Vulnerability Management Jobs in the South East

26 to 50 of 81 Vulnerability Management Jobs in the South East

IT Infrastructure Engineer

london, south east england, United Kingdom
identifi Global Resources
to leverage your skills and make positive impact? We are looking for an experienced IT professional to join during the transition of legacy case management systems to modern, cloud-based solutions. Your role will focus on maintaining and supporting on prem legacy systems during ongoing transformation to cloud-based … support. Therefore we are looking for all-arounder, with good SQL knowledge. What You Will Do Provide expert support and maintenance for legacy case management systems (Extranet, CMS, DTS, EKS2, and ADMS) in collaboration with the IT teams. Ensure the legacy systems continue to run smoothly during the transition … patches, and general system maintenance for both legacy and cloud-based systems. What do you need to be successful? Strong experience in SQL server management and replication. Experience in writing and optimising SQL scripts for system management and troubleshooting. Strong knowledge of SharePoint (on-premise & cloud). Experience More ❯
Posted:

Cyber Security Analyst

london (city of london), south east england, United Kingdom
Hybrid / WFH Options
Sarafin Partners
their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in … accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities … Collating security incident and event data to produce monthly exception and management reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and, where appropriate, resolving or escalating reported security incidents Monitoring More ❯
Posted:

IT Security Analyst

london, south east england, United Kingdom
Centre People Appointments
required physical, technical, and administrative controls as set out in the Group IT Governance Rules. The ideal candidate should have extensive security knowledge, project management skills, and excellent communication abilities. An understanding of Japanese culture and some Japanese skill would be advantageous. -------------------------------------- ELIGIBLE APPLICANTS: (O) Eligible visa: Permanent residence … infrastructure • Streamline operational processes and propose improvements • Support for implementing required physical, technical, and administrative controls • Design and propose security outsourcing services (e.g., ID management, network diagram maintenance, vulnerability management, EoL management) for overseas branches and subsidiaries 3.Legal Compliance & Regulatory Requirements • Ensure adherence to relevant European … regulations (e.g., NIS2, EU AI Act) • Oversee necessary documentation, reporting, and audit coordination 4. Communication & Relationship Management • Facilitate effective communication with both domestic and international stakeholders, including managing time zone and language challenges • Collaborate with team members and internal/external partners to achieve objectives IT Security Analyst Ideal More ❯
Posted:

Junior SOC Analyst

Farnborough, Hampshire, United Kingdom
Sixworks
established playbooks Escalating complex incidents to Tier 2 Incident Response Teams Reviewing and developing security controls in a growing technical environment Triaging and reviewing vulnerability scanning reports, providing feedback to technical teams Reviewing secure configurations and feeding back for remediations Generating recurring security reports for stakeholders Providing feedback for … a degree in Cyber Security, Computer Science, Networks, etc. Professional qualifications from organizations like CompTIA, ISACA, etc. Technical qualifications such as cloud computing, SIEM, vulnerability management, etc. Experience (Nice to have) Understanding of concepts like cloud computing, incident management, risk management, information security (CIA), phishing, ransomware … and skilled IT professionals, committed to digital innovation. We excel in areas like Secure-by-Design, cloud computing, network design, rapid application development, cyber vulnerability mitigation, and intelligence systems. We offer independent consultancy and champion open-source technologies. A word on UK Security Clearance Due to the secure nature More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Governance, Risk and Assurance Specialist

london, south east england, United Kingdom
Hybrid / WFH Options
CLS Group
in which everyone is encouraged to be open and forward-thinking. Job information: Functional title - AVP, IT Security Specialist Department – Security Governance and Risk Management Corporate level – Associate Vice President Report to – Director of Security Location - London, onsite 2 days per week About the role: The individual will be … consultation on remediation approaches to address gaps and continue ongoing monitoring of remediation, re-assess until reduced to an acceptable level. Supporting Cybersecurity Risk Management strategies based on security findings and observations. Including informing improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all … written communication skills to convey complex technical information clearly and effectively. Presenting data insights to non-technical stakeholders Base level understanding of security risk management and taxonomy principles, to reduce risk to an acceptable level. Knowledge of vulnerability management and incident management practices. Ability to learn More ❯
Posted:

Security Architects (DV Security Clearance)

Reading, South East
CGI
frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management More ❯
Employment Type: Permanent
Posted:

GRC Lead

london, south east england, United Kingdom
BGC Group
risk, ensuring compliance with regulatory requirements, and maintaining corporate controls. This role will be primarily responsible for leading efforts related to third-party risk management, client due diligence, awareness training, and regulatory compliance. The ideal candidate will have a strong grasp of cybersecurity threats and hands-on experience. Key … Responsibilities Governance Risk and Compliance Advise project teams, application owners, infrastructure services, and other IT teams on information security controls, such as access management, incident handling, business continuity, system development lifecycle, threat and vulnerability management, and data protection. Identify and manage risks and vulnerabilities, providing strategic mitigation … recommendations. Continuously improve policies and procedures related to controls and operational processes. Develop and deliver precise and timely metrics and reports. Third-Party Risk Management: Conduct risk assessments of new and existing third-party vendors to ensure compliance with company policies and regulatory requirements. This includes reviewing security controls More ❯
Posted:

Cyber Security Lead

london, south east england, United Kingdom
Ant International
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … on vulnerability management , endpoint security (EDR/XDR) , and cloud compliance . Good understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged access management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and More ❯
Posted:

Information Security Analyst - Audit, Compliance & Cybersecurity

Southampton, Hampshire, United Kingdom
Hybrid / WFH Options
NICE
response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits. Gap Assessments: Facilitate and/or conduct internal … Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security … the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. Vulnerability Management: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Consultant

Dartford, Kent, United Kingdom
Goaco Ltd
across various platforms. The consultant will play a critical role in evaluating and strengthening our clients' cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with … develop, document, and implement security policies, standards, and guidelines aligned with industry standards (e.g., ISO 27001, NIST). Assist in the deployment, configuration, and management of security infrastructure and technologies, including firewalls, intrusion detection/prevention systems, and secure network architectures. Provide guidance and support on Azure security practices … including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerability management, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Manager

london, south east england, United Kingdom
TXM Recruit
for security breaches, and responding to incidents. They also work to educate employees on best practices for information security. Main Responsibilities Security Implementation and Management Deploy and optimise security solutions to safeguard IT services and infrastructure. Lead security assessments including vulnerability testing and risk analysis to identify and … and effective action. Develop comprehensive incident response plans to maintain organisational resilience against threats. Oversee operational security processes with tools like SIEM, EDR, and Vulnerability Management, continuously enhancing capabilities. Network and System Security Manage advanced security tools such as firewalls and IDS/IPS to protect network integrity. … organisation. Cloud and Application Security Enhance the security of cloud services (SaaS, PaaS, IaaS) and enterprise applications through advanced security measures and identity access management (IAM). Education & Competencies University Degree or equivalent preferred A minimum of 3 years' experience in a similar role. Strong and demonstrable experience of More ❯
Posted:

Cyber Security Engineer

Stroud, south east england, United Kingdom
Hybrid / WFH Options
Ecotricity
Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Linux Operating Systems On-Premise Active Directory Networking - Cisco/Fortigate Penetration Testing & Vulnerability Management Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate for this … be working towards a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (ie. NIST or Cyber Security Essentials). Knowledge of vulnerability databases (ie. NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tooling. Experience using Code Security scanning More ❯
Posted:

Security Engineer [UAE Based]

london, south east england, United Kingdom
AI71
Response: Monitor and analyze security events to detect potential threats or breaches. Respond to security incidents, conduct root cause analysis, and implement corrective actions. Vulnerability Management: Perform regular security assessments, including penetration testing and vulnerability scanning. Collaborate with development teams to address vulnerabilities and enforce remediation timelines. … or a similar role. Strong understanding of security principles, cryptography, and network protocols. Hands-on experience with security tools (e.g., SIEM, IDS/IPS, vulnerability scanners). Familiarity with cloud platforms (e.g., AWS, Azure, GCP) and their security frameworks. Knowledge of secure coding practices and common vulnerabilities (e.g., OWASP More ❯
Posted:

Cyber Engineer

Farnborough, Hampshire, United Kingdom
Hybrid / WFH Options
Thebusinessyear
expertise and strategic planning to prevent attacks and vulnerabilities. Your responsibilities include planning and implementing security controls to safeguard information. Key functions/outputs: Vulnerability Scanning & Reporting Change Work Participation in Regular Meetings Documentation Main Objectives: Vulnerability Scanning & Reporting Conduct regular vulnerability scans, generate reports, and ensure … tools are current to identify system weaknesses. Perform code scans, vulnerability management scans, and assist in reporting to the cyber security team. Update endpoint protection, ensure antivirus and anti-malware are current, and audit network controls and access permissions. Recognize and respond to potential incidents, including containment and … SITT and perform security testing and assurance activities during planning phases. Participation in Regular Meetings: Lead or attend meetings such as Security Working Groups, Vulnerability Triage, Security Workshops, PI Planning, and Daily Standups, providing cybersecurity input. Documentation: Create and maintain detailed security documentation including design documents, SOPs, and compliance More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SOC Analyst

