Walsall, England, United Kingdom Hybrid / WFH Options
HomeServe UK
in protecting systems, networks, and cloud environments. A proactive mindset with a drive to identify, own, and resolve security challenges end-to-end. Strong technical skills in threat detection, vulnerabilitymanagement, identity and access control, and incident response. Familiarity with security tools such as SIEM, EDR, firewalls, and cloud security solutions. Knowledge of security frameworks like NIST, ISO More ❯
Windsor, England, United Kingdom Hybrid / WFH Options
Women in Tech UK
best practices. Preferred experience dealing with incidents in a wide range of environments, including OT and ICS technologies. Preferred experience of working with wider Cyber Defence teams, including Intelligence, VulnerabilityManagement, Threat Hunting and Purple Teams Personal Attributes: Strong interpersonal, analytical, and problem-solving skills. Effective team player with excellent communication. Adaptable, detail-oriented, and proactive. Why Join More ❯
London, England, United Kingdom Hybrid / WFH Options
FIND | Creating Futures
domains, and at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Penetration testing and vulnerabilitymanagement Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why Join? Be at the forefront of upskilling future More ❯
London, England, United Kingdom Hybrid / WFH Options
Intersys Ltd
Key Responsibilities: Incident Response Leadership: Take ownership of escalated security alerts, leveraging Microsoft security tools to thoroughly investigate, effectively contain, and decisively resolve incidents – going beyond mere escalation. Proactive VulnerabilityManagement: Lead the analysis and prioritisation of vulnerabilities, expertly coordinating remediation efforts with both our clients and internal teams to strengthen their security posture. Strategic Security Development: Collaborate More ❯
London, England, United Kingdom Hybrid / WFH Options
Oracle
high scale services and working with some of Oracle's most critical customers? We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in vulnerabilitymanagement and cloud security. This position is designed for technical security engineers adept at navigating the complexities of cloud security and leading efforts to increase security posture. In … and create the future of software assurance at scale together. What You’ll Bring A minimum of 8 years of experience in the cybersecurity field, with a focus on vulnerabilitymanagement, cloud security, and security architecture analysis. Strong understanding of vulnerabilitymanagement processes, remediation workflows, and validation of security findings Experience designing and managing security metrics … dashboards, and reporting for technical and leadership audiences Proven expertise in cloud architecture and security principles, and a thorough understanding of risk management frameworks Hands-on experience integrating data from security tools Proficiency in developing and implementing security policies and procedures within cloud environments to safeguard against potential threats Ability to effectively assess and communicate risks and appropriate levels More ❯
Exeter, Devon, United Kingdom Hybrid / WFH Options
Met Office
The following content displays a map of the jobs location - Exeter We're looking for an exceptional VulnerabilityManagement Manager to help us make a difference to our planet. As our VulnerabilityManagement Manager, the job may be suitable for hybrid working, which is where an employee works part of the week in the office and … people are at the heart of what wedoand we'll do our best toagreea working pattern that works for everyone. World changingwork From science to technology, from meteorology to management, and from planning to communication, our expertise helps us stand out as the authority on weather accuracy and climate prediction. We help individuals, industries and government to make better … purpose at the heart ofdecision-making We'rebettertogether-understandingpartnerships and inclusivity make usgreater We keep evolving - pushing boundaries to make tomorrow better for ourcustomers Your world ofexpertise As theVulnerability Management Managerwithin the Security Operations team of the Met Office's Cyber Security Department you will be responsible for driving the vision and operational execution of the organisation's vulnerabilityMore ❯
London, England, United Kingdom Hybrid / WFH Options
Oracle
and create the future of software assurance at scale together. What You'll Bring A minimum of 8 years of experience in the cybersecurity field, with a focus on vulnerabilitymanagement, cloud security, and security architecture analysis. Strong understanding of vulnerabilitymanagement processes, remediation workflows, and validation of security findings Experience designing and managing security metrics … dashboards, and reporting for technical and leadership audiences Proven expertise in cloud architecture and security principles, and a thorough understanding of risk management frameworks Hands-on experience integrating data from security tools Proficiency in developing and implementing security policies and procedures within cloud environments to safeguard against potential threats Ability to effectively assess and communicate risks and appropriate levels … of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills. Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future Nice to Have Experience automating metrics pipelines using scripting, APIs, or business intelligence platforms. Familiarity with regulatory frameworks (e.g., NIST More ❯
