The Role: The VulnerabilityManagement Analyst is a global role within ION's central services division and will support the Group Security strategy and operational excellence through the identification, mitigation and remediation of information security vulnerabilities, misconfigurations and risks to the business. This role reports to the VulnerabilityManagement Manager who reports to the Global Head … of IT Security. As a member of the ION Security team, you will build and lead a team of Security professionals specialising in VulnerabilityManagement along with managing the partners and technology vendor deliverables and of course building and owning the strategy to deliver a world class VulnerabilityManagement program. The candidate must understand their role … in the broader vulnerabilitymanagement program and your team will regularly perform discovery scanning, risk/exposure assessments, mitigation support activities, continuous validation assessments, and lessons learned workshops and improvement projects to continuously improve our process across Group Security and all other Verticals. We are looking for a diligent, dedicated, creative and motivated individual. Excellent communication skills are More ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced VulnerabilityManagement Engineer to join our Cyber Security team. As a VulnerabilityManagement Engineer, your primary responsibility will be to manage existing vulnerabilitymanagement-specific … tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerabilitymanagement tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerabilitymanagement activities Process vulnerability data to … provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerabilityMore ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced VulnerabilityManagement Engineer to join our Cyber Security team. As a VulnerabilityManagement Engineer, your primary responsibility will be to manage existing vulnerabilitymanagement-specific … tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerabilitymanagement tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerabilitymanagement activities Process vulnerability data to … provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerabilityMore ❯
The VulnerabilityManagement Manager is a global role within ION's central services division, supporting the Group Security strategy through the identification, mitigation, and remediation of information security vulnerabilities, misconfigurations, and risks. This role reports to the Global Head of IT Security, who reports to the Group CISO. As a member of the ION Security team, you will … build and lead a team of Security professionals specializing in VulnerabilityManagement, managing partners and vendor deliverables, and developing a strategy for a world-class VulnerabilityManagement program. Your team will perform discovery scanning, risk assessments, mitigation activities, continuous validation, and lessons learned workshops to improve processes across Group Security and Verticals. We seek a diligent … capable of building relationships with teams of varying technical abilities. The ideal candidate will have extensive cybersecurity experience, at least 10+ years in security roles, with a focus on Vulnerability Management. Key Responsibilities: This role may require out-of-hours work for 24x7 global operations. Ensure team objectives and development plans align with company OKRs. Act as escalation point More ❯
VULNERABILITYMANAGEMENT ANALYST Up to £70,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a major driving forces … behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a VulnerabilityManagement/SOCAnalyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's VulnerabilityManagement Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes & Schedules related … to Vulnerability Scanning of All Endpoints of the business. As a VulnerabilityManagement/SOC Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of SOC/VulnerabilityManagement Analyst role More ❯
the country. It is the largest news publisher on TikTok with over 28 million total followers and nearly 45 billion views in the past year. We are seeking a Vulnerability Engineer to help build and drive our vulnerabilitymanagement function. This is a key role for someone with the technical skills, automation mindset, and proactive attitude to … someone who thrives on ownership, brings ideas to life through automation, and collaborates effectively with teams across the business. Main Responsibilities Develop, implement, and maintain an automated and scalable vulnerabilitymanagement program using Tenable and related tools. Establish and enforce vulnerabilitymanagement policies, scan configurations, and best practices, aligned to frameworks such as ISO 27001, NIST … and CIS. Integrate vulnerability scanning and remediation into CI/CD pipelines and development workflows to ensure security at speed. Automate data collection, triage, reporting, and ticketing processes using scripting languages such as Python, Bash, PowerShell, or Go. Collaborate with IT, DevOps, and engineering teams to remediate identified vulnerabilities quickly and effectively. Scope and coordinate penetration testing activities; track More ❯
a skilled Industrial Control Systems (ICS) Infrastructure Engineer to join our team. This position offers the unique opportunity to design, develop, and maintain cutting-edge infrastructure for naval platform management systems, including both surface ships and submarines. You will play a critical role in both the development of the product and the provision and maintenance of the development environment … itself, supporting mission-critical naval programmes. In addition to integrating IT/OT systems, you will be responsible for the management of IT assets within the development environment, ensuring compliance with company and regulatory standards such as ISO27001 and IEC62443. This role is ideal for engineers familiar with Windows Server domains, Red Hat Linux, virtualisation, industrial networking, and working … Security: Design and manage robust industrial networking architectures (e.g., Profinet, Ethernet/IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. Platform Management Systems: Work closely with multidisciplinary teams to design and integrate ICS solutions into PMS, ensuring they meet rigorous naval requirements for performance, reliability, and security. Development Environment Provision & Maintenance More ❯
