Vulnerability Management Jobs in London

26 to 50 of 68 Vulnerability Management Jobs in London

Data Security Manager - Data Controls

London, England, United Kingdom
AXA
groups. DISCOVER your opportunity What will your essential responsibilities include? What will your essential responsibilities include? · Partner with key stakeholders from Global Technology, Risk Management, Data Protection Officer, and Information Security to ensure IDA products and processes are compliant, resilient and audit ready. · Ensure IDA products are compliant with … Data Controls projects take end-end ownership to achieve success with relevant stakeholders. · Current projects related to Cloud Secure Design and Data Access Rights Management improvement to proactively meet future state strategic requirements. Focus on Process, People and Technology. · Effective communication and negotiate skills are a prerequisite to ensure … a prerequisite. · Proven business acumen and commercial awareness. · 3 Lines of Defense Governance Model experience. · Working knowledge of IT security best practices, penetration testing, vulnerability management, Incident Problem & Change Management and Business Continuity. · Robust experience in project management, analytical skills & continuous improvement methodologies. · Requires a combination more »
Employment Type: Technology
Posted:

Senior Security Engineer

London, United Kingdom
Hybrid / WFH Options
Confidential
tools such as Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerability management, and penetration testing. Risk Management and Compliance Identify and assess security risks and develop mitigation strategies. Ensure compliance with relevant security more »
Posted:

Cyber Security Manager

South East London, London, United Kingdom
The Fortune Group (Recruitment) Limited
business on what is good practice, what are the current threats and how to avoid appearing in the news. Providing specialist security advice to management, project teams and internal stakeholders. Continuous improvement of MI reporting up to and including board level audience. Monitoring the vendor and product landscape to … know what products are available. Perform threat identification and vulnerability management duties. Responsible for ensuring that security vulnerabilities are raised to internal teams and/or 3rd parties suppliers and remediated according to agree timescales. Working with internal and external teams to mitigate and/or control Cyber … Cyber Security risks within IT Operations and escalating as required. Liaising with stakeholders to determine impacts, workarounds, analytical services and recommendations for improvement. Monitoring vulnerability and intelligence feeds for the latest news and alerts in the Cyber Security space. Required You need a proven track record in Security. You more »
Employment Type: Permanent
Salary: £75,000
Posted:

Senior Cyber Detection Engineer – Cloud Technical Lead

London, United Kingdom
Confidential
requesting an accommodation. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Data Security Manager

London Area, United Kingdom
Arcus Search
you. Join them by being a key player in their innovative and forward-thinking team! Responsibilities: Partner with key stakeholders from Global Technology, Risk Management, Data Protection Officer, and Information Security to ensure products and processes are compliant, resilient, and audit-ready Ensure products comply with GDPR, CFIUS, and … end ownership of Data Controls projects to achieve success with relevant stakeholders Manage current projects related to Cloud Secure Design and Data Access Rights Management improvement to proactively meet future strategic requirements, focusing on Process, People, and Technology Strong communication and negotiation skills are essential to ensure that key … Proven business acumen and commercial awareness Experience with the '3 Lines of Defense' Governance Model Working knowledge of IT security best practices, penetration testing, vulnerability management, Incident, Problem & Change Management, and Business Continuity Robust experience in project management, analytical skills, and continuous improvement methodologies Strategic thinking more »
Posted:

Business Continuity Lead

London, United Kingdom
Confidential
s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH, CEH, or OSCP. Proficiency in SIEM Platforms, vulnerability management tools, and incident management processes. Experience in managing security functions or SOC capabilities. Strong analytical skills to analyze security monitoring data more »
Posted:

