reach but a deep local presence, Colt is big enough to deliver and small enough to care. Why we need this role? We are seeking a dynamic and motivated Vulnerability Management Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The Vulnerability Management Lead … will play a crucial role in tracking and managing the identification, assessment, and remediation of security vulnerabilities across the organization’s infrastructure and monitoring and reporting on vulnerability and other security compliance status. The role requires collaboration with various partners to ensure that vulnerability assessments and emerging threats are prioritized and advanced. Additionally, the successful candidate will work … with management to continuously evolve the vulnerability management program. What you will do: You will be responsible for supporting CSOC in order to achieve the below: The development and implementation of the Colt Vulnerability Management Framework. Enhancing the scope and efficiency of current vulnerabilityscanning and management tools and integration between them. Design and manage the More ❯
at the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Threat and Vulnerability Manager to protect DIT and the wider UK government from cyber threats in a fast paced and exciting role, responsible for the Vulnerability Management and Threat Hunting of … government from cyber threats in a fast paced and exciting role. Reporting to the Head of Cyber Security Operations, you will manage and be responsible for the Threat and Vulnerability Management function within the SOC, by providing leadership on identification and improvement opportunities, and ensuring service owners are aware of weaknesses in their security posture and are empowered with … be found. Main responsibilities Your day-to-day role will involve the need to: Working with the Security Leadership team to develop a strategic road map for an effective vulnerability detection, assessment, remediation, and threat intelligence program. Line management of the threat and vulnerability management team. Building sustainable relationships to champion the adoption of vulnerability and threat More ❯
Technologies (e.g., AWS Lambda , Azure Functions , Google Cloud Functions ), and Helm . Familiarity with Cloud Development Kit (CDK) and GitOps principles. Experience supporting or performing Penetration Testing activities (e.g., vulnerabilityscanning , network penetration testing , web application testing , mobile application testing ). Experience with Snowflake , MongoDB , Terraform Cloud , GitHub , or Databricks . Experience working in a regulated environment (e.g. More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Synergetic Recruitment Group Limited
new technologies to enhance performance and resilience. Linux and Windows Administration Install, configure, and maintain Linux servers (Debian, Ubuntu, CentOS, Red Hat) across physical and virtual environments. Manage patching, vulnerabilityscanning, and system hardening. Troubleshoot hardware, software, and network issues with engineering and security teams. Support and manage Windows Server environments (20122022), including Active Directory, DNS, DHCP, and More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Synergetic
new technologies to enhance performance and resilience. Linux and Windows Administration Install, configure, and maintain Linux servers (Debian, Ubuntu, CentOS, Red Hat) across physical and virtual environments. Manage patching, vulnerabilityscanning, and system hardening. Troubleshoot hardware, software, and network issues with engineering and security teams. Support and manage Windows Server environments (2012–2022), including Active Directory, DNS, DHCP More ❯
cambridge, east anglia, united kingdom Hybrid / WFH Options
Synergetic
new technologies to enhance performance and resilience. Linux and Windows Administration Install, configure, and maintain Linux servers (Debian, Ubuntu, CentOS, Red Hat) across physical and virtual environments. Manage patching, vulnerabilityscanning, and system hardening. Troubleshoot hardware, software, and network issues with engineering and security teams. Support and manage Windows Server environments (2012–2022), including Active Directory, DNS, DHCP More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Oxfordshire, England, United Kingdom Hybrid / WFH Options
F5 Consultants
as designing and overseeing phishing simulations. Required Skills 2+ years' experience in an information security role Strong understanding of information security and cyber threat defence Hands-on experience with vulnerabilityscanning Ability to explain threats, vulnerabilities, and risks in a business context Experience delivering security training and running phishing simulations Experience with Microsoft Defender and/or third More ❯
oxford district, south east england, united kingdom Hybrid / WFH Options
F5 Consultants
as designing and overseeing phishing simulations. Required Skills 2+ years' experience in an information security role Strong understanding of information security and cyber threat defence Hands-on experience with vulnerabilityscanning Ability to explain threats, vulnerabilities, and risks in a business context Experience delivering security training and running phishing simulations Experience with Microsoft Defender and/or third More ❯
into our pipelines, automate compliance and help us ship fast without compromise. Key Responsibilities: Integrate security tools and practices into CI/CD pipelines (GitHub Actions, Jenkins, GitLab) Automate vulnerabilityscanning, code analysis, and container hardening Collaborate with developers to design secure architectures and threat models Monitor cloud infrastructure (AWS, Azure, GCP) for misconfigurations and anomalies Lead incident More ❯
experience: Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in SOC operations, incident response, and forensic analysis. Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ashdown Group
experience: - 3rd line IT support background, ideally within an SME environment - Windows Server (Active Directory, Group Policy) - Azure - Network support experience (including routing and switching) - IT security (antivirus, SIEM, vulnerabilityscanning, IAM, Firewalls More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
protocols and secure key lifecycle management - Securing microservices, APIs, and DevSecOps best practices Skilled in penetration testing and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerabilityscanning, remediation, and vendor management Collaborative mindset with the ability to partner across engineering, security, and product teams Desirable Skills: Hands-on configuration, deployment, and operation of ForgeRock More ❯
West Bridgford, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
loves to automate mundane tasks, make software and systems that are scalable, highly available, and robust, and making sure whatever you’re working on is secure, through things like vulnerabilityscanning, threat analysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with More ❯
analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient remediation. Experience in network security principles, firewalls, and access More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
enhance mobile security throughout the development lifecycle shaping tooling strategy, driving automation and promoting a 'Secure by Design' culture. Key Responsibilities Design and implement automated mobile security testing and vulnerabilityscanning within the mobile SDLC. Define and deliver the mobile app security tooling and technology strategy. Run proof of concepts for new tools and integrate them into CI … a Mobile Application Security Testing platform for manual testing. Skills & Experience Proven experience with mobile SAST/SCA and security testing tools (e.g. mobSF, Corellium). Strong grasp of vulnerability frameworks such as CVSS and EPSS. Development experience in at least one mobile programming language (Objective-C, Swift, Java, Kotlin). Scripting skills in Python or JavaScript. Familiar with More ❯
NG1, Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
You are someone who loves to automate mundane tasks, make scalable, highly available, and robust solutions, and making sure whatever you’re working on is secure, through things like vulnerabilityscanning, threat analysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with More ❯
NG2, West Bridgford, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
You are someone who loves to automate mundane tasks, create scalable, highly available, and robust solutions, and ensure that whatever you’re working on is secure, through measures like vulnerabilityscanning, threat analysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with More ❯
decisions around authentication, cryptography, and logging. You'll also ensure that tools such as SAST, DAST, and SCA are effective and efficient, and that testing programmes - including pen testing, vulnerabilityscanning, and bug bounty - are delivering value. You'll triage vulnerabilities, support engineering teams with practical mitigations, and contribute to documentation that strengthens our internal standards and processes. More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
the role you’ll master the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
the role you’ll master the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security More ❯