Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Senior Manager VulnerabilityManagement Location: Reading, UK (Hybrid 4 days onsite) Type: Contract (6 months) | Rate: £475/day | Start: ASAP Our client, a leading global organization in IT services, is seeking a Senior Manager VulnerabilityManagement to lead and evolve the end-to-end vulnerabilitymanagement strategy for a major client within the … CSP unit. You will be responsible for driving vulnerability assessment, hunting, research, and risk management across a federated enterprise environment. You will partner with business and technical stakeholders and external vendors to deliver scalable, efficient, and consistent vulnerabilitymanagement services that reduce enterprise-wide risk. Key Responsibilities Lead day-to-day operations of the vulnerabilitymanagement function. Design and embed scalable vulnerabilitymanagement processes across client entities. Establish and manage strong partnerships with stakeholders, vendors, and partners. Define and deliver metrics and executive briefings, tracking operational performance and vulnerability trends. Mentor and grow a diverse team of security practitioners at all levels. Ensure workflows, documentation, and processes remain accurate and More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Prism, Inc
role requires: - 8 years of experience - Top Secret/Tier 5 - Primary Location: Washington D.C., or Seaside, CA - Location Requirement: Hybrid (occasional on-site required) Further position details: The Vulnerability Engineer will support vulnerability remediation efforts. Candidates should have a strong in-depth knowledge of the Windows OS (Windows Workstation and Windows server) as well as a foundational … knowledge of LINUX/UNIX OS, networking, databases, and other IT Technologies required. Working knowledge of DevSecOps functionality a plus. Requirements: 5-8+ years of operational experience in vulnerabilitymanagement or security engineering with a working knowledge of OS hardening/compliance/DISA STIGs. Position requires 8570 Certification (e.g. Security +, CISSP). Desired Skills: Working … knowledge of ACAS. Knowledge of PowerShell Understanding of DISA STIGs and Information Assurance VulnerabilityManagement (IAVM) Program Working knowledge of Red Hat Advanced Cluster Security for Kubernetes (StackRox) and Splunk strongly desired. Strong critical thinking, communication, and organizational skills Collaborates with technical and compliance teams across the organization. Experience in a hands-on leadership role Capable of performing More ❯
Rogerstone, Gwent, United Kingdom Hybrid / WFH Options
Hays Technology
numerous people into careers there, with strong feedback. Your new role This is an interesting opportunity to help define and deliver a strategy which will enhance the organisation's vulnerabilitymanagement and improve the recording and identification of the vulnerabilities, at a good time when the company are expanding and investing in their IT and cyber security estate. … completeness of the register, including the correct classification of systems, key technical attributes, asset purpose, criticality, business and system owners and relationships with other assets. Define and implement the vulnerability identification, prioritisation and management processes required to ensure the business has an accurate view of the vulnerabilities in its asset estate and follows an agreed methodology for prioritising … with colleagues performing related penetration testing and risk assessment activities, providing accurate and timely technical information regarding assets and the status of vulnerabilities. Prepare and deliver regular, high-quality management reporting regarding the asset estate and its security posture. Stay informed about emerging cyber threats and vulnerabilities. What you'll need to succeed Experience in a similar role, ideally More ❯
Newport, Gwent, United Kingdom Hybrid / WFH Options
Hays Technology
numerous people into careers there, with strong feedback. Your new role This is an interesting opportunity to help define and deliver a strategy which will enhance the organisation's vulnerabilitymanagement and improve the recording and identification of the vulnerabilities, at a good time when the company are expanding and investing in their IT and cyber security estate. … completeness of the register, including the correct classification of systems, key technical attributes, asset purpose, criticality, business and system owners and relationships with other assets. Define and implement the vulnerability identification, prioritisation and management processes required to ensure the business has an accurate view of the vulnerabilities in its asset estate and follows an agreed methodology for prioritising … with colleagues performing related penetration testing and risk assessment activities, providing accurate and timely technical information regarding assets and the status of vulnerabilities. Prepare and deliver regular, high-quality management reporting regarding the asset estate and its security posture. Stay informed about emerging cyber threats and vulnerabilities. What you'll need to succeed Experience in a similar role, ideally More ❯
