everything that we do. Act in advisory capacity, to external audits and due diligence questionnaires. Key Technologies: Strong practical knowledge of M365 stack from a security perspective (Defender, Azure) VulnerabilityManagement Web Application Filtering DLP Cloudflare Secure File Transfer Firewalls Remote Access/VPN PKI Infrastructure DNS Email Gateways Security Audits ISO27001 Azure DevOps (Scrum principles, Release Pipelines More ❯
high scale services and working with some of Oracle's most critical customers? We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in vulnerabilitymanagement and cloud security. This position is designed for technical security engineers adept at navigating the complexities of cloud security and leading efforts to increase security posture. In … and create the future of software assurance at scale together. What You’ll Bring A minimum of 8 years of experience in the cybersecurity field, with a focus on vulnerabilitymanagement, cloud security, and security architecture analysis. Strong understanding of vulnerabilitymanagement processes, remediation workflows, and validation of security findings Experience designing and managing security metrics … dashboards, and reporting for technical and leadership audiences Proven expertise in cloud architecture and security principles, and a thorough understanding of risk management frameworks Hands-on experience integrating data from security tools Proficiency in developing and implementing security policies and procedures within cloud environments to safeguard against potential threats Ability to effectively assess and communicate risks and appropriate levels More ❯
London, England, United Kingdom Hybrid / WFH Options
Oracle
high scale services and working with some of Oracle's most critical customers? We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in vulnerabilitymanagement and cloud security. This position is designed for technical security engineers adept at navigating the complexities of cloud security and leading efforts to increase security posture. In … and create the future of software assurance at scale together. What You’ll Bring A minimum of 8 years of experience in the cybersecurity field, with a focus on vulnerabilitymanagement, cloud security, and security architecture analysis. Strong understanding of vulnerabilitymanagement processes, remediation workflows, and validation of security findings Experience designing and managing security metrics … dashboards, and reporting for technical and leadership audiences Proven expertise in cloud architecture and security principles, and a thorough understanding of risk management frameworks Hands-on experience integrating data from security tools Proficiency in developing and implementing security policies and procedures within cloud environments to safeguard against potential threats Ability to effectively assess and communicate risks and appropriate levels More ❯
Exeter, Devon, United Kingdom Hybrid / WFH Options
Met Office
The following content displays a map of the jobs location - Exeter We're looking for an exceptional VulnerabilityManagement Manager to help us make a difference to our planet. As our VulnerabilityManagement Manager, the job may be suitable for hybrid working, which is where an employee works part of the week in the office and … people are at the heart of what wedoand we'll do our best toagreea working pattern that works for everyone. World changingwork From science to technology, from meteorology to management, and from planning to communication, our expertise helps us stand out as the authority on weather accuracy and climate prediction. We help individuals, industries and government to make better … purpose at the heart ofdecision-making We'rebettertogether-understandingpartnerships and inclusivity make usgreater We keep evolving - pushing boundaries to make tomorrow better for ourcustomers Your world ofexpertise As theVulnerability Management Managerwithin the Security Operations team of the Met Office's Cyber Security Department you will be responsible for driving the vision and operational execution of the organisation's vulnerabilityMore ❯
Vulnerability Analyst Tenable SME Outside IR35 6 Months Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerabilitymanagement programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerabilitymanagement lifecycle from tooling and assessments to governance, reporting and stakeholder engagement. You ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerabilitymanagement process using Tenable . Develop, deploy and maintain a comprehensive vulnerabilitymanagement program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Kensington, West Holland Park, Greater London, United Kingdom
VIQU Limited
Vulnerability Analyst – Tenable SME – Outside IR35 – 6 Months – Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerabilitymanagement programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerabilitymanagement lifecycle — from tooling and assessments to governance, reporting and stakeholder engagement. You’ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerabilitymanagement process using Tenable . Develop, deploy and maintain a comprehensive vulnerabilitymanagement program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Operate within a global team that takes responsibility for the security monitoring of key technologies and tools across the estate Lead and manage a team of Security Analysts & the Vulnerabilitymanagement team Comfortable operating in a technical capacity performing hands-on incident response and supporting/managing SOC analysts Act as a SME in matters related threat and … vulnerabilitymanagement incl incident response Understand security incidents and the likely impact these will have on the business Define and report on KPIs with recommendations for improvement Identify security risks, threats and vulnerabilities of the company's network, systems, applications and new technology initiatives Implement and maintain operating run books, operating processes and procedures Help to develop and … configure use cases, and alerting rules within SIEM technologies Mange the vulnerabilitymanagement programme that includes vulnerability scanning, security testing, threat monitoring and data loss and leakage prevention Direct on-going threat intelligence activities Mentor and develop security analysts Skills: Prior experience working/managing a SOC Demonstrable experience and operational knowledge of SIEM, firewalls, intrusion detection More ❯
