Remote 'Vulnerability Management' Job Vacancies

51 to 75 of 119 Remote Vulnerability Management Jobs

Security Operations Specialist

London Area, United Kingdom
Hybrid/Remote Options
Cititec
SecOps Lead , you will act as the main liaison between internal security, engineering, and IT teams, and an external Managed Detection and Response (MDR) partner. You’ll oversee incident management, enhance detection and response processes, and strengthen the company’s overall security posture. Key Responsibilities Serve as the primary contact for the MDR partner, managing the relationship, conducting service … plan (IRP) and playbooks in collaboration with the MDR provider. Translate technical security risks into actionable business recommendations for stakeholders at all levels. Contribute to broader cybersecurity initiatives , including vulnerability management, cloud security, data protection, and governance, risk & compliance (GRC). Requirements In-depth understanding of the incident response lifecycle — preparation, detection, containment, eradication, recovery, and lessons learned. More ❯
Posted:

Security Operations Specialist

City of London, London, United Kingdom
Hybrid/Remote Options
Cititec
SecOps Lead , you will act as the main liaison between internal security, engineering, and IT teams, and an external Managed Detection and Response (MDR) partner. You’ll oversee incident management, enhance detection and response processes, and strengthen the company’s overall security posture. Key Responsibilities Serve as the primary contact for the MDR partner, managing the relationship, conducting service … plan (IRP) and playbooks in collaboration with the MDR provider. Translate technical security risks into actionable business recommendations for stakeholders at all levels. Contribute to broader cybersecurity initiatives , including vulnerability management, cloud security, data protection, and governance, risk & compliance (GRC). Requirements In-depth understanding of the incident response lifecycle — preparation, detection, containment, eradication, recovery, and lessons learned. More ❯
Posted:

Risk & Assurance Manager - IT & Cyber

Maidenhead, England, United Kingdom
Hybrid/Remote Options
Audit & Risk Recruitment
managing and enhancing the IT and Information Security risk landscape. Reporting directly to the Head of Risk and Assurance, you will play a key role in embedding effective risk management practices across the company's technology and cybersecurity domains. As a Risk & Assurance Manager, you'll be responsible for and have ownership for: Partnering with senior IT, Security, and … business leaders to embed risk management practices into operational processes and strategic initiatives. Owning and maintaining IT Risk and Control Matrices (RCMs) , ensuring they remain current, comprehensive, and aligned with industry standards and audit expectations. Reviewing effectiveness of first line functions in testing and validation of key IT controls (e.g., access management, change control, incident response, vulnerability management), ensuring effectiveness and consistency. Leading in the review and enhancement of IT and infosec risk and control frameworks (e.g., ISO 27001, ITIL, ISO22301, NIST), ensuring alignment with business objectives and regulatory requirements. Coordinating and representing IT risk in internal, external audits and certification processes (e.g., ISO 27001, Cyber Essentials, ISO22301, etc.), acting as the primary point of More ❯
Posted:

Penetration Tester

City of London, London, United Kingdom
Hybrid/Remote Options
Advanced Resource Managers
Exceptional written and verbal communication skills, with the ability to articulate complex technical findings and nuanced threat intelligence insights clearly and concisely to diverse audiences. Strong organizational and time management skills, with a proven ability to effectively manage and prioritize multiple concurrent engagements. Current CREST CTL certification or higher is essential. Desirable Skills: Experience with Breach Attack Simulation tools … and methodologies. Experience in Vulnerability Management processes and integrating threat intelligence. Understanding of Risk Management frameworks and how threat intelligence informs risk assessments. Hands-on experience with security reviews of AWS, Azure, and GCP environments, incorporating cloud-specific threats. Experience with ISO 27001 auditing/implementation, understanding the role of threat intelligence in compliance. Other advanced cybersecurity More ❯
Posted:

Penetration Tester

London Area, United Kingdom
Hybrid/Remote Options
Advanced Resource Managers
Exceptional written and verbal communication skills, with the ability to articulate complex technical findings and nuanced threat intelligence insights clearly and concisely to diverse audiences. Strong organizational and time management skills, with a proven ability to effectively manage and prioritize multiple concurrent engagements. Current CREST CTL certification or higher is essential. Desirable Skills: Experience with Breach Attack Simulation tools … and methodologies. Experience in Vulnerability Management processes and integrating threat intelligence. Understanding of Risk Management frameworks and how threat intelligence informs risk assessments. Hands-on experience with security reviews of AWS, Azure, and GCP environments, incorporating cloud-specific threats. Experience with ISO 27001 auditing/implementation, understanding the role of threat intelligence in compliance. Other advanced cybersecurity More ❯
Posted:

IT Security Officer

United Kingdom
Hybrid/Remote Options
Hamilton Barnes 🌳
matter expert for IT security operations, policies, and risk management. Monitor and respond to security alerts and incidents, working closely with internal SOC and Cyber teams. Conduct security reviews, vulnerability assessments, and compliance checks across infrastructure and cloud platforms. Ensure adherence to security frameworks, policies, and procedures (ISO27001, NCSC guidelines, etc.). Review and enhance access controls, identity management … detection use cases. What You Will Ideally Bring Proven experience in an IT Security Officer or similar role within a complex IT environment. Strong understanding of cybersecurity frameworks, risk management, and compliance. Knowledge of patch and vulnerability management processes. Ability to interpret security findings and translate them into actionable recommendations. Excellent communication and stakeholder management skills. More ❯
Posted:

Senior Hybrid Identity and Security Engineer

Richmond, Virginia, United States
Hybrid/Remote Options
GENWORTH
and in the future. We are seeking a highly skilled Senior Hybrid Identity and Security Engineer to join our enterprise IT team. This role combines expertise in hybrid identity management, security architecture, advanced access control within Microsoft Entra ID (formerly Azure AD), and role-based access control management in Microsoft Purview. The ideal candidate will design, implement, and … on-premises Active Directory and cloud services. The position requires collaboration with operations, governance, and compliance teams in a large enterprise setting. What you will be doing Hybrid Identity Management: Create, manage, and deploy provisioning configurations from on-premises Active Directory to Microsoft Entra ID using Cloud Provisioning and Azure AD Connect. Configure and troubleshoot pass-through authentication (PTA … password hash synchronization (PHS), seamless single sign-on (SSO), and federation settings. Monitor and resolve identity synchronization issues, including logs, while ensuring secure integration. Role-Based Access Control Management in Purview: Design, implement, and manage Role-Based Access Control (RBAC) policies within Microsoft Purview. Ensure appropriate access controls are in place for data governance, compliance, and privacy requirements. Collaborate More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

IT SECURITY SPECIALIST - SECURITY, CYBER, AZURE

Manchester, United Kingdom
Hybrid/Remote Options
Adecco
such as antivirus, content filtering, firewalls, and intrusion detection systems. *Proficiency in Microsoft Azure and associated cloud security services. *Familiarity with Windows and Linux operating systems. *Experience with log management and security monitoring platforms. *Critical thinking and problem-solving skills in complex technical environments. *Knowledge of ITIL practices and security compliance standards. *Must have access to own transport. *Willingness … Computer Science, Cybersecurity, or a related field. *Postgraduate qualification in an IT-related subject. *Professional certifications such as CISSP, CompTIA Security+, or equivalent. *Experience with governance frameworks and risk management tools. Key Responsibilities *Operate and maintain security systems including firewalls, antivirus, intrusion detection/prevention, and authentication platforms. *Monitor system logs and network traffic to identify suspicious activity and … potential threats. *Respond to security incidents and support forensic investigations. *Develop and maintain security protocols, policies, and procedures. *Conduct vulnerability assessments and recommend mitigation strategies. *Deliver cybersecurity awareness training and guidance to staff. *Maintain the information security risk register and support audit processes. *Collaborate with IT and operational teams to ensure secure system configurations. *Assist in compliance with frameworks More ❯
Employment Type: Permanent
Salary: £35000 - £45000/annum Benefits
Posted:

Information Security Manager

Theale, Berkshire, UK
Hybrid/Remote Options
Cornerstone
transformation with our people and our customers at its heart. As Cornerstone’s Information Security Manager, you will lead the development, implementation, and continuous improvement of our Information Security Management System (ISMS), ensuring alignment with ISO 27001:2022. You will be responsible for safeguarding our digital infrastructure, managing cyber risk, and embedding a security-first culture across the organisation. … we meet our obligations to customers and regulatory standards Delivery ISMS Leadership: Own and maintain the ISMS, ensuring it meets ISO 27001:2022 requirements and supports business objectives. Risk Management: Identify, evaluate, and mitigate information security risks across systems, suppliers, and processes. Maintain visibility over key cyber risks and report to senior leadership. Incident Response: Lead the response to … the project lifecycle, from initial design through to deployment and ongoing maintenance Role Expertise The successful candidate will possess substantial experience in managing and maintaining an enterprise Information Security Management System (ISMS), with a demonstrable track record of leading and supporting external ISO 27001 audits and implementing and managing robust security frameworks. They will have a comprehensive understanding of More ❯
Posted:

