Step into the role of a VulnerabilityManagement Governance Lead where you'll spearhead the evolution of our digital landscape, driving innovation and excellence. To be successful as a VulnerabilityManagement Governance Lead , you should have experience with: Ability to lead colleagues in an operational cyber … on time Keen knowledge of risk and controls frameworks in a global financial institution Some other highly valued skills include: Knowledge/experience of vulnerabilitymanagement Strong powers of communication, with an ability to take complex topics and explain them simply to non-technical audiences Ability to process … risk-based approach to prioritise them, and to drive effective remediation activity. Accountabilities Allocation of the correct risk rating and remediation prioritisation to a vulnerability based on industry standards for assessment, available threat intelligence concerning exploitation, the reachability of the host (or asset) and the value of the service More ❯
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
Runcorn, England, United Kingdom Hybrid / WFH Options
Swissport
detect, investigate, and address insecure features and malicious activity across Swissport’s networks and infrastructure. Run security controls such as email security gateway and vulnerabilitymanagement systems. As well as contributing to user awareness and training throughout Swissport. Job Responsibilities: Monitoring, investigating, and responding to security alerts, including … and EDR platforms. Managing and fine-tunning email security gateways, reviewing quarantined messages and adjusting rules to reduce false positives. Supporting the organisation’s vulnerabilitymanagement process, from detection through to tracking remediation. Assisting with cyber risk assessments for new software and services. Conducting phishing simulations and analyse … involving security operations, system/network monitoring, or incident response. Familiarity with core information security concepts, such as email security, endpoint detection and response, vulnerabilitymanagement, and SIEM. Understanding of at least one information security framework (e.g., ISO 27001, NIST) and general awareness of regulations such as GDPR. More ❯
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerabilitymanagement programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 … Information Security Management System. Ensure cyber security compliance with company policies, standards, and obligations. What You'll Need to Succeed: 2 years + Experience in a cyber-security role Working knowledge of technical and cyber security standards Working knowledge of industry best practices (such as NIST Framework, OWASP top … ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerabilitymanagement tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to the ISO27001 standard Cloud More ❯
complex technology audits focused on cloud environments (especially AWS), cybersecurity programs, network security, and enterprise applications. Evaluate cloud infrastructure controls, architecture risks, and configuration management within AWS environments, identifying gaps and control weaknesses. Conduct assessments of cybersecurity frameworks, including access management, vulnerabilitymanagement, incident response, and More ❯
as a Cyber Audit AVP where you will collaborate with cross-functional teams to provide independent and reliable Cyber Security audit assurance to executive management and the Board on governance, risk management, and control effectiveness. In this role, you will contribute to audit planning and execution, risk assessment … covering Cyber Security. Experience in developing and executing assurance testing approaches in areas such as data security, security configuration, network security, cyber incident response, vulnerabilitymanagement, cyber threat management, information risk management, data leakage protection, identity & access management, cyber resilience. Knowledge of emerging technology, cyber More ❯
Manchester OR Hertfordshire - Hybrid, Manchester, England Hybrid / WFH Options
InfraView
leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a "people manager" as well … business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerabilitymanagement, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and … SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerabilitymanagement tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials More ❯
Assistant CISO will play a key role in rewriting and implementing information security standards, collaborating with key stakeholders to ensure alignment with organisational risk management practices, and fostering a proactive security culture across the company.As a key partner to the CISO, this role involves both strategic thinking and practical … industry best practices and align with legal, regulatory, and organisational requirements. Develop and implement guidelines for adherence to these standards across the company. Policy Management: Work closely with the CISO and other security leaders to create, update, and enforce information security policies. Ensure that security policies are effectively communicated … threats and vulnerabilities, and support JRC members in decision-making processes. Hands-On Security Experience: Take an active role in the day-to-day management of security operations, including incident response, threat hunting, vulnerabilitymanagement, and other proactive measures. Provide expertise in implementing technical security solutions and More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and controls … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory … a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. More ❯
