as part of a wider tech transformation. As part of this growth, we’re looking for an Information Security Analyst (VM) to join their VulnerabilityManagement team. This role will play a pivotal part in protecting the business by owning the vulnerability scanning and assessment process, coordinating … third-party testing, and helping drive remediation plans. It’s a great opportunity for someone with hands-on technical experience in vulnerabilitymanagement who’s looking to deepen their expertise in a fast-paced, hybrid environment. Responsibilities: Conducting vulnerability scanning across all business endpoints using class-leading … tools Reviewing and assessing scan results through a risk-based lens Coordinating third-party vulnerability and penetration testing Acting as an escalation point for security issues within the business Liaising with technical and non-technical teams to explain risks and support remediation Contributing to audits and supporting compliance with More ❯
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
with global business risk/objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security … security services and deploy new tools in support of the security roadmap. Must be capable of interacting effectively with various internal teams, peers, and management staff. Support the information security manager with creating information security metrics for the respective supported security products. This will be done monthly. Deploy new … processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security operations, legal, compliance, incident response teams More ❯
with global business risk/objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security … security services and deploy new tools in support of the security roadmap. Must be capable of interacting effectively with various internal teams, peers, and management staff. Support the information security manager with creating information security metrics for the respective supported security products. This will be done monthly. Deploy new … processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security operations, legal, compliance, incident response teams More ❯
bolton, greater manchester, north west england, united kingdom
Americold Logistics, LLC
with global business risk/objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security … security services and deploy new tools in support of the security roadmap. Must be capable of interacting effectively with various internal teams, peers, and management staff. Support the information security manager with creating information security metrics for the respective supported security products. This will be done monthly. Deploy new … processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security operations, legal, compliance, incident response teams More ❯
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerabilitymanagement programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 … Information Security Management System. Ensure cyber security compliance with company policies, standards, and obligations. What You'll Need to Succeed: 2 years + Experience in a cyber-security role Working knowledge of technical and cyber security standards Working knowledge of industry best practices (such as NIST Framework, OWASP top … ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerabilitymanagement tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to the ISO27001 standard Cloud More ❯
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerabilitymanagement programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 … Information Security Management System. Ensure cyber security compliance with company policies, standards, and obligations. What You'll Need to Succeed: 2 years + Experience in a cyber-security role Working knowledge of technical and cyber security standards Working knowledge of industry best practices (such as NIST Framework, OWASP top … ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerabilitymanagement tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to the ISO27001 standard Cloud More ❯
bolton, greater manchester, north west england, united kingdom
SearchWorks
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerabilitymanagement programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 … Information Security Management System. Ensure cyber security compliance with company policies, standards, and obligations. What You'll Need to Succeed: 2 years + Experience in a cyber-security role Working knowledge of technical and cyber security standards Working knowledge of industry best practices (such as NIST Framework, OWASP top … ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerabilitymanagement tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to the ISO27001 standard Cloud More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
James Adams
as part of a wider tech transformation. As part of this growth, we’re looking for an Information Security Analyst (VM) to join their VulnerabilityManagement team. This role will play a pivotal part in protecting the business by owning the vulnerability scanning and assessment process, coordinating … third-party testing, and helping drive remediation plans. It’s a great opportunity for someone with hands-on technical experience in vulnerabilitymanagement who’s looking to deepen their expertise in a fast-paced, hybrid environment. Responsibilities: Conducting vulnerability scanning across all business endpoints using class-leading … tools Reviewing and assessing scan results through a risk-based lens Coordinating third-party vulnerability and penetration testing Acting as an escalation point for security issues within the business Liaising with technical and non-technical teams to explain risks and support remediation Contributing to audits and supporting compliance with More ❯
bolton, greater manchester, north west england, united kingdom Hybrid / WFH Options
James Adams
as part of a wider tech transformation. As part of this growth, we’re looking for an Information Security Analyst (VM) to join their VulnerabilityManagement team. This role will play a pivotal part in protecting the business by owning the vulnerability scanning and assessment process, coordinating … third-party testing, and helping drive remediation plans. It’s a great opportunity for someone with hands-on technical experience in vulnerabilitymanagement who’s looking to deepen their expertise in a fast-paced, hybrid environment. Responsibilities: Conducting vulnerability scanning across all business endpoints using class-leading … tools Reviewing and assessing scan results through a risk-based lens Coordinating third-party vulnerability and penetration testing Acting as an escalation point for security issues within the business Liaising with technical and non-technical teams to explain risks and support remediation Contributing to audits and supporting compliance with More ❯