Information Security Manager

Theale, England, United Kingdom
Hybrid/Remote Options
Cornerstone
transformation with our people and our customers at its heart. As Cornerstone’s Information Security Manager, you will lead the development, implementation, and continuous improvement of our Information Security Management System (ISMS), ensuring alignment with ISO 27001:2022. You will be responsible for safeguarding our digital infrastructure, managing cyber risk, and embedding a security-first culture across the organisation. … we meet our obligations to customers and regulatory standards Delivery ISMS Leadership: Own and maintain the ISMS, ensuring it meets ISO 27001:2022 requirements and supports business objectives. Risk Management: Identify, evaluate, and mitigate information security risks across systems, suppliers, and processes. Maintain visibility over key cyber risks and report to senior leadership. Incident Response: Lead the response to … the project lifecycle, from initial design through to deployment and ongoing maintenance Role Expertise The successful candidate will possess substantial experience in managing and maintaining an enterprise Information Security Management System (ISMS), with a demonstrable track record of leading and supporting external ISO 27001 audits and implementing and managing robust security frameworks. They will have a comprehensive understanding of More ❯
Posted:

Cyber Defence Analyst

Farnborough, Hampshire, South East, United Kingdom
Hybrid/Remote Options
Leidos Innovations UK Limited
respond to Cyber Security Incidents Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others. Run Vulnerability Assessment tools to measure compliance with security updates and security patches. Member of a Team who are responsible for making multiple daily CSOC checks to detect and respond to … XDR and Microsoft Defender variants, and Elastic Security, or displays aptitude to learn how to work with a SIEM. Experience and knowledge of SIEM tools, Cyber Security Incident Response, Vulnerability Management and Cyber Threat Intelligence. Experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at More ❯
Employment Type: Permanent
Salary: £45,000
Posted:

Information Security Consultant

United Kingdom
Hybrid/Remote Options
People's Partnership
supporting innovation and business objectives. Conduct Security Assessments Perform comprehensive security assessments of both third-party vendors and internal applications. Oversee and evaluate security audits and penetration tests. Risk Management And Incident Response Provide consultancy on risk mitigation, incident response planning, and disaster recovery. Analyse security events, incidents, and potential threats. Policy Development And Compliance Develop security documentation in … accordance with ISO 27001, CIS Controls, and other relevant standards. Ensure ongoing compliance with industry regulations and internal governance requirements. Threat Intelligence And Vulnerability Management Stay current on new threats, vulnerabilities, and regulatory changes (e.g., GDPR, ISO 27001). Conduct threat modelling assessments for new interconnected technologies. What We’re Looking For Strong ability to identify, assess, and More ❯
Posted:

Security Network Architect - Palo Alto firewalls (Warwick / Wokingham UK

Warwick, Warwickshire, England, United Kingdom
Hybrid/Remote Options
KBC Technologies UK LTD
Years Must Have/Mandatory Skills Palo Alto Networks – Firewalls (MUST) Network Security Architecture IAM, MFA, AAA, RBAC, Privilege Access Cloud Security (OCI/Azure/AWS) SIEM/Vulnerability Management/PKI/Cryptography LAN/WAN/DMZ/Routing/Switching/Subnetting Key Responsibilities Design/Architect network security infra solutions like Firewalls, IDPS More ❯
Employment Type: Contractor
Rate: Salary negotiable
Posted:

Information Security Architect - Solutions & Enterprise Security Architecture

London Area, United Kingdom
Hybrid/Remote Options
Acumin
architectures in hybrid and cloud (AWS/Azure) environments. Strong hands-on expertise with enterprise security platforms – including Endpoint Protection, Cloud Security, Network Security, DevSecOps, SIEM/SOAR, and vulnerability management. Deep understanding of secure design principles, IAM, encryption, API security, and application security. Experience performing threat modelling, security risk assessments, and control design validation. In-depth knowledge of More ❯
Posted:

Information Security Architect - Solutions & Enterprise Security Architecture

Manchester, England, United Kingdom
Hybrid/Remote Options
Acumin
architectures in hybrid and cloud (AWS/Azure) environments. Strong hands-on expertise with enterprise security platforms – including Endpoint Protection, Cloud Security, Network Security, DevSecOps, SIEM/SOAR, and vulnerability management. Deep understanding of secure design principles, IAM, encryption, API security, and application security. Experience performing threat modelling, security risk assessments, and control design validation. In-depth knowledge of More ❯
Posted:

Information Security Architect - Solutions & Enterprise Security Architecture

City of London, London, United Kingdom
Hybrid/Remote Options
Acumin
architectures in hybrid and cloud (AWS/Azure) environments. Strong hands-on expertise with enterprise security platforms – including Endpoint Protection, Cloud Security, Network Security, DevSecOps, SIEM/SOAR, and vulnerability management. Deep understanding of secure design principles, IAM, encryption, API security, and application security. Experience performing threat modelling, security risk assessments, and control design validation. In-depth knowledge of More ❯
Posted:

Solution Consultant - Managed IT Services

London Area, United Kingdom
Hybrid/Remote Options
TECEZE
services provider that offers a broad spectrum of capabilities across digital workplace, infrastructure, cloud/datacenter, and cybersecurity, with a focus on solutioning, service delivery, and end-to-end management for small to mid-size US clients. Below is a detailed, synthesized job-description-style profile for a Solution Consultant who could lead and own the practice for such … to SMB/MSP needs. Service delivery leadership: Define and enforce service delivery frameworks, SLAs, and operational playbooks; ensure seamless transition from presales to delivery; oversee service continuity, incident management, change control, and problem management. Platform and technology scope: Digital workplace services (end-user devices, collaboration tools, unified communications, remote/mobile workforce enablement); infrastructure and network (LAN/… WAN, SD-WAN, data-center design, virtualization, storage, backup); cloud and datacenter (IaaS/PaaS, public, private, hybrid architectures; migration and modernization); cybersecurity (identity, endpoints, network, identity & access management, threat detection, incident response); application support and managed services for critical business applications. Security and compliance: Build security-by-design into solution proposals; incorporate best practices for data protection, vulnerability More ❯
Posted:

Solution Consultant - Managed IT Services

City of London, London, United Kingdom
Hybrid/Remote Options
TECEZE
services provider that offers a broad spectrum of capabilities across digital workplace, infrastructure, cloud/datacenter, and cybersecurity, with a focus on solutioning, service delivery, and end-to-end management for small to mid-size US clients. Below is a detailed, synthesized job-description-style profile for a Solution Consultant who could lead and own the practice for such … to SMB/MSP needs. Service delivery leadership: Define and enforce service delivery frameworks, SLAs, and operational playbooks; ensure seamless transition from presales to delivery; oversee service continuity, incident management, change control, and problem management. Platform and technology scope: Digital workplace services (end-user devices, collaboration tools, unified communications, remote/mobile workforce enablement); infrastructure and network (LAN/… WAN, SD-WAN, data-center design, virtualization, storage, backup); cloud and datacenter (IaaS/PaaS, public, private, hybrid architectures; migration and modernization); cybersecurity (identity, endpoints, network, identity & access management, threat detection, incident response); application support and managed services for critical business applications. Security and compliance: Build security-by-design into solution proposals; incorporate best practices for data protection, vulnerability More ❯
Posted:

Head of Infosec

England, United Kingdom
Hybrid/Remote Options
Lendable
roadmap that you will shape. What you'll be doing Application Security (AppSec) : Driving secure development practices, code analysis, and threat modelling. Security Operations (SOC) : Overseeing monitoring, incident response, vulnerability management, and operational resilience. Governance, Risk & Compliance (GRC) : Leading our efforts to achieve and maintain compliance with PCI, GDPR, SOC2, and ISO27001. Vendor Security : Spearheading due diligence and … our Vendor Governance Forum. Policies & Assurance : Defining and enforcing security standards, collaborating with IT Ops and Platform Engineering on execution, and providing assurance to stakeholders, customers, and regulators. Risk Management : Escalating material risks directly to the CTO and other risk functions. Culture & Training : Promoting a secure-by-design culture through training, awareness, and best practices across the company. What … we're looking for We're seeking an experienced security leader who is comfortable with: Building a team : You have prior management experience and a proven track record of growing a collaborative and cross-functional Security team. Scaling AppSec : You've owned and scaled a robust Application Security program, including secure development, code analysis, and threat modelling. Running Security More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Manager Contract