as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. They re looking for an experienced Information Security Consultant … with expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert … guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & VulnerabilityManagement Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development Create More ❯
as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. They’re looking for an experienced Information Security Consultant … with expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management – Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring – Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts – Handle security alerts and inquiries, providing expert … guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & VulnerabilityManagement – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development – Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development – Create More ❯
as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. Theyre looking for an experienced Information Security Consultant with … expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. … Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & VulnerabilityManagement Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development Create and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sarafin Partners
experienced professional to work with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the defined policies … standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception and management reports Reporting … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerabilitymanagement, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of network infrastructure, including routers, switches More ❯
experienced professional to work with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the defined policies … standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception and management reports Reporting … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerabilitymanagement, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of network infrastructure, including routers, switches More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Sarafin Partners
experienced professional to work with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the defined policies … standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception and management reports Reporting … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerabilitymanagement, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of network infrastructure, including routers, switches More ❯
Crawley, England, United Kingdom Hybrid / WFH Options
DGH Recruitment
information security strategy, ensuring alignment with ISO 27001, GDPR and Cyber Essentials. The ideal candidate will have strong information security experience alongside hands-on technical knowledge of SIEM, EDR, vulnerabilitymanagement, and incident response. Responsibilities: - Serve as a subject matter expert for information security, advising stakeholders on risks, controls, and security best practices. - Support business units with risk … and mail filtering systems to ensure effective threat detection and response. - Monitor, investigate, and respond to alerts and incidents, coordinating with internal teams and third-party providers. - Oversee regular vulnerability scans and third-party penetration tests; track and report remediation efforts. - Maintain the internal compliance programme for information security and data protection, including ISO27001, GDPR and Cyber Essentials requirements. … Required Skills/Experience: - Strong understanding of information security principles, risk management, and compliance (ISO 27001, GDPR, Cyber Essentials). - Hands-on experience with cybersecurity tools. - Experience conducting or supporting internal security audits or assessments. - Solid understanding of IT infrastructure (e.g. networking, Active Directory, endpoint security). - Certifications such as CISSP, CISM, CISA, Security+, or equivalent (highly advantageous) Information More ❯
and architecture teams to define technical security requirements and ensure cohesive, secure solutions. Lead on the resolution of high-priority and complex security incidents. Advise senior leadership on risk management strategies and mitigation plans. Oversee security for a portfolio of applications/projects from inception through delivery. Ensure security controls are effectively embedded throughout the SDLC. Maintain up-to … date InfoSec policies and technical security standards. Conduct vulnerability assessments, threat modelling, and architecture reviews. What You’ll Bring Strong ability to translate technical risk into clear, actionable business terms. Hands-on experience with secure DevOps pipelines and development practices. Excellent stakeholder management skills across technical and non-technical teams. Proven track record in large, regulated environments with … Azure/AWS Security. Working knowledge of GDPR, HIPAA, PCI-DSS. Familiarity with development in .NET, Java, Python, PowerShell, or Bash. Knowledge of tools like SIEM, SOAR, IDS, WAF, vulnerabilitymanagement platforms. Experience with UI, API, microservices security patterns and cryptographic principles. Threat modelling and dynamic security testing skills. Background in business analysis or requirements engineering. More ❯
and architecture teams to define technical security requirements and ensure cohesive, secure solutions. Lead on the resolution of high-priority and complex security incidents. Advise senior leadership on risk management strategies and mitigation plans. Oversee security for a portfolio of applications/projects from inception through delivery. Ensure security controls are effectively embedded throughout the SDLC. Maintain up-to … date InfoSec policies and technical security standards. Conduct vulnerability assessments, threat modelling, and architecture reviews. What You’ll Bring Strong ability to translate technical risk into clear, actionable business terms. Hands-on experience with secure DevOps pipelines and development practices. Excellent stakeholder management skills across technical and non-technical teams. Proven track record in large, regulated environments with … Azure/AWS Security. Working knowledge of GDPR, HIPAA, PCI-DSS. Familiarity with development in .NET, Java, Python, PowerShell, or Bash. Knowledge of tools like SIEM, SOAR, IDS, WAF, vulnerabilitymanagement platforms. Experience with UI, API, microservices security patterns and cryptographic principles. Threat modelling and dynamic security testing skills. Background in business analysis or requirements engineering. More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
