person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability management-specific tooling, and have … an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process vulnerability data to provide reports, insights and metrics … that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerabilityremediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerability management, security standards, and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Searchability
enjoys both technical implementation and supporting security frameworks such as Cyber Essentials. You will play a key role in deploying Microsoft security solutions and supporting client audits, assessments, and vulnerabilityremediation efforts. Responsibilities include: Delivering Microsoft security technologies including Defender XDR, Sentinel, and Endpoint Detection & Response Supporting Cyber Essentials and Cyber Essentials Plus audits and assessments Acting as … an escalation point for cyber incidents, security alerts, and engineering tasks Conducting vulnerabilityremediation and assessments (infrastructure and application level) Assisting with presales engagements and technical scoping Onboarding clients onto security management platforms Providing reporting, analytics, and technical support to clients and internal teams What will you need? Minimum 2 years' experience in a cyber security role, ideally … Meraki, Fortinet, WatchGuard) Excellent communication and client service skills Self-motivated and detail-oriented with strong problem-solving abilities What would be desirable? Experience deploying Tenable or Qualys for vulnerability management Knowledge of email security tools (e.g., Mimecast, Egress) Understanding of Azure Firewall and Defender for Cloud/Cloud Apps Experience conducting offensive security/web application assessments Strong More ❯
external regulatory requirements. Other responsibilities include: Security Analysis and Improvement: Continuously analyse our security systems for potential improvements, ensuring that our defences remain at the forefront of cybersecurity practices. Vulnerability Management: Proactively identify, assess, and remediate security vulnerabilities to maintain the integrity and confidentiality of our customer data. Security Automation: Automate security processes and procedures to enhance efficiency and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ikhoi Recruitment
of Endpoint Detection and Response solutions including Sentinel One Deployment and management of networking solutions including firewalls, switches and access points including Cisco Meraki, Fortinet and Watchguard Deployment of vulnerability management solutions including Tenable and Qualys Deployment and management of email security solutions Main Tasks and Responsibilities Deployment of core Microsoft technology solutions including XDR, SIEM and Endpoint Detection … and Response Deployment of Network Firewalls and Switches ensuring good security posture is implemented in the configuration Undertaking technical vulnerabilityremediation work using Tenable Providing escalation support for Cyber Security Incidents and Alerts from the SOC Team Undertake, with guidance, from Subject Matter Experts on Microsoft 365 and Cloud security assessments and documentation Assisting the CISO with pre More ❯
ICS, and O365. Develop sophisticated test plans and use cases based on emerging threats and attacker TTPs. Produce detailed, high-impact reports with clear technical findings and business-aligned remediation advice. Work closely with client cybersecurity teams to prioritize and track vulnerabilityremediation, contributing to blue team effectiveness. Conduct ongoing research and contribute to thought leadership in … non-technical stakeholders. CREST CRT/CHECK (or higher) certification is essential. Must hold or be eligible for SC Clearance. Desirable Skills: Experience with Breach Attack Simulation tools and vulnerability management processes. Familiarity with ISO 27001, risk management frameworks, and compliance-oriented testing. Hands-on knowledge of cloud security in AWS, Azure, or GCP. Advanced cybersecurity certifications such as More ❯
OSes Windows 10 & 11 Desktop MS 365 Apps The ideal candidate will possess a solid understanding of CIS & NCSC security best practices, along with expertise in Pen Testing and Vulnerability remediation. Requirements Strong technical skills in VMware, Veeam, HPE, SCCM, and more. Confidence in on-site client support in the financial industry. Effective communication skills. Ability to self-teach More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
SNG (Sovereign Network Group)
SIEM and other security tools Conduct triage of security incidents and escalate as appropriate Collaborate with the SOC and internal teams to respond to and resolve security events Drive vulnerabilityremediation across infrastructure and cloud environments Participate in incident response activities, forensic investigations, and risk mitigation Participate in an on-call rota for out-of-hours cyber incident … re Looking For Experience in a Cyber Security Analyst role or similar Solid understanding of cyber security principles and industry best practices Experience with SIEM tools, log analysis, and vulnerability management Understanding of cloud, network, and endpoint security concepts Strong analytical skills and attention to detail Excellent communication and documentation skills Your Benefits We have some great benefits on More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson McCade
secure architecture and coding standards Lead DevSecOps integration with automated security testing in CI/CD Drive continuous process improvements and automation adoption Monitor and report on KPIs like vulnerabilityremediation, tool adoption, and training uptake Collaborate cross-functionally with architects, engineers, and product owners What We’re Looking For Technical Expertise: 10+ years in secure software development More ❯
secure architecture and coding standards Lead DevSecOps integration with automated security testing in CI/CD Drive continuous process improvements and automation adoption Monitor and report on KPIs like vulnerabilityremediation, tool adoption, and training uptake Collaborate cross-functionally with architects, engineers, and product owners What We’re Looking For Technical Expertise: 10+ years in secure software development More ❯
In-depth knowledge and hands-on experience with SAST, DAST and API security testing Solid understanding of AWS and security configurations. Experience in securing Containerised environments Strong knowledge of vulnerability management tools and methodologies. Experience implementing automated deployments DevSecOps Engineer More ❯
