Role: SecOps Engineer - Vulnerability Management Transformation Location: UK remote with occasional site travel Contract: Competitive market rate Contract length: 6 months with strong chance of extension Enablis are working with a leading financial services provider whop are looking for a hands-on SecOps Engineer to help drive their day-to-day T vulnerability management operations. This role is … technical problem-solving and wants to work closely with engineering teams to build security into the development life-cycle. The Opportunity: You'll be the operational backbone of a vulnerability management transformation, working alongside a Lead SecOps Consultant to implement and run processes that protect a critical banking platform. This is a chance to work across diverse technology stacks … platform, mobile, web, backend) while solving complex security challenges in a fast-paced environment. What you'll do: Run Vulnerability Operations: Execute vulnerabilityscanning, triage findings, and coordinate remediation efforts across multiple engineering teams Engineering Collaboration: Partner directly with platform, mobile, web, and backend teams to implement fixes, focusing on dependency updates and secure coding practices Tool More ❯
Worthing, West Sussex, England, United Kingdom Hybrid / WFH Options
VIQU IT Recruitment
Vulnerability Analyst – 6 Months – Remote - Qualys A client is seeking a Vulnerability analyst/Patching Engineer to help tackle a critical security backlog across 2,700 devices. This is a hands-on contract role focused on patching end users and security remediation to ensure systems are up to date and secure. Key Skills of the Vulnerability Analyst … Strong experience in vulnerability management and patching within enterprise environments. Hands-on experience with Qualys for vulnerabilityscanning and reporting. Solid Windows 10/11 expertise with a focus on security hardening and patching. Proficient with SCCM is beneficial but not necessary. Excellent documentation skills. Strong verbal and written communication skills. Responsibilities of the Vulnerability Analyst … end patching for end user devices. Support and transfer knowledge of Qualys alerts and patching workflows. Ensure all systems run on the latest and most secure versions. The successful Vulnerability t Analyst will be working remotely however may require occasional ad hoc travel to Worthing. Apply now to speak with VIQU IT in confidence. Or reach out to Matt More ❯
Role: Lead SecOps Consultant - Vulnerability Management Transformation Location: UK remote with occasional site travel Contract: Competitive market rate Contract length: 6 months with strong chance of extension Enablis are working with a leading financial services provider who are looking for a Lead SecOps Consultant to transform their vulnerability management capabilities. This is a critical role requiring both strategic … vision and hands-on technical expertise to build a best-in-class vulnerability management programme. The Opportunity: You'll be joining an organisation that provides banking platform services to multiple companies, where vulnerability management has become fragmented across teams. They need someone who can move them from reactive incident-based responses to a proactive, engineering-led security approach … that meets stringent financial services compliance requirements. What you'll do: Assess & Transform: Conduct comprehensive current state assessment and design a unified vulnerability management strategy that brings consistency across platform, mobile, web, and backend teams Tool Selection & Implementation: Evaluate, select and implement the optimal blend of commercial and custom vulnerability management tools, including DAST capabilities to complement existing More ❯
automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript More ❯
automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript More ❯
automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript More ❯
Cyber Security Engineer CyberSec Engineer/IT Security Specialist – Disaster Recovery, Resilience Testing, CyberSec Improvements, VulnerabilityScanning/Management, Infrastructure, Nutanix, Commvault, VMware, Azure, PowerShell, Python; Law Firm, Permanent, London/Hybrid (3/2). £80k - £95k (On Experience) +Bonus +Benefits Global Low Firm seeks experienced Cyber Security Engineer/IT Security Specialist to join the IT … infrastructure tooling and at least one scripting language (PowerShell or Python preferred). Experience with Nutanix, VMware, Commvault, and hybrid cloud platforms Azure (preferred), AWS or GCP. Understanding of vulnerability management, monitoring, and orchestration tools. Relevant certifications such as Microsoft SC-200, Certified Ethical Hacker (CEH), CBCP/CBCI or equivalent. We are open to receiving applications from across More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerabilityscanning Data Loss Prevention (DLP) Candidate Profile Proven experience delivering large-scale cyber and information security programmes Strong hands-on background in cyber security and technical delivery Deep More ❯
for the MSP's own security posture ensuring tools, processes, and teams meet the same standards we deliver to clients. They monitor measurable posture metrics (e.g., Microsoft Secure Score, Vulnerability etc.), ensure continuous improvement, and keep the MSP's security practice relevant through ongoing training, certifications, and emerging threat awareness. While day-to-day execution is delegated to Security … the Security Lead owns security end-to-end: identifying risks, embedding controls, and ensuring compliance is demonstrable. Key Responsibilities Client-Facing Lead Quarterly Security Reviews (QSRs), presenting patch/vulnerability posture, incidents, compliance status, and risk register updates. Translate technical security risks into clear business impact and outcomes. Own the client exception process, ensuring risks are documented, communicated, and … escalation point for clients when risks require senior involvement. Internal MSP Security Own the MSP's internal security frameworks and certifications (e.g., CE+, ISO, SOC 2). Oversee patching, vulnerability, and risk management of MSP-owned infrastructure and tools. Ensure MSP's technology stack (RMM, XDR, PSA, backup, etc.) is securely deployed and monitored. Drive staff security awareness, training More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerabilityscanning tools Data Loss Prevention (DLP) solutions Candidate Profile: Strong hands-on experience in cyber and information security Deep understanding of Microsoft Azure security architecture Experience managing vendor More ❯