DGH Recruitment
information security strategy, ensuring alignment with ISO 27001, GDPR and Cyber Essentials. The ideal candidate will have strong information security experience alongside hands-on technical knowledge of SIEM, EDR, vulnerabilitymanagement, and incident response. Responsibilities: - Serve as a subject matter expert for information security, advising stakeholders on risks, controls, and security best practices. - Support business units with risk … and mail filtering systems to ensure effective threat detection and response. - Monitor, investigate, and respond to alerts and incidents, coordinating with internal teams and third-party providers. - Oversee regular vulnerability scans and third-party penetration tests; track and report remediation efforts. - Maintain the internal compliance programme for information security and data protection, including ISO27001, GDPR and Cyber Essentials requirements. … Required Skills/Experience: - Strong understanding of information security principles, risk management, and compliance (ISO 27001, GDPR, Cyber Essentials). - Hands-on experience with cybersecurity tools. - Experience conducting or supporting internal security audits or assessments. - Solid understanding of IT infrastructure (e.g. networking, Active Directory, endpoint security). - Certifications such as CISSP, CISM, CISA, Security+, or equivalent (highly advantageous) Information More ❯
requires a sophisticated operating model that allows for a stronger security posture centralized in a Security Operations Center (SOC). This role will oversee global operations with a unified management of API calls, space exploration & navigation, and integrate various tools into our systems of record to view interactions from a holistic risk management perspective. Areas to cover: Incident … response and remediation Orchestrating and automating signals Prioritizing cases and incident response Cyber threat intelligence and dark web monitoring Vulnerabilitymanagement and exposure management Building a resilient cybersecurity culture Introducing new risk management techniques will undergo formal approval by the Change Approval Board (C.A.B). The role will also involve micromanaging cybersecurity engineers, penetration testing engineers … of hire. Visa sponsorship is not available for this position. QUALIFICATIONS, KEY REQUIREMENTS AND SKILLSET: 20+ years in cybersecurity and digital solutions engineering Proficiency in key generation, key lifecycle management, and risk management GSEC or Offensive Security Certified Professional (OSCP) Certified Information Security Manager (CISM) Certified Authorization Professional (CAP) Certified Network Defender (CND) Information Systems Security Architecture Professional More ❯
teams. In addition to alert triage and incident response, you will be responsible for maintaining and tuning key security solutions such as endpoint detection and response (EDR), antivirus, and vulnerabilitymanagement platforms. You will also provide technical support to internal security-aligned projects and initiatives. About us Elysium Healthcare is an established, stable, and agile company with over … teams.a In addition to alert triage and incident response, you will be responsible for maintaining and tuning key security solutions such as endpoint detection and response (EDR), antivirus, and vulnerabilitymanagement platforms. This role ensures these tools operate effectively, remain aligned to evolving threats, and support compliance with organisational standards and frameworks. You will also provide technical support … false positives, and improve threat detection accuracy. Prioritise security alerts based on business impact, SLA requirements, and known threat intelligence. Maintain and tune operational security platforms (e.g. EDR, antivirus, vulnerability scanning). Support internal security projects with implementation, testing, and documentation. Maintain records of security incidents, response actions, and lessons learned. Collaborate with the SOC to improve alerting thresholds More ❯
CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and More ❯
latest cyber security challenges. Relevant certifications such as M.Inst.ISP, CISSP, CISM, CISA, or an MSc in cyber security or related discipline. Practical experience in cyber architecture, cyber GRC, threat management, vulnerabilitymanagement, and security reviews. Detail-oriented with strong problem-solving skills. Excellent oral and written communication skills, including concise reporting and presentation creation. More ❯
CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and More ❯
Develop and lead a comprehensive cyber resilience strategy aligned with regulatory requirements and industry best practices, including setting objectives, priorities, and performance metrics. Oversee end-to-end security incident management, including detection, analysis, containment, and resolution. Define and implement clear incident response procedures, escalation protocols, and coordination processes across DDaT and broader business teams. Lead the vulnerabilitymanagementMore ❯
proficient in automation and orchestration tools (e.g., SOAR platforms, scripting languages like Python, PowerShell, KQL) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Key Skills and Experience Experience contributing to large-scale, sprint-based, security automation and detection engineering projects in a SOC/Cyber Defense or similar … Operation’s efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response, and Attack Surface ManagementMore ❯
proficient in automation and orchestration tools (e.g., SOAR platforms, scripting languages like Python, PowerShell, KQL) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Key Skills and Experience Experience contributing to large-scale, sprint-based, security automation and detection engineering projects in a SOC/Cyber Defense or similar … Operation’s efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response, and Attack Surface ManagementMore ❯