Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Capgemini
including: identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role VulnerabilityManagement Understand the VulnerabilityManagement end to end process and reporting and Have working experience of VulnerabilityManagement tools Conduct vulnerability analysis and … create impact assessments including risk assessment of vulnerability reports and impact risks to service Collate conclusions and recommendations and Identify and communicate current and emerging information security threats Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement and notify requirements to address security deficiencies Report audit findings, including corrective action suggestions, Conducts follow up remediation … part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Strong understanding of vulnerabilitymanagement frameworks and tools. Experience in conducting risk assessments and interpreting vulnerability reports. Familiarity with audit processes, compliance standards, and security governance. Skilled in delivering security training More ❯
Darlington, County Durham, United Kingdom Hybrid / WFH Options
Sellick Partnership
You will be responsible for documentation, take an analytical approach and be able to translate complex technical risks into clear and actionable insights for the organisation. Responsibilities: Development and management of the security operational roadmap, ensuring vulnerabilitymanagement, threat detection and effective incident management. Be the primary point of escalation for security events and incidents in the … organisation. Leading on, developing and implementing the cyber security strategy across the organisation. Responsible for process improvements, policy and security architecture. Management of the cyber security budget and allocation of resources to ensure priorities are met. Resonsible for building, leading and management of a newly formed, high performing cyber security team. Ensure compliance standards across the organisation such … certifications in security such as CISM, CISSP, CISA. Proven experience as a cyber security leader, responsible for security strategy with a strong technical understanding. Strong knowledge of cyber risk management, vulnerabilitymanagement and threat intelligence. Knowledge of compliance and regulatory frameworks such as Cyber Essentials, GDPR and ISO 27001. Certifications in Microsoft security such as AZ More ❯
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. Skills & Experience Required: 3+ years of experience working in Cyber Security within … an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when speaking with stakeholders and clients, as well as the ability to provide … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. Skills & Experience Required: 3+ years of experience working in Cyber Security within … an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when speaking with stakeholders and clients, as well as the ability to provide … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
Barrow-In-Furness, Cumbria, North West, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions
Vulnerability Manager - Barrow-in-Furness - Up to £50,000 + Hybrid Working Location: Barrow-in-Furness (Hybrid: 3 days onsite per week) Salary: Up to £50,000 Clearance Requirement: UK nationals only, SC eligible Deerfoot IT Recruitment is helping one of our trusted clients source a Vulnerability Manager to join a specialist cybersecurity team working on a high … profile programme. This is a fantastic opportunity for someone with a passion for cybersecurity, hands-on experience with vulnerabilitymanagement tools, and strong communication skills to play a key role in enhancing security assurance across a complex IT estate. The role will involve: Conducting vulnerability analysis and impact assessments, including risk assessments. Using tools such as Nessus … governance, risk, and compliance activities related to security findings. Collaborating with wider teams and contributing to security training and mentoring initiatives. Ideal candidate profile: 2-3 years' experience in vulnerabilitymanagement (3-5 years in wider cybersecurity desirable). Familiarity with vulnerability tools (e.g. Nessus, Tenable, Microsoft Defender, IBM QRadar). Relevant certifications such as CompTIA Security+ More ❯
Barrow-in-Furness, Cumbria, England, United Kingdom Hybrid / WFH Options
Adecco
Job Title: Vulnerability Manager Location: Barrow-in-Furness (Hybrid - 3 days onsite per week) Type: Full-time | Permanent Overview I'm recruiting on behalf of a leading organisation in the technology and cybersecurity space, looking to bring on an experienced and proactive Vulnerability Manager . This is a great opportunity for someone with a strong background in cybersecurity … vulnerabilitymanagement, and governance. You'll be working closely with internal teams, clients, and third-party stakeholders to manage and improve security posture across complex environments. Key Responsibilities Manage and execute the end-to-end vulnerabilitymanagement process Conduct vulnerability analysis , risk assessments, and impact reporting Identify current and emerging threats and communicate these effectively … support remediation activities through to closure Deliver security awareness sessions and support a culture of cybersecurity best practices across the team Ideal Candidate Will Have: Hands-on experience with vulnerability scanning tools and related frameworks Strong understanding of risk assessment methodologies and security governance Ability to present complex technical findings clearly to both technical and non-technical audiences Experience More ❯