play a key role in shaping the transformation journey of enterprise clients. The role will suit professionals with a strong background in SOC service delivery , incident response coordination , and vulnerabilitymanagement . Key Responsibilities: Act as the primary liaison between clients and internal operational delivery teams, ensuring seamless communication and service excellence. Serve as the key escalation point … Prepare and deliver weekly or monthly service review reports for stakeholders. Support the review and optimisation of service delivery processes, ensuring continuous improvement and implementation of best practices. Lead vulnerabilitymanagement initiatives: Perform risk-based vulnerability scanning across systems, applications, and networks. Prioritise vulnerabilities by risk level and asset criticality, coordinating remediation with business stakeholders. Manage and … maintain IDS and IPS signature updates for client security gateways and firewalls. What You'll Bring: The ideal candidate will bring extensive experience in security operations , incident management , and service delivery in high-stakes environments. Key qualifications and experience include: Minimum of 10 years' experience providing technical support and advisory services within a Security Operations Centre. Deep understanding of More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Prism, Inc
a foundational knowledge of LINUX/UNIX OS, networking, databases, and other IT Technologies required. Working knowledge of DevSecOps functionality a plus. Requirements: 5+ years of operational experience in vulnerabilitymanagement or security engineering with a working knowledge of OS hardening/compliance/DISA STIGs. Position requires 8570 Certification (e.g. Security +, CISSP). Desired Skills: Working … knowledge of ACAS. Knowledge of PowerShell. Experience with MECM, Tanium, and MDE a plus Understanding of DISA STIGs and Information Assurance VulnerabilityManagement (IAVM) Program Working knowledge of Red Hat Advanced Cluster Security for Kubernetes (StackRox) and Splunk strongly desired. Strong critical thinking, communication, and organizational skills Collaborates with technical and compliance teams across the organization. Capable of … performing trend and analysis of vulnerability scan data and preparation of weekly metrics for presentation to leadership Experience in Information Technology/VulnerabilityManagement/Cybersecurity Demonstrate deep technical knowledge in the management and configuration of operating systems, networks, and software including knowledge of OS authentication mechanisms, permissions, and a solid understanding of networking In-depth More ❯
Alexandria, Virginia, United States Hybrid / WFH Options
Prism, Inc
a foundational knowledge of LINUX/UNIX OS, networking, databases, and other IT Technologies required. Working knowledge of DevSecOps functionality a plus. Requirements: 5+ years of operational experience in vulnerabilitymanagement or security engineering with a working knowledge of OS hardening/compliance/DISA STIGs. Position requires 8570 Certification (e.g. Security +, CISSP). Desired Skills: Working … knowledge of ACAS. Knowledge of PowerShell. Experience with MECM, Tanium, and MDE a plus Understanding of DISA STIGs and Information Assurance VulnerabilityManagement (IAVM) Program Working knowledge of Red Hat Advanced Cluster Security for Kubernetes (StackRox) and Splunk strongly desired. Strong critical thinking, communication, and organizational skills Collaborates with technical and compliance teams across the organization. Capable of … performing trend and analysis of vulnerability scan data and preparation of weekly metrics for presentation to leadership Experience in Information Technology/VulnerabilityManagement/Cybersecurity Demonstrate deep technical knowledge in the management and configuration of operating systems, networks, and software including knowledge of OS authentication mechanisms, permissions, and a solid understanding of networking In-depth More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Bright Purple Resourcing
assurance Electric Vehicle Scheme About the Role This is an exciting opportunity for a security professional who wants to make a real impact by leading and maturing an organisations vulnerabilitymanagement programme. You will: Own and optimise the vulnerabilitymanagement lifecycle using Tenable.io, Tenable.sc, and Nessus Perform and analyse vulnerability scans across on-premise, cloud … bring the expertise and confidence to influence both technical and strategic decisions. We are looking for someone with: At least 5 years experience in cybersecurity, with a focus on vulnerabilitymanagement and threat analysis Proven hands-on experience with Tenable.io, Tenable.sc, and Nessus Strong understanding of operating systems, networking, cloud platforms and containers The ability to interpret CVEs More ❯
