Primary Details Time Type: Full time Worker Type: Employee VulnerabilityManagement Data Analyst Permanent London/Hybrid At QBE, our purpose is to enable a more resilient future. We are an international insurer and reinsurer with a local presence in 27 countries. The Opportunity As part of our continuous improvement and expansion of the vulnerabilitymanagement function, we are seeking a highly motivated VulnerabilityManagement Data Analyst to join our Global Security Operations Centre. This permanent, hybrid role is based out of our London office and reports to the Threat & Vulnerability Manager. The successful candidate will play a key role in strengthening QBE’s cyber resilience by turning complex security data into … meaningful insights. This role will directly support the identification, prioritisation, remediation and reporting of vulnerabilities—helping QBE stay ahead of emerging threats. Your New Role As a VulnerabilityManagement Data Analyst, you’ll collaborate with teams across security engineering, vulnerabilitymanagement, service management, cyber governance, risk and divisional consultancy to ensure data accuracy, develop dashboards More ❯
VULNERABILITYMANAGEMENT ANALYST Up to £70,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a major driving forces … behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a VulnerabilityManagement Analyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's VulnerabilityManagement Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes & Schedules related to … Vulnerability Scanning of All Endpoints of the business. As a VulnerabilityManagement Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of VulnerabilityManagement Analyst role would include: Conducting VulnerabilityMore ❯
East London, London, United Kingdom Hybrid / WFH Options
Client Server
VulnerabilityManagement Engineer London/WFH to £75k Are you a tech savvy VulnerabilityManagement Engineer with a broad range of security knowledge? You could be progressing your career at a global, hugely profitable, Investment Management firm. As a VulnerabilityManagement Engineer you'll perform assessments and communicate findings to stakeholders on the … day a week. About you: You have experience in a similar position with knowledge of common cyber attack types such as DDoS, SQLi, XSS, etc. You have experience with vulnerability assessment software and prioritisation of results using a combination of various frameworks tied to internal objects (CVE, CVSS, EPSS, etc.). You have experience of assessing, documenting and communicating … AWS You have a background with network security or secure code development You're collaborative and pragmatic with great communication skills What's in it for you: As a VulnerabilityManagement Engineer you can expect to earn a competitive package: Salary to £75k Significant bonus Pension (15% employer contribution) Private Health, Dental and Optical care Life Assurance and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
VulnerabilityManagement Engineer London/WFH to £75k Are you a tech savvy VulnerabilityManagement Engineer with a broad range of security knowledge? You could be progressing your career at a global, hugely profitable, Investment Management firm. As a VulnerabilityManagement Engineer you'll perform assessments and communicate findings to stakeholders on the … day a week. About you: You have experience in a similar position with knowledge of common cyber attack types such as DDoS, SQLi, XSS, etc. You have experience with vulnerability assessment software and prioritisation of results using a combination of various frameworks tied to internal objects (CVE, CVSS, EPSS, etc.). You have experience of assessing, documenting and communicating … AWS You have a background with network security or secure code development You're collaborative and pragmatic with great communication skills What's in it for you: As a VulnerabilityManagement Engineer you can expect to earn a competitive package: Salary to £75k Significant bonus Pension (15% employer contribution) Private Health, Dental and Optical care Life Assurance and More ❯
Manassas, Virginia, United States Hybrid / WFH Options
Innova
A client of Innova Solutions is immediately hiring for a VulnerabilityManagement Position type: Contract Duration: 12 months Location: Manassas, VA Hybrid As VulnerabilityManagement you will be Defining and implementing vulnerabilitymanagement and patching policies for on-premises infrastructure utilizing ServiceNow Vulnerability Response Module. Job description Vulnerability identification, analysis, and impact … assessment considering base and environmental factors. Perform severity assessments of software vulnerabilities for vulnerability prioritization and remediation. Engage and work directly with partner teams for onboarding to ServiceNow, provide support, and troubleshoot issues. Analyze existing architecture and recommend policies and procedures for improvement. Identify solutions to improve security automation and integration and coordinate the effort to implement those solutions. … Query, analyze, and report on large datasets for potential risks. Ideal Candidate will have: Enterprise VulnerabilityManagement, ServiceNow CMDB, ServiceNow Vulnerability Response, GRC, Vulnerability Analysis, Vulnerability Scanning Data Analysis, Exception Handling, Impact Assessment, Remediation Prioritization and Tracking and Threat Management Qualified candidates should APPLY NOW for immediate consideration! Please hit APPLY to provide the More ❯
STIG Compliance/VulnerabilityManagement SME Boulder, CO or Fairmont, WV 5 days a week in Office with the possibility of 2 days remote Top Secret As the STIG Compliance/VulnerabilityManagement SME, you will work either independently or as part of a team to achieve critical mission objectives, ensuring smooth operations for the customer. … What Will You Do: • Evaluate security risks on systems • Evaluate STIG compliance • Execute and manage the NCSC VulnerabilityManagement Plan • Create and maintain compliance scan policies • Maintain a master asset list • Troubleshoot scan issues and coordinate with appropriate team members. • Continuously research emerging threats to the environment in order to disseminate the information to all stakeholders, immediately assess … the known environment for presence of the vulnerability, and work with the SOC and SE&O to protect the environment. • Ensure system compliance against federal and DOC policies • Identify & document all non-compliant areas • Support Assessment and Authorization activities • Conduct, operate, and maintain vulnerability/compliance assessments and the resulting data and reports • Author and maintain SOPs and More ❯
