VULNERABILITY MANAGEMENT ANALYST Up to £70,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a major driving forces behind … Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a Vulnerability Management/SOCAnalyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's Vulnerability Management Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes & Schedules related to VulnerabilityScanning of All Endpoints of the business. As a Vulnerability Management/SOC Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of SOC/Vulnerability Management Analyst role would include: Conducting More ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability management-specific tooling, and have … an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process vulnerability data to provide reports, insights and metrics … that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerability management, security standards, and regulations More ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability management-specific tooling, and have … an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process vulnerability data to provide reports, insights and metrics … that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerability management, security standards, and regulations More ❯
Vulnerability Analyst – 3-month contract My Customer is seeking a proactive and skilled Vulnerability Analyst to join their team in a highly regulated, mission-critical 24/7 environment. Their infrastructure includes over 450 servers operating across both Windows and Linux platforms — making secure access and timely response essential. Hands-on experience with Qualys and its vulnerabilityscanning, assessment, and reporting tools is needed for this role. Key Skills from the Vulnerability Analyst: Demonstrated experience in vulnerability management within large-scale enterprise or corporate environments . Hands-on experience with Qualys and its vulnerabilityscanning, assessment, and reporting tools. Strong working knowledge of Windows and Linux operating systems , including their associated … technology stacks. Able to operate effectively in a secure, complex, and highly regulated setting with restricted access considerations. Key responsibilities for the Vulnerability Analyst: Daily monitoring and analysis of security events and vulnerabilities. Proactively reviewing Qualys reports to identify missing patches, misconfigurations, and other potential threats. Collaborating closely with infrastructure and operations teams to coordinate and apply remediation actions. More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Mayden
manage the information security incident response plan, including detection, analysis, containment, eradication, recovery, and post-incident review, supporting timely reporting to relevant authorities (eg ICO, NHS England) where required. Vulnerability management and testing: Own, support and oversee programs for vulnerabilityscanning, penetration testing, and security audits of applications and infrastructure to identify and address security weaknesses. Security … technical stakeholders, including senior leadership, product teams, and external partners. Team leadership & mentoring: Proven ability to lead, mentor, and develop a high-performing governance, risk, and compliance (GRC) team. Vulnerability management: Experience scoping, overseeing and interpreting the results of vulnerabilityscanning, penetration testing, and security audits. Desirable: Cloud Security Expertise: Experience securing cloud-native applications and infrastructure More ❯
security role, preferably within a healthcare environment. Extensive experience working on IT security-related issues. Management or supervisory experience. Experience in managing and motivating technical teams Ability to understand vulnerability scans and penetration tests and develop remediation plans. Experience developing and implementing cyber security policies, processes, and procedures. Experience managing phishing simulation & training and awareness campaigns. Experience with vulnerabilityscanning, incident response, and third-party risk management. Experience in monitoring and configuring warning and security systems. Desirable Cloud Security experience (e.g. Azure, AWS, GCP). Experience with firewalls, intrusion detection/prevention systems, and network design. Experience with Microsoft Windows Server and IP networking. Experience of working within ITIL-based change management processes. Ability to evaluate and … security role, preferably within a healthcare environment. oExtensive experience working on IT security-related issues. oManagement or supervisory experience. oExperience in managing and motivating technical teams oAbility to understand vulnerability scans and penetration tests and develop remediation plans. oExperience developing and implementing cyber security policies, processes, and procedures. oExperience managing phishing simulation & training and awareness campaigns. oExperience with vulnerabilityMore ❯
