person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced VulnerabilityManagement Engineer to join our Cyber Security team. As a VulnerabilityManagement Engineer, your primary responsibility will be to manage existing vulnerabilitymanagement-specific … tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerabilitymanagement tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerabilitymanagement activities Process vulnerability data to … provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerabilityMore ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced VulnerabilityManagement Engineer to join our Cyber Security team. As a VulnerabilityManagement Engineer, your primary responsibility will be to manage existing vulnerabilitymanagement-specific … tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerabilitymanagement tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerabilitymanagement activities Process vulnerability data to … provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerabilityMore ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Capgemini
including: identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role VulnerabilityManagement Understand the VulnerabilityManagement end to end process and reporting and Have working experience of VulnerabilityManagement tools Conduct vulnerability analysis and … create impact assessments including risk assessment of vulnerability reports and impact risks to service Collate conclusions and recommendations and Identify and communicate current and emerging information security threats Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement and notify requirements to address security deficiencies Report audit findings, including corrective action suggestions, Conducts follow up remediation … part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Strong understanding of vulnerabilitymanagement frameworks and tools. Experience in conducting risk assessments and interpreting vulnerability reports. Familiarity with audit processes, compliance standards, and security governance. Skilled in delivering security training More ❯
play a key role in shaping the transformation journey of enterprise clients. The role will suit professionals with a strong background in SOC service delivery , incident response coordination , and vulnerabilitymanagement . Key Responsibilities: Act as the primary liaison between clients and internal operational delivery teams, ensuring seamless communication and service excellence. Serve as the key escalation point … Prepare and deliver weekly or monthly service review reports for stakeholders. Support the review and optimisation of service delivery processes, ensuring continuous improvement and implementation of best practices. Lead vulnerabilitymanagement initiatives: Perform risk-based vulnerability scanning across systems, applications, and networks. Prioritise vulnerabilities by risk level and asset criticality, coordinating remediation with business stakeholders. Manage and … maintain IDS and IPS signature updates for client security gateways and firewalls. What You'll Bring: The ideal candidate will bring extensive experience in security operations , incident management , and service delivery in high-stakes environments. Key qualifications and experience include: Minimum of 10 years' experience providing technical support and advisory services within a Security Operations Centre. Deep understanding of More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Crone Corkill
including the implementation and full ownership of Splunk Enterprise Security, coverage of L3 & L4 incidents in collaboration with the security team, Defender for Endpoint security, Mimecast email security and vulnerabilitymanagement via Nessus, to name a few.Collaboration is key within this position, and you’ll regularly correspond with stakeholders, technical teams, non-technical teams and other businesses within … with occasional travel to the office on an ad-hoc basis. What will you do as a Senior Security Engineer? Take over the full lifecycle of Splunk Enterprise Security management, followed by the ownership of the SIEM once implemented Onboard Splunk log sources, proactively support Splunk, liaise with stakeholders and improve efficiency Partner with the new MSSP as the … business transitions – Covering SOC duties on an ad-hoc basis until the move has been completed Maintain Nessus vulnerabilitymanagement, update systems, run scans and provide reports Cover email security using Mimecast Enterprise Real world threat modelling and incident response (mainly L3/L4 when required) Make suggestions and influence various areas of the business/group from More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Robert Walters
working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerabilitymanagement activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party … Assist in managing third party risk processes by evaluating external partners' security postures and ensuring compliance with internal requirements. Work closely with Security Operations and IT teams to oversee vulnerability assessments and coordinate remediation efforts effectively. Conduct thorough reviews of security architecture for new systems and services to ensure robust protection measures are in place from the outset. Evaluate … necessary, and help implement new solutions as required. Contribute to the deployment of advanced security tools and technologies that enhance the organisation's overall cyber resilience. Oversee the incident management process by supporting detection, response, reporting, and resolution of security incidents. Prepare clear security metrics reports for stakeholders at all levels to inform decision-making and demonstrate progress against More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Robert Walters
