Barrow-In-Furness, Cumbria, Barrow in Furness, United Kingdom Hybrid / WFH Options
Experis
Role Title: Vulnerability Manager Duration: 6 month contract from start Location: Barrow-in-Furness, Hybrid, 3 days per week onsite Rate: up to £515.20 p/d Umbrella inside IR35 Clearance : Must Have Active SC Clearance And Be A Sole Uk National Key Skills/requirements Are you passionate about cybersecurity? Are you an excellent communicator with demonstrable experience … organisations? Would you relish putting these skills into practice by taking on a role within us to protect us and our clients from cyber threats? We are seeking a VulnerabilityManagement Lead with proven experience to join our cybersecurity team. Technical Skills Provide remediation recommendations; Monitor remediation activities; Report on the progress of remediation activities; Provide evidence on … with the client's third-party Pen Testing partners to understand and manage the findings of their testing Identify remediation dependencies and establish remediation prioritisation plans. Work with the vulnerability owners to provide recommendations for remediation, short term containment and/or short-term mitigating controls etc. Create relevant risk acceptance reports where remediation is not possible in the More ❯
Barrow-in-furness, Cumbria, United Kingdom Hybrid / WFH Options
Experis
Role Title: Vulnerability Manager Duration: 6 month contract from start Location: Barrow-in-Furness, Hybrid, 3 days per week onsite Rate: up to 515.20 p/d Umbrella inside IR35 Clearance : Must Have Active SC Clearance And Be A Sole Uk National Key Skills/requirements Are you passionate about cybersecurity? Are you an excellent communicator with demonstrable experience … organisations? Would you relish putting these skills into practice by taking on a role within us to protect us and our clients from cyber threats? We are seeking a VulnerabilityManagement Lead with proven experience to join our cybersecurity team. Technical Skills Provide remediation recommendations; Monitor remediation activities; Report on the progress of remediation activities; Provide evidence on … with the client's third-party Pen Testing partners to understand and manage the findings of their testing Identify remediation dependencies and establish remediation prioritisation plans. Work with the vulnerability owners to provide recommendations for remediation, short term containment and/or short-term mitigating controls etc. Create relevant risk acceptance reports where remediation is not possible in the More ❯
Reigate, Surrey, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
to improve cloud technologies including automation, IaC and security by design. There's a broad range of responsibilities including handling requests related to system administration, operations governance, Azure subscription management (they have 85 subscriptions), threat/vulnerabilitymanagement and incident response, you'll collaborate with engineering teams to evaluate and identify optimal cloud solutions providing subject matter … from home. About you: You have experience of designing, supporting, securing and building Azure cloud solutions; ideally with AZ-104 certification although it's not necessary You understand subscription management structures and have experience of managing Azure subscriptions You have a good knowledge of DevOps and IaC concepts You're familiar with cloud based security (e.g. ISO27001, NIST, CIS … OWASP, SOC2) and Identity and Access Management (IAM) within Azure You're familiar with ARM templates and/or Pulumi Ideally you will have automation and scripting (PowerShell or similar) skills You're collaborative with great communication skills What's in it for you: As a Senior Cloud Engineer you will earn a competitive package:Salary to £90k Bonus More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Ashdown Group
knowledge of the UK Telecoms Security Act would be advantageous to your application. You will develop and maintain the cyber security architecture and will have proven experience with compliance, vulnerabilitymanagement, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Anson McCade
a strategic and hands-on role where you'll be the key bridge between clients and operational teams, ensuring smooth delivery of security services, incident response coordination, and ongoing vulnerability management. If you’ve got a deep background in cybersecurity operations, excel under pressure, and know how to guide both clients and internal teams, this could be your next … remediation activities Managing client-facing service reviews (weekly/monthly), presenting clear reports and insights Supporting internal delivery teams to ensure SLAs are met and quality standards maintained Overseeing vulnerability scanning and prioritisation , and guiding clients on remediation Supporting and managing IDS/IPS configuration and updates Driving continuous improvement across service delivery processes What We’re Looking For … 10+ years in Security Operations or SOC-related service delivery Strong technical understanding of incident response, vulnerabilitymanagement, IDS/IPS Proven experience handling client relationships, stakeholder management , and crisis situations Excellent communication skills — both technical and non-technical Experience leading cross-functional teams in fast-paced environments Relevant certifications (e.g. CISSP, GCIH, CICM) UK SC clearance More ❯
