Vulnerability Management Jobs in the UK

1 to 25 of 143 Vulnerability Management Jobs in the UK

Security Engineer - Azure - Hybrid Work Available - Permanent

Liverpool, Merseyside, United Kingdom
Hybrid / WFH Options
Digital Gurus Recruitment Limited
services, systems and infrastructure for signs of failure or errors, raising IT incidents as needed. Ensure timely resolution in line with SLAs and KPIs. Vulnerability and Threat Management: Take ownership of vulnerability and threat management across IT systems. Monitor changes in threats and respond appropriately, implementing … remediation activities and ensuring compliance with policies. Policy Compliance: Ensure compliance with defined security policies, providing vulnerability and compliance reports to the InfoSec teams. User Access and Software Review: Assist with the review of user access requests and the use of new software or hardware, reporting findings to the … team initiatives and projects, providing hands-on assistance and technical expertise. Skills Technical Proficiency: Hands-on experience with Azure cloud security tools and infrastructure management, including M365, IAM, RBAC, Sentinel, Defender for Cloud, Secure Score and Log Monitoring. Incident Management: Ability to identify, respond to and manage security more »
Employment Type: Permanent
Salary: GBP 55,000 Annual
Posted:

Senior Security Manager

United Kingdom
Hybrid / WFH Options
Raytheon
including IPSA, FSC and IVCO and in line with Raytheon policies, strategy, applicable contractual commitments, legal requirements and industry good practice. Ensuring personnel security management compliance for employees and contractors including correct vetting procedures and the security management of visitors and contractors to meet HMG, UKSV and IPSA … risk and threat assessments including regular practical exercises to assure effectiveness of measures to meet FSC and IPSA requirements, proactively managing threat detection and vulnerability management and driving the required remediation. Creation and maintenance of security culture in line with UK Government Security requirements providing regular reports and … critical metrics that demonstrate the compliance and effectiveness of security operations. Implementation and management of an effective Raytheon UK incident management system, developing strong internal and external relationships to promote the early identification and resolution of incidents and lead on any associated investigations. Implementation and management of more »
Employment Type: Permanent, Work From Home
Posted:

Infrastructure Engineer - Identity and Access Management

Blackpool, Lancashire, North West, United Kingdom
Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability more »
Employment Type: Permanent, Work From Home
Salary: £45,000
Posted:

Cyber Engineer, PAM Cyberark 2 days PW Reading - £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What We more »
Employment Type: Permanent
Salary: £40,000
Posted:

Information Security Lead - Vulnerability Management

London, England, United Kingdom
Hybrid / WFH Options
Starling Bank
from home, that's to be agreed upon between you and your manager. About the Role We are seeking a highly motivated and experienced Vulnerability Manager to lead a growing vulnerability management team. A successful candidate will work with the team to analyse emerging vulnerabilities provided by … threat intelligence sources and penetration testing. The vulnerability manager will collaborate with various technology and engineering teams to share vulnerability findings, provide guidance, and assist through the remediation process. This person will help present this information in a simple digestible format, and coordinate remediation and mitigation efforts with … teams across remote and office locations. There will be opportunities to guide continual improvement of the vulnerability management process. Responsibilities Lead a team of information security professionals to: Assess, investigate and provide guidance on emerging vulnerabilities, incorporating information from threat intelligence sources, internal software and infrastructure scans. Collate more »
Posted:

Tenable Nessus Vulnerability Management Scanning Engineer

England, United Kingdom
Hybrid / WFH Options
GlobalLogic
Tenable Nessus Vulnerability Management Scanning Engineer GlobalLogic have a new role for an Vulnerability Management Scanning Enginee r with Tenable Nessus expertise. This role is working INSIDE IR35 for an initial 6 months and will be a Hybrid working pattern, 2 days per week onsite at … either Cheshire or Glasgow offices. Any Banking or financial services experience would be an advantage. The core skill is Tenable Nessus Vulnerability Management, and we are looking for someone who can be responsible for maintaining the Tenable product suite and ensure meeting scanning coverage across the organisation .The … ideal candidatehas the following skills and expertise: years of experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues years of experience with performing systems administration in Windows, Linux, VMware environments, including performing troubleshooting, installation or configuration more »
Posted:

Cybersecurity Senior Engineer

Greater London, England, United Kingdom
McDermott International, Ltd
including the close cycles (month-end, quarter & year-end), support of all subledgers and the GL. Experience 5+ years of experience with threat and vulnerability management (TVM) program and operations 3+ years of experience working with threat intelligence feeds and IOCs Education High School Diploma w/… of information security experience Additional 10 years of IT experience 7+ years in an information security role 5+ years of experience with threat and vulnerability management program and operations 3+ years of experience working with threat intelligence feeds and IOCs 3+ years of experience in a security engineer … role 3+ experience with cloud vulnerabilities 2+ years of experience with endpoint protection tools 2+ years of experience with security information and event management (SIEM) tools 1+ years of experience with perimeter security Primary Functions Operate within the global Cybersecurity Team within the Information Technology department Ensure global alignment more »
Posted:

Cyber Security Vulnerability Manager

Cardiff, Wales, United Kingdom
Hybrid / WFH Options
Intaso
Interviews available immediately Intaso’s long standing client are seeking a dynamic individual to join their Security Operations team as the Security Vulnerability Manager, a pivotal role within their organization. This position will focus on identifying, monitoring, analysing, and facilitating the remediation of vulnerabilities across their systems. Key Responsibilities … Develop and document a comprehensive vulnerability management strategy aligned with stakeholder and business need Create intuitive reporting and dashboarding mechanisms to convey threat and risk profiles associated with vulnerabilities to stakeholders Ensure regular vulnerability scans cover all IT and OT assets, maintaining up-to-date coverage. Collaborate … with IT and OT asset owners to execute vulnerability and compliance scans in a controlled manner. Partner with both technical and non-technical stakeholders to devise effective mitigation plans for identified vulnerabilities. Lead cross-functional teams in responding to high-risk or complex vulnerabilities, leveraging technical expertise. Stay informed more »
Posted:

Vulnerability Management Installation and configuration Engineer

England, United Kingdom
Hybrid / WFH Options
GlobalLogic
Vulnerability Management (TVM) Installation and configuration Engineer GlobalLogic have a new role for an Installation and configuration Enginee r with Tenable Nessus expertise ideally. This role is working INSIDE IR35 for an initial 6 months and will be a Hybrid working pattern, 2 days per week onsite at … to someone with either CyberArk or Splunk and we are looking for someone who has the following skills and expertise: years of experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues in the design and implementation … controls to secure systems, applications, network, or infrastructure services experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. understanding of TCP/IP networking concepts and DNS./Unix/Windows Operating systems experience years of related more »
Posted:

Senior Information Technology Engineer

High Wycombe, England, United Kingdom
Arden Resourcing Limited
role will be a hands-on senior role within the organisation to implement and manage the entire companies’ internal infrastructure including desktop security, endpoint management, vulnerability management, asset management and working to provide security operations. The role will involve control and deployment of all processes for more »
Posted:

Infrastructure Engineer (Security Career Development Opportunity)

Brighton, England, United Kingdom
JNC Recruitment Limited
systems and applications Responding to incidents and delivering fixes in line with SLAs and corporate processes Technical experience required includes: Comprehensive experience in SCCM management and administration Active Directory administration including DNS, DHCP, PKI and Group Policy Strong Microsoft Windows Server 2008 – 2022 Administration in a hybrid cloud environment … and Endpoint Manager PowerShell scripting ITIL Networking Fundamentals - Palo Alto and Cisco Bonus extra skills include: MS Defender/MS Defender for Cloud Tenable Vulnerability Management, or other Vulnerability Management tool Knowledge of monitoring tools such as Splunk, Netcrunch or Solarwinds (or others) This opportunity would … suit an engineer with an inherent interest in IT Security, as the role will develop the post holder's Monitoring and Vulnerabilty Management skills on the job. The role is available on a hybrid basis remotely and from the offices in easy to get to Central Brighton 1 day more »
Posted:

Senior Technology Risk Analyst (ISAE 3000 / SOC 2)

London, England, United Kingdom
Mastercard
have experience in IT compliance or IT audit; this assumes an advanced understanding of IT controls in a technical environment, including network topologies and management, application interfacing, vulnerability management, system development lifecycle, database management and project management - You have a Bachelor’s or Master’s … that encourages knowledge of, respect for, and the development of skills to engage with those of other cultures and backgrounds - Proficiency in Linux system management and database management, a plus - Professional certification like CISSP/CISA/CRISC/CIPP or similar, a plus - Familiarity with the financial more »
Posted:

Cyber Security Analyst

United Kingdom
Hybrid / WFH Options
Franklin Fitch
measures, monitoring for security incidents, and responding promptly to security breaches. As a Cyber Security Analyst you will be gain exposure across: Security Infrastructure Vulnerability Management Incident Response Ideally you will have experience across: Security principles, techniques, and protocols Endpoints, servers, infrastructure and networking technologies Experience in supporting … security systems, including vulnerability management, SIEM, DLP,SOAR, EDR solution, Network Firewalls etc The client is based in London, however will consider candidates on a remote basis. Sound interesting? Click apply now and I will be in touch to discuss further more »
Posted:

Senior Security Analyst

Welwyn Garden City, England, United Kingdom
Tesco
Tesco Technology are looking for a Senior Security Analyst reporting into the Vulnerability Management team. This is an exciting opportunity for a highly motivated security focused individual to join our expanding organisation. The scale and complexity of Tesco creates a huge opportunity for someone to apply their existing … public cloud environments. Following our Business Code of Conduct and always acting with integrity and due diligence and have these specific risk responsibilities: Maintaining vulnerability scanning platforms to identify and analyse vulnerabilities. Taking a risk-based approach to prioritise remediation efforts. Working with engineering teams to remediate issues. Building … security incidents and reporting about relevant security threats to contribute to our internal detection engineering programme. Work alongside our analysts to upskill them in Vulnerability Management and look for patterns and issues that can be fixed centrally. POC assessments from our active Bug Bounty Program. You will need more »
Posted:

Security Operations Center Analyst

Birmingham, England, United Kingdom
Montash
Security Review (CSR) Compliant Using expert knowledge of Cybersecurity Frameworks and Standards Using legal and regulatory understanding to provide guidance to wider teams Personnel Management & in-house training Stakeholder engagement Management Analysis of vulnerability management tools reverse engineering rule engineering & Crisis Management (Alert Triage) Required … Purple Teaming Understanding of computer forensics History with use of Firewalls and IDS/IPS devices Proven ability with SIEM (Security Information and Event Management) technologies Experience in networking, routing, and switching Use of frameworks such as NIST, ISO 27001,MITRE ATT&CK and CIS. Familiarity with cybersecurity laws more »
Posted:

Information Security Assistant Manager - 18903

London Area, United Kingdom
Saxton Leigh
of the state of information security and cybersecurity and provide periodic reports (at least annually) on the state of information security to/Top management Adopt, implement and update Cybersecurity policies, rules, processes and procedures in line with Head Office regulatory Framework In reporting to the Top Management … the Group model. Work with information owners in business units to determine appropriate security objectives Monitor network activity for malicious activity Monitor and evaluates vulnerability reports, vendor hot-fixes, and vendor patches for applicability to deployed technologies Monitor the process of creating, changing, or removing user access across all … maintained and approved Responsible for the Cybersecurity and Business Continuity Training Programs EXPERIENCE REQUIRED: Minimum 2-3 years in the cybersecurity and business continuity management environment, preferably in a Financial Institution Experience in developing and Cybersecurity awareness programs Bachelor's in computer science, Information Technology or related field Experience more »
Posted:

Head of Information Security

Reading, England, United Kingdom
Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
Posted:

Technical Services Manager

Leeds, England, United Kingdom
Talion
and Managed Services. Our suite of services blends together best-in-breed technologies to provide real time 24×7 monitoring, triage, remediation, threat assessment, vulnerability management, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our Security Operations Centre (SOC … levels of service. Collaboration with the Customer at both technical and business levels to underpin the activities of sub-contractors or service provisioning teams. Management of small enhancement projects utilising capabilities within the service team. Management of the handling of incidents, problems and change in their area of … of performance, collection of performance data and investigation of problems and trends. Resolution or escalation of problems, implementation of service improvement actions and programmes, management of these to agreed timelines and ownership of communication to both the Customer and internal management teams. Provision of feedback on service portfolio more »
Posted:

Senior Security Engineer

London Area, United Kingdom
Hybrid / WFH Options
Cognitive Group | Part of the Focus Cloud Group
tools such as Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerability management, and penetration testing. Risk Management and Compliance Identify and assess security risks and develop mitigation strategies. Ensure compliance with relevant security more »
Posted:

Information & Cyber Security Analyst - Financial Services - £50,000-£70,000 + Bonus

London Area, United Kingdom
Hybrid / WFH Options
Hunter Bond
and compliance Detecting any issues or security breaches across global infrastructure Monitoring of devices and infrastructure, including reporting Investigating potential threats and issues Risk management and analysis Utilising tooling such as packet inspection and security forensics to resolve and report issues Security & Best Practice Working with various other Security … Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threat management frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerability management You will advise on Security best practices, and act more »
Posted:

Senior Security Engineer

London Area, United Kingdom
Caspian One
. Ability to develop and implement strategies for compliance with data protection regulations. Knowledge and experience in security technologies such as EDR, SIEM, and Vulnerability Management is a plus. Relevant security certifications (CISSP, GCIA, CISM, etc.) and/or product certifications (Azure, Windows, AD, etc.) are desirable. This more »
Posted:

Security Analyst

Hampshire, England, United Kingdom
Shaw Daniels Solutions
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and … monitor for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular Vulnerability Scanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. … Asses the urgency and severity of incidents. Determine whether an incident requires immediate action or further investigation. Escalate incidents to higher tiers when necessary. Vulnerability Scanning: scan systems for vulnerabilities. and manage vulnerabilities discovered during scans. Security Tool Management: Configure and manage security tools (e.g., SIEM, IDS/ more »
Posted:

Business Continuity Lead

London Area, United Kingdom
Acumin
s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH, CEH, or OSCP. Proficiency in SIEM Platforms, vulnerability management tools, and incident management processes. Experience in managing security functions or SOC capabilities. Strong analytical skills to analyze security monitoring data more »
Posted:

Cyber Security IT Analyst

England, United Kingdom
Hybrid / WFH Options
Larbey Evans
latest security principles, techniques, and protocols Detailed technical knowledge related to endpoints, servers, infrastructure and networking technologies Strong experience in supporting security systems, including vulnerability management, SIEM, DLP,SOAR, EDR solution, Network Firewalls etc. Working knowledge of IT processes (i.e., ITIL) including incident, problem, defect, change and release … management The Cyber Security IT Analyst requirements: 3+ years’ experience in Cyber Security IT operations (law firm preferable, professional services advantageous) Bachelor’s degree or higher in Computer Science or Information Security (essential) Advanced ability to organize, prioritize, coordinate, and work as part of a team Excellent written and more »
Posted:

Senior Cyber Security Operations (SOC Lead)

United Kingdom
Milestone Technologies, Inc
on different aspects such as source/destination addresses, usernames, and process names) Demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerability management A sound understanding of TCP/IP and networking concepts Understanding of network design principles with and knowledge of the OSI model. more »
Posted:
Vulnerability Management
10th Percentile
£40,000
25th Percentile
£50,750
Median
£65,000
75th Percentile
£85,313
90th Percentile
£97,500