Vulnerability Analyst Tenable SME Outside IR35 6 Months Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerabilitymanagement programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerabilitymanagement lifecycle from tooling and assessments to governance, reporting and stakeholder engagement. You ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerabilitymanagement process using Tenable . Develop, deploy and maintain a comprehensive vulnerabilitymanagement program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Vulnerability Analyst – Tenable SME – Outside IR35 – 6 Months – Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerabilitymanagement programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerabilitymanagement lifecycle — from tooling and assessments to governance, reporting and stakeholder engagement. You'll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerabilitymanagement process using Tenable . Develop, deploy and maintain a comprehensive vulnerabilitymanagement program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Kensington, West Holland Park, Greater London, United Kingdom
VIQU Limited
Vulnerability Analyst – Tenable SME – Outside IR35 – 6 Months – Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerabilitymanagement programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerabilitymanagement lifecycle — from tooling and assessments to governance, reporting and stakeholder engagement. You’ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerabilitymanagement process using Tenable . Develop, deploy and maintain a comprehensive vulnerabilitymanagement program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Operate within a global team that takes responsibility for the security monitoring of key technologies and tools across the estate Lead and manage a team of Security Analysts & the Vulnerabilitymanagement team Comfortable operating in a technical capacity performing hands-on incident response and supporting/managing SOC analysts Act as a SME in matters related threat and … vulnerabilitymanagement incl incident response Understand security incidents and the likely impact these will have on the business Define and report on KPIs with recommendations for improvement Identify security risks, threats and vulnerabilities of the company’s network, systems, applications and new technology initiatives Implement and maintain operating run books, operating processes and procedures Help to develop and … configure use cases, and alerting rules within SIEM technologies Mange the vulnerabilitymanagement programme that includes vulnerability scanning, security testing, threat monitoring and data loss and leakage prevention Direct on-going threat intelligence activities Mentor and develop security analysts Skills: Prior experience working/managing a SOC Demonstrable experience and operational knowledge of SIEM, firewalls, intrusion detection More ❯
Reigate, Surrey, United Kingdom Salary Competitive Closing date 29 May 2025 View more categories View less categories Sector Engineering ,IT ,Security Job Role Cloud Security Job Type Permanent Support Vulnerability and Patch Management for ICT. Resolve issues with internal stakeholders. Prioritize and reduce Vulnerability risk on ICT IT assets. Perform Vulnerability risk assessments. Analyze severe vulnerabilities … and provide mitigation strategies. Assess Cloud Security threats using native and third-party tools. Implement, monitor, and report on secondary security controls, ensuring policy compliance. Support the management of risk when patches or standards cannot be applied. Assist in audit programs. Update governance and MI reports. Maintain documentation for security controls, policies, and procedures. Collaborate with WTW (ICS) corporate … security team. Stay updated on cloud security threats and measures. Job Description The Role Support Vulnerability and Patch Management for ICT. Resolve issues with internal stakeholders. Prioritize and reduce Vulnerability risk on ICT IT assets. Perform Vulnerability risk assessments. Analyze severe vulnerabilities and provide mitigation strategies. Assess Cloud Security threats using native and third-party tools. More ❯
as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. They re looking for an experienced Information Security Consultant … with expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert … guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & VulnerabilityManagement Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development Create More ❯
as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. They’re looking for an experienced Information Security Consultant … with expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management – Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring – Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts – Handle security alerts and inquiries, providing expert … guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & VulnerabilityManagement – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development – Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development – Create More ❯
