Vulnerability Management Jobs in England

26 to 50 of 109 Vulnerability Management Jobs in England

Data Security Manager

London Area, United Kingdom
Arcus Search
you. Join them by being a key player in their innovative and forward-thinking team! Responsibilities: Partner with key stakeholders from Global Technology, Risk Management, Data Protection Officer, and Information Security to ensure products and processes are compliant, resilient, and audit-ready Ensure products comply with GDPR, CFIUS, and … end ownership of Data Controls projects to achieve success with relevant stakeholders Manage current projects related to Cloud Secure Design and Data Access Rights Management improvement to proactively meet future strategic requirements, focusing on Process, People, and Technology Strong communication and negotiation skills are essential to ensure that key … Proven business acumen and commercial awareness Experience with the '3 Lines of Defense' Governance Model Working knowledge of IT security best practices, penetration testing, vulnerability management, Incident, Problem & Change Management, and Business Continuity Robust experience in project management, analytical skills, and continuous improvement methodologies Strategic thinking more »
Posted:

Security Operations Center Analyst

London Area, United Kingdom
Hybrid / WFH Options
Bestman Solutions
Threat Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security Penetration Testing Security Automation (SOAR) Qualifications: Knowledge and experience in the following: SIEM Tools Vulnerability Management EDR Software Intrusion Detection/Prevention Systems Web Proxies Network Security & Firewalls Programming – Nice to have! More details: Permanent role 2 days more »
Posted:

Cloud Infrastructure Engineer

Bath, England, United Kingdom
Hybrid / WFH Options
Peaple Talent
Azure Landing Zones Azure architecture Azure Entra ID (Enterprise applications, conditional access etc.) Azure storage accounts Azure Virtual Machines Azure performance, security, and cost management MS365 Applications with certification and/or demonstrable experience of: Sharepoint MS Exchange Online On-prem infrastructure experience including: Building and configuration of MS … Windows Servers Active Directory domain knowledge Hypervisor virtualisation management (ideally VMWare) Backup solutions (ideally VEEAM) Infrastructure performance monitoring Additional Technologies: Vulnerability Management SIEM Technologies Powershell Infrastructure As Code (ideally Terraform and Ansible) Essential Desirable Knowledge and Experience: SQL Networking experience (Cisco switch, firewalls) Cisco Umbrella Nutanix Hyperconverged more »
Posted:

Information Security Consultant

City Of London, England, United Kingdom
Barclay Simpson
security risk for the whole project life cycle Perform security activities, including but not limited to, security design reviews, risk assessments, threat modelling, and vulnerability management and risk mitigation on internally & externally developed software Embedding security within DevOps (eg CI/CD pipelines), developing security requirements On-demand more »
Posted:

SOC lead

Greater Manchester, England, United Kingdom
Gamma
different data sources and tools for analysis. · Previous experience of mentoring or leading SOC analysts is desirable but not essential. · Experience of risk-based vulnerability management is desirable. What do we offer? 25 days PTO + bank holidays Your birthday off Private Medical Insurance Electric Vehicle (EV) scheme more »
Posted:

Full Stack Engineer

London Area, United Kingdom
Glocomms
to the design and architecture of the front-office application. Understand CI/CD pipelines and deploy the UI into production. Familiarize yourself with vulnerability management. Qualifications and Skills: Strong experience in React development. Proficiency in TypeScript, JavaScript, and possibly Java. Familiarity with low-latency systems and financial markets more »
Posted:

Solutions Designer - Utilities

Portsmouth, England, United Kingdom
Hybrid / WFH Options
TalentHawk
for a contract position. The ideal candidate will have experience in software, hardware, network, and Operational Technology (OT) . Key Projects: OT Asset Discovery & Vulnerability Management OT AD Audit Tool Both projects are currently at the high-level design stage. The successful candidate will be responsible for advancing more »
Posted:

Infrastructure Services Analyst

York, Yorkshire, United Kingdom
Investigo Change Solutions
limited to: * Server OS. * Group Policy. * File systems (on-premises and cloud). * Exchange (on-premises and cloud). * M365. * SQL. * Active Directory. * Server Vulnerability Management. * Identity and Access Management. * Multi-Factor Authentication. * Active Directory. * Azure Active Directory. * ADFS (Active Directory Federation Services). * Azure Active Directory Privileged Identity … Management (PIM). more »
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Operations Manager

Liverpool, Merseyside, United Kingdom
Hybrid / WFH Options
Sanderson Recruitment Plc
timely resolution of complex issues. Reporting and Documentation : Produce security metrics and reports, maintain comprehensive documentation, and develop new procedures as necessary. Security Platforms Management : Support, maintain, and govern all security platforms, including SIEM, NAC, Firewalls, endpoint security, and more. Threat Analysis and Response : Conduct advanced analysis of network … endpoint, and log data to determine root causes and impacts of security incidents. Vulnerability Management : Lead the remediation of system vulnerabilities through patching and updates, ensuring the organisation's infrastructure remains secure. Technical Mentorship : Provide guidance and mentorship to the team, fostering a positive and professional work environment. … Stakeholder Engagement : Engage regularly with key stakeholders, facilitating open and collaborative communication across departments. Policy and Procedure Governance : Assist senior management in maintaining and updating security policies and procedures. Key Requirements: Proven experience in leading and mentoring a technical team within an IT function. Strong expertise in using and more »
Employment Type: Permanent
Salary: GBP 70,000 Annual
Posted:

Tenable Nessus Vulnerability Management Scanning Engineer

England, United Kingdom
Hybrid / WFH Options
GlobalLogic
Tenable Nessus Vulnerability Management Scanning Engineer GlobalLogic have a new role for an Vulnerability Management Scanning Enginee r with Tenable Nessus expertise. This role is working INSIDE IR35 for an initial 6 months and will be a Hybrid working pattern, 2 days per week onsite at … either Cheshire or Glasgow offices. Any Banking or financial services experience would be an advantage. The core skill is Tenable Nessus Vulnerability Management, and we are looking for someone who can be responsible for maintaining the Tenable product suite and ensure meeting scanning coverage across the organisation .The … ideal candidatehas the following skills and expertise: years of experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues years of experience with performing systems administration in Windows, Linux, VMware environments, including performing troubleshooting, installation or configuration more »
Posted:

Security Engineer (Vulnerability)

London, England, United Kingdom
Viqu
Security Engineer (Vulnerability) – 3 months contract – London – Outside IR35 Security Engineer (Vulnerability) required by a leading financial organisation in London. As the Vulnerability Management Lead, you will play a crucial role in ensuring the on-going security posture of the organisation. You will be required to … have expert knowledge and technical experience with Qualys as this is the main tool used within the business's security space. The Security Engineer (vulnerability) would have a focus on vulnerability and patch management specifically utilising the capabilities within Qualys in a Microsoft estate. The ability to … act as a “technical” project manager to manage these Security projects would be highly beneficial. Key responsibilities for the Security Engineer (Vulnerability) include: In-depth knowledge of vulnerability, and patch and risk management Experience working with Vulnerability tools – Qualys expertise are required. Experience leading vulnerability more »
Posted:

Cybersecurity Senior Engineer

Greater London, England, United Kingdom
McDermott International, Ltd
including the close cycles (month-end, quarter & year-end), support of all subledgers and the GL. Experience 5+ years of experience with threat and vulnerability management (TVM) program and operations 3+ years of experience working with threat intelligence feeds and IOCs Education High School Diploma w/… of information security experience Additional 10 years of IT experience 7+ years in an information security role 5+ years of experience with threat and vulnerability management program and operations 3+ years of experience working with threat intelligence feeds and IOCs 3+ years of experience in a security engineer … role 3+ experience with cloud vulnerabilities 2+ years of experience with endpoint protection tools 2+ years of experience with security information and event management (SIEM) tools 1+ years of experience with perimeter security Primary Functions Operate within the global Cybersecurity Team within the Information Technology department Ensure global alignment more »
Posted:

