Vulnerability Scanning Jobs in the UK

101 to 125 of 389 Vulnerability Scanning Jobs in the UK

Information Technology Engineer

Glasgow, Scotland, United Kingdom
Jones Whyte
hardware refreshes, system migrations, and software deployments. Cyber Security Act as a first responder to security incidents—triaging alerts, containing threats, and escalating to our SOC where appropriate. Support vulnerability management through patching, configuration management, and reporting. Assist with endpoint detection and response (EDR) tools and threat monitoring platforms (e.g., Microsoft Defender for Endpoint). Work alongside internal teams … Azure AD, and Windows Server environments. Solid networking knowledge (TCP/IP, DNS, DHCP, VPNs, VLANs, firewalls). Experience with IT security principles, practices, and tooling (e.g., EDR, MFA, vulnerability scanners). Ability to script or automate tasks using PowerShell or similar tools. Strong troubleshooting and analytical skills with a methodical approach. Ability to work with a hands-on More ❯
Posted:

Lead Cyber Security Engineer London

London, England, United Kingdom
Transferroom Limited
management principles. A motivated team player with excellent communication and stakeholder management skills. Nice to haves: Certifications in vendor, product, methodology, or industry standards. Experience with configuration management tools, vulnerability scanners, proxies, WAFs, and artifact management. Experience in secured Azure or other cloud architectures and engineering solutions. What’s in it for you: Employee assistance programme 25 days holiday More ❯
Posted:

Vulnerability Management Manager

Exeter, Devon, United Kingdom
Hybrid / WFH Options
Met Office
The following content displays a map of the jobs location - Exeter We're looking for an exceptional Vulnerability Management Manager to help us make a difference to our planet. As our Vulnerability Management Manager, the job may be suitable for hybrid working, which is where an employee works part of the week in the office and part of … Management Managerwithin the Security Operations team of the Met Office's Cyber Security Department you will be responsible for driving the vision and operational execution of the organisation's vulnerability management program, overseeing the end-to-end process of identifying, assessing, and recommending mitigations to vulnerabilities across digital services, including complex and mission-critical systems at the Met Office. … Leadership and Development:Lead, manage and mentor a team to ensure the team operate effectively. Develop the team utilising the career framework to identify learning needs and career pathways. Vulnerability Management: Manage and coordinate vulnerability scanning, risk assessments, and penetration testing to identify security weaknesses across systems, infrastructure, and digital services.Lead efforts to enhance vulnerability management More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Vulnerability Management Analyst

London, United Kingdom
Hybrid / WFH Options
Barclay Simpson
access View job & apply Zero Trust Architect Location: Fully Remote Job type: Contract Position Overview: Leading FinTech company seeking a Zero Trust Architect to design and implement Cyber Security Vulnerability Management Analyst Cyber Security Vulnerability Management Analyst required for a market leading financial services firm. It's a great opportunity to get to work with industry-leading tools … your analytical, technical and communication skills, and to really make a difference to our customers and colleagues. This role will contribute to the development, maintenance and overall delivery of Vulnerability Management controls for the Bank, reporting to the Vulnerability Management Lead. The Vulnerability Management Analyst will contribute to the day-to-day running of the team, assisting … Specialists with managing the Bank's Vulnerability Management controls and providing security input for vulnerabilities which threaten the organisation. Experience Understanding of vulnerability lifecycles, standards and ratings Risk assessing findings to determine appropriate response with a proactive approach to recording, management and escalation of risks Increasing the quality of vulnerability reporting automation to reduce manual effort Advanced More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Information Security Consultant

Yorkshire, United Kingdom
Headway Recruitment
policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with … Expertise in Microsoft O365 Security Solutions including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerability scanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location: Leeds (LS18) On-site with More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Information Security Consultant

LS18 4GH, Rodley, West Yorkshire, United Kingdom
Headway Recruitment
policies and regulations. User Support & Alerts – Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development – Support compliance with … Expertise in Microsoft O365 Security Solutions – including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerability scanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location: Leeds (LS18) – On-site with More ❯
Employment Type: Permanent
Posted:

