Vulnerability Management Jobs in the South East

101 to 125 of 153 Vulnerability Management Jobs in the South East

DevSecOps / Application Security Engineer

Woking, England, United Kingdom
JR United Kingdom
DevSecOps pipelines Collaborate with developers to enable secure coding and privacy by design Drive adoption of secure development standards and practices across the org Operate and evolve our software vulnerability management and bug bounty programs Work cross-functionally to identify risks and improve security posture continuously Support cloud-native app and ML security efforts across Azure and AWS More ❯
Posted:

DevSecOps / Application Security Engineer

Reading, England, United Kingdom
JR United Kingdom
DevSecOps pipelines Collaborate with developers to enable secure coding and privacy by design Drive adoption of secure development standards and practices across the org Operate and evolve our software vulnerability management and bug bounty programs Work cross-functionally to identify risks and improve security posture continuously Support cloud-native app and ML security efforts across Azure and AWS More ❯
Posted:

DevSecOps / Application Security Engineer

Portsmouth, England, United Kingdom
JR United Kingdom
DevSecOps pipelines Collaborate with developers to enable secure coding and privacy by design Drive adoption of secure development standards and practices across the org Operate and evolve our software vulnerability management and bug bounty programs Work cross-functionally to identify risks and improve security posture continuously Support cloud-native app and ML security efforts across Azure and AWS More ❯
Posted:

Security Presales & Delivery Architect

Slough, England, United Kingdom
JR United Kingdom
and relationship-building skills, with comfort engaging C-level executives. 5+ years in a similar role selling and delivering technical services across industries. Recognition or certification in areas like vulnerability management, DORA, NIST, XOAR SOC, or similar. A bachelor’s or master’s degree in a relevant field. This is more than a sales role - it’s an More ❯
Posted:

Cyber Security Analyst

Portsmouth, Hampshire, United Kingdom
Deltra group
utilities sector. This is a hands-on role focused on improving cyber posture, ensuring compliance, and protecting critical infrastructure. Key Responsibilities Manage cyber security tools (SIEM, IAM, Threat Intel, Vulnerability Mgmt) Monitor and respond to threats and incidents Support audits and create security policies Align with frameworks like NIST, ISO27001, and CAF/eCAF What You'll Need … years in cyber security roles Experience with SIEM, IAM, and vulnerability tools Familiarity with security frameworks and standards Strong reporting and stakeholder communication skills Perks Up to 6% bonus 27 days holiday + bank hols 15% pension, private medical, life assurance Flexible working, employee perks & more More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Architect - Vulnerability Management

Southampton, England, United Kingdom
Iovendo
Security Architect - Vulnerability Management IOVENDO Southampton, England, United Kingdom Join or sign in to find your next job Join to apply for the Security Architect - Vulnerability Management role at IOVENDO Security Architect - Vulnerability Management IOVENDO Southampton, England, United Kingdom 3 weeks ago Be among the first 25 applicants Join to apply for the Security … Architect - Vulnerability Management role at IOVENDO Get AI-powered advice on this job and more exclusive features. Security Architect Tenable or Qualys BPSS min requirement We are looking for a Security Architect, min requirement is to be BPSS cleared and happy to go through Security Clearance. We need someone with experience of Vulnerability Management solutions such … as Tenable or Qualys with a strong knowledge of network security solutions, ITIL and Service Management all within a Cisco environment. The project is a large-scale network refresh based in Southampton that will be based onsite for the first 4-6 weeks and then revert to 1 day per week in the office. Required Skills And Experience Strong More ❯
Posted:

Cyber Security Consultant

Reading, Berkshire, United Kingdom
WeAreTechWomen
by Three and its partners, ensuring that effective governance and technical assurance can be performed. Maintain and improve the use of artefact templates. Ensure that there is effective capacity management and planning in place for the security services and solutions assigned to you and ensure that the solution is incorporated into the 18-month technical and budget roadmap for … capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue management and the budgeting process. Our people make us who we are. We're a diverse and inclusive bunch, and it's important you can feel you belong here. We value everybody for who they are and what they bring to the … exploit these vulnerabilities Experience in one or more of the following technical domains: Cloud/Hybrid security, Infrastructure and data centre security, Network security, Application security, Identity and access management, Vulnerability Management Expertise in defining and then governing the delivery of security contractual/business outcomes and know how to influence/negotiate technical outcomes with 3rd More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Security Engineer - Hedge Fund - up to £185,000 + bonus