will act as a critical liaison between client stakeholders and internal operational teams, ensuring the delivery of world-class cyber security services. You'll drive incident response coordination, lead vulnerabilitymanagement efforts, and ensure service excellence through strategic oversight and hands-on technical engagement. What You'll Be Doing Serve as the key point of contact and escalation … improvement initiatives. Support compliance with SLAs and ensure services meet contractual, operational, and quality standards. Lead service reviews and present performance reports to clients (weekly/monthly). Oversee vulnerabilitymanagement efforts including scanning, prioritisation, risk communication, and remediation coordination. Ensure IDS/IPS systems are maintained and aligned with the latest threat intelligence. Work closely with the … Manager to identify process improvements and implement best practices. What You'll Bring 10+ years of experience in technical support for SOC or Cyber Security operations. 5+ years of vulnerabilitymanagement experience, with demonstrable risk-based prioritisation skills. Proven leadership in high-pressure, crisis-response situations. Strong client relationship management and stakeholder engagement skills. In-depth understanding More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Circle Group
Newcastle *Be the M365 Subject Matter Expert* IT Deployment Engineer/IT Infrastructure Engineer, providing 3rd line IT/M365 Application support with excellent M365, InTune, Azure, Modern Device Management & IT Security experience is required by a leading company in central Newcastle You will be the subject matter expert for Microsoft and M365, working on a range of 3rd … Active Directory, firewall, VPN, iOS, and networking protocols (TCP/IP, DNS, DHCP, SMTP). - Strong client-service approach with excellent communication and teamwork skills. - Strong IT Security, Endpoint management and Vulnerabilitymanagement experience - PowerShell Scripting experience within Microsoft Applications - Ability to prioritise, manage workload, and multitask effectively. Role Responsibilities: - 3rd line support and implement Intune, M365 … maintenance). - Assist in managing Microsoft Exchange, Mimecast security, Teams, and Autopilot. - Develop onboarding processes and provide feedback for service improvements. - Define the company's IT Security policies, including vulnerabilitymanagement - Admin of Endpoint management tools - Stay updated on Microsoft 365 tools and roadmap. - Conduct monitoring and analysis, including storage and usage reports. - Own problem managementMore ❯
Barrow-In-Furness, Cumbria, North West, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions
Vulnerability Manager - Barrow-in-Furness - Up to £50,000 + Hybrid Working Location: Barrow-in-Furness (Hybrid: 3 days onsite per week) Salary: Up to £50,000 Clearance Requirement: UK nationals only, SC eligible Deerfoot IT Recruitment is helping one of our trusted clients source a Vulnerability Manager to join a specialist cybersecurity team working on a high … profile programme. This is a fantastic opportunity for someone with a passion for cybersecurity, hands-on experience with vulnerabilitymanagement tools, and strong communication skills to play a key role in enhancing security assurance across a complex IT estate. The role will involve: Conducting vulnerability analysis and impact assessments, including risk assessments. Using tools such as Nessus … governance, risk, and compliance activities related to security findings. Collaborating with wider teams and contributing to security training and mentoring initiatives. Ideal candidate profile: 2-3 years' experience in vulnerabilitymanagement (3-5 years in wider cybersecurity desirable). Familiarity with vulnerability tools (e.g. Nessus, Tenable, Microsoft Defender, IBM QRadar). Relevant certifications such as CompTIA Security+ More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Be-IT Resourcing
a hands-on Cyber Threat professional? Want to shape strategy? Come and join a small but dedicated team, where you’ll take ownership of a global business’s entire vulnerability lifecycle. As the Vulnerability and Threat Management Specialist/Manager you’ll lead the businesses vulnerabilitymanagement program, both from a technical and strategic perspective. … You’ll join a fast-growing data and research business with global reach. For this role, you’ll need – Experience in cybersecurity with a focus on vulnerabilitymanagement and threat analysis. Hands-on experience with Tenable.io/Tenable.sc. Strong understanding of operating systems, networking, cloud platforms (Azure, AWS) and containers. Knowledge of industry standards and frameworks such as More ❯
unique experience in an inclusive environment that helps them thrive. The role: .The role will develop, implement, and manage the Operational Resilience Framework within the region through the direct management of capabilities, as well as through coordination and partnership with other functions within the firm. Responsibilities: Strategy and Policy: Develop and lead the Operational Resilience Strategy and Policy, ensuring … alignment with the broader risk management and business continuity objectives. Framework and Documentation: Design, develop, and embed an Operational Resilience framework across EMEA, ensuring it aligns with the strategic objectives and regulatory requirements and design and implementation of underlying methodologies and processes including CIF/IBS identification and scenario testing Regulatory and Industry: Stay abreast of current and emerging … internal/external incidents and industry best practices related to operational resilience to continuously improve bank's ability to manage resilience risk and ensure inline with regulatory expectations. Operational Management: Build an engaged and motivated centralised EMEA regional operational resilience and testing function, with a clear vision, goals and objectives, as well as management of staff-related matters. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Pontoon
