Vulnerability Management Jobs in the UK excluding London

26 to 50 of 83 Vulnerability Management Jobs in the UK excluding London

Security Engineer

Reading, England, United Kingdom
VE3
and implementing effective resolutions. The successful candidate will have a deep understanding of security principles and practices, with a strong background in penetration testing, vulnerability scanning, and issue resolution. This role requires over five years of experience and holding both Certified Ethical Hacker (CEH) and Certified Information Systems Security … networks, and applications. Develop and execute test plans to simulate real-world cyber attacks. Document findings and provide actionable recommendations to mitigate identified risks. Vulnerability Scanning: Perform vulnerability scans to detect security flaws and unpatched software. Analyze scan results and prioritize vulnerabilities based on risk and impact. Collaborate … Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field. Over 5 years of experience in security engineering, penetration testing, and vulnerability management. Certified Ethical Hacker (CEH) certification. Certified Information Systems Security Professional (CISSP) certification. Proficiency in security tools and technologies (e.g., Metasploit, Nessus, Burp Suite more »
Posted:

Senior System Engineer

Corby, England, United Kingdom
Iron Mountain
us and see how you can elevate the power of your work at Iron Mountain. We provide expert, sustainable solutions in records and information management, digital transformation services, data centers, asset lifecycle management, and fine art storage, handling, and logistics. We proudly partner every day with our … skills in a culture that will welcome your unique contributions? If so, let's start the conversation. The Role: Senior System Engineer, IT Systems Vulnerability & Patch Management In this role, the Vulnerability & Patch Management Engineer will lead high priority projects and day-to-day activities related … to our Vulnerability & Patch Management Program. The Vulnerability Management Engineer is expected to deliver results while maintaining positive relationships with other IT infrastructure teams and project sponsors. The Vulnerability & Patch Management Engineer will work in a team based environment performing technical duties supporting Vulnerability more »
Posted:

Senior Security Engineer

Welwyn Garden City, England, United Kingdom
Tesco Technology
About the Role Tesco Technology are looking for a Security Engineer reporting into the Vulnerability Management and Pentesting team. This is an exciting opportunity for a highly motivated security focused engineer to join our expanding organisation. The role will involve being hands on with a focus on the … alongside other security colleagues bringing your experience to help. You will be responsible for: Building our detection, data correlation and response capabilities in the Vulnerability Management space. As a team we also feed into the standards and patterns for our engineering community. Create tooling and reporting to help … manage our external attack surface. Build a range of capabilities to inform our stakeholders on the status and progress of Vulnerability Management remediation efforts across the company. Automate integrations between platforms and tooling. Use your observations from security incidents and reporting about relevant security threats to contribute to more »
Posted:

Information Security Cloud Analyst

Northampton, England, United Kingdom
Peaple Talent
maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat intelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerability management programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of Information Security Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring more »
Posted:

Information Security Manager

Mansfield, England, United Kingdom
Emberleigh
security posture. Playing a pivotal role in minimising risks & protecting assets. Here’s a taste of what the role will involve: Collaborating with senior management to develop and refine the organisation’s information security strategy, aligning it with business objectives and regulatory requirements. Developing, implementing, and maintaining information & data … as the company subject-matter expert for all security-related matters and develop campaigns/strategies to improve security posture. Manage technical risks via vulnerability management oversight & gap analysis, whilst also overseeing DLP alerts and creating reports. Develop and generate metrics & dashboards for senior management review. What more »
Posted:

Head of Product Cyber Security SME

Hemel Hempstead, England, United Kingdom
Smiths Detection
various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in-depth … security assessments, penetration testing, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for product cyber security initiatives across the organization. Collaborate with senior management to establish product cyber security goals, policies, and procedures aligned with … business objectives. Stay current with evolving cyber threats and industry best practices to ensure the organization's readiness and resilience. Team Leadership: Matrix management of a diverse team of product cyber security professionals across different geographical locations. Foster a collaborative and inclusive work culture that encourages innovation and excellence. more »
Posted:

Infrastructure Support Analyst – York (outskirts – hybrid/remote)

York, England, United Kingdom
Hybrid / WFH Options
Candour Solutions
skills: · Demonstrable experience in an IT infrastructure support or similar role. · Microsoft products (Windows, SCCM, O365, Intune, Azure, SQL) · VMWare (vCenter, ESX, Horizon) · Storage management and administration · Experience of configuring and troubleshooting TCP/IP networking, including switches, routers, firewalls, VLANs and VPNs · Understanding of ITIL And how you … externally provided IT services, including potential involvement with our customer-facing environments. · Maintain and manage the company’s IT security systems, including patching and vulnerability management. · Identify weaknesses in line with IT industry developments and implement improvements. · Monitor and manage backups, resolving any issues may that occur. · Implement IT more »
Posted:

Cyber Security (Subject Matter Expert)