and documenting technical solutions and infrastructure upgrades Leading complex escalations from the Service Desk, providing in-depth troubleshooting and resolution Planning, managing, and executing technical projects, ensuring clarity, risk management, and stakeholder updates Providing out-of-hours support on a shared rotation basis What You Bring: A logical, methodical approach to problem solving Excellent communication skills both with clients … timelines and escalating appropriately Full UK Driving Licence Technical Skills & Experience: In-depth experience with Microsoft 365, PowerShell, MDM/MAM (e.g., Intune), and RMM tools Hands-on endpoint management & deployment experience Familiarity with vulnerabilitymanagement platforms (e.g., Qualys) Security-conscious mindset, with exposure to frameworks like Cyber Essentials Broad infrastructure knowledge (servers, networks, cloud services) MSP More ❯
delight. To secure these treasured moments, Storio group is seeking for a Security Operations Manager. For this role we're looking for a security leader that has excellent stakeholder management with responsibilities across Storio group's operating companies in the UK, Netherlands, Norway, France, Spain & Germany.You 'll also bring a wealth of technical expertise and be comfortable taking a … wide security goals. - Contribute to the broader security roadmap across Storio Group. Execution & Delivery - Own and deliver the Security Operations backlog and KPIs. - Maintain and enhance our incident case management and response processes. - Coordinate incident response planning and simulation exercises with senior leaders and the board. - Manage external and internal audit and due diligence activities. Threat Detection & Response - Implement … and maintain robust threat detection and response capabilities across cloud, on-premise, and factory systems. -Drive continuous improvement of our vulnerabilitymanagement program. - Conduct threat intelligence analysis and report on emerging trends and risks. Collaboration & Mentorship - Build trusted relationships with technology partners, vendors, and internal teams. - Collaborate closely with product and engineering teams to identify and mitigate risks More ❯
and static/dynamic security testing (SAST/DAST). Security Tooling and Automation : Implement and maintain security tools used in the development and deployment processes (e.g., scanning tools, vulnerabilitymanagement systems, SAST, DAST, ASPM). Automate security processes to streamline secure development and operational workflows. Incident Detection and Response : Work with engineering and platform teams to detect … Expertise: Deep understanding of identifying, assessing, and mitigating security risks in application designs, code, and deployed products. Experience managing and using security testing tools such as SAST, DAST, and vulnerability scanning solutions. Strong grasp of secure coding practices and proficiency in integrating security into the Software Development Lifecycle (SDLC). Technical Knowledge and Implementation experience: Direct experience with threat … Demonstrated ability to seamlessly integrate secure development practices into SDLC/SSDLC workflows. Skilled in implementing technical security controls and driving security automation within CI/CD pipelines. Risk Management and Compliance knowledge: Experience with identifying and managing security risks, including conducting risk assessments. Working knowledge of regulatory compliance standards and frameworks. More information: Enjoy fantastic perks like private More ❯
South West London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
define strategic roadmaps to embed security across business operations Solve critical cyber challenges across diverse industries and client environments What You'll Bring Strong experience in cyber strategy, risk management, governance, architecture, and regulatory compliance Familiarity with frameworks and standards such as NIST CSF, ISO27001, NCSC CAF, GDPR, and NIS2 Industry-recognised certifications (e.g. CISSP, CISM, CISA, M.Inst.ISP, or … equivalent) Practical experience in GRC, threat and vulnerabilitymanagement, or operational resilience Proven delivery across complex programmes using Agile and/or Waterfall methodologies Team leadership experience across on-site and distributed teams Skilled in client relationship management and stakeholder engagement at all levels The package: £65,000 - £80,000 Company Bonus Flex Fund Pension Medical care More ❯
on in architecture, engineering, and compliance, while leading the charge on modern, cloud-first security strategy. Responsibilties: Designing and implementing robust security policies, controls, and infrastructure protection strategies. Leading vulnerabilitymanagement efforts, penetration testing, and remediation plans. Monitoring and investigating security events, managing incident response processes end-to-end. Ensuring compliance with security standards such as ISO … or high-trust industries). Hands-on expertise in cloud security (preferably AWS), including securing hybrid and multi-region architectures. Practical knowledge of security tooling: IDS/IPS, SIEM, vulnerability scanners, encryption, SAST/DAST tools, OWASP ZAP, etc. Strong understanding of network security protocols and best practices. Scripting and automation experience (e.g. Python). Proven experience with incident More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
OpenSourced Ltd
growing UK-based cybersecurity consultancy to recruit an Incident Response Analyst . This is an exciting opportunity to join a forward-thinking organisation that provides penetration testing and continuous vulnerabilitymanagement services to a wide range of clients across sectors. As part of the expanding Incident Response team, the successful candidate will play a critical role in detecting … source IR tools (e.g., Velociraptor, Eric Zimmerman Tools, Chainsaw, Volatility, SOF-ELK, DFIR IRIS). Scripting or programming experience (Python, Bash, or Go). About You: Experienced in stakeholder management during high-pressure incidents. Strong communication skills and composure under pressure. Able to align incident response practices with industry standards and client expectations. Background in threat intelligence and proactive More ❯
