Vulnerability Scanning Jobs in England

76 to 100 of 322 Vulnerability Scanning Jobs in England

Security Engineer | Global Macro Trading Specialist

City of London, London, United Kingdom
Techfellow Limited
remediation efforts Collaborate with infrastructure and cloud engineering teams to ensure security principles are embedded within project delivery Manage and fine-tune tooling across endpoint protection, log aggregation, and vulnerability scanning Help shape policy improvements and contribute to security awareness and hygiene across the business What You’ll Bring... 3-6 years of hands-on experience in security More ❯
Posted:

Security Engineer | Global Macro Trading Specialist

London Area, United Kingdom
Techfellow Limited
remediation efforts Collaborate with infrastructure and cloud engineering teams to ensure security principles are embedded within project delivery Manage and fine-tune tooling across endpoint protection, log aggregation, and vulnerability scanning Help shape policy improvements and contribute to security awareness and hygiene across the business What You’ll Bring... 3-6 years of hands-on experience in security More ❯
Posted:

Security Engineer | Global Macro Trading Specialist

South East London, England, United Kingdom
Techfellow Limited
remediation efforts Collaborate with infrastructure and cloud engineering teams to ensure security principles are embedded within project delivery Manage and fine-tune tooling across endpoint protection, log aggregation, and vulnerability scanning Help shape policy improvements and contribute to security awareness and hygiene across the business What You’ll Bring... 3-6 years of hands-on experience in security More ❯
Posted:

Security Analyst

Worcester, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerability scanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
Posted:

Information Security Manager

London, England, United Kingdom
Hybrid / WFH Options
BACB plc
identifying emergent threats and recommending innovative controls and mitigations. Work together with the 1LOD and provide evidence that IT Security operations are within risk tolerances (e.g., Evergreen IT, Patching, Vulnerability scanning and Pen Testing) (supported by a 2nd member of the 2LOD team). Oversee compliance with the Bank’s cyber security standards and policies liaising with CIO More ❯
Posted:

SOC Analyst SIEM Monitoring

Birmingham, United Kingdom
Applicable Limited
systems (Windows, OS X, Linux). Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of Vulnerability Scanning, Management, and Ethical Hacking (Penetration Testing). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cybersecurity Analyst (Visa Sponsorship Available)

Cambridge, England, United Kingdom
Hybrid / WFH Options
Techwaka
responsibilities will include: Incident detection and response using EDR/XDR and SIEM technologies, including Microsoft Defender and Sentinel. Contributing to the development and maintenance of security procedures, including vulnerability scanning, remediation, and crafting playbooks for responding to alerts. Conducting phishing simulations, reporting results, and carrying out remediation activities. Developing and delivering training on IT security and data More ❯
Posted:

Cybersecurity Analyst (Visa Sponsorship Available)

London, England, United Kingdom
Hybrid / WFH Options
Techwaka
responsibilities will include: Incident detection and response using EDR/XDR and SIEM technologies, including Microsoft Defender and Sentinel. Contributing to the development and maintenance of security procedures, including vulnerability scanning, remediation, and crafting playbooks for responding to alerts. Conducting phishing simulations, reporting results, and carrying out remediation activities. Developing and delivering training on IT security and data More ❯
Posted:

Security Engineer [UAE Based]

London, England, United Kingdom
AI71
systems, cloud environments, and data pipelines; integrate security into the SDLC. Threat Detection and Response: Monitor security events, respond to incidents, conduct root cause analysis, and implement corrective actions. Vulnerability Management: Conduct assessments, penetration testing, vulnerability scans, and collaborate on vulnerability remediation. Compliance and Governance: Ensure adherence to standards like GDPR, HIPAA, ISO 27001; develop security policies … Science, Cybersecurity, or related field. 3+ years in security engineering or related roles. Strong knowledge of security principles, cryptography, network protocols. Experience with security tools (SIEM, IDS/IPS, vulnerability scanners). Familiarity with cloud platforms (AWS, Azure, GCP) and security frameworks. Knowledge of secure coding practices and vulnerabilities (OWASP Top Ten). Preferred Skills: Experience with securing AI More ❯
Posted:

IT Technician

London, England, United Kingdom
Hybrid / WFH Options
EVORA Global Limited
licenses, and permissions, ensuring seamless integration with organisational policies. Compliance and Data Privacy: In-depth knowledge of Azure Security Centre and Microsoft Defender for Cloud. Conduct regular security audits, vulnerability assessments, and compliance checks. Monitor adherence to security policies to maintain compliance. Hardware Inventory and Lifecycle Management: Maintain an accurate inventory of IT hardware assets (servers, workstations, networking equipment … practices. Strong understanding of network and system architecture, including cloud environments. Familiarity with security frameworks and standards (e.g., ISO 27001). Experience with security tools and technologies (firewalls, SIEM, vulnerability scanners, intrusion detection/prevention systems). Experience Required: Extensive experience in IT operations, cyber security, and business systems management. Proven experience in business systems analysis, implementation, and administration. More ❯
Posted:

Lead Cyber Security Engineer London

London, England, United Kingdom
Transferroom Limited
management principles. A motivated team player with excellent communication and stakeholder management skills. Nice to haves: Certifications in vendor, product, methodology, or industry standards. Experience with configuration management tools, vulnerability scanners, proxies, WAFs, and artifact management. Experience in secured Azure or other cloud architectures and engineering solutions. What’s in it for you: Employee assistance programme 25 days holiday More ❯
Posted:

Information Security Manager

London, England, United Kingdom
Hybrid / WFH Options
Ravelin Technology Ltd
including preparing for and undergoing assessments. Familiarity with information security frameworks (e.g., NIST, CIS). Proficiency in risk management methodologies. Knowledge of common security technologies (e.g., firewalls, EDR, SIEM, vulnerability scanners). Exceptional analytical, problem-solving, and decision-making abilities. Excellent communication (written and verbal), interpersonal, and presentation skills. Ability to operate autonomously and manage multiple priorities in a More ❯
Posted:

Vulnerability Management Manager

Exeter, Devon, United Kingdom
Hybrid / WFH Options
Met Office
The following content displays a map of the jobs location - Exeter We're looking for an exceptional Vulnerability Management Manager to help us make a difference to our planet. As our Vulnerability Management Manager, the job may be suitable for hybrid working, which is where an employee works part of the week in the office and part of … Management Managerwithin the Security Operations team of the Met Office's Cyber Security Department you will be responsible for driving the vision and operational execution of the organisation's vulnerability management program, overseeing the end-to-end process of identifying, assessing, and recommending mitigations to vulnerabilities across digital services, including complex and mission-critical systems at the Met Office. … Leadership and Development:Lead, manage and mentor a team to ensure the team operate effectively. Develop the team utilising the career framework to identify learning needs and career pathways. Vulnerability Management: Manage and coordinate vulnerability scanning, risk assessments, and penetration testing to identify security weaknesses across systems, infrastructure, and digital services.Lead efforts to enhance vulnerability management More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Vulnerability Management Analyst

London, United Kingdom
Hybrid / WFH Options
Barclay Simpson
access View job & apply Zero Trust Architect Location: Fully Remote Job type: Contract Position Overview: Leading FinTech company seeking a Zero Trust Architect to design and implement Cyber Security Vulnerability Management Analyst Cyber Security Vulnerability Management Analyst required for a market leading financial services firm. It's a great opportunity to get to work with industry-leading tools … your analytical, technical and communication skills, and to really make a difference to our customers and colleagues. This role will contribute to the development, maintenance and overall delivery of Vulnerability Management controls for the Bank, reporting to the Vulnerability Management Lead. The Vulnerability Management Analyst will contribute to the day-to-day running of the team, assisting … Specialists with managing the Bank's Vulnerability Management controls and providing security input for vulnerabilities which threaten the organisation. Experience Understanding of vulnerability lifecycles, standards and ratings Risk assessing findings to determine appropriate response with a proactive approach to recording, management and escalation of risks Increasing the quality of vulnerability reporting automation to reduce manual effort Advanced More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Information Security Consultant

Yorkshire, United Kingdom
Headway Recruitment
policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with … Expertise in Microsoft O365 Security Solutions including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerability scanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location: Leeds (LS18) On-site with More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Information Security Consultant

LS18 4GH, Rodley, West Yorkshire, United Kingdom
Headway Recruitment
policies and regulations. User Support & Alerts – Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development – Support compliance with … Expertise in Microsoft O365 Security Solutions – including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerability scanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location: Leeds (LS18) – On-site with More ❯
Employment Type: Permanent
Posted:

IT Information Security Consultant

Pudsey, West Yorkshire, Yorkshire, United Kingdom
CIIH Ltd T/A Headway Recruitment
policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with … Expertise in Microsoft O365 Security Solutions including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerability scanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location: Leeds (LS18) On-site with More ❯
Employment Type: Permanent
Salary: £55,000
Posted:

Lead DevOps Engineer SC Cleared or SC Eligible

Leeds, England, United Kingdom
Avance Consulting
TCP/IP, DNS, Load Balancers, network firewalls, SSL/TLS/mTLS, along with AWS Shield for DDoS protection, AWS WAF for web security, VPC segmentation, and automated vulnerability scanning. Container Security & Orchestration: Expertise in Docker, ECS, EKS, Kubernetes, implementing security best practices like image vulnerability scanning, Kubernetes RBAC, IAM Roles for Service Accounts (IRSA), Pod … such as CloudWatch, Security Hub, SIEM integrations. CI/CD Security & Automation: Proficient in Jenkins, Git, GitHub Actions, ensuring secure CI/CD pipelines with artifact encryption, automated security scanning, and DevSecOps best practices. Cloud-Based Database Security: Experience managing Amazon RDS, DynamoDB, ElastiCache, enforcing database encryption (KMS), automated backups, fine-grained access controls, and data integrity monitoring. Cost More ❯
Posted:

Information Security Analyst

Birmingham, England, United Kingdom
TECHTRACE PARTNERS
tooling is optimised Provide advice and support to business units on security best practice and control implementation What We’re Looking For Hands-on experience with security tooling (EDR, vulnerability scanning, access control) Familiarity with Security frameworks such as NIST, PCI-DSS, and GDPR Experience working with Microsoft environments (O365, Azure) Clear communicator, able to engage with both … role, and wants to take on broader responsibilities Has been the security point-person in an IT team, leading on patching or endpoint protection Has hands-on experience with vulnerability management tools like Tenable, and is ready to play a bigger role in shaping how security tools are implemented and optimised across the business. This is a chance to More ❯
Posted:

Information Security Analyst

Nechells, England, United Kingdom
JR United Kingdom
tooling is optimised Provide advice and support to business units on security best practice and control implementation What We’re Looking For Hands-on experience with security tooling (EDR, vulnerability scanning, access control) Familiarity with Security frameworks such as NIST, PCI-DSS, and GDPR Experience working with Microsoft environments (O365, Azure) Clear communicator, able to engage with both … role, and wants to take on broader responsibilities Has been the security point-person in an IT team, leading on patching or endpoint protection Has hands-on experience with vulnerability management tools like Tenable, and is ready to play a bigger role in shaping how security tools are implemented and optimised across the business. This is a chance to More ❯
Posted:

Lead Security Architect - Defence & Aviation

London, England, United Kingdom
Hybrid / WFH Options
NTT DATA
Design and Implementation: Design and implement security architectures that align with industry standards, regulations (JSPs, DEFSTAN), and client requirements. Conduct security architecture reviews, perform hands-on security assessments, including vulnerability scanning, configuration reviews, and security control validation, identifying vulnerabilities and implementing remediation strategies. Develop and present security architecture roadmaps and strategic plans and then put those plans into … Design and Implementation: Design and implement security architectures that align with industry standards, regulations (JSPs, DEFSTAN), and client requirements. Conduct security architecture reviews, perform hands-on security assessments, including vulnerability scanning, configuration reviews, and security control validation, identifying vulnerabilities and implementing remediation strategies. Develop and present security architecture roadmaps and strategic plans and then put those plans into More ❯
Posted:

Senior Security Engineer

London, United Kingdom
Hybrid / WFH Options
Femtech Insider Ltd
years of experience in the information security field. Hands-on experience with AWS (or similar cloud platforms) and Cloudflare. Infrastructure as Code: Proficiency with Terraform or similar IaC tools. Vulnerability Knowledge: Solid understanding of common vulnerability classes and the OWASP Top 10. Coding & Scripting: Proficient in reading code (e.g., Python, Scala) and using Git for version control of … code and configuration changes. Familiarity with iOS or Android security. Experience of industry-standard SIEM and vulnerability scanning tools. Nice to have: Relevant industry certifications (CISSP, OSCP, etc.). Experience of supporting audits such as ISO27001. Experience of working with security risk management frameworks such as ISO31000. Knowledge of security control frameworks such as CIS, NIST800-53 and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer

London, England, United Kingdom
Synapri
organisation’s security posture. This role has ownership of key initiatives such as ensuring compliance with security frameworks like ISO 27001, NIST, and COBIT, implementing new security tools, supporting vulnerability scanning and facilitating penetration testing to identify and address weaknesses in the tech estate. Additionally, this role will collaborate closely with third-party vendors and stakeholders across various More ❯
Posted:

Cyber Security Risk Manager - HMRC - SEO

London, England, United Kingdom
Government Digital and Data
ll be a central figure in driving security excellence. Acting as the first point of contact for all internal ECS security queries, advice, and guidance, you’ll also lead vulnerability assessments across ECS products, ensuring risks are identified, communicated, and addressed effectively. You’ll play a hands-on role in shaping ECS security policies, supporting penetration testing, and guiding … Experience working with cloud technologies, particularly AWS and Azure. • Proven background in security governance, compliance, and audit practices. • Familiarity with ISO 27001, Risk Management, and GDPR frameworks. • Proficient in vulnerability scanning tools such as, but not limited to: Microsoft Defender for Cloud. Tenable.sc. AWS Security Hub. • Strong stakeholder management skills, with experience working across diverse teams. Desirable Criteria More ❯
Posted:

Information Security Lead

London, England, United Kingdom
Hybrid / WFH Options
HowNow
Work with engineering and DevOps to implement security controls across infrastructure (e.g., access control, encryption, logging). Lead the incident response process and manage third-party pen testing and vulnerability management. Support security questionnaires, RFPs, and due diligence for customer deals. Review third-party vendors and tools for security posture and risks. The key qualities we’re looking for … endpoint protection, SIEMs, DLP, IAM, and SSO. Clear understanding of data privacy laws (especially GDPR). Familiarity with security tools (e.g., endpoint protection, SSO/IAM, monitoring/logging, vulnerability scanning). Experience with risk assessments, incident response planning, and writing security policies. Strong communication skills, with the ability to explain security concepts to both technical and non More ❯
Posted:
Vulnerability Scanning
England
10th Percentile
£41,250
25th Percentile
£51,250
Median
£60,500
75th Percentile
£95,000
90th Percentile
£117,500