Vulnerability Management Jobs in the UK excluding London

101 to 125 of 206 Vulnerability Management Jobs in the UK excluding London

SOC Analyst

Andover, Hampshire, United Kingdom
Hybrid / WFH Options
Deloitte - Recruitment
SOC SIEM tool. Focus on insider threat and Data Loss Prevention use case to demonstrate the process used by SOC analysts. Cyber Security Incident Management Plan (SIMP) - Develop the Cyber Incident Response Plan in line with NIST and SANS guidance and incorporating the wider teams. Create supporting documentation and … Review existing documentation for the SOC BCDR and develop process/plan that feeds into the wider process. Cyber Incident Investigation/Escalation - Reviewing vulnerability event channels and identifying issues for escalation to different teams. Training and development - Mentor existing SOC team and develop playbooks and training and development … and potential future requirements for this requirement: Strong knowledge of Cyber Security, with a focus on operational security, such as security monitoring and alerting, vulnerability management and incident response. Producing supporting security documentation in coordination with stakeholders. A good all-round knowledge of IT systems and Networking. Experienced More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Assurance Lead

Cambridge, Cambridgeshire
Hybrid / WFH Options
Cambridge University Press & Assessment
the organisation's security. Key accountabilities: Assurance and Testing: Develop and improve security policies and guidance related to security assurance testing. Coordinate and manage vulnerability assessments, penetration testing, and other technical evaluations. Collaborate with technology teams to implement robust security controls and provide guidance on remediation. Perform third-party … vendor risk assessments and report findings to relevant stakeholders. Risk Management: Conduct regular risk assessments to identify vulnerabilities and associated risks. Develop and implement risk mitigation strategies. Define and report key risk metrics for security assurance. Maintain a comprehensive risk register. Attack Surface Management: Collaborate on assurance initiatives … to identify, monitor, and reduce exposed vulnerabilities. Monitor the external threat landscape and integrate attack surface management capabilities. Security Governance and Compliance: Develop and maintain information security policies, standards, and procedures. Ensure compliance with legal, regulatory, and contractual obligations. Act as the primary liaison for assurance audits and external More ❯
Employment Type: Permanent
Posted:

Cyber Security Engineer

Walsall, West Midlands, United Kingdom
HomeServe
A proactive mindset, with a drive to identify, own, and solve security challenges end-to-end. Strong technical skills across areas like threat detection, vulnerability management, identity and access control, and incident response. Familiarity with a range of security tools and platformssuch as SIEM, EDR, firewalls, and cloud More ❯
Employment Type: Permanent
Salary: £65,000
Posted:

Information Security Consultant

Leeds, West Yorkshire, United Kingdom
Akkodis
Security Consultant you will work with the wider IT Security Team to support and maintain enterprise wide solutions. The Responsibilities Assist with security incident management and response activities General day-to-day support on managing and responding to security alerts from systems and end users Perform daily, weekly, and … standards including Cyber Essentials, ISO 27001, 27002 etc. Data Protection Act and the General Data Protection Regulation Microsoft O365 Security solutions; Networking; Security operations; Vulnerability Management Security Auditing Good understanding of security testing principles, including experience of vulnerability scanning, identifying, resolving, and reporting risks Experience of formal More ❯
Employment Type: Permanent
Salary: £60000 - £100000/annum
Posted:

Security Operations Center Analyst

York, England, United Kingdom
Hybrid / WFH Options
Investigo
phishing emails and other security events. Use Endpoint Detection and Response (EDR) tools to examine endpoint and respond to cyber threats and malware. Undertake vulnerability management including identifying and risk assessing vulnerabilities on any IT infrastructure. Reporting and tracking vulnerabilities through to mitigation. Conduct security administrator activities across … the Microsoft 365 stack including but not limited to configuration and change management of security tools. Be responsible for managing changes to security tools adhering to Persimmon IT change management policy. Conduct reviews of existing IT Infrastructure such as firewall ruleset reviews advising on where risks might exist. More ❯
Posted:

Cyber Defence Operations Director

Cambridge, Cambridgeshire, United Kingdom
Arm Limited
overview: This is an opportunity to lead global Security Operations focused on safeguarding Arm's digital environment through exemplary threat detection, incident response, and vulnerability management capabilities. This senior role, reporting directly into the CISO, is accountable for driving the strategic direction of Arm's Detect & Response function … delivering outstanding performance and ensuring we are resilient against an evolving threat landscape! In addition to operations, you will lead cyber crisis management, C-Suite level stress testing, team development, and top-level cybersecurity thought leadership. Responsibilities: Own and deliver the strategic roadmap for cyber incident and vulnerability … how they can be used as a force multiplier for a technology business strategy, with the ability to influence at all levels. Extensive people management experience, fostering a culture focused on mentoring, wellbeing, and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Officer

Birmingham, Staffordshire, United Kingdom
Nettitude Group
ISO 27001:2022. Ensure that any business changes, acquisitions, or transformations are accounted for within the scope of certification, through proactive risk identification and management with IT assets owners. Development and championing all Information Security Policies, Procedures and relevant standards, and produce supporting documentation and training material to ensure … across the organization. Experience working in a global, multi-business environment is a plus. Technical/Professional Qualification requirements: Proven experience in Information Security Management and IT risk management. In-depth knowledge of ISO27001 to Lead Auditor standard. Knowledge of relevant regulations (Data Protection, DORA, NIS2). Knowledge of … Three Lines of Defence Model and its application. Knowledge of vulnerability management and Identity and Access management. A recognised IS qualification (e.g. CISA, CISM, CISSP, ISO 27001 Lead Auditor). Our Values: • We care about the safety of everyone. • We respect each other and the wider communities we More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Engineer

west midlands, midlands, United Kingdom
Hays
Supporting the implementation of the clients' cybersecurity strategies, policies, and procedures tailored to the specific needs of our organisation.* Conducting regular security assessments and vulnerability scans, to identify potential weaknesses and recommend appropriate remediation measures.* Monitoring and analysing security logs, events, and alerts to detect and respond to potential … throughout the organisation.* Assist with compliance with relevant security frameworks, regulations, and standards, such as Cyber Essentials, CAF/Gov Assure and NCSC.* Support vulnerability management report and process* Assist with any other tasks/projects which need prioritising* Documenting of alerts and creation of playbooks Professional Skills … Proficiency with Microsoft Security Technologies, such as Sentinel, Entra and Defender Proven experience designing, implementing, and maintaining security controls. Experience with security assessment tools, vulnerability scanning, and penetration testing methodologies. Understanding of current cybersecurity threats, attack vectors, and mitigation strategies. Ability to analyse and interpret security logs, events, and More ❯
Posted:

Senior Infrastructure Engineer

london (battersea), south east england, United Kingdom
Databarracks
can make a genuine impact on customers’ data security and business continuity, then keep reading. The Role: What You’ll Do Here: - Azure Infrastructure Management: Design, deploy, and manage scalable Azure-based infrastructure services including IaaS, PaaS, networking, and security components. - Virtualisation VMware & Hyper-v. Management of environments … Compliance: Implement and maintain infrastructure security policies and controls aligned with industry standards (e.g., ISO 27001, NIST, CIS). Collaborate with InfoSec teams on vulnerability management and risk mitigation. - Infrastructure Automation & Optimization: Automate infrastructure deployment and configuration using tools such as PowerShell, ARM templates, or Terraform. Drive continuous More ❯
Posted:

OT Cyber Security Analyst

scotland, United Kingdom
SR2 | Socially Responsible Recruitment | Certified B Corporation™
SCADA networks from evolving cyber threats. Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threat analysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerability management initiatives and penetration … influence and collaborate across functions. Comfortable working autonomously and leading small projects. Desirable: Background in cyber investigations or law enforcement protocols. Familiarity with project management principles. Ability to deliver awareness campaigns and contribute to continuous improvement. This is a unique opportunity to make a tangible impact on the UK More ❯
Posted:

Senior DevOps Engineer [UAE Based]

london, south east england, United Kingdom
AI71
Loki, ELK, OpenTelemetry). Define SLOs/SLA dashboards; lead incident response, root‑cause analysis, and post‑mortems. Security & Compliance Embed DevSecOps practices—secrets management, container image hardening, zero‑trust networking, vulnerability management, and compliance automation (ISO 27001, SOC 2). Collaborate with ML/AI Teams More ❯
Posted:

Infrastructure & Security Engineer

london, south east england, United Kingdom
Hybrid / WFH Options
Totum Partners
from a legal or financial environment. Hands-on technical skills in the following; MS Defender, Azure Security Centre, Intune, Entra ID, CrowdStrike, Azure, M365, Vulnerability Management, PowerShell, SIEM Solutions & an understanding of ISO27001. Any Azure or Security certification would be desirable. This role offers hybrid working - 2 days More ❯
Posted:

Information Security Specialist

Peterborough, Cambridgeshire, United Kingdom
Hybrid / WFH Options
AB Agri Ltd
systems and data across the business Advising on and reviewing the implementation of Information Security Policies, Standards and Controls across projects and operations Coordinating vulnerability management activities across IT, OT, and cloud environments Providing guidance on security best practices, supporting compliance with internal policy and external regulations Supporting … the development and rollout of the third-party risk management framework Participating in internal forums and external security events, bringing fresh insights to shape future security initiatives Maintaining awareness of business systems, data flows, and architecture to inform security recommendations Collaborating with stakeholders to ensure secure design and implementation … and improvement Knowledge or experience of working within an Information Security, Risk or Compliance function Familiarity with cyber security principles, governance frameworks, and risk management practices Understanding of cloud environments, particularly Microsoft Azure, and their associated security considerations A relevant degree (e.g. Computer Science or similar) and/or More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Head of Information Security

Bournemouth, Dorset, United Kingdom
Hybrid / WFH Options
LV=
compliance with regulatory requirements •Operational Excellence: Oversee a high-performing team of security professionals, manage security operations, and lead incident response, threat intelligence, and vulnerability management efforts •Innovative Environment: Collaborate with various departments, including marketing, IT, and customer service, to integrate security measures seamlessly into our business processes … Science, or a related field (or equivalent experience) •Professional certifications such as CISSP, CISM, or equivalent (or equivalent experience) •Extensive experience in information security management, including strategy development and operational oversight •Strong understanding of regulatory requirements and compliance standards •Proven leadership skills with the ability to manage and mentor … a diverse team •Excellent communication and stakeholder management skills Rewards & Benefits This role is a Band C in the LV= Structure. At LV= Life and Pensions, you'll go above and beyond to do the right thing for our customers. We'll reward your hard work with an attractive More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer – ForgeRock

london, south east england, United Kingdom
Hybrid / WFH Options
JCW
with ForgeRock IAM stack : PingGateway, PingAM, PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetration testing , threat modeling, and vulnerability management Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO More ❯
Posted:

Senior IT Security Manager

Birmingham, West Midlands, West Midlands (County), United Kingdom
Hybrid / WFH Options
Proftech Talent
Threat Intelligence . Provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. Vulnerability Assessment. Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. Risk Management . Ability to identify … Working Hours : Full time Monday - Friday Location : Birmingham/Hybrid Duration : Permanent Role of Senior IT Security Officer: Support in the management of the Security Operations, establishing and delivering methods and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability … where necessary. Support monitoring on external security environment, gathering information on emerging threats to the business and presenting them to leaders where required. Plan vulnerability assessment and penetration testing activities within IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. Contribute to More ❯
Employment Type: Permanent
Salary: £38500 - £52000/annum
Posted:

Senior Cyber Security Analyst - Microsoft Security Stack

london, south east england, United Kingdom
Harrington Starr
all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerability management (tenable is tool used) and patching More ❯
Posted:

Information Security Officer

Dover, Kent, United Kingdom
Migrant Help
to support the organisational objectives The experience and skills you need Proficiency in security domains, tools and technologies such as DLP, SIEM, SOAR and Vulnerability Management Good working knowledge of network security, firewalls, threat management, endpoint detection and response Ability to identify, assess, and mitigate security risks More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SOC Analyst

