Vulnerability Management Jobs in England

176 to 200 of 930 Vulnerability Management Jobs in England

IT Security Governance, Risk and Assurance (Financial Services)

London, England, United Kingdom
Robert Walters
provide evaluation and treatment options, consultation on remediation approaches to address gaps and continue ongoing monitoring of remediation, re-assess until reduced to an acceptable level. Supporting Cybersecurity Risk Management strategies based on security findings and observations. Including informing improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all security functions Profile and assign … to mitigate risks. Excellent verbal and written communication skills to convey complex technical information clearly and effectively. Presenting data insights to non-technical stakeholders Strong understanding of security risk management and taxonomy principles, to reduce risk to an acceptable level. Knowledge of vulnerability management and incident management practices. Experience with GRC tools and best practices. RSA … candidates About the job Contract Type: FULL_TIME Specialism: Technology & Digital Focus: Information Security Industry: Banking Salary: £90,000 - £110,000 per annum Workplace Type: Hybrid Experience Level: Senior Management Location: London FULL_TIME Job Reference: JLRAXT-B51A7D3A Date posted: 25 April 2025 Consultant: Darius Goodarzi london information-technology/information-security 2025-04-25 2025-06-24 banking More ❯
Posted:

Senior IT Administrator

London, England, United Kingdom
Yes Energy
existing and new systems. Administer and secure our various cloud accounts including AWS, Azure, and Oracle. Ensure cybersecurity best practices are implemented across IT systems, including identity and access management, endpoint protection, and data security. Conduct regular security assessments and vulnerability management in conjunction with security teams to identify and mitigate risks, collaborating with other teams as … language such as Python or Powershell Minimum of three years of experience in AWS, OCI, or Azure Experience using IT ticketing software, such as Jira Experience of cybersecurity principles, vulnerability risk assessments, and compliance frameworks (e.g., SOC1, SOC2, ISO 27001, CyberEssentials). Experience with Cisco/Meraki and Palo Alto networking hardware is helpful Experience with Okta and NinjaOne … and electric power trading decision solutions. Over 1,000 market participants use Yes Energy solutions daily. The business is a leader in all aspects of information content collection and management and in developing and delivering data and market analytics solutions. Since its inception in 2008, Yes Energy has become a trusted and respected supplier of innovative and reliable solutions More ❯
Posted:

Cyber Audit AVP

Knutsford, England, United Kingdom
Barclays UK
us at Barclays Internal Audit as a Cyber Audit AVP where you will collaborate with cross-functional teams to provide independent and reliable Cyber Security audit assurance to executive management and the Board on governance, risk management, and control effectiveness. In this role, you will contribute to audit planning and execution, risk assessment, control evaluation, and issue resolution. … assurance) covering Cyber Security. Experience in developing and executing assurance testing approaches in some of the following areas: data security (including cryptography), security configuration, network security, cyber incident response, vulnerability management, cyber threat management, information risk management, data leakage protection, identity & access management, cyber resilience. Knowledge of new and emerging technology, cyber security, and cyber More ❯
Posted:

Cloud Engineer - Azure

England, United Kingdom
Falconwood, Inc
resource management. Review Azure Monitor analytics and Azure portal logs to identify and remediate subscription and resource issues. Manage containerized workloads using Docker and Azure Container Registries for image management and deployment. Implement automated monitoring, logging, and alerting systems using Azure Monitor, Log Analytics, and Application Insights. Collaborate with development and engineering teams to ensure seamless integration of applications … administering DevSecOps tools, including GitHub Advanced Security (CodeQL, Dependabot, SBOM), GitHub Workflows, and Visual Studio Code/Enterprise. Experience with security tools such as Trellix, Invicti, and Anchore for vulnerability management and compliance. Strong Windows Server administration skills, including troubleshooting SCCM issues and client-side domain joins. Familiarity with Linux (Ubuntu) administration for server and appliance management. Proficiency … of SQL integration in Azure environments. Familiarity with Infrastructure-as-Code tools (e.g., Terraform, Bicep) and configuration management. Experience with helpdesk support, including ticket ownership, problem resolution, and incident management using Remedy or similar ticketing systems. Knowledge of cloud security principles, including identity management, network security, and compliance frameworks (e.g., NIST 800-53, DoD STIGs). Understanding of More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Manager

