Worthing, West Sussex, England, United Kingdom Hybrid / WFH Options
VIQU IT Recruitment
Vulnerability Analyst – 6 Months – Remote - Qualys A client is seeking a Vulnerability analyst/Patching Engineer to help tackle a critical security backlog across 2,700 devices. This is a hands-on contract role focused on patching end users and security remediation to ensure systems are up to date and secure. Key Skills of the Vulnerability Analyst … Strong experience in vulnerability management and patching within enterprise environments. Hands-on experience with Qualys for vulnerabilityscanning and reporting. Solid Windows 10/11 expertise with a focus on security hardening and patching. Proficient with SCCM is beneficial but not necessary. Excellent documentation skills. Strong verbal and written communication skills. Responsibilities of the Vulnerability Analyst … end patching for end user devices. Support and transfer knowledge of Qualys alerts and patching workflows. Ensure all systems run on the latest and most secure versions. The successful Vulnerability t Analyst will be working remotely however may require occasional ad hoc travel to Worthing. Apply now to speak with VIQU IT in confidence. Or reach out to Matt More ❯
automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript More ❯
automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript More ❯
Cyber Security Engineer CyberSec Engineer/IT Security Specialist – Disaster Recovery, Resilience Testing, CyberSec Improvements, VulnerabilityScanning/Management, Infrastructure, Nutanix, Commvault, VMware, Azure, PowerShell, Python; Law Firm, Permanent, London/Hybrid (3/2). £80k - £95k (On Experience) +Bonus +Benefits Global Low Firm seeks experienced Cyber Security Engineer/IT Security Specialist to join the IT … infrastructure tooling and at least one scripting language (PowerShell or Python preferred). Experience with Nutanix, VMware, Commvault, and hybrid cloud platforms Azure (preferred), AWS or GCP. Understanding of vulnerability management, monitoring, and orchestration tools. Relevant certifications such as Microsoft SC-200, Certified Ethical Hacker (CEH), CBCP/CBCI or equivalent. We are open to receiving applications from across More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerabilityscanning Data Loss Prevention (DLP) Candidate Profile Proven experience delivering large-scale cyber and information security programmes Strong hands-on background in cyber security and technical delivery Deep More ❯
for the MSP's own security posture ensuring tools, processes, and teams meet the same standards we deliver to clients. They monitor measurable posture metrics (e.g., Microsoft Secure Score, Vulnerability etc.), ensure continuous improvement, and keep the MSP's security practice relevant through ongoing training, certifications, and emerging threat awareness. While day-to-day execution is delegated to Security … the Security Lead owns security end-to-end: identifying risks, embedding controls, and ensuring compliance is demonstrable. Key Responsibilities Client-Facing Lead Quarterly Security Reviews (QSRs), presenting patch/vulnerability posture, incidents, compliance status, and risk register updates. Translate technical security risks into clear business impact and outcomes. Own the client exception process, ensuring risks are documented, communicated, and … escalation point for clients when risks require senior involvement. Internal MSP Security Own the MSP's internal security frameworks and certifications (e.g., CE+, ISO, SOC 2). Oversee patching, vulnerability, and risk management of MSP-owned infrastructure and tools. Ensure MSP's technology stack (RMM, XDR, PSA, backup, etc.) is securely deployed and monitored. Drive staff security awareness, training More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerabilityscanning tools Data Loss Prevention (DLP) solutions Candidate Profile: Strong hands-on experience in cyber and information security Deep understanding of Microsoft Azure security architecture Experience managing vendor More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
protocols and secure key lifecycle management- Securing microservices, APIs, and DevSecOps best practices Skilled in penetration testing and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerabilityscanning, remediation, and vendor management Collaborative mindset with the ability to partner across engineering, security, and product teams Desirable Skills: Hands-on configuration, deployment, and operation of ForgeRock More ❯
Employment Type: Full-Time
Salary: £100,000 - £120,000 per annum, Negotiable, Inc benefits
Governance and Data Protection teams to ensure alignment. Vendor & System Assurance Conduct third-party security assessments and manage security clauses in supplier contracts and SLAs. Oversee penetration testing and vulnerabilityscanning of core systems, including client portals and emergency response platforms. People Management Lead and mentor a team of Analysts, ensuring high-quality output and continuous development. Create More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
Public Sectors. The Roles Involve: Incident Response : Enhance coordination, assess impact, inform guidance, and develop playbooks. Threat Intelligence : Deliver tailored intelligence, monitorTTPs, and manage tooling (OpenCTI, MISP, sandboxes). Vulnerability Management : Identify and triage vulnerabilities, support remediation, and improve disclosure schemes. Requirements : Proven experience in SOC environments and incident response. Deep understanding of threat actors and intelligence platforms. Expertise … in vulnerabilityscanning and remediation. Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome applications from people of all backgrounds and perspectives. Our success is driven by our people, united by the spirit of partnership to deliver the best resourcing solutions for More ❯
Hampshire Support : Full training and certification support provided Growth : Build on your 2nd line support experience and step confidently into cyber Variety : Get hands-on with patching, threat prevention, vulnerabilityscanning, phishing protection, and more Stability : Join a respected organisation with excellent benefits, including 26% pension and 43 days holiday What you’ll be doing: Managing system patching … perimeter Monitoring and responding using Microsoft Defender and Endpoint Protection tools Running phishing simulations and awareness training for staff Implementing data loss protection controls and securing Microsoft 365 Conducting vulnerability scans and acting on results Supporting continuous improvements in the business’s cyber security posture What we’re looking for: Experience in 2nd line IT support, infrastructure, or a More ❯
run smoothly. What you'll be doing: Implementing and maintaining security controls across network, cloud, endpoints, and core infrastructure Owning key technologies like firewalls, SIEM, EDR, VPN, NAC, and vulnerability scanners Driving vulnerability management and hardening across the estate Supporting and responding to security incidents across infrastructure services Embedding security into infrastructure changes (firewall rules, access reviews, cloud … network security within a complex enterprise environment Solid knowledge of: Firewalls, VPN, IDS/IPS, network security controls Endpoint security (EDR, anti-malware, DLP) SIEM tools (e.g. Splunk, Sentinel) Vulnerability management (e.g. Qualys, Tenable) Cloud (Azure and/or AWS) Hands-on experience supporting or responding to security incidents Familiarity with frameworks such as ISO 27001, NIST, CIS, Cyber More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