as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. Theyre looking for an experienced Information Security Consultant with … expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. … Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & VulnerabilityManagement Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development Create and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sarafin Partners
experienced professional to work with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the defined policies … standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception and management reports Reporting … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerabilitymanagement, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of network infrastructure, including routers, switches More ❯
experienced professional to work with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the defined policies … standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception and management reports Reporting … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerabilitymanagement, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of network infrastructure, including routers, switches More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Sarafin Partners
experienced professional to work with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the defined policies … standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception and management reports Reporting … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerabilitymanagement, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of network infrastructure, including routers, switches More ❯
Position: Cyber Security Lead Location: Liverpool (90% remote) Salary: Up to £75,000 + Bonus Key Skills: Penetration testing Vulnerabilitymanagement Threat detection Cyber defence Security best practices CISSP, CISM or similar certification About the Role Are you a cybersecurity professional looking to lead the charge against evolving digital threats? We are seeking an experienced Cyber Security Lead … implement a comprehensive cybersecurity strategy to protect our IT environment. Establish, enforce, and regularly update security policies, protocols, and standards. Manage real-time threat detection, incident response, and conduct vulnerability assessments to safeguard our infrastructure. Oversee the deployment of security solutions, working closely with internal teams to strengthen our defences. Collaborate with external security partners to ensure high-quality … thorough risk assessments and ensure compliance with industry standards and regulatory requirements. What We’re Looking For: Professional certification such as CISSP, CISM, or similar. Significant experience in cybersecurity management, ideally within a medium-to-large organisation. Extensive knowledge of security technologies, risk assessment, and vulnerability management. Hands-on experience with security monitoring tools and incident response. Familiarity More ❯
Position: Cyber Security Lead Location: Leicester (90% remote) Salary: Up to £75,000 + Bonus Key Skills: Penetration testing Vulnerabilitymanagement Threat detection Cyber defence Security best practices CISSP, CISM or similar certification About the Role Are you a cybersecurity professional looking to lead the charge against evolving digital threats? We are seeking an experienced Cyber Security Lead … implement a comprehensive cybersecurity strategy to protect our IT environment. Establish, enforce, and regularly update security policies, protocols, and standards. Manage real-time threat detection, incident response, and conduct vulnerability assessments to safeguard our infrastructure. Oversee the deployment of security solutions, working closely with internal teams to strengthen our defences. Collaborate with external security partners to ensure high-quality … will bring a strong technical background in cybersecurity as well as a strategic approach. Key qualifications include: Professional certification such as CISSP, CISM, or similar. Significant experience in cybersecurity management, ideally within a medium-to-large organisation. Extensive knowledge of security technologies, risk assessment, and vulnerability management. Hands-on experience with security monitoring tools and incident response. Familiarity More ❯
Position: Cyber Security Lead Location: Nottingham (90% remote) Salary: Up to £75,000 + Bonus Key Skills: Penetration testing Vulnerabilitymanagement Threat detection Cyber defence Security best practices CISSP, CISM or similar certification About the Role Are you a cybersecurity professional looking to lead the charge against evolving digital threats? We are seeking an experienced Cyber Security Lead … implement a comprehensive cybersecurity strategy to protect our IT environment. Establish, enforce, and regularly update security policies, protocols, and standards. Manage real-time threat detection, incident response, and conduct vulnerability assessments to safeguard our infrastructure. Oversee the deployment of security solutions, working closely with internal teams to strengthen our defences. Collaborate with external security partners to ensure high-quality … will bring a strong technical background in cybersecurity as well as a strategic approach. Key qualifications include: Professional certification such as CISSP, CISM, or similar. Significant experience in cybersecurity management, ideally within a medium-to-large organisation. Extensive knowledge of security technologies, risk assessment, and vulnerability management. Hands-on experience with security monitoring tools and incident response. Familiarity More ❯
