Exeter, Devon, United Kingdom Hybrid / WFH Options
Met Office
The following content displays a map of the jobs location - Exeter We're looking for an exceptional Vulnerability Management Manager to help us make a difference to our planet. As our Vulnerability Management Manager, the job may be suitable for hybrid working, which is where an employee works part of the week in the office and part of … Management Managerwithin the Security Operations team of the Met Office's Cyber Security Department you will be responsible for driving the vision and operational execution of the organisation's vulnerability management program, overseeing the end-to-end process of identifying, assessing, and recommending mitigations to vulnerabilities across digital services, including complex and mission-critical systems at the Met Office. … Leadership and Development:Lead, manage and mentor a team to ensure the team operate effectively. Develop the team utilising the career framework to identify learning needs and career pathways. Vulnerability Management: Manage and coordinate vulnerabilityscanning, risk assessments, and penetration testing to identify security weaknesses across systems, infrastructure, and digital services.Lead efforts to enhance vulnerability management More ❯
is embedded within the Software Development Life Cycle, while ensuring that all security requirements have been applied before product or function release. Analyse and interpret security scan results and vulnerability reports to develop prioritized remediation strategies, working closely with IT, Development and Hosting teams to address vulnerabilities effectively Engineer and implement security controls based on industry standards while continuously … ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetration testing and vulnerabilityscanning Ensure products compliance with security standards and regulations Ensure NAVBLUE Security strategy deployment within technical operations Ensure effective synchronization and alignment with Airbus Security Organization Education: Bachelor … influencing individuals at all levels of the organization to drive and implement change while identifying and minimizing the impact of risks Technical Systems Proficiency: Security Management Tools (email filtering, vulnerabilityscanning tools, security dashboards, etc.) Cloud security management tools like CNAPP, CSPM, CWPP, and CIEM. Security risk assessment methodology (EBIOS RM) Security Requirement Definition and Review Travel Required More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Forward Role
Cyber Vulnerability Engineer – eDV cleared Package - £55,000 - £95,000 (depending in experience level) Benefits – DV Bonus plus excellent benefits Relocation assistance for UK based candidates to Manchester, Cheltenham or London. Join a trusted leader in National Security technology solutions. Are you passionate about using cutting-edge cyber technology to protect the UK? Do you enjoy solving technical cyber … they work, but to identify weaknesses, assess risks, and develop mitigation strategies. What You'll Be Doing Researching, designing, and building resilient systems to support National Security objectives. Conducting vulnerability assessments and threat modelling on software and hardware components. Reverse engineering a wide range of technologies to uncover vulnerabilities and improve security. Writing secure, high-performance code that integrates … Proficiency in one or more of C, C++, or C#. Familiarity with scripting and automation using Python. Experience working with Linux or Windows-based systems. Hands-on experience with vulnerabilityscanning tools (e.g., Nessus, OpenVAS, Burp Suite, or similar). Familiarity with CVSS scoring, vulnerability databases (e.g., NVD, MITRE ATT&CK), and risk prioritization frameworks. Understanding of More ❯
This is a dynamic and varied role, which includes things like: Build, deployment and maintenance of new and existing environments Designing and maintaining highly available architectures Security (patch management, vulnerabilityscanning & monitoring) Uptime - design and maintain the systems and networking for uptime, resilience, architecting for failure. Evaluation of new, cutting-edge technologies to help improve business processes and More ❯