Vulnerability Management Jobs in the UK

101 to 125 of 329 Vulnerability Management Jobs in the UK

Junior SOC Analyst

Farnborough, Hampshire, United Kingdom
Sixworks
established playbooks Escalating complex incidents to Tier 2 Incident Response Teams Reviewing and developing security controls in a growing technical environment Triaging and reviewing vulnerability scanning reports, providing feedback to technical teams Reviewing secure configurations and feeding back for remediations Generating recurring security reports for stakeholders Providing feedback for … a degree in Cyber Security, Computer Science, Networks, etc. Professional qualifications from organizations like CompTIA, ISACA, etc. Technical qualifications such as cloud computing, SIEM, vulnerability management, etc. Experience (Nice to have) Understanding of concepts like cloud computing, incident management, risk management, information security (CIA), phishing, ransomware … and skilled IT professionals, committed to digital innovation. We excel in areas like Secure-by-Design, cloud computing, network design, rapid application development, cyber vulnerability mitigation, and intelligence systems. We offer independent consultancy and champion open-source technologies. A word on UK Security Clearance Due to the secure nature More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Risk Specialist - VP

London Area, United Kingdom
Hybrid / WFH Options
Spencer Rose
consultation on remediation approaches to address gaps and continue ongoing monitoring of remediation, re-assess until reduced to an acceptable level. Supporting Cybersecurity Risk Management strategies based on security findings and observations. Including informing improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all … requirements. Provide assurance to stakeholders through detailed reporting and metrics. Experience/Skills required: Minimum of 5 years' experience in a Cyber Security Risk Management capacity Experience of the testing of Security controls is essential Financial and/or Banking industry experience essential Experience in Managing security risk across … and written communication skills to convey complex technical information clearly and effectively. Presenting data insights to non-technical stakeholders Strong understanding of security risk management and taxonomy principles, to reduce risk to an acceptable level. Knowledge of vulnerability management and incident management practices. Experience with GRC More ❯
Posted:

Cyber Security Risk Specialist - VP

london, south east england, united kingdom
Hybrid / WFH Options
Spencer Rose
consultation on remediation approaches to address gaps and continue ongoing monitoring of remediation, re-assess until reduced to an acceptable level. Supporting Cybersecurity Risk Management strategies based on security findings and observations. Including informing improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all … requirements. Provide assurance to stakeholders through detailed reporting and metrics. Experience/Skills required: Minimum of 5 years' experience in a Cyber Security Risk Management capacity Experience of the testing of Security controls is essential Financial and/or Banking industry experience essential Experience in Managing security risk across … and written communication skills to convey complex technical information clearly and effectively. Presenting data insights to non-technical stakeholders Strong understanding of security risk management and taxonomy principles, to reduce risk to an acceptable level. Knowledge of vulnerability management and incident management practices. Experience with GRC More ❯
Posted:

Security Governance, Risk and Assurance Specialist

London Area, United Kingdom
Hybrid / WFH Options
CLS Group
in which everyone is encouraged to be open and forward-thinking. Job information: Functional title - AVP, IT Security Specialist Department – Security Governance and Risk Management Corporate level – Associate Vice President Report to – Director of Security Location - London, onsite 2 days per week About the role: The individual will be … consultation on remediation approaches to address gaps and continue ongoing monitoring of remediation, re-assess until reduced to an acceptable level. Supporting Cybersecurity Risk Management strategies based on security findings and observations. Including informing improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all … written communication skills to convey complex technical information clearly and effectively. Presenting data insights to non-technical stakeholders Base level understanding of security risk management and taxonomy principles, to reduce risk to an acceptable level. Knowledge of vulnerability management and incident management practices. Ability to learn More ❯
Posted:

Security Governance, Risk and Assurance Specialist

london, south east england, united kingdom
Hybrid / WFH Options
CLS Group
in which everyone is encouraged to be open and forward-thinking. Job information: Functional title - AVP, IT Security Specialist Department – Security Governance and Risk Management Corporate level – Associate Vice President Report to – Director of Security Location - London, onsite 2 days per week About the role: The individual will be … consultation on remediation approaches to address gaps and continue ongoing monitoring of remediation, re-assess until reduced to an acceptable level. Supporting Cybersecurity Risk Management strategies based on security findings and observations. Including informing improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all … written communication skills to convey complex technical information clearly and effectively. Presenting data insights to non-technical stakeholders Base level understanding of security risk management and taxonomy principles, to reduce risk to an acceptable level. Knowledge of vulnerability management and incident management practices. Ability to learn More ❯
Posted:

