Vulnerability Management Jobs in the UK

76 to 100 of 386 Vulnerability Management Jobs in the UK

Cyber Security Lead

Glasgow, United Kingdom
Hybrid / WFH Options
Hymans Robertson LLP
everything that we do. Act in advisory capacity, to external audits and due diligence questionnaires. Key Technologies: Strong practical knowledge of M365 stack from a security perspective (Defender, Azure) Vulnerability Management Web Application Filtering DLP Cloudflare Secure File Transfer Firewalls Remote Access/VPN PKI Infrastructure DNS Email Gateways Security Audits ISO27001 Azure DevOps (Scrum principles, Release Pipelines More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Principal Security Engineer (Vulnerability Management)

United Kingdom
Hybrid / WFH Options
Oracle
high scale services and working with some of Oracle's most critical customers? We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in vulnerability management and cloud security. This position is designed for technical security engineers adept at navigating the complexities of cloud security and leading efforts to increase security posture. In … and create the future of software assurance at scale together. What You’ll Bring A minimum of 8 years of experience in the cybersecurity field, with a focus on vulnerability management, cloud security, and security architecture analysis. Strong understanding of vulnerability management processes, remediation workflows, and validation of security findings Experience designing and managing security metrics … dashboards, and reporting for technical and leadership audiences Proven expertise in cloud architecture and security principles, and a thorough understanding of risk management frameworks Hands-on experience integrating data from security tools Proficiency in developing and implementing security policies and procedures within cloud environments to safeguard against potential threats Ability to effectively assess and communicate risks and appropriate levels More ❯
Posted:

Principal Security Engineer (Vulnerability Management)

London, England, United Kingdom
Hybrid / WFH Options
Oracle
high scale services and working with some of Oracle's most critical customers? We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in vulnerability management and cloud security. This position is designed for technical security engineers adept at navigating the complexities of cloud security and leading efforts to increase security posture. In … and create the future of software assurance at scale together. What You’ll Bring A minimum of 8 years of experience in the cybersecurity field, with a focus on vulnerability management, cloud security, and security architecture analysis. Strong understanding of vulnerability management processes, remediation workflows, and validation of security findings Experience designing and managing security metrics … dashboards, and reporting for technical and leadership audiences Proven expertise in cloud architecture and security principles, and a thorough understanding of risk management frameworks Hands-on experience integrating data from security tools Proficiency in developing and implementing security policies and procedures within cloud environments to safeguard against potential threats Ability to effectively assess and communicate risks and appropriate levels More ❯
Posted:

Vulnerability Management Manager

Exeter, Devon, United Kingdom
Hybrid / WFH Options
Met Office
The following content displays a map of the jobs location - Exeter We're looking for an exceptional Vulnerability Management Manager to help us make a difference to our planet. As our Vulnerability Management Manager, the job may be suitable for hybrid working, which is where an employee works part of the week in the office and … people are at the heart of what wedoand we'll do our best toagreea working pattern that works for everyone. World changingwork From science to technology, from meteorology to management, and from planning to communication, our expertise helps us stand out as the authority on weather accuracy and climate prediction. We help individuals, industries and government to make better … purpose at the heart ofdecision-making We'rebettertogether-understandingpartnerships and inclusivity make usgreater We keep evolving - pushing boundaries to make tomorrow better for ourcustomers Your world ofexpertise As theVulnerability Management Managerwithin the Security Operations team of the Met Office's Cyber Security Department you will be responsible for driving the vision and operational execution of the organisation's vulnerability More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Vulnerability Analyst

London, United Kingdom
VIQU Limited
Vulnerability Analyst Tenable SME Outside IR35 6 Months Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerability management programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerability management lifecycle from tooling and assessments to governance, reporting and stakeholder engagement. You ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerability management process using Tenable . Develop, deploy and maintain a comprehensive vulnerability management program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Employment Type: Contract
Rate: GBP 400 - 500 Daily
Posted:

Vulnerability Analyst

Kensington, West Holland Park, Greater London, United Kingdom
VIQU Limited
Vulnerability Analyst – Tenable SME – Outside IR35 – 6 Months – Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerability management programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerability management lifecycle — from tooling and assessments to governance, reporting and stakeholder engagement. You’ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerability management process using Tenable . Develop, deploy and maintain a comprehensive vulnerability management program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Employment Type: Contract
Rate: £400 - £500/day Outside IR35
Posted:

SOC Manager - Security Vendor

United Kingdom
Trilaty Group
Operate within a global team that takes responsibility for the security monitoring of key technologies and tools across the estate Lead and manage a team of Security Analysts & the Vulnerability management team Comfortable operating in a technical capacity performing hands-on incident response and supporting/managing SOC analysts Act as a SME in matters related threat and … vulnerability management incl incident response Understand security incidents and the likely impact these will have on the business Define and report on KPIs with recommendations for improvement Identify security risks, threats and vulnerabilities of the company's network, systems, applications and new technology initiatives Implement and maintain operating run books, operating processes and procedures Help to develop and … configure use cases, and alerting rules within SIEM technologies Mange the vulnerability management programme that includes vulnerability scanning, security testing, threat monitoring and data loss and leakage prevention Direct on-going threat intelligence activities Mentor and develop security analysts Skills: Prior experience working/managing a SOC Demonstrable experience and operational knowledge of SIEM, firewalls, intrusion detection More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Information Security Consultant

Yorkshire, United Kingdom
Headway Recruitment
as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. They re looking for an experienced Information Security Consultant … with expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert … guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development Create More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Information Security Consultant

LS18 4GH, Rodley, West Yorkshire, United Kingdom
Headway Recruitment
as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. They’re looking for an experienced Information Security Consultant … with expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management – Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring – Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts – Handle security alerts and inquiries, providing expert … guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development – Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development – Create More ❯
Employment Type: Permanent
Posted:

IT Information Security Consultant

Pudsey, West Yorkshire, Yorkshire, United Kingdom
CIIH Ltd T/A Headway Recruitment
as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. Theyre looking for an experienced Information Security Consultant with … expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. … Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development Create and More ❯
Employment Type: Permanent
Salary: £55,000
Posted:

Cyber Security Analyst

City of London, London, United Kingdom
Hybrid / WFH Options
Sarafin Partners
experienced professional to work with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the defined policies … standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception and management reports Reporting … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of network infrastructure, including routers, switches More ❯
Posted:

Cyber Security Analyst

London Area, United Kingdom
Hybrid / WFH Options
Sarafin Partners
experienced professional to work with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the defined policies … standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception and management reports Reporting … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of network infrastructure, including routers, switches More ❯
Posted:

Cyber Security Analyst

South East London, England, United Kingdom
Hybrid / WFH Options
Sarafin Partners
experienced professional to work with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the defined policies … standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception and management reports Reporting … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of network infrastructure, including routers, switches More ❯
Posted:

Information Security Specialist

Crawley, England, United Kingdom
Hybrid / WFH Options
DGH Recruitment
information security strategy, ensuring alignment with ISO 27001, GDPR and Cyber Essentials. The ideal candidate will have strong information security experience alongside hands-on technical knowledge of SIEM, EDR, vulnerability management, and incident response. Responsibilities: - Serve as a subject matter expert for information security, advising stakeholders on risks, controls, and security best practices. - Support business units with risk … and mail filtering systems to ensure effective threat detection and response. - Monitor, investigate, and respond to alerts and incidents, coordinating with internal teams and third-party providers. - Oversee regular vulnerability scans and third-party penetration tests; track and report remediation efforts. - Maintain the internal compliance programme for information security and data protection, including ISO27001, GDPR and Cyber Essentials requirements. … Required Skills/Experience: - Strong understanding of information security principles, risk management, and compliance (ISO 27001, GDPR, Cyber Essentials). - Hands-on experience with cybersecurity tools. - Experience conducting or supporting internal security audits or assessments. - Solid understanding of IT infrastructure (e.g. networking, Active Directory, endpoint security). - Certifications such as CISSP, CISM, CISA, Security+, or equivalent (highly advantageous) Information More ❯
Posted:

Application Security Architect

England, United Kingdom
Atrium (EMEA)
and architecture teams to define technical security requirements and ensure cohesive, secure solutions. Lead on the resolution of high-priority and complex security incidents. Advise senior leadership on risk management strategies and mitigation plans. Oversee security for a portfolio of applications/projects from inception through delivery. Ensure security controls are effectively embedded throughout the SDLC. Maintain up-to … date InfoSec policies and technical security standards. Conduct vulnerability assessments, threat modelling, and architecture reviews. What You’ll Bring Strong ability to translate technical risk into clear, actionable business terms. Hands-on experience with secure DevOps pipelines and development practices. Excellent stakeholder management skills across technical and non-technical teams. Proven track record in large, regulated environments with … Azure/AWS Security. Working knowledge of GDPR, HIPAA, PCI-DSS. Familiarity with development in .NET, Java, Python, PowerShell, or Bash. Knowledge of tools like SIEM, SOAR, IDS, WAF, vulnerability management platforms. Experience with UI, API, microservices security patterns and cryptographic principles. Threat modelling and dynamic security testing skills. Background in business analysis or requirements engineering. More ❯
Posted:

Application Security Architect

London, England, United Kingdom
Atrium (EMEA)
and architecture teams to define technical security requirements and ensure cohesive, secure solutions. Lead on the resolution of high-priority and complex security incidents. Advise senior leadership on risk management strategies and mitigation plans. Oversee security for a portfolio of applications/projects from inception through delivery. Ensure security controls are effectively embedded throughout the SDLC. Maintain up-to … date InfoSec policies and technical security standards. Conduct vulnerability assessments, threat modelling, and architecture reviews. What You’ll Bring Strong ability to translate technical risk into clear, actionable business terms. Hands-on experience with secure DevOps pipelines and development practices. Excellent stakeholder management skills across technical and non-technical teams. Proven track record in large, regulated environments with … Azure/AWS Security. Working knowledge of GDPR, HIPAA, PCI-DSS. Familiarity with development in .NET, Java, Python, PowerShell, or Bash. Knowledge of tools like SIEM, SOAR, IDS, WAF, vulnerability management platforms. Experience with UI, API, microservices security patterns and cryptographic principles. Threat modelling and dynamic security testing skills. Background in business analysis or requirements engineering. More ❯
Posted:

Information Security Lead

Crawley, West Sussex, South East, United Kingdom
Hybrid / WFH Options
DGH Recruitment
information security strategy, ensuring alignment with ISO 27001, GDPR and Cyber Essentials. The ideal candidate will have strong information security experience alongside hands-on technical knowledge of SIEM, EDR, vulnerability management, and incident response. Responsibilities: - Serve as a subject matter expert for information security, advising stakeholders on risks, controls, and security best practices. - Support business units with risk … and mail filtering systems to ensure effective threat detection and response. - Monitor, investigate, and respond to alerts and incidents, coordinating with internal teams and third-party providers. - Oversee regular vulnerability scans and third-party penetration tests; track and report remediation efforts. - Maintain the internal compliance programme for information security and data protection, including ISO27001, GDPR and Cyber Essentials requirements. … Required Skills/Experience: - Strong understanding of information security principles, risk management, and compliance (ISO 27001, GDPR, Cyber Essentials). - Hands-on experience with cybersecurity tools. - Experience conducting or supporting internal security audits or assessments. - Solid understanding of IT infrastructure (e.g. networking, Active Directory, endpoint security). - Certifications such as CISSP, CISM, CISA, Security+, or equivalent (highly advantageous) Information More ❯
Employment Type: Permanent, Work From Home
Salary: £70,000
Posted:

CHIEF INFORMATION SECURITY OFFICER-AEROSPACE AND DEFENSE

United Kingdom
Gentrian
requires a sophisticated operating model that allows for a stronger security posture centralized in a Security Operations Center (SOC). This role will oversee global operations with a unified management of API calls, space exploration & navigation, and integrate various tools into our systems of record to view interactions from a holistic risk management perspective. Areas to cover: Incident … response and remediation Orchestrating and automating signals Prioritizing cases and incident response Cyber threat intelligence and dark web monitoring Vulnerability management and exposure management Building a resilient cybersecurity culture Introducing new risk management techniques will undergo formal approval by the Change Approval Board (C.A.B). The role will also involve micromanaging cybersecurity engineers, penetration testing engineers … of hire. Visa sponsorship is not available for this position. QUALIFICATIONS, KEY REQUIREMENTS AND SKILLSET: 20+ years in cybersecurity and digital solutions engineering Proficiency in key generation, key lifecycle management, and risk management GSEC or Offensive Security Certified Professional (OSCP) Certified Information Security Manager (CISM) Certified Authorization Professional (CAP) Certified Network Defender (CND) Information Systems Security Architecture Professional More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Engineer

Borehamwood, United Kingdom
Elysium Healthcare
teams. In addition to alert triage and incident response, you will be responsible for maintaining and tuning key security solutions such as endpoint detection and response (EDR), antivirus, and vulnerability management platforms. You will also provide technical support to internal security-aligned projects and initiatives. About us Elysium Healthcare is an established, stable, and agile company with over … teams.a In addition to alert triage and incident response, you will be responsible for maintaining and tuning key security solutions such as endpoint detection and response (EDR), antivirus, and vulnerability management platforms. This role ensures these tools operate effectively, remain aligned to evolving threats, and support compliance with organisational standards and frameworks. You will also provide technical support … false positives, and improve threat detection accuracy. Prioritise security alerts based on business impact, SLA requirements, and known threat intelligence. Maintain and tune operational security platforms (e.g. EDR, antivirus, vulnerability scanning). Support internal security projects with implementation, testing, and documentation. Maintain records of security incidents, response actions, and lessons learned. Collaborate with the SOC to improve alerting thresholds More ❯
Employment Type: Permanent
Salary: £50000.00 - £60000.00 a year
Posted:

Senior Cyber Security & Risk Consultant

London, United Kingdom
Oliver James Associates Ltd
CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerability management, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Strategy Manager - Consulting

London, United Kingdom
Oliver James Associates Ltd
latest cyber security challenges. Relevant certifications such as M.Inst.ISP, CISSP, CISM, CISA, or an MSc in cyber security or related discipline. Practical experience in cyber architecture, cyber GRC, threat management, vulnerability management, and security reviews. Detail-oriented with strong problem-solving skills. Excellent oral and written communication skills, including concise reporting and presentation creation. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cyber Security & Strategy Manager - Consulting

London, United Kingdom
Oliver James Associates Ltd
CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerability management, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Manager

London, United Kingdom
Oliver James Associates Ltd
Develop and lead a comprehensive cyber resilience strategy aligned with regulatory requirements and industry best practices, including setting objectives, priorities, and performance metrics. Oversee end-to-end security incident management, including detection, analysis, containment, and resolution. Define and implement clear incident response procedures, escalation protocols, and coordination processes across DDaT and broader business teams. Lead the vulnerability management More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Microsoft Security (Sentinel) Automation & Detection Engineer

Cambridge, England, United Kingdom
Hays
proficient in automation and orchestration tools (e.g., SOAR platforms, scripting languages like Python, PowerShell, KQL) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Key Skills and Experience Experience contributing to large-scale, sprint-based, security automation and detection engineering projects in a SOC/Cyber Defense or similar … Operation’s efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management More ❯
Posted:

Microsoft Security (Sentinel) Automation & Detection Engineer

Ely, England, United Kingdom
Hays
proficient in automation and orchestration tools (e.g., SOAR platforms, scripting languages like Python, PowerShell, KQL) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Key Skills and Experience Experience contributing to large-scale, sprint-based, security automation and detection engineering projects in a SOC/Cyber Defense or similar … Operation’s efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management More ❯
Posted:
Vulnerability Management
10th Percentile
£40,000
25th Percentile
£50,250
Median
£60,000
75th Percentile
£78,750
90th Percentile
£92,500