Vulnerability Management Jobs in the North of England

1 to 25 of 48 Vulnerability Management Jobs in the North of England

Vulnerability Management Governance Lead

Knutsford, Cheshire, United Kingdom
OptiRoi Media
Step into the role of a Vulnerability Management Governance Lead where you'll spearhead the evolution of our digital landscape, driving innovation and excellence. To be successful as a Vulnerability Management Governance Lead , you should have experience with: Ability to lead colleagues in an operational cyber … on time Keen knowledge of risk and controls frameworks in a global financial institution Some other highly valued skills include: Knowledge/experience of vulnerability management Strong powers of communication, with an ability to take complex topics and explain them simply to non-technical audiences Ability to process … risk-based approach to prioritise them, and to drive effective remediation activity. Accountabilities Allocation of the correct risk rating and remediation prioritisation to a vulnerability based on industry standards for assessment, available threat intelligence concerning exploitation, the reachability of the host (or asset) and the value of the service More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cloud Security Consultant

Manchester, North West, United Kingdom
Circle Group
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerability management and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerability management & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerability management & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
Employment Type: Permanent
Salary: £65,000
Posted:

Cloud Security Consultant - AWS - Manchester

Manchester, North West, United Kingdom
Circle Group
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerability management and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerability management & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerability management & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
Employment Type: Permanent
Salary: £65,000
Posted:

Information Security Analyst

runcorn, north west england, United Kingdom
Hybrid / WFH Options
Swissport
detect, investigate, and address insecure features and malicious activity across Swissport’s networks and infrastructure. Run security controls such as email security gateway and vulnerability management systems. As well as contributing to user awareness and training throughout Swissport. Job Responsibilities: Monitoring, investigating, and responding to security alerts, including … and EDR platforms. Managing and fine-tunning email security gateways, reviewing quarantined messages and adjusting rules to reduce false positives. Supporting the organisation’s vulnerability management process, from detection through to tracking remediation. Assisting with cyber risk assessments for new software and services. Conducting phishing simulations and analyse … involving security operations, system/network monitoring, or incident response. Familiarity with core information security concepts, such as email security, endpoint detection and response, vulnerability management, and SIEM. Understanding of at least one information security framework (e.g., ISO 27001, NIST) and general awareness of regulations such as GDPR. More ❯
Posted:

Risk and control Business analyst

sheffield, south yorkshire, yorkshire and the humber, United Kingdom
Hybrid / WFH Options
HOK Consulting - Technical Recruitment Consultancy
strong background in risk and controls, resilience, and production services compliance. The ideal candidate will have hands-on experience in performance and regression testing, vulnerability management, and serve as a system analyst ensuring technical solutions meet control, security, and stability requirements. Key Responsibilities: Act as a liaison between … implementation and monitoring of resilience strategies across key applications. Lead and coordinate performance and regression testing activities for new and existing systems. Assist with vulnerability management by working with security teams to identify, track, and remediate risks. Analyse current systems and processes to identify improvements aligned with control … disaster recovery, and business continuity. Strong background in performance and regression testing – understanding of tools like JMeter, LoadRunner, etc. is a plus. Familiarity with vulnerability management tools and concepts (e.g., Qualys, Nessus, CVE tracking). More ❯
Posted:

Cyber Threat and Vulnerability Lead

Leeds, England, United Kingdom
Anson McCade
Are you ready to lead in one of the most critical roles in the cybersecurity industry? We are seeking a Cyber Threat Intelligence and Vulnerability Lead to play a pivotal role in the operation and improvement of a Security Operations Centre (SOC) dedicated to safeguarding a major UK organisation. … an opportunity to make a tangible impact in protecting the systems that power the nation. About the Role As the Cyber Threat Intelligence and Vulnerability Lead, you will: Take accountability for detecting, triaging, and reporting potential cyber threats and key vulnerabilities daily. Oversee the delivery and quality of all … threat intelligence and vulnerability products, ensuring deadlines are met with excellence. Develop and continuously review tailored Priority Intelligence Requirements (PIRs) and collection plans to align intelligence products with client needs. Provide in-depth analysis, context, and predictive insights to support threat mitigation. Assess and enhance the maturity of the More ❯
Posted:

Cyber Threat Intelligence and Vulnerability Lead

Leeds, UK
uk7 UTC
data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Cyber Threat Intelligence and Vulnerability Lead Job Title: Cyber Threat Intelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to … key vulnerabilities are detected, triaged and reported on daily Accountable for all regular reporting and ensuring the efficient delivery of all threat intelligence and vulnerability products by their respective deadlines Where there is not established schedule for a product the lead is responsible for ensuring that an achievable deadline … of both to ensure that the intelligence products are relevant to the client's interests Accountable for the quality of all Threat Intelligence and Vulnerability Reports, ensuring that when a product is delivered it is at the highest possible standard Accountable for ensuring that all relevant process are effectively More ❯
Posted:

Threat Intelligence Analyst

Leeds, Yorkshire, United Kingdom
BAE Systems (New)
data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Cyber Threat Intelligence and Vulnerability Lead Job Title: Cyber Threat Intelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to … key vulnerabilities are detected, triaged and reported on daily. Accountable for all regular reporting and ensuring the efficient delivery of all threat intelligence and vulnerability products by their respective deadlines. Where there is not established schedule for a product, the lead is responsible for ensuring that an achievable deadline … of both to ensure that the intelligence products are relevant to the client's interests. Accountable for the quality of all Threat Intelligence and Vulnerability Reports, ensuring that when a product is delivered it is at the highest possible standard. Accountable for ensuring that all relevant processes are effectively More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Chief Information Security Officer Leeds

Leeds, Yorkshire, United Kingdom
Hybrid / WFH Options
Radar Healthcare
and ensuring everyone understands their role in protecting our organisation. Leading from the front, you will champion a security conscious culture of proactive risk management and practical compliance to deliver meaningful and sustainable security improvements aligned to our strategic ambitions. What you'll be doing to make a difference … everyday processes. Oversee the security posture of cloud environments, ensuring secure configurations, proactive threat monitoring, and resilience planning. Establish and maintain a robust risk management framework, proactively identifying, assessing, and mitigating cybersecurity risks in alignment with business goals. Define standards for operational security including vulnerability management, incident … . Demonstrated experience conducting security due diligence and managing integrations in acquisitions. A proven track record of building and embedding security awareness and risk management frameworks across business and technical teams. Strong operational experience, including establishing and managing incident response, vulnerability management, and security monitoring programs. Ability More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Specialist

Manchester Area, United Kingdom
SearchWorks
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 … Information Security Management System. Ensure cyber security compliance with company policies, standards, and obligations. What You'll Need to Succeed: 2 years + Experience in a cyber-security role Working knowledge of technical and cyber security standards Working knowledge of industry best practices (such as NIST Framework, OWASP top … ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to the ISO27001 standard Cloud More ❯
Posted:

Vulnerability Analyst (OT)

Portsmouth, yorkshire and the humber, United Kingdom
Hybrid / WFH Options
TRIA
We’re working with a leading organisation in critical infrastructure that is looking for a Vulnerability Analyst (OT) to join their team. This is a fantastic opportunity to contribute to the security of Operational Technology (OT) environments , helping to safeguard essential services. The Role: Our client is looking for … someone to: Conduct vulnerability assessments across OT environments to identify security risks. Work closely with internal teams to develop and implement risk mitigation strategies. Monitor and assess emerging threats impacting critical infrastructure . Provide expert guidance on best practices for OT security and compliance. Travel once per quarter to … the South of England for team collaboration. What We’re Looking For: Some hands-on experience in OT security or vulnerability management – this could be from working with ICS/SCADA environments, network security, or cyber risk management in OT. A strong understanding of OT vulnerabilities and More ❯
Posted:

Senior IT Auditor, Network & Cybersecurity

Chester, Cheshire, United Kingdom
Oliver James Associates Ltd
complex technology audits focused on cloud environments (especially AWS), cybersecurity programs, network security, and enterprise applications. Evaluate cloud infrastructure controls, architecture risks, and configuration management within AWS environments, identifying gaps and control weaknesses. Conduct assessments of cybersecurity frameworks, including access management, vulnerability management, incident response, and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Systems Engineer

Leeds, England, United Kingdom
identifi Global Resources
to leverage your skills and make positive impact? We are looking for an experienced IT professional to join during the transition of legacy case management systems to modern, cloud-based solutions. Your role will focus on maintaining and supporting on prem legacy systems during ongoing transformation to cloud-based … support. Therefore we are looking for all-arounder, with good SQL knowledge. What You Will Do Provide expert support and maintenance for legacy case management systems (Extranet, CMS, DTS, EKS2, and ADMS) in collaboration with the IT teams. Ensure the legacy systems continue to run smoothly during the transition … patches, and general system maintenance for both legacy and cloud-based systems. What do you need to be successful? Strong experience in SQL server management and replication. Experience in writing and optimising SQL scripts for system management and troubleshooting. Strong knowledge of SharePoint (on-premise & cloud). Experience More ❯
Posted:

IT Infrastructure Engineer

leeds, west yorkshire, yorkshire and the humber, united kingdom
identifi Global Resources
to leverage your skills and make positive impact? We are looking for an experienced IT professional to join during the transition of legacy case management systems to modern, cloud-based solutions. Your role will focus on maintaining and supporting on prem legacy systems during ongoing transformation to cloud-based … support. Therefore we are looking for all-arounder, with good SQL knowledge. What You Will Do Provide expert support and maintenance for legacy case management systems (Extranet, CMS, DTS, EKS2, and ADMS) in collaboration with the IT teams. Ensure the legacy systems continue to run smoothly during the transition … patches, and general system maintenance for both legacy and cloud-based systems. What do you need to be successful? Strong experience in SQL server management and replication. Experience in writing and optimising SQL scripts for system management and troubleshooting. Strong knowledge of SharePoint (on-premise & cloud). Experience More ❯
Posted:

Cyber Audit AVP

Knutsford, Cheshire, United Kingdom
Barclays
as a Cyber Audit AVP where you will collaborate with cross-functional teams to provide independent and reliable Cyber Security audit assurance to executive management and the Board on governance, risk management, and control effectiveness. In this role, you will contribute to audit planning and execution, risk assessment … covering Cyber Security. Experience in developing and executing assurance testing approaches in areas such as data security, security configuration, network security, cyber incident response, vulnerability management, cyber threat management, information risk management, data leakage protection, identity & access management, cyber resilience. Knowledge of emerging technology, cyber More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Head of SOC

Manchester OR Hertfordshire - Hybrid, Manchester, England
Hybrid / WFH Options
InfraView
leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a "people manager" as well … business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerability management, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and … SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerability management tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials More ❯
Employment Type: Permanent
Posted:

Deputy CISO

Manchester, United Kingdom
Hays Technology
Assistant CISO will play a key role in rewriting and implementing information security standards, collaborating with key stakeholders to ensure alignment with organisational risk management practices, and fostering a proactive security culture across the company.As a key partner to the CISO, this role involves both strategic thinking and practical … industry best practices and align with legal, regulatory, and organisational requirements. Develop and implement guidelines for adherence to these standards across the company. Policy Management: Work closely with the CISO and other security leaders to create, update, and enforce information security policies. Ensure that security policies are effectively communicated … threats and vulnerabilities, and support JRC members in decision-making processes. Hands-On Security Experience: Take an active role in the day-to-day management of security operations, including incident response, threat hunting, vulnerability management, and other proactive measures. Provide expertise in implementing technical security solutions and More ❯
Employment Type: Contract
Rate: £700 - £750/day 700-750 per day
Posted:

Security Engineer

Manchester, Lancashire, United Kingdom
Hybrid / WFH Options
The MRJ Group
policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and controls … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory … a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Engineer

