Vulnerability Management Jobs in the Thames Valley

10 of 10 Vulnerability Management Jobs in the Thames Valley

Senior Cyber Threat Intelligence Analyst

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
Thames Water Utilities Limited
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerability management (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Thames Water offices as required Working More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Threat Intelligence Analyst

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerability management (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Employment Type: Permanent
Salary: GBP 60,000 - 65,000 Annual
Posted:

Cyber Threat Intelligence Analyst

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerability management (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Employment Type: Permanent
Salary: £60000 - £65000/annum Company benefits
Posted:

Head of IT Security

Oxford, Oxfordshire, United Kingdom
Ellison Institute, LLC
be responsible for safeguarding our critical scientific and technological assets. This role demands a proactive leader with deep expertise in Security Operations, Risk & Compliance Management, Identity & Access Management and the ability to work cross-functionally with IT, research teams and executive leadership. The successful candidate will be instrumental … Engineering Develop, implement, and oversee enterprise-wide security operations to detect, prevent, and respond to cyber threats. Lead and enhance Security Information and Event Management (SIEM) and Threat Intelligence capabilities. Lead security incident response and forensic investigations, ensuring robust incident handling and mitigation. Report on cybersecurity KPIs and manage … significant IS risks and their appropriate Risk Treatment Plans. Risk & Compliance Management Define and enforce IT security policies, standards, and procedures. Ensure compliance with industry accreditations (e.g., ISO 27001, NIST, GDPR), working closely with external auditors and regulatory bodies. Conduct regular risk assessments and vulnerability management, and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Manager

Buckinghamshire, England, United Kingdom
McGregor Boyall
SOC) , with one analyst reporting to you Oversee incident response , manage security incidents from detection to resolution Work closely with the compliance manager on vulnerability management Architect secure solutions, validate baseline configurations, and recommend improvements to stay compliant Collaborate with key stakeholders including Compliance and Infrastructure teams Required … network security and firewalls Exposure to PenTesting methodologies or practices (desirable) Experience with NAC solutions like Cisco ISE , ForeScout , or similar Strong grasp of vulnerability management processes Desired Certifications Microsoft Security certifications (preferred) CISM or CISSP (beneficial, not essential) Apply now or reach out for a confidential chat More ❯
Posted:

Cyber Security Manager (Buckinghamshire)

Milton Keynes, Buckinghamshire, UK
McGregor Boyall
SOC) , with one analyst reporting to you Oversee incident response , manage security incidents from detection to resolution Work closely with the compliance manager on vulnerability management Architect secure solutions, validate baseline configurations, and recommend improvements to stay compliant Collaborate with key stakeholders including Compliance and Infrastructure teams Required … network security and firewalls Exposure to PenTesting methodologies or practices (desirable) Experience with NAC solutions like Cisco ISE , ForeScout , or similar Strong grasp of vulnerability management processes Desired Certifications Microsoft Security certifications (preferred) CISM or CISSP (beneficial, not essential) Apply now or reach out for a confidential chat More ❯
Posted:

Security Architects (DV Security Clearance)

Reading, South East
CGI
frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management More ❯
Employment Type: Permanent
Posted:

Cyber Detect Analyst (CERT Support) S2 CISO

Milton Keynes, Buckinghamshire, United Kingdom
Hybrid / WFH Options
Banco Santander SA
you'll bring: Essential requirements: Knowledge and experience in Cyber Security disciplines such as network analysis, host analysis, malware analysis, penetration testing, EDR, SIEM, vulnerability management, or incident response in cloud environments Experience working within a SOC or similar team investigating security alerts Understanding of Threat Actor Tactics More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Consultant IT & Digital

Newbury, Berkshire, United Kingdom
Hybrid / WFH Options
Vodafone
comply with Baseline Security Requirements and security policy. Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & Access Management, SIEM and Vulnerability Management. Ensure internal customers, external suppliers and delivery partners are aware of security standards and future … of IT and telecommunications solutions. Competent in applying security policies and principles defined in security architecture to real world scenarios. Understands and applies risk management principles. Effective communication skills to influence stakeholders and explain complex security requirements in simple terms. Stakeholder Management - established as the go-to person More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Manager

reading, south east england, United Kingdom
Hybrid / WFH Options
Hamilton Barnes 🌳
academic environment. Access ongoing professional development opportunities and cutting-edge security tools. Responsibilities: Lead and manage security operations, including threat detection, incident response, and vulnerability management. Act as a technical manager for identity and access management services, ensuring secure, automated access for university staff and students. Design and … relevant professional networks. Skills/Must Have: Proven experience managing security operations, including SIEM, EDR, and incident response. Strong knowledge of identity and access management technologies (e.g., Microsoft Entra, M365). Familiarity with network security best practices, including firewall management, network segmentation, and intrusion detection. Exceptional troubleshooting skills More ❯
Posted:
Vulnerability Management
the Thames Valley
10th Percentile
£47,250
25th Percentile
£57,500
Median
£90,500
75th Percentile
£93,250