Andover, Hampshire, United Kingdom
Hybrid / WFH Options
Deloitte - Recruitment
SOC SIEM tool. Focus on insider threat and Data Loss Prevention use case to demonstrate the process used by SOC analysts. Cyber Security Incident Management Plan (SIMP) - Develop the Cyber Incident Response Plan in line with NIST and SANS guidance and incorporating the wider teams. Create supporting documentation and … Review existing documentation for the SOC BCDR and develop process/plan that feeds into the wider process. Cyber Incident Investigation/Escalation - Reviewing vulnerability event channels and identifying issues for escalation to different teams. Training and development - Mentor existing SOC team and develop playbooks and training and development … and potential future requirements for this requirement: Strong knowledge of Cyber Security, with a focus on operational security, such as security monitoring and alerting, vulnerability management and incident response. Producing supporting security documentation in coordination with stakeholders. A good all-round knowledge of IT systems and Networking. Experienced More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer - Financial Services - up to £185,000 + bonus

london, south east england, United Kingdom
Hunter Bond
some of the brightest minds in the industry. Desired Experience (full job spec available): 5+ years experience in a technical security role Experience in vulnerability assessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate More ❯
Posted:

Sr. Technical Support Engineer, Focused Services

london, south east england, United Kingdom
Palo Alto Networks
deploy and manage cloud environments and integrate technologies that are part of customer stacks, to accurately replicate and resolve customer issues Knowledge of SIEM, vulnerability management tools, firewalls, malware, exploits, operating system structure and behavior Strong consulting and project management skills, with validated results working as a More ❯
Posted:

Senior Infrastructure Engineer

london (battersea), south east england, United Kingdom
Databarracks
can make a genuine impact on customers’ data security and business continuity, then keep reading. The Role: What You’ll Do Here: - Azure Infrastructure Management: Design, deploy, and manage scalable Azure-based infrastructure services including IaaS, PaaS, networking, and security components. - Virtualisation VMware & Hyper-v. Management of environments … Compliance: Implement and maintain infrastructure security policies and controls aligned with industry standards (e.g., ISO 27001, NIST, CIS). Collaborate with InfoSec teams on vulnerability management and risk mitigation. - Infrastructure Automation & Optimization: Automate infrastructure deployment and configuration using tools such as PowerShell, ARM templates, or Terraform. Drive continuous More ❯
Posted:

Senior DevOps Engineer [UAE Based]

london, south east england, United Kingdom
AI71
Loki, ELK, OpenTelemetry). Define SLOs/SLA dashboards; lead incident response, root‑cause analysis, and post‑mortems. Security & Compliance Embed DevSecOps practices—secrets management, container image hardening, zero‑trust networking, vulnerability management, and compliance automation (ISO 27001, SOC 2). Collaborate with ML/AI Teams More ❯
Posted:

Cyber Security Manager

High Wycombe, England, United Kingdom
McGregor Boyall
SOC) , with one analyst reporting to you Oversee incident response , manage security incidents from detection to resolution Work closely with the compliance manager on vulnerability management Architect secure solutions, validate baseline configurations, and recommend improvements to stay compliant Collaborate with key stakeholders including Compliance and Infrastructure teams Required More ❯
Posted:

Infrastructure & Security Engineer

london, south east england, United Kingdom
Hybrid / WFH Options
Totum Partners
from a legal or financial environment. Hands-on technical skills in the following; MS Defender, Azure Security Centre, Intune, Entra ID, CrowdStrike, Azure, M365, Vulnerability Management, PowerShell, SIEM Solutions & an understanding of ISO27001. Any Azure or Security certification would be desirable. This role offers hybrid working - 2 days More ❯
Posted:

Security Engineer – ForgeRock

london, south east england, United Kingdom
Hybrid / WFH Options
JCW
with ForgeRock IAM stack : PingGateway, PingAM, PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetration testing , threat modeling, and vulnerability management Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO More ❯
Posted:

Senior Cyber Security Analyst - Microsoft Security Stack

london, south east england, United Kingdom
Harrington Starr
all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerability management (tenable is tool used) and patching More ❯
Posted:

Security Engineer

Portsmouth, Hampshire, United Kingdom
Hybrid / WFH Options
G2 Ops, Inc
plus benefits Openings: 2 Full-Time Roles Knowledge Requirements: Understanding of C4ISR architectures and information-assurance principles Familiarity with DoD Risk Management Framework (RMF) and accreditation processes Experience with system and network security analysis on NIPRNet, SIPRNet, etc. Knowledge of DoD 8570.01-M IAT requirements Proficiency with cybersecurity tools … a motivated, team-oriented Information Systems Security Engineer to work on cybersecurity governance, risk, and compliance, supporting DoD projects involving security controls, risk assessments, vulnerability management, cloud security, policy development, and system analysis. Must have or be eligible for a DoD Secret clearance and IA Technical II certification More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Information Security Analyst

Kings Hill, Kent, United Kingdom
Pearson Whiffin Recruitment Ltd
Information Security Analyst working as part of a central team supporting a mixture of security operations ensuring compliance with business needs. This will involve vulnerability management, making sure security controls are functioning, mentorship of more junior members and working as part of a 24 x 7 remote support More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Vulnerability Management
the South East
10th Percentile
£42,100
25th Percentile
£49,000
Median
£55,000
75th Percentile
£60,000
90th Percentile
£93,250