Oxford, Oxfordshire, South East, United Kingdom
Hybrid / WFH Options
Hays
infrastructure and enterprise servicesunderpinning our clients' programme activities. Their project portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral to the delivery of the cyber programme. … relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant information security/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder management skills. Knowledge of Information Security standards … Protection act 2018. Experience with a range of IT systems (bothon-premises and cloud-based). Knowledge of technical areas, such as antivirus,Networking, vulnerability management, encryption (Microsoft & Linuxenvironments are advantageous). Strong problem-solving ability, with flexibility tothink creatively and adapt to and implement constantly evolving systems more »
Employment Type: Contract, Work From Home
Rate: £450.0 - £500.0 per day + Up to £500 Per day
Posted:

Cyber Security Testing Manager

Crawley, England, United Kingdom
Vallum Associates
related field or equivalent training and/or experience. Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+). Track … had to collaborate across partners with differing levels of technical security competency. Advanced knowledge and an understanding of operational excellence in Cloud Security Posture Management and Vulnerability Management programs. Understanding risk, resource availability and business objectives at a group level is necessary. Putting our customer's interests more »
Posted:

Cyber Security Consultant

Horsham, England, United Kingdom
83zero
relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, Vulnerability Management utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain more »
Posted:

Security Operations Center Analyst

Doncaster, England, United Kingdom
Cloud Decisions
Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM, EDR and Vulnerability Management tools Direct communication with customers on threats and alerts Providing customers with reports and presenting findings Assistance with active directory administration. Assistance more »
Posted:

Cyber Security Lead

Greater Bristol Area, United Kingdom
Peaple Talent
Security Experience of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerability management, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent more »
Posted:

Lead Cyber Security Consultant

Corsham, Wiltshire, United Kingdom
Searchability
clearance Willingness to be on-site in Corsham 5 days per week Experience required: SOC transformations and operations Developing security operation processes and procedures Vulnerability Management - using Tripwire and Tanium Incident Management - using DCC and Elastic Stack Endpoint security - using vSphere, SolarWinds, Trend Intelligence Driven Defence, Cyber … CONSULTANT/CYBER SECURITY/LEAD/LEAD CONSULTANT/LEAD CYBER CONSULTANT/LEAD CYBER SECURITY CONSULTANT/SOC/SOC OPERATIONS/VULNERABILITY MANAGEMENT/INCIDENT MANAGEMENT/NIST/ENDPOINT SECURITY/CORSHAM/BRISTOL/SOUTHWEST/DV/DV CLEARED/DV more »
Employment Type: Permanent
Salary: GBP 103,000 Annual
Posted:

Azure SecOps Engineer

Bournemouth, Dorset, South West, United Kingdom
Hybrid / WFH Options
Interact Consulting Limited
pipelines and integrating security tooling. Scripting Responsibilities will include Lead efforts to assess the current security posture of Azure infrastructure, encompassing Azure resources, processes, vulnerability management tools, and techniques. Collaborate with the wider Infosec team and any third-party consultants engaged by the client to provide recommendations based … into CI/CD pipelines. Maintain an active risk registry and devise a plan to address identified issues in order of priority, ensuring proactive management of security risks. Please apply now. more »
Employment Type: Permanent, Work From Home
Posted:

Cyber Incident Response Manager

Buckinghamshire, England, United Kingdom
Proprius Recruitment
Employment Benefits + Bonuses Lead cross-functional post-incident process reviews to identify and implement continuous improvement initiatives. Partner with Legal, 2LoD, Major Incident Management, Threat Management, Vulnerability Management, Attack Surface Reduction, Software Engineering, Security Architecture, Platform Support both locally and globally. You will have experience … in: Leading the response to complex incidents in a large-scale environments. Years of relevant experience in cyber security operations, incident management or risk management within an enterprise environment. Self-motivated interest in the latest cyber security threats and vulnerabilities and is able to integrate threat intelligence into more »
Posted:

IT Systems Administrator

Bath, England, United Kingdom
Hybrid / WFH Options
Peaple Talent
as a System Administrator, Infrastructure Engineer, or similar role at a minimum of 2nd line level. MS Azure knowledge, with experience of: Entra ID Management Azure storage accounts Azure Virtual Desktop (AVD) Azure Virtual machine management MS Exchange Management (Ideally Exchange Online) On-premises infrastructure experience including … Building and configuration of MS Windows Servers Active Directory domain knowledge Hypervisor virtualisation management (ideally VMWare) Backup solutions (ideally VEEAM) Desirable: Knowledge and experience of: MS 365 applications e.g. SharePoint, Teams, OneDrive, etc. SSL certificate management Vulnerability management SIEM experience (Ideally MS Sentinel) Infrastructure As Code more »
Posted:

IT Infrastructure Security Engineer

Greater Cheshire West and Chester Area, United Kingdom
Hybrid / WFH Options
psd group
take ownership of identifying signs of compromise in cyber security services, IT systems, and related infrastructure. This will be a hands-on approach to vulnerability management reduction across all IT Systems and you will work with the SOC to assist in the coordination and management of cyber … log storage are provided to the Cyber Security team. Working alongside the Cyber Security Team, take ownership and develop a hands-on approach to vulnerability and threat management reduction across all IT Systems. Monitor changes in cyber security threats, and appropriately respond to changes in threat profile. Identify … requests, use of new software or hardware facilities and report findings to the Cyber Security Team. Take ownership and a hands-on approach to vulnerability management reduction across all IT Systems Essential Skills & Experience: Experience with analysing event logs and recognizing cyber intrusions or attacks. Experience using tools more »
Posted:

IT Infrastructure Manager

Northamptonshire, England, United Kingdom
Tech4
and critical thinking techniques. Solid understanding of IT security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerability management, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments; willingness to share knowledge … knowledge in the use and support of M365 suite particularly Excel, Word, Teams and SharePoint. Essential Criteria Significant experience in a leadership or technical management role is crucial - this includes all elements of managing and motivating technical teams. Significant experience of project management in a technical management more »
Posted:

Enterprise Security Architect

Glasgow, Scotland, United Kingdom
NextTech Recruitment
in projects and operations Work with technical teams baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation and identity and access management (IAM) Work with technical teams develops standards and practices for data encryption and tokenization Draft security procedures and standards to be reviewed and approved … by executive management and/or formally authorised by the chief information security officer (CISO) Threat modelling of services and applications that tie to the risk and data associated with the service or application Key Qualifications: Vast experience in leading/mentoring teams in “secure by design” including a … strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services, identity management, as well as securing CI/CD pipelines. Direct, hands-on experience or a solid working knowledge of relevant security patterns, vulnerability management tools, securing public cloud applications. Full more »
Posted:

Cyber Security Lead

City Of Bristol, England, United Kingdom
Hybrid / WFH Options
E-Resourcing Ltd - Specialist I.T. Recruitment
on. Key Responsibilities: You will be responsible for defining, developing and maintaining the cyber security strategy across the organisation. You will monitor threats from vulnerability managements tools and support the design, implementation and management of any SIEM tools. You will promote a level of cyber security culture and … practice in relation to Cyber Security Around 7+ years of experience working in Security Engineering Strong knowledge of security tooling and technologies including SIEM, vulnerability management, DLP etc Experience of working in environments using ISO27001 or Cyber Essentials Plus Good knowledge of cloud platforms – AWS and Azure Good more »
Posted:

Security Operations Specialist

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerability management platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
Posted:

Cloud Infrastructure Engineer

Bath, England, United Kingdom
Hybrid / WFH Options
Peaple Talent
Azure Landing Zones Azure architecture Azure Entra ID (Enterprise applications, conditional access etc.) Azure storage accounts Azure Virtual Machines Azure performance, security, and cost management MS365 Applications with certification and/or demonstrable experience of: Sharepoint MS Exchange Online On-prem infrastructure experience including: Building and configuration of MS … Windows Servers Active Directory domain knowledge Hypervisor virtualisation management (ideally VMWare) Backup solutions (ideally VEEAM) Infrastructure performance monitoring Additional Technologies: Vulnerability Management SIEM Technologies Powershell Infrastructure As Code (ideally Terraform and Ansible) Essential Desirable Knowledge and Experience: SQL Networking experience (Cisco switch, firewalls) Cisco Umbrella Nutanix Hyperconverged more »
Posted:

Security Analyst

Manchester Area, United Kingdom
Gravitas Recruitment Group (Global) Ltd
pension contributions, flexible working, in house L&D, 28 days holiday +BH Skills required for this role: - Experience working with SIEM solutions (ideally Sentinel) - Vulnerability management (Nessus) - Incident Response - Implementing appropriate mediation Desirables: - SC Clearance - Large guideline expérience (ISO27001, Cyber Essentials, etc) This role gives the right candidate more »
Posted:

Information Security Manager

Crawley, England, United Kingdom
TalentHawk
of the ever-evolving threat landscape. Here's what you'll be doing: Develop and implement a comprehensive information security program: Think risk assessments, vulnerability management, incident response, access control, the whole enchilada. Lead and empower a team of security professionals: Guide, mentor, and inspire your team to more »
Posted:

Senior Offensive Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
undocumented network protocol or the grammar of a new programming language. Other responsibilities includes as below Scope and execute in-depth security assessments and vulnerability research across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic … achieving long term goals (for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances … analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerability management, risk assessments, bug bounty hunting, malware analysis, forensics OSCP, OSWE certification, or interest in achieving certification Experience navigating and working with extremely more »
Posted:
Vulnerability Management
the UK excluding London
10th Percentile
£36,250
25th Percentile
£45,000
Median
£52,500
75th Percentile
£71,063
90th Percentile
£88,750