Remote Vulnerability Management Jobs in Yorkshire

10 of 10 Remote Vulnerability Management Jobs in Yorkshire

Design Engineer (Cybersecurity Architect)

Sheffield, England, United Kingdom
Hybrid / WFH Options
Vallum Associates
experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … a comfortable level • Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies • Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity • Experience and understanding of both the roles and interlock between enterprise & solution architecture • Experience in both operational and transformation … cybersecurity roles or a clear working understanding of both perspectives • Experience working in large-scale IT transformation programmes Identity & Access Management • Secrets Management: Experience of designing solutions using SM tools such as HashiCorp Vault • Experience of developing secrets management patterns and championing designs through architecture governance forums • Experience of designing or implementing Workload Identity Frameworks within large More ❯
Posted:

Design Engineer (Cybersecurity Architect)

handsworth, yorkshire and the humber, united kingdom
Hybrid / WFH Options
Vallum Associates
experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … a comfortable level • Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies • Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity • Experience and understanding of both the roles and interlock between enterprise & solution architecture • Experience in both operational and transformation … cybersecurity roles or a clear working understanding of both perspectives • Experience working in large-scale IT transformation programmes Identity & Access Management • Secrets Management: Experience of designing solutions using SM tools such as HashiCorp Vault • Experience of developing secrets management patterns and championing designs through architecture governance forums • Experience of designing or implementing Workload Identity Frameworks within large More ❯
Posted:

Design Engineer

Sheffield, South Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
Experis
experts and consultants related programmes. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … a comfortable level Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity Experience and understanding of both the roles and interlock between enterprise & solution architecture Experience in both operational and transformation … cybersecurity roles or a clear working understanding of both perspectives Experience working in large-scale IT transformation programmes Identity & Access Management: Secrets Management: Experience of designing solutions using SM tools such as HashiCorp Vault Experience of developing secrets management patterns and championing designs through architecture governance forums Experience of designing or implementing Workload Identity Frameworks within large More ❯
Employment Type: Contract
Posted:

Information Security Analyst

Hull, North Humberside, England, United Kingdom
Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerability management: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerability management, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non … technical staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey More ❯
Employment Type: Full-Time
Salary: £35,000 - £45,000 per annum
Posted:

Information Security Analyst

North Ferriby, North Humberside, North East, United Kingdom
Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerability management: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerability management, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non … technical staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey More ❯
Employment Type: Permanent, Work From Home
Salary: £40,000
Posted:

Information Security Analyst

Melton, East Yorkshire, UK
Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerability management: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerability management, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non … technical staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey More ❯
Employment Type: Full-time
Posted:

Design Engineer

Sheffield, South Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
VANLOQ LIMITED
requirements. Contribute to the development of new architecture patterns and strategies, particularly within cybersecurity. Essential Skills & Experience Proven expertise in at least one domain of cybersecurity: security operations, threat & vulnerability management, identity & access management, cryptography, infrastructure, networks, applications, data, or cloud. Strong understanding of enterprise and solution architecture principles. Experience delivering solutions within large-scale IT transformation … programmes. Skilled in Identity & Access Management (IAM), including secrets management (e.g., HashiCorp Vault), workload identity frameworks, privileged access management, and authentication protocols (Kerberos, OAuth, SAML). Proficiency with architecture tools such as BizzDesign, Archi, UML, and collaboration platforms (Jira, Confluence). Excellent communication skills, with the ability to engage both technical and non-technical stakeholders. Preferred Qualifications More ❯
Employment Type: Contract, Work From Home
Posted:

Defender Administrator

Normanton, West Yorkshire, UK
Hybrid / WFH Options
Stott & May Professional Search Limited
to Microsoft Defender. Proven AV migration experience in complex environments. Strong knowledge of Microsoft security tools (Defender for Endpoint, O365, Identity, Cloud App Security). Expertise in EDR, Threat & Vulnerability Management, Attack Surface Reduction, and Auto Remediation. Experience with Symantec Endpoint Protection and McAfee. Strong Windows (7/8/10, Server 2008-2016) and RHEL Linux knowledge. More ❯
Employment Type: Full-time
Posted:

NSE Cybersecurity Project Assurance Manager, Cybersecurity, Technology & Digital Services

Leeds, Yorkshire, United Kingdom
Hybrid / WFH Options
Deloitte LLP
is embedded throughout the development lifecycle of Technology Assets by using Deloitte's Secure System Development Lifecyle (SSDLC) to assure paths to production. Oversee that security testing activities like vulnerability scanning, penetration testing, and code reviews are completed to identify weaknesses and potential exploits on the identified security requirements. Identify potential information security risks within a project, analyse their … information security principles, including confidentiality, integrity, and availability. Demonstrable understanding of Cybersecurity risk and controls inherent in various technologies, and related best practices. This includes OWASP Top 10 and vulnerability management. Have strong knowledge in cybersecurity frameworks and standards like ISO 27001, NIST, COBIT, and Cyber Essentials+ or equivalent. Experience with risk management methodologies, techniques, and being able … to clearly understand and articulate risk. Demonstrable ability to identify risks associated with business processes, operations, and the roll out of technology projects. An understanding of project management to manage security aspects within a project timeline and budget. Knowledge and understanding of cybersecurity technologies - mobile threat defense, endpoint protection, data loss prevention, insider threat protection, device hardening, classification, key More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Java Technical Lead

Leeds, West Yorkshire, United Kingdom
Hybrid / WFH Options
Corecom Consulting
engineers through implementation, balancing workloads, addressing hotspots, and providing coaching. Oversee deployments, ensuring quality, traceability, and compliance with security standards . Take accountability for technical debt, service levels, and vulnerability management. Collaborate with architects, DevOps engineers, product owners, and Scrum Masters to deliver seamless solutions. Join the out-of-hours support rota for critical digital products. What We're More ❯
Employment Type: Permanent
Salary: £55000 - £65000/annum + bonus
Posted:
Vulnerability Management
Yorkshire
25th Percentile
£31,250
Median
£33,000
75th Percentile
£50,000
90th Percentile
£90,000