Vulnerability Scanning Jobs in England

201 to 225 of 329 Vulnerability Scanning Jobs in England

Senior Security Penetration Tester

Reading, England, United Kingdom
Hybrid / WFH Options
THAMES WATER UTILITIES LIMITED
As a Senior Security Penetration Tester , you will be responsible for supporting the design, implementation, and maintenance of TVM (Threat & Vulnerability Management) solutions, controls and processes across the organisation. You will be liaising with Digital teams to ensure appropriate mitigation and remediation of vulnerabilities detected across our IT estate. This role requires an understanding of TVM concepts, technologies, and … Tester Help support and develop an internal penetration testing function. Conduct network, application penetration testing, code and security reviews. Identify and exploit vulnerabilities through proof-of-concept testing. Support vulnerability management across the enterprise, ensuring that a framework for identification, categorisation and mitigation exists and is implemented and maintained. Responsible for supporting the creation of the operating model for … vulnerability management, that it is shared, agreed and operates effectively across the business. Develop and maintain penetration testing documentation, policies, and procedures. Integrate cybersecurity solutions (e.g. vulnerability scanning tools) with existing systems, applications, and infrastructure. Evaluate and recommend technologies, tools, and vendors to meet business needs. Investigate newly identified cybersecurity vulnerabilities and provide appropriate mitigation actions. Liaise More ❯
Posted:

SOC Engineer

Manchester Area, United Kingdom
Harvey Nash
XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Strong analytical and problem-solving skills. Good verbal and written communication skills, with the ability to tailor messages to different audiences. Commitment to More ❯
Posted:

SOC Engineer

Warrington, England, United Kingdom
JR United Kingdom
XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Strong analytical and problem-solving skills. Good verbal and written communication skills, with the ability to tailor messages to different audiences. Commitment to More ❯
Posted:

Security Analyst

London, England, United Kingdom
Network IT
and contributing across a broad range of responsibilities, such as: Threat Management Endpoint Detection Security Assurance (Security by Design Controls) Framework Governance and Compliance (ISO 27001, NIST, PCI-DSS) Vulnerability Scanning Risk Analysis Cybersecurity Awareness Campaigns Phishing Campaigns Experience The ideal candidate will bring hands-on experience in the above Cyber Security responsibilities, coupled with a strong analytical More ❯
Posted:

Security Analyst

Bristol, England, United Kingdom
Network IT
and contributing across a broad range of responsibilities, such as: Threat Management Endpoint Detection Security Assurance (Security by Design Controls) Framework Governance and Compliance (ISO 27001, NIST, PCI-DSS) Vulnerability Scanning Risk Analysis Cybersecurity Awareness Campaigns Phishing Campaigns Experience The ideal candidate will bring hands-on experience in the above Cyber Security responsibilities, coupled with a strong analytical More ❯
Posted:

Cyber Threat Analyst

England, United Kingdom
Accenture
including executive briefings, and actionable recommendations to technical and non-technical stakeholders Set yourself apart: Monitoring, incident response and playbook development Detection creation within SIEM tools and using GitHub Vulnerability scanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Ability More ❯
Posted:

Lead InfoSec Engineer

Croydon, England, United Kingdom
The Gym Group
technical matters into user friendly language.•Ability to lead with innovative ideas, and proactively create and drive a ‘business benefits’ approach•Life-long learner.Experience in system technology security testing (vulnerability scanning and penetration testing, facilitating red team exercise etc.). Desirable •Relevant certifications such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or CompTIA More ❯
Posted:

Senior Infrastructure Architect - UK

England, United Kingdom
Oldcastle Inc
between teams. Networking & Security Networking Concepts: Knowledge in TCP/IP, DNS, VPN, load balancing, and firewalls. Security Best Practices: Implementing security in DevOps (e.g., IAM policies, network security, vulnerability scanning, encryption). Zero Trust, OAuth, OpenID, TLS/SSL: Experience with modern security protocols and practices. Agile Methodologies Experience with Agile, Scrum, and Kanban for iterative and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Security Engineer II (Remote - UK)