cause harm. This involves continuous monitoring and analysis of network traffic, system logs, and other data sources to identify unusual patterns or behaviours that may indicate a security threat. VulnerabilityManagement: Identify and address security weaknesses in our systems. Conduct regular vulnerability assessments, apply patches and updates, and implement security controls to mitigate risks. Defence Management … policies and processes to ensure that all technology remains secure and compliant. Ensuring that all security layers align against our Internal Security Standards and Statutory and Regulatory obligations. SIEM Management: Manage, monitor, and respond to security incidents and events using the Council's Security Incident and Event Monitoring (SIEM) platform. Ensure timely detection, analysis, and response to security incidents … experience and skills that include: IT Security Operations Experience: Recent experience as a senior member of a multi-disciplinary team managing operational security (firewall, content filtering, DMZ, Pen Testing, VulnerabilityManagement) and external managed service partners. Security Qualifications: Accredited to a recognised Security qualification (e.g., CISSP, CCP, CCSP). The successful candidate must be willing to work towards More ❯
control traffic flow. - Collaborate with other teams to define and enforce network access policies, ensuring that only authorized personnel and devices have appropriate access rights. Proactive Security Testing and VulnerabilityManagement: - Conduct and organise regular security assessments, including vulnerability scanning and testing, to identify weaknesses in the network infrastructure. - Collaborate with system administrators and application owners to … address identified vulnerabilities and implement necessary patches or configuration changes. - Develop and maintain a comprehensive vulnerabilitymanagement program, including vulnerability tracking, risk assessment, and remediation planning. Stakeholder Collaboration: - Act as a stakeholder for the response team, providing expert guidance on security-related alerts, incidents, and potential improvements. - Collaborate with cross-functional teams, including network engineers, system administrators More ❯
be eligible for DV clearance. Are you ready to lead in one of the most critical roles in the cybersecurity industry? We are seeking a Cyber Threat Intelligence and Vulnerability Lead to play a pivotal role in the operation and improvement of a Security Operations Centre (SOC) dedicated to safeguarding a major UK organisation. This position offers an opportunity … to make a tangible impact in protecting the systems that power the nation. About the Role As the Cyber Threat Intelligence and Vulnerability Lead, you will: Take accountability for detecting, triaging, and reporting potential cyber threats and key vulnerabilities daily. Oversee the delivery and quality of all threat intelligence and vulnerability products, ensuring deadlines are met with excellence. … support threat mitigation. Assess and enhance the maturity of the SOC's existing functions, driving continuous improvement. Lead, mentor, and develop a high-performing team of threat intelligence and vulnerability professionals. Key Responsibilities Selection and analysis of key threat actors posing the greatest risk to the client. Regularly review and document processes, ensuring efficiency and relevance. Deliver top-quality More ❯
therefore must be British-born. Are you ready to lead in one of the most critical roles in the cybersecurity industry? We are seeking a Cyber Threat Intelligence and Vulnerability Lead to play a pivotal role in the operation and improvement of a Security Operations Centre (SOC) dedicated to safeguarding a major UK organisation. This position offers an opportunity … to make a tangible impact in protecting the systems that power the nation. About the Role As the Cyber Threat Intelligence and Vulnerability Lead, you will: Take accountability for detecting, triaging, and reporting potential cyber threats and key vulnerabilities daily. Oversee the delivery and quality of all threat intelligence and vulnerability products, ensuring deadlines are met with excellence. … support threat mitigation. Assess and enhance the maturity of the SOC's existing functions, driving continuous improvement. Lead, mentor, and develop a high-performing team of threat intelligence and vulnerability professionals. Key Responsibilities Selection and analysis of key threat actors posing the greatest risk to the client. Regularly review and document processes, ensuring efficiency and relevance. Deliver top-quality More ❯
Security Operations Securely manage M365 & Azure resources, implementing comprehensive security policies and initiatives. Implement security measures and controls for EUC environments, including endpoint security, access controls, and device management. VulnerabilityManagement Conduct and oversee regular vulnerability assessments on systems, networks, and applications. Identify, analyse, and prioritise vulnerabilities based on risk and potential impact and utilise threat intelligence … analysis to determine the risk posed by identified vulnerabilities. Collaborate with the IT MSP to develop and implement remediation plans, drive remediation efforts and identify improvements in the vulnerabilitymanagement program. Monitor and track the status of identified vulnerabilities and ensure timely resolution. Security Monitoring and Incident Response Leverage Microsoft Defender EDR/XDR and other security tools More ❯
infrastructure. You'll be hands-on, designing, implementing, and managing top-notch security solutions across all our cloud environments. You'll also play a key part in developing our vulnerabilitymanagement program, working closely with our operational support, infrastructure, and development teams. Plus, you'll be right in the thick of security event monitoring, threat intelligence, and incident … management - keeping us one step ahead! What you'll be doing: Delivering SOC Capabilities: You'll be a key team member in delivering ongoing Security Operations Centre (SOC) capabilities for the business. Driving Automation: You'll push for security automation wherever possible and play a big part in evolving our security tooling and services. Policy & Standards: You'll champion … firewalls, WAF, anti-virus, and O365 compliance & security centre . Familiarity with NIST (CSF Framework 2.0), ISO 27001, PCI-DSS, and GDPR . Experience operating and managing SIEM solutions , vulnerabilitymanagement tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and/or SecOps oriented teams More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Circle Group