Lancaster, Lancashire, United Kingdom
Harvey Nash Plc
to security events across a complex, multi-departmental IT environment. You'll maintain and use key security tools such as SIEM, IDS, EDR, and vulnerability management platforms. You will work closely with system owners and users to assess configurations, analyse logs, and improve security controls and procedures. In … career experience in a relative field Hands-on experience with security monitoring and incident response technologies such as SIEM, IDS and EDR. Experience with vulnerability assessment including practical assessments for risk analysis. A strong working knowledge of at least one major operating system (Windows, Linux, or MacOS). An More ❯
Employment Type: Permanent
Salary: GBP 39,355 - 45,413 Annual
Posted:

IT Information Security Analyst

Swindon, Wiltshire, United Kingdom
Hybrid / WFH Options
Randstad Technologies Recruitment
guidance. Run scheduled audits and follow through with actionable improvements. Roll out and stress-test our business continuity approach. Turn data into insights with management reports that track compliance trends. Partner with teams across the globe to design, implement, and test security tools and controls. Lead the journey to … standards. A solid foundation in enterprise-level Information Security practices. Strong analytical skills and a calm approach under competing demands. Familiarity with threat landscapes, vulnerability management, and risk frameworks. Willingness to travel within the UK and potentially abroad when needed-UK driving license required Why You'll Love More ❯
Employment Type: Permanent
Salary: £40000 - £50000/annum
Posted:

215148 Senior IT Cyber Security Engineer x 3

Dumfries, Dumfriesshire, United Kingdom
NHS National Services Scotland
systems. This role requires you to have detailed knowledge of some but preferably all the following: Microsoft Security Products and Cyber Security best practice. Vulnerability management and log auditing tools. Enterprise infrastructure including Windows operating systems, Active Directory, Group Policy, Azure, Networks and Firewalls. This is an exciting … To this end, NHS Dumfries and Galloway welcomes applicants from all sections of the community. PUBLIC PROTECTION Public protection practice encompasses the recognition and management of risk in order to prevent or reduce harm to children, (including unborn babies), young people and adults. All public protection legislation, and NHS More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SOC Analyst

Salisbury, Wiltshire, United Kingdom
Deerfoot Recruitment Solutions Limited
Key Requirements: Previous experience in a SOC Analyst or similar cybersecurity role Strong expertise in Splunk or similar SIEM tools Familiarity with Flexera for vulnerability management Understanding of firewalls, network protocols, intrusion detection/prevention systems Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous Must be eligible for Developed More ❯
Employment Type: Permanent
Salary: £46000 - £50000/annum
Posted:

Director Information Security

london, south east england, United Kingdom
Hybrid / WFH Options
Maxwell Bond
across the company, including training and best practices Work closely with engineering to embed security into the SDLC and product roadmap Manage incident response, vulnerability management, and third-party risk processes Act as a key stakeholder in board-level and customer-facing security discussions 👤 What We’re Looking More ❯
Posted:

Security Engineer - CrowdStrike - Manchester

Manchester, North West, United Kingdom
Circle Group
experience as a SOC/Security Engineer within a cloud environment Strong CrowdStrike experience is needed Experience with a range of SIEM, SOAR and vulnerability management tools Experience advising on security best practices and developing SOC playbooks Networking and infrastructure experience, including with Firewalls and IDS/IPS More ❯
Employment Type: Permanent
Salary: £60,000
Posted:

IT Security Engineer - CrowdStrike - Manchester

Manchester, North West, United Kingdom
Circle Group
experience as a SOC/Security Engineer within a cloud environment Strong CrowdStrike experience is needed Experience with a range of SIEM, SOAR and vulnerability management tools Experience advising on security best practices and developing SOC playbooks Networking and infrastructure experience, including with Firewalls and IDS/IPS More ❯
Employment Type: Permanent
Salary: £60,000
Posted:
Vulnerability Management
the UK excluding London
10th Percentile
£39,400
25th Percentile
£45,000
Median
£55,000
75th Percentile
£68,750
90th Percentile
£79,500