3 of 3 Remote/Hybrid Vulnerability Management Jobs in Reading

Risk & Assurance Manager - IT & Cyber

Hiring Organisation
Audit & Risk Recruitment
Location
Reading, Berkshire, UK
Employment Type
Full-time
Information Security risk landscape. Reporting directly to the Head of Risk and Assurance, you will play a key role in embedding effective risk management practices across the company's technology and cybersecurity domains. As a Risk & Assurance Manager, you'll be responsible for and have ownership for: Partnering with … senior IT, Security, and business leaders to embed risk management practices into operational processes and strategic initiatives. Owning and maintaining IT Risk and Control Matrices (RCMs), ensuring they remain current, comprehensive, and aligned with industry standards and audit expectations. Reviewing effectiveness of first line functions in testing and validation ...

Product Owner - Cloud & SaaS Platform & Security SPOC

Hiring Organisation
Ipsotek, an Eviden business
Location
Reading, Berkshire, UK
Employment Type
Full-time
scaling secure cloud-native/SaaS platforms. Strong understanding of: Cloud architectures (AWS, Azure, GCP) Microservices, containers, CI/CD pipelines Secure SDLC and vulnerability management Experience coordinating penetration tests and working with CISOs/security leadership. Familiarity with compliance frameworks (ISO 27001, SOC2, GDPR). Preferred Skills … Excellent communication and stakeholder management skills. Ability to translate technical concepts for non-technical audiences. Strong organizational skills to manage multiple streams (product, security, compliance). Agile mindset with experience in scrum or kanban delivery. Key Attributes Visionary & pragmatic: Sets bold goals while delivering incremental value. Customer-focused: Prioritizes ...

Presales Engineer - Cyber Security

Hiring Organisation
Areti Group | B Corp™
Location
Reading, England, United Kingdom
client-facing role. Ideal Background: Proven experience in cyber security design, architecture, or consultancy. Hands-on expertise across domains such as SIEM, SOAR, EDR, Vulnerability Management, WAF, IDAM , and Cloud Security . Strong understanding of vendor technologies (e.g., Fortinet, Palo Alto, Juniper ). Excellent communication and stakeholder engagement ...