Primary Details Time Type: Full time Worker Type: Employee VulnerabilityManagement Data Analyst Permanent London/Hybrid At QBE, our purpose is to enable a more resilient future. We are an international insurer and reinsurer with a local presence in 27 countries. The Opportunity As part of our continuous improvement and expansion of the vulnerabilitymanagement function, we are seeking a highly motivated VulnerabilityManagement Data Analyst to join our Global Security Operations Centre. This permanent, hybrid role is based out of our London office and reports to the Threat & Vulnerability Manager. The successful candidate will play a key role in strengthening QBE’s cyber resilience by turning complex security data into … meaningful insights. This role will directly support the identification, prioritisation, remediation and reporting of vulnerabilities—helping QBE stay ahead of emerging threats. Your New Role As a VulnerabilityManagement Data Analyst, you’ll collaborate with teams across security engineering, vulnerabilitymanagement, service management, cyber governance, risk and divisional consultancy to ensure data accuracy, develop dashboards More ❯
VULNERABILITYMANAGEMENT ANALYST Up to £70,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a major driving forces … behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a VulnerabilityManagement Analyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's VulnerabilityManagement Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes & Schedules related to … Vulnerability Scanning of All Endpoints of the business. As a VulnerabilityManagement Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of VulnerabilityManagement Analyst role would include: Conducting VulnerabilityMore ❯
VULNERABILITYMANAGEMENT ANALYST Up to £70,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a major driving forces … behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a VulnerabilityManagement Analyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's VulnerabilityManagement Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes & Schedules related to … Vulnerability Scanning of All Endpoints of the business. As a VulnerabilityManagement Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of VulnerabilityManagement Analyst role would include: Conducting VulnerabilityMore ❯
Rogerstone, Gwent, United Kingdom Hybrid / WFH Options
Hays Technology
numerous people into careers there, with strong feedback. Your new role This is an interesting opportunity to help define and deliver a strategy which will enhance the organisation's vulnerabilitymanagement and improve the recording and identification of the vulnerabilities, at a good time when the company are expanding and investing in their IT and cyber security estate. … completeness of the register, including the correct classification of systems, key technical attributes, asset purpose, criticality, business and system owners and relationships with other assets. Define and implement the vulnerability identification, prioritisation and management processes required to ensure the business has an accurate view of the vulnerabilities in its asset estate and follows an agreed methodology for prioritising … with colleagues performing related penetration testing and risk assessment activities, providing accurate and timely technical information regarding assets and the status of vulnerabilities. Prepare and deliver regular, high-quality management reporting regarding the asset estate and its security posture. Stay informed about emerging cyber threats and vulnerabilities. What you'll need to succeed Experience in a similar role, ideally More ❯
Newport, Gwent, United Kingdom Hybrid / WFH Options
Hays Technology
numerous people into careers there, with strong feedback. Your new role This is an interesting opportunity to help define and deliver a strategy which will enhance the organisation's vulnerabilitymanagement and improve the recording and identification of the vulnerabilities, at a good time when the company are expanding and investing in their IT and cyber security estate. … completeness of the register, including the correct classification of systems, key technical attributes, asset purpose, criticality, business and system owners and relationships with other assets. Define and implement the vulnerability identification, prioritisation and management processes required to ensure the business has an accurate view of the vulnerabilities in its asset estate and follows an agreed methodology for prioritising … with colleagues performing related penetration testing and risk assessment activities, providing accurate and timely technical information regarding assets and the status of vulnerabilities. Prepare and deliver regular, high-quality management reporting regarding the asset estate and its security posture. Stay informed about emerging cyber threats and vulnerabilities. What you'll need to succeed Experience in a similar role, ideally More ❯
Coedkernew, Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Sopra Steria
Are you passionate about protecting critical infrastructure and driving proactive security? We’re looking for an individual who’s ready to take ownership of our vulnerabilitymanagement ecosystem and lead the charge in deploying and optimizing Tenable Nessus and Tenable SC platforms. This is more than a technical role, it’s a mission-critical opportunity to shape how … and want to make a real impact, this is your chance to be at the forefront of enterprise security. What you will be doing: Lead deployment, configuration, and lifecycle management of Tenable Nessus and Tenable.SC across varied environments. Design and execute vulnerability scanning strategies aligned with business priorities and risk appetite. Validate results, investigate anomalies, and coordinate remediation … with infra, network, hosting, and app teams. Maintain gold-standard documentation (guides, SOPs, user manuals). Build tailored dashboards and reports to drive visibility and informed decision-making. Embed vulnerabilitymanagement into IT, security, and compliance workflows and planning. Provide training and mentorship to foster security awareness and technical excellence. Ensure practices meet Cyber Essentials Plus and ISO More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Bright Purple Resourcing
