Vulnerability Management Jobs in the UK

26 to 50 of 329 Vulnerability Management Jobs in the UK

Senior IT Security Engineer

London Area, United Kingdom
Tradition
IT Security Engineer to be based in our London office. Main responsibilities within the Senior IT Security Engineer position include: Support Information Security risk management, compliance activities, and governance initiatives. Collaborate with stakeholders to identify, document, and mitigate security risks through effective controls. Work with key software and service … manage security products and solutions. Lead and support security incident response, including investigation, containment, and remediation. Deploy, manage, and continuously improve security tools, including vulnerability management, identity management, and attack surface monitoring. Analyse emerging threats and vulnerabilities, leveraging threat intelligence to proactively mitigate risks Perform proactive threat … principles, practices and standards and how they translate into real world technical solutions. Significant experience in the field of Information Security including Governance, Risk management and Compliance frameworks, Security Awareness and Threat Intelligence. Ability to effectively communicate complex security or intelligence related information to both technical and non-technical More ❯
Posted:

Senior IT Security Engineer

london, south east england, united kingdom
Tradition
IT Security Engineer to be based in our London office. Main responsibilities within the Senior IT Security Engineer position include: Support Information Security risk management, compliance activities, and governance initiatives. Collaborate with stakeholders to identify, document, and mitigate security risks through effective controls. Work with key software and service … manage security products and solutions. Lead and support security incident response, including investigation, containment, and remediation. Deploy, manage, and continuously improve security tools, including vulnerability management, identity management, and attack surface monitoring. Analyse emerging threats and vulnerabilities, leveraging threat intelligence to proactively mitigate risks Perform proactive threat … principles, practices and standards and how they translate into real world technical solutions. Significant experience in the field of Information Security including Governance, Risk management and Compliance frameworks, Security Awareness and Threat Intelligence. Ability to effectively communicate complex security or intelligence related information to both technical and non-technical More ❯
Posted:

Senior Project Manager

Portsmouth, England, United Kingdom
TalentHawk
Senior Project Manager – Security & Asset Management We are looking for a dynamic and experienced Senior Project Manager to lead projects in asset management, vulnerability management, and risk management . The ideal candidate will have a strong background in IT and OT environments , with a preference … for those with utilities sector experience . Key Responsibilities: Oversee asset management , ensuring efficient tracking and security of IT and OT assets. Lead vulnerability and risk management initiatives, mitigating security threats. Manage end-to-end software and security projects, ensuring timely delivery. Collaborate with cross-functional teams … to enhance security and compliance. Drive innovation and best practices in project execution. Requirements: Proven experience in asset and risk management within IT/OT environments. Utilities sector experience is highly desirable. Strong background in software project management and security best practices. Ability to lead complex projects and More ❯
Posted:

DevSecOps Engineer

London Area, United Kingdom
Hazeltree
to safeguard critical business operations by design and default. You will be responsible for security automation, CI/CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI/CD pipeline to enhance development security. Work … secure AWS cloud infrastructure for clients and internal operations. Automate AWS infrastructure builds following CIS hardening standards . Ensure top-tier security configuration, access management, and incident response on cloud platforms. Operational Support & Incident Response: Support business-critical Windows and Linux-based environments. Monitor and respond to security alerts … across Infosec, servers, firewalls, and applications. Conduct continuous monitoring of internal and third-party information security controls. Threat & Vulnerability Management: Assess SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) scans. Implement remediation and mitigation strategies in collaboration with development teams. Maintain network security protocols, firewalls More ❯
Posted:

DevSecOps Engineer

london, south east england, united kingdom
Hazeltree
to safeguard critical business operations by design and default. You will be responsible for security automation, CI/CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI/CD pipeline to enhance development security. Work … secure AWS cloud infrastructure for clients and internal operations. Automate AWS infrastructure builds following CIS hardening standards . Ensure top-tier security configuration, access management, and incident response on cloud platforms. Operational Support & Incident Response: Support business-critical Windows and Linux-based environments. Monitor and respond to security alerts … across Infosec, servers, firewalls, and applications. Conduct continuous monitoring of internal and third-party information security controls. Threat & Vulnerability Management: Assess SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) scans. Implement remediation and mitigation strategies in collaboration with development teams. Maintain network security protocols, firewalls More ❯
Posted:

Network and Security Engineer

London, United Kingdom
AWTG Ltd
teams to establish and enforce network access policies, ensuring that only authorized individuals and devices have the correct access privileges. Proactive Security Testing and Vulnerability Management Conduct vulnerability assessments and penetration testing to identify and address security weaknesses in mobile network architectures. Develop and enforce security policies … together with system administrators and application owners to resolve discovered vulnerabilities by applying necessary patches or making configuration adjustments. Create and sustain a thorough vulnerability management program that includes tracking vulnerabilities, assessing risks, and planning remediation strategies. Engage in network security incident response efforts by providing technical expertise … and mobile network security. Understanding of 3GPP mobile network CORE and RAN architectures and security requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Head of IT Security