Senior Information Technology Engineer

High Wycombe, England, United Kingdom
Arden Resourcing Limited
role will be a hands-on senior role within the organisation to implement and manage the entire companies’ internal infrastructure including desktop security, endpoint management, vulnerability management, asset management and working to provide security operations. The role will involve control and deployment of all processes for more »
Posted:

Senior Security Analyst

Welwyn Garden City, England, United Kingdom
Tesco
Tesco Technology are looking for a Senior Security Analyst reporting into the Vulnerability Management team. This is an exciting opportunity for a highly motivated security focused individual to join our expanding organisation. The scale and complexity of Tesco creates a huge opportunity for someone to apply their existing … public cloud environments. Following our Business Code of Conduct and always acting with integrity and due diligence and have these specific risk responsibilities: Maintaining vulnerability scanning platforms to identify and analyse vulnerabilities. Taking a risk-based approach to prioritise remediation efforts. Working with engineering teams to remediate issues. Building … security incidents and reporting about relevant security threats to contribute to our internal detection engineering programme. Work alongside our analysts to upskill them in Vulnerability Management and look for patterns and issues that can be fixed centrally. POC assessments from our active Bug Bounty Program. You will need more »
Posted:

Information Security Assistant Manager - 18903

London Area, United Kingdom
Saxton Leigh
of the state of information security and cybersecurity and provide periodic reports (at least annually) on the state of information security to/Top management Adopt, implement and update Cybersecurity policies, rules, processes and procedures in line with Head Office regulatory Framework In reporting to the Top Management … the Group model. Work with information owners in business units to determine appropriate security objectives Monitor network activity for malicious activity Monitor and evaluates vulnerability reports, vendor hot-fixes, and vendor patches for applicability to deployed technologies Monitor the process of creating, changing, or removing user access across all … maintained and approved Responsible for the Cybersecurity and Business Continuity Training Programs EXPERIENCE REQUIRED: Minimum 2-3 years in the cybersecurity and business continuity management environment, preferably in a Financial Institution Experience in developing and Cybersecurity awareness programs Bachelor's in computer science, Information Technology or related field Experience more »
Posted:

Senior Security Engineer

London Area, United Kingdom
Hybrid / WFH Options
Cognitive Group | Part of the Focus Cloud Group
tools such as Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerability management, and penetration testing. Risk Management and Compliance Identify and assess security risks and develop mitigation strategies. Ensure compliance with relevant security more »
Posted:

Technical Services Manager

Leeds, England, United Kingdom
Talion
and Managed Services. Our suite of services blends together best-in-breed technologies to provide real time 24×7 monitoring, triage, remediation, threat assessment, vulnerability management, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our Security Operations Centre (SOC … levels of service. Collaboration with the Customer at both technical and business levels to underpin the activities of sub-contractors or service provisioning teams. Management of small enhancement projects utilising capabilities within the service team. Management of the handling of incidents, problems and change in their area of … of performance, collection of performance data and investigation of problems and trends. Resolution or escalation of problems, implementation of service improvement actions and programmes, management of these to agreed timelines and ownership of communication to both the Customer and internal management teams. Provision of feedback on service portfolio more »
Posted:

Business Continuity Lead

London Area, United Kingdom
Acumin
s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH, CEH, or OSCP. Proficiency in SIEM Platforms, vulnerability management tools, and incident management processes. Experience in managing security functions or SOC capabilities. Strong analytical skills to analyze security monitoring data more »
Posted:

Security Analyst

Hampshire, England, United Kingdom
Shaw Daniels Solutions
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and … monitor for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular Vulnerability Scanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. … Asses the urgency and severity of incidents. Determine whether an incident requires immediate action or further investigation. Escalate incidents to higher tiers when necessary. Vulnerability Scanning: scan systems for vulnerabilities. and manage vulnerabilities discovered during scans. Security Tool Management: Configure and manage security tools (e.g., SIEM, IDS/ more »
Posted:

Security Operations Specialist

London Area, United Kingdom
Eames Consulting
documentation, and procedures. Resolve security operations support incidents promptly. Assist Information Security Architecture team with technical security matters. Support Internal Control Framework (ICF) development, vulnerability management, and technical audits. Promote security awareness and best practices within the company Collaborate with technical teams and third-party security partners on … key projects. Technical Requirements: Expertise in security technologies (endpoint protection, vulnerability scanners, network security, cloud security, etc.). Knowledge of Privileged Access Management (PAM) best practices and technologies. Proficiency with Microsoft technologies (Windows Server, Active Directory, SQL Server). Experience with Linux distributions (Ubuntu, Red Hat, Rocky). more »
Posted:

Cyber Security Consultant/Architect

Reading, England, United Kingdom
Project People
evolve your technical expertise. Create, review, and approve architecture, design, delivery, and test documentation to ensure effective governance and technical assurance. Ensure effective capacity management and planning for security services and solutions, integrating these into our technical and budget roadmaps. Support Programme and Project Managers in project planning, risk … management, and budgeting processes.What experince do you need: A mix of security consulting, architecture/design, and professional services experience. Proven ability to lead the design and review of secure system architectures, challenging existing norms to set new directions. Deep knowledge of system architectures and an understanding of the … vulnerabilities. Expertise in one or more technical domains: Cloud/Hybrid security, Infrastructure and data centre security, Network security, Application security, Identity and access management, Vulnerability Management. Familiarity with common information security management frameworks (NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF SoGP, COBIT).Project People is more »
Posted:

Cyber Security IT Analyst

England, United Kingdom
Hybrid / WFH Options
Larbey Evans
latest security principles, techniques, and protocols Detailed technical knowledge related to endpoints, servers, infrastructure and networking technologies Strong experience in supporting security systems, including vulnerability management, SIEM, DLP,SOAR, EDR solution, Network Firewalls etc. Working knowledge of IT processes (i.e., ITIL) including incident, problem, defect, change and release … management The Cyber Security IT Analyst requirements: 3+ years’ experience in Cyber Security IT operations (law firm preferable, professional services advantageous) Bachelor’s degree or higher in Computer Science or Information Security (essential) Advanced ability to organize, prioritize, coordinate, and work as part of a team Excellent written and more »
Posted:

Senior Cyber Security Analyst

Brighton, England, United Kingdom
Hybrid / WFH Options
Hays
infrastructure for the organisation. The role responsibilities: You will be supporting the Head of IT and Cyber Security with the day-to-day operational management of the cyber security function. You will work with the Senior Cyber Security Manager to define and evolve the cyber strategy across the organisation. … and analyse security incidents and breaches, and lead incident response efforts to contain and mitigate the impact in a timely manner. Reporting to senior management on Cyber related metrics and improvement needs. Foster a culture of security awareness and compliance amongst team members and stakeholders through training, education, and … initiatives. Leading any major cyber incidents should they arise. Escalating security concerns that are not being adequately addressed through the established risk/issue management framework. You will need: You will need to be able to influence and collaborate with other teams in the organisation, and the ability to more »
Posted:

Information Security Officer

Farnborough, England, United Kingdom
Hybrid / WFH Options
Shaw Daniels Solutions
with stakeholders, to uncover emerging risks and opportunities for malicious actors. Produce written reports, status updates, actions, minutes to support decision making within the management systems governance programme. Conduct annual Business Impact Assessments with relevant teams Ensure and track that staff get the infosec training required Annual infosec and … the document review period. Compile a list of actions to address any lapses and track to conclusion. Assist with the monitoring of our platform vulnerability management systems and logging of identified vulnerabilities In the event of any security event, be part of the response team, by providing infosec more »
Posted:

Presales Consultant

Manchester Area, United Kingdom
Hybrid / WFH Options
GS Solutions
have worked within a Networking/Security setting recently. Experience solutioning Cisco, Fortinet, Juniper, Palo Alto, Netskope, Zscaler, CrowdStrike (At-least two or more) Vulnerability Management/EDR/DDoS/WAF/PAM – Beneficial MUST have an excellent understanding of current cyber security trends. more »
Posted:
Vulnerability Management
England
10th Percentile
£40,000
25th Percentile
£51,250
Median
£65,000
75th Percentile
£88,750
90th Percentile
£97,250