London, England, United Kingdom
Hybrid / WFH Options
Jobgether
in secure practices Respond to escalated incidents as part of a 24/7 on-call rotation Develop and enforce security best practices, aligned with industry standards Conduct regular vulnerability assessments and implement mitigation strategies Support audit and compliance initiatives to maintain certifications Collaborate with cross-functional teams to embed security in infrastructure and code Stay current on evolving … security engineering, including operations, blue team, DevOps, and architecture Strong knowledge of incident response, threat patterns, and mitigation strategies Hands-on experience with security tools: SIEM, IDS, DLP, MFA, vulnerability scanners, WAFs Proficient in AWS security best practices and Infrastructure as Code (e.g., Terraform, Ansible) Deep understanding of securing Windows, macOS, Linux, and virtualized environments Experience in automation/ More ❯
Posted:

Cyber Security Analyst

London, England, United Kingdom
Hybrid / WFH Options
Air IT Limited
management system Conduct investigations and security audits on a variety of software and cloud systems Carry out security assessments for clients once qualified such as Cyber Essentials assessments and vulnerability assessments. Analyse data from multiple sources to identify anomaly and security threats Manage the creation, maintenance and delivery of cyber security awareness training and phishing campaigns Support customers and … related certifications in Cyber Security. Knowledge and experience of Cyber Essentials Accreditation, or other information security standards. Experience in offensive security such as CTF or bug bounty Experience with vulnerability scanners Experience in conducting security training or phishing simulation We will invest significantly in your training, with the requirement that you will commit a portion of your own time More ❯
Posted:

Senior Information Security Engineer: £175,000 + Bonus (Elite Fintech)

London, England, United Kingdom
Hybrid / WFH Options
ZipRecruiter
testing, and automated security validation. Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR, DLP, vulnerability scanners, firewalls, email gateways. Degree in Computer Science, Engineering, or a related STEM field. If you think that this could be a good fit for you, then please apply More ❯
Posted:

Senior Cyber Security Engineer

London, United Kingdom
Hybrid / WFH Options
Royal Mail Group
maintaining, and configuring a wide range of security technologies, including SIEM solutions, DLP solutions, firewall solutions, cloud security centers, IPS (Intrusion Prevention Systems), CTI (Cyber Threat Intelligence) solutions, and vulnerability scanners. Proxy solutions like Zscaler are essential. At least one professional certification; CISSP, CISM, CCSP. What we offer you 18% Bonus Car allowance (or cash alternative) Hybrid Working More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Lead Vulnerability Management Engineer

London, England, United Kingdom
Xcede
Xcede Greater London, England, United Kingdom Lead Vulnerability Management Engineer A leading financial technology and data science firm requires a Lead Vulnerability Management Engineer who will be responsible for delivering a "greenfield" global vulnerability management programme. The role entails delivering the technical aspects of vulnerability management; identification and prioritisation, as well as the non-technical side … management. The position reports directly to the Head of Security. Please note: the role requires at least 3 days in the office. Responsibilities 5 -10 years of experience in vulnerability management or a similar security role in globally distributed financial (or complex) technology environment Strong technical knowledge with hands-on experience using vulnerability scanning/assessment tools More ❯
Posted:

Threat and Vulnerability Engineer.

London, England, United Kingdom
Millennium Management
Threat and Vulnerability Engineer The successful candidate for this position will be a subject matter expert in Information Security, possessing a wide range of experience in various technologies, tools, and methodologies. The primary responsibilities of this role include identifying, analyzing, and prioritizing vulnerabilities within the organization. The candidate will be expected to provide proactive security recommendations and engage in … a best-in-class program to partner with the business to protect the Firm’s information and computer systems. Principal Responsibilities Perform periodic and on-demand system audits and vulnerability assessments of systems, internal applications, and Cloud services to identify security vulnerabilities. Document, prioritize, and formally report on asset and vulnerability status as remediation activities progress. Analyze cyber … and improve security posture. Perform threat hunting and look-backs on IOC’s. Partner with Infrastructure teams in Networking, Desktop Engineering, Compute, and others to track and report on vulnerability remediation activities. Perform data analysis using scripting, databases, and Excel. Maintain and create metrics reporting for governance purposes. Qualifications Bachelor’s degree in Cyber Security, Computer Science, or Engineering More ❯
Posted:

Vulnerability Analyst Interview

London, United Kingdom
The Interview Portal
Trust in digital transactions and financial technologies is crucial for the smooth functioning of modern society. Neelam Kadbane, our next pathbreaker, Senior Vulnerability Analyst at Mastercard, identifies and addresses security vulnerabilities within Mastercard's environment & products by conducting network penetration tests. Neelam talks to Shyam Krishnamurthy fromThe Interview Portal about the innumerable challenges and the satisfacation of her work … . It was a significant achievement for me, especially since it's rare for companies to hire freshers directly into the InfoSec domain. At Qualys, I worked with the Vulnerability Management team, where we researched new CVEs and zero-day vulnerabilities, and developed signatures for vulnerability scanners. A zero-day vulnerability is a security flaw in software … or hardware that is unknown to the vendor or developer. Since the vendor is unaware of the vulnerability, no patch or fix is available, making it highly dangerous. The term "zero-day" comes from the fact that once the vulnerability is discovered by malicious actors, the vendor has zero days to fix it before it can be exploited. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Application Security Engineer

London, United Kingdom
In Technology Group
applications. You will be responsible for identifying vulnerabilities, conducting security assessments, and implementing robust security measures to protect our systems and client data. Key Responsibilities: Perform security assessments and vulnerability scanning for web applications, APIs, and infrastructure. Collaborate with development teams to implement secure coding practices and address vulnerabilities. Review and advise on secure architecture and design for … testing, and secure software development practices. Strong understanding of security vulnerabilities (OWASP Top 10, etc.) and secure coding techniques. Experience with security tools (e.g., static/dynamic analysis tools, vulnerability scanners). Familiarity with common web technologies (e.g., Java, Python, JavaScript, SQL). Knowledge of security frameworks and standards (e.g., NIST, ISO 27001). Strong problem-solving skills and More ❯
Employment Type: Permanent
Salary: £50000 - £60000/annum
Posted:

ICT Infrastructure and Systems Manager

Bilborough, Nottinghamshire, United Kingdom
Adria Solutions Ltd
infrastructure Familiarity with industry security standards and compliance frameworks Strong documentation, communication, and leadership skills Desirable qualifications and experience: Industry certifications or working toward one Experience with Microsoft Defender, vulnerability scanning, and disaster recovery planning Understanding of ITIL and service management methodologies Why consider this role? Join a forward-thinking, values-led organisation with a strong public service More ❯
Employment Type: Permanent
Salary: GBP 35,000 - 45,000 Annual
Posted:

ICT Infrastructure and Systems Manager

Nottingham, Nottinghamshire, East Midlands, United Kingdom
Adria Solutions
infrastructure Familiarity with industry security standards and compliance frameworks Strong documentation, communication, and leadership skills Desirable qualifications and experience: Industry certifications or working toward one Experience with Microsoft Defender, vulnerability scanning, and disaster recovery planning Understanding of ITIL and service management methodologies Why consider this role? Join a forward-thinking, values-led organisation with a strong public service More ❯
Employment Type: Permanent
Salary: £45,000
Posted:

Cyber Security Engineer

Brighton, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
per week in their Brighton office. What You’ll Be Doing: Collaborate with engineering and DevOps teams to embed secure-by-design principles across platforms and services Perform regular vulnerability scanning, threat assessments , and maintain security tooling Monitor systems for potential risks and produce incident and compliance reports Support the definition and upkeep of security policies, standards, and More ❯
Posted:

VICE PRESIDENT GOVERNANCE RISK & COMPLIANCE- AEROSPACE AND DEFENSE:

London, United Kingdom
Gentrian
Manage day-to-day IT & Engineering needs (system administration, help desk support). Monitor security tools and respond to alerts and incidents. COMPLIANCE ACTIVITIES: Change Management Incident Management Maintenance Vulnerability scanning Implement NIST SP 800-171 for internal systems. Establish a System Security Plan (SSP) . The SSP needs to go through each NIST SP 800-171 control More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Director, Security, Privacy & Compliance