Required: Tenable Nessus Engineers IR35 Status: Inside Duration: 12 month initial contract Location: 1-2 days onsite in either Central London or Knutsford Role 1 As an experienced Vulnerability Assessment Engineer responsible for maintaining the Vulnerability Assessment toolsets and products. Primary Responsibilities The ability to review requirements, undertake product design followed by Implementation/deployment/support of … Vulnerability Assessment tools suite (e.g Tenable, Rapid7, Qualys etc) and peripherals with Engineering. Maintains local and network credentials and provisions access to vulnerability scanning systems. Responsible for integration of Vulnerability assessment tooling with other security and IT systems management tools (i.e. Splunk, ServiceNow) Responsible for developing and maintaining standard processes and operating procedures, creating technical architecture … diagrams and system build documentation. Responsible for operating the scanning tools and maintaining coverage along with supporting the vulnerabilitymanagement and remediation teams in understating how to remediate vulnerabilities (i.e. laptops, VMs, wireless devices) Works with vulnerabilitymanagement team to build asset repositories and asset scan policies Work closely with customer delivery managers to prioritize daily More ❯
Operate within a global team that takes responsibility for the security monitoring of key technologies and tools across the estate Lead and manage a team of Security Analysts & the Vulnerabilitymanagement team Comfortable operating in a technical capacity performing hands-on incident response and supporting/managing SOC analysts Act as a SME in matters related threat and … vulnerabilitymanagement incl incident response Understand security incidents and the likely impact these will have on the business Define and report on KPIs with recommendations for improvement Identify security risks, threats and vulnerabilities of the company's network, systems, applications and new technology initiatives Implement and maintain operating run books, operating processes and procedures Help to develop and … configure use cases, and alerting rules within SIEM technologies Mange the vulnerabilitymanagement programme that includes vulnerability scanning, security testing, threat monitoring and data loss and leakage prevention Direct on-going threat intelligence activities Mentor and develop security analysts Skills: Prior experience working/managing a SOC Demonstrable experience and operational knowledge of SIEM, firewalls, intrusion detection More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Capgemini
including: identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role VulnerabilityManagement Understand the VulnerabilityManagement end to end process and reporting and Have working experience of VulnerabilityManagement tools Conduct vulnerability analysis and … create impact assessments including risk assessment of vulnerability reports and impact risks to service Collate conclusions and recommendations and Identify and communicate current and emerging information security threats Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement and notify requirements to address security deficiencies Report audit findings, including corrective action suggestions, Conducts follow up remediation … part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Strong understanding of vulnerabilitymanagement frameworks and tools. Experience in conducting risk assessments and interpreting vulnerability reports. Familiarity with audit processes, compliance standards, and security governance. Skilled in delivering security training More ❯
Security Support Engineer, VulnerabilityManagement and Remediation Operations Job ID: Amazon UK Services Ltd. Embark on a Mission to Fortify Amazon's Defenses as a Support Engineer with the VulnerabilityManagement & Remediation Operations team! Amazon Security is seeking an experienced and innovative Support Engineer specialising in cybersecurity to join our VulnerabilityManagement and Remediation … London, UK. The VMRO team is a global team that is responsible for assessing, detecting, and driving the remediation of vulnerabilities across the Amazon ecosystem. Key job responsibilities - Support vulnerability detection campaigns by working closely with Campaign Owners to launch and continuously improve the quality of campaigns across Amazon. - Assess and negotiate with customers to drive down security risk … in their environments. - Collaborate with builder teams to implement security fixes and improvements. - Understand technical details of vulnerabilities affecting Amazon's infrastructure, services, and applications. - Review and analyse common vulnerability disclosures and assist in evaluating potential impacts. - Help triage vulnerabilities and contribute to impact and detection logic assessments. - Contribute to the development of automation of repetitive tasks. - Actively participate More ❯
IT Operation s Platforms and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation's IT operations, ensuring the stability, continuity, security, and efficiency of its technology … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … and systems, driving transformative operational change, enhancing IT processes and ensuring compliance with governance bodies and industry regulations. Due to the nature of the role, complexity Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection More ❯
IT Infrastructure Operation s and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation's IT operations, ensuring the stability, continuity, security, and efficiency of its technology … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and … access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such More ❯
environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. The role requires the ability to "lead by example" and perform line management for direct reports and manage service partners reporting into the function. Additional responsibilities are to respond to support requests by Key Responsibilities: IT Operations & Cloud Platform Management Lead … business continuity (BC) and disaster recovery (DR) plans, ensuring cloud- based solutions support resilience and rapid recovery. Manage Global Infrastructure (Cloud, On-prem and Virtual product) Solution Life Cycle Management and removal (via decommissioning and succession planning) of technical debt. Drive a document first culture to new and legacy platforms/solutions. Oversee management of the End User More ❯
SIEM use cases: log ingestion, analytics rules, playbooks and workbooks. Deploy and manage Microsoft Defender solutions (Defender for Cloud, Defender for Servers, Defender for Containers) to harden Azure workload Vulnerability & Patch Management Operate vulnerabilitymanagement tools to discover and prioritise flaws across cloud and on-prem systems. Define and run patch management processes for virtual … machines, containers and serverless functions. Integrate vulnerability scanning (e.g. Qualys, Sonar Cloud, Tenable or Azure-native scanners) into CI/CD pipelines. Security Analysis & Incident Response Perform root-cause analysis of security incidents and vulnerabilities. Conduct threat modelling, code and infrastructure reviews. Develop and execute incident response procedures, leveraging Sentinel playbooks and Logic Apps when required. CI/CD … services (IAM, networking, Key Vault). Proven track record configuring and optimising Microsoft Sentinel (SIEM) and Microsoft Defender tools. Familiarity with Azure Policy and Azure Blueprints for compliance enforcement. Vulnerability & Patch Management Practical experience with vulnerability scanners (Qualys, Tenable, or Azure Defender Vulnerability Assessment). Knowledge of patch management frameworks (WSUS, Azure Update ManagementMore ❯
Cyber Threat Intelligence and Vulnerability Lead £55,000- 65,000 GBP Onsite WORKING Location: Leeds, Yorkshire and the Humber - United Kingdom Type: Permanent Cyber Threat Intelligence and Vulnerability Lead Location: Leeds - on site Clearance Required: DV (Developed Vetting) Salary: £55,000- 65,000 Grade: GG10 - GG11 A major UK Critical National Infrastructure (CNI) programme is seeking a highly … skilled Cyber Threat Intelligence and Vulnerability Lead to join a dedicated Security Operations Centre (SOC). This role is central to protecting hundreds of cloud-hosted systems from advanced cyber threats and ensuring the continuous improvement of threat intelligence and vulnerabilitymanagement capabilities. Key Responsibilities: Lead the detection, triage, and reporting of cyber threats and vulnerabilities on … a daily basis. Oversee the timely delivery of all threat intelligence and vulnerability reports, ensuring high quality and relevance. Select and monitor key threat actors posing the greatest risk to the organisation. Develop and maintain Priority Intelligence Requirements (PIRs) and a tailored collection plan. Provide clear, well-reasoned analysis and predictive insights to support decision-making. Continuously assess and More ❯
bradford, yorkshire and the humber, united kingdom
Anson Mccade
Cyber Threat Intelligence and Vulnerability Lead £55,000- 65,000 GBP Onsite WORKING Location: Leeds, Yorkshire and the Humber - United Kingdom Type: Permanent Cyber Threat Intelligence and Vulnerability Lead Location: Leeds - on site Clearance Required: DV (Developed Vetting) Salary: £55,000- 65,000 Grade: GG10 - GG11 A major UK Critical National Infrastructure (CNI) programme is seeking a highly … skilled Cyber Threat Intelligence and Vulnerability Lead to join a dedicated Security Operations Centre (SOC). This role is central to protecting hundreds of cloud-hosted systems from advanced cyber threats and ensuring the continuous improvement of threat intelligence and vulnerabilitymanagement capabilities. Key Responsibilities: Lead the detection, triage, and reporting of cyber threats and vulnerabilities on … a daily basis. Oversee the timely delivery of all threat intelligence and vulnerability reports, ensuring high quality and relevance. Select and monitor key threat actors posing the greatest risk to the organisation. Develop and maintain Priority Intelligence Requirements (PIRs) and a tailored collection plan. Provide clear, well-reasoned analysis and predictive insights to support decision-making. Continuously assess and More ❯
ensure the effective day-to-day delivery of IT services across both shared and in-house environments, with a strong focus on ITIL disciplines - Incident, Problem, Change, and Asset Management - and Cyber Security risk management . The postholder will act as the customer-facing lead for operational IT, ensuring services are reliable, secure, and responsive to user needs. … Key Responsibilities Manage the performance and quality of outsourced, shared service and in-house IT services Own and operate the ITIL processes: Incident , Problem , Change , and Asset Management Act as the operational interface with the other organisation (the shared service provider) Maintain the CMDB and configuration item lifecycle tracking Lead on cyber security risk assessments , patch assurance , vulnerabilitymanagement , and coordination with SOC/XDR providers Ensure compliance with cyber and data protection standards (e.g. Cyber Essentials) Monitor service level agreements (SLAs), escalate issues, and lead service reviews Coordinate change activity to ensure minimal business disruption Deliver customer-focused service improvement initiatives Support audits and business continuity planning Essential Skills and Experience Demonstrable experience managing operational More ❯