is embedded within the Software Development Life Cycle, while ensuring that all security requirements have been applied before product or function release. Analyse and interpret security scan results and vulnerability reports to develop prioritized remediation strategies, working closely with IT, Development and Hosting teams to address vulnerabilities effectively Engineer and implement security controls based on industry standards while continuously … ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetration testing and vulnerabilityscanning Ensure products compliance with security standards and regulations Ensure NAVBLUE Security strategy deployment within technical operations Ensure effective synchronization and alignment with Airbus Security Organization Education: Bachelor … influencing individuals at all levels of the organization to drive and implement change while identifying and minimizing the impact of risks Technical Systems Proficiency: Security Management Tools (email filtering, vulnerabilityscanning tools, security dashboards, etc.) Cloud security management tools like CNAPP, CSPM, CWPP, and CIEM. Security risk assessment methodology (EBIOS RM) Security Requirement Definition and Review Travel Required More ❯
is embedded within the Software Development Life Cycle, while ensuring that all security requirements have been applied before product or function release. Analyse and interpret security scan results and vulnerability reports to develop prioritized remediation strategies, working closely with IT, Development and Hosting teams to address vulnerabilities effectively Engineer and implement security controls based on industry standards while continuously … ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetration testing and vulnerabilityscanning Ensure products compliance with security standards and regulations Ensure NAVBLUE Security strategy deployment within technical operations Ensure effective synchronization and alignment with Airbus Security Organization Education: Bachelor … influencing individuals at all levels of the organization to drive and implement change while identifying and minimizing the impact of risks Technical Systems Proficiency: Security Management Tools (email filtering, vulnerabilityscanning tools, security dashboards, etc.) Cloud security management tools like CNAPP, CSPM, CWPP, and CIEM. Security risk assessment methodology (EBIOS RM) Security Requirement Definition and Review Travel Required More ❯
Belfast, County Antrim, Northern Ireland, United Kingdom Hybrid / WFH Options
Reed
and, OS, application, and hardware maintenance for staff endpoint devices. Take lead on the migration of Windows 10 to Windows 11 across the organisation. IT Security Implementation and Compliance. Vulnerabilityscanning and patch management across the IT estate using tools such as Qualys and MS Intune will be required. There will be a need to support the implementation … a Microsoft Hybrid Environment (on-prem and cloud). Experience with configuring W10 & W11 laptop devices with BitLocker Encryption. Experience with setting up Windows Hello for Business. Experience with VulnerabilityScanning and Patch Management (Qualys, Nessus). Experience with administering and managing system backups. Experience with administering and managing server infrastructure (Windows Server 2016 – 2022). Helpdesk experience More ❯
Required: Tenable Nessus Engineers IR35 Status: Inside Duration: 12 month initial contract Location: 1-2 days onsite in either Central London or Knutsford Role 1 As an experienced Vulnerability Assessment Engineer responsible for maintaining the Vulnerability Assessment toolsets and products. Primary Responsibilities The ability to review requirements, undertake product design followed by Implementation/deployment/support of … Vulnerability Assessment tools suite (e.g Tenable, Rapid7, Qualys etc) and peripherals with Engineering. Maintains local and network credentials and provisions access to vulnerabilityscanning systems. Responsible for integration of Vulnerability assessment tooling with other security and IT systems management tools (i.e. Splunk, ServiceNow) Responsible for developing and maintaining standard processes and operating procedures, creating technical architecture … diagrams and system build documentation. Responsible for operating the scanning tools and maintaining coverage along with supporting the vulnerability management and remediation teams in understating how to remediate vulnerabilities (i.e. laptops, VMs, wireless devices) Works with vulnerability management team to build asset repositories and asset scan policies Work closely with customer delivery managers to prioritize daily tasks More ❯
SIEM use cases: log ingestion, analytics rules, playbooks and workbooks. Deploy and manage Microsoft Defender solutions (Defender for Cloud, Defender for Servers, Defender for Containers) to harden Azure workload Vulnerability & Patch Management Operate vulnerability management tools to discover and prioritise flaws across cloud and on-prem systems. Define and run patch management processes for virtual machines, containers and … serverless functions. Integrate vulnerabilityscanning (e.g. Qualys, Sonar Cloud, Tenable or Azure-native scanners) into CI/CD pipelines. Security Analysis & Incident Response Perform root-cause analysis of security incidents and vulnerabilities. Conduct threat modelling, code and infrastructure reviews. Develop and execute incident response procedures, leveraging Sentinel playbooks and Logic Apps when required. CI/CD & Automation Integrate … services (IAM, networking, Key Vault). Proven track record configuring and optimising Microsoft Sentinel (SIEM) and Microsoft Defender tools. Familiarity with Azure Policy and Azure Blueprints for compliance enforcement. Vulnerability & Patch Management Practical experience with vulnerability scanners (Qualys, Tenable, or Azure Defender Vulnerability Assessment). Knowledge of patch management frameworks (WSUS, Azure Update Management, third-party tools More ❯