Reading, England, United Kingdom
Hybrid / WFH Options
Morgan Hunt
user access, and security operations. Key Responsibilities Manage day-to-day security operations and services, both in-house and outsourced Lead a small team covering Microsoft 365, identity management, and security Oversee security tools, monitoring systems, and incident response Guide improvements to identity and access processes with a focus on automation Work with IT teams to ensure security is … or relevant professional IT/security qualification Recognised certification from a security or identity vendor Knowledge Solid understanding of tools like SIEM, EDR, and threat detection methods Knowledge of vulnerability management and threat intelligence Familiarity with network security (firewalls, segmentation, IDS/IPS, etc.) Understanding of operating systems (Windows, Mac, Linux) and their security practices Experience Hands-on More ❯
Posted:

Senior Security Engineer

Manchester, England, United Kingdom
Volaris Group
Computer Science, Information Security, or a related field. At least 5 years of experience in a security engineering role. Strong knowledge of security technologies and concepts, such as Identity Management, SIEM, Encryption, Vulnerability Management, Secure Coding Standards etc. Familiarity with compliance standards and regulations, such as ISO27001, PCI-DSS, and GDPR. Experience with security assessments, penetration testing More ❯
Posted:

Cyber Audit AVP

Knutsford, England, United Kingdom
Barclays Business Banking
us at Barclays Internal Audit as a Cyber Audit AVP where you will collaborate with cross-functional teams to provide independent and reliable Cyber Security audit assurance to executive management and the Board on governance, risk management, and control effectiveness. In this role, you will contribute to audit planning and execution, risk assessment, control evaluation, and issue resolution. … assurance) covering Cyber Security. Experience in developing and executing assurance testing approaches in some of the following areas: data security (including cryptography), security configuration, network security, cyber incident response, vulnerability management, cyber threat management, information risk management, data leakage protection, identity & access management, cyber resilience. Knowledge of new and emerging technology, cyber security, and cyber More ❯
Posted:

Cyber Threat Analyst - National Security West

Leeds, England, United Kingdom
Hybrid / WFH Options
BAE Systems Applied Intelligence
Threat groups and the ability to conduct in-depth research Able to independently verify the results of Threat Hunts, refining the queries where necessary Experienced in Incident Response and Management Responsible for the quality of all Threat Hunt Reports, ensuring that output is delivered it is at the highest possible standard Responsible for ensuring that all relevant process is … rules/analytics Requirements Technical 3+ years’ experience in Cyber Threat Intelligence, and conducting research and investigating cyber threats in a technical capacity Experience in technical incident response and management An expert understanding of current and emerging threats related to government and CNI Demonstrate a high-level knowledge of Windows operating systems and the Azure Landscape Demonstrate a high … high-level knowledge of and experience operating within cloud platforms Non-Technical Bachelor’s Degree in Cybersecurity, Computer Science or equivalent Experience in a SOC/Threat Intelligence/Vulnerability Management field Excellent written and verbal communication skills with the ability to communicate the risk, potential impact and importance of detailed technical information to non-technical and senior More ❯
Posted:

OT Cyber Security Engineer

Coventry, England, United Kingdom
TieTalent
and Operational Technology (OT) environments. This is a hands-on, technically rich role where you will work with a wide range of security tools and collaborate with threat intelligence, vulnerability management, and incident response teams. You will engineer solutions to mitigate threats, automate detection and response, and ensure our systems remain secure, resilient, and compliant. Why you'll … IT And OT Environments. Strategic Contribution – Influence The Development Of New Controls And Support The Delivery Of Cadent’s Cyber Security Strategy. Cross-Team Collaboration – Partner With Threat Intelligence, Vulnerability Analysts, And Incident Responders To Enhance Our Defences. Continuous Improvement – Engineer Solutions For Unpatchable Vulnerabilities And Automate Detection And Response Processes. National Impact – Help Protect The Systems That Keep More ❯
Posted:

Head of Cloud Services

London, England, United Kingdom
North East Jobs
policies, artefacts and processes. This role reports into the Head of Audit Technology. The team comprises at least two senior technical architects [as direct reports] and will involve matrix management of a range of architects, engineers, analysts, and external supply teams. This role requires regular attendance to the office in Newcastle, and occasional attendance in the NAO’s office … and communicating overall solutions and designs to review boards and senior stakeholders They will determine the right environments for service provision, ensuring accessibility, availability, scalability, integration, security, capacity & compute management, monitoring & reporting, operational effectiveness, and overall cloud service integrity and appropriateness. Overseeing the work of other NAO technical architects to ensure that the NAO’s ongoing digital transformation remains … operations technology and services for the NAO. Including designing, configuring, implementing and maintaining the architecture for: Microsoft Defender (XDR, Cloud & Cloud Apps, Copilot & Experts for XDR) Microsoft Unified Endpoint Management (EDR, Intune, Config Manager, vulnerability management) Microsoft Entra (including PIM and ID Protection) & Conditional Access Microsoft Purview & all DLP policies Microsoft Azure (IaaS, PaaS, Firewall, Backup & PAWs More ❯
Posted:

Cloud Security Engineer

London, England, United Kingdom
Techwaka
Security related incidents and events investigation and response as required. Work with cross-functional teams to respond to incidents – be they an escalated security event or remediating a critical vulnerability - when the need arises Contribute effectively to the establishment and maintenance of the IT Security knowledge base, documenting clear instructions and known fixes. Work on IT security projects as … SC-200, AZ-500, SC-900. Cloud native security solutions such as GuardDuty and the Microsoft Defender suite of products Content Delivery Networks and Web Application Firewalls. Experience with vulnerability management A broad technical knowledge of server, endpoint, and networking hardware and related security configurations. Experience with EDR/EPP software, deployment, and configuration A strong technical knowledge More ❯
Posted:

Senior Security Automation and Detection Engineer

Cambridge, Cambridgeshire, United Kingdom
Hybrid / WFH Options
Arm Limited
be proficient in automation and orchestration tools (e.g., SOAR platforms, scripting languages like Python, PowerShell) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Responsibilities: Build security automations, logging, and SIEM detections to improve the CDO's efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows … and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with CDO analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer

London, United Kingdom
Hybrid / WFH Options
Kroo Ltd
external regulatory requirements. Other responsibilities include: Security Analysis and Improvement: Continuously analyse our security systems for potential improvements, ensuring that our defences remain at the forefront of cybersecurity practices. Vulnerability Management: Proactively identify, assess, and remediate security vulnerabilities to maintain the integrity and confidentiality of our customer data. Security Automation: Automate security processes and procedures to enhance efficiency … practices. Secure Design: Collaborate with development teams to ensure that web and mobile front-ends, as well as microservice architectures, are designed with robust security measures in mind. Risk Management and Compliance: Assist teams in ensuring that products and services are secure by design, align with the organisation's risk appetite, and comply with all relevant group standards, policies … knowledge with any combination of the following: Threat modelling and risk assessments Working knowledge of secure coding principles (OWASP and OWASP mobile, SANS ) Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2) Working knowledge of cryptography including encryption, signing and digital certificates Principles of securing mobile applications and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Security Engineer

London, England, United Kingdom
Hybrid / WFH Options
Kroo Bank
external regulatory requirements. Other responsibilities include: Security Analysis and Improvement: Continuously analyse our security systems for potential improvements, ensuring that our defences remain at the forefront of cybersecurity practices Vulnerability Management: Proactively identify, assess, and remediate security vulnerabilities to maintain the integrity and confidentiality of our customer data Security Automation: Automate security processes and procedures to enhance efficiency … and effectiveness, reducing the risk of human error Security Requirements and Solutions: Identify, define, and document system security requirements, providing well-considered recommendations to management Development of Security Standards: Develop and maintain best practices and security standards for the organisation, guiding teams in the implementation of secure coding practices Secure Design: Collaborate with development teams to ensure that web … and mobile front-ends, as well as microservice architectures, are designed with robust security measures in mind Risk Management and Compliance: Assist teams in ensuring that products and services are secure by design, align with the organisation's risk appetite, and comply with all relevant group standards, policies, and regulatory requirements Cybersecurity Collaboration: Work closely with stakeholders across the More ❯
Posted:

SIEM Software Engineer Lead

Birmingham, England, United Kingdom
Hybrid / WFH Options
BT Group
following locations and follows hybrid working: Birmingham, Ipswich, Belfast What you’ll be doing Kubernetes DevOps/SysOps Engineering managing Kubernetes clusters and container orchestration, automating deployment, scaling, and management of containerized applications. Implement best practices for Kubernetes configuration and security. Work with log Collection Tools and Technologies (Beats, Elastic Agent, Logstash), syslog and other data collection protocols. DevOps … other related fields. 3-5 years of experience in CI/CD engineering experience with a different skillset. Experience in key cyber technologies such as SIEM technologies (Elastic preferred), vulnerability management, access management and other commonly used Enterprise security controls. Ideally from both a development and operational perspective. At BT, we entertain, educate, and empower millions of More ❯
Posted:

Cyber Threat Analyst - National Security West

Leeds, England, United Kingdom
Hybrid / WFH Options
Babcock
Threat groups and the ability to conduct in-depth research Able to independently verify the results of Threat Hunts, refining the queries where necessary Experienced in Incident Response and Management Responsible for the quality of all Threat Hunt Reports, ensuring that output is delivered it is at the highest possible standard Responsible for ensuring that all relevant process is … rules/analytics Requirements Technical 3+ years' experience in Cyber Threat Intelligence, and conducting research and investigating cyber threats in a technical capacity Experience in technical incident response and management An expert understanding of current and emerging threats related to government and CNI Excellent Open-Source research skills Demonstrate a high-level knowledge of Windows operating systems and the … high-level knowledge of and experience operating within cloud platforms Non-Technical Bachelor's Degree in Cybersecurity, Computer Science or equivalent Experience in a SOC/Threat Intelligence/Vulnerability Management field Excellent written and verbal communication skills with the ability to communicate the risk, potential impact and importance of detailed technical information to non-technical and senior More ❯
Posted:

Senior Security Engineer

London, United Kingdom
Hybrid / WFH Options
Kroo Bank Ltd
external regulatory requirements. Other responsibilities include: Security Analysis and Improvement: Continuously analyse our security systems for potential improvements, ensuring that our defences remain at the forefront of cybersecurity practices. Vulnerability Management: Proactively identify, assess, and remediate security vulnerabilities to maintain the integrity and confidentiality of our customer data. Security Automation: Automate security processes and procedures to enhance efficiency … practices. Secure Design: Collaborate with development teams to ensure that web and mobile front-ends, as well as microservice architectures, are designed with robust security measures in mind. Risk Management and Compliance: Assist teams in ensuring that products and services are secure by design, align with the organisation's risk appetite, and comply with all relevant group standards, policies … knowledge with any combination of the following: Threat modelling and risk assessments, Working knowledge of secure coding principles (OWASP and OWASP mobile, SANS ), Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2), Working knowledge of cryptography including encryption, signing and digital certificates, Principles of securing mobile applications and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Engineer

Walsall, England, United Kingdom
Hybrid / WFH Options
HomeServe UK
in protecting systems, networks, and cloud environments. A proactive mindset with a drive to identify, own, and resolve security challenges end-to-end. Strong technical skills in threat detection, vulnerability management, identity and access control, and incident response. Familiarity with security tools such as SIEM, EDR, firewalls, and cloud security solutions. Knowledge of security frameworks like NIST, ISO More ❯
Posted:

Global Security Operations Centre (GSOC) Analyst

Windsor, England, United Kingdom
Hybrid / WFH Options
Women in Tech UK
best practices. Preferred experience dealing with incidents in a wide range of environments, including OT and ICS technologies. Preferred experience of working with wider Cyber Defence teams, including Intelligence, Vulnerability Management, Threat Hunting and Purple Teams Personal Attributes: Strong interpersonal, analytical, and problem-solving skills. Effective team player with excellent communication. Adaptable, detail-oriented, and proactive. Why Join More ❯
Posted:

Cyber Security Instructor

London, England, United Kingdom
Hybrid / WFH Options
FIND | Creating Futures
domains, and at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Penetration testing and vulnerability management Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why Join? Be at the forefront of upskilling future More ❯
Posted:

L2 SOC Analyst – MSP

London, England, United Kingdom
Hybrid / WFH Options
Intersys Ltd
Key Responsibilities: Incident Response Leadership: Take ownership of escalated security alerts, leveraging Microsoft security tools to thoroughly investigate, effectively contain, and decisively resolve incidents – going beyond mere escalation. Proactive Vulnerability Management: Lead the analysis and prioritisation of vulnerabilities, expertly coordinating remediation efforts with both our clients and internal teams to strengthen their security posture. Strategic Security Development: Collaborate More ❯
Posted:

Principal Security Engineer (Vulnerability Management)

London, England, United Kingdom
Hybrid / WFH Options
Oracle
high scale services and working with some of Oracle's most critical customers? We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in vulnerability management and cloud security. This position is designed for technical security engineers adept at navigating the complexities of cloud security and leading efforts to increase security posture. In … and create the future of software assurance at scale together. What You’ll Bring A minimum of 8 years of experience in the cybersecurity field, with a focus on vulnerability management, cloud security, and security architecture analysis. Strong understanding of vulnerability management processes, remediation workflows, and validation of security findings Experience designing and managing security metrics … dashboards, and reporting for technical and leadership audiences Proven expertise in cloud architecture and security principles, and a thorough understanding of risk management frameworks Hands-on experience integrating data from security tools Proficiency in developing and implementing security policies and procedures within cloud environments to safeguard against potential threats Ability to effectively assess and communicate risks and appropriate levels More ❯
Posted:

Vulnerability Management Manager

Exeter, Devon, United Kingdom
Hybrid / WFH Options
Met Office
The following content displays a map of the jobs location - Exeter We're looking for an exceptional Vulnerability Management Manager to help us make a difference to our planet. As our Vulnerability Management Manager, the job may be suitable for hybrid working, which is where an employee works part of the week in the office and … people are at the heart of what wedoand we'll do our best toagreea working pattern that works for everyone. World changingwork From science to technology, from meteorology to management, and from planning to communication, our expertise helps us stand out as the authority on weather accuracy and climate prediction. We help individuals, industries and government to make better … purpose at the heart ofdecision-making We'rebettertogether-understandingpartnerships and inclusivity make usgreater We keep evolving - pushing boundaries to make tomorrow better for ourcustomers Your world ofexpertise As theVulnerability Management Managerwithin the Security Operations team of the Met Office's Cyber Security Department you will be responsible for driving the vision and operational execution of the organisation's vulnerability More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Principal Security Engineer (Vulnerability Management)

London, England, United Kingdom
Hybrid / WFH Options
Oracle
and create the future of software assurance at scale together. What You'll Bring A minimum of 8 years of experience in the cybersecurity field, with a focus on vulnerability management, cloud security, and security architecture analysis. Strong understanding of vulnerability management processes, remediation workflows, and validation of security findings Experience designing and managing security metrics … dashboards, and reporting for technical and leadership audiences Proven expertise in cloud architecture and security principles, and a thorough understanding of risk management frameworks Hands-on experience integrating data from security tools Proficiency in developing and implementing security policies and procedures within cloud environments to safeguard against potential threats Ability to effectively assess and communicate risks and appropriate levels … of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills. Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future Nice to Have Experience automating metrics pipelines using scripting, APIs, or business intelligence platforms. Familiarity with regulatory frameworks (e.g., NIST More ❯
Posted:

Vulnerability Analyst

London, United Kingdom
VIQU Limited
Vulnerability Analyst Tenable SME Outside IR35 6 Months Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerability management programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerability management lifecycle from tooling and assessments to governance, reporting and stakeholder engagement. You ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerability management process using Tenable . Develop, deploy and maintain a comprehensive vulnerability management program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Employment Type: Contract
Rate: GBP 400 - 500 Daily
Posted:
Vulnerability Management
England
10th Percentile
£40,000
25th Percentile
£50,000
Median
£60,000
75th Percentile
£79,875
90th Percentile
£93,025