Position: Cyber Security Lead Location: Manchester (90% remote) Salary: Up to £75,000 + Bonus Key Skills: Penetration testing Vulnerabilitymanagement Threat detection Cyber defence Security best practices CISSP, CISM or similar certification About the Role Are you a cybersecurity professional looking to lead the charge against evolving digital threats? We are seeking an experienced Cyber Security Lead … implement a comprehensive cybersecurity strategy to protect our IT environment. Establish, enforce, and regularly update security policies, protocols, and standards. Manage real-time threat detection, incident response, and conduct vulnerability assessments to safeguard our infrastructure. Oversee the deployment of security solutions, working closely with internal teams to strengthen our defences. Collaborate with external security partners to ensure high-quality … will bring a strong technical background in cybersecurity as well as a strategic approach. Key qualifications include: Professional certification such as CISSP, CISM, or similar. Significant experience in cybersecurity management, ideally within a medium-to-large organisation. Extensive knowledge of security technologies, risk assessment, and vulnerability management. Hands-on experience with security monitoring tools and incident response. Familiarity More ❯
Crawley, England, United Kingdom Hybrid / WFH Options
DGH Recruitment
information security strategy, ensuring alignment with ISO 27001, GDPR and Cyber Essentials. The ideal candidate will have strong information security experience alongside hands-on technical knowledge of SIEM, EDR, vulnerabilitymanagement, and incident response. Responsibilities: - Serve as a subject matter expert for information security, advising stakeholders on risks, controls, and security best practices. - Support business units with risk … and mail filtering systems to ensure effective threat detection and response. - Monitor, investigate, and respond to alerts and incidents, coordinating with internal teams and third-party providers. - Oversee regular vulnerability scans and third-party penetration tests; track and report remediation efforts. - Maintain the internal compliance programme for information security and data protection, including ISO27001, GDPR and Cyber Essentials requirements. … Required Skills/Experience: - Strong understanding of information security principles, risk management, and compliance (ISO 27001, GDPR, Cyber Essentials). - Hands-on experience with cybersecurity tools. - Experience conducting or supporting internal security audits or assessments. - Solid understanding of IT infrastructure (e.g. networking, Active Directory, endpoint security). - Certifications such as CISSP, CISM, CISA, Security+, or equivalent (highly advantageous) Information More ❯
and architecture teams to define technical security requirements and ensure cohesive, secure solutions. Lead on the resolution of high-priority and complex security incidents. Advise senior leadership on risk management strategies and mitigation plans. Oversee security for a portfolio of applications/projects from inception through delivery. Ensure security controls are effectively embedded throughout the SDLC. Maintain up-to … date InfoSec policies and technical security standards. Conduct vulnerability assessments, threat modelling, and architecture reviews. What You’ll Bring Strong ability to translate technical risk into clear, actionable business terms. Hands-on experience with secure DevOps pipelines and development practices. Excellent stakeholder management skills across technical and non-technical teams. Proven track record in large, regulated environments with … Azure/AWS Security. Working knowledge of GDPR, HIPAA, PCI-DSS. Familiarity with development in .NET, Java, Python, PowerShell, or Bash. Knowledge of tools like SIEM, SOAR, IDS, WAF, vulnerabilitymanagement platforms. Experience with UI, API, microservices security patterns and cryptographic principles. Threat modelling and dynamic security testing skills. Background in business analysis or requirements engineering. More ❯
and architecture teams to define technical security requirements and ensure cohesive, secure solutions. Lead on the resolution of high-priority and complex security incidents. Advise senior leadership on risk management strategies and mitigation plans. Oversee security for a portfolio of applications/projects from inception through delivery. Ensure security controls are effectively embedded throughout the SDLC. Maintain up-to … date InfoSec policies and technical security standards. Conduct vulnerability assessments, threat modelling, and architecture reviews. What You’ll Bring Strong ability to translate technical risk into clear, actionable business terms. Hands-on experience with secure DevOps pipelines and development practices. Excellent stakeholder management skills across technical and non-technical teams. Proven track record in large, regulated environments with … Azure/AWS Security. Working knowledge of GDPR, HIPAA, PCI-DSS. Familiarity with development in .NET, Java, Python, PowerShell, or Bash. Knowledge of tools like SIEM, SOAR, IDS, WAF, vulnerabilitymanagement platforms. Experience with UI, API, microservices security patterns and cryptographic principles. Threat modelling and dynamic security testing skills. Background in business analysis or requirements engineering. More ❯