Spalding, Lincolnshire, England, United Kingdom Hybrid / WFH Options
Venn Group
internal systems Maintain and enhance the progressive Cyber Security roadmap/Strategy Maintenance of a Cyber Security Incident Response Plan Maintain the robust approach to security and event information management Review/modify and update ICT policies and processes Co-ordination of security audits and management of outcomes Attend routine board meetings to overview current and future information … and vulnerabilities. Ensuring the system remains fit for purpose for future threats and estate changes Co-ordination of penetration testing The continued review and recommendation of security assessment tools Management of security with regards to new systems acquisition Analyse and report on potential threats or patterns Respond to security related enquiries Ideal Technical Knowledge: CISSP qualification Networking (prefer Cisco … Active Directory Virtualisation Platforms (prefer VMWARE) AV/EDR/XDR SIEM (preference AlienVault) Email Security (Prefer Mimecast) VulnerabilityManagement (prefer Nessus) Please apply to hear more More ❯
candidates across the UK, with travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerabilitymanagement and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security assessments and maintain compliance. Requirements More ❯
travel into London around once or twice a month depending on where you live (expenses-paid). Responsibilities: * Implement and manage security controls for Microsoft and Azure infrastructure. * Lead vulnerabilitymanagement and incident response. * Enhance security monitoring and IAM with Microsoft tools. * Drive security architecture and ensure endpoint security. * Support M&A security assessments and maintain compliance. Requirements More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Addition
security using Azure, Hands-on experience with application security, data protection, and threat modelling. Confident communicator, able to influence across technical and business functions. Track record in risk assessment, vulnerabilitymanagement and secure architecture delivery. Knowledge of DevSecOps, SIEM, IAM, DLP, and related security tools is a plus. What’s in It for You: Opportunity to make a More ❯
protocols (TCP/IP) and security practices (IPSec, SSL-VPN, NAT, GRE). Hands-on experience with cloud infrastructure operations and troubleshooting customer tech stacks. Familiarity with SIEM tools, vulnerabilitymanagement, malware analysis, and firewall configurations. Ability to communicate complex technical solutions to a wide range of audiences, both technical and non-technical. Skilled in Python, JSON, YAML More ❯
practice into projects and daily operations. Support security awareness initiatives to improve cyber hygiene across the organisation. Skills & Experience Experience in IT security or infrastructure roles with exposure to vulnerabilitymanagement and incident response. Working knowledge of common attack vectors such as phishing, ransomware, and lateral movement. Familiarity with security tools such as SIEM, vulnerability scanners, endpoint More ❯
Rickmansworth, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Senior plc
development. Key responsibilities: Reporting to the Director of Information Security & Information Technology, you will be responsible for: - Build and own Seniors threat intelligence strategy. Develop and own the threat management program with regular assessments, threat modelling, risk prioritisation and remediation activities. The individual will serve as a subject matter expert incyber threat management, advising our various businesses on … requirements. Produce trusted, actionable, accurate and relevant threat information. Key skills and experience: An experienced threat intelligence lead (or similar). Expert in cybersecurity, with a focus on threat management and defensive security in regulated environments. Proficient in threat management, incident response and remediation tools. Strategic development in cyber threat intelligence research, process automation, knowledge sharing and team … MITRE ATT&CK, Cyber Kill chain). Experienced in using OSINT and security analysis tools (e.g. Shodan, Censys, Qualys, Virus Total, EDR, AV). Experience supporting incident response or vulnerabilitymanagement programs. Professional certifications in Cyber and Information Security (e.g. OCSP, GREM, CEH). Strong analytical and problem-solving abilities, translating complex technical issues into actionable recommendations. An More ❯
effectively across teams. What you'll do: Develop and implement proactive security strategies, policies, and procedures to protect our systems, networks, and data assets. Lead regular security assessments, including vulnerability scans and penetration tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents … the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong capability … in risk assessment, vulnerabilitymanagement, and data informed decision -making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in scripting and programming (i.e., Python More ❯
major incidents to determine the affected/vulnerable systems, affected/vulnerable users Identify any business areas impacted and coordinate communications with all relevant stakeholders as per Major Incident Management process. Coordinate the remediation and containment activities as advised by either the NTT DATA SOC or Incident Response Team. Oversee, support, and manage through to completion the investigative and … Manager in review of any service delivery processes and workflows, identifying areas for optimization and implementing best practices. Co-ordinate the running and reporting of a risk-based vulnerabilities management including: Scanning systems, networks, and applications to detect potential security weaknesses. Prioritize vulnerabilities based on their risk level, potential impact, and the criticality of the affected assets, ensuring that … challenging projects and a work environment that supports the creation of tangible solutions that make an impact. You will need to have a broad experience of security service delivery management and have evidence of experience in a number of the following fields of expertise: At least 10 years of experience in providing technical support and advice for a Security More ❯
