Vulnerability Management Jobs in the South East

1 to 25 of 30 Vulnerability Management Jobs in the South East

Head of Information Security

Reading, England, United Kingdom
Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
Posted:

OT Cyber Security Testing Manager

Crawley, England, United Kingdom
InfoSec People Ltd
IT Service Providers and partners to implement and optimise cyber security technical assurance capabilities across four main services; Technical Security Compliance, Product Security Assurance, Vulnerability Management (VM), and Disaster Recovery and Business Continuity. Key responsibilities: Define and deliver the cyber security technical assurance strategy, setting out clear policies … variety of technologies and platforms. Ensure the IT estate is compliant with The Client's policies and technical standards to protect company assets having management responsibility for driving the necessary remediation actions and countermeasures to mitigate identified weaknesses and vulnerabilities. Establish and improve a regular red and purple team … penetration testing program aligned to main threat information and industry cyber security intelligence. Establish a Vulnerability Management process to ensure that all known security vulnerabilities and weaknesses are identified, contextually assessed, prioritised and tracked to remediation against The Client's policy. Ensure that an IT Disaster Recovery and more »
Posted:

Information Security Manager

Leatherhead, England, United Kingdom
Hybrid / WFH Options
Zest
to processing personal data with the highest level of diligence, and you’ll play a pivotal role in maintaining and enhancing our robust infosec management system, acquiring and upholding security certifications, fulfilling the role of our Data Protection Officer and ensuring we have appropriate controls to mitigate risk. You … Simultaneously, your comfort with detail will see you managing the day-to-day operations, keeping our platform and business secure. Key responsibilities Information Security Management & Certifications ISMS Oversight: Maintain and enhance Zest’s Information Security Management System. This includes maintaining documentation, conducting and documenting risk assessments, driving improvements … latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of security systems, controls and infrastructure. Incident Management: Take charge of the response to all information security and data protection incidents and collaborate with various business units to understand, document and learn more »
Posted:

Senior Principal Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help engineering teams identify security-related weaknesses … IT security in one or more of the following areas: software/product security assessments, penetration testing, red teaming, web application assessments Interest in vulnerability research and exploit development Demonstrable experience in designing and evaluating complex systems for security Aptitude for self-study, setting and achieving long term goals … for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances are not required, and more »
Posted:

Cyber Security Vulnerability Manger

Slough, England, United Kingdom
iFindTech Ltd
Job Overview: Join a dynamic and high-performing team as a Senior Analyst in Vulnerability Management & Security Testing. This role offers the unique opportunity to enhance a best-in-class Threat Defence capability and make significant contributions to our security operations. Ideal candidates will bring a strong background … in threat management, vulnerability assessment, and security testing, aiming to drive innovation and excellence in our security practices. Key Responsibilities: Conduct thorough vulnerability assessments across various platforms, including networks, systems, applications, and devices. Analyze risks associated with vulnerabilities, provide detailed reporting, and recommend actionable remediation strategies. Work … across IT, IoT, and OT environments. Coordinate and oversee remediation efforts to ensure timely and effective resolution of security vulnerabilities. Requirements: Extensive experience in vulnerability management and remediation, including hands-on experience with vulnerability scanning tools. Good knowledge of Exabeam, Tenable.io and Tenable.sc would be considered a more »
Posted:

Head of Security Operations

South East London, England, United Kingdom
dmg media
issues. Manage the day-to-day operations of the SOC, ensuring the timely and effective delivery of security monitoring, incident response, threat intelligence and vulnerability management services. Lead and develop a team of cyber analysts, providing coaching, mentoring, performance management and career development opportunities. Establish and maintain … strong relationships with internal and external stakeholders, including senior management, business units, IT teams, vendors, regulators and law enforcement agencies. Develop and implement security operations policies, procedures, standards and best practices, ensuring alignment with the organisation's security strategy, risk appetite and regulatory requirements. Monitor and report on the … in a large and complex organisation. Expert knowledge of security operations processes, tools and technologies, such as SIEM, SOAR, EDR, XDR NDR, threat intelligence, vulnerability management, forensics and malware analysis. Strong understanding of security frameworks, standards and regulations, such as ISO 27001, NIST, CIS, PCI DSS, GDPR and more »
Posted:

Head of Information Security Operations - Contract - URGENT - Reading/Thames Valley/Oxford

Reading, England, United Kingdom
Areti Group
the confidentiality, integrity, and availability of information systems are maintained to protect customer, corporate, and third-party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC partners. This is a hybrid position with … required on site each week. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are … is maintained and in line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes, and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Experience Minimum 5+ years commercial experience more »
Posted:

🌳🌳🌳 Cyber Security Consultant 🌳🌳🌳

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
one or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identity and access management , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and negotiating technical outcomes … with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group – Carbon positive tech recruitment more »
Posted:

Cyber Security Analyst

Didcot, Oxfordshire, United Kingdom
Hybrid / WFH Options
Alexander Mann Solutions - Public Sector Resourcing
Infrastructure and rules harmonisation (multiple campus locations). You'll have relevant experience in: You will benefit from a relevant information security/information management background enabling you to work effectively with IT and business area representatives, academic staff (scientists, researchers) and innovation entrepreneurs You will have incident management experience, and an ability to quickly tailor responses to deal with fast-paced situations Proven people & Stakeholder management skills, allowing for communication of technical matters in a manner appropriate to the recipient. Knowledge and Expertise Knowledge of Information Security standards, legislation and practices, including GDPR & Data Protection act … Experience with a range of IT systems (both on-premises and cloud-based) Knowledge of technical areas, such as anti-virus, networking, vulnerability management, encryption (Microsoft & Linux environments is advantageous) Strong problem-solving ability, with flexibility to think creatively and adapt to and implement constantly evolving systems and more »
Employment Type: Contract
Rate: GBP Annual
Posted:

Cyber Security Engineer

Reading, England, United Kingdom
Focus Resourcing Limited
in Reading. For this exciting role we are seeking an engineer who has gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. They are also looking for experience working with cloud hosting providers, managing application testing and working with system owners … to recover service in complex cross-technology environments. Work to defined SLAs & KPIs. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetration testing to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security … understanding of Security Infrastructure design, IT Security best practice and hardening standards Strong understanding of common IT protocols, infrastructure and systems e.g. Networks, Domain management and virtualised infrastructure Understanding of security operations and keen to learn Excellent communication skills and able to work collaboratively with IT and other stakeholders more »
Posted:

Security Analyst

Winchester, England, United Kingdom
Shaw Daniels Solutions
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and … monitor for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular Vulnerability Scanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. more »
Posted:

Technical Cyber Assurance Manager

Crawley, England, United Kingdom
Matchtech
Key Responsibilities: Define and deliver the cyber security technical assurance strategy Manage the cyber security technical assurance team Establish and improve penetration testing and vulnerability management processes, including red team and purple team exercises Develop and implement IT disaster recovery and business continuity plans Deputise for the Head more »
Posted:

Cyber Incident Response Manager

Buckinghamshire, England, United Kingdom
Proprius Recruitment
Employment Benefits + Bonuses Lead cross-functional post-incident process reviews to identify and implement continuous improvement initiatives. Partner with Legal, 2LoD, Major Incident Management, Threat Management, Vulnerability Management, Attack Surface Reduction, Software Engineering, Security Architecture, Platform Support both locally and globally. You will have experience … in: Leading the response to complex incidents in a large-scale environments. Years of relevant experience in cyber security operations, incident management or risk management within an enterprise environment. Self-motivated interest in the latest cyber security threats and vulnerabilities and is able to integrate threat intelligence into more »
Posted:

Cyber Security Consultant

Reading, England, United Kingdom
Project People
customer trust in a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Experience with information security management frameworks (NIST, PCI, GDPR, ISO, OWASP, ITIL, ISF SoGP, COBIT) is essential. The role will involve supporting project managers in risk and issue management … templates is vital. Expertise and experience in technical domains ie hybrid security, infrastructure and data centre security, network security, application security, identity and access management, and vulnerability management are important. Experience of influencing and negotiating technical outcomes with third parties, including conflict resolution due to changing priorities. … the clients they are supporting or projects they are deliverable in the UK. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture/ more »
Posted:

🌳🌳🌳Head of Information Security Operations – CONTRACT – 6-12 Months – Urgent – Reading/Thames Valley🌳🌳🌳

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
the confidentiality, integrity and availability of information systems are maintained to protect customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Experience 🌳Minimum 5+ years commercial experience more »
Posted:

Information Security Manager

Crawley, England, United Kingdom
TalentHawk
of the ever-evolving threat landscape. Here's what you'll be doing: Develop and implement a comprehensive information security program: Think risk assessments, vulnerability management, incident response, access control, the whole enchilada. Lead and empower a team of security professionals: Guide, mentor, and inspire your team to more »
Posted:

Cyber Security Engineer (IT digital systems)

South East, United Kingdom
Hudson Shribman
Engineer role will support the systems and applications that deliver enterprise security services for a global organisation. With a focus on identity and access management, the Security Engineer will provide expert knowledge to support the planning, design, development, and deployment of centralized IAM and PAM solutions and the delivery … of the enterprise-level Privileged Access Management program. The role will also support the implementation and management of all cyber security technologies and services in use at the company Role & Accountabilities Provide expert knowledge and act as a subject matter expert on key principles of (IAM) with an … in-depth knowledge in the areas of authentication and authorization systems, identity lifecycle management, and identity governance. Build the IAM strategy, and ensure its implementation is a success across the business. Staying up-to-date on current IAM threats and industry solutions, and ensuring IAM measures are appropriate. Support more »
Employment Type: Permanent
Salary: £49000 - £61000/annum
Posted:

Cyber Security Manager

Maidstone, Kent, South East, United Kingdom
Pearson Whiffin Recruitment Ltd
organisations assets and information. Role & Responsibilities: To act as a trusted advisor on information security matters. Oversee, manage , and maintain the companys information security management system and associated security certifications ( currently ISO 27001 and Cyber Essentials Plus in the UK) Support internal business teams with client and 3rd party … business. Manage and lead on security events and incidents reported or highlighted through internal processes and controls. Organise and support internal and external audits, vulnerability management processes, penetration testing and business continuity/disaster recovery planning. Contribute towards the annual budget and forecasting process for Infosec related items. … and communicate this appropriately to your audience. The ability to embrace and encourage change and provide continual improvement. Implementation of and/or ongoing management of security policies and associated documentation. A pragmatic view of information security and its relationship with the wider business objectives. A willingness to self more »
Employment Type: Permanent
Posted:

Threat Intelligence Specialist

Reading, Berkshire, United Kingdom
ARM
of business goals in order to constructively engage senior business leaders on information security, identifying key threats and areas for improvement, driving appropriate risk management decisions and collaborating with partners to achieve positive outcomes and business benefits Ensure emerging information and cyber security threats to the business are identified … and with internal and external audit functions. Ensure timely delivery of actionable threat intelligence across the organisation, including key stakeholders; Security Operations, Incident Response, Vulnerability Management, Security Leadership, Fraud Prevention and Industry intelligence communities. Continuous Improvement through the delivery of; Provide mentoring and development of Threat Intelligence Analysts … and processes such as run books that help the team achieve outstanding results. Championing and supporting Group Security's wider BCM, Incident and Crisis Management functions. Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited more »
Employment Type: Contract
Rate: £540/day Inside IR35
Posted:

Senior Cloud Engineer Azure IaC AZ 104

Reigate, Surrey, South East
Hybrid / WFH Options
Client Server
automation, IaC and security by design. There's a broad range of responsibilities including handling requests related to system administration, operations governance, threat/vulnerability management and incident response, you'll collaborate with engineering teams to evaluate and identify optimal cloud solutions providing subject matter expertise across a … of DevOps and IaC concepts You have a good understanding of cloud based security (e.g. ISO27001, NIST, CIS, OWASP, SOC2) and Identity and Access Management (IAM) within Azure You're familiar with ARM templates and/or Pulumi You have automation and scripting (PowerShell or similar) skills You're more »
Employment Type: Permanent
Salary: £75,000 - £85,000
Posted:

Infrastructure Engineer

Worthing, Crawley, West Sussex, United Kingdom
VIQU Limited
Engineer would have strong Wintel experience and strong experience with VMWare and Active Directory. The infrastructure Engineer would have capabilities of BAU work and vulnerability and change management. This role in predominantly BAU focussed and will require someone to backup their troubleshooting techniques. Primary day to day responsibilities for … Apply online only)) Virtualisation (VMware) – configuration, migration, support Active Directory (AD) – Implement, support and configuration. Citrix XenApp and Desktop, AppSense User and Application Manager. Vulnerability management – Patching and fixing vulnerabilities on servers Powershell scripting Change management – minimizing disruptions to IT services while making changes to critical systems. more »
Employment Type: Contract
Rate: £400 - £500/day
Posted:

Senior DevSecOps Consultant

Hatfield, Hertfordshire, South East, United Kingdom
COMPUTACENTER (UK) LIMITED
and if applicable direct reports Manage and implement projects relevant to specialist area Manages, develops and coaches team of staff and implement s performance management solutions where required Develop and motivate team to help ensure the delivery of function and business targets Acting as a point of escalation on … Liaise with colleagues to ensure best practice and continual improvement in delivery of service to the business Establishes productive relationships and networks at Senior Management level to build and maintain customer relationships Responsible for managing budget/P&L to maintain spend in line with budgetary limitations Responsible for … Orchestration, CI/CD, Testing etc.) An understanding of Agile Delivery (Kanban/SCRUM/XP/Lean/SAFe) An understanding of DevOps Management (JIRA, Confluence) Awareness of CI/CD tooling such as Jenkins, GitLab or similar Experience of Hashicorp Terraform Experience of Hashicorp Vault Awareness of more »
Employment Type: Permanent
Posted:

Senior Cyber Security Engineer

Reading, Berkshire, South East, United Kingdom
Focus Resourcing Group
in Reading. For this exciting role we are seeking an engineer who has gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. They are also looking for experience working with cloud hosting providers, managing application testing and working with system owners … to recover service in complex cross-technology environments. Work to defined SLAs & KPIs. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetration testing to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security … understanding of Security Infrastructure design, IT Security best practice and hardening standards Strong understanding of common IT protocols, infrastructure and systems e.g. Networks, Domain management and virtualised infrastructure Understanding of security operations and keen to learn Strong communication skills and able to work collaboratively with IT and other stakeholders more »
Employment Type: Permanent
Posted:

Penetration Testing Manager

Crawley, West Sussex, United Kingdom
Matchtech
Key Responsibilities: Define and deliver the cyber security technical assurance strategy Manage the cyber security technical assurance team Establish and improve penetration testing and vulnerability management processes, including red team and purple team exercises Develop and implement IT disaster recovery and business continuity plans Deputise for the Head more »
Employment Type: Permanent
Salary: £65000 - £80000/annum bonus
Posted:

Penetration Testing Manager

Crawley, West Sussex, South East, United Kingdom
Hybrid / WFH Options
Matchtech
Key Responsibilities: Define and deliver the cyber security technical assurance strategy Manage the cyber security technical assurance team Establish and improve penetration testing and vulnerability management processes, including red team and purple team exercises Develop and implement IT disaster recovery and business continuity plans Deputise for the Head more »
Employment Type: Permanent, Work From Home
Salary: £65,000
Posted:
Vulnerability Management
the South East
10th Percentile
£40,450
25th Percentile
£51,250
Median
£65,000
75th Percentile
£73,750
90th Percentile
£85,000