Act as a key liaison between internal stakeholders, managed service providers, and external vendors to ensure operational continuity and alignment with business objectives. Infrastructure Management Oversee the day-to-day performance and availability of core infrastructure systems, including networks, servers, storage, and cloud services. Monitor infrastructure platforms proactively to … units. Service Operations & Technical Support Provide third-line support across infrastructure layers, supporting internal users and IT service desk teams. Maintain and enforce access management protocols for infrastructure components and enterprise applications. Lead incident resolution efforts involving infrastructure systems, ensuring timely escalation to third-party experts when required. Vendor … enhance Microsoft 365 security posture across the organization. Manage the configuration and policy enforcement of Microsoft Intune, including compliance and device security baselines. Oversee vulnerabilitymanagement and endpoint patching activities in partnership with external security consultancies. Administer firewall configurations and ensure consistent deployment across all locations and platforms. More ❯
complex organisation, trading globally within a constantly evolving IT and information security threat environment. Impact of Role Implement governance framework to enable enforcement and management of IT and cyber policies across all JD entities. Help drive good security hygiene and the use of appropriate controls into the business culture … role resides in the Information Security Function and reports to the Global Head of Governance, Risk and Compliance. Direct Reports Individual contributor with possible management of a GRC Analyst and periodic oversight of seconded resources, contingent workers and systems integrators. Key Elements of the Role The job holder will … a company-wide consistent set of policies and standards used across all entities. Implement and maintain a robust policy development lifecycle ensuring effective policy management and review in line with compliance and technological advancements and changes. Analyse incidents and events to identify omissions and opportunities for improvement in accordance More ❯
technologies (firewalls, IDS/IPS, SIEM, etc.). Experience with security tools such as SIEM/SOAR platforms, endpoint detection and response (EDR) solutions, vulnerabilitymanagement, detection and response/remediation (VMDR) solutions and threat intelligence platforms. Knowledge of security standards and frameworks (e.g., NIST, CIS Controls, ISO More ❯
Salford, Manchester, United Kingdom Hybrid / WFH Options
ENGINEERINGUK
identified any gaps in our monitoring capability. • Provide support to the Digital Forensics team where requested as part of formal investigations. Threat Intelligence and VulnerabilityManagement • Carry out research and produce reports to ensure the BBC is aware of the current threat landscape and we can best protect … ourselves against emerging threats. • Carry out vulnerability scanning to identify areas of risk in the BBC and work with the relevant teams to ensure these risks are quickly mitigated. Project/Roadmap support • Work with your Shift Lead to deliver projects within the SOC as part of the Information More ❯
to security events across a complex, multi-departmental IT environment. You'll maintain and use key security tools such as SIEM, IDS, EDR, and vulnerabilitymanagement platforms. You will work closely with system owners and users to assess configurations, analyse logs, and improve security controls and procedures. In … career experience in a relative field Hands-on experience with security monitoring and incident response technologies such as SIEM, IDS and EDR. Experience with vulnerability assessment including practical assessments for risk analysis. A strong working knowledge of at least one major operating system (Windows, Linux, or MacOS). An More ❯
experience as a SOC/Security Engineer within a cloud environment Strong CrowdStrike experience is needed Experience with a range of SIEM, SOAR and vulnerabilitymanagement tools Experience advising on security best practices and developing SOC playbooks Networking and infrastructure experience, including with Firewalls and IDS/IPS More ❯
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team More ❯
Stockport, Cheshire, United Kingdom Hybrid / WFH Options
zyncgroup.io
C/C++ Knowledge of cyber security Strong communication skills and a solution-oriented mindset C1 German and fluent English Desirable: Technical knowledge of vulnerabilitymanagement and automotive security. Benefits: Regular company events Strong career progression Company benefits e.g. JobRad, Gym, discounts at 100s of vendors etc Junior More ❯
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team More ❯
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response, as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team More ❯
be the same. Experience in SIEM, SOAR, or Managed Security Services is essential. Additional hands-on experience with DDoS, WAF, IDAM, EDR, MDM , or VulnerabilityManagement is highly desirable. They are also open to candidates from operational security backgrounds who wish to transition into a client-facing, strategic More ❯
social events throughout the year. About My Client: My client is an innovative leader in the tech industry, a?multi-award-winning risk-based vulnerabilitymanagement (RBVM) About the Role: We are looking for someone with experience in B2B tech marketing. You will be proactive in researching and More ❯
Security and Networking. Knowledge of SIEM, SOAR, or Managed Security Services is advantageous, particularly in areas like DDoS protection, WAF, IDAM, EDR, MDM, or Vulnerability Management. Multi-vendor knowledge, e.g. Fortinet, Palo Alto, CrowdStrike. Please apply now for immediate consideration More ❯
social events throughout the year. About My Client: My client is an innovative leader in the tech industry, a?multi-award-winning risk-based vulnerabilitymanagement (RBVM) About the Role: We are looking for someone with experience in B2B tech marketing. You will be proactive in researching and More ❯