regulated environment. You'll be responsible for advancing the organisation's incident response capabilities, leading investigations, and driving threat detection maturity through development of use cases, threat intelligence, and vulnerability management. Key Responsibilities Lead the DFIR function, overseeing incident detection, investigation, and response activities. Develop and implement IR methodologies (MITRE ATT&CK, Kill Chain, Threat Modelling, Diamond Model). … . Coordinate cross-functional security incident response with SOC, Threat Intelligence, and Red/Blue teams. Engage with technical and business teams on cyber risk reduction strategies. Contribute to vulnerabilitymanagement and remediation plans. Required Skills & Experience Proven experience managing DFIR or cyber incident response teams. Deep technical knowledge of IR and forensic analysis (eg Wireshark, packet capture … working in financial services or a regulated environment preferred. Hands-on experience with SIEM tools, network forensics, and endpoint detection. Knowledge of CIS benchmarks, cloud security, IAM, DLP, and vulnerability management. Familiarity with Windows, Linux/Unix, networking, and virtualisation (VMware). Certifications (preferred): GCIA, GCIH, GCFA or equivalent. What's on Offer Up to £90,000 base salary More ❯
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: Lead the development and delivery of threat intelligence and … vulnerability products. Select and profile key threat actors posing the greatest risk to the client's estate. Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. Provide in-depth contextual threat analysis, including actor capability and intent. Maintain and improve internal documentation and … reporting processes. Lead, mentor, and support a multidisciplinary team of cyber analysts. Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: 5+ years of experience in Threat Intelligence, VulnerabilityManagement, or cyber research. Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. Experience More ❯
bradford, yorkshire and the humber, united kingdom
Anson Mccade
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: Lead the development and delivery of threat intelligence and … vulnerability products. Select and profile key threat actors posing the greatest risk to the client's estate. Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. Provide in-depth contextual threat analysis, including actor capability and intent. Maintain and improve internal documentation and … reporting processes. Lead, mentor, and support a multidisciplinary team of cyber analysts. Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: 5+ years of experience in Threat Intelligence, VulnerabilityManagement, or cyber research. Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. Experience More ❯
across OT networks, ideally within the energy sector. The role will report into the Chief Information Security Officer (CISO) and will play a key role within an OT risk management framework which covers multiple generation and storage sites. The role can be based from Immingham or London offices. Regular travel to sites will be required. The Role Are you … across multiple UK energy generation and storage sites? We're looking for a Cyber Security OT Specialist with strong first-line technical skills and a solid grounding in risk management frameworks, ideally with experience in the energy sector. This is a key role within our cyber risk function, supporting our sites' critical infrastructure and helping shape secure and resilient … environments aligned with IEC62443 standards. Key Responsibilities Lead the implementation of new technical security controls across OT environments. Contribute to the assessment of OT network architecture , protocols, and change management processes. Lead incident response and remediation for cyber events detected by our OT SIEM systems. Actively support vulnerabilitymanagement and ensure threat exposure is minimised. Provide hands More ❯
Employment Type: Permanent
Salary: £57000 - £60000/annum Pension,Medical,Incentive plan,25 Ho
Immingham, Lincolnshire, North East, United Kingdom
Rullion Limited
across OT networks, ideally within the energy sector. The role will report into the Chief Information Security Officer (CISO) and will play a key role within an OT risk management framework which covers multiple generation and storage sites. The role can be based from Immingham or London offices. Regular travel to sites will be required. The Role Are you … across multiple UK energy generation and storage sites? We're looking for a Cyber Security OT Specialist with strong first-line technical skills and a solid grounding in risk management frameworks, ideally with experience in the energy sector. This is a key role within our cyber risk function, supporting our sites' critical infrastructure and helping shape secure and resilient … environments aligned with IEC62443 standards. Key Responsibilities Lead the implementation of new technical security controls across OT environments. Contribute to the assessment of OT network architecture , protocols, and change management processes. Lead incident response and remediation for cyber events detected by our OT SIEM systems. Actively support vulnerabilitymanagement and ensure threat exposure is minimised. Provide hands More ❯