Slough, England, United Kingdom
JR United Kingdom
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerability assessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯
Posted:

Cyber Threat Analyst

South East London, England, United Kingdom
apexanalytix
About Apexanalytix At Apexanalytix, we help some of the world’s largest companies stay ahead of risk. Our Cyber Threat & Vulnerability team provides cutting-edge analysis, monitoring, and intelligence on third-party and supplier cyber threats — helping procurement and risk leaders understand and act on the hidden risks in their extended supply chains. The Opportunity We’re looking for … a rare chance to be part of a tight-knit team tackling real-world threats at scale. What You'll Be Doing Supporting the delivery of threat intelligence and vulnerability assessments for global clients in the form of reports, briefings and alerts. Monitoring threat actor activity, emerging vulnerabilities and cyber trends relevant to third-party risk. Contributing to the … and verbal communication skills and can present findings clearly to non-technical audiences. You thrive in a team but can work independently and take initiative. You’re familiar with vulnerability management concepts, including CVEs, patching, and risk prioritisation. Nice-to-Haves Familiarity with supplier or third-party risk management. Knowledge of cyber threat intelligence frameworks and concepts. Experience More ❯
Posted:

Technical Manager

Portsmouth, England, United Kingdom
Hybrid / WFH Options
GTT
to jointly develop and support viable plans for delivering industry leading solutions on top of standard services and delivering in life support of GTT Enterprise customers. GTT’s Technical Management offering is a consultative, value-add professional services that provides a tailored experience to their client base. As a Technical Manager you will own the technical integrity of a … customer solution, understand the wider context of the solution with the customer and how it aligns with their business, bringing a holistic ITIL based Service Management structure to some of GTT’s most important Managed Customers. At any one time you will work on multiple client accounts and must have the ability to develop and present client solutions to … experience by displaying flexibility, technical excellence, agility, ownership, and responsibility. Becoming an invaluable partner to the client. Monitor industry networking updates, technologies, and best practices to improve overall network management and to remain informed of new technical developments and trends in the industry. Own the customer solution lifecycle from initial customer order onwards, highlighting and managing risks, issues, and More ❯
Posted:

Cyber Security Consultant

Oxfordshire, England, United Kingdom
iO Associates - UK/EU
and compliance status About You 3-5 years of experience in cyber security roles, with hands-on involvement in implementing frameworks like NIST, eCAF, or ISO27001 Experience in SIEM, Vulnerability Management, Threat Intelligence, and IAM tools Background in supporting enterprise-level security initiatives aligned with regulatory or certification standards If you're interested in hearing more about the More ❯
Posted:

ML Ops Engineer

Crawley, Sussex, United Kingdom
Hybrid / WFH Options
Thales Group
with the product owner to address user needs Develop secure and high-quality production code, perform code reviews and able to debug issues Participate in agile threat modelling and vulnerability management Ensure compliance with security and regulatory requirements for MOD and high Design assurance software Develop solutions for where data can bring value to our offers and our … in coordinating the data landscaping and cataloguing for Thales UK Support the Customer Enterprise and Solution Data Architects in the creation and influence of UK MoD standards for Data Management and solutions that support data management and integration Work to implement 3rd party data integrations to support internal and external use cases Working collaboratively with the various squads … PaaS), SOA, APIs, open data, microservices, event-driven IT, predictive analytics, machine learning and artificial intelligence General IT Knowledge (applications, storage, networks, IT infrastructure, Infrastructure, service level agreements, Asset management etc) Familiarity with information management practices, system development life cycle management, IT services management, infrastructure and operations, and EA and ITIL frameworks Technical IT (security, transaction More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Analyst

Chatham, England, United Kingdom
Hybrid / WFH Options
Gravitas Recruitment Group (Global) Ltd
London Salary : £42,000 Benefits: 12% pension contributions, hybrid working, 25 days AL+BH, performance bonus, free on site parking Skills required for this role: Experience working with SIEM solutions Vulnerability management Incident Response Implementing appropriate mediation Understanding of SOC Framework exposure experience (ISO27001, Cyber Essentials, etc) This role gives the right candidate an opportunity to springboard their career More ❯
Posted:

ML Ops Engineer

Crawley, England, United Kingdom
Hybrid / WFH Options
Thales Group
with the product owner to address user needs Develop secure and high-quality production code, perform code reviews and able to debug issues Participate in agile threat modelling and vulnerability management Ensure compliance with security and regulatory requirements for MOD and high Design assurance software Develop solutions for where data can bring value to our offers and our … in coordinating the data landscaping and cataloguing for Thales UK Support the Customer Enterprise and Solution Data Architects in the creation and influence of UK MoD standards for Data Management and solutions that support data management and integration Work to implement 3rd party data integrations to support internal and external use cases Working collaboratively with the various squads … PaaS), SOA, APIs, open data, microservices, event-driven IT, predictive analytics, machine learning and artificial intelligence General IT Knowledge (applications, storage, networks, IT infrastructure, Infrastructure, service level agreements, Asset management etc) Familiarity with information management practices, system development life cycle management, IT services management, infrastructure and operations, and EA and ITIL frameworks Technical IT (security, transaction More ❯
Posted:

Senior Infrastructure Engineer

South East London, England, United Kingdom
Bestman Solutions
to deployment Manage and monitor systems for availability, performance, and security Administer and troubleshoot across Windows Server, Linux, VMware, Azure, and Microsoft 365 Contribute to backup, disaster recovery, and vulnerability management processes Support across 1st, 2nd, and 3rd line tiers — including participation in an on-call rota Maintain clear and up-to-date technical documentation Collaborate with internal More ❯
Posted:

Cyber Security Manager

Slough, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
cyber operations within the organisation. You will be managing a team ensuring all security protocols and procedures are followed meticulously. You will provide strategic recommendation reports to senior management. Vulnerability Management: Manage and update a list of vulnerabilities across the estate, with a critical focus to safeguard data integrity and mitigate risks. Experience required for the Cyber Security More ❯
Posted:

Senior Business Analyst - Cyber Security

Portsmouth, England, United Kingdom
TalentHawk
We are seeking a dynamic and detail-oriented Cyber Security Business Analyst to join our clients team for an OT Asset & Vulnerability Project. This pivotal initiative aims to enhance our operational technology infrastructure by improving asset management and vulnerability processes. The project is preparing to enter the pilot phase in the coming month, followed by a rollout … will involve refining processes, gathering feedback, and driving improvements during the implementation phase. Key Responsibilities Collaborate with stakeholders to define project objectives, scope, and deliverables for the OT Asset & Vulnerability Project. Conduct requirements gathering sessions with users and translate these into detailed functional specifications. Analyze current workflows and identify areas for improvement in asset and vulnerability management … issues proactively. Assist in user onboarding and training activities during the rollout phase. Skills and Qualifications Experience: 10+ years as a Business Analyst, preferably in OT, IT security, or vulnerability management projects. Technical Understanding: Familiarity with operational technology environments, asset management, and vulnerability assessment processes. Analytical Skills: Ability to analyze complex systems, identify gaps, and propose More ❯
Posted:

Unix Infrastructure Specialist

South East London, England, United Kingdom
Xoriant
to remediate security vulnerabilities through the environments. The successful candidate will have a solid background working with Linux Red Hat command line in a Production enterprise environment and security vulnerability management. Operational • Responsible for the security and configuration compliance of the Unix estate. • Maintain, develop, and improve the vulnerability management remediation process. Develop solutions and automated methods … patching events. • Weekend work where required to deliver the required service goals. Experience/essential and desired for successful job performance Essential • Has experience of implementing automation using Configuration Management tools such as Ansible, Chef, Puppet, Salt Stack • Has experience of managing solutions, technologies and processes associated with vulnerability and configuration compliance in a Linux Red Hat/… writing skills. Desired • Has experience working in financial services sector. • Has experience of Qualys, and Ivanti Risk Sense. Qualifications/certifications Essential • Bachelor’s degree or equivalent • Prior IT Vulnerability Remediation experience across business-critical Production infrastructure. More ❯
Posted:

Solution Architect

Milton Keynes, England, United Kingdom
i4 Jobs
initial concept through development and implementation to operation and support. Detailed practical knowledge of IT infrastructure and software development and maintenance methods, tools and techniques. Good appreciation of risk management, change management, configuration management and quality. Has good knowledge of software security and vulnerability management. Experience of Performance and Penetration testing of enterprise software Experience of More ❯
Posted:

Cyber Security Advisory Consultant (Defence)

Slough, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
the following areas: • MoD Security Governance and Assurance: Secure by Design, RMADs, risk assessments • Cyber Operations in MoD: SOC tool evaluation, SIEM use cases, reporting metrics, tech integration • Cyber Vulnerability Investigations • Identity & Access Management: IAM reviews, privileged access, authentication technology, Zero Trust • Operational Technology (OT) Security: OT risk assessments, vulnerability management Key Strengths • Strong attention to More ❯
Posted:

Principal Offensive Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
writing a fuzzer for an undocumented network protocol or the grammar of a new programming language. Other responsibilities includes as below Scope and execute in-depth security assessments and vulnerability research across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to … for self-study, setting and achieving long term goals (for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances are not required, and active … or assisted review with code analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerability management, risk assessments, bug bounty hunting, malware analysis, forensics OSCP, OSWE certification, or interest in achieving certification Experience navigating and working with extremely large codebases is also highly More ❯
Posted:

Lead Modern Workplace Architect

Slough, England, United Kingdom
JR United Kingdom
security teams to ensure all endpoint and identity configurations meet policy and compliance standards. Take ownership of securing client devices, user identities, and collaboration environments. Support incident response and vulnerability management in the digital workplace domain. ? User Enablement Define a workplace enablement strategy, supported by self-service resources, training, and communications. Improve the digital employee experience through simplified … approach to change delivery in fast-paced, PE-owned, or M&A-heavy environments Ability to work from strategic design through to hands-on implementation and troubleshooting Excellent stakeholder management skills at both senior and operational levels Requirements 5+ years in a senior IT workplace, EUC, or modern desktop architecture role Strong track record of Intune + Autopilot deployment … and management Extensive experience with: Entra ID design and rollout Endpoint management and client image design Proven success in leading global teams and collaborating across functions Bonus: Experience in private equity, M&A integrations, or carve-outs Preferred Certifications (or equivalent experience): #J-18808-Ljbffr More ❯
Posted:

Security Architects (DV Security Clearance)

Reading, South East
CGI
knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management and Patching • SIEM principles, products More ❯
Employment Type: Permanent
Posted:

Sr. DevOps Engineer

Slough, England, United Kingdom
JR United Kingdom
critical for our Monetary Analysis, Forecasting, and Modelling activities. The Platform Engineer will focus on creating a self-service, scalable, and reliable platform that streamlines development workflows, simplifies infrastructure management, and enhances overall productivity. This role requires a strong understanding of cloud computing (specifically Azure), infrastructure-as-code (IaC), DevOps practices, containerisation, orchestration, and a passion for building developer … Security & Compliance: Implement security best practices and controls within the platform infrastructure and CI/CD pipelines. Ensure compliance with relevant security standards and regulations. Implement security scanning and vulnerability management processes. Documentation & Support: Develop and maintain comprehensive documentation for the platform, including API documentation, user guides, and troubleshooting guides. Provide support to users of the platform. Collaborate … concepts and security best practices. Excellent problem-solving and troubleshooting skills. Strong communication and collaboration skills. Experience with Azure Databricks and its integration with platform tooling. Experience with configuration management tools like Ansible, Puppet, or Chef. Experience building and maintaining internal developer platforms. Experience working in a regulated industry (e.g., financial services). #J-18808-Ljbffr More ❯
Posted:

Cyber Security Consultant

South East London, England, United Kingdom
Hybrid / WFH Options
Searchability®
Cyber Essentials Plus assessments, including practical remediation support (certification as a Cyber Essentials Plus Assessor or similar qualifications with the intention to certify is highly advantageous) Practical experience conducting vulnerability assessments across infrastructure, networks, and applications Working knowledge of threat and vulnerability management platforms such as Qualys Strong written and verbal communication skills, with the ability to More ❯
Posted:
Vulnerability Management
the South East
10th Percentile
£42,600
25th Percentile
£49,500
Median
£55,000
75th Percentile
£58,750
90th Percentile
£81,750