assurance Electric Vehicle Scheme About the Role This is an exciting opportunity for a security professional who wants to make a real impact by leading and maturing an organisations vulnerabilitymanagement programme. You will: Own and optimise the vulnerabilitymanagement lifecycle using Tenable.io, Tenable.sc, and Nessus Perform and analyse vulnerability scans across on-premise, cloud … bring the expertise and confidence to influence both technical and strategic decisions. We are looking for someone with: At least 5 years experience in cybersecurity, with a focus on vulnerabilitymanagement and threat analysis Proven hands-on experience with Tenable.io, Tenable.sc, and Nessus Strong understanding of operating systems, networking, cloud platforms and containers The ability to interpret CVEs More ❯
will act as a critical liaison between client stakeholders and internal operational teams, ensuring the delivery of world-class cyber security services. You'll drive incident response coordination, lead vulnerabilitymanagement efforts, and ensure service excellence through strategic oversight and hands-on technical engagement. What You'll Be Doing Serve as the key point of contact and escalation … improvement initiatives. Support compliance with SLAs and ensure services meet contractual, operational, and quality standards. Lead service reviews and present performance reports to clients (weekly/monthly). Oversee vulnerabilitymanagement efforts including scanning, prioritisation, risk communication, and remediation coordination. Ensure IDS/IPS systems are maintained and aligned with the latest threat intelligence. Work closely with the … Manager to identify process improvements and implement best practices. What You'll Bring 10+ years of experience in technical support for SOC or Cyber Security operations. 5+ years of vulnerabilitymanagement experience, with demonstrable risk-based prioritisation skills. Proven leadership in high-pressure, crisis-response situations. Strong client relationship management and stakeholder engagement skills. In-depth understanding More ❯
s ready to move into a Head of role, take ownership, and shape strategy while staying close to the tech. What you'll be doing: Owning implementation, consolidation, and vulnerabilitymanagement across the group Leading a team (3 direct reports by year-end) — mentoring, developing, and embedding best practice Overseeing infrastructure, EUC, platform, cloud, and building security Partnering … with stakeholders across multiple business units to understand systems and improve visibility Driving improvements in security tooling, processes, and response Vulnerabilitymanagement tools (e.g. Rapid7, Microsoft Defender suite) Core enterprise security toolsets Networking, cloud infrastructure, and EUC environments You'll have: Experience as a team lead or manager (formal or informal) with direct reports or leadership responsibility Strong … grounding in infrastructure and security — ideally having moved from networking/cloud into security Hands-on experience with vulnerabilitymanagement tools and security platforms Why join? Progression: Step into a Head of role with mentoring from an experienced Group Infrastructure Director Influence: Work at a group level across multiple industries More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Circle Group
Newcastle *Be the M365 Subject Matter Expert* IT Deployment Engineer/IT Infrastructure Engineer, providing 3rd line IT/M365 Application support with excellent M365, InTune, Azure, Modern Device Management & IT Security experience is required by a leading company in central Newcastle You will be the subject matter expert for Microsoft and M365, working on a range of 3rd … Active Directory, firewall, VPN, iOS, and networking protocols (TCP/IP, DNS, DHCP, SMTP). - Strong client-service approach with excellent communication and teamwork skills. - Strong IT Security, Endpoint management and Vulnerabilitymanagement experience - PowerShell Scripting experience within Microsoft Applications - Ability to prioritise, manage workload, and multitask effectively. Role Responsibilities: - 3rd line support and implement Intune, M365 … maintenance). - Assist in managing Microsoft Exchange, Mimecast security, Teams, and Autopilot. - Develop onboarding processes and provide feedback for service improvements. - Define the company's IT Security policies, including vulnerabilitymanagement - Admin of Endpoint management tools - Stay updated on Microsoft 365 tools and roadmap. - Conduct monitoring and analysis, including storage and usage reports. - Own problem managementMore ❯