Assistant CISO will play a key role in rewriting and implementing information security standards, collaborating with key stakeholders to ensure alignment with organisational risk management practices, and fostering a proactive security culture across the company.As a key partner to the CISO, this role involves both strategic thinking and practical … industry best practices and align with legal, regulatory, and organisational requirements. Develop and implement guidelines for adherence to these standards across the company. Policy Management: Work closely with the CISO and other security leaders to create, update, and enforce information security policies. Ensure that security policies are effectively communicated … threats and vulnerabilities, and support JRC members in decision-making processes. Hands-On Security Experience: Take an active role in the day-to-day management of security operations, including incident response, threat hunting, vulnerabilitymanagement, and other proactive measures. Provide expertise in implementing technical security solutions and More ❯
Vulnerability Analyst - up to £50K - Manchester (3 days in office) *** We are currently recruiting for an well known consulting organisation, who are looking for an internal facing Vulnerability Analyst to join their team. This role will form part of a growing team, providing a crucial service to secure … their internal IT Estate. This is a Junior - Mid level position, so we're looking for a minimum of 2+ years of vulnerabilitymanagement experience. Key responsibilities are as follows: Identification and ongoing management of vulnerabilities within the IT estate. Analysing identified vulnerabilities through infrastructure scans and … penetration testing. They work with Tenable as their VM platform, but experience with any tooling is fine. Prioritisation of vulnerabilities. Stakeholder management, to engage with business and technical stakeholder to effectively mitigate/resolve issues. Participation in ongoing process improvement activities. This is a great opportunity to join a More ❯
bolton, greater manchester, north west england, united kingdom
Searchstone Ltd
Vulnerability Analyst - up to £50K - Manchester (3 days in office) *** We are currently recruiting for an well known consulting organisation, who are looking for an internal facing Vulnerability Analyst to join their team. This role will form part of a growing team, providing a crucial service to secure … their internal IT Estate. This is a Junior - Mid level position, so we're looking for a minimum of 2+ years of vulnerabilitymanagement experience. Key responsibilities are as follows: Identification and ongoing management of vulnerabilities within the IT estate. Analysing identified vulnerabilities through infrastructure scans and … penetration testing. They work with Tenable as their VM platform, but experience with any tooling is fine. Prioritisation of vulnerabilities. Stakeholder management, to engage with business and technical stakeholder to effectively mitigate/resolve issues. Participation in ongoing process improvement activities. This is a great opportunity to join a More ❯
policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and controls … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory … a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. More ❯
manchester, north west england, united kingdom Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
stockport, north west england, united kingdom Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
bolton, greater manchester, north west england, united kingdom Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Act as a key liaison between internal stakeholders, managed service providers, and external vendors to ensure operational continuity and alignment with business objectives. Infrastructure Management Oversee the day-to-day performance and availability of core infrastructure systems, including networks, servers, storage, and cloud services. Monitor infrastructure platforms proactively to … units. Service Operations & Technical Support Provide third-line support across infrastructure layers, supporting internal users and IT service desk teams. Maintain and enforce access management protocols for infrastructure components and enterprise applications. Lead incident resolution efforts involving infrastructure systems, ensuring timely escalation to third-party experts when required. Vendor … enhance Microsoft 365 security posture across the organization. Manage the configuration and policy enforcement of Microsoft Intune, including compliance and device security baselines. Oversee vulnerabilitymanagement and endpoint patching activities in partnership with external security consultancies. Administer firewall configurations and ensure consistent deployment across all locations and platforms. More ❯
Act as a key liaison between internal stakeholders, managed service providers, and external vendors to ensure operational continuity and alignment with business objectives. Infrastructure Management Oversee the day-to-day performance and availability of core infrastructure systems, including networks, servers, storage, and cloud services. Monitor infrastructure platforms proactively to … units. Service Operations & Technical Support Provide third-line support across infrastructure layers, supporting internal users and IT service desk teams. Maintain and enforce access management protocols for infrastructure components and enterprise applications. Lead incident resolution efforts involving infrastructure systems, ensuring timely escalation to third-party experts when required. Vendor … enhance Microsoft 365 security posture across the organization. Manage the configuration and policy enforcement of Microsoft Intune, including compliance and device security baselines. Oversee vulnerabilitymanagement and endpoint patching activities in partnership with external security consultancies. Administer firewall configurations and ensure consistent deployment across all locations and platforms. More ❯
bolton, greater manchester, north west england, united kingdom
Stelvio Group
Act as a key liaison between internal stakeholders, managed service providers, and external vendors to ensure operational continuity and alignment with business objectives. Infrastructure Management Oversee the day-to-day performance and availability of core infrastructure systems, including networks, servers, storage, and cloud services. Monitor infrastructure platforms proactively to … units. Service Operations & Technical Support Provide third-line support across infrastructure layers, supporting internal users and IT service desk teams. Maintain and enforce access management protocols for infrastructure components and enterprise applications. Lead incident resolution efforts involving infrastructure systems, ensuring timely escalation to third-party experts when required. Vendor … enhance Microsoft 365 security posture across the organization. Manage the configuration and policy enforcement of Microsoft Intune, including compliance and device security baselines. Oversee vulnerabilitymanagement and endpoint patching activities in partnership with external security consultancies. Administer firewall configurations and ensure consistent deployment across all locations and platforms. More ❯
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerabilitymanagement tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerabilitymanagement tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
bolton, greater manchester, north west england, united kingdom
Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerabilitymanagement tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