working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerabilitymanagement activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party … Assist in managing third party risk processes by evaluating external partners' security postures and ensuring compliance with internal requirements. Work closely with Security Operations and IT teams to oversee vulnerability assessments and coordinate remediation efforts effectively. Conduct thorough reviews of security architecture for new systems and services to ensure robust protection measures are in place from the outset. Evaluate … necessary, and help implement new solutions as required. Contribute to the deployment of advanced security tools and technologies that enhance the organisation's overall cyber resilience. Oversee the incident management process by supporting detection, response, reporting, and resolution of security incidents. Prepare clear security metrics reports for stakeholders at all levels to inform decision-making and demonstrate progress against More ❯
to the modern backbone of the Royal Navy. We pioneer with fierce curiosity, dedication, and innovation, we seek to solve the worlds most challenging problems. Responsibilities Leadership and line management - Motivate and drive the Hardware function to meet key business and operational unit objectives. Develop an open and inclusive team culture that supports doing the right thing and achieving … excellence. Ensure behaviours in teams meet standards expected of NG employees. Influences others and supports colleagues through changes expected within a large multi-functional organisation. Capability Management - Management of capability needs in the Hardware function Career management of the Hardware function Resource management - Resource supply and demand, Capacity planning and recruitment, and outsource management. Functional delivery … as a Suitably qualified individual in either mechanical or electro-mechanical field of expertise. May be functional lead within projects/issues for most critical/complex needs. Process Management - Highlight process needs and work with the Technical Directorate to develop bespoke, efficient and fully integrated processes. Asset management - Identify tools and Management of tools Communication - Develop More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Anson McCade
will act as a critical liaison between client stakeholders and internal operational teams, ensuring the delivery of world-class cyber security services. You’ll drive incident response coordination, lead vulnerabilitymanagement efforts, and ensure service excellence through strategic oversight and hands-on technical engagement. What You’ll Be Doing Serve as the key point of contact and escalation … improvement initiatives. Support compliance with SLAs and ensure services meet contractual, operational, and quality standards. Lead service reviews and present performance reports to clients (weekly/monthly). Oversee vulnerabilitymanagement efforts including scanning, prioritisation, risk communication, and remediation coordination. Ensure IDS/IPS systems are maintained and aligned with the latest threat intelligence. Work closely with the … Manager to identify process improvements and implement best practices. What You’ll Bring 10+ years of experience in technical support for SOC or Cyber Security operations. 5+ years of vulnerabilitymanagement experience, with demonstrable risk-based prioritisation skills. Proven leadership in high-pressure, crisis-response situations. Strong client relationship management and stakeholder engagement skills. In-depth understanding More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Mayden
About The Role We are looking to appoint a highly experienced cyber and information security specialist to join our growing business. Mayden has a flat management structure and a coaching culture, with team members working together and supporting one another to make things happen. This means that job titles can look a little different, but also means our roles … public sector. You may already be operating at CISO level in a small company, or have ambitions to reach the next level in your career. Mayden's flagship patient management system, iaptus, is used by more than 200 mental health services in the UK, Australia and Canada. Theseus, our case management system for addiction and healthy lifestyle services … Compliance: Ensure the company's security posture meets the requirements of the NHS Data Security and Protection Toolkit (DSPT), Cyber Essentials Plus, ISO27001:2022 and other relevant frameworks. Risk management: Lead the information security risk management program, including identification, assessment, mitigation, and monitoring of information security risks across all systems, applications, and operations. Policy and procedure development: Support More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Circle Group