for the MSP's own security posture ensuring tools, processes, and teams meet the same standards we deliver to clients. They monitor measurable posture metrics (e.g., Microsoft Secure Score, Vulnerability etc.), ensure continuous improvement, and keep the MSP's security practice relevant through ongoing training, certifications, and emerging threat awareness. While day-to-day execution is delegated to Security … the Security Lead owns security end-to-end: identifying risks, embedding controls, and ensuring compliance is demonstrable. Key Responsibilities Client-Facing Lead Quarterly Security Reviews (QSRs), presenting patch/vulnerability posture, incidents, compliance status, and risk register updates. Translate technical security risks into clear business impact and outcomes. Own the client exception process, ensuring risks are documented, communicated, and … escalation point for clients when risks require senior involvement. Internal MSP Security Own the MSP's internal security frameworks and certifications (e.g., CE+, ISO, SOC 2). Oversee patching, vulnerability, and risk management of MSP-owned infrastructure and tools. Ensure MSP's technology stack (RMM, XDR, PSA, backup, etc.) is securely deployed and monitored. Drive staff security awareness More ❯
Role: VulnerabilityManagement Job Type: Contract Day Rate: £300 - £330 per day (inside IR35) Duration: 4 Months Work Location: Milton Keynes, United Kingdom [thrice in a week at client office] - Mandatory Start date : ASAP Note: Candidate should be immediately available Understand and analyse vulnerability data before they becomes overdue Organize and create work packages for teams for … resolution Ensure fixes begin within SLA to prevent delays Help prioritize overdue and upcoming vulnerabilities effectively. Collaborate across teams to streamline technical remediation efforts." Understanding of vulnerability assessment and remediation processes Ability to triage and create meaningful work packages for remediation of vulnerabilities. Good coordination skills to facilitate work packages. Effective ability for cross-team collaboration. Planning and ManagementMore ❯
Role: VulnerabilityManagement Job Type: Contract Day Rate: 300 - 330 per day (inside IR35) Duration: 4 Months Work Location: Milton Keynes, United Kingdom thrice in a week at client office - Mandatory Start date : ASAP Note: Candidate should be immediately available Understand and analyse vulnerability data before they becomes overdue Organize and create work packages for teams for … resolution Ensure fixes begin within SLA to prevent delays Help prioritize overdue and upcoming vulnerabilities effectively. Collaborate across teams to streamline technical remediation efforts." Understanding of vulnerability assessment and remediation processes Ability to triage and create meaningful work packages for remediation of vulnerabilities. Good coordination skills to facilitate work packages. Effective ability for cross-team collaboration. Planning and ManagementMore ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Pontoon
unique experience in an inclusive environment that helps them thrive. The role: .The role will develop, implement, and manage the Operational Resilience Framework within the region through the direct management of capabilities, as well as through coordination and partnership with other functions within the firm. Responsibilities: Strategy and Policy: Develop and lead the Operational Resilience Strategy and Policy, ensuring … alignment with the broader risk management and business continuity objectives. Framework and Documentation: Design, develop, and embed an Operational Resilience framework across EMEA, ensuring it aligns with the strategic objectives and regulatory requirements and design and implementation of underlying methodologies and processes including CIF/IBS identification and scenario testing Regulatory and Industry: Stay abreast of current and emerging … internal/external incidents and industry best practices related to operational resilience to continuously improve bank's ability to manage resilience risk and ensure inline with regulatory expectations. Operational Management: Build an engaged and motivated centralised EMEA regional operational resilience and testing function, with a clear vision, goals and objectives, as well as management of staff-related matters. More ❯
SOC and Vulnerability Analyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload, but … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and Vulnerability Analyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality and More ❯
control traffic flow. - Collaborate with other teams to define and enforce network access policies, ensuring that only authorized personnel and devices have appropriate access rights. Proactive Security Testing and VulnerabilityManagement: - Conduct and organise regular security assessments, including vulnerability scanning and testing, to identify weaknesses in the network infrastructure. - Collaborate with system administrators and application owners to … address identified vulnerabilities and implement necessary patches or configuration changes. - Develop and maintain a comprehensive vulnerabilitymanagement program, including vulnerability tracking, risk assessment, and remediation planning. Stakeholder Collaboration: - Act as a stakeholder for the response team, providing expert guidance on security-related alerts, incidents, and potential improvements. - Collaborate with cross-functional teams, including network engineers, system administrators More ❯
s security architecture, ensuring it aligns with business objectives, regulatory requirements, and industry best practices. Design secure systems, networks, and infrastructure, considering scalability, resiliency, and emerging technologies. Security Operations Management: Lead the security operations team for product and infrastructure, ensuring the implementation of robust security controls, incident response protocols, vulnerabilitymanagement, and security monitoring. Foster a proactive … and efficient security operations center (SOC) to detect, respond to, and recover from security incidents. Team Management: Effectively manage security champions for product responsible for security operations, architecture, and related functions. Establish and maintain strong communication channels, facilitate knowledge sharing, and drive team collaboration to achieve common security goals. Risk Assessment and Compliance: Conduct regular risk assessments and audits … functional teams to promptly detect, investigate, and resolve security incidents. Develop and maintain an incident response plan, ensuring effective communication, documentation, and post-incident analysis. Vendor and Third-Party Management: Assess and manage security risks associated with third-party vendors and partners. Establish and maintain security-related contracts, service-level agreements, and ongoing vendor assessments to ensure adherence to More ❯
lead on: Driving the use of Azure Cloud based security tools such as Defender and Sentinel Configure and manage alerts through Defender First and second line security operations, including vulnerabilitymanagement Investigating and responding to security incidents Ensuring policies and procedures remain aligned to industry best practice Promoting security awareness and education throughout the organisation particularly in relation … Azure Cyber Security Analyst: Azure environment - Essential Defender and Sentinel commercial experience - Essential Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerabilitymanagement, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid understanding of risk assessment frameworks More ❯
lead on: Driving the use of Azure Cloud based security tools such as Defender and Sentinel Configure and manage alerts through Defender First and second line security operations, including vulnerabilitymanagement Investigating and responding to security incidents Ensuring policies and procedures remain aligned to industry best practice Promoting security awareness and education throughout the organisation particularly in relation … Azure Cyber Security Analyst: Azure environment - Essential Defender and Sentinel commercial experience - Essential Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerabilitymanagement, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid understanding of risk assessment frameworks More ❯
Cambridge, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
REDTECH RECRUIT
Defender XDR suite Knowledge of cloud and on-premise environments, ideally Azure, including networking and firewalls Familiarity with incident response processes, playbooks, and tools Understanding of threat intelligence and vulnerabilitymanagement Experience with ISO27001 and compliance frameworks Scripting and coding skills (e.g., Python, PowerShell, Bash) Exposure to CI/CD, Infrastructure as Code (IaC), and Azure DevOps pipelines … Microsoft Defender/Endpoint Security/PowerShell/Python/Bash/Azure DevOps/Infrastructure as Code/CI/CD/Network Security/Penetration Testing/VulnerabilityManagement/ISO27001/Information Assurance/Computer Science/Cyber Security/Information Security/Security Compliance More ❯
the nature of the on call, you must hold a valid drivers licence with reasonable means to a vehicle. What will you be doing? Youll have day to day management of the OSS suite of services and underlying infrastructure as part of a 2nd Line team. Youll be proactive and Reactive within Incident Management Youll have user Access … Management & VulnerabilityManagement System Governance to ensure the effective operation of the services Providing Out of Hours Support via an On-Call Rota. What youll bring Youll bring experiencewith supporting OSS applications from a 2nd and 3rd Line level Youll have the experience of working with developers/vendors implementing fixes or improvements to systems Experience of More ❯
the nature of the on call, you must hold a valid drivers licence with reasonable means to a vehicle. What will you be doing? Youll have day to day management of the OSS suite of services and underlying infrastructure as part of a 2nd Line team. Youll be proactive and Reactive within Incident Management Youll have user Access … Management & VulnerabilityManagement System Governance to ensure the effective operation of the services Providing Out of Hours Support via an On-Call Rota. What youll bring Youll bring experiencewith supporting OSS applications from a 2nd and 3rd Line level Youll have the experience of working with developers/vendors implementing fixes or improvements to systems Experience of More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
M Group Telecom
the nature of the on call, you must hold a valid drivers licence with reasonable means to a vehicle. What will you be doing? Youll have day to day management of the OSS suite of services and underlying infrastructure as part of a 2nd Line team. Youll be proactive and Reactive within Incident Management Youll have user Access … Management & VulnerabilityManagement System Governance to ensure the effective operation of the services Providing Out of Hours Support via an On-Call Rota. What youll bring Youll bring experiencewith supporting OSS applications from a 2nd and 3rd Line level Youll have the experience of working with developers/vendors implementing fixes or improvements to systems Experience of More ❯
Hull, North Humberside, England, United Kingdom Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerabilitymanagement: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerabilitymanagement, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non … technical staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey More ❯
North Ferriby, North Humberside, North East, United Kingdom Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerabilitymanagement: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerabilitymanagement, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non … technical staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey More ❯