System Administrator GES is seeking a skilled Systems Administrator to join the I3TS team supporting DTRA. The I3TS program provides enterprise-wide IT support to enable DTRA's Information Management & Technology Directorate (ITD) to consolidate, modernize, and continuously innovate the delivery of IT services and mission capabilities to DTRA's internal and external mission partners operating in CONUS and … OCONUS locations. The candidate will be responsible for ensuring the security and integrity of IT systems by applying Security Technical Implementation Guides (STIGs), managing system patches, and overseeing vulnerabilitymanagement processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate will be responsible for identifying points … of vulnerability, non-compliance with established Information Assurance (IA) guidelines and regulations and recommend mitigation strategies, along with assisting users as needed in a classified computing environment. The selected candidate must be able to work independently as well as with a team of IT analysts, administrators, and engineers. The position requires excellent communications skills, both verbal and written. The More ❯
technologies. Turnkey is headquartered in London with offices across Asia, Australia, Europe, and North America. Role Overview We are seeking an experienced individual with a strong foundation in SAP VulnerabilityManagement and Threat Detection systems, including associated controls, proficiency in SAP environments, and awareness of Cybersecurity frameworks. Responsibilities Design, implement, and assess vulnerabilitymanagement frameworks, primarily … within SAP-enabled environments. Lead client conversations on SAP Vulnerability and Threat Management strategy, compliance challenges, and controls optimisation. Provide insight on Information Security frameworks (OWASP/NIST/NIS2 etc.) and the Secure Operations Map, helping communicate regulatory or good practice obligations and actionable solutions. Manage and mentor junior consultants and analysts to aid a high-performance … Strong experience designing and executing detection and protective controls, ideally within SAP ERP systems. Experience in one of Onapsis, Security Bridge, SAP ETD, Pathlock CAC. Strong experience of implementing vulnerabilitymanagement controls (implementation and testing). Knowledge of relevant industry frameworks and vendor solutions aligned to provide such control solutions. Demonstrated ability to lead engagements and communicate effectively More ❯
Rogerstone, Gwent, United Kingdom Hybrid / WFH Options
Hays Technology
numerous people into careers there, with strong feedback. Your new role This is an interesting opportunity to help define and deliver a strategy which will enhance the organisation's vulnerabilitymanagement and improve the recording and identification of the vulnerabilities, at a good time when the company are expanding and investing in their IT and cyber security estate. … completeness of the register, including the correct classification of systems, key technical attributes, asset purpose, criticality, business and system owners and relationships with other assets. Define and implement the vulnerability identification, prioritisation and management processes required to ensure the business has an accurate view of the vulnerabilities in its asset estate and follows an agreed methodology for prioritising … with colleagues performing related penetration testing and risk assessment activities, providing accurate and timely technical information regarding assets and the status of vulnerabilities. Prepare and deliver regular, high-quality management reporting regarding the asset estate and its security posture. Stay informed about emerging cyber threats and vulnerabilities. What you'll need to succeed Experience in a similar role, ideally More ❯
Newport, Gwent, United Kingdom Hybrid / WFH Options
Hays Technology
numerous people into careers there, with strong feedback. Your new role This is an interesting opportunity to help define and deliver a strategy which will enhance the organisation's vulnerabilitymanagement and improve the recording and identification of the vulnerabilities, at a good time when the company are expanding and investing in their IT and cyber security estate. … completeness of the register, including the correct classification of systems, key technical attributes, asset purpose, criticality, business and system owners and relationships with other assets. Define and implement the vulnerability identification, prioritisation and management processes required to ensure the business has an accurate view of the vulnerabilities in its asset estate and follows an agreed methodology for prioritising … with colleagues performing related penetration testing and risk assessment activities, providing accurate and timely technical information regarding assets and the status of vulnerabilities. Prepare and deliver regular, high-quality management reporting regarding the asset estate and its security posture. Stay informed about emerging cyber threats and vulnerabilities. What you'll need to succeed Experience in a similar role, ideally More ❯
Coedkernew, Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Sopra Steria
Are you passionate about protecting critical infrastructure and driving proactive security? We’re looking for an individual who’s ready to take ownership of our vulnerabilitymanagement ecosystem and lead the charge in deploying and optimizing Tenable Nessus and Tenable SC platforms. This is more than a technical role, it’s a mission-critical opportunity to shape how … