Remote Vulnerability Management Jobs in the Thames Valley

1 to 25 of 29 Remote Vulnerability Management Jobs in the Thames Valley

Cyber Vulnerability Management Analyst

slough, south east england, United Kingdom
Hybrid / WFH Options
FirstBank UK Limited
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months FirstBank UK is a globally recognised, top-tier bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business with over … is the oldest African bank in the UK. Due to business requirements, we are now looking to acquire the services of an experienced Cyber Vulnerability Management Analyst Please note that this is a hybrid role with 3 days in the office and 2 days working from home. Key … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The More ❯
Posted:

Senior Cyber Threat Intelligence Analyst

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
Thames Water Utilities Limited
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerability management (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Thames Water offices as required Working More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Threat Intelligence Analyst

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerability management (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Employment Type: Permanent
Salary: GBP 60,000 - 65,000 Annual
Posted:

Cyber Threat Intelligence Analyst

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerability management (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Employment Type: Permanent
Salary: £60000 - £65000/annum Company benefits
Posted:

Security Operations Manager (Buckinghamshire)

Milton Keynes, Buckinghamshire, UK
Hybrid / WFH Options
identifi Global Resources
ll thrive in a change-oriented environment, stay ahead of emerging threats through horizon scanning, and push for continuous improvement across key areas like vulnerability management, incident response, and SOC assurance. If you don't settle for second best and are passionate about embedding a culture of excellence … is your opportunity to make a meaningful impact. Key Responsibilities Security Operations Oversight: Lead day-to-day security operations including monitoring, threat analysis, and vulnerability management. Provide updates to the Head of Information Security and Executive Security Steering Group. Drive Key Improvements: Lead strategic efforts to enhance vulnerability management confidence, improve incident response capability, and increase assurance around SOC operations. Change Leadership: Actively contribute to the implementation of the new Security TOM, championing change, innovation, and security best practice. Risk & Compliance: Collaborate with Privacy, Risk, and Audit teams to ensure compliance with regulatory requirements and internal More ❯
Posted:

Security Operations Manager

buckinghamshire, south east england, United Kingdom
Hybrid / WFH Options
identifi Global Resources
ll thrive in a change-oriented environment, stay ahead of emerging threats through horizon scanning, and push for continuous improvement across key areas like vulnerability management, incident response, and SOC assurance. If you don't settle for second best and are passionate about embedding a culture of excellence … is your opportunity to make a meaningful impact. Key Responsibilities Security Operations Oversight: Lead day-to-day security operations including monitoring, threat analysis, and vulnerability management. Provide updates to the Head of Information Security and Executive Security Steering Group. Drive Key Improvements: Lead strategic efforts to enhance vulnerability management confidence, improve incident response capability, and increase assurance around SOC operations. Change Leadership: Actively contribute to the implementation of the new Security TOM, championing change, innovation, and security best practice. Risk & Compliance: Collaborate with Privacy, Risk, and Audit teams to ensure compliance with regulatory requirements and internal More ❯
Posted:

Security Operations Manager

milton keynes, south east england, United Kingdom
Hybrid / WFH Options
identifi Global Resources
ll thrive in a change-oriented environment, stay ahead of emerging threats through horizon scanning, and push for continuous improvement across key areas like vulnerability management, incident response, and SOC assurance. If you don't settle for second best and are passionate about embedding a culture of excellence … is your opportunity to make a meaningful impact. Key Responsibilities Security Operations Oversight: Lead day-to-day security operations including monitoring, threat analysis, and vulnerability management. Provide updates to the Head of Information Security and Executive Security Steering Group. Drive Key Improvements: Lead strategic efforts to enhance vulnerability management confidence, improve incident response capability, and increase assurance around SOC operations. Change Leadership: Actively contribute to the implementation of the new Security TOM, championing change, innovation, and security best practice. Risk & Compliance: Collaborate with Privacy, Risk, and Audit teams to ensure compliance with regulatory requirements and internal More ❯
Posted:

Cybersecurity Risk Analyst

slough, south east england, United Kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/ More ❯
Posted:

Vulnerability and Threat Hunting Manager

slough, south east england, United Kingdom
Hybrid / WFH Options
Merlin Entertainments
Vulnerability and Threat Hunting Manager Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in our … attractions. The Vulnerability and Threat Hunting Manager is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting threat assessments … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with More ❯
Posted:

IT Security & Vulnerability Engineer - Investment Bank - 654/day GBP

slough, south east england, United Kingdom
Hybrid / WFH Options
Hawksworth
Position: IT Security & Vulnerability Management Engineer Industry: Investment Banking (Global Financial) Day rate contract position: 654/day (inside IR35) Initial contract length of 6 months Location: Central London Hybrid working: 3 days at their London office Do you have experience leading vulnerability management in large … life cycle of security assessments, threat identification, and mitigation Experience in security assessments, particularly within complex enterprise environments Security risk oversight, applying technical security vulnerability remediation practices Identification, prioritization, remediation and reporting of security risks. Knowledge of vulnerability remediation practices Monitoring and capacity planning of local systems as … part of the global framework A nice to have.... Experience with Tenable and Flexera Background in RedHat Linux, Microsoft Windows including WSUS and GPO management This day rate contract is initially for 6 months with a view to extend. The day rate is 654/day GBP inside IR35. More ❯
Posted:

Security Governance, Risk and Assurance Specialist

slough, south east england, United Kingdom
Hybrid / WFH Options
CLS Group
in which everyone is encouraged to be open and forward-thinking. Job information: Functional title - AVP, IT Security Specialist Department – Security Governance and Risk Management Corporate level – Associate Vice President Report to – Director of Security Location - London, onsite 2 days per week About the role: The individual will be … consultation on remediation approaches to address gaps and continue ongoing monitoring of remediation, re-assess until reduced to an acceptable level. Supporting Cybersecurity Risk Management strategies based on security findings and observations. Including informing improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all … written communication skills to convey complex technical information clearly and effectively. Presenting data insights to non-technical stakeholders Base level understanding of security risk management and taxonomy principles, to reduce risk to an acceptable level. Knowledge of vulnerability management and incident management practices. Ability to learn More ❯
Posted:

IT Operational Platforms and Security Lead

slough, south east england, United Kingdom
Hybrid / WFH Options
Pioneer Search
will involve two key projects around the generational cloud migration to Azure based services, as well as driving best practice I Identity and Access Management and defining the organisations cloud security policies. While there is some direct leadership, hands on ability to take ownership of a global infrastructure estate … with confidence. Responsibilities: Lead the shift to a secure, cloud-first infrastructure Owning the security strategy: zero-trust, Oversee global IT operations and lifecycle management Strengthen security controls and ensure regulatory compliance Manage vendor performance and service delivery Drive continuous improvement across platforms and processes Technical Skills: Microsoft … Azure, Defender, Sentinel IAM: Azure AD, MFA, SSO, PAM Security frameworks: ISO 27001, NIST, CIS SIEM, endpoint protection, vulnerability management ITIL-based service management and automation Leadership Skills Proven ability to lead IT operations and transformation projects Strong vendor and budget management experience Resilience in high More ❯
Posted:

Azure Cloud Engineer

slough, south east england, United Kingdom
Hybrid / WFH Options
Albany Beck
deployments. Build and maintain CI/CD pipelines with integrated DevSecOps tools to automate both application and infrastructure deployments. Integrate security capabilities such as vulnerability scanning, static code analysis, and secrets management into the development lifecycle. Work closely with development, architecture, and cybersecurity teams to ensure security and … banking or financial services industry, with a strong understanding of security and regulatory requirements. Strong knowledge of DevSecOps practices, including secure CI/CD, vulnerability management, and secrets management. Experience in container orchestration using AKS and containerisation with Docker. Familiarity with CI/CD tools such as Azure … DevOps and GitHub Actions. Proficiency in scripting languages (PowerShell, Python, Bash). In-depth understanding of cloud security, including identity and access management (Azure AD) and key management solutions. Experience with monitoring and logging tools such as Azure Monitor, Log Analytics, Prometheus, and Grafana. Relevant certifications (AZ More ❯
Posted:

Cyber Security Consultant

reading, south east england, United Kingdom
Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
Posted:

Cyber Security Consultant

slough, south east england, United Kingdom
Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
Posted:

Cyber Security Consultant

high wycombe, south east england, United Kingdom
Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
Posted:

Cyber Security Consultant

milton keynes, south east england, United Kingdom
Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
Posted:

Cyber Security Consultant

oxford district, south east england, United Kingdom
Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
Posted:

Senior Cloud Systems Engineer

slough, south east england, United Kingdom
Hybrid / WFH Options
Dexian Europe
and experience with the following technology... Microsoft Azure, Microsoft Windows Server, VDI Infrastructures. Active Directory, Intune Policies, Exchange, and Office 365 Administration. Patching and vulnerability management, including certificate management. General understanding of traditional and cloud-based networking and associated infrastructure. ServiceNow Ticketing System. JIRA and Confluence. Architecture standards More ❯
Posted:

Security Engineer – ForgeRock

slough, south east england, United Kingdom
Hybrid / WFH Options
JCW
with ForgeRock IAM stack : PingGateway, PingAM, PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetration testing , threat modeling, and vulnerability management Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO More ❯
Posted:

Cyber Detect Analyst (CERT Support) S2 CISO

Milton Keynes, Buckinghamshire, United Kingdom
Hybrid / WFH Options
Banco Santander SA
you'll bring: Essential requirements: Knowledge and experience in Cyber Security disciplines such as network analysis, host analysis, malware analysis, penetration testing, EDR, SIEM, vulnerability management, or incident response in cloud environments Experience working within a SOC or similar team investigating security alerts Understanding of Threat Actor Tactics More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cloud Application Security Engineer

slough, south east england, United Kingdom
Hybrid / WFH Options
Ignite Digital Talent
mesh - and ideally hands on experience on IAM via Okta. Demonstrable experience of supporting on security using more broad controls. A strong understanding of vulnerability identification and exploitation techniques and proficiency in using security tools such as SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) Knowledge … of security frameworks such as ISO 27001, NIST, or CIS benchmarks. Experience in application security reviews, vulnerability management, and security controls implementation. Familiarity with OWASP Top 10, CWE, and secure coding practices. Basic coding/scripting skills in Python, JavaScript, or similar. Strong communication skills with the ability More ❯
Posted:

Information Security Consultant

slough, south east england, United Kingdom
Hybrid / WFH Options
Eames Consulting
of complex, multi-site security projects globally. Deep knowledge of security frameworks (NIST, ISO 27001, CIS, CSA CCM). Strong understanding of GRC processes , vulnerability management, incident response, and SOC. Familiarity with DevSecOps , secure SDLC, disaster recovery, and BCP. Excellent stakeholder management and communication skills. Experience navigating More ❯
Posted:

Cyber Security Manager

slough, south east england, United Kingdom
Hybrid / WFH Options
Sellick Partnership
You will be managing a team ensuring all security protocols and procedures are followed meticulously. You will provide strategic recommendation reports to senior management. Vulnerability Management: Manage and update a list of vulnerabilities across the estate, with a critical focus to safeguard data integrity and mitigate risks. Experience More ❯
Posted:

Security Analyst

high wycombe, south east england, United Kingdom
Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
Posted:
Vulnerability Management
the Thames Valley
10th Percentile
£47,125
25th Percentile
£70,938
Median
£90,500
75th Percentile
£93,250