with a cloud background (AWS, Azure or GCP) is required to join our client's UK cybersecurity team. This in house role is predominantly advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. So you should have good knowledge of security tooling and processes, compliance … and security management (endpoint protection, cloud, SIEM etc). There is an opportunity to build out a cyber security team in the future with this role Skills & Experience Required: 3+ years of experience working in Cyber Security within an cloud environment (AWS, Azure of GCP) Any experience with CrowdStrike/Endpoint Protection would be a bonus Good experience with … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
with a cloud background (AWS, Azure or GCP) is required to join our client's UK cybersecurity team. This in house role is predominantly advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. So you should have good knowledge of security tooling and processes, compliance … and security management (endpoint protection, cloud, SIEM etc). There is an opportunity to build out a cyber security team in the future with this role Skills & Experience Required: 3+ years of experience working in Cyber Security within an cloud environment (AWS, Azure of GCP) Any experience with CrowdStrike/Endpoint Protection would be a bonus Good experience with … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
with a cloud background (AWS, Azure or GCP) is required to join our client's UK cybersecurity team. This in house role is predominantly advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. So you should have good knowledge of security tooling and processes, compliance … and security management (endpoint protection, cloud, SIEM etc). There is an opportunity to build out a cyber security team in the future with this role Skills & Experience Required: 3+ years of experience working in Cyber Security within an cloud environment (AWS, Azure of GCP) Any experience with CrowdStrike/Endpoint Protection would be a bonus Good experience with … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
with a cloud background (AWS, Azure or GCP) is required to join our client's UK cybersecurity team. This in house role is predominantly advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. So you should have good knowledge of security tooling and processes, compliance … and security management (endpoint protection, cloud, SIEM etc). There is an opportunity to build out a cyber security team in the future with this role Skills & Experience Required: 3+ years of experience working in Cyber Security within an cloud environment (AWS, Azure of GCP) Any experience with CrowdStrike/Endpoint Protection would be a bonus Good experience with … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
Merseyside, England, United Kingdom Hybrid / WFH Options
Maxwell Bond
Develop, review, and maintain information security policies and procedures. Manage third-party risk processes and contribute to vendor assurance activities. Align business functions with regulatory and security requirements. Oversee vulnerabilitymanagement efforts in collaboration with IT and SOC teams. Conduct security architecture reviews and evaluate controls for improvement. Support deployment of new security tools and technologies. Provide oversight … We’re Looking For 3+ years in Information Security roles, with GRC and technical exposure. Experience working with ISO 27001, NIST, or equivalent frameworks. Understanding of risk assessment and vulnerabilitymanagement processes. Excellent communication and stakeholder engagement skills. Strategic mindset and ability to lead and mentor. Strong analytical and problem-solving skills. 💼 The Organisation This is a well More ❯
business from hardening and monitoring to governance and incident response Designing and evolving secure architectures using defence in depth and threat modelling principles across cloud, networks and endpoints Driving vulnerabilitymanagement and scaling tooling such as CSPM, SIEM, IAM and endpoint protection to manage risk effectively Contributing to compliance efforts including ISO27001, supplier security and data privacy, helping … and product teams to embed secure thinking into design and delivery Keeping pace with emerging threats and contributing to strategic conversations about how we evolve our approach Experience with vulnerabilitymanagement Experience with scaling tools such as CSPM, SIEM, IAM and Endpoint protection You're hands on, curious and motivated by solving real problems You enjoy working closely More ❯
Architect Location: Leeds, London The Role: We are seeking a proficient Akamai WAF Engineer/Architect with a strong background in web application security, content distribution, and Threat and VulnerabilityManagement, including DDoS protections and implementing change projects within the organization. As a member of the Cyber Security Team, you will collaborate with other cybersecurity professionals across Digital … Key Responsibilities: Deliver security software and configurations utilizing Akamai, GCP, and Azure cloud-native products. Provide and sustain security solutions for our Enterprise and Digital Channels. Oversee DDoS mitigation, vulnerabilitymanagement, and threat intelligence, ensuring that layers 6 and 7 defenses remain proactive against cyber threats. Participate in addressing incidents and threats to Lloyds' cybersecurity to identify strategies … depth knowledge of WAF functionalities and limitations. Provide maintenance support for the DevSecOps pipeline related to automation tasks. Familiarity with IDAM protocols and access control measures for effective WAF management, informed by a robust understanding of web security. Benefits: You will receive a competitive salary, a comprehensive benefits package, training and development opportunities, as well as an engaging career More ❯