Cambridge, Cambridgeshire, United Kingdom
Hybrid / WFH Options
MealSuite
Management Establish and maintain internal IT security policies and access controls. Oversee endpoint security and identity & access management (IAM). Implement and maintain security team tools, such as SIEM, vulnerability scanning, and endpoint detection solutions. Training & Awareness Develop and run organization-wide security training programs to foster a strong security culture company-wide. Educate employees on phishing, data More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

CISO / Cyber Security Assurance Lead (EUC / MDM Focus)

Slough, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
SyOps, DPIAs, threat models, and continuous threat models). Ensure alignment with assurance frameworks (Government Security Classifications (GSC), NCSC guidance, Cabinet Office requirements, GDPR, ISO27001). Conduct threat and vulnerability assessments for macOS devices, MDM platforms, developer tooling, remote access, and cloud-native infrastructure. Drive secure-by-design practices, working with security architects, engineering DevOps, and testing teams. Interface … including NCSC Cloud Security principles, GDS Service Standards, and government accreditation processes. Hands-on experience producing RMADS, SyOps, DPIAs, and equivalent artefacts. Security tooling for risk assessments, threat modelling, & vulnerability scanning. Security Clearance. Other preferred skills include experience in DevSecOps or agile environments, knowledge of Zero Trust architecture, IAM, and cloud-native security practices. #J-18808-Ljbffr More ❯
Posted:

CISO / Cyber Security Assurance Lead (EUC / MDM Focus)

London, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
SyOps, DPIAs, threat models, and continuous threat assessments. Ensuring compliance with assurance frameworks like Government Security Classifications (GSC), NCSC guidance, Cabinet Office requirements, GDPR, and ISO27001. Conducting threat and vulnerability assessments for macOS devices, MDM platforms, developer tooling, remote access, and cloud-native infrastructure. Promoting secure-by-design practices in collaboration with security architects, engineering, DevOps, and testing teams. … Security principles, GDS Service Standards, and government accreditation processes. Hands-on experience producing RMADS, SyOps, DPIAs, and similar artifacts. Experience with security tooling for risk assessments, threat modeling, and vulnerability scanning. Active Security Clearance. Additional preferred skills include experience in DevSecOps or agile environments, knowledge of Zero Trust architecture, IAM, and cloud-native security practices. #J-18808-Ljbffr More ❯
Posted:

AWS DevOps & System Administrator

London, England, United Kingdom
Hybrid / WFH Options
VE3
monitoring using tools like Ansible, Chef, or Puppet. Monitor system performance and troubleshoot issues across infrastructure and applications. Implement and enforce security best practices, including IAM policies, encryption, and vulnerability scanning. Collaborate with development teams to support deployment, testing, and release management. Create and maintain documentation related to infrastructure, policies, and procedures. Provide on-call support and participate in … monitoring using tools like Ansible, Chef, or Puppet. • Monitor system performance and troubleshoot issues across infrastructure and applications. • Implement and enforce security best practices, including IAM policies, encryption, and vulnerability scanning. • Collaborate with development teams to support deployment, testing, and release management. • Create and maintain documentation related to infrastructure, policies, and procedures. • Provide on-call support and participate in More ❯
Posted:

Cyber Security Engineer

Leeds, England, United Kingdom
Covenant Partners Realty
and frameworks (HMG SPF and ISO27001). Experience with public sector programmes. Desirable: PCiIAA, SABSA, TOGAF, and enterprise architecture expertise. Knowledge of identity management, PKI, SIEM, cryptography, firewalls, and vulnerability scanning. A security-based master's or STEM degree preferred. Eligibility and willingness to gain UK Security Clearance. Additional Information Seniority level: Mid-Senior level Employment type: Full-time More ❯
Posted:
Vulnerability Scanning
England
10th Percentile
£41,250
25th Percentile
£51,250
Median
£60,500
75th Percentile
£95,000
90th Percentile
£117,500