the country. It is the largest news publisher on TikTok with over 28 million total followers and nearly 45 billion views in the past year. We are seeking a Vulnerability Engineer to help build and drive our vulnerability management function. This is a key role for someone with the technical skills, automation mindset, and proactive attitude to take … someone who thrives on ownership, brings ideas to life through automation, and collaborates effectively with teams across the business. Main Responsibilities Develop, implement, and maintain an automated and scalable vulnerability management program using Tenable and related tools. Establish and enforce vulnerability management policies, scan configurations, and best practices, aligned to frameworks such as ISO 27001, NIST, and CIS. … Integrate vulnerabilityscanning and remediation into CI/CD pipelines and development workflows to ensure security at speed. Automate data collection, triage, reporting, and ticketing processes using scripting languages such as Python, Bash, PowerShell, or Go. Collaborate with IT, DevOps, and engineering teams to remediate identified vulnerabilities quickly and effectively. Scope and coordinate penetration testing activities; track remediation More ❯
penetration testing, and static/dynamic security testing (SAST/DAST). Security Tooling and Automation : Implement and maintain security tools used in the development and deployment processes (e.g., scanning tools, vulnerability management systems, SAST, DAST, ASPM). Automate security processes to streamline secure development and operational workflows. Incident Detection and Response : Work with engineering and platform teams … Expertise: Deep understanding of identifying, assessing, and mitigating security risks in application designs, code, and deployed products. Experience managing and using security testing tools such as SAST, DAST, and vulnerabilityscanning solutions. Strong grasp of secure coding practices and proficiency in integrating security into the Software Development Lifecycle (SDLC). Technical Knowledge and Implementation experience: Direct experience with More ❯
Operate within a global team that takes responsibility for the security monitoring of key technologies and tools across the estate Lead and manage a team of Security Analysts & the Vulnerability management team Comfortable operating in a technical capacity performing hands-on incident response and supporting/managing SOC analysts Act as a SME in matters related threat and vulnerability … and new technology initiatives Implement and maintain operating run books, operating processes and procedures Help to develop and configure use cases, and alerting rules within SIEM technologies Mange the vulnerability management programme that includes vulnerabilityscanning, security testing, threat monitoring and data loss and leakage prevention Direct on-going threat intelligence activities Mentor and develop security analysts … Skills: Prior experience working/managing a SOC Demonstrable experience and operational knowledge of SIEM, firewalls, intrusion detection and vulnerability management systems/solutions Detailed understanding of Security Monitoring, Threat Intelligence, Vulnerability management and Incident Response Experience managing security incidents within a complex environment. Strong foundation in network security and common attack methodologies Exposure to user behaviour analytical More ❯
Management : Lead the information security risk management process, including identification, assessment, treatment, and monitoring of risks, with a particular emphasis on application security risks. Conduct regular risk assessments and vulnerability analyses of systems, applications, and infrastructure. Security Operations : Oversee the management of security technologies and controls, including but not limited to, firewalls, intrusion detection/prevention systems, security information … and event management (SIEM), data loss prevention (DLP), vulnerability management tools, and application security testing tools. Secure Software Development Lifecycle (SSDLC) : Integrate security best practices into the software development lifecycle. Work closely with development teams to ensure secure coding practices, conduct comprehensive security testing (e.g., penetration testing, vulnerabilityscanning, application security reviews), and promote a security-aware More ❯
frameworks, and threat landscapes to ensure enterprise-grade protection across cloud platforms. You will work closely with TMHCC International IT teams and Group Security teams to prioritise and coordinate vulnerability remediation across the cloud estate. You will be experienced in cyber vulnerability detection, remediation, and reporting processes. You will be responsible for triaging and prioritising detected vulnerabilities as … they emerge, to the BISO and IT Leadership for action or information. Skills and Experience Specification 5-10 years of experience in a technical cyber role (e.g., threat and vulnerability analyst, security engineer, SOC analyst). Minimum 3-5 years of hands-on experience in cloud environments. Proven experience with at least one major cloud provider (AWS, Azure). … Proven experience with Microsoft Azure (multi-cloud knowledge, especially AWS, is a plus). Experience with security operations, incident response, and cloud compliance. Working knowledge of vulnerabilityscanning and detection technologies. Practical experience in triage and remediation of vulnerabilities. Deep understanding of and ability to articulate the risk associated with security vulnerabilities. Ability to coordinate and chair regular More ❯