Global CISO (Chief Information Security Officer)

Rochester, Kent, United Kingdom
Rochester Executive
and executing a cybersecurity roadmap to establish a robust security posture and support the company's long-term objectives. Position - The role: The cybersecurity management system plays a pivotal role in safeguarding the organization's business assets and maintaining its resilience through proactive risk management, compliance adherence, and … and the board of directors Monitor and report IT-Security Key Performance Indicators (KPIs) to track effectiveness and identify areas for improvement Team & Budget Management Manage the company's Cyber Security team across 7 countries, providing them with strategic direction and leadership Manage the budget for the information security … function, monitoring and reporting discrepancies Risk Management, Security Architecture & Security Operations Identify, assess, and mitigate cybersecurity risks associated with company operations, data assets, and technologies, including intellectual property protection and regulatory compliance Conduct regular security audits and handle any breaches or security incidents that arise. Lead incident response efforts More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IP Network Engineer

Devon, United Kingdom
Search-Select LTD
Our client seeks a IP Network Engineer to join their team. Role Profile: To be responsible for the engineering provision, development, management, and maintenance of the IP & MPLS networks, Corporate LAN, broadband RADIUS & BNGs, DDoS protection and related systems and platforms. To propose and develop appropriate operational, maintenance and … testing and implementation of enhancements and new technologies for IP & MPLS networks Implement and evaluate IP & MPLS related solutions/technologies Liaise with Product Management, Service Management and other internal teams as required Assist the management team, as required, with the preparation of performance, growth, and budgeting … strategy is implemented. If/when potential weaknesses, attacks, intrusions, unusual, unauthorised or illegal activity are identified, assist in the implementation of mitigations, including vulnerability management Investigate security alerts and provide incident response within the IP domain Support as required, from within the IP domain, integration with the More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Engineer

London, United Kingdom
Hybrid / WFH Options
NICE
availability of our systems and data. How will you make an impact? Security Tooling: Deploy, maintain, integrate, and perform initial configuration of security tools. Vulnerability Management: Coordinate and conduct regular security assessments, penetration testing, and vulnerability scans to identify and address security weaknesses proactively. Incident Response: Lead … activities, and respond to security events in real-time. Implement and maintain security tools and technologies to enhance our security posture. Identity and Access Management: Manage user access controls, authentication mechanisms, and identity management systems to ensure appropriate levels of access and privilege. Have you got what it More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Analyst - Nottingham City

United Kingdom, UK
Hybrid / WFH Options
Nottingham Building Society
environments using SIEM and EDR tools. Incident Investigation: Investigate security incidents and support the full incident response lifecycle, including documentation and root cause analysis. Vulnerability Assessments: Conduct regular vulnerability assessments and collaborate with IT teams to ensure timely remediation. Regulatory Compliance: Support compliance with regulatory requirements (FCA, PRA … trends, and regulatory changes affecting the financial sector.About you: - Security Tools Expertise: Strong understanding of security tools (SIEM, EDR, firewalls, IDS/IPS) and vulnerability management processes. Technical Knowledge: Solid grasp of networking, system administration, and secure configurations. Standards Familiarity: Familiarity with standards and frameworks such as ISO More ❯
Posted:

Cyber Analyst

Nottingham, Nottinghamshire, United Kingdom
Hybrid / WFH Options
The Nottingham
environments using SIEM and EDR tools. Incident Investigation: Investigate security incidents and support the full incident response lifecycle, including documentation and root cause analysis. Vulnerability Assessments: Conduct regular vulnerability assessments and collaborate with IT teams to ensure timely remediation. Regulatory Compliance: Support compliance with regulatory requirements (FCA, PRA … and regulatory changes affecting the financial sector. About you: Security Tools Expertise: Strong understanding of security tools (SIEM, EDR, firewalls, IDS/IPS) and vulnerability management processes. Technical Knowledge: Solid grasp of networking, system administration, and secure configurations. Standards Familiarity: Familiarity with standards and frameworks such as ISO More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