Newcastle *Be the M365 Subject Matter Expert* IT Deployment Engineer/IT Infrastructure Engineer, providing 3rd line IT/M365 Application support with excellent M365, InTune, Azure, Modern Device Management & IT Security experience is required by a leading company in central Newcastle You will be the subject matter expert for Microsoft and M365, working on a range of 3rd … Active Directory, firewall, VPN, iOS, and networking protocols (TCP/IP, DNS, DHCP, SMTP). - Strong client-service approach with excellent communication and teamwork skills. - Strong IT Security, Endpoint management and Vulnerabilitymanagement experience - PowerShell Scripting experience within Microsoft Applications - Ability to prioritise, manage workload, and multitask effectively. Role Responsibilities: - 3rd line support and implement Intune, M365 … maintenance). - Assist in managing Microsoft Exchange, Mimecast security, Teams, and Autopilot. - Develop onboarding processes and provide feedback for service improvements. - Define the company's IT Security policies, including vulnerabilitymanagement - Admin of Endpoint management tools - Stay updated on Microsoft 365 tools and roadmap. - Conduct monitoring and analysis, including storage and usage reports. - Own problem managementMore ❯
Barrow-In-Furness, Cumbria, North West, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions
Vulnerability Manager - Barrow-in-Furness - Up to £50,000 + Hybrid Working Location: Barrow-in-Furness (Hybrid: 3 days onsite per week) Salary: Up to £50,000 Clearance Requirement: UK nationals only, SC eligible Deerfoot IT Recruitment is helping one of our trusted clients source a Vulnerability Manager to join a specialist cybersecurity team working on a high … profile programme. This is a fantastic opportunity for someone with a passion for cybersecurity, hands-on experience with vulnerabilitymanagement tools, and strong communication skills to play a key role in enhancing security assurance across a complex IT estate. The role will involve: Conducting vulnerability analysis and impact assessments, including risk assessments. Using tools such as Nessus … governance, risk, and compliance activities related to security findings. Collaborating with wider teams and contributing to security training and mentoring initiatives. Ideal candidate profile: 2-3 years' experience in vulnerabilitymanagement (3-5 years in wider cybersecurity desirable). Familiarity with vulnerability tools (e.g. Nessus, Tenable, Microsoft Defender, IBM QRadar). Relevant certifications such as CompTIA Security+ More ❯
a crucial role in leading and managing complex Cyber Security projects, ensuring the successful execution of initiatives that safeguard our clients' organisations against evolving threats. Leveraging your extensive project management expertise and technical knowledge, you will partner with and contribute to the enhancement of the overall Cyber Security posture and resilience of our clients, collaborating with cross-functional teams … and resource allocation approaches. Conduct comprehensive risk assessments and develop mitigation strategies to address potential security threats and project risks. Utilise industry frameworks and standards to ensure robust risk management practices. Oversee and manage projects end-to-end in line with the Association for Project Management guidance. Manage projects such as Security Framework Audits and Implementation, Cyber Strategy … Cyber Risk Management, Data Privacy, Offensive Security, Security Architecture, and Cloud Security & Engineering. Lead the onboarding process for Managed Security Services including Managed Detection & Response, Cyber Threat Intelligence, and VulnerabilityManagement Services. Collaborate with technical teams to ensure seamless integration of managed services within clients' environments. Build and maintain strong relationships with internal teams and clients, serving More ❯
candidate will have a strong technical background, leadership experience, and a proactive approach to managing cyber risks in a dynamic technology environment. What You'll Do: Leadership and Team Management: Lead, mentor, and manage a team of Security Engineers, fostering a culture of collaboration, innovation, and continuous improvement. Define team goals, assign responsibilities, and ensure the successful execution of … security initiatives. Conduct regular performance reviews and provide professional development opportunities for team members. Ability to work across the organisation and communicate at all levels Security Posture Management: Develop and maintain a comprehensive security posture management program to proactively identify and address vulnerabilities. Continuously assess the organization's security posture through vulnerability assessments, penetration testing, and threat … modelling. Collaborate with cross-functional teams to implement security best practices and ensure compliance with industry standards and regulations. Cyber Exposure Risk Management: Identify, analyse, and prioritize cyber exposure risks across the organization's infrastructure, applications, and systems. Develop and implement strategies to mitigate risks, including patch management, configuration management, and secure coding practices. Monitor and respond More ❯
