. Experience in Vulnerability Management processes and integrating threat intelligence. Understanding of Risk Management frameworks and how threat intelligence informs risk assessments. Hands-on experience with security reviews of AWS, Azure, and GCP More ❯
Posted:

Microsoft Cloud Security Engineer

slough, south east england, United Kingdom
Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
Posted:

Microsoft Cloud Security Engineer

reading, south east england, United Kingdom
Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerability management tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
Posted:

Cyber Security Consultant

slough, south east england, United Kingdom
Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
Posted:

Cyber Security Consultant

reading, south east england, United Kingdom
Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
Posted:

Sr. Technical Support Engineer, Focused Services

slough, south east england, United Kingdom
Palo Alto Networks
deploy and manage cloud environments and integrate technologies that are part of customer stacks, to accurately replicate and resolve customer issues Knowledge of SIEM, vulnerability management tools, firewalls, malware, exploits, operating system structure and behavior Strong consulting and project management skills, with validated results working as a More ❯
Posted:

Senior Cloud Systems Engineer

slough, south east england, United Kingdom
Hybrid / WFH Options
Dexian Europe
and experience with the following technology... Microsoft Azure, Microsoft Windows Server, VDI Infrastructures. Active Directory, Intune Policies, Exchange, and Office 365 Administration. Patching and vulnerability management, including certificate management. General understanding of traditional and cloud-based networking and associated infrastructure. ServiceNow Ticketing System. JIRA and Confluence. Architecture standards More ❯
Posted:

Security Engineer – ForgeRock

slough, south east england, United Kingdom
Hybrid / WFH Options
JCW
with ForgeRock IAM stack : PingGateway, PingAM, PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetration testing , threat modeling, and vulnerability management Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO More ❯
Posted:

Principal Cyber Security Consultant - Hybrid

reading, south east england, United Kingdom
Hybrid / WFH Options
RiverSafe
specialising in designing, implementing and managing advanced security solutions. With expertise in SOC engineering tools and one of either Cloud Security, Identity and Access Management (IAM) or Threat Modelling, this role focuses on enhancing the security posture of organisations. The consultant will lead strategic security initiatives, collaborate with clients … Security, with a significant portion in a leadership role. A background in SOC engineering tools combined with expertise in either cloud security, Identity & Access Management or threat modelling. Proficiency in cloud platforms and services (AWS, Azure, GCP) with deep knowledge of native security tools. Hands-on experience designing and … implementing SIEM solutions in enterprise environments. Skilled in scripting and automation (e.g., Python, PowerShell) for security processes. Familiarity with tools for threat modelling, vulnerability management, and incident response. SIEM-specific certifications like Splunk Certified Architect, Sentinel Expert, or equivalent. IAM certifications (e.g., Okta Certified Consultant, SailPoint IdentityNow, or More ❯
Posted:

Principal Cyber Security Consultant - Hybrid

slough, south east england, United Kingdom
Hybrid / WFH Options
RiverSafe
specialising in designing, implementing and managing advanced security solutions. With expertise in SOC engineering tools and one of either Cloud Security, Identity and Access Management (IAM) or Threat Modelling, this role focuses on enhancing the security posture of organisations. The consultant will lead strategic security initiatives, collaborate with clients … Security, with a significant portion in a leadership role. A background in SOC engineering tools combined with expertise in either cloud security, Identity & Access Management or threat modelling. Proficiency in cloud platforms and services (AWS, Azure, GCP) with deep knowledge of native security tools. Hands-on experience designing and … implementing SIEM solutions in enterprise environments. Skilled in scripting and automation (e.g., Python, PowerShell) for security processes. Familiarity with tools for threat modelling, vulnerability management, and incident response. SIEM-specific certifications like Splunk Certified Architect, Sentinel Expert, or equivalent. IAM certifications (e.g., Okta Certified Consultant, SailPoint IdentityNow, or More ❯
Posted:

Senior Cyber Security Analyst - Microsoft Security Stack

slough, south east england, United Kingdom
Harrington Starr
all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerability management (tenable is tool used) and patching More ❯
Posted:

Cloud Application Security Engineer

slough, south east england, United Kingdom
Hybrid / WFH Options
Ignite Digital Talent
mesh - and ideally hands on experience on IAM via Okta. Demonstrable experience of supporting on security using more broad controls. A strong understanding of vulnerability identification and exploitation techniques and proficiency in using security tools such as SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) Knowledge … of security frameworks such as ISO 27001, NIST, or CIS benchmarks. Experience in application security reviews, vulnerability management, and security controls implementation. Familiarity with OWASP Top 10, CWE, and secure coding practices. Basic coding/scripting skills in Python, JavaScript, or similar. Strong communication skills with the ability More ❯
Posted:

Security Lead

slough, south east england, United Kingdom
Burns Sheehan
for: Owning and leading the information security function, working collaboratively across all departments. Maintaining and evolving ISO 27001 certification and managing the Information Security Management System (ISMS) lifecycle. Performing regular risk assessments, developing and managing remediation plans, and conducting internal security audits. Ensuring compliance with data protection laws (e.g. … controls across cloud infrastructure (ideally AWS), including access control, encryption, and logging. Leading the incident response process and managing third-party penetration testing and vulnerability management activities. The ideal Information Security Lead will have experience with the following: 3-5 years of hands-on experience in an information … AWS preferred) and common security risks associated with SaaS platforms. Hands-on knowledge of security tooling, including endpoint protection, SIEMs, DLP, identity and access management (IAM), and SSO. A clear understanding of data privacy laws, particularly GDPR. This is a unique opportunity to be the foundational Information Security leader More ❯
Posted:

Senior Cloud & Applications Security Engineer

slough, south east england, United Kingdom
Amtis - Digital, Technology, Transformation
diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency in … Experience with CI/CD tools and practices, ensuring secure and automated deployment processes. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Responsibilities Security Strategy: Define and execute cloud security strategy, partnering with platform and Site Reliability Engineering (SRE More ❯
Posted:

Information Security Consultant

slough, south east england, United Kingdom
Hybrid / WFH Options
Eames Consulting
of complex, multi-site security projects globally. Deep knowledge of security frameworks (NIST, ISO 27001, CIS, CSA CCM). Strong understanding of GRC processes , vulnerability management, incident response, and SOC. Familiarity with DevSecOps , secure SDLC, disaster recovery, and BCP. Excellent stakeholder management and communication skills. Experience navigating More ❯
Posted:

Senior IT Service Delivery Manager

reading, south east england, United Kingdom
Hybrid / WFH Options
talego
architecture and service management. Introducing and implementing solutions and platforms on cloud technologies (ideally Azure). Set the strategy for the provisioning and lifecycle management of all end-user equipment and software. Own, maintain, and develop the CMDB for all end-user assets to enable effective budget planning and … Entra and AAD (including provisioning). Possesses a good understanding of endpoint security and measures to secure assets and data, including SSO/MFA, vulnerability management, email security, scanning, and pen testing. Experience with managing a hybrid device estate including MACs, Windows, and Linux as well as Intune … managed portable devices. Experience with Enterprise MDM, EPP, EDR, Patch management, and other tools from vendors like Microsoft, JAMF, CrowdStrike, ManageEngine, and Esentire to protect, monitor, and respond to incidents. Familiar with Enterprise service delivery platforms such as ServiceNow, FreshService, or similar, with experience customizing and using reporting for More ❯
Posted:

Senior IT Service Delivery Manager

slough, south east england, United Kingdom
Hybrid / WFH Options
talego
architecture and service management. Introducing and implementing solutions and platforms on cloud technologies (ideally Azure). Set the strategy for the provisioning and lifecycle management of all end-user equipment and software. Own, maintain, and develop the CMDB for all end-user assets to enable effective budget planning and … Entra and AAD (including provisioning). Possesses a good understanding of endpoint security and measures to secure assets and data, including SSO/MFA, vulnerability management, email security, scanning, and pen testing. Experience with managing a hybrid device estate including MACs, Windows, and Linux as well as Intune … managed portable devices. Experience with Enterprise MDM, EPP, EDR, Patch management, and other tools from vendors like Microsoft, JAMF, CrowdStrike, ManageEngine, and Esentire to protect, monitor, and respond to incidents. Familiar with Enterprise service delivery platforms such as ServiceNow, FreshService, or similar, with experience customizing and using reporting for More ❯
Posted:

Senior Desktop Infrastructure Engineer

slough, south east england, United Kingdom
Quant Capital
backup, and business continuity processes • Collaborating with internal teams and external vendors on system upgrades, maintenance, and incident resolution • Contributing to security posture improvements, vulnerability management, and compliance efforts Experience • 5+ years’ experience in infrastructure or systems engineering, preferably within trading, hedge funds, or financial services • Deep expertise … scripting and automation skills, particularly with PowerShell • Hands-on experience with cloud platforms (Azure or AWS) and hybrid IT environments • Solid understanding of endpoint management, system hardening, and patching • Familiarity with security best practices in regulated or high-trust environments • A proactive, self-starting attitude with the ability to More ❯
Posted:

Senior Azure Cloud Engineer

slough, south east england, United Kingdom
Clear Point Consultants
tools and doing deep technical research Skilled at working across departments and with both business and tech leaders Familiar with ITIL practices like change management Able to juggle complex projects and bring them to the finish line A strong communicator who’s good with both written and verbal updates … teams in multiple time zones Tech Stack You’ll Be Using Microsoft Azure, Windows Server, VDI Active Directory, Intune, Exchange, Office 365 Patching/vulnerability management, certs General networking knowledge (on-prem & cloud) ServiceNow, JIRA, Confluence Familiarity with frameworks like TOGAF or ArchiMate is helpful More ❯
Posted:

Security Engineer

slough, south east england, United Kingdom
Velocity Tech
secure deployment and infrastructure practices Act as the primary SecOps contact during the contract period, bridging an internal resource gap Support incident response and vulnerability management as needed More ❯
Posted:

Senior IT Security Engineer

slough, south east england, United Kingdom
Optima Connections Limited
Familiar with NIST, ISO 27001, ITIL Azure - 5 years experience Info Sec (Azure AD, Defender, Sentinel) PIM/PAM Audits and report writing Assessments Vulnerability Management and Pen Testing Zero Trust Architecture Automation (eg powershell, python More ❯
Posted:
Vulnerability Management
Berkshire
25th Percentile
£47,500
Median
£50,000
75th Percentile
£52,500