unique experience in an inclusive environment that helps them thrive. The role: .The role will develop, implement, and manage the Operational Resilience Framework within the region through the direct management of capabilities, as well as through coordination and partnership with other functions within the firm. Responsibilities: Strategy and Policy: Develop and lead the Operational Resilience Strategy and Policy, ensuring … alignment with the broader risk management and business continuity objectives. Framework and Documentation: Design, develop, and embed an Operational Resilience framework across EMEA, ensuring it aligns with the strategic objectives and regulatory requirements and design and implementation of underlying methodologies and processes including CIF/IBS identification and scenario testing Regulatory and Industry: Stay abreast of current and emerging … internal/external incidents and industry best practices related to operational resilience to continuously improve bank's ability to manage resilience risk and ensure inline with regulatory expectations. Operational Management: Build an engaged and motivated centralised EMEA regional operational resilience and testing function, with a clear vision, goals and objectives, as well as management of staff-related matters. More ❯
and governing foundational security controls within a global enterprise environment. You will act as a strategic advisor and technical authority, supporting the development and implementation of endpoint security practices, vulnerabilitymanagement, asset control, and governance-aligned with the organisation's broader 2026 security strategy . This is an ideal opportunity for someone who may not see themselves as … ensuring controls are robust, scalable, and fit for the future. Translate technical and business needs into actionable security architecture guidance. Support governance and process standardisation across shadow IT , asset management , and vulnerabilitymanagement . Drive cross-functional collaboration across architecture, engineering, and operational teams. Ideal Candidate Profile: Strong technical understanding of endpoint security , including hardening, tooling, and More ❯
Cambridge, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
REDTECH RECRUIT
Defender XDR suite Knowledge of cloud and on-premise environments, ideally Azure, including networking and firewalls Familiarity with incident response processes, playbooks, and tools Understanding of threat intelligence and vulnerabilitymanagement Experience with ISO27001 and compliance frameworks Scripting and coding skills (e.g., Python, PowerShell, Bash) Exposure to CI/CD, Infrastructure as Code (IaC), and Azure DevOps pipelines … Microsoft Defender/Endpoint Security/PowerShell/Python/Bash/Azure DevOps/Infrastructure as Code/CI/CD/Network Security/Penetration Testing/VulnerabilityManagement/ISO27001/Information Assurance/Computer Science/Cyber Security/Information Security/Security Compliance More ❯
cambridge, east anglia, united kingdom Hybrid / WFH Options
RedTech Recruitment
Defender XDR suite Knowledge of cloud and on-premise environments, ideally Azure, including networking and firewalls Familiarity with incident response processes, playbooks, and tools Understanding of threat intelligence and vulnerabilitymanagement Experience with ISO27001 and compliance frameworks Scripting and coding skills (e.g., Python, PowerShell, Bash) Exposure to CI/CD, Infrastructure as Code (IaC), and Azure DevOps pipelines … Microsoft Defender/Endpoint Security/PowerShell/Python/Bash/Azure DevOps/Infrastructure as Code/CI/CD/Network Security/Penetration Testing/VulnerabilityManagement/ISO27001/Information Assurance/Computer Science/Cyber Security/Information Security/Security Compliance More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
M Group Telecom
the nature of the on call, you must hold a valid drivers licence with reasonable means to a vehicle. What will you be doing? Youll have day to day management of the OSS suite of services and underlying infrastructure as part of a 2nd Line team. Youll be proactive and Reactive within Incident Management Youll have user Access … Management & VulnerabilityManagement System Governance to ensure the effective operation of the services Providing Out of Hours Support via an On-Call Rota. What youll bring Youll bring experiencewith supporting OSS applications from a 2nd and 3rd Line level Youll have the experience of working with developers/vendors implementing fixes or improvements to systems Experience of More ❯