Reading, Berkshire, England, United Kingdom
Hybrid/Remote Options
Hays Specialist Recruitment Limited
it's a mission-critical role at the heart of our cyber security strategy. As Operational Security Manager, you'll take ownership of our security operations, overseeing threat intelligence, vulnerability management, incident response and the performance of our outsourced 24/7 SOC. You'll work closely with internal technology teams to embed security into every aspect of More ❯
Employment Type: Full-Time
Salary: £55,000 per annum
Posted:

Lead Cyber Security Engineer

London Area, United Kingdom
Hybrid/Remote Options
DVF Recruitment
days in London per week* What You’ll Do Build the SecOps team from the ground up and manage/mentor the team. Lead the implementation, optimisation, and management of cutting-edge security tools like CrowdStrike, Palo Alto, and Mimecast. Take ownership of our cyber defence posture from incident response and vulnerability management to WAFs, DDoS protection More ❯
Posted:

Lead Cyber Security Engineer

City of London, London, United Kingdom
Hybrid/Remote Options
DVF Recruitment
days in London per week* What You’ll Do Build the SecOps team from the ground up and manage/mentor the team. Lead the implementation, optimisation, and management of cutting-edge security tools like CrowdStrike, Palo Alto, and Mimecast. Take ownership of our cyber defence posture from incident response and vulnerability management to WAFs, DDoS protection More ❯
Posted:

Lead Cyber Security Engineer

London, South East, England, United Kingdom
Hybrid/Remote Options
Career Legal
days in London per week* What You’ll Do Build the SecOps team from the ground up and manage/mentor the team. Lead the implementation, optimisation, and management of cutting-edge security tools like CrowdStrike, Palo Alto, and Mimecast. Take ownership of our cyber defence posture from incident response and vulnerability management to WAFs, DDoS protection More ❯
Employment Type: Full-Time
Salary: £80,000 - £95,000 per annum
Posted:

ServiceNow SecOps Architect

London, England, United Kingdom
Hybrid/Remote Options
Focus on SAP
architecture, integrations, and platform governance while influencing strategic security decisions across the organisation. Key Responsibilities: Lead the architecture and design of ServiceNow SecOps capabilities, including: Security Incident Response (SIR) Vulnerability Response (VR) Threat Intelligence Configuration Compliance Define secure processes and automation across vulnerability management and incident response. Integrate ServiceNow SecOps with cybersecurity platforms (SIEM, SOAR, EDR, CMDB … platform adoption and maturity. Key Skills: Proven background as a ServiceNow Architect with strong delivery experience across SecOps and/or IRM. Deep understanding of security operations , incident response, vulnerability lifecycle, and tool integrations. Hands-on expertise with ServiceNow configuration, scripting, workflows, CMDB, Discovery, and integrations (REST/SOAP, MID Server) . Experience supporting organisations with critical infrastructure (energy More ❯
Posted:

Security Engineer

Poole, Dorset, England, United Kingdom
Hybrid/Remote Options
Mexa Solutions LTD
week in the office) Scope : Work across IT, application, cloud, and physical security, no siloed remits here Responsibility : Be the go-to person for penetration testing, compliance audits, and vulnerability management Environment : Modern SaaS product environment, working alongside DevOps, engineering, and IT Growth : Get stuck into a wide variety of work, with support from leadership and autonomy to … make a real impact What you’ll be doing: Leading vulnerability assessments and coordinating regular penetration testing across systems and products Owning risk remediation actions, from security audits to PCI scans and compliance reporting Working across cloud (AWS), infrastructure, and software environments to ensure security best practices are embedded throughout Supporting the secure design of products and infrastructure, providing … ideally 2-3+ years), ideally across cloud and hybrid environments Strong penetration testing experience with confidence to act on the findings A solid grasp of access controls, identity management, and cloud security (especially AWS) Familiarity with secure software development practices and working alongside dev teams Understanding of key frameworks like ISO 27001, PCI-DSS, and GDPR Bonus points More ❯
Employment Type: Full-Time
Salary: £40,000 - £50,000 per annum
Posted:
Vulnerability Management
10th Percentile
£35,650
25th Percentile
£47,500
Median
£68,500
75th Percentile
£90,000
90th Percentile
£97,500