Remote Vulnerability Management Jobs in Warrington

5 of 5 Remote Vulnerability Management Jobs in Warrington

Information Security Analyst (Vulnerability Management)

warrington, cheshire, north west england, United Kingdom
Hybrid / WFH Options
James Adams
as part of a wider tech transformation. As part of this growth, we’re looking for an Information Security Analyst (VM) to join their Vulnerability Management team. This role will play a pivotal part in protecting the business by owning the vulnerability scanning and assessment process, coordinating … third-party testing, and helping drive remediation plans. It’s a great opportunity for someone with hands-on technical experience in vulnerability management who’s looking to deepen their expertise in a fast-paced, hybrid environment. Responsibilities: Conducting vulnerability scanning across all business endpoints using class-leading … tools Reviewing and assessing scan results through a risk-based lens Coordinating third-party vulnerability and penetration testing Acting as an escalation point for security issues within the business Liaising with technical and non-technical teams to explain risks and support remediation Contributing to audits and supporting compliance with More ❯
Posted:

Information Security Analyst

warrington, cheshire, north west england, United Kingdom
Hybrid / WFH Options
Swissport
detect, investigate, and address insecure features and malicious activity across Swissport’s networks and infrastructure. Run security controls such as email security gateway and vulnerability management systems. As well as contributing to user awareness and training throughout Swissport. Job Responsibilities: Monitoring, investigating, and responding to security alerts, including … and EDR platforms. Managing and fine-tunning email security gateways, reviewing quarantined messages and adjusting rules to reduce false positives. Supporting the organisation’s vulnerability management process, from detection through to tracking remediation. Assisting with cyber risk assessments for new software and services. Conducting phishing simulations and analyse … involving security operations, system/network monitoring, or incident response. Familiarity with core information security concepts, such as email security, endpoint detection and response, vulnerability management, and SIEM. Understanding of at least one information security framework (e.g., ISO 27001, NIST) and general awareness of regulations such as GDPR. More ❯
Posted:

Security Consultant (Security Operations / SOC)

warrington, cheshire, north west england, United Kingdom
Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Posted:

Cyber Security Consultant

warrington, cheshire, north west england, United Kingdom
Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
Posted:

Security Analyst

warrington, cheshire, north west england, United Kingdom
Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
Posted: