Peterborough, Cambridgeshire, England, United Kingdom
The One Group
Contract until February - £250 - £260/day - Peterborough (Hybrid) We're working with a leading organisation in Peterborough that needs someone to take full ownership of patch management and vulnerabilityremediation across a mixed Windows and macOS estate. This isn't a BAU helpdesk role - you'll be the go-to person for patching, working closely with the … security team's vulnerability reports, deploying updates, and making sure the estate stays secure and compliant. What you'll be doing Taking full responsibility for patching and vulnerabilityremediation for laptops and desktops Working from vulnerability data provided by the internal InfoSec team (via Tenable/Imperva, etc.) Using Intune and Autopilot for deployment and patching … patch management in a corporate or large-scale environment Hands-on experience with Intune/Autopilot Experience in mixed Windows & macOS environments (Jamf a plus) Ability to work from vulnerability reports to plan and execute patching Good communication skills for knowledge sharing and documentation Ideally 5+ years in IT, progressing from desktop support through to modern workplace management If More ❯
with a leading organisation seeking an experienced Infrastructure Engineer to join their Workspace & Infrastructure team. This role offers the opportunity to take ownership of image builds, patch management, and vulnerabilityremediation across a diverse end-user estate. The successful candidate will work with technologies such as SCCM, Intune, Autopilot, and Jamf while collaborating closely with Infosec and other … IT teams to maintain a secure and efficient desktop environment. Key Responsibilities: Build, test, and maintain Windows 11 and Mac OS images Manage patching and vulnerabilityremediation across end-user devices Administer and maintain SCCM, Intune, Autopilot, and Jamf platforms Update image drivers and assist with transitions into BAU support Work closely with Infosec to ensure workspace vulnerabilities … imaging, application deployment, and asset management Skills & Experience: Strong hands-on experience with SCCM, Intune, Autopilot, and Windows 10/11 PowerShell and VBScript knowledge Experience with Bitlocker and vulnerability management Excellent communication skills and ability to work with local and remote teams MCTS (Administering and Deploying System Centre Configuration Manager) ITIL v3 Foundation certification Contract Details: £250 p More ❯
Operational Product Security Support: Gain hands-on experience with common security tools and technologies such as static analysis (SAST), dynamic scanning (DAST), and security testing frameworks. Assist in streamlining vulnerabilityremediation processes, tracking defect status, and facilitating vulnerability information flow to development teams. Learn and support Product Security Incident Response Team (PSIRT) processes, including vulnerability management … review processes. Basic understanding of cloud security concepts and familiarity with major cloud platforms (AWS, Azure, or GCP). Familiarity with Product Security Incident Response Team (PSIRT) processes, including vulnerability management. Knowledge of compliance frameworks (such as SOC 2, ISO 27001, or GDPR) and/or experience participating in security assessments or audits is a plus. Skills: Foundational Technical More ❯
Operational Product Security Support: Gain hands-on experience with common security tools and technologies such as static analysis (SAST), dynamic scanning (DAST), and security testing frameworks. Assist in streamlining vulnerabilityremediation processes, tracking defect status, and facilitating vulnerability information flow to development teams. Learn and support Product Security Incident Response Team (PSIRT) processes, including vulnerability management … review processes. Basic understanding of cloud security concepts and familiarity with major cloud platforms (AWS, Azure, or GCP). Familiarity with Product Security Incident Response Team (PSIRT) processes, including vulnerability management. Knowledge of compliance frameworks (such as SOC 2, ISO 27001, or GDPR) and/or experience participating in security assessments or audits is a plus. Skills: Foundational Technical More ❯
model, aligning it to the Global Application Cybersecurity team, ensuring standards and best practices are fully integrated into the Software Development Lifecycle. Within this role, you'll lead on vulnerability management, promoting the adoption and execution of the global vulnerability management processes and controls. This includes: Inventorying of logical components and dependencies of business solutions Proactively discovering vulnerabilities … Coordinating the execution of scanning, pen testing, or in general the activities and services of vulnerability identification Vulnerability assessment Remediation and mitigation of vulnerabilities Solution verification Reporting Contributing to the evolution of the process for vulnerability management. Lead security assessments of commercial packages You'll look to continually evolve the implementation of cybersecurity, implementing new measures … S-SDLC) Knowledge and understanding of cybersecurity threats and associated attack techniques. Design knowledge: modelling of components, data, interfaces, etc. Threat analysis and modelling Knowledge of web application security Vulnerability discovery techniques and vulnerability lifecycle scanning and management. Knowledge of application security architecture: segmentation, API Gateway, Encryption, Privileged Account Management, WAF, publishing, event collection tools and alert management. More ❯
platforms leveraged by the business, and own documentation and expertise in resolution of relevant incidents, upgrades, and projects related to these Participate in security related exercises, such as patching, vulnerabilityremediation, security audit remediation tasks and cooperate with the Cyber Security team to ensure all actions are performed in a timely and compliant manner Understand the concepts More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Robert Half
within Azure AD and Microsoft 365. Collaborate with Risk and Compliance teams to ensure infrastructure aligns with enterprise security frameworks (e.g. ISO 27001, NIST, CIS). Support incident response, vulnerabilityremediation, and disaster recovery planning. Promote a culture of continuous improvement and secure-by-design principles across the technology team. Provide technical leadership and mentoring to junior engineers. More ❯
Conduct investigations of security related incidents Identify security vulnerabilities, perform solution security reviews and risk assessments, and partner with colleagues to respond to incidents and remediate system vulnerabilities. evaluate remediation Review, analyze and correlate security logs as well as improve SIEM solution. Strong knowledge in Security Cloud support for AWS, OCI, and Azure. Develop and maintain incident response playbooks More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
/CD pipelines, including automated testing, code scanning, and policy enforcement. * Security Testing Coverage: Proportion of applications and systems that undergo static, dynamic, and interactive security testing before release. * VulnerabilityRemediation Velocity: Average time taken to remediate critical and high-severity vulnerabilities identified during development and testing phases. * Toolchain Utilisation Effectiveness: Adoption and effective use of security tools More ❯
Corsham, Wiltshire, South West, United Kingdom Hybrid / WFH Options
Robert Half
debt, and integration complexity. Documents infrastructure assets, licensing models, support agreements, and architectural decisions for transition. Identifies and prioritises compliance gaps between acquired environments and corporate IT standards. Leads remediation of inherited infrastructure vulnerabilities and misconfigurations. Acts as the point of coordination between IT, business stakeholders, vendors, and third-party providers. Supports the Project Manager by contributing to roadmaps … Server (2012/2016/2019/2022) administration and migration Virtualisation platforms (VMware, Hyper-V, Nutanix ) Networking - TCP/IP, DNS, DHCP, VPN, VLAN, firewalls Cybersecurity - endpoint protection, vulnerabilityremediation, access controls, secure configuration Clinical systems - understanding of healthcare IT environments and electronic health record (EHR) systems Experience working with hybrid environments and cloud integration (e.g., Azure … preferably with exposure to M&A or complex integration scenarios. Strong architectural and hands-on knowledge of enterprise systems and infrastructure technologies. Background in infrastructure risk analysis, documentation, and remediation planning. Ability to manage complex integration projects across diverse environments. Excellent stakeholder communication and coordination across business and technical teams. Familiarity with IT governance, service management, and regulatory requirements More ❯
considered early in the design phase. Define and integrate security testing plans into the software development life cycle (SDLC). Oversee and perform application security testing, supporting teams with vulnerability remediation. Promote secure development practices through training, documentation, and direct engagement. Application Security Engineer - Requirements: 3-5+ years of experience in application security or secure software development. Strong More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Larbey Evans
s degree in Information Systems, Computer Science, or related field (or equivalent experience) Experience with ITSM platforms (e.g., ServiceNow) and monitoring tools Understanding of access management, patch management, and vulnerabilityremediation processes Familiarity with ITIL practices (Incident, Problem, Change, and Configuration Management) Exposure to application performance tuning, cloud platforms, or scripting (e.g., PowerShell, Python More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Larbey Evans
s degree in Information Systems, Computer Science, or related field (or equivalent experience) Experience with ITSM platforms (e.g., ServiceNow) and monitoring tools Understanding of access management, patch management, and vulnerabilityremediation processes Familiarity with ITIL practices (Incident, Problem, Change, and Configuration Management) Exposure to application performance tuning, cloud platforms, or scripting (e.g., PowerShell, Python More ❯
Nuneaton, Warwickshire, United Kingdom Hybrid / WFH Options
IntaForensics
and private sectors, ensuring work is performed to the highest professional standards. Key Responsibilities Conduct thorough penetration tests on infrastructure, web applications, APIs, mobile applications, and cloud environments. Perform vulnerability and cloud assessments using a variety of tools and techniques. Document testing procedures, findings, and recommendations in detailed reports for both technical and non-technical audiences. Serve as the More ❯
South West London, London, England, United Kingdom
Tenth Revolution Group
Role Overview: We are seeking a highly skilled Networking Consultant with expertise in cybersecurity, Microsoft 365, and Azure to join our dynamic team. The ideal candidate will design, implement, and optimize secure network architectures, leveraging Microsoft cloud technologies to protect More ❯
security standards are understood and can be complied with Develop security testing plans and integrate into the software development lifecycle (S-SDLC) Perform and oversee security testing and manage remediation of identified vulnerabilities Take part in the security incident response team Prepare and monitor application security metrics and KPIs Note: This position will require participation in an on-call More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ryder Reid Legal Ltd
of experience in enterprise application support or IT operations Strong troubleshooting and analytical skills Familiarity with ITSM platforms (e.g., ServiceNow) and monitoring tools Understanding of access management, patching, and vulnerabilityremediation Exposure to ITIL practices and professional services environments Experience with documentation tools and scripting (e.g., PowerShell, Python) Relevant certifications (e.g., ITIL Foundation) preferred It offers the chance More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Ryder Reid Legal
of experience in enterprise application support or IT operations Strong troubleshooting and analytical skills Familiarity with ITSM platforms (e.g., ServiceNow) and monitoring tools Understanding of access management, patching, and vulnerabilityremediation Exposure to ITIL practices and professional services environments Experience with documentation tools and scripting (e.g., PowerShell, Python) Relevant certifications (e.g., ITIL Foundation) preferred It offers the chance More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Ryder Reid Legal
of experience in enterprise application support or IT operations Strong troubleshooting and analytical skills Familiarity with ITSM platforms (e.g., ServiceNow) and monitoring tools Understanding of access management, patching, and vulnerabilityremediation Exposure to ITIL practices and professional services environments Experience with documentation tools and scripting (e.g., PowerShell, Python) Relevant certifications (e.g., ITIL Foundation) preferred It offers the chance More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Robert Walters
working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerability management activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party risks … Assist in managing third party risk processes by evaluating external partners' security postures and ensuring compliance with internal requirements. Work closely with Security Operations and IT teams to oversee vulnerability assessments and coordinate remediation efforts effectively. Conduct thorough reviews of security architecture for new systems and services to ensure robust protection measures are in place from the outset. … experience on protecting sensitive data within regulated environments. Your background should include hands-on involvement with risk assessments, policy development aligned with industry standards like ISO 27001 or NIST, vulnerability management activities spanning identification through remediation, and direct participation in incident response processes. Demonstrable experience applying risk assessment methodologies to identify vulnerabilities and recommend effective mitigations is highly More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Robert Walters