Leeds, West Yorkshire, United Kingdom
Elevate Technology Group Ltd
make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly … Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security … global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Employment Type: Permanent
Salary: £55000 - £70000/annum
Posted:

Associate Cyber Security Analyst Aspire Technology Solutions

Gateshead, Tyne And Wear, United Kingdom
CyberNorth
day-to-day operations of our Security Operations Centre. This role is varied to support your continuous development and will include security alert investigation, vulnerability reporting, carrying out support tasks, and engaging with third parties. You will be customer-focused and play a key role in ensuring the security … determine incident severity. Threat Analysis: Stay updated on threat intelligence and integrate it into operations. Continuous Learning: Engage in ongoing learning and professional development. Vulnerability Management: Support vulnerability scans and report generation. Collaboration: Collaborate with team members and participate in meetings. Communication: Answer customer calls in a More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Infrastructure Engineer

manchester, north west england, United Kingdom
Stelvio Group
Act as a key liaison between internal stakeholders, managed service providers, and external vendors to ensure operational continuity and alignment with business objectives. Infrastructure Management Oversee the day-to-day performance and availability of core infrastructure systems, including networks, servers, storage, and cloud services. Monitor infrastructure platforms proactively to … units. Service Operations & Technical Support Provide third-line support across infrastructure layers, supporting internal users and IT service desk teams. Maintain and enforce access management protocols for infrastructure components and enterprise applications. Lead incident resolution efforts involving infrastructure systems, ensuring timely escalation to third-party experts when required. Vendor … enhance Microsoft 365 security posture across the organization. Manage the configuration and policy enforcement of Microsoft Intune, including compliance and device security baselines. Oversee vulnerability management and endpoint patching activities in partnership with external security consultancies. Administer firewall configurations and ensure consistent deployment across all locations and platforms. More ❯
Posted:

Cybersecurity Engineer

York, Yorkshire, United Kingdom
Darkshield Technologies Ltd
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead … clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits … regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

GRC Policy and Governance Lead

Bury, Lancashire, United Kingdom
JD Sports Fashion
complex organisation, trading globally within a constantly evolving IT and information security threat environment. Impact of Role Implement governance framework to enable enforcement and management of IT and cyber policies across all JD entities. Help drive good security hygiene and the use of appropriate controls into the business culture … role resides in the Information Security Function and reports to the Global Head of Governance, Risk and Compliance. Direct Reports Individual contributor with possible management of a GRC Analyst and periodic oversight of seconded resources, contingent workers and systems integrators. Key Elements of the Role The job holder will … a company-wide consistent set of policies and standards used across all entities. Implement and maintain a robust policy development lifecycle ensuring effective policy management and review in line with compliance and technological advancements and changes. Analyse incidents and events to identify omissions and opportunities for improvement in accordance More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Security Operations Engineer

Darwen, Lancashire, United Kingdom
Hakim Group
technologies (firewalls, IDS/IPS, SIEM, etc.). Experience with security tools such as SIEM/SOAR platforms, endpoint detection and response (EDR) solutions, vulnerability management, detection and response/remediation (VMDR) solutions and threat intelligence platforms. Knowledge of security standards and frameworks (e.g., NIST, CIS Controls, ISO More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Center Analyst

york, yorkshire and the humber, United Kingdom
Hybrid / WFH Options
Investigo
phishing emails and other security events. Use Endpoint Detection and Response (EDR) tools to examine endpoint and respond to cyber threats and malware. Undertake vulnerability management including identifying and risk assessing vulnerabilities on any IT infrastructure. Reporting and tracking vulnerabilities through to mitigation. Conduct security administrator activities across … the Microsoft 365 stack including but not limited to configuration and change management of security tools. Be responsible for managing changes to security tools adhering to Persimmon IT change management policy. Conduct reviews of existing IT Infrastructure such as firewall ruleset reviews advising on where risks might exist. More ❯
Posted:
Vulnerability Management
the North of England
10th Percentile
£32,500
25th Percentile
£43,500
Median
£60,000
75th Percentile
£77,500
90th Percentile
£85,000