5 of 5 Remote/Hybrid Vulnerability Management Jobs in the Thames Valley

Cybersecurity Solution Architect

Hiring Organisation
DCV Technologies
Location
Reading, Berkshire, United Kingdom
Employment Type
Contract
manage, and strengthen enterprise security capabilities across IT and OT environments. The role requires deep hands-on cybersecurity experience with a strong focus on vulnerability management and risk mitigation Your responsibilities: Design and define end-to-end cybersecurity solutions aligned with enterprise security standards and business requirements. Lead … support vulnerability identification, assessment, prioritisation, and remediation across large enterprise environments. Manage and mitigate security vulnerabilities across both IT and OT (Operational Technology) landscapes. Work closely with infrastructure, application, and OT teams to embed security controls into architectures and operations. Provide architectural guidance on secure system design, threat modelling ...

CYBER SECURITY ASSURANCE SPECIALIST

Hiring Organisation
Contracts Consultancy Ltd
Location
OX14, Clifton Hampden, Oxfordshire, United Kingdom
Employment Type
Contract
Microsoft 365 E5, Azure IaaS/PaaS, and Windows/Linux/Unix systems. Utilise security tooling such as SIEM, EDR/XDR, and vulnerability management platforms to monitor and improve security posture. Develop and implement security policies, access control models (RBAC, ABAC), and logging standards. Support incident … management, vulnerability assessments, and SOC-related activities. Contribute to secure software supply chain practices, including CI/CD security reviews. Interpret threat intelligence, CVEs, and CVSS scores to inform risk-based decision making. Collaborate with stakeholders across technical and non-technical teams, clearly articulating risks and solutions. Support ...

Cyber Security Assurance Specialist

Hiring Organisation
Circle Recruitment
Location
Oxford, Oxfordshire, England, United Kingdom
Employment Type
Contractor
Contract Rate
£45.00 - £55.00 per hour
Azure IaaS/PaaS, Windows/Linux/Unix. Strong knowledge of security tooling such as SIEM, endpoint detection (EDR/XDR), and vulnerability management platforms. Hands-on experience with policy development, access control models and logging standards. Experience supporting assurance activities or government-mandated reviews (e.g. GovAssure … Secure by Design). Knowledge of Incident Management, Vulnerability Assessments, SIEM & SOC Systems. Familiarity with ITSM workflows and change control procedures Experience designing or reviewing secure software supply chain and CI/CD security . Ability to interpret CVEs, CVSS scores, and threat intelligence feeds. Strong stakeholder engagement ...

Head of Information Security & IT Risk

Hiring Organisation
Morson Edge
Location
Oxfordshire, South East, United Kingdom
Employment Type
Permanent
Salary
£90,000
risk strategy Lead and develop a team of information security and technology risk specialists Oversee cyber security operations, including security tooling, incident response, and vulnerability management Maintain and manage the IT risk framework and risk register Ensure alignment with regulatory requirements and industry frameworks (e.g. ISO 27001, NIST … cyber security, or IT risk leadership roles Experience working within financial services or other regulated industries Strong understanding of cyber security frameworks, technology risk management, and operational resilience Experience leading security strategy, governance, and security operations Proven ability to engage and influence senior stakeholders across technology and risk functions ...

Network & Infrastructure Engineer

Hiring Organisation
Proactive Appointments
Location
Milton Keynes, Buckinghamshire, United Kingdom
Employment Type
Permanent
Salary
GBP 60,000 - 65,000 Annual
Maintain networking (Firewalls, routing, switching, VPNs) Implement monitoring, logging, and backup solutions (eg Zabbix, Graylog, Veeam) Support security tooling (Cloudflare WAF/Zero Trust, vulnerability scanning, patching, PKI) Administer Microsoft 365 Produce technical documentation (HLD/LLD) Skills & Experience Strong infrastructure background across cloud and on-prem Experience with … monitoring, logging, and backup tools Knowledge of networking and security principles Familiarity with vulnerability management and VPNs Desirable ITIL processes SIEM/EDR tools (eg Microsoft Sentinel/Defender) Scripting (PowerShell, Bash, Python) Due to the volume of applications received for positions, it will not be possible ...