IT Information Security Consultant

Pudsey, West Yorkshire, Yorkshire, United Kingdom
CIIH Ltd T/A Headway Recruitment
policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with … Expertise in Microsoft O365 Security Solutions including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerability scanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location: Leeds (LS18) On-site with More ❯
Employment Type: Permanent
Salary: £55,000
Posted:

Lead DevOps Engineer SC Cleared or SC Eligible

Leeds, England, United Kingdom
Avance Consulting
TCP/IP, DNS, Load Balancers, network firewalls, SSL/TLS/mTLS, along with AWS Shield for DDoS protection, AWS WAF for web security, VPC segmentation, and automated vulnerability scanning. Container Security & Orchestration: Expertise in Docker, ECS, EKS, Kubernetes, implementing security best practices like image vulnerability scanning, Kubernetes RBAC, IAM Roles for Service Accounts (IRSA), Pod … such as CloudWatch, Security Hub, SIEM integrations. CI/CD Security & Automation: Proficient in Jenkins, Git, GitHub Actions, ensuring secure CI/CD pipelines with artifact encryption, automated security scanning, and DevSecOps best practices. Cloud-Based Database Security: Experience managing Amazon RDS, DynamoDB, ElastiCache, enforcing database encryption (KMS), automated backups, fine-grained access controls, and data integrity monitoring. Cost More ❯
Posted:

Information Security Analyst

Birmingham, England, United Kingdom
TECHTRACE PARTNERS
tooling is optimised Provide advice and support to business units on security best practice and control implementation What We’re Looking For Hands-on experience with security tooling (EDR, vulnerability scanning, access control) Familiarity with Security frameworks such as NIST, PCI-DSS, and GDPR Experience working with Microsoft environments (O365, Azure) Clear communicator, able to engage with both … role, and wants to take on broader responsibilities Has been the security point-person in an IT team, leading on patching or endpoint protection Has hands-on experience with vulnerability management tools like Tenable, and is ready to play a bigger role in shaping how security tools are implemented and optimised across the business. This is a chance to More ❯
Posted:

Information Security Analyst

Nechells, England, United Kingdom
JR United Kingdom
tooling is optimised Provide advice and support to business units on security best practice and control implementation What We’re Looking For Hands-on experience with security tooling (EDR, vulnerability scanning, access control) Familiarity with Security frameworks such as NIST, PCI-DSS, and GDPR Experience working with Microsoft environments (O365, Azure) Clear communicator, able to engage with both … role, and wants to take on broader responsibilities Has been the security point-person in an IT team, leading on patching or endpoint protection Has hands-on experience with vulnerability management tools like Tenable, and is ready to play a bigger role in shaping how security tools are implemented and optimised across the business. This is a chance to More ❯
Posted:

Senior IT Security Engineer

United Kingdom
Hybrid / WFH Options
Babylon Labs Ltd
Trust principles. Develop and enforce security policies and procedures for all IT systems and devices, taking into account diverse regional regulations and network conditions. Conduct regular security audits and vulnerability assessments, with a focus on remote access and endpoint security. Device Management & MDM (Worldwide Deployment): Manage device procurement, distribution, and lifecycle for a geographically diverse team. Implement and manage … On (SSO) and multi-factor authentication (MFA). Implement zero trust secure access from any location. Security Tooling & Integration: Evaluate, select, and onboard security solutions (e.g., endpoint protection, SIEM, vulnerability scanners). Integrate security tools with existing systems and workflows, ensuring effective threat detection and response. Automation & Scripting: Develop and maintain scripts and automation tools to streamline IT operations … and enhance security. Automate security tasks, such as patch management, vulnerability scanning or secure configuration enforcement. Vendor Management: Manage relationships with IT and security vendors and service providers. Evaluate vendor security practices and ensure compliance with company policies. Incident Response: Participate in security incident response and investigations, coordinating with remote team members and external partners. User Support & Training More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Security Engineer