Information Security Manager

London, United Kingdom
Hybrid / WFH Options
Confidential
compliance with key data and security policies. Expertise in planning and delivering roadmaps, contributing to our cloud security strategy Good understanding of security risk management in a cloud security context, and of cloud security principles Knowledge of multiple regulatory requirements e.g UK GDPR, CCPA Expertise in security and compliance … Architecture Knowledge of Infrastructure as Code Knowledge of Azure, Google, AWS, and Kubernetes cloud native services Securing GitOps and Continuous Deployment Identity and Access Management, including securing privileged access Relevant certifications such as SABSA, CISSP, CCSK, AZ 500, GIAC, CISM, ISO Lead Auditor/Implementer, CISLA, CISMP, Security + … to light subsequently. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Senior Security Consultant(P2PE Application and SSF Assessor)

London, United Kingdom
Hybrid / WFH Options
Confidential
industry best practices for systems hardening. Expertise in data encryption and data privacy. Proficiency in incident response, business continuity planning, physical security, risk assessments, vulnerability scanning, and penetration testing report reviews. Standards and Best Practices: Solid understanding of industry standards such as PCI DSS, CIS, ISO27001, and NIST. Client … independently lead client engagements or collaborate with a team, including scoping, planning, governance review, onsite assessment activities, status reporting, report writing, and client resource management, with support from our project management team. Certifications: At least one Information Security certification from the following is a must: PCI P2PE or … industry leading certifications. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Information Security Service Manager

London, United Kingdom
Hybrid / WFH Options
Confidential
experience, skills and knowledge Essential Information Security Expertise : Must have experience in managing security services in a cloud -first environment. Security Principles and Risk Management : Must possess a solid understanding of information security principles and risk management practices. The ability to apply these concepts effectively in real-world … strong communication skills and the ability to explain complex security issues to a wide range of audiences, helping to align technical teams and senior management on security priorities and strategies. Analytical and Detail-Oriented : The role requires an analytical mindset and an eye for detail while maintaining an overall … happy to accommodate. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
Posted:

Information Security Manager UKI

London, United Kingdom
Hybrid / WFH Options
Confidential
policy. As Information Security Manager UKI you contribute directly to BAM s objectives by strengthening the design and effectiveness of the BAM Information Security Management Framework.You will support Divisional management, Segments and underlying projects within UKI with the implementation and compliance with the required information security policies. You … Your mission Managing the UKI information security agenda in line with the Group Security agenda, including reporting to key stakeholders Managing the Information Security Management System (ISMS) within UKI as part of the ISO27001 certification and Cyber Essentials requirements Identifying emerging data and information security risks and trends and … information security incidents and closure of identified remedial action as required Perform periodic internal control assessments regarding information security (via the BRIC tool). Management of the UK Information Security Project Manager Deliver Security Standards within the organisation and on projects, including certifications (ISO27001 and Cyber Essentials) Implementation of more »
Posted:

Senior Cybersecurity Technical Delivery Manager

London, United Kingdom
Confidential
inspired is expected and making a meaningful impact is rewarded. EDUCATION Degree or equivalent work experience equally preferable. Degree in information technology, cybersecurity, risk management, business administration, or related field Master's degreeCERTIFICATIONS Certified Information Systems Security Professional (CISSP) certificationWORK EXPERIENCE Experience in IT security and risk management … firm's executive leadership and risk committees Drive complex, firm-wide initiatives towards successful completion and develop reports to communicate the progress to senior management, risk committees, and board of directors Understand current cybersecurity strategy and help evolve it on a continuous basis through targeted initiatives Collaborate with stakeholders … cause analysis, cost/benefits, feasibility analysis and research of sound industry practices Drive progress in executing the overall cyber strategy through analysis, stakeholder management, leadership communication, and provide recommendations on how to execute strategic goals including: Partnering with stakeholders to monitor and achieve annual targets Identifying and driving more »
Posted:

Information Security Manager

London, United Kingdom
Confidential
capability to ensure our services are delivered effectively and in line with Sainsbury s future ways of working. What you need to do Line management of a small team of colleagues. Assuring that security controls are met in conjunction with our Product Assurance Framework through the product lifecycle. Articulating … scoped and vulnerabilities are remediated in line with SLA. Work with business and external suppliers. Track and manage the delivery of actions for example vulnerability mitigation for business owned & managed products. What you need to know and show Demonstrative experience of providing InfoSec consultancy to business teams who are … Confidentiality, Integrity and Availability are adhered to. Understanding of Data and Cyber related risks in a complex organisation (including regulatory requirements) Experience of people management of small teams including setting team strategy. Ability to motivate a small team of individuals to be high performers, celebrate success and help develop more »
Posted:

Security Operations Specialist

London Area, United Kingdom
Eames Consulting
documentation, and procedures. Resolve security operations support incidents promptly. Assist Information Security Architecture team with technical security matters. Support Internal Control Framework (ICF) development, vulnerability management, and technical audits. Promote security awareness and best practices within the company Collaborate with technical teams and third-party security partners on … key projects. Technical Requirements: Expertise in security technologies (endpoint protection, vulnerability scanners, network security, cloud security, etc.). Knowledge of Privileged Access Management (PAM) best practices and technologies. Proficiency with Microsoft technologies (Windows Server, Active Directory, SQL Server). Experience with Linux distributions (Ubuntu, Red Hat, Rocky). more »
Posted:

Regional Intelligence Manager, Compliance, Safety and Risk Management

London, United Kingdom
Confidential
Regional Intelligence Manager, Compliance, Safety and Risk Management Google Google s mission is to organize the world's information and make it universally accessible and useful. View company page Bachelor's degree or equivalent practical experience. Candidates will typically have 7 years of experience developing and deploying processes to … of our offices. You're an expert who shares our seriousness about security and our commitment to confidentiality. You'll collaborate with our Facilities Management team to create innovative security strategies, investigate breaches and create risk assessment plans for the future. You believe that providing effective security doesn't … bodyguard (and our long lost pal). The Threat Analysis and Crisis Services (TACS) team within Google Data Center's Compliance, Safety, and Risk Management (CSRM) organization, provides 24x7 threat monitoring, intelligence analysis and crisis reporting of potential threats to Technical Infrastructure s personnel, operations, assets, and supply chain more »
Posted:

Senior Security Service Analyst

Stanmore, England, United Kingdom
Hybrid / WFH Options
Sky
What you'll bring Previous experience in Cyber Security/Information Security. Previous experience in analytical/technical role. Working Knowledge of Source Code Management systems, e.g. GitHub. Knowledge of the vulnerability management process. The ability to manage and build relationships with different stakeholders. Excellent verbal and more »
Posted:

Information Technology Infrastructure Engineer

Ruislip, England, United Kingdom
CRG Recruitment Ltd
to have Azure Entra, SSO, Active Directory - Admin, GPO Experience supporting virtual infrastructures - Hyper-V Intune/Endpoint manager, Microsoft 365 Defender security and management Operational experience of Microsoft Azure, management, administration, and operational support of cloud infrastructure Vulnerability management, Defender, Rapid7 or similar Cisco routing more »
Posted:

Cyber Security Analyst - London

London, United Kingdom
Hybrid / WFH Options
Experis
Analyst, the ideal candidate will be mid-level with 3+ years experience in a similar role. Required: 3+ years' experience Experience with stakeholder management. Vulnerability management including incident priority. Incident management Penetration testing experience Knowledge of multiple technologies encompassing cloud Experience with Microsoft tech stack This client more »
Employment Type: Permanent
Salary: £45000 - £55000/annum + Excellent Bens
Posted:

Security Operations Center Analyst

London Area, United Kingdom
Hybrid / WFH Options
Bestman Solutions
Threat Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security Penetration Testing Security Automation (SOAR) Qualifications: Knowledge and experience in the following: SIEM Tools Vulnerability Management EDR Software Intrusion Detection/Prevention Systems Web Proxies Network Security & Firewalls Programming – Nice to have! More details: Permanent role 2 days more »
Posted:

Information Security Manager

London, United Kingdom
Confidential
ongoing security of products delivered by engineering teams Managing the security portfolio of technology products including Single Sign On, Data Loss Prevention, AntiVirus, and vulnerability management Keeping a finger on the pulse of current threats from a variety of sources to highlight those that pose a risk to more »
Posted:

VP - Information Security

London, United Kingdom
Confidential
and implementing operational policies and standards. Demonstrable experience in a variety of areas such as cloud security, IAM, 3rd party risk, threat assessments and vulnerability management. Strong knowledge of cyber security architecture. Relevant certifications would be beneficial (e.g. TOGAF, SABSA). Ability to interact with and challenge technical teams more »
Posted:

Senior Technical Consultant

London, United Kingdom
Hybrid / WFH Options
Confidential
health to tackle today s social and environmental challenges. Established in 2002, the business provides a range of consultancy and outsourcing capabilities including programme management, market design and governance. We also have extensive and award winning capabilities across cyber security, data privacy and digital transformation. We are a B … Corp, IIP Gold accredited and a Financial Times Leading Management Consultancy for 2021 and 2022. Our purpose is to make things that matter work better for everyone. The nature of what we do means we are very much a people business. The contribution every member of the team makes … are looking for a Senior Consultant to join us who has good knowledge of the smart metering regulatory arrangements and excellent communication and stakeholder management skills. The Role In your role as Senior Technical Consultant, you will be working in a dedicated team whose responsibility is, via the relevant more »
Posted:

Infrastructure Engineer II

London Area, United Kingdom
Hybrid / WFH Options
Stridon
infrastructure environments Demonstrable Azure implementation and optimisation experience Understanding of Azure protocols and how best to manage and configure them to support cloud services. Management and optimisation of Office365 and Active Directory services, ensuring secure, efficient, and reliable network resources and user identity management. Provide ongoing operational support for … based support channels, demonstrating patience, empathy, and technical expertise. Leverage monitoring tools to detect, respond to and troubleshoot infrastructure performance and reliability issues. Use vulnerability management tools to scan for and remediate vulnerabilities across client infrastructure, deploying patches, firmware and software updates as part of the remediation process. … SLA. Operate to defined SLA, OLA and KPI models, in alignment with ITIL best practice and client commitments. Develop and maintain documentation and knowledge management of client and internal systems and processes, using designated documentation tools such as IT Glue and Lucid Chart. Maintain accurate and up to date more »
Posted:

Senior Infrastructure Engineer

London Area, United Kingdom
TRIA
completely cloud environment and the continued enhancement of workplace technology. Working directly with Windows 10/11, end-point devices, Intune, PowerShell, Azure, and vulnerability management. Experience required: PowerShell Intune Microsoft Azure Azure AD EUC Device Management and User support Windows 10/11 Desirable but not required … SCCM MDM Vulnerability Management Please apply directly and we will be in touch to provide further information more »
Posted:

Cloud Security Engineer

London, United Kingdom
Sure Staffing
technologies. Proficiency in programming and scripting languages, especially Terraform and YAML (PowerShell is a plus). Knowledge of Anti-virus, Endpoint Detection and Response, Vulnerability Management, and Patching. Familiarity with Security Information and Event Management (SIEM). Experience with CI tools, such as Azure DevOps or GitHub more »
Employment Type: Contract
Rate: £450 - £500/day Inside IR35
Posted:

Security Engineer

London Area, United Kingdom
Thomson Keene
Title: Security Engineer Salary: £80,000 to £100,000 We are seeking a Security Engineer, for a fast-growing FinTech firm, specialising in Wealth Management and Financial Advisory. As the first dedicated cybersecurity professional you'll play a pivotal role in establishing and fortifying the firm's cybersecurity infrastructure … development processes. Conduct thorough reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerability management, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Develop and … Familiarity with distributed event stores such as Apache Kafka. Proficiency with operating systems (e.g., Linux) and command-line interfaces. Experience with network security, incident management, and penetration testing. Familiarity with automated cloud-based CI/CD pipelines and secure software design principles. In addition to your technical prowess, we more »
Posted:
Vulnerability Management
London
10th Percentile
£52,500
25th Percentile
£62,500
Median
£80,000
75th Percentile
£95,000
90th Percentile
£112,125