Remote Vulnerability Management Job Vacancies

151 to 175 of 353 Remote Vulnerability Management Jobs

Security Consultant (Security Operations / SOC)

Belfast, Northern Ireland, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Swindon, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Luton, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Bolton, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Hounslow, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Senior Security Engineer

London, England, United Kingdom
Hybrid / WFH Options
S-RM
role in maintaining and evolving S-RM's information security. Key Responsibilities: Improve and implement development pipeline security features, such as SAST and DAST Manage, monitor and improve compliance, vulnerability management, threat intelligence, detection/prevention tools across a multi-cloud environment. Provide expert security design and engineering guidance on complex cloud security challenges and risks. Defining the … experience of the Software Development Life Cycle and Agile frameworks. Fostering a positive culture of security with end users, engineers, developers, product managers. Excellent communication, teamwork, presentation and stakeholder management skills. The successful candidate must have permission to work in London by the start of their employment. Our benefits We offer thoughtful, balanced rewards and support to help our More ❯
Posted:

Cyber Security Instructor

London Area, United Kingdom
Hybrid / WFH Options
FIND | Creating Futures
at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetration testing and vulnerability management Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why Join? Be at More ❯
Posted:

Cyber Security Instructor

City of London, London, United Kingdom
Hybrid / WFH Options
FIND | Creating Futures
at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetration testing and vulnerability management Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why Join? Be at More ❯
Posted:

Senior Security Operations Analyst

Manchester, England, United Kingdom
Hybrid / WFH Options
Smart DCC
share information, coordinate responses, and improve inter-team relationships. Previous experience within a Security Operations role. Exposure to key security technologies, such as IDS, Web content filters, AV, SIEM, Vulnerability Management, Firewalls, and awareness of their purpose in a layered security approach alongside analysing their outputs for security anomaly detection. In-depth understanding of the cyber threat landscape … applications such as AWS, Azure, Office 365, & Defender. Must have the ability to gain and hold HMG Security Clearance at “Security Check” (SC) level. 3 years plus security incident management experience. About the DCC: At the DCC, we believe in making Britain more connected, so we can all lead smarter, greener lives. That desire to make a difference is More ❯
Posted:

Cyber Threat Analyst – National Security West

Leeds, England, United Kingdom
Hybrid / WFH Options
BAE Systems
them, and triaging results independently. Having knowledge of attacker TTPs and APT groups, conducting in-depth research. Verifying and refining Threat Hunt queries based on results. Incident Response and Management experience. Ensuring high-quality Threat Hunt Reports and effective documentation. Providing analysis, context, and predictions in deliverables. Assessing and improving the client's threat maturity, developing and delivering improvements. … source research skills. High-level knowledge of Windows, Azure, networking, and cloud platforms. Non-Technical: Bachelor’s in Cybersecurity, Computer Science, or equivalent. Experience in SOC, Threat Intelligence, or Vulnerability Management. Strong communication skills for technical and non-technical audiences. Team player, self-motivated, and capable of mentoring. Desirable Qualifications: Degree in Cyber Security or related. SANS, CySA+, CREST More ❯
Posted:

Junior Cyber Operations Analyst with Security Clearance

Chantilly, Virginia, United States
Hybrid / WFH Options
American Systems Corporation
team. As a Junior Cyber Operations Analyst, you will gain hands-on experience across the full spectrum of enterprise Cyber Operations-including incident response, log monitoring and analysis, and vulnerability management. This position is hybrid. Responsibilities Collaborate with experienced engineers, work with cutting-edge cloud security technologies, and actively contribute to strengthening our organization's security posture. Monitor and … triage security alerts in a Security Operations Center (SOC) environment. Endpoint Detection & Response (EDR): Investigate and respond to endpoint alerts. Sandbox Detonation: Analyze suspicious files for potential malware. Vulnerability Scanning: Run scans, review results, and coordinate patching with relevant teams. Email Advanced Threat Protection: Investigate and respond to email security incidents. Information Protection: Support implementation and monitoring of data More ❯
Employment Type: Permanent
Salary: USD 65,700 Annual
Posted:

Vulnerability Analyst

London, England, United Kingdom
Hybrid / WFH Options
NCC Group
Position Title: Vulnerability Analyst Location: Manchester/London/Cheltenham/Hybrid Role Purpose: This is an exciting opportunity to join a dynamic security solutions team in which you will be responsible for the management and delivery of client security programs. As part of a passionate delivery team, you should have a strong passion for IT security and … a customer-centric approach to providing high-quality service to our clients. Solid experience of running Vulnerability Exposure Management programs is essential. Summary: This is an opportunity to work in a fun and challenging environment, using market leading security testing tools and platforms to provide security testing services to our large client base. You will play a key … department as well as assist with the development of new service lines offered by the company. Client Security Programs: Design and set up security programs tailored to client requirements. Vulnerability Scans: Conduct network and application vulnerability scans. Validation: Manually verify vulnerabilities identified in scans. Reporting: Write and deliver comprehensive client reports. Client Support: Work directly with clients on More ❯
Posted:

