Vulnerability Management Jobs in the UK excluding London

26 to 50 of 242 Vulnerability Management Jobs in the UK excluding London

Vulnerability and Threat Hunting Manager

london, south east england, United Kingdom
Hybrid / WFH Options
Merlin Entertainments
Vulnerability and Threat Hunting Manager Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in our … attractions. The Vulnerability and Threat Hunting Manager is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting threat assessments … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with More ❯
Posted:

Cyber Threat and Vulnerability Lead

leeds, west yorkshire, yorkshire and the humber, United Kingdom
Anson McCade
Are you ready to lead in one of the most critical roles in the cybersecurity industry? We are seeking a Cyber Threat Intelligence and Vulnerability Lead to play a pivotal role in the operation and improvement of a Security Operations Centre (SOC) dedicated to safeguarding a major UK organisation. … an opportunity to make a tangible impact in protecting the systems that power the nation. About the Role As the Cyber Threat Intelligence and Vulnerability Lead, you will: Take accountability for detecting, triaging, and reporting potential cyber threats and key vulnerabilities daily. Oversee the delivery and quality of all … threat intelligence and vulnerability products, ensuring deadlines are met with excellence. Develop and continuously review tailored Priority Intelligence Requirements (PIRs) and collection plans to align intelligence products with client needs. Provide in-depth analysis, context, and predictive insights to support threat mitigation. Assess and enhance the maturity of the More ❯
Posted:

Cyber Threat Intelligence and Vulnerability Lead

Leeds, UK
uk7 UTC
data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Cyber Threat Intelligence and Vulnerability Lead Job Title: Cyber Threat Intelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to … key vulnerabilities are detected, triaged and reported on daily Accountable for all regular reporting and ensuring the efficient delivery of all threat intelligence and vulnerability products by their respective deadlines Where there is not established schedule for a product the lead is responsible for ensuring that an achievable deadline … of both to ensure that the intelligence products are relevant to the client's interests Accountable for the quality of all Threat Intelligence and Vulnerability Reports, ensuring that when a product is delivered it is at the highest possible standard Accountable for ensuring that all relevant process are effectively More ❯
Posted:

End user Security Engineer (Vulnerabilities), Intune, Hybrid

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
Sanderson Recruitment
project to ensure the efficient operation of end user devices, including Laptops, phones, handheld devices etc. The primary responsibility with the role will be vulnerability Management, including conducting regular assessments, implementing security measures and liaising with various depts. The successful candidate will implement and manage software patches promptly … and configure MS Teams, Intune and Endpoint Config Manager accordingly. Skills required: - Relevant experience in vulnerability management and endpoint security Strong knowledge of MS Teams, Intune and Endpoint Configuration manager Familiar with identity and access management principles Responsibilities: Respond to incidents related to EUC reported through the … Implement and manage software patches for end user computing devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with More ❯
Employment Type: Contract
Rate: £250 - £310 per day
Posted:

Cyber Security Solutions Architect

Edinburgh, City of Edinburgh, United Kingdom
Be-IT Resourcing Ltd
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Vulnerability Management : Collaborate with SecOps to develop and implement vulnerability management programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
Employment Type: Permanent
Salary: £60000 - £70000/annum
Posted:

Cyber Security Solutions Architect

Glasgow, City of Glasgow, United Kingdom
Be-IT Resourcing Ltd
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Vulnerability Management : Collaborate with SecOps to develop and implement vulnerability management programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
Employment Type: Permanent
Salary: £60000 - £70000/annum
Posted:

Security Analyst

london, south east england, United Kingdom
NDK Cyber
years' experience working in a corporate, structured environment in a security analyst or security operations role. You'll focus on daily log analysis, vulnerability management support, antivirus monitoring, and helping to close security-related incidents. Key Responsibilities: 🔍 Security Monitoring & Analysis Review, monitor, and analyze daily security logs using … positives, escalate true positives, and assist in incident investigations. Support service desk and IT teams with closing out security-related calls and incidents. 🛠️ Threat & Vulnerability Management Assist with running and analyzing vulnerability scans; help track remediation. Monitor and manage endpoint protection and antivirus alerts. Collaborate with infrastructure … Support Maintain security incident logs, reports, and operational documentation. Support periodic health checks of security tools and systems. Work closely with firewall and access management processes (basic reviews and requests). Who This Role Would Suit: A candidate with 2–3 years of security analyst experience in a structured More ❯
Posted:

Threat Intelligence Analyst

Leeds, Yorkshire, United Kingdom
BAE Systems (New)
data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Cyber Threat Intelligence and Vulnerability Lead Job Title: Cyber Threat Intelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to … key vulnerabilities are detected, triaged and reported on daily. Accountable for all regular reporting and ensuring the efficient delivery of all threat intelligence and vulnerability products by their respective deadlines. Where there is not established schedule for a product, the lead is responsible for ensuring that an achievable deadline … of both to ensure that the intelligence products are relevant to the client's interests. Accountable for the quality of all Threat Intelligence and Vulnerability Reports, ensuring that when a product is delivered it is at the highest possible standard. Accountable for ensuring that all relevant processes are effectively More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Threat Investigator

london, south east england, United Kingdom
Ice Recruitment Limited
Lead Vulnerability Manager/Cyber Threats Hybrid: 3 days York or Staines office £60k-£65k Our client are looking for a Lead Vulnerability Manager to join their growing successful business. Responsibilities You will be responsible for overseeing end-to-end vulnerability management programme, across multiple client … environments. · Requires strong expertise in vulnerability assessment · Prioritisation · Remediation strategies · Ensure the security of their clients is robust Who are you? · You will have experience of vulnerability management, cyber security or in a related field · Tools with a strong experience level include MS Defender, Tenable, Qualys, Rapid7 More ❯
Posted:

Chief Information Security Officer Leeds

Leeds, Yorkshire, United Kingdom
Hybrid / WFH Options
Radar Healthcare
and ensuring everyone understands their role in protecting our organisation. Leading from the front, you will champion a security conscious culture of proactive risk management and practical compliance to deliver meaningful and sustainable security improvements aligned to our strategic ambitions. What you'll be doing to make a difference … everyday processes. Oversee the security posture of cloud environments, ensuring secure configurations, proactive threat monitoring, and resilience planning. Establish and maintain a robust risk management framework, proactively identifying, assessing, and mitigating cybersecurity risks in alignment with business goals. Define standards for operational security including vulnerability management, incident … . Demonstrated experience conducting security due diligence and managing integrations in acquisitions. A proven track record of building and embedding security awareness and risk management frameworks across business and technical teams. Strong operational experience, including establishing and managing incident response, vulnerability management, and security monitoring programs. Ability More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

EUC Engineer

bath, south west england, United Kingdom
Wipro
of application patching schedules for the client estate Keeping up to date with and leveraging the latest Microsoft technologies into our policy and systems management Manage end user system builds, images and remote deployment and asset management toolsets Support and maintain telephony systems and other corporate IT services … a wide breadth and depth of desktop and hardware support experience in a similar technical role. You will have a robust background in the management and provision of Microsoft Windows clients and end user systems, with experience in Microsoft 365 and Exchange Online tenant administration. 1st/2nd line … things through, end to end, including the investigation of possible solutions, documenting processes and contributing to the success of the team. Desirable: Mobile Device Management experience using Intune/Endpoint Manager Foundation certification or knowledge of the ITIL framework Experience in management/support of telecoms systems Microsoft More ❯
Posted:

Cyber Security Specialist

manchester, north west england, United Kingdom
SearchWorks
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 … Information Security Management System. Ensure cyber security compliance with company policies, standards, and obligations. What You'll Need to Succeed: 2 years + Experience in a cyber-security role Working knowledge of technical and cyber security standards Working knowledge of industry best practices (such as NIST Framework, OWASP top … ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to the ISO27001 standard Cloud More ❯
Posted:

Security Analyst

london (city of london), south east england, United Kingdom
Crone Corkill
first EU based Security Analyst to the team. Collaborating closely with the Security team in the US, you'll be responsible for incident response, vulnerability management, risk analysis and detection, with a particular focus on Europe and APAC. This is a brand new hire for a mid-level … to incidents, breaches and suspicious activity Investigate incidents, discover root cause and implement measures to prevent them happening again Analyse, propose and implement risk, vulnerability and threat solutions Install Security measures and use Security software to protect the business' infrastructure, firewalls, systems and data encryption programmes Analyse and manage … Security Analyst? Rapid7 IDR (open to other SIEM tools) CrowdStrike Microsoft Defender Understanding of networking (Cisco Umbrella & Fortinet, IDS/IPS, etc) Experience with Vulnerability Management tools Experience with Password Management tools Experience with Security Awareness software tools Experience with Email Security tools Bachelor's in Computer More ❯
Posted:

IT Security Engineer

glasgow, central scotland, United Kingdom
Hybrid / WFH Options
Sanderson
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation and management of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use cases. … Designing and implementing security controls and secure configurations. Maintaining proactive vulnerability scanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and … and audits of our information security information security policies, procedures, and systems. Identifying, assessing, managing, remediating, and tracking information security risks through our risk management framework and ensuring key risks are reported to the CISO. Performing regular internal security audits aligned to ISO/IEC 27001 and SOC2 controls. More ❯
Posted:

IT Security Engineer

Glasgow, Lanarkshire, Scotland, United Kingdom
Hybrid / WFH Options
Sanderson Recruitment
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation and management of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use cases. … Designing and implementing security controls and secure configurations. Maintaining proactive vulnerability scanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and … and audits of our information security information security policies, procedures, and systems. Identifying, assessing, managing, remediating, and tracking information security risks through our risk management framework and ensuring key risks are reported to the CISO. Performing regular internal security audits aligned to ISO/IEC 27001 and SOC2 controls. More ❯
Employment Type: Permanent, Work From Home
Salary: £65,000
Posted:

Senior Cyber Security Consultant

Dartford, Kent, United Kingdom
Goaco Ltd
working with the Ministry of Defence (MOD). The ideal candidate must possess DV Clearance and have a deep understanding of secure systems, risk management, and cyber security best practices within a defence environment. RESPONSIBILITIES Provide technical cyber security consultancy to public and private sector clients. Perform security assessments … penetration testing, and vulnerability management to protect critical systems. Design, implement, and maintain security architectures and frameworks aligned with government standards. Lead and support risk assessments, threat modelling, and incident response initiatives. Work closely with stakeholders to ensure compliance with NCSC and other relevant security policies. Develop and … Ministry of Defence. Strong technical expertise in areas such as network security, endpoint security, cloud security, and secure system architecture. Experience in penetration testing, vulnerability management, and cyber threat intelligence. Solid knowledge of security technologies such as SIEM, IDS/IPS, firewalls, and endpoint detection and response (EDR More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Infrastructure Manager

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
Somerset Bridge Group
manage the Infrastructure team. Assign tasks, manage workloads and ensure team members meet performance expectations. Facilitate professional development and skills training for the team.Process Management Implement and optimise ITIL-based processes for incident, problem and change management. Drive process improvements to increase operational efficiency and reduce incidents. Ensure service … level agreements (SLAs) are met or exceeded.Project Management Plan and manage infrastructure projects such as upgrades, migrations and deployments. Define project scope, timelines and budgets, ensuring projects are delivered on time and within budget. Coordinate with vendors and service providers for procurement and support.Security & Compliance Collaborate with IT Compliance … to ensure infrastructure is secure and compliant with industry regulations. Manage regular security audits, patch management and vulnerability assessments in accordance with the Vulnerability Management framework.Stakeholder Management Develop and maintain strong relationships with key stakeholders across the organisation. Liaise with suppliers and service providers to More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Product Security Engineer

Belfast, United Kingdom
Smarsh, Inc
partner with engineering teams and proactively identify, assess, and remediate security risks across our product portfolio. This role will focus on secure development practices, vulnerability management, threat modelling, and driving a shift-left security culture. The ideal candidate is a pragmatic problem solver with strong technical expertise in … every phase-from design to deployment. Threat Modeling & Security Design Reviews: Conduct structured threat modelling and security assessments for new features, architectures, and services. Vulnerability Management & Remediation: Work closely with engineering teams to identify and remediate vulnerabilities from SAST, DAST, SCA, container security, and cloud security scans. Code … Actions, Jenkins, GitLab CI, etc.). Familiarity with infrastructure-as-code security (Terraform, CloudFormation) and cloud security posture management. Strong understanding of identity & access management (OAuth, OIDC, SAML, JWT) and API security. Knowledge of industry frameworks like NIST, ISO 27001, and SOC 2. Experience driving developer enablement and security More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Consultant / Manager, Cyber Strategy, Cyber Transformation (Hiring Immediately)

Manchester, UK
Cyber News
Connect to your Industry Cyber security is critical to every organisation. We are shaping strategies and transforming the management of cyber risk and we need you to join us. You’ll build strong relationships as one of the areas of our cyber practice with over 450 extremely talented individuals … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills: Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerability management, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status More ❯
Employment Type: Full-time
Posted:

IT Security & Vulnerability Engineer - Investment Bank - 654/day GBP

london, south east england, United Kingdom
Hybrid / WFH Options
Hawksworth
Position: IT Security & Vulnerability Management Engineer Industry: Investment Banking (Global Financial) Day rate contract position: 654/day (inside IR35) Initial contract length of 6 months Location: Central London Hybrid working: 3 days at their London office Do you have experience leading vulnerability management in large … life cycle of security assessments, threat identification, and mitigation Experience in security assessments, particularly within complex enterprise environments Security risk oversight, applying technical security vulnerability remediation practices Identification, prioritization, remediation and reporting of security risks. Knowledge of vulnerability remediation practices Monitoring and capacity planning of local systems as … part of the global framework A nice to have.... Experience with Tenable and Flexera Background in RedHat Linux, Microsoft Windows including WSUS and GPO management This day rate contract is initially for 6 months with a view to extend. The day rate is 654/day GBP inside IR35. More ❯
Posted:

Information Security Engineer Engineering Team Bristol Office

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
Duel
Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerability scanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development process. Assist in securing … to security compliance frameworks such as ISO 27001 or SOC 2, even if not previously responsible for certification processes. Experience working within security risk management, vulnerability tracking, or operational security efforts. Prior experience working with engineering teams on security topics is beneficial, particularly around secure development practices. Ability … or Vanta. Experience working with pen testing and bug bounties a plus. Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerability management solutions. Experience or knowledge of cloud security (AWS, GCP, or Azure). Awareness of security best practices in application and infrastructure security. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Vulnerability Analyst (OT)

Portsmouth, Hampshire, United Kingdom
Hybrid / WFH Options
Tria
We're working with a leading organisation in critical infrastructure that is looking for a Vulnerability Analyst (OT) to join their team. This is a fantastic opportunity to contribute to the security of Operational Technology (OT) environments, helping to safeguard essential services. The Role: Our client is looking for … someone to: Conduct vulnerability assessments across OT environments to identify security risks. Work closely with internal teams to develop and implement risk mitigation strategies. Monitor and assess emerging threats impacting critical infrastructure. Provide expert guidance on best practices for OT security and compliance. Travel once per quarter to the … South of England for team collaboration. What We're Looking For: Some hands-on experience in OT security or vulnerability management - this could be from working with ICS/SCADA environments, network security, or cyber risk management in OT. A strong understanding of OT vulnerabilities and security More ❯
Employment Type: Permanent
Salary: £50000 - £60000/annum
Posted:

Vulnerability Analyst (OT)

Portsmouth, yorkshire and the humber, United Kingdom
Hybrid / WFH Options
TRIA
We’re working with a leading organisation in critical infrastructure that is looking for a Vulnerability Analyst (OT) to join their team. This is a fantastic opportunity to contribute to the security of Operational Technology (OT) environments , helping to safeguard essential services. The Role: Our client is looking for … someone to: Conduct vulnerability assessments across OT environments to identify security risks. Work closely with internal teams to develop and implement risk mitigation strategies. Monitor and assess emerging threats impacting critical infrastructure . Provide expert guidance on best practices for OT security and compliance. Travel once per quarter to … the South of England for team collaboration. What We’re Looking For: Some hands-on experience in OT security or vulnerability management – this could be from working with ICS/SCADA environments, network security, or cyber risk management in OT. A strong understanding of OT vulnerabilities and More ❯
Posted:

Security Operations Centre Team Lead

Plymouth, Devon, South West, United Kingdom
Hybrid / WFH Options
Inspire People
Security Operations Centre team providing technical oversight and direction. You will engage with various teams across DDaT to maintain security monitoring, threat intelligence and vulnerability management controls to detect and alert across all HM Land Registry technical assets. Salary of £46,058 - £57,400 dependent upon interview assessment … and Business Strategies. Working closely with the Lead Infrastructure Engineers and subject matter experts, you will develop and maintain security monitoring, threat intelligence and vulnerability management controls, to detect and alert across all HMLR technical assets. You will work with technical teams to develop SOC scenario-based run … books to respond to security events & incidents. Develop vulnerability tools to ensure awareness of threats and risks to security controls. Working with Lead Infrastructure Engineers and other security teams to advise and guide operational teams on Security controls. Engage with project teams to provide assurance around the security of More ❯
Employment Type: Permanent, Work From Home
Salary: £55,000
Posted:

Senior IT Auditor, Network & Cybersecurity

Chester, Cheshire, United Kingdom
Oliver James Associates Ltd
complex technology audits focused on cloud environments (especially AWS), cybersecurity programs, network security, and enterprise applications. Evaluate cloud infrastructure controls, architecture risks, and configuration management within AWS environments, identifying gaps and control weaknesses. Conduct assessments of cybersecurity frameworks, including access management, vulnerability management, incident response, and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Vulnerability Management
the UK excluding London
10th Percentile
£39,400
25th Percentile
£45,000
Median
£55,000
75th Percentile
£68,750
90th Percentile
£79,500