working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerability management activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party risks … Assist in managing third party risk processes by evaluating external partners' security postures and ensuring compliance with internal requirements. Work closely with Security Operations and IT teams to oversee vulnerability assessments and coordinate remediation efforts effectively. Conduct thorough reviews of security architecture for new systems and services to ensure robust protection measures are in place from the outset. … experience on protecting sensitive data within regulated environments. Your background should include hands-on involvement with risk assessments, policy development aligned with industry standards like ISO 27001 or NIST, vulnerability management activities spanning identification through remediation, and direct participation in incident response processes. Demonstrable experience applying risk assessment methodologies to identify vulnerabilities and recommend effective mitigations is highly More ❯
Urgent Contract Vulnerability Manager Job Type: Contract Duration: 4 Months Work Location: Milton Keynes, United Kingdom x3 a week at client office - Mandatory Start date : ASAP Note: Candidate should be immediately available Understand and analyse vulnerability data before they becomes overdue Organize and create work packages for teams for resolution Ensure fixes begin within SLA to prevent delays … Help prioritize overdue and upcoming vulnerabilities effectively. Collaborate across teams to streamline technical remediation efforts." Understanding of vulnerability assessment and remediation processes Ability to triage and create meaningful work packages for remediation of vulnerabilities. Good coordination skills to facilitate work packages. Effective ability for cross-team collaboration. Planning and Management skills More ❯
MK9, Milton Keynes, Buckinghamshire, United Kingdom
Uniting People
Urgent Contract Vulnerability Manager Job Type: Contract Duration: 4 Months Work Location: Milton Keynes, United Kingdom [x3 a week at client office] - Mandatory Start date : ASAP Note: Candidate should be immediately available Understand and analyse vulnerability data before they becomes overdue Organize and create work packages for teams for resolution Ensure fixes begin within SLA to prevent delays … Help prioritize overdue and upcoming vulnerabilities effectively. Collaborate across teams to streamline technical remediation efforts." Understanding of vulnerability assessment and remediation processes Ability to triage and create meaningful work packages for remediation of vulnerabilities. Good coordination skills to facilitate work packages. Effective ability for cross-team collaboration. Planning and Management skills More ❯
by implementing configuration changes to the banks infrastructure. · Lead on a firewall rule review. · Collaborate with the Technology Security Manager and the London Information Security Office to agree on remediation plans and actions. · Implement agreed changes and releases to the IT environment to resolve identified findings. · Prepare and submit risk acceptance requests if a technical fix cannot be applied. … Coordinate with internal and external partners to implement changes in the IT environment. · Assist with remediation of vulnerabilities identified by Tenable. Profile · Hands-on experience with patching servers (Windows and Linux), appliances, endpoints, and network equipment. · Hands-on experience with firewall rule reviews. · Hands-on experience with remediating vulnerabilities through configuration changes. · Hands-on experience managing Group Policy Objects … GPOs) and Azure Policies. · Experience with configuring Cisco network equipment. · Experience working with third-party vendors to deliver changes or perform impact assessments. · Experience configuring and interpreting reports from vulnerability scanning tools. · Proficiency in scripting languages (preferred). · Degree in Computer Science or a related discipline (preferred). · Experience in IT within financial services (preferred). · ITIL V3 Foundation More ❯
risk. Ensure we are deploying solutions into a secure environment . Ensure we build solutions in alignment with our control requirements. Support on-going business-as-usual and champion vulnerability management. Provide internal security consultancy and lead on audit engagements, risk activities and project initiatives. Work closely with colleagues to ensure effective technology risk management. Work together . Collaborate … software engineering role, ideally with focus on security. Working knowledge of offensive security, Application and Infrastructure penetration testing (OWASP top 10, OWASP ASVS). Understanding of security vulnerabilities and remediation options in codebases & containers. Working knowledge of methods for authentication and authorization (ODIC, OAuth 2, FIDO 2, etc) Don't worry if you don't meet all the criteria More ❯