Vulnerability Management Jobs in England

1 to 25 of 1,000 Vulnerability Management Jobs in England

Security Engineer - 12 month FTC

London, England, United Kingdom
Walkers
specifically responsible for completing the implementation of a number of strategic based security solutions for new security tooling or existing. The engineer will also participate in security related service management processes (incident, change and problem management) and will participate in the planning, design, enforcement and review of security controls which protect the integrity of Walkers IT. “The ideal … security-by-design principles into development processes . Conduct reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerability management, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Support Data Loss Prevention (DLP) solutions that … protect corporate data across platforms, devices, and environments globally. Monitoring and managing responses to the Security Incidents and Security DLP. Standard, third party and privilege Identity Access Management Operate, manage and improve HSM key management infrastructure. Remediation of external, internal vulnerabilities, web application scanning and patch compliance. Cyber Incident Management and or Security Forensic experience. Documenting High More ❯
Posted:

Senior Information Security Analyst

London, England, United Kingdom
Hybrid / WFH Options
Onyx-Conseil
security measures to protect our computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity … and external cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is essential. Responsibilities: • Collaborate with IT … cybersecurity projects to ensure that the delivery is on-time, within budget, and adopted to meet the companys information protection requirements. • Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA, and other data privacy and More ❯
Posted:

Security Engineer - 12-Month Fixed-Term Contract

London, England, United Kingdom
Precise Placements
and incident response in a fast–paced environment Key Responsibilities: Implement new and existing security tooling to enhance the firm's security controls Support security operations, including incident response , vulnerability management , and DLP Embed security–by–design principles in collaboration with IT and Dev teams Operate and enhance security infrastructure, including HSM , EDR , SIEM , and IAM Monitor and … Exabeam, Splunk, QRadar IAM : ENTRA ID, CyberArk, DUO MFA Firewall & Network Security : Cisco, Palo Alto, NAC DLP tools: Microsoft Purview, Tessian Strong scripting abilities (PowerShell, Python, Perl) Familiarity with vulnerability management , penetration testing, and security frameworks (NIST, ISO 27001, OWASP, GDPR) Proficient in managing compliance and infrastructure hardening against CIS benchmarks Qualifications: Degree in Computer Science, Information Security More ❯
Posted:

Security Engineer

Manchester, United Kingdom
Hybrid / WFH Options
The MRJ Group
security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and controls for EUC environments, including endpoint … respond to security incidents, conducting forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory requirements. Collaborate Across Teams: Work … secure cloud architectures. Engagement: Foster a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. Security Automation & Optimization : Develop, implement More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Vulnerability Management Analyst

London, England, United Kingdom
Hybrid / WFH Options
The Curve Group
Get AI-powered advice on this job and more exclusive features. Direct message the job poster from The Curve Group Executive Search, Talent Acquisition & Recruitment Outsourcing Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very … Cyber Security Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic More ❯
Posted:

Deputy CISO

London, England, United Kingdom
Hays
hands-on technical expertise. The Assistant CISO will play a key role in rewriting and implementing information security standards, collaborating with key stakeholders to ensure alignment with organisational risk management practices, and fostering a proactive security culture across the company. As a key partner to the CISO, this role involves both strategic thinking and practical, hands-on execution of … to ensure they meet current industry best practices and align with legal, regulatory, and organisational requirements. Develop and implement guidelines for adherence to these standards across the company. Policy Management: Work closely with the CISO and other security leaders to create, update, and enforce information security policies. Ensure that security policies are effectively communicated and understood across departments, with … detailed technical insights on security threats and vulnerabilities, and support JRC members in decision-making processes. Hands-On Security Experience: Take an active role in the day-to-day management of security operations, including incident response, threat hunting, vulnerability management, and other proactive measures. Provide expertise in implementing technical security solutions and ensuring they align with organisational More ❯
Posted:

Information Security Engineer

Southampton, England, United Kingdom
Hybrid / WFH Options
Nice Group
ensure the confidentiality, integrity, and availability of our systems and data. How will you make an impact? Security Tooling: Deploy, maintain, integrate, and perform initial configuration of security tools. Vulnerability Management: Coordinate and conduct regular security assessments, penetration testing, and vulnerability scans to identify and address security weaknesses proactively. Incident Response: Lead incident response efforts to promptly … logs and alerts, investigate suspicious activities, and respond to security events in real-time. Implement and maintain security tools and technologies to enhance our security posture. Identity and Access Management: Manage user access controls, authentication mechanisms, and identity management systems to ensure appropriate levels of access and privilege. Have you got what it takes? At least 5 years More ❯
Posted:

Information Security Engineer

London, England, United Kingdom
Hybrid / WFH Options
NICE
ensure the confidentiality, integrity, and availability of our systems and data. How will you make an impact? Security Tooling: Deploy, maintain, integrate, and perform initial configuration of security tools. Vulnerability Management: Coordinate and conduct regular security assessments, penetration testing, and vulnerability scans to identify and address security weaknesses proactively. Incident Response: Lead incident response efforts to promptly … logs and alerts, investigate suspicious activities, and respond to security events in real-time. Implement and maintain security tools and technologies to enhance our security posture. Identity and Access Management: Manage user access controls, authentication mechanisms, and identity management systems to ensure appropriate levels of access and privilege. Have you got what it takes? At least 5 years More ❯
Posted:

Cyber Vulnerability Management Analyst

London, UK
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very … Cyber Security Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic More ❯
Posted:

Cyber Vulnerability Management Analyst

City of London, London, United Kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very … Cyber Security Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic More ❯
Posted:

Tenable Vulnerability Management Analyst - Banking sector

London Area, United Kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very … Cyber Security Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic More ❯
Posted:

Tenable Vulnerability Management Analyst - Banking sector

City of London, London, United Kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very … Cyber Security Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic More ❯
Posted:

Tier 1 Security Operations Centre Analyst

London, England, United Kingdom
SecureCloud+
detection, triage, and escalation of security incidents, helping to protect our organisation and customers from evolving cyber threats. You'll monitor security alerts, assist with investigations, and contribute to vulnerability management and compliance efforts. This is an excellent opportunity for someone early in their cybersecurity career to gain hands-on experience, grow their skills, and be part of … collaborative and high-performing security team. Role Responsibilities Key responsibilities for this role may include: Incident Detection & Response: Monitor security events and alerts using SIEM (Security Information and Event Management) and other security tools to identify potential security threats and incidents. Conduct initial triage, analysis, and categorisation of security incidents based on severity and impact. Escalate complex or high … taken. Regularly perform compliance checks and IT health check schedules against internal components and against our services. Working on Remedial Action Plans and mitigations on completion of ITHC and vulnerability scanning activity. Participate in on-call or out-of-hours technical support where appropriate and supported by senior staff. Threat intelligence and analysis: Stay updated with the latest cybersecurity More ❯
Posted:

Cybersecurity Engineer

London, England, United Kingdom
Alight Solutions
and maintaining security solutions that protect Strada’s cloud and on-prem infrastructure. This role will be deeply technical and hands-on, working across security operations, engineering, and risk management to strengthen our security posture while enabling the business. This position offers an opportunity to work closely with security architects, BISOs, and cloud security teams, helping Strada establish a … Key Responsibilities Security Engineering & Operations Design and implement security solutions across cloud, endpoint, identity, and network security. Configure and maintain security tools, including SIEM, EDR, WAFs, firewalls, IAM, and vulnerability management platforms. Collaborate with infrastructure and DevOps teams to embed security into CI/CD pipelines. Lead the deployment of zero-trust architectures, security automation, and monitoring solutions. … Support security incident detection, investigation, and response alongside the SOC and Red Team. Threat & Vulnerability Management Perform regular security assessments, vulnerability scans, and penetration tests, prioritizing remediation efforts. Develop automated remediation for common security risks and misconfigurations. Monitor and analyze security logs and alerts, fine-tuning detections and response playbooks. Risk & Compliance Support Work with GRC and More ❯
Posted:

IT, Security & Compliance Manager

Islington, England, United Kingdom
Futureheads
security and technology framework to protect its information assets, customers, and operations. The team is seeking an experienced, proactive IT, Security & Compliance Manager to own the day-to-day management of IT services, systems security, and incident response. Role Purpose The IT, Security & Compliance Manager is responsible for maintaining the security, integrity, and availability of the company's systems … device security, and application access control Provide first-line and second-line Helpdesk support to internal users Ensure business continuity and disaster recovery plans are maintained and tested Cybersecurity Management Implement and maintain security policies (e.g., access control, password management, vulnerability management) Monitor and respond to cybersecurity threats and incidents Oversee system patching, endpoint protection, and … network security controls Lead periodic penetration tests and vulnerability assessments Manage risk assessments and security awareness training programs Governance, Risk, and Compliance Maintain compliance with GDPR (both UK and EU) and emerging best practices Conduct regular access reviews and system audits Support incident reporting and documentation for regulatory and internal purposes Assist with responses to customer and prospect queries More ❯
Posted:

Information Security Engineer

London, United Kingdom
Hybrid / WFH Options
NICE
ensure the confidentiality, integrity, and availability of our systems and data. How will you make an impact? Security Tooling: Deploy, maintain, integrate, and perform initial configuration of security tools. Vulnerability Management: Coordinate and conduct regular security assessments, penetration testing, and vulnerability scans to identify and address security weaknesses proactively. Incident Response: Lead incident response efforts to promptly … logs and alerts, investigate suspicious activities, and respond to security events in real-time. Implement and maintain security tools and technologies to enhance our security posture. Identity and Access Management: Manage user access controls, authentication mechanisms, and identity management systems to ensure appropriate levels of access and privilege. Have you got what it takes? At least 5 years More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Engineer

Hedge End, England, United Kingdom
Hybrid / WFH Options
NICE
ensure the confidentiality, integrity, and availability of our systems and data. How will you make an impact? Security Tooling: Deploy, maintain, integrate, and perform initial configuration of security tools. Vulnerability Management: Coordinate and conduct regular security assessments, penetration testing, and vulnerability scans to identify and address security weaknesses proactively. Incident Response: Lead incident response efforts to promptly … logs and alerts, investigate suspicious activities, and respond to security events in real-time. Implement and maintain security tools and technologies to enhance our security posture. Identity and Access Management: Manage user access controls, authentication mechanisms, and identity management systems to ensure appropriate levels of access and privilege. Have you got what it takes? At least 5 years More ❯
Posted:

Consulting Director, Proactive Services, vCISO (Unit 42)

London, England, United Kingdom
Palo Alto Networks
public sector client. This crucial role will act as an account CISO and requires a trusted advisor who can effectively engage with client stakeholders (including CISOs, security teams, IT management, and executive leadership) across the account. The vCISO will primarily be responsible for the delivery of security services as part of a large-scale transformation programme and will also … point of contact for all client cybersecurity matters and requires a broad understanding of security control implementation within various corporate environments. Success in this role hinges on exceptional relationship management skills and the ability to drive adoption of recommended security solutions within the client organization. Your Impact Client Engagement And Programme Delivery Serve as a trusted security advisor to … client stakeholders, including CISOs, security teams, IT management, and executive leadership. Work with different delivery partners across a complex product and service ecosystem to pragmatically manage risk and drive successful outcomes. Develop and own the programme delivery and security services operational risk register. Develop deep, trusted relationships across the client organization, fostering open communication and collaboration. Provide strategic guidance More ❯
Posted:

Information Security Manager

London, England, United Kingdom
Hybrid / WFH Options
JN Bank UK
and maintain information security policies, procedures, and standards aligned with industry best practices (NCSC recommendations, UK DPA, ISO 27001, PCI DSS, NIST etc.). · Lead and support risk assessments, vulnerability scans, and security audits. · Manage day-to-day security operations, including monitoring, incident detection, investigation, and response. · Manage security tools, including endpoint protection software, patch and update management systems, vulnerability management systems, cloud security posture management (CSPM) systems, firewalls, intrusion detection/prevention systems, SIEM platforms, and encryption technologies. · Coordinate with IT Operations, IT Development, compliance and other departments to ensure secure systems design and regulatory compliance. · Oversee third-party vendor security assessments and due diligence processes. · Support data loss prevention (DLP), endpoint protection … experience with firewalls, IDS/IPS, SIEM, EDR/XDR, and cloud security tools. · Professional certifications such as CISSP, CISM, CISA, or CEH. · Strong knowledge of security architecture, risk management, incident response, and regulatory compliance. · Experience with security frameworks and standards (e.g., ISO, CIS, COBIT). · Excellent analytical, communication, and leadership skills. · Ability to manage and prioritize multiple projects More ❯
Posted:

Cloud Security Architect

London, England, United Kingdom
UBDS Digital
policies, standards, and procedures to ensure compliance with regulatory requirements Collaborate with clients to understand their security needs and provide tailored solutions Lead security assurance activities, including risk assessments, vulnerability assessments, penetration testing, and threat modelling techniques such as MITRE ATT&CK, STRIDE, DREAD, and PASTA Provide expert guidance on security controls and measures to protect cloud infrastructure and … United Kingdom 3 weeks ago London, England, United Kingdom 1 day ago Information Security Architect/Manager London, England, United Kingdom 1 week ago Experienced Security Architect | Professional Pension Management Firm Principal Cyber Security Consultant - Hybrid London, England, United Kingdom 1 week ago London, England, United Kingdom 1 week ago Cloud Security Consultant, Google Cloud Professional Services London, England … United Kingdom 1 week ago IT Security Solution Architect - Director London, England, United Kingdom 2 weeks ago Senior Security Analyst - Vulnerability Management Senior Cloud Security Architect - AWS, Landing Zone, IAM Network and Endpoint Security Pre-Sales Architect - London Enterprise Security Architect, Strategic Accounts London, England, United Kingdom 2 weeks ago London, England, United Kingdom 6 days ago Management More ❯
Posted:

Head of IT

London, England, United Kingdom
Hybrid / WFH Options
VML
implementation of strategies set by the leadership team. Implement and Manage an effective Staff Training and Awareness program to promote best practices. Adopt a continuous improvement approach to the management of Information Technology, Information Security and Privacy. Ensure that main stakeholders are informed and consulted via an effective Management Review process. Risk Identify information security threats and manage … an effective Vulnerability Management Process. Maintain an effective, proactive Risk Management Framework. Manage and maintain the Satalia Risk Register. Ensure an effective Incident Management procedure and Business Continuity Plan are maintained. Compliance Manage an effective Audit Programme to check compliance against key control requirements. Ensure an appropriate level of support for annual external audits required to … Cyber Essentials Plus requirements. Work in partnership with development staff to embed best practices in the development processes throughout the software development lifecycle. Devise and embed an effective Vendor Management programme to ensure the service provided by critical suppliers meet organisational requirements. Operational Oversee all technology operations and evaluate them according to established goals. Oversee the management and More ❯
Posted:

Information Security Analyst - Audit, Compliance & Cybersecurity

Hedge End, England, United Kingdom
Hybrid / WFH Options
NICE
activities, including incident monitoring and response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits. Gap Assessments: Facilitate and/or conduct internal gap assessments and audit readiness … of compliance processes. Audit Findings: Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security Monitoring: Use tools such as … and implementing recommendations to improve the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. Vulnerability Management: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong expertise in audit and compliance More ❯
Posted:

Information Security Analyst - Audit, Compliance & Cybersecurity

Southampton, Hampshire, United Kingdom
Hybrid / WFH Options
NICE
activities, including incident monitoring and response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits. Gap Assessments: Facilitate and/or conduct internal gap assessments and audit readiness … of compliance processes. Audit Findings: Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security Monitoring: Use tools such as … and implementing recommendations to improve the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. Vulnerability Management: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong expertise in audit and compliance More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Head of IT (AI technology)

London, England, United Kingdom
Hybrid / WFH Options
VML Enterprise Solutions
implementation of strategies set by the leadership team Implement and Manage an effective Staff Training and Awareness program to promote best practices. Adopt a continuous improvement approach to the management of Information Technology, Information Security and Privacy. Ensure that main stakeholders are informed and consulted via an effective Management Review process Risk Identify information security threats and manage … an effective Vulnerability Management Process. Maintain an effective, proactive Risk Management Framework. Manage and maintain the Satalia Risk Register. Ensure an effective Incident Management procedure and Business Continuity Plan are maintained. Compliance Manage an effective Audit Programme to check compliance against key control requirements. Ensure an appropriate level of support for annual external audits required to … Cyber Essentials Plus requirements. Work in partnership with development staff to embed best practices in the development processes throughout the software development lifecycle. Devise and embed an effective Vendor Management programme to ensure the service provided by critical suppliers meet organisational requirements. Operational Oversee all technology operations and evaluate them according to established goals. Oversea the management and More ❯
Posted:

Cyber Vulnerability Management Analyst

London, England, United Kingdom
Hybrid / WFH Options
FirstBank UK Limited
Get AI-powered advice on this job and more exclusive features. Direct message the job poster from FirstBank UK Limited Executive Search, Talent Acquisition & Recruitment Outsourcing Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months FirstBank UK is a globally recognised, top-tier bank who provide world-class services to various institutions and individuals. Offering a … in over 700 business locations is the oldest African bank in the UK. Due to business requirements, we are now looking to acquire the services of an experienced Cyber Vulnerability Management Analyst Please note that this is a hybrid role with 3 days in the office and 2 days working from home. Key Responsibilities: In this fixed term … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very More ❯
Posted:
Vulnerability Management
England
10th Percentile
£40,000
25th Percentile
£50,000
Median
£60,000
75th Percentile
£81,250
90th Percentile
£95,000