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding … a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
log parsing, SIEM query languages (KQL, SPL, AQL), and automation with Python/PowerShell. Deep understanding of incident response, threat detection, and frameworks (MITRE, NIST, CIS). Knowledge of vulnerabilityscanning, penetration testing, and network traffic analysis. Familiarity with ITIL processes (Incident, Problem, Change). Excellent stakeholder communication, with the ability to mentor and lead from a technical More ❯
threat hunting and tradecraft development Incident response and playbook development Change approvals (where applicable) Collection and interpretation of different sources of threat intelligence and researching emerging threats and TTPs. Vulnerabilityscanning, management and reporting This role includes an opportunity to operate in a management (within Accenture) and leadership capacity (within client) if this aligns with your personal career More ❯
Clydebank, Dunbartonshire, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment Ltd
Maintains awareness of industry best practices and applies them to organisational security policies. Implements and monitors security systems such as firewalls, intrusion detection systems, endpoint protection, log monitoring, and vulnerability scanning. Investigates and documents security breaches and cyber incidents, including assessment of impact and coordination of remediation efforts. Coordinates penetration testing with internal or external parties as appropriate. Drives More ❯
clydebank, central scotland, united kingdom Hybrid / WFH Options
Nine Twenty Recruitment Ltd
Maintains awareness of industry best practices and applies them to organisational security policies. Implements and monitors security systems such as firewalls, intrusion detection systems, endpoint protection, log monitoring, and vulnerability scanning. Investigates and documents security breaches and cyber incidents, including assessment of impact and coordination of remediation efforts. Coordinates penetration testing with internal or external parties as appropriate. Drives More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment Ltd
Maintains awareness of industry best practices and applies them to organisational security policies. Implements and monitors security systems such as firewalls, intrusion detection systems, endpoint protection, log monitoring, and vulnerability scanning. Investigates and documents security breaches and cyber incidents, including assessment of impact and coordination of remediation efforts. Coordinates penetration testing with internal or external parties as appropriate. Drives More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
protocols and secure key lifecycle management - Securing microservices, APIs, and DevSecOps best practices Skilled in penetration testing and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerabilityscanning, remediation, and vendor management Collaborative mindset with the ability to partner across engineering, security, and product teams Desirable Skills: Hands-on configuration, deployment, and operation of ForgeRock More ❯
protocols and secure key lifecycle management- Securing microservices, APIs, and DevSecOps best practices Skilled in penetration testing and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerabilityscanning, remediation, and vendor management Collaborative mindset with the ability to partner across engineering, security, and product teams Desirable Skills: Hands-on configuration, deployment, and operation of ForgeRock More ❯
Employment Type: Full-Time
Salary: £100,000 - £120,000 per annum, Negotiable, Inc benefits
CRT or equivalent. Enthusiastic about cybersecurity, with excellent communication skills and a willingness to learn and develop. Certifications like CPSA, Sec+, CEH, Pentest+, PPNT. Industry cybersecurity experience. Experience with vulnerabilityscanning technologies. Eligible to work in the UK. Compensation and benefits Along with a competitive salary, great teams, and exciting career opportunities, we offer a wide range of More ❯
Governance and Data Protection teams to ensure alignment. Vendor & System Assurance Conduct third-party security assessments and manage security clauses in supplier contracts and SLAs. Oversee penetration testing and vulnerabilityscanning of core systems, including client portals and emergency response platforms. People Management Lead and mentor a team of Analysts, ensuring high-quality output and continuous development. Create More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
AJ BELL BUSINESS SOLUTIONS LIMITED
the threats targeting AJ Bell and ensuring our defences provide and effective response. Key responsibilities: Reviewing and assessing Security Operations Centre alerts to ensure an appropriate response taken. Overseeing vulnerabilityscanning to confirm the effectiveness of patching Monitoring systems for compliance with policy and supporting remediation where required. Track and manage penetration testing programs. Investigate and respond to More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
AJ Bell
by our external business partners and those we perform on our suppliers. Key responsibilities: Assessment, planning and co-ordination of patch management activities for internal systems and hardware Overseeing vulnerabilityscanning to confirm the effectiveness of patching Assessing and recommending server hardening activities to be completed by the Infrastructure and Service Delivery teams Undertaking risk profiling of AJ More ❯