1st Line Operational Risk Director - Product, Delivery & Group Functions

London, United Kingdom
Hispanic Alliance for Career Enhancement
their greatest potential. Title and Summary 1st Line Operational Risk Director - Product, Delivery & Group Functions Director for Product, Delivery and Group Functions Operational Risk Management Job Description Summary Background The company • Vocalink Limited (VLL) is a technology-driven payments company with a unique and unrivalled position within the UK … scale as well as access to innovative technologies and a global talent base. The Team • VLL operates a 3 Lines of Defence (3LOD) risk management model. • This role is within the 1st Line Risk & Control Team, in the 1st Line of Defence (1LOD). • The Team acts as a … risk partner to the 1LOD as well as providing independent oversight and challenge where required. • The Team: ensures 1LOD functions comply with VLL risk management policies and standards; supports embedding of robust risk management practices into BAU operations; drives delivery of VLL's risk transformation agenda in the More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IP Network Engineer

Isle of Man, United Kingdom
Orchard Recruitment Ltd
has now arisen within their team for an experienced IP Network Engineer. In this role you will be responsible for the engineering provision, development, management, and maintenance of the company's IP & MPLS networks, Corporate LAN, broadband RADIUS & BNGs, DDoS protection and related systems and platforms and to propose … testing and implementation of enhancements and new technologies for IP & MPLS networks Implement and evaluate IP & MPLS related solutions and technologies Liaise with Product Management, Service Management and other internal teams as required Assist the management team, as required, with the preparation of performance, growth, and budgeting … the security strategy is implemented Where potential weaknesses, attacks, intrusions, unusual, unauthorised or illegal activity are identified, assist in the implementation of mitigations, including vulnerability management Investigate security alerts and provide incident response within the IP domain Support as required, from within the IP domain, integration with the More ❯
Employment Type: Permanent
Salary: GBP 55,000 - 65,000 Annual
Posted:

IP Network Engineer

Douglas, Isle of Man, United Kingdom
Orchard Recruitment Ltd
has now arisen within their team for an experienced IP Network Engineer. In this role you will be responsible for the engineering provision, development, management, and maintenance of the company's IP & MPLS networks, Corporate LAN, broadband RADIUS & BNGs, DDoS protection and related systems and platforms and to propose … testing and implementation of enhancements and new technologies for IP & MPLS networks Implement and evaluate IP & MPLS related solutions and technologies Liaise with Product Management, Service Management and other internal teams as required Assist the management team, as required, with the preparation of performance, growth, and budgeting … the security strategy is implemented Where potential weaknesses, attacks, intrusions, unusual, unauthorised or illegal activity are identified, assist in the implementation of mitigations, including vulnerability management Investigate security alerts and provide incident response within the IP domain Support as required, from within the IP domain, integration with the More ❯
Employment Type: Permanent
Salary: £55000 - £65000/annum Plus benefits package
Posted:

Cyber Security Analyst

London, United Kingdom
Boston Hale
Incident Response: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. Vulnerability Management Tools: Conduct regular vulnerability assessments, prioritize and remediate issues, and stay updated on emerging threats. Policy & Compliance Support: Help develop and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

DevSecOps Engineer

London, United Kingdom
Hybrid / WFH Options
Instanda, Inc
secured by configuring appropriate policies, scanning for vulnerabilities, and managing runtime security. Cloud Security: Design, implement, and manage security across Azure, focusing on identity management, data protection, and network security. Vulnerability Management: Identify and prioritize vulnerabilities across infrastructure and applications, and collaborate with teams to remediate them …/CD practices Familiarity with Azure services, including Azure Defender, Azure Monitor, and Azure Policy. Experience with security and compliance scanning tools such as vulnerability scanners, intrusion detection systems, & security information & event management (SIEM) solutions. Knowledge of container management with Azure Container Registry. Experience in SAST, DAST More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Global Cyber Security Manager