Hull, North Humberside, England, United Kingdom Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerabilitymanagement: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerabilitymanagement, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non … technical staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey More ❯
North Ferriby, North Humberside, North East, United Kingdom Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerabilitymanagement: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerabilitymanagement, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non … technical staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey More ❯
or contribute to cyber engagements across various sectors, adapting to different organisational cultures and regulatory contexts. Core Cyber Security Skills: Strong expertise in areas such as cyber strategy, risk management, cyber maturity assessments, security architecture, transformation programmes, and regulatory compliance. Familiarity with leading frameworks and standards including NIST CSF, ISO27001, NCSC CAF, GDPR, NIS2, and CRI2.0. Hands-on experience … and assessments in varied environments. Relevant certifications such as CISSP, CISM, CISA, M.Inst.ISP, or a postgraduate qualification (e.g. MSc in Cyber Security). Practical knowledge in domains like threat management, vulnerabilitymanagement, cyber GRC, cyber architecture, and cyber assurance. Detail-oriented with strong analytical and problem-solving capabilities. Excellent written and verbal communication skills, including stakeholder reporting More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Nextech
expertise. What You'll Do Serve as the Cyber Security Subject Matter Expert, advising on secure systems design, change control, and implementation of robust security controls. Lead the technical vulnerabilitymanagement programme, with a strong focus on application security, web application firewalls, and secure DevOps pipelines. Provide security leadership and mentoring , supporting colleagues and enhancing security awareness across … evolving threats, and help shape our strategy using frameworks such as OWASP, SASE, and Zero Trust. What We're Looking For Essential: Proven experience in cyber security engineering, including vulnerabilitymanagement, SIEM, WAFs, and secure infrastructure design. Strong knowledge of TCP/IP, firewalls, routing, access controls, and threat-based security approaches. Excellent communication skills with the ability More ❯
secure cloud environments that allow the best companies to move faster. SUMMARY Wiz is looking for a Security Engineer for Product & Production Infrastructure who has experience performing security reviews, vulnerabilitymanagement, and detection and response operations in cloud-native environments. You'll get to collaborate with our software development and DevOps teams to secure Wiz's products, CI … modeling and security review exercises across Wiz's production and CI/CD environments - identifying and mitigating risks in our products and the cloud services that support them Drive vulnerabilitymanagement and remediation efforts - prioritizing issues, implementing mitigations, and designing strategic preventative controls Extend our detection and response capabilities - building scalable solutions to identify malicious activity, triage alerts … Azure and GCP) Kubernetes (AWS EKS) and container infrastructure IAM and managing cloud identities at-scale Secure development and application of IAC solutions (Terraform, Helm) Cloud-native observability and management tools Development experience in Go, Python and Rust PREFERRED QUALIFICATIONS Bachelor's degree in computer science or a related field and/or candidates with equivalent job experience in More ❯
Warrington, Cheshire, United Kingdom Hybrid / WFH Options
Hamilton Barnes
Configure and administer Defender policies (AV, EDR, ASR, AIR), dashboards, exclusions, and reporting to ensure secure and compliant endpoint protection. Monitor, investigate, and remediate threats using Defender EDR, Threat & VulnerabilityManagement, and automated remediation to resolve high-priority security issues. Collaborate with cross-functional teams and stakeholders to provide end-to-end Defender support, documentation, and continuous security … Strong background in Legacy AV solutions (Symantec, McAfee) with the ability to plan and execute smooth migrations to Microsoft Defender. Deep knowledge of endpoint security operations, including EDR, Threat & VulnerabilityManagement, attack surface reduction, and incident investigation/remediation. Collaborative and problem-solving mindset, with the ability to work across infrastructure, application, and client teams while providing clear More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Alexander Mae (Bristol) Ltd
the IT Service Desk Providing support via tickets, email and phone Assisting with pre-sales technical support Leading the response during P1 critical issues Completing BAU tasks including patch management , vulnerabilitymanagement , and backend system troubleshooting Onboarding new clients when needed Supporting non-technical colleagues with escalated issues Reporting directly to the Service Desk Manager The Person More ❯