Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Inspire People
at the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Threat and Vulnerability Manager to protect DIT and the wider UK government from cyber threats in a fast paced and exciting role, responsible for the VulnerabilityManagement and Threat Hunting … Salary is dependent on location and technical skills as assessed at interview. Flexible, hybrid working from London, Salford, Birmingham, Cardiff, Darlington, Edinburgh or Belfast. As the Cyber Threat and Vulnerability Manager you will be helping to protect DBT and the wider UK government from cyber threats in a fast paced and exciting role.? Reporting to the Head of Cyber … Security Operations, the Cyber Threat and Vulnerability Manager will manage and be responsible for the Threat and VulnerabilityManagement function within the SOC, by providing leadership on identification and improvement opportunities, and ensuring service owners are aware of weaknesses in their security posture and are empowered with the right information to take appropriate actions. A healthy curiosity More ❯
Stoke-On-Trent, Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
Searchability (UK) Ltd
VulnerabilityManagement & Penetration Testing Specialist Hands on technical specialist role, the chance to spearhead a technical red team operation. Working Hybrid within one of the most innovative and fastest growing technological companies in the country in the West Midlands. £80,000 p/a + 15% bonus and car scheme. Perfect for candidates that like a challenge and … is a chance to be a pivotal part of that process. What will you be doing? You will be responsible for both being the technical go to person for vulnerabilitymanagement on the clients applications, as well as being able to talk this through with your peers both technical and non-technical. This is a big multi discipline … needed. You will bring your Cyber Security and InfoSec knowledge to a point and spearhead a new 'red team' function by being the go to for penetration testing and vulnerability management. What do you need? Hands on vulnerability testing and evaluations, as well as the 'hands off' ability to discuss this with peers. PCI DSS Pen testing specialist More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
deliver solutions that strengthen resilience and enable smarter security operations. You will: Architect & Design : Build and evolve secure frameworks using Microsoft Security (Defender, Sentinel, Purview, Entra) and integrate Qualys vulnerabilitymanagement for continuous threat detection and remediation. Automate & Innovate: Lead the charge on automation (SOAR, IaC, workflow automation) and embed Gen AI into security operations, threat intelligence, and … . Strategic mindset, strong communication skills, and a passion for emerging tech. The following would also be of interest: Certifications in automation/cloud (Azure Solutions Architect, Terraform, GIAC), vulnerabilitymanagement (Qualys, ISO 27001, NIST). Experience with SOAR, SIEM, XDR, and cloud-native security (especially Azure). Pre-sales or solution architecture exposure. What can we offer More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Context
are patched and secure. Responsibilities: * Managing and optimising security tools and platforms (SIEM, XDR, IDAM policies etc.) * Monitoring vulnerabilities, investigating incidents and implementing corrective actions * Supporting patching compliance and vulnerability remediation * Ensuring security best practices are applied across networks, applications and systems * Participating in change reviews and advising on improvements to existing setups * Supporting compliance with frameworks such as … ISO 27001, Cyber Essentials Plus and CAF Requirements: * A solid background in IT infrastructure and/or network engineering * Some exposure to, or a growing focus on, cybersecurity and vulnerabilitymanagement * Understanding of network devices, configurations and security principles * Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) * Confidence to identify More ❯
Bromsgrove, Worcestershire, United Kingdom Hybrid / WFH Options
First Choice Recruitment Services
working to protect the company from a range of cyber and security threats. Candidates will need 2/3 years’ experience of working as a Security Analyst, including monitoring vulnerability and threats, risk mitigation and implementation of robust security policies. This role is to be based at the Bromsgrove office but regular travel to Tewkesbury as required. Hybrid working … to contain and resolve threats. Keep incident logs, reports, and tickets updated within incident tracking systems. Assist in threat intelligence gathering and analysis to enhance detection capabilities. Participate in vulnerabilitymanagement activities. Update and oversee the software inventory. Support compliance reporting and audits. Assist in IT service desk activities. Stay updated with emerging cyber threats, attack techniques, and … security trends. Perform any additional duties delegated by the IT Manager to ensure efficient management of the Company. Key skills: Candidates will need recent work history of working in a similar role. Degree Educated would be an advantage A strong understanding of firewalls, intrusion detection systems and other security technologies is essential. Familiar with ethical hacking and penetration testing More ❯
Lincoln, Lincolnshire, East Midlands, United Kingdom Hybrid / WFH Options
ITSS Recruitment Ltd
responsible for driving the technical direction, team growth, and execution of software initiatives that support our business goals. The ideal candidate combines deep technical expertise with strong leadership, project management, and cross-functional collaboration skills. We are ideally looking for someone who can primarily be office based, with flexibility for home working when required. Key Responsibilities * Lead and mentor … and resource plans. * Serve as the technical voice in executive discussions and strategic planning. * Ensure all systems and software meet internal standards and external compliance requirements. * Oversee incident response, vulnerabilitymanagement, and disaster recovery plans. As a visionary and strategic technology leader, the Director of Software Engineering is responsible for shaping and executing the software development strategy that More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
EML
that are transforming businesses worldwide. Key Responsibilities: Cloud Engineering: Design, deploy, and manage scalable, secure, and cost-efficient cloud infrastructure. Implement Infrastructure as Code (IaC) to automate provisioning and management of resources while ensuring security best practices. Optimize cloud resources for performance, cost efficiency, and security compliance. Ensure compliance with security and governance standards, including encryption, access control, and … vulnerability management. DevOps: Build and maintain automated workflows for secure application deployment and testing. Collaborate with development teams to integrate DevOps practices with security principles into the software development lifecycle. Implement containerization and orchestration with secure configurations to protect workloads. Continuously improve build and deployment processes with a focus on minimizing security risks. Site Reliability Engineering (SRE): Ensure system … into cloud, DevOps, SRE, database, and network/system operations. Infrastructure Expertise : Experience in managing secure cloud, on-premises, and hybrid environments. Automation : Proficiency in automating workflows and infrastructure management with security controls. Reliability Practices : Strong knowledge of monitoring, incident management, and performance optimization with security considerations. Database Management : Experience with secure database design, optimization, and administration. More ❯