Service Desk Analyst

Epsom, England, United Kingdom
Hybrid / WFH Options
Toyota Financial Services, KINTO and KINTO JOIN
the necessary technology, applications, and services), Guide (assist the business through change using expertise), and Guard (protect the business). What you’ll be doing: Supporting IT Services (Incident Management/Request Fulfilment): Ensure all incidents and service requests are logged, accurately identified, categorized, prioritized, diagnosed, and managed using the Service Desk IT service management tool, with clear … closure. Maintain detailed, accurate, and consistent records of calls and keep customers informed. Collaborate with third parties and colleagues to investigate, diagnose, analyze, and resolve issues promptly, following incident management procedures. Refer unresolved requests to appropriate teams or service providers, ensuring effective communication with the customer. Escalate Major Incidents or complaints as necessary. Change Management/Problem Management/Project Management: Identify and report recurring incidents to prevent future problems. Participate in bi-weekly problem management meetings and weekly CAB meetings to represent the Service Desk, communicate changes, and obtain stakeholder approval. Utilize project management methodologies and agile practices to improve communication and planning for service developments or changes. Act as a Service Desk More ❯
Posted:

Service Desk Analyst

Epsom, England, United Kingdom
Hybrid / WFH Options
Toyota Financial Services (UK) PLC
services it needs), Guide (guiding the business through change using expertise and experience) and Guard (always protect the business). What you'll be doing: Supporting IT Services (Incident Management/Request Fulfilment): Ensure all incidents and service requests are successfully logged and accurately identified, categorised, prioritised, diagnosed and managed in the Service Desk IT service management tool … Work with third parties and colleagues to investigate, accurately diagnose, analyse & resolve issues and service interruptions and to resume normal service as soon as possible, following the approved incident management process Refer all requests that cannot be directly resolved at Service Desk level to the appropriate person, team or service provider whilst ensuring the customer is communicated to effectively … Escalate Major Incidents or complaints as appropriate Change Management/Problem Management/Project Management: Identify and report recurring incidents to BTS Service Desk Management team to prevent problems Attend bi-weekly problem management meeting where required to represent the Service Desk Attend Weekly CAB where required to present and represent Service Desk changes whilst More ❯
Posted:

IT Operational Platforms and Security Lead

London, England, United Kingdom
Hybrid / WFH Options
Pioneer Search
cloud environment. Your primary focus will involve two key projects around the generational cloud migration to Azure based services, as well as driving best practice I Identity and Access Management and defining the organisations cloud security policies. While there is some direct leadership, hands on ability to take ownership of a global infrastructure estate that spans cloud, on-prem … to move faster, smarter, and with confidence. Responsibilities: Lead the shift to a secure, cloud-first infrastructure Owning the security strategy: zero-trust, Oversee global IT operations and lifecycle management Strengthen security controls and ensure regulatory compliance Manage vendor performance and service delivery Drive continuous improvement across platforms and processes Technical Skills: Security frameworks: ISO 27001, NIST, CIS SIEM … endpoint protection, vulnerability management ITIL-based service management and automation Leadership Skills Proven ability to lead IT operations and transformation projects Strong vendor and budget management experience Resilience in high-pressure environments with a security-first mindset Excellent communication across technical and non-technical audiences Why this is a great opportunity: Lead a team through a More ❯
Posted:

Governance, Risk & Compliance (GRC) Manager

Central London, London, England, United Kingdom
Hybrid / WFH Options
GreatFind Recruitment
goals, and ensure robust governance across information security and operational practices. Key Responsibilities: Develop and implement a comprehensive GRC framework across the group Conduct regular risk assessments and support vulnerability management Maintain and evolve security controls, policies, and standards Ensure compliance with GDPR, CIS18, PCI DSS, and ISO27001 Lead on third-party audits and provide documentation and evidence … of risk awareness through training and communication Monitor changes in regulation and adapt the GRC framework accordingly Ideal Candidate Profile: Minimum 5 years' experience in GRC, compliance, or risk management Solid understanding of regulatory frameworks and industry standards Hands-on experience with risk assessments and compliance auditing Strong communication and stakeholder engagement skills Professional certifications such as CISSP, CISM More ❯
Employment Type: Full-Time
Salary: £70,000 - £75,000 per annum
Posted:

Risk & Assurance Manager - IT & Infosec

Marlow, England, United Kingdom
Hybrid / WFH Options
Softcat Plc
Softcat's business continues to grow and evolve, so have the risks and the regulatory landscape. In response, Softcat Plc has recognised the need to further strengthen its Risk Management and Internal Controls and has created a second line Risk and Assurance function to strengthen the overall three lines model and improve the way in which risks are identified … managing and enhancing the IT and Information Security risk landscape. Reporting directly to the Head of Risk and Assurance, you will play a key role in embedding effective risk management practices across Softcat's technology and cybersecurity domains. As a Risk & Assurance Manager, you'll be responsible for: Partnering with senior IT, Security, and business leaders to embed risk … management practices into operational processes and strategic initiatives. Owning and maintaining IT Risk and Control Matrices (RCMs) , ensuring they remain current, comprehensive, and aligned with industry standards and audit expectations. Reviewing effectiveness of first line functions in testing and validation of key IT controls (e.g., access management, change control, incident response, vulnerability management), ensuring effectiveness and More ❯
Posted:

VP - Cybersecurity Technical Delivery Manager

London, England, United Kingdom
Hybrid / WFH Options
MUFG Americas
rewarded. OVERVIEW OF THE DEPARTMENT/SECTION IT Risk, Security & Control department covers cyber security strategy maintenance and tactical planning and operations to provide IT Security protection, governance, risk management and reporting. This includes promoting the global Information Security Standards and Procedures (ISSP) requirements and local security requirements. The department deploys, supports and monitors security solutions such as virus … protection, vulnerability management, compliance monitoring and threat/incident management activities to reduce risk. NUMBER OF DIRECT REPORTS 1-2 MAIN PURPOSE OF THE ROLE To manage the technical delivery of various cybersecurity projects and contribute to the overall success of the Cybersecurity programme function by: Ensuring that projects are delivered according to scope, on time and … etc. Demonstrable proficiency in a wide range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as Identity and Access Management, Threat Intelligence, Risk Evaluation, Security Assessment/Testing, Incidence Management and Vendor/Cloud products assessment. Possessing high level of analytical ability where problems are typically unusual and More ❯
Posted:

SIEM Application Engineer

Birmingham, Staffordshire, United Kingdom
Hybrid / WFH Options
BT Group
with expertise in Elasticsearch to join our dynamic team. As a SIEM engineer, you will play a critical role in designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threat detection, incident response, and overall security posture. This role is hybrid (3 days in … Logstash: Design, develop, and maintain data pipelines using Logstash, part of the Elastic Stack. Automate data ingestion, transformation, and loading tasks. Beats for Data Collection: Agent and Agent Policy Management: Proficiency in configuring and managing agents, including setting up agent policies for various operation systems. Ensure seamless data flow from endpoints to the Elastic Stack. Data Cleaning and Enrichment … Collaborate with data analysts to create meaningful search experiences. Database Architecture and Scaling with Elasticsearch: Optimize data storage and retrieval mechanisms within Elasticsearch clusters. Implement sharding, replication, and index management strategies. End-to-End Solution Delivery: Expertise in taking ownership of a requirement from start to finish, including gathering detailed requirements, designing, and implementing robust, innovative solutions. Experience Required More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Head of Cyber Security - Remote

Bristol, England, United Kingdom
Hybrid / WFH Options
Nigel Frank
candidates across the UK, with travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerability management and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security assessments and maintain compliance. Requirements More ❯
Posted:

Information Security Analyst

Edinburgh, Scotland, United Kingdom
Hybrid / WFH Options
Head Resourcing Ltd
months, Inside IR35 £400-£450 per day Edinburgh Financial Services A small Edinburgh Financial Services organisation is currently seeking an experienced Information Security Analyst with a strong background in vulnerability management , to join their team on an initial 6 month Contract & working from their office based in Edinburgh (hybrid). The Contract will involve assessing vulnerability reports … and collaborating with cross-functional teams to ensure timely mitigation & to be successful, key knowledge & experience should include: Recent experience working as an Information Security Analyst, Security Engineer or Vulnerability Analyst with strong experience with complex information security projects . In-depth knowledge & expertise of Information Security standards, technologies & methodologies etc (e.g., ISO27001 ). Strong grasp of security best … practices , risk management , and compliance . Particular focus on Vulnerability Management utilising SAST/DAST tools , especially Tenable . Familiarity with Azure DevOps for tracking work items. Ability to work independently and in agile teams. Excellent communication and stakeholder management skills are a must as always. Any formal certifications like CISA, CISM , or ISO27001 Lead Implementer More ❯
Posted:

Senior Security Penetration Tester

Reading, England, United Kingdom
Hybrid / WFH Options
THAMES WATER UTILITIES LIMITED
As a Senior Security Penetration Tester , you will be responsible for supporting the design, implementation, and maintenance of TVM (Threat & Vulnerability Management) solutions, controls and processes across the organisation. You will be liaising with Digital teams to ensure appropriate mitigation and remediation of vulnerabilities detected across our IT estate. This role requires an understanding of TVM concepts, technologies … Tester Help support and develop an internal penetration testing function. Conduct network, application penetration testing, code and security reviews. Identify and exploit vulnerabilities through proof-of-concept testing. Support vulnerability management across the enterprise, ensuring that a framework for identification, categorisation and mitigation exists and is implemented and maintained. Responsible for supporting the creation of the operating model … for vulnerability management, that it is shared, agreed and operates effectively across the business. Develop and maintain penetration testing documentation, policies, and procedures. Integrate cybersecurity solutions (e.g. vulnerability scanning tools) with existing systems, applications, and infrastructure. Evaluate and recommend technologies, tools, and vendors to meet business needs. Investigate newly identified cybersecurity vulnerabilities and provide appropriate mitigation actions. More ❯
Posted:

IT Security & Compliance Manager

Leatherhead, England, United Kingdom
Hybrid / WFH Options
Hyundai Motor UK
adherence to policies, processes and standards related to organisational and technical security. Being a SPOC for all aspects of cybersecurity within HMUK and leading incidents resolution. Risk Assessment and Management - Assess and identify potential security threats, vulnerabilities and developing strategies to mitigate these risks. Establish a vulnerability management process aligned with headquarters guidelines. Policy Development and Enforcement … have access to HMUK data/systems and any other activities that will require security measures review and approval Be a key member of Data Breach Task force , Disaster management team , Business continuity team etc to manage and resolve all issues related to cybersecurity aspects of the incident. Maintain an up-to-date understanding of regulatory requirements, industry changes … and standards related to organisational and technical security. Being a SPOC for all aspects of cybersecurity within HMUK and leading incidents resolution. We Want You To: Risk Assessment and Management - Assess and identify potential security threats, vulnerabilities and developing strategies to mitigate these risks. Establish a vulnerability management process aligned with headquarters guidelines. Policy Development and Enforcement More ❯
Posted:

Principal Cyber Security Consultant - Hybrid

London, England, United Kingdom
Hybrid / WFH Options
ZipRecruiter
Security Consultant is a senior leader specialising in designing, implementing and managing advanced security solutions. With expertise in SOC engineering tools and one of either Cloud Security, and Access Management (IAM) or Threat Modelling, this role focuses on enhancing the security posture of organisations. The consultant will lead strategic security initiatives, collaborate with clients or stakeholders to solve complex … feeds. Skills Extensive experience in Cyber Security, with a significant portion in a leadership role. A background in SOC engineering tools combined with expertise in either cloud security, & Access Management or threat modelling. Proficiency in cloud platforms and services (AWS, Azure, GCP) with deep knowledge of security tools. Hands-on experience designing and implementing SIEM solutions in enterprise environments. … Skilled in scripting and automation (e.g., Python, PowerShell) for security processes. Familiarity with tools for threat modelling, vulnerability management, and incident response. SIEM-specific certifications like Splunk Certified Architect, Sentinel Expert, or equivalent. IAM certifications (e.g., Okta Certified Consultant, SailPoint IdentityNow, or CyberArk Defender) are highly desirable. #J-18808-Ljbffr More ❯
Posted:

Global IT Infrastructure Manager

London, England, United Kingdom
Hybrid / WFH Options
ITRS Group
for the departments and liaising with all staff and clients to implement appropriate IT infrastructure balanced against regulation requirements, risks, and cost. As part of the IT global senior management team, you will lead a global team of Infrastructure Technicians, ensuring that efficient and high-quality IT services and projects are delivered to support the continued growth of our … you’ll ensure they are available and fit for purpose to meet our needs as we scale our business. As a Global IT Infrastructure Manager, you will: Provide line management for the Global infrastructure staff. Lead the strategy, scalability, innovation, and best practices for local and global infrastructure solutions with service improvement reviews and guide improving and tuning infrastructure … services delivered. Directly contribute to ITRS Group’s goal for achieving and maintaining ISO 27001 accreditation across the group. Be responsible for Problem management and helping in finding solutions. Integrate future acquisitions into the existing ITRS Group Infrastructure, systems, and processes Identity and Access Management (IAM) for infrastructure. Monitor and Event management for infrastructure Ensure the compliance More ❯
Posted:
Vulnerability Management
10th Percentile
£40,000
25th Percentile
£50,000
Median
£60,000
75th Percentile
£78,750
90th Percentile
£92,500