London, United Kingdom
Hybrid / WFH Options
Femtech Insider Ltd
years of experience in the information security field. Hands-on experience with AWS (or similar cloud platforms) and Cloudflare. Infrastructure as Code: Proficiency with Terraform or similar IaC tools. Vulnerability Knowledge: Solid understanding of common vulnerability classes and the OWASP Top 10. Coding & Scripting: Proficient in reading code (e.g., Python, Scala) and using Git for version control of … code and configuration changes. Familiarity with iOS or Android security. Experience of industry-standard SIEM and vulnerability scanning tools. Nice to have: Relevant industry certifications (CISSP, OSCP, etc.). Experience of supporting audits such as ISO27001. Experience of working with security risk management frameworks such as ISO31000. Knowledge of security control frameworks such as CIS, NIST800-53 and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer

London, England, United Kingdom
Synapri
organisation’s security posture. This role has ownership of key initiatives such as ensuring compliance with security frameworks like ISO 27001, NIST, and COBIT, implementing new security tools, supporting vulnerability scanning and facilitating penetration testing to identify and address weaknesses in the tech estate. Additionally, this role will collaborate closely with third-party vendors and stakeholders across various More ❯
Posted:

Cyber Security Risk Manager - HMRC - SEO

London, England, United Kingdom
Government Digital and Data
ll be a central figure in driving security excellence. Acting as the first point of contact for all internal ECS security queries, advice, and guidance, you’ll also lead vulnerability assessments across ECS products, ensuring risks are identified, communicated, and addressed effectively. You’ll play a hands-on role in shaping ECS security policies, supporting penetration testing, and guiding … Experience working with cloud technologies, particularly AWS and Azure. • Proven background in security governance, compliance, and audit practices. • Familiarity with ISO 27001, Risk Management, and GDPR frameworks. • Proficient in vulnerability scanning tools such as, but not limited to: Microsoft Defender for Cloud. Tenable.sc. AWS Security Hub. • Strong stakeholder management skills, with experience working across diverse teams. Desirable Criteria More ❯
Posted:

Information Security Lead

London, England, United Kingdom
Hybrid / WFH Options
HowNow
Work with engineering and DevOps to implement security controls across infrastructure (e.g., access control, encryption, logging). Lead the incident response process and manage third-party pen testing and vulnerability management. Support security questionnaires, RFPs, and due diligence for customer deals. Review third-party vendors and tools for security posture and risks. The key qualities we’re looking for … endpoint protection, SIEMs, DLP, IAM, and SSO. Clear understanding of data privacy laws (especially GDPR). Familiarity with security tools (e.g., endpoint protection, SSO/IAM, monitoring/logging, vulnerability scanning). Experience with risk assessments, incident response planning, and writing security policies. Strong communication skills, with the ability to explain security concepts to both technical and non More ❯
Posted:

Cybersecurity Consultant

Leeds, England, United Kingdom
TieTalent
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding More ❯
Posted:

Senior Security Engineer

London, England, United Kingdom
Hybrid / WFH Options
Flo Health Inc
years of experience in the information security field. Hands-on experience with AWS (or similar cloud platforms) and Cloudflare. Infrastructure as Code: Proficiency with Terraform or similar IaC tools. Vulnerability Knowledge: Solid understanding of common vulnerability classes and the OWASP Top 10. Coding & Scripting: Proficient in reading code (e.g., Python, Scala) and using Git for version control of … code and configuration changes. Familiarity with iOS or Android security. Experience of industry-standard SIEM and vulnerability scanning tools. Nice to have: Experience of supporting audits such as ISO27001. Experience of working with security risk management frameworks such as ISO31000. Knowledge of security control frameworks such as CIS, NIST800-53 and ISO27001. How we work We’re a More ❯
Posted:

Senior Systems Administrator

Burton upon Trent, Staffordshire, United Kingdom
Hybrid / WFH Options
PHD Mail Limited
hardware, and software. Technologies Windows Server – 2019,2022, Hyper V Manager, Failover Cluster Manager Microsoft Azure/Office 365/Intune/MS Teams, Backup & Replication (Veeam) SQL Server, Vulnerability scanning (Nessus) Essential Skills Microsoft Multifactor Authentication, Demonstrable skills in both on-prem and cloud infrastructure Firewall management (Sophos advantageous), Network Configuration, Routers, Internet, VPN's, WiFi, Ethernet More ❯
Employment Type: Permanent
Salary: £30000 - £34000/annum
Posted:

Senior Cyber Security Analyst

London, England, United Kingdom
Hybrid / WFH Options
AJ Bell
threats targeting AJ Bell and ensuring our defenses provide an effective response. Key responsibilities: Reviewing and assessing Security Operations Centre alerts to ensure an appropriate response is taken. Overseeing vulnerability scanning to confirm the effectiveness of patching. Monitoring systems for compliance with policy and supporting remediation where required. Tracking and managing penetration testing programs. Investigating and responding to More ❯
Posted:

SOC Analyst L2

Birmingham, Staffordshire, United Kingdom
Applicable Limited
Sentinel or similar SIEM tools. Strong verbal and written English communication skills. Interpersonal and presentation skills. Strong analytical skills. Understanding network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and Ethical Hacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines (Incident, Problem, Change Management). Ability More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Security Architect - Defence & Aviation

London, England, United Kingdom
Hybrid / WFH Options
Applicable Limited
Design and Implementation: Design and implement security architectures that align with industry standards, regulations (JSPs, DEFSTAN), and client requirements. Conduct security architecture reviews, perform hands-on security assessments, including vulnerability scanning, configuration reviews, and security control validation, identifying vulnerabilities and implementing remediation strategies. Develop and present security architecture roadmaps and strategic plans and then put those plans into More ❯
Posted:

Senior Cyber Security Analyst | Manchester, UK | Hybrid

Manchester, England, United Kingdom
Hybrid / WFH Options
AJ Bell
the threats targeting AJ Bell and ensuring our defences provide and effective response. Key responsibilities: Reviewing and assessing Security Operations Centre alerts to ensure an appropriate response taken. Overseeing vulnerability scanning to confirm the effectiveness of patching Monitoring systems for compliance with policy and supporting remediation where required. Track and manage penetration testing programs. Investigate and respond to More ❯
Posted:

Senior Security Engineer II United Kingdom

United Kingdom
Olo Inc
goals and industry standards. Take ownership of security project execution, prioritizing tasks and aligning initiatives with team and company objectives. Use and optimize advanced security tools, including SIEMs and vulnerability scanners, to enhance detection, logging, and analysis capabilities. Conduct regular and detailed vulnerability assessments, identifying gaps in security controls and implementing mitigation strategies. Support compliance efforts, ensuring documentation … of operating system, networking, and application hardening for Windows, macOS, and Linux, including virtualization security. Experience deploying, maintaining, and administering security technologies like IDS, DLP, FIM, firewalls, SIEM, MFA, vulnerability assessment tools, web proxies, and WAFs. Experience with cloud providers and Infrastructure as Code (IaC) tools, such as Terraform, Ansible, or CloudFormation. Proficiency in AWS security best practices. Skills More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Engineer

London, England, United Kingdom
Harrington Starr
Cyber Security Engineer will deliver high-quality security guidance and support across the organization. Key Responsibilities Configuring, monitoring, and responding to alerts from endpoint systems, networks, IDS/IPS, vulnerability scanners, and SIEM tools. Investigating server logs, firewall logs, traffic logs, and host system logs to identify potential issues. Identifying, tracking, and resolving cybersecurity threats and alerts effectively. Developing More ❯
Posted:

Security Systems Engineer

City of London, London, United Kingdom
Hybrid / WFH Options
Cyber Talent Limited
and standards. Proficiency with DevOps and DevSecOps tools (e.g. GitLab CI/CD, Ansible, Terraform). Experience with security tools like SIEM/SOAR (preferably Rapid7), IDS/IPS, vulnerability scanners, and code analysis tools (SonarCloud, Snyk, Chekov) Strong knowledge of network security, encryption, identity and access management, and application security. Certifications (Preferred): CISSP, CISM, or equivalent for security More ❯
Employment Type: Permanent, Work From Home
Salary: £70,000
Posted:
Vulnerability Scanning
10th Percentile
£41,250
25th Percentile
£51,250
Median
£62,500
75th Percentile
£95,000
90th Percentile
£117,750