Oxford, Oxfordshire, United Kingdom
Ellison Institute, LLC
be responsible for safeguarding our critical scientific and technological assets. This role demands a proactive leader with deep expertise in Security Operations, Risk & Compliance Management, Identity & Access Management and the ability to work cross-functionally with IT, research teams and executive leadership. The successful candidate will be instrumental … Engineering Develop, implement, and oversee enterprise-wide security operations to detect, prevent, and respond to cyber threats. Lead and enhance Security Information and Event Management (SIEM) and Threat Intelligence capabilities. Lead security incident response and forensic investigations, ensuring robust incident handling and mitigation. Report on cybersecurity KPIs and manage … significant IS risks and their appropriate Risk Treatment Plans. Risk & Compliance Management Define and enforce IT security policies, standards, and procedures. Ensure compliance with industry accreditations (e.g., ISO 27001, NIST, GDPR), working closely with external auditors and regulatory bodies. Conduct regular risk assessments and vulnerability management, and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cyber Assurance and Risk Consultant

London, United Kingdom
Applicable Limited
methodologies to adapt to new regulations, compliance requirements and business change Advise on and foster continuous improvement and effectiveness of GRC processes, driving improved management information to better allow appropriate prioritisation and risk based decisions Lead initiatives that build a culture of accountability and responsibility across engagements Enhance governance … Design) Providing security expertise across security standards and accreditations, measure and control the effectiveness of the security controls framework and maintain the Information Security Management System. Deriving and delivering documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies, standards and … identification of identified risks and emerging cyber security vulnerabilities and threats. The subsequent analysis to quantify and lead risk mitigation plans Work with Service Management to ensure that partners and suppliers adhere to agreed standards, policies and verify/evidence appropriate compliance and security KPIs Work closely with 1st More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Junior Operational Security Analyst

London Area, United Kingdom
Trayport
role offers excellent opportunities for growth and career development in the ever-evolving field of cybersecurity. Your primary areas of focus will include: Event Management Incident Response and Management Endpoint Security Network Security Vulnerability Management Responsibilities As an Operational Security Analyst, you will: Investigate security events … Security (Azure/AWS) Windows Security Linux Security Active Directory/LDAP Authentication Mechanisms (Kerberos, NTLM, etc.) Basic programming/scripting (e.g., PowerShell, Bash) Vulnerability Management and associated tools (e.g., Rapid7) SIEM and associated tools (e.g., Splunk) Endpoint Security Controls (e.g., EDR/Anti-virus) Networking Fundamentals (OSI … Computer Science, Computer Security) Knowledge of ISO/IEC 27000 Information Security standards and experience working with a compliant ISMS Experience in IT problem management and root cause analysis At Trayport, we encourage applications from all backgrounds and walks of life, and we are committed to building a team More ❯
Posted:

Junior Operational Security Analyst

london, south east england, united kingdom
Trayport
role offers excellent opportunities for growth and career development in the ever-evolving field of cybersecurity. Your primary areas of focus will include: Event Management Incident Response and Management Endpoint Security Network Security Vulnerability Management Responsibilities As an Operational Security Analyst, you will: Investigate security events … Security (Azure/AWS) Windows Security Linux Security Active Directory/LDAP Authentication Mechanisms (Kerberos, NTLM, etc.) Basic programming/scripting (e.g., PowerShell, Bash) Vulnerability Management and associated tools (e.g., Rapid7) SIEM and associated tools (e.g., Splunk) Endpoint Security Controls (e.g., EDR/Anti-virus) Networking Fundamentals (OSI … Computer Science, Computer Security) Knowledge of ISO/IEC 27000 Information Security standards and experience working with a compliant ISMS Experience in IT problem management and root cause analysis At Trayport, we encourage applications from all backgrounds and walks of life, and we are committed to building a team More ❯
Posted:

Security Consultant

London Area, United Kingdom
Albany Beck
Albany Beck is looking for an experienced Security Consultant with a strong background in Security Risk Management, GRC, Vulnerability Analysis, and Compliance to join a high-impact programme within a leading global investment bank. This is an exciting opportunity to play a key role in the design and … a Security Consultant, you’ll be working in the client’s security team, contributing to critical workstreams that span governance, risk and compliance (GRC), vulnerability management, and security control design. You'll work closely with cross-functional stakeholders including technology, audit, and operations teams to ensure the organisation … and continuous improvement of security governance frameworks and GRC processes. Design and enhance security controls across infrastructure, applications, and cloud environments. Lead or support vulnerability analysis activities, including risk-based prioritisation and remediation tracking. Ensure alignment with global security standards and frameworks (e.g. NIST, ISO 27001, CIS). Partner More ❯
Posted:

Security Consultant

london, south east england, United Kingdom
Albany Beck
Albany Beck is looking for an experienced Security Consultant with a strong background in Security Risk Management, GRC, Vulnerability Analysis, and Compliance to join a high-impact programme within a leading global investment bank. This is an exciting opportunity to play a key role in the design and … a Security Consultant, you’ll be working in the client’s security team, contributing to critical workstreams that span governance, risk and compliance (GRC), vulnerability management, and security control design. You'll work closely with cross-functional stakeholders including technology, audit, and operations teams to ensure the organisation … and continuous improvement of security governance frameworks and GRC processes. Design and enhance security controls across infrastructure, applications, and cloud environments. Lead or support vulnerability analysis activities, including risk-based prioritisation and remediation tracking. Ensure alignment with global security standards and frameworks (e.g. NIST, ISO 27001, CIS). Partner More ❯
Posted:

Senior Analyst, Technology and Cyber Security GRC

London, United Kingdom
London Stock Exchange Group
and forums, as well as representing the team where required. Critical Work Support the ongoing and periodic regulatory and compliance responses and engagements. Audit management and coordination. Issue remediation oversight and closure validation. Responding to customer RFIs using standardised formats and frameworks. Quality assurance on library of responses required … Cyber security qualification e.g. CISMP/Apprenticeship (desirable). Demonstrable working knowledge and understanding of key technology and cyber security controls such as Incident Management, Backup & Recovery, Capacity Management, Vulnerability Management, Identity & Access Management, Authentication and Authorisation systems, Data Protection, Application Security, Secure Application Development … and standards. Operational risk frameworks. Regulatory compliance. Operational Resilience. Good understanding of data protection controls. Financial Services sector experience. Technology & Cyber Security. Leadership and management experience Not essential but experience will be recognised, greater focus on work experiences and ability to engage and drive initiatives. Personal skills and capabilities More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cybersecurity (Infrastructure) Engineer

London, United Kingdom
Expleo Group
Overview Expleo is a trusted partner for end-to-end, integrated engineering, quality services, and management consulting for digital transformation. We help businesses harness unrelenting technological change to deliver innovations that provide a competitive advantage and improve everyday life worldwide. As part of the Expleo Digital and Emerging Technology … GRID/GRID+ (SANS/GIAC), GICSP, or equivalent industrial cybersecurity training are desirable. Essential skills Strong understanding of core cybersecurity principles, risk management, and control implementation in critical infrastructure environments. Hands-on experience with infrastructure security across cloud, on-premises, and hybrid environments. Proven ability to implement and … assess security controls at the OT/IT boundary, including segmentation, firewalls, monitoring, and remote access safeguards. Familiarity with enterprise security tooling, including vulnerability management platforms, endpoint protection, SIEM, identity and access management, and logging solutions. Knowledge of regulatory frameworks and industry standards relevant to the E More ❯
Employment Type: Permanent
Posted:

Digital Solutions - Lead InfoSec Consultant

London, United Kingdom
CACI Ltd
of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security … in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & Vulnerability Assessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including demonstrating … developers and system administrators. Keep up to date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerability management program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Head of Vulnerability and Threat Intelligence

London Area, United Kingdom
Hybrid / WFH Options
Merlin Entertainments
Head of Vulnerability and Threat Intelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in … our attractions. The Head of Vulnerability and Threat Intelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with More ❯
Posted:

Head of Vulnerability and Threat Intelligence

london, south east england, united kingdom
Hybrid / WFH Options
Merlin Entertainments
Head of Vulnerability and Threat Intelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in … our attractions. The Head of Vulnerability and Threat Intelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with More ❯
Posted:

Senior Security Analyst

Peterborough, Cambridgeshire, United Kingdom
Jumar Solutions
security measures. Incident Response - Proficiency in detecting, analysing, and responding to security incidents. Threat Analysis - Ability to identify and assess cyber threats and vulnerabilities. Vulnerability Management - Experience with vulnerability management and reporting solutions, assessing customer vulnerabilities, creating regular reporting packs, devising mitigation strategies and working with … customers to support their implementation of these plans. Security Information and Event Management (SIEM) - In-depth experience with SIEM tools for monitoring and analysing security events. Malware Analysis - Skills in identifying, dissecting and mitigating malware threats. Forensic Analysis - Knowledge of digital forensics to investigate and remediate security breaches. The More ❯
Employment Type: Permanent
Salary: £60000 - £70000/annum
Posted:

End user Security Engineer (Vulnerabilities), Intune, Hybrid

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
Sanderson Recruitment
project to ensure the efficient operation of end user devices, including Laptops, phones, handheld devices etc. The primary responsibility with the role will be vulnerability Management, including conducting regular assessments, implementing security measures and liaising with various depts. The successful candidate will implement and manage software patches promptly … and configure MS Teams, Intune and Endpoint Config Manager accordingly. Skills required: - Relevant experience in vulnerability management and endpoint security Strong knowledge of MS Teams, Intune and Endpoint Configuration manager Familiar with identity and access management principles Responsibilities: Respond to incidents related to EUC reported through the … Implement and manage software patches for end user computing devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with More ❯
Employment Type: Contract
Rate: £250 - £310 per day
Posted:

Senior Information Security Analyst, UK

London, United Kingdom
Hybrid / WFH Options
Realty Income Corporation
logging is being collected and analyzed and relevant security alerts are being generated. Automate processes to reduce manual task delivery and enhance process delivery. Vulnerability Management Collaborate with IT and development teams to detect and remediate vulnerabilities across the enterprise in alignment with defined SLAs. Understand current and … . Knowledge of security frameworks and regulatory compliance standards (NIST CSF, SOX ITGC, GDPR, MITRE ATT&CK, etc.) Experience with common industry SIEM and vulnerability management platforms. Experience maintaining the Microsoft Defender platform and other Microsoft security products. Ability to rank and prioritize vulnerabilities and security recommendations appropriately … within the context of the infrastructure and business processes. Experience maintaining identity and access management systems including PAM technology and other authentication and authorization control platforms. Experience with Incident Response best practices. Knowledge of cloud security best practices related to AWS and Azure cloud services. Knowledge of DevOps practices More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Solutions Architect

Glasgow, Scotland, United Kingdom
Be-IT
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Vulnerability Management : Collaborate with SecOps to develop and implement vulnerability management programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
Posted:

Cyber Security Solutions Architect

Edinburgh, City of Edinburgh, United Kingdom
Be-IT Resourcing Ltd
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Vulnerability Management : Collaborate with SecOps to develop and implement vulnerability management programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
Employment Type: Permanent
Salary: £60000 - £70000/annum
Posted:

Cyber Security Solutions Architect

Glasgow, City of Glasgow, United Kingdom
Be-IT Resourcing Ltd
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Vulnerability Management : Collaborate with SecOps to develop and implement vulnerability management programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
Employment Type: Permanent
Salary: £60000 - £70000/annum
Posted:

Security Analyst

London Area, United Kingdom
NDK Cyber
years' experience working in a corporate, structured environment in a security analyst or security operations role. You'll focus on daily log analysis, vulnerability management support, antivirus monitoring, and helping to close security-related incidents. Key Responsibilities: 🔍 Security Monitoring & Analysis Review, monitor, and analyze daily security logs using … positives, escalate true positives, and assist in incident investigations. Support service desk and IT teams with closing out security-related calls and incidents. 🛠️ Threat & Vulnerability Management Assist with running and analyzing vulnerability scans; help track remediation. Monitor and manage endpoint protection and antivirus alerts. Collaborate with infrastructure … Support Maintain security incident logs, reports, and operational documentation. Support periodic health checks of security tools and systems. Work closely with firewall and access management processes (basic reviews and requests). Who This Role Would Suit: A candidate with 2–3 years of security analyst experience in a structured More ❯
Posted:

Security Analyst

london, south east england, united kingdom
NDK Cyber
years' experience working in a corporate, structured environment in a security analyst or security operations role. You'll focus on daily log analysis, vulnerability management support, antivirus monitoring, and helping to close security-related incidents. Key Responsibilities: 🔍 Security Monitoring & Analysis Review, monitor, and analyze daily security logs using … positives, escalate true positives, and assist in incident investigations. Support service desk and IT teams with closing out security-related calls and incidents. 🛠️ Threat & Vulnerability Management Assist with running and analyzing vulnerability scans; help track remediation. Monitor and manage endpoint protection and antivirus alerts. Collaborate with infrastructure … Support Maintain security incident logs, reports, and operational documentation. Support periodic health checks of security tools and systems. Work closely with firewall and access management processes (basic reviews and requests). Who This Role Would Suit: A candidate with 2–3 years of security analyst experience in a structured More ❯
Posted:
Vulnerability Management
10th Percentile
£42,500
25th Percentile
£52,500
Median
£69,500
75th Percentile
£85,000
90th Percentile
£110,000