Cyber Security Operations Manager to lead our Cyber Security Operations Centre; responsible for managing the day-to-day operations of the SOC team, overseeing incident detection and response, ensuring vulnerabilityscanning and remediation efforts across the organization. Role Overview: Job Title: SOC Manager/Cyber Security Operations Manager Location: Leeds/England/Remote Contract Type: Contract Duration … preferred). Minimum 5 years of experience in cybersecurity operations, with at least 2 years in a leadership or management role. Strong knowledge of SOC operations, incident response, and vulnerability management best practices. Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel), vulnerability scanners (e.g., Nessus, Qualys), and other security platforms. Relevant certifications such as CISSP, CISM … regulated industries (e.g., finance, healthcare, critical infrastructure). Knowledge of compliance frameworks such as ISO 27001, NIST, GDPR, or CIS Familiarity with scripting or automation for incident response or scanning processes. Please feel free to contact myself - Daisy Nguyen at Gibbs Consulting/Atrium UK for a confidential chat to know more details about the role. Please also note More ❯
techniques. Experience with Azure Log Analytics, KQL, and Azure Alerts. Python, Shell, and PowerShell scripting. Experience with security tools and technologies (e.g., SIEM, IDS/IPS, NG Firewall capabilities, vulnerability scanners). Knowledge of Active Directory and Azure AD. Knowledge of application delivery and the infrastructures that enable it. Familiarity with SQL Server, Oracle, clustering/High Availability technologies More ❯
Expertise: Strong knowledge of cloud (Azure, O365, Amazon) and server infrastructure, networks, firewalls, and endpoint systems. Security Tools & Technologies: Proficiency with security tools such as SIEM, IDS/IPS, vulnerability scanners, firewalls, endpoint protection, alert and remediation, and encryption technologies. Certifications: Relevant certifications such as CISSP, CISM, CCSP, CEH, or AWS/Azure security certifications are highly desirable. Scripting More ❯
control traffic flow. - Collaborate with other teams to define and enforce network access policies, ensuring that only authorized personnel and devices have appropriate access rights. Proactive Security Testing and Vulnerability Management: - Conduct and organise regular security assessments, including vulnerabilityscanning and testing, to identify weaknesses in the network infrastructure. - Collaborate with system administrators and application owners to … address identified vulnerabilities and implement necessary patches or configuration changes. - Develop and maintain a comprehensive vulnerability management program, including vulnerability tracking, risk assessment, and remediation planning. Stakeholder Collaboration: - Act as a stakeholder for the response team, providing expert guidance on security-related alerts, incidents, and potential improvements. - Collaborate with cross-functional teams, including network engineers, system administrators, and More ❯
and compliance with relevant laws, regulations, and industry best practices. Additionally, the role encompasses continuous monitoring, threat detection, and incident investigation to protect organisational assets, as well as leading vulnerability management activities such as scanning, assessment, remediation coordination, and tracking of security weaknesses. About us We are Public Health Wales - the national public health agency in Wales. Our … oDemonstrated experience in cyber security role(s). oGood understanding and experience with application and network security. oHands-on experience with SIEM (Security Information and Event Management) systems and vulnerabilityscanning tools oInvolvement in creating training materials, including phishing simulation exercises. . oExperience in providing technical/security support. Desirable oCloud Security experience (e.g Azure, AWS, GCP) oRelevant More ❯
cause harm. This involves continuous monitoring and analysis of network traffic, system logs, and other data sources to identify unusual patterns or behaviours that may indicate a security threat. Vulnerability Management: Identify and address security weaknesses in our systems. Conduct regular vulnerability assessments, apply patches and updates, and implement security controls to mitigate risks. Defence Management: Oversee and … experience and skills that include: IT Security Operations Experience: Recent experience as a senior member of a multi-disciplinary team managing operational security (firewall, content filtering, DMZ, Pen Testing, Vulnerability Management) and external managed service partners. Security Qualifications: Accredited to a recognised Security qualification (e.g., CISSP, CCP, CCSP). The successful candidate must be willing to work towards obtaining … Demonstrated ability to actively seek out and neutralise potential threats. Experience with threat intelligence tools and techniques, and a deep understanding of the latest cyber threats and attack vectors. Vulnerability Identification: Expertise in identifying and mitigating security vulnerabilities. Experience with vulnerabilityscanning tools, penetration testing, and risk assessment methodologies. Defence and Firewall Management: Experience in managing defences More ❯
able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerabilityscanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security More ❯
able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerabilityscanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security More ❯
able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerabilityscanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security More ❯