Security Architect Work Mode: Hybrid Work Location : London Job Description: We are seeking a highly skilled and experienced Lead Security Architect to join our team for the Protocol Analysis & Remediation project. The successful candidate will be responsible for designing and implementing security architectures related to lateral movement between workloads and endpoints and understanding and controlling the protocols they utilize … Collaborate with IT and security teams to ensure the integration of security best practices into network and system designs. Conduct security assessments and audits to identify vulnerabilities and recommend remediation actions. Provide technical leadership and guidance to the security team and other stakeholders. Stay updated with the latest security trends, threats, and technologies to ensure the organization's security … techniques. Experience with Azure Log Analytics, KQL, and Azure Alerts. Python, Shell, and PowerShell scripting. Experience with security tools and technologies (e.g., SIEM, IDS/IPS, NG Firewall capabilities, vulnerability scanners). Knowledge of Active Directory and Azure AD. Knowledge of application delivery and the infrastructures that enable it. Familiarity with SQL Server, Oracle, clustering/High Availability technologies More ❯
security access and manage IDS/IPS configurations Establishing and implementing security 'best-practice' standards as well as departmental policies and procedures Responsible for Security scanning and the efficient remediation of vulnerabilities Responsible for analysing all security incidents to determine root cause Determine, recommend, and implement upgrade security measures and controls Delivery security responses for customer and client compliance More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
end client s, ensuring work is performed to the highest professional standards. Key Responsibilities Conduct thorough penetration tests on infrastructure, web applications, APIs, mobile applications, and cloud environments. Perform vulnerability and cloud assessments using a variety of tools and techniques. Document testing procedures, findings, and recommendations in detailed reports for both technical and non-technical audiences. Serve as the More ❯
and failover strategies for microservices and core platforms Continuously monitor and improve system performance, cost-efficiency, and observability (LGTM stack/Datadog) Partner with security teams on compliance and vulnerabilityremediation ️ Chaos Engineering & Resilience Design and execute Chaos Engineering experiments. Develop and track SLOs, SLIs, and error budgets for critical systems Conduct resilience reviews and game days to More ❯
appropriate frameworks and languages Creating and maintaining RESTful APIs for integration across platforms Following secure coding practices and supporting compliance with government security standards Conducting security reviews and supporting remediation of vulnerabilities Translating technical requirements into delivery plans and code Communicating effectively with both technical and non-technical stakeholders What we're looking for: UK Developed Vetting (DV) clearance More ❯
appropriate frameworks and languages Creating and maintaining RESTful APIs for integration across platforms Following secure coding practices and supporting compliance with government security standards Conducting security reviews and supporting remediation of vulnerabilities Translating technical requirements into delivery plans and code Communicating effectively with both technical and non-technical stakeholders What we're looking for: UK Developed Vetting (DV) clearance More ❯
to provide clear visibility of the process mapping journey. Document methodology, inputs, owners, and approvers for mapping and reporting processes. Continuously improve process mapping to identify vulnerabilities and drive remediation plans. Understand vulnerabilities and downstream impacts affecting service delivery. Experience in scenario testing to identify resilience gaps, including research, documentation, assessment, facilitation, and reporting. Required Skills: Experience in end More ❯
regulated environment. You'll be responsible for advancing the organisation's incident response capabilities, leading investigations, and driving threat detection maturity through development of use cases, threat intelligence, and vulnerability management. Key Responsibilities Lead the DFIR function, overseeing incident detection, investigation, and response activities. Develop and implement IR methodologies (MITRE ATT&CK, Kill Chain, Threat Modelling, Diamond Model). … . Coordinate cross-functional security incident response with SOC, Threat Intelligence, and Red/Blue teams. Engage with technical and business teams on cyber risk reduction strategies. Contribute to vulnerability management and remediation plans. Required Skills & Experience Proven experience managing DFIR or cyber incident response teams. Deep technical knowledge of IR and forensic analysis (eg Wireshark, packet capture … working in financial services or a regulated environment preferred. Hands-on experience with SIEM tools, network forensics, and endpoint detection. Knowledge of CIS benchmarks, cloud security, IAM, DLP, and vulnerability management. Familiarity with Windows, Linux/Unix, networking, and virtualisation (VMware). Certifications (preferred): GCIA, GCIH, GCFA or equivalent. What's on Offer Up to £90,000 base salary More ❯
These are my high-level thoughts and not limited to just these activities : MW/DB estate is patched timely and kept current always Plans to remediate EOL timely Vulnerabilityremediation - Critical/Zero day included Ensure MW and DB platforms are built as per QBE standards Projects related to the platforms are delivered on time and within More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
eTeam Inc
These are my high-level thoughts and not limited to just these activities : • MW/DB estate is patched timely and kept current always • Plans to remediate EOL timely • Vulnerabilityremediation - Critical/Zero day included • Ensure MW and DB platforms are built as per QBE standards • Projects related to the platforms are delivered on time and within More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
prior to commencement. General responsibilities: - Manage backlog of items and prioritizing agile sprints Prioritizing and allocating tasks and owning BAU work items Managing risks and working towards resolution and remediation of risk Work on strategic roadmap deliverables including requests arriving from the business via small change enhancements e.g. M365 add-ons, device rollouts, email enhancements Maintaining stability of AV … email services, and email routing technologies (eg M365 Exchange Online/Hybrid Exchange) Mail protection e.g. Mimecast Security and Threat management in an enterprise environment (eg Defender for Endpoint, Vulnerability reporting and remediation) Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome More ❯
of both mapping and reporting Own ongoing improvement in the mapping of key processes to provide an end-to-end holistic view of their health, identifying vulnerabilities to drive remediation plans Understand the vulnerability/s and downstream impacts which may impact the delivery of the service Experience in developing and leading scenario testing would be beneficial, to More ❯