VULNERABILITYMANAGEMENT ANALYST/VM ANALYST Up to £75,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a … major driving forces behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a VulnerabilityManagement Analyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's VulnerabilityManagement Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes … Schedules related to Vulnerability Scanning of All Endpoints of the business. As a VulnerabilityManagement Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of VulnerabilityManagement Analyst role would include More ❯
Greetings We are Hiring VulnerabilityManagement specialist in Sheffield, Birmingham, Chester- Contract 6 Months Hybrid 1. Bridging the gap between project and support teams through techno-functional expertise For a new business implementation project, drive the end to end process from business requirement management to integration & configuration and production deployment Check the feasibility of the new change More ❯
birmingham, midlands, united kingdom Hybrid / WFH Options
Openreach
with expertise in Elasticsearch to join our dynamic team. As a SIEM engineer, you will play a critical role in designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threat detection, incident response, and overall security posture. This role is hybrid (3 days in … Logstash: Design, develop, and maintain data pipelines using Logstash, part of the Elastic Stack. Automate data ingestion, transformation, and loading tasks. Beats for Data Collection: Agent and Agent Policy Management: Proficiency in configuring and managing agents, including setting up agent policies for various operation systems. Ensure seamless data flow from endpoints to the Elastic Stack. Data Cleaning and Enrichment … Collaborate with data analysts to create meaningful search experiences. Database Architecture and Scaling with Elasticsearch: Optimize data storage and retrieval mechanisms within Elasticsearch clusters. Implement sharding, replication, and index management strategies. End-to-End Solution Delivery: Expertise in taking ownership of a requirement from start to finish, including gathering detailed requirements, designing, and implementing robust, innovative solutions. Experience Required More ❯
skills and shift coverage are always available. Monitor ticket queues and ensure SLAs are exceeded Evaluate and recommend service desk tools, technologies, and ways of working to improve service management, ensuring optimal use of existing IT Service Management & Service Desk tools. Analyse Service Desk metrics to identify trends and improve performance, reporting findings to the Service Operations Management team to support collaborative continual improvement of the Service management offerings Track customer satisfaction relating to resolved Service Desk tickets and, where required, contact end-users directly to improve customer satisfaction. Prioritise the ongoing NOC health monitoring, maintain patch compliance lisaing with Change Management & customer facing functions Liase with Security Ops to ensure vulnerabilitymanagement … patch status reports at least monthly and escalate exceptions or delays promptly Ensure minimal downtime and service disruption during patch deployment. Manage Patch exceptions and mitigations. Collaborate with Transition Management to facilitate the transition of new services and processes into operational use. Contribute to the planning, execution, and monitoring of transition projects to ensure they meet predefined objectives and More ❯
ensuring effective integration. Baseline and conduct regular reviews with an incoming 3rd party managed SOC and the security tools in the Cloud environment (Defender and Sentinel) Oversee security architecture, vulnerabilitymanagement, incident response, and threat intelligence Lead security risk assessments and manage remediation plans for identified gaps Ensure compliance with financial regulations (e.g. GDPR, PCI DSS, SOX, FCA … talent Experience/Skills Required Managing security for cloud-first environments specifically Microsoft Azure Implementing Security Operations Centres (SOC) and automated security monitoring Collaborate with the third-party risk management and vendor security programmes Experience with DevSecOps practices and secure software development lifecycle (SDLC) Proven leadership experience in information security within financial services Deep understanding of regulatory and compliance … implementing security frameworks (ISO 27001, NIST) Hands-on experience with SIEM, DLP, IAM, and endpoint security technologies, specifically Microsoft Defender XDR, Purview and Sentinel Excellent risk assessment and incident management skills Outstanding communication skills with the ability to influence stakeholders at all levels Strategic mindset with the capability to balance security controls and business agility SM&CR Responsibilities As More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Castlefield Recruitment
with internal and external teams to ensure secure and reliable operations. Manage and maintain key infrastructure components including servers, networks, and cloud platforms. Deliver technical input into IT service management and improvement projects. Ensure systems are compliant with relevant security standards and best practices. Identify and mitigate risks through regular assessments and reviews. Drive continuous improvement in monitoring, automation … cyber security principles, tooling, and incident response. Ability to troubleshoot complex technical issues across systems and services. Comfortable working both independently and collaboratively across teams. Familiarity with IT service management frameworks (e.g. ITIL) and best practice methodologies. Desirable Skills and Qualifications Relevant industry certifications (e.g. Microsoft Certified, CompTIA Security+, ITIL, etc.) Experience working in regulated environments with a focus … on data protection and compliance. Exposure to cloud security, identity management, and endpoint protection tools. Understanding of vulnerabilitymanagement and patching practices. More ❯
Burton-On-Trent, Staffordshire, West Midlands, United Kingdom
Trent and Dove Housing
Upon Trent Salary: Up to £55,000 Benefits include Company Pension Scheme, Company Healthcare scheme, Flexible Working The successful candidate will be responsible for leading and managing threat and vulnerabilitymanagement within the organisation. They will monitor, analyse and respond to security incidents and alerts. You will act as a security champion within the organisation, ensuring that security … procedures, and upskill the wider business to ensure heightened awareness in day-to-day activities. To be successful in the role you will have: Proven experience in threat and vulnerability management. Strong working knowledge of Microsoft Defender, MDM solutions, Azure Security Centre and Entra. One or more relevant security qualifications, such as: CISSP, CISM, CompTIA Security +, Microsoft SC More ❯
technical professional (TP) contract role. Primary Role and Responsibilities: The candidate will serve as the Technical SME for Microsoft Sentinel and is expected to lead the deployment and ongoing management of the platform, focusing heavily on integrating and securing operational technology (OT) environments. Microsoft Sentinel Leadership and Deployment: Lead Sentinel Deployment for OT SOC: Architect and implement Microsoft Sentinel … troubleshooting. Log Source Integration: Configure and onboard diverse and complex log sources into Sentinel, including specialized OT systems (e.g., Nozomi Networks ), firewalls , EDR solutions (e.g., Defender for Endpoint ), and VulnerabilityManagement and Detection and Response (VMDR) tools (e.g., Qualys ), as well as other critical IT/OT systems. Mandatory Skills and Experience: 10+ years of progressive experience in More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Anson McCade
experience in IT security , ideally within a SOC/NOC environment. Strong knowledge and hands-on expertise with Splunk (other SIEM exposure beneficial). Solid understanding of DFIR principles, vulnerabilitymanagement, and ethical hacking. Strong grasp of network traffic flows, malware analysis, and reverse engineering. Excellent written and verbal communication skills for client interaction and reporting. Ability to More ❯
Wolverhampton, West Midlands, England, United Kingdom
Newto Training
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Birmingham, West Midlands, England, United Kingdom
Newto Training
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Wolverhampton, West Midlands, England, United Kingdom
Newto Training
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Birmingham, West Midlands, England, United Kingdom
Newto Training
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Wolverhampton, West Midlands, England, United Kingdom
Newto Training
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Birmingham, West Midlands, England, United Kingdom
Newto Training
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