infrastructure. You'll be hands-on, designing, implementing, and managing top-notch security solutions across all our cloud environments. You'll also play a key part in developing our vulnerabilitymanagement program, working closely with our operational support, infrastructure, and development teams. Plus, you'll be right in the thick of security event monitoring, threat intelligence, and incident … management - keeping us one step ahead! What you'll be doing: Delivering SOC Capabilities: You'll be a key team member in delivering ongoing Security Operations Centre (SOC) capabilities for the business. Driving Automation: You'll push for security automation wherever possible and play a big part in evolving our security tooling and services. Policy & Standards: You'll champion … firewalls, WAF, anti-virus, and O365 compliance & security centre . Familiarity with NIST (CSF Framework 2.0), ISO 27001, PCI-DSS, and GDPR . Experience operating and managing SIEM solutions , vulnerabilitymanagement tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and/or SecOps oriented teams More ❯
by design, resilient to threats, and aligned with best-in-class standards (including ISO 27001 and SOC 2). You'll play a key role in monitoring, incident response, vulnerabilitymanagement, and secure DevOps practices-helping us maintain customer trust and regulatory compliance as we scale. What You'll Do Monitor systems and infrastructure for potential vulnerabilities, threats … and breaches Own and improve incident detection, response, and recovery processes Implement and manage SIEM, intrusion detection, vulnerability scanners, and other security tooling Collaborate with DevOps and Engineering to embed security into CI/CD pipelines and cloud infrastructure (Azure) Manage processes for regular vulnerability assessments and penetration testing (internal or third-party) Support internal audits, ISO … best practices What We're Looking For Extensive experience in security operations roles, preferably in SaaS or cloud-native environments Proficiency in security monitoring tools such as SIEM, EDR, vulnerabilitymanagement tools, and log aggregation platforms Strong knowledge of security frameworks, standards, and best practices (ISO 27001, SOC 2, GDPR) Proven incident response, threat detection, and investigation experience More ❯
GCP) Hands-on with IaC tools (Terraform, Bicep, CloudFormation) and CI/CD pipelines Proficient in Python or Bash scripting Knowledge of cloud security best practices (e.g. IAM, encryption, vulnerabilitymanagement) Familiar with Docker, Kubernetes, serverless, and event-driven architectures Comfortable working with both SQL and NoSQL databases A passion for engineering excellence and staying on top of … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
M Group Telecom
the nature of the on call, you must hold a valid drivers licence with reasonable means to a vehicle. What will you be doing? Youll have day to day management of the OSS suite of services and underlying infrastructure as part of a 2nd Line team. Youll be proactive and Reactive within Incident Management Youll have user Access … Management & VulnerabilityManagement System Governance to ensure the effective operation of the services Providing Out of Hours Support via an On-Call Rota. What youll bring Youll bring experiencewith supporting OSS applications from a 2nd and 3rd Line level Youll have the experience of working with developers/vendors implementing fixes or improvements to systems Experience of More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson McCade
cyber security into business operations Work across a range of industries and environments to solve real-world security challenges Key Skills & Experience Cyber Security: Experience in cyber strategy, risk management, security architecture, transformation programmes, and regulatory compliance Knowledge of relevant standards: NIST CSF, ISO27001, NCSC CAF, GDPR, NIS2, etc. Certifications such as CISSP, CISM, CISA, M.Inst.ISP, or MSc in … Cyber Security Hands-on experience in areas like GRC, cyber threat management, vulnerabilitymanagement Strong communication skills – written and verbal – with the ability to present to both technical and business stakeholders Consulting: Proven project delivery using Agile and Waterfall methodologies Team leadership across on-site and remote teams Strong client stakeholder engagement from technical teams to board More ❯
cyber security into business operations Work across a range of industries and environments to solve real-world security challenges Key Skills & Experience Cyber Security: Experience in cyber strategy, risk management, security architecture, transformation programmes, and regulatory compliance Knowledge of relevant standards: NIST CSF, ISO27001, NCSC CAF, GDPR, NIS2, etc. Certifications such as CISSP, CISM, CISA, M.Inst.ISP, or MSc in … Cyber Security Hands-on experience in areas like GRC, cyber threat management, vulnerabilitymanagement Strong communication skills – written and verbal – with the ability to present to both technical and business stakeholders Consulting: Proven project delivery using Agile and Waterfall methodologies Team leadership across on-site and remote teams Strong client stakeholder engagement from technical teams to board More ❯
or contribute to cyber engagements across various sectors, adapting to different organisational cultures and regulatory contexts. Core Cyber Security Skills: Strong expertise in areas such as cyber strategy, risk management, cyber maturity assessments, security architecture, transformation programmes, and regulatory compliance. Familiarity with leading frameworks and standards including NIST CSF, ISO27001, NCSC CAF, GDPR, NIS2, and CRI2.0. Hands-on experience … and assessments in varied environments. Relevant certifications such as CISSP, CISM, CISA, M.Inst.ISP, or a postgraduate qualification (e.g. MSc in Cyber Security). Practical knowledge in domains like threat management, vulnerabilitymanagement, cyber GRC, cyber architecture, and cyber assurance. Detail-oriented with strong analytical and problem-solving capabilities. Excellent written and verbal communication skills, including stakeholder reporting More ❯
ll Be Doing Conducting Cyber Security Assessments and audits across Microsoft 365 and Azure environments Performing Cyber Essentials and Cyber Essentials PLUS audits in line with IASME standards Delivering vulnerability assessments, remediation, and penetration testing across infrastructure, networks, and applications Contributing to client reporting, assurance audits, and scoping security solutions Acting as an escalation point for security-related technical … work in a Managed Service Provider (MSP) environment A Strong understanding of Microsoft 365 & Azure Cloud Experience with technical audits and offensive security tools (e.g. Kali Linux) Familiarity with vulnerabilitymanagement tools like Tenable or Qualys OSCP (Offensive Security Certified Professional) status Microsoft SC-200 and AZ-500 certifications Experience with Microsoft Defender suite (XDR, Endpoint, Cloud, Office … Good knowledge of Microsoft Sentinel SIEM Expertise with Azure Firewalls and Email Security Solutions (Mimecast, Egress) Experience with Endpoint Detection & Response (SentinelOne) and Vulnerabilitymanagement tools (e.g. Tenable, Qualys) You will be part of a recognised, established and fast-growing MSP, regularly ranked among the best UK tech companies to work for. You will work alongside a collaborative More ❯
secure cloud environments that allow the best companies to move faster. SUMMARY Wiz is looking for a Security Engineer for Product & Production Infrastructure who has experience performing security reviews, vulnerabilitymanagement, and detection and response operations in cloud-native environments. You'll get to collaborate with our software development and DevOps teams to secure Wiz's products, CI … modeling and security review exercises across Wiz's production and CI/CD environments - identifying and mitigating risks in our products and the cloud services that support them Drive vulnerabilitymanagement and remediation efforts - prioritizing issues, implementing mitigations, and designing strategic preventative controls Extend our detection and response capabilities - building scalable solutions to identify malicious activity, triage alerts … Azure and GCP) Kubernetes (AWS EKS) and container infrastructure IAM and managing cloud identities at-scale Secure development and application of IAC solutions (Terraform, Helm) Cloud-native observability and management tools Development experience in Go, Python and Rust PREFERRED QUALIFICATIONS Bachelor's degree in computer science or a related field and/or candidates with equivalent job experience in More ❯
Peterborough, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
The One Group
/3 days a week) Rate: £465 per day inside IR35 Start Date: ASAP What's the role? This is a technically diverse Security Analyst position covering areas like: Vulnerabilitymanagement (Tenable.io or equivalent) SIEM monitoring (Elastic preferred) and log analysis Incident detection, triage, and escalation (CrowdStrike or similar EDR) Compliance audits (ISO27001, STIGs) Infrastructure hardening and security … playbooks, and security runbooks Who are we looking for? Ideal candidates will bring: At least 2 years' experience in a Security Analyst or SOC-type role Strong understanding of vulnerabilitymanagement, EDR/SIEM alert triage, and incident response Experience with compliance frameworks (ISO 27001, NIST, etc.) A working knowledge of VMware, AD, Windows Server, Linux Comfort handling More ❯
in ensuring the security and integrity of the infrastructure, which includes the data centers, cloud environments, networks, and office/branch assets. This is an exciting opportunity to lead vulnerability assessments, drive remediation efforts, and enforce secure builds and configurations across our estate. Key Responsibilities: Lead the implementation of Infrastructure & Cloud security strategies, policies, controls, services, metrics, and compliance. … Oversee and support vulnerabilitymanagement efforts across both on-premise and cloud environments. Contribute to the strategy, policy, controls, services, and metrics related to network security, including WAF, DDoS protection, and firewalls. Experience & Skills: Primary Expertise: Vulnerabilitymanagement within infrastructure environments, with proven experience leading teams. Secondary Expertise: Knowledge and experience in network security, including firewalls More ❯