Vulnerability Management Jobs in the UK

526 to 550 of 1,236 Vulnerability Management Jobs in the UK

Cybersecurity Director - UK Region | London, UK

London, England, United Kingdom
Aon Corporation
GCS) controls. The role acts as a primary contact for all Cybersecurity matters, requiring a broad understanding of security controls and their effective implementation in corporate environments. Strong relationship management skills across the assigned region/sub-region are essential to facilitate business adoption. As a Director within the Regional Security Office (RSO) service, you will be accountable for … to the region/sub-region and solution lines. The role necessitates effective relationships with senior leadership to support regional business goals and to operate an effective security risk management regime aligned with a security risk mitigation strategy. The trusted security lead will present to local leaders, regulators, and clients as needed. Prior regulatory management experience is required. … adoption. Oversee the colleague security culture program. Represent the region in security incident management. Manage remediation efforts, e.g., internal audit findings. Ensure cybersecurity compliance and conduct management. Cybersecurity Risk Management: Manage a cybersecurity risk committee. Track remediation of audit and compliance findings. Review cybersecurity metrics and lead remediation programs. Lead or sponsor cybersecurity initiatives. Coordinate with Data Privacy to More ❯
Posted:

Senior Information Security Analyst

East Malling, England, United Kingdom
IOVENDO
Information Security Analyst We are looking for an Information Security Analyst to join our central team, supporting security operations to ensure compliance with business needs. The role involves vulnerability management, monitoring security controls, mentoring junior team members, and participating in a 24x7 remote support rota. If you have experience in Information or Cyber Security and are eager to More ❯
Posted:

Threat Intelligence Lead

Leeds, England, United Kingdom
Anson McCade
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: • Lead the development and delivery of threat intelligence and … vulnerability products. • Select and profile key threat actors posing the greatest risk to the client’s estate. • Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. • Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. • Provide in-depth contextual threat analysis, including actor capability and intent. • Maintain and improve internal documentation and … reporting processes. • Lead, mentor, and support a multidisciplinary team of cyber analysts. • Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: • 5+ years of experience in Threat Intelligence, Vulnerability Management, or cyber research. • Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. • Experience More ❯
Posted:

MANDARIN Network and Security Engineer

London Area, United Kingdom
ABL Recruitment
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerability assessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend support More ❯
Posted:

MANDARIN Network and Security Engineer

City of London, London, United Kingdom
ABL Recruitment
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerability assessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend support More ❯
Posted:

MANDARIN Network and Security Engineer

Slough, Berkshire, UK
ABL Recruitment
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerability assessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend support More ❯
Employment Type: Full-time
Posted:

Lead Cyber Security Specialist

London, England, United Kingdom
JR United Kingdom
SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements , including due diligence, contract oversight … in processes or documentation. Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management , endpoint security (EDR/XDR) , and cloud compliance . Good understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged … access management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: 5+ years in GRC roles ; financial services or banking. Understanding of GDPR , DORA , PCI DSS, and outsourcing/third-party risk requirements. Hands-on experience with ISO 27001 implementation and More ❯
Posted:

Information Security Analyst

Uttoxeter, England, United Kingdom
JCB
software, systems, services and toolsets such as E-mail Security, EDR, NAC, IT/OT Segmentation, 365 etc along with an understanding of malware prevention, emerging threats, attacks and vulnerability management. • Understanding of Information Security best practice for elements including workstations, servers, cloud, networking, architecture, common protocols and application security. • You have the ability to confidently perform security audits … both internal and external (e.g., third party and supplier assurance) and ensure recommendations are followed for continuous improvement. • You have strong Project Management skills - able to independently manage multiple projects, manage own workload, prioritise and meet tight deadlines. • Strong Incident Response Management skills including threat and vulnerability analysis. • The ability to communicate business and technical risk to … all levels of audience. • Understanding of IT Service Management principles ideally ITIL. What happens next? Ordinarily, our Resourcing Team reviews and shortlists CVs. If shortlisted, you'll speak to one of our Recruiters to discuss the role further. Our interview process usually consists of an initial teams interview followed by an in-person interview. We'll keep in touch More ❯
Posted:

MANDARIN Network and Security Engineer

Slough, England, United Kingdom
JR United Kingdom
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerability assessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend support More ❯
Posted:

Product Security Engineer

London, England, United Kingdom
Burns Sheehan
Senior Application Security Engineer - Azure, Kubernetes, Terraform - £100,000 - £130,000 A leading provider of regulated digital asset custody services for institutional clients, ensuring the secure storage and management of cryptocurrencies and other digital assets, is seeking a Senior Application Security Engineer. You'll be pivotal in securing their platform and applications throughout their lifecycle. As a Senior Application … and business stakeholders, embedding security across the Software Development Lifecycle and business operations. You'll bring a detailed understanding of secure software design, cloud security, and threat/risk management, maintaining a secure and reliable platform. The Senior Application Security Engineer responsibilities: Secure the platform and applications throughout their lifecycle. Deliver secure foundations for a cloud-first platform built … and Kubernetes. Collaborate with developers, product owners, and stakeholders to embed security across the SDLC. Maintain and build effective controls for SOC2 and ISO 27001 compliance, including incident and vulnerability management. Secure configuration of cloud platforms and shift left security controls. Translate technical topics to a broad range of stakeholders. Work on Infrastructure as Code, CI/CD, git More ❯
Posted:

Senior Cyber Security Analyst - AWS - Manchester

Manchester, England, United Kingdom
Circle Group
EMEA regions. Skills & Experience Minimum 4 years of experience in Cyber Security within an AWS cloud environment Experience with CrowdStrike is a plus Proven experience with PCI DSS compliance Vulnerability management and compliance expertise Leadership in audit processes Knowledge of security standards including GDPR, ISO, PCI, NIST Excellent stakeholder communication and training skills Relevant cybersecurity certifications are desirable … office is a vibrant space with forward-thinking professionals. Key Responsibilities Develop and analyze security requirements and manage vulnerabilities in PCI DSS projects Maintain consistency in IT security risk management activities Advise engineers on vulnerabilities, threats, and remediation strategies Provide security training and support internally and to clients Compensation & Application The starting salary is up to £65,000, depending More ❯
Posted:

Security Engineer

London, England, United Kingdom
Yolo Group
on our journey! As a Security Engineer , you'll drive high-quality security baselines, ensure robust data for detection engineering, and enhance incident response. You'll manage logging, monitoring, vulnerability tools, and forensic analysis while strengthening Yolo Group’s security posture. Your day-to-day Implement and maintain security logging and monitoring controls to ensure continuous threat detection; Develop … Enhance and improve incident detection and response capabilities to strengthen security resilience; Act as a 2nd line incident responder, assisting with forensic collection and analysis; Set up and manage vulnerability management tools to identify and mitigate security risks; Create templated security solutions to support teams across Yolo Group in improving their security posture; Engage in incident response actions … to set priorities, manage tasks independently, and deliver on commitments; Proficient in coding with Python and Go, with the ability to write patches in other languages; Experienced in infrastructure management using Git in AWS/Azure, leveraging Terraform and Ansible; Skilled in containerization and cloud environments, including Kubernetes (K8s), ECS, and EC2, with expertise in baking images and templating More ❯
Posted:

Cybersecurity Director - UK Region

London, United Kingdom
Aon Hewitt
contact for all matters relating to Cybersecurity and requires a broad understanding of security controls and their effective implementation within corporate environments. The role will also require good relationship management skills across the assigned region/sub-region to enable business adoption. As a Director within the Regional Security Office (RSO) service you will be accountable for service delivery … The role with need to have effective relationships with senior leadership to support the delivery of the regional/sub-regional business goals and operate an effective security risk management regime against an agreed security risk mitigation strategy. As the trusted security lead, the role will present to local leaders, regulators and clients as needed. Prior experience of regulatory … management is required. This is a highly visible role within Aon to be able to embed effective security controls at scale within the firm. We are looking for you to bring new ideas and a commitment toward continual learning. You will stay actively engaged with business leaders, IT executives and external clients. The role requires gravitas and an ability More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Network Engineer - Security

Milton Keynes, England, United Kingdom
CityFibre
across our national fibre infrastructure Leading the implementation of Active Network Security tooling and frameworks Acting as a senior escalation point for complex network security incidents Enhancing risk and vulnerability management processes Collaborating with architecture and operations teams to embed security best practices Supporting forensic investigations and Tier 3/4 incident response What you’ll bring to … of firewalls, IDS/IDP, SIEM, and other security technologies Excellent understanding of Layer 2/3 networking, including Ethernet, MPLS, and TCP/IP Experience with risk and vulnerability management frameworks Familiarity with security standards such as NIST, NCSC, or ISO27001 Diversity, Inclusion & Belonging We’re a Times Top 50 Employer for Gender Equality. We’re endorsed More ❯
Posted:

Cybersecurity Director - UK Region

City of London, England, United Kingdom
Aon Hewitt
contact for all matters relating to Cybersecurity and requires a broad understanding of security controls and their effective implementation within corporate environments. The role will also require good relationship management skills across the assigned region/sub-region to enable business adoption. As a Director within the Regional Security Office (RSO) service you will be accountable for service delivery … The role with need to have effective relationships with senior leadership to support the delivery of the regional/sub-regional business goals and operate an effective security risk management regime against an agreed security risk mitigation strategy. As the trusted security lead, the role will present to local leaders, regulators and clients as needed. Prior experience of regulatory … management is required. This is a highly visible role within Aon to be able to embed effective security controls at scale within the firm. We are looking for you to bring new ideas and a commitment toward continual learning. You will stay actively engaged with business leaders, IT executives and external clients. The role requires gravitas and an ability More ❯
Posted:

Senior Network Engineer - Security

Irlam, England, United Kingdom
CityFibre
across our national fibre infrastructure Leading the implementation of Active Network Security tooling and frameworks Acting as a senior escalation point for complex network security incidents Enhancing risk and vulnerability management processes Collaborating with architecture and operations teams to embed security best practices Supporting forensic investigations and Tier 3/4 incident response What you'll bring to … of firewalls, IDS/IDP, SIEM, and other security technologies Excellent understanding of Layer 2/3 networking, including Ethernet, MPLS, and TCP/IP Experience with risk and vulnerability management frameworks Familiarity with security standards such as NIST, NCSC, or ISO27001 Diversity, Inclusion & Belonging We're a Times Top 50 Employer for Gender Equality. We're endorsed More ❯
Posted:

Head of Global Cyber Defence

London, United Kingdom
Haleon
vision of the Global Cyber Defense (GCD) organization. This position leads a diverse team across multiple cybersecurity domains including Incident Response, Threat Intelligence, Red Team, Cyber Countermeasures, Threat Hunting, Vulnerability Management, Forensics, eDiscovery, and Insider Threat programs. The role requires a strategic thinker with deep technical expertise, strong leadership capabilities, and the ability to collaborate across business units … Lead efforts to identify and respond to emerging cyber threats using advanced threat intelligence and proactive defense strategies. Oversee incident response planning and execution, ensuring alignment with broader crisis management frameworks. Build and maintain robust capabilities in Data Loss Prevention, cyber forensics, and eDiscovery. Direct red teaming, cyber countermeasures, and threat hunting initiatives, including internal and external cyber defense … exercises. Drive effective vulnerability management strategies, ensuring integration with the wider D&T organization and reporting to senior leadership. Business Expertise Deep understanding of the cybersecurity landscape, including industry-specific threats and compliance requirements. Strategic knowledge of the business environment, regulatory landscape, and competitor capabilities. Ability to align cybersecurity initiatives with business objectives and risk management strategies. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Officer

London, England, United Kingdom
JR United Kingdom
Review and implement policy improvements aligned to GDPR, ISO27001, NIST and other key standards. Deliver impactful security awareness and training programmes across the business. Support audits, penetration tests, and vulnerability management – driving remediation and improvements. Work closely with teams across Legal, Finance, Marketing, Global Tech, and Internal Audit. Key experience: Minimum 3+ years' experience in a cyber security … or analyst role within a complex organisation. Broad expertise across identity & access management, security operations, network and data security. Strong working knowledge of ISO/IEC 27001, Cyber Essentials, or NIST frameworks. Experience influencing cross-functional stakeholders – both technical and non-technical. Excellent communicator – able to translate technical risks into business language. Ideally holds or is working towards certifications More ❯
Posted:

Cyber Security Officer

Slough, England, United Kingdom
JR United Kingdom
Review and implement policy improvements aligned to GDPR, ISO27001, NIST and other key standards. Deliver impactful security awareness and training programmes across the business. Support audits, penetration tests, and vulnerability management – driving remediation and improvements. Work closely with teams across Legal, Finance, Marketing, Global Tech, and Internal Audit. Key experience: Minimum 3+ years' experience in a cyber security … or analyst role within a complex organisation. Broad expertise across identity & access management, security operations, network and data security. Strong working knowledge of ISO/IEC 27001, Cyber Essentials, or NIST frameworks. Experience influencing cross-functional stakeholders – both technical and non-technical. Excellent communicator – able to translate technical risks into business language. Ideally holds or is working towards certifications More ❯
Posted:

Infrastructure Manager

City of London, London, United Kingdom
Mentmore
integration, automation, and a mobile-first strategy across a global footprint. Key Responsibilities Platform Ownership & Strategy Act as the primary owner for the Azure cloud environment, including governance, cost management, architecture, and operations. Develop and maintain a scalable, secure, and resilient cloud platform aligned with the firm’s digital transformation goals. Drive and implement the roadmap for infrastructure upgrades … regardless of time of day is an essential. Lead by example, setting clear expectations and holding individuals and teams accountable for high performance and ethical conduct. Provide direct line management of individuals where appropriate, ensuring clear direction, regular development conversations, and alignment with team and business goals. Operational Management Take full ownership of day-to-day BAU operations … ensuring the cloud platform’s performance, reliability, security, and compliance. This includes patch management across all infrastructure services, as well as ensuring regular reporting is carried out for patch compliance and vulnerability management. Beyond operational stability, the role demands a continuous improvement mindset - proactively evaluating the platform and driving enhancements to optimise efficiency, resilience, and user experience. Manage More ❯
Posted:

Infrastructure Manager

London Area, United Kingdom
Mentmore
integration, automation, and a mobile-first strategy across a global footprint. Key Responsibilities Platform Ownership & Strategy Act as the primary owner for the Azure cloud environment, including governance, cost management, architecture, and operations. Develop and maintain a scalable, secure, and resilient cloud platform aligned with the firm’s digital transformation goals. Drive and implement the roadmap for infrastructure upgrades … regardless of time of day is an essential. Lead by example, setting clear expectations and holding individuals and teams accountable for high performance and ethical conduct. Provide direct line management of individuals where appropriate, ensuring clear direction, regular development conversations, and alignment with team and business goals. Operational Management Take full ownership of day-to-day BAU operations … ensuring the cloud platform’s performance, reliability, security, and compliance. This includes patch management across all infrastructure services, as well as ensuring regular reporting is carried out for patch compliance and vulnerability management. Beyond operational stability, the role demands a continuous improvement mindset - proactively evaluating the platform and driving enhancements to optimise efficiency, resilience, and user experience. Manage More ❯
Posted:

Second Line Support Engineer - On-Site

London, England, United Kingdom
Hybrid / WFH Options
Prince Talent & Resourcing Group
for service desk colleagues to help them resolve tickets the same day (preferably the same hour). Log tickets for the customer and ensure you are following the Incident Management process every time – “if it’s not in the ticket, it didn’t happen”. Maintain ticket Q so all tickets include a daily update. The standard is to … avoid having tickets older than 2 weeks that do not have a full plan of action to move to resolution. Change Management – Ensure that you always log a change in accordance with our change management process to fix a fault or satisfy a work request. Help the Service Desk and wider teams quickly identify security or a major …/or apply automation to remove manual work/process. Conduct weekly ticket reviews and monthly Service reviews with the customer. Manage and Maintain all Licensing and certificates. Patching & Vulnerability Management. Consider Information Security as part of the incident and security management process to ensure the confidentiality, integrity and availability of both internal and customer IT assets are More ❯
Posted:

Second Line Support Engineer - On-Site

South East London, England, United Kingdom
Hybrid / WFH Options
Prince Talent & Resourcing Group
for service desk colleagues to help them resolve tickets the same day (preferably the same hour). Log tickets for the customer and ensure you are following the Incident Management process every time – “if it’s not in the ticket, it didn’t happen”. Maintain ticket Q so all tickets include a daily update. The standard is to … avoid having tickets older than 2 weeks that do not have a full plan of action to move to resolution. Change Management – Ensure that you always log a change in accordance with our change management process to fix a fault or satisfy a work request. Help the Service Desk and wider teams quickly identify security or a major …/or apply automation to remove manual work/process. Conduct weekly ticket reviews and monthly Service reviews with the customer. Manage and Maintain all Licensing and certificates. Patching & Vulnerability Management. Consider Information Security as part of the incident and security management process to ensure the confidentiality, integrity and availability of both internal and customer IT assets are More ❯
Posted:

Cyber Security Consultant

Basildon, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
in depth technical understanding. You will be expected to cover the initiation through to the design and implementation, across several of the skills and technologies below: Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/Related Certifications DESIRED KNOWLEDGE, SKILLS & EXPERIENCE The ability … significant value to your application. Training and development in these technologies/solutions may be provided if required. Microsoft Intune (Focused on Security, not the full suite) Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee must be able to demonstrate the following qualities: Autonomy … Quality Focus – Concern for quality, being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in written and verbal communication. The More ❯
Posted:

Cyber Security Consultant

Southampton, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
in depth technical understanding. You will be expected to cover the initiation through to the design and implementation, across several of the skills and technologies below: Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/Related Certifications DESIRED KNOWLEDGE, SKILLS & EXPERIENCE The ability … significant value to your application. Training and development in these technologies/solutions may be provided if required. Microsoft Intune (Focused on Security, not the full suite) Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee must be able to demonstrate the following qualities: Autonomy … Quality Focus – Concern for quality, being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in written and verbal communication. The More ❯
Posted:
Vulnerability Management
10th Percentile
£40,000
25th Percentile
£50,000
Median
£60,000
75th Percentile
£78,750
90th Percentile
£92,500