play a key role in shaping the transformation journey of enterprise clients. The role will suit professionals with a strong background in SOC service delivery , incident response coordination , and vulnerabilitymanagement . Key Responsibilities: Act as the primary liaison between clients and internal operational delivery teams, ensuring seamless communication and service excellence. Serve as the key escalation point … Prepare and deliver weekly or monthly service review reports for stakeholders. Support the review and optimisation of service delivery processes, ensuring continuous improvement and implementation of best practices. Lead vulnerabilitymanagement initiatives: Perform risk-based vulnerability scanning across systems, applications, and networks. Prioritise vulnerabilities by risk level and asset criticality, coordinating remediation with business stakeholders. Manage and … maintain IDS and IPS signature updates for client security gateways and firewalls. What You'll Bring: The ideal candidate will bring extensive experience in security operations , incident management , and service delivery in high-stakes environments. Key qualifications and experience include: Minimum of 10 years' experience providing technical support and advisory services within a Security Operations Centre. Deep understanding of More ❯
My client within the wealth management space I currently looking to bring in a Security VulnerabilityManagement Analyst on 6 month rolling contract. Please see below. Requirements: Strong understanding of vulnerabilitymanagement processes, procedures and principles Exposure to application security best practices such as secure coding, security testing techniques Expert knowledge of Security Policies and More ❯
Security Lead In summary the Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk - ideally from within the banking or insurance sector. The IT Operational … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … technically augment the team capabilities (when required) and have a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management • Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Crone Corkill
including the implementation and full ownership of Splunk Enterprise Security, coverage of L3 & L4 incidents in collaboration with the security team, Defender for Endpoint security, Mimecast email security and vulnerabilitymanagement via Nessus, to name a few.Collaboration is key within this position, and you’ll regularly correspond with stakeholders, technical teams, non-technical teams and other businesses within … with occasional travel to the office on an ad-hoc basis. What will you do as a Senior Security Engineer? Take over the full lifecycle of Splunk Enterprise Security management, followed by the ownership of the SIEM once implemented Onboard Splunk log sources, proactively support Splunk, liaise with stakeholders and improve efficiency Partner with the new MSSP as the … business transitions – Covering SOC duties on an ad-hoc basis until the move has been completed Maintain Nessus vulnerabilitymanagement, update systems, run scans and provide reports Cover email security using Mimecast Enterprise Real world threat modelling and incident response (mainly L3/L4 when required) Make suggestions and influence various areas of the business/group from More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Robert Walters
working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerabilitymanagement activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party … Assist in managing third party risk processes by evaluating external partners' security postures and ensuring compliance with internal requirements. Work closely with Security Operations and IT teams to oversee vulnerability assessments and coordinate remediation efforts effectively. Conduct thorough reviews of security architecture for new systems and services to ensure robust protection measures are in place from the outset. Evaluate … necessary, and help implement new solutions as required. Contribute to the deployment of advanced security tools and technologies that enhance the organisation's overall cyber resilience. Oversee the incident management process by supporting detection, response, reporting, and resolution of security incidents. Prepare clear security metrics reports for stakeholders at all levels to inform decision-making and demonstrate progress against More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Robert Walters
working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerabilitymanagement activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party … Assist in managing third party risk processes by evaluating external partners' security postures and ensuring compliance with internal requirements. Work closely with Security Operations and IT teams to oversee vulnerability assessments and coordinate remediation efforts effectively. Conduct thorough reviews of security architecture for new systems and services to ensure robust protection measures are in place from the outset. Evaluate … necessary, and help implement new solutions as required. Contribute to the deployment of advanced security tools and technologies that enhance the organisation's overall cyber resilience. Oversee the incident management process by supporting detection, response, reporting, and resolution of security incidents. Prepare clear security metrics reports for stakeholders at all levels to inform decision-making and demonstrate progress against More ❯
a strong focus on automation, detection and secure by design principles. Additionally, as part of the role you will be leading and participating in threat detection, incident response and vulnerabilitymanagement remediation. You will be serving as both a technical leader and operational responder, working closely with Product, infrastructure and Security Operations teams. We are looking for a … system visibility by expanding logging coverage and implementing additional monitoring capabilities. Maintain, update, and regularly test incident response runbooks, containment strategies, and escalation protocols. Lead the end-to-end vulnerabilitymanagement process for ION Markets systems, from identification to remediation. Provide support for security architecture reviews of developed systems to ensure alignment with best practices. Stay up to … or operating security technologies is preferred, such as endpoint security (e.g. AV/EPP/EDR), SIEM, DLP, SWG, CASB, UEBA, IDS, IPS, firewalls, IAM/PIM/PAM, vulnerabilitymanagement, MDM, etc. About us We're a diverse group of visionary innovators who provide trading and workflow automation software, high-value analytics, and strategic consulting to corporations More ❯