London, United Kingdom
Hybrid / WFH Options
Oritain
function, managing people, processes, and tools while ensuring the business is "Secure by Design." Identify and remediate Cyber risks across the organisation, focusing on vulnerability management for all Oritain assets. Your Day-to-Day Responsibilities Leadership & Strategy Lead the Cybersecurity team and assure the CIO, ELT, and board … managing automated scans like SCA, SAST, and DAST. Maintain a strong Cloud Security Posture by continuously improving infrastructure, processes, and policies. Risk & Compliance Own vulnerability and threat management, identify risks and work with stakeholders to ensure swift and effective remediation. Ensure ongoing compliance with industry standards such as … work across teams and integrate security into processes. Extensive Microsoft Azure Knowledge: Proven expertise in securing Azure environments, including: Serverless functions, Blob Storage, API Management, Cosmos DB, and SQL and Cloud networking architecture: VNets, application gateways, private and service endpoints, and firewalls. Secure Software Development: Deep experience implementing effective More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer

Manchester, Lancashire, United Kingdom
Hybrid / WFH Options
The MRJ Group
policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and controls … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory … a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Architects (DV Security Clearance)

London
CGI
frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management and More ❯
Employment Type: Permanent
Posted:

Security Architects (DV Security Clearance)

Bristol, South West
CGI
frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management and More ❯
Employment Type: Permanent
Posted:

GRC Lead

London Area, United Kingdom
BGC Group
risk, ensuring compliance with regulatory requirements, and maintaining corporate controls. This role will be primarily responsible for leading efforts related to third-party risk management, client due diligence, awareness training, and regulatory compliance. The ideal candidate will have a strong grasp of cybersecurity threats and hands-on experience. Key … Responsibilities Governance Risk and Compliance Advise project teams, application owners, infrastructure services, and other IT teams on information security controls, such as access management, incident handling, business continuity, system development lifecycle, threat and vulnerability management, and data protection. Identify and manage risks and vulnerabilities, providing strategic mitigation … recommendations. Continuously improve policies and procedures related to controls and operational processes. Develop and deliver precise and timely metrics and reports. Third-Party Risk Management: Conduct risk assessments of new and existing third-party vendors to ensure compliance with company policies and regulatory requirements. This includes reviewing security controls More ❯
Posted:

GRC Lead

london, south east england, united kingdom
BGC Group
risk, ensuring compliance with regulatory requirements, and maintaining corporate controls. This role will be primarily responsible for leading efforts related to third-party risk management, client due diligence, awareness training, and regulatory compliance. The ideal candidate will have a strong grasp of cybersecurity threats and hands-on experience. Key … Responsibilities Governance Risk and Compliance Advise project teams, application owners, infrastructure services, and other IT teams on information security controls, such as access management, incident handling, business continuity, system development lifecycle, threat and vulnerability management, and data protection. Identify and manage risks and vulnerabilities, providing strategic mitigation … recommendations. Continuously improve policies and procedures related to controls and operational processes. Develop and deliver precise and timely metrics and reports. Third-Party Risk Management: Conduct risk assessments of new and existing third-party vendors to ensure compliance with company policies and regulatory requirements. This includes reviewing security controls More ❯
Posted:

Security Architect

Thornbury, Gloucestershire, United Kingdom
Applicable Limited
to market' propositions and service offerings. Leading in the development and presentation of compelling client proposals collaborating with teams across our business. Strong stakeholder management and relationship building skills at senior levels that will enable consensus building in the shaping of secure client solutions Shaping, leading and delivering value … engagements. Providing security expertise across security standards and accreditations, measure and control the effectiveness of the security controls framework and maintain the Information Security Management System. Deriving and delivering documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies. Standards and … identification of identified risks and emerging cyber security vulnerabilities and threats. The subsequent analysis to quantify and lead risk mitigation plans Work with Service Management to ensure that partners and suppliers adhere to agreed standards, policies and verify/evidence appropriate compliance and security KPIs Work closely with 1st More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Architects

United Kingdom
CGI
frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management More ❯
Employment Type: Permanent
Posted:

Security Architects (DV Security Clearance)

Reading, South East
CGI
frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management More ❯
Employment Type: Permanent
Posted:

Cyber Security Engineer

Leeds, West Yorkshire, United Kingdom
Elevate Technology Group Ltd
make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly … Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security … global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Employment Type: Permanent
Salary: £55000 - £70000/annum
Posted:
Vulnerability Management
10th Percentile
£42,500
25th Percentile
£52,500
Median
£69,500
75th Percentile
£85,000
90th Percentile
£110,000