Stockport, Lancashire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
systems. Maintain accurate documentation of IT assets and processes. Assist in the planning and implementation of new infrastructure projects. Identify and mitigate potential risks to IT systems and services. Vulnerabilitymanagement system experience such as Rapid 7 Linux patching The Successful Applicant A successful Infrastructure Specialist should have: Experience managing IT infrastructure in the industrial or manufacturing Software … and storage systems. Proficiency in troubleshooting and problem-solving within IT environments. Knowledge of system security best practices and compliance standards. Ability to work collaboratively with cross-functional teams. VulnerabilityManagement system experience such as Rapid 7 Linux patching skills Cloud Infrastructure experience Excellent attention to detail and organisational skills. What's on Offer Competitive salary ranging from More ❯
and work closely with stakeholders to ensure compliance and security best practice across the business. You will also assist with maintaining and improving the company’s accredited Information Security Management System (ISMS), with a particular focus on ISO 27001 and Cyber Essentials Plus requirements. In addition, you will help mentor team members, providing guidance and support to develop their … is considered throughout the entire SDLC. Creates and maintains documentation around the use of cyber security technology in the organisation. Carries out threat detection and incident response. Carries out vulnerabilitymanagement and remediation. Collaborates as needed with third-party security vendors for expert advice and issue resolution. Carries out threat intel research and recommends security improvements. Qualifications Extensive … PHP, MySQL, PostgreSQL, Nginx, Mercurial and Git. Good understanding of cyber security practices in relation to cloud hosting, preferably with experience of AWS. Good understanding of open-source risk management using enterprise management tools. An understanding of Service Management disciplines, ideally using the ITIL framework. Ability to keep up to date with technology trends and to understand More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Techwaka
with stakeholders to maintain compliance with industry standards such as ISO27001, Cyber Essentials Plus, PCI/DSS Stay ahead of cyber threats, maintaining and improving security monitoring and risk management processes Support vulnerabilitymanagement, penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks More ❯
The role involves: Managing, maintaining and upgrading enterprise server and storage hardware Providing internal support for office hardware including, PCs, laptops, mobile devices (Windows OS, iOS, MacOS and Android) Vulnerabilitymanagement using scanning tools such as Nessus Remediation/automation of software rollout using Ninite/PDQ Configuring and monitoring of Anti-virus software & Mobile Device Management Firewall/Switch management - Configuration, patching and upgrading Administering Microsoft Active Directory, Exchange Server & Office 365 Achieving recognised Cyber Security accreditation Management of video conferencing Management of enterprise level phone system Monitoring and managing the availability and scalability of resources, including CPU usage, disk usage and storage systems including network troubleshooting Continuously improving and keeping up More ❯
work as part of a team providing a range of capabilities and may operate across one or more contexts including the following: Hosting environments and landing zone management. Security, management, governance and automation of DfE's centrally managed hosting environments and cloud landing zones. Includes design, build, operate and maintain core cloud computing IT infrastructure services, ensuring that they … and that they continue to meet requirements. Managed infrastructure service. Build, operate & maintain cloud and on-premises infrastructure resources for business applications. Updates and patching, back-up & restore, security vulnerabilitymanagement, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing IT infrastructure products, services or processes … Service (PaaS), and Infrastructure as a Service (IaaS) so that the Department and its partners can embrace the government's Cloud First policy. Create and sustain modern deployment and management standards, practices, and techniques for our cloud resources. Lead, support, coach, and mentor less experienced Infrastructure Engineers in managing, supporting and maintaining the Department's infrastructure. Advocate user-centric More ❯
work as part of a team providing a range of capabilities and may operate across one or more contexts including the following: Hosting environments and landing zone management. Security, management, governance and automation of DfE's centrally managed hosting environments and cloud landing zones. Includes design, build, operate and maintain core cloud computing IT infrastructure services, ensuring that they … and that they continue to meet requirements. Managed infrastructure service. Build, operate & maintain cloud and on-premises infrastructure resources for business applications. Updates and patching, back-up & restore, security vulnerabilitymanagement, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing IT infrastructure products, services or processes … Service (PaaS), and Infrastructure as a Service (IaaS) so that the Department and its partners can embrace the government's Cloud First policy. Create and sustain modern deployment and management standards, practices, and techniques for our cloud resources. Lead, support, coach, and mentor less experienced Infrastructure Engineers in managing, supporting and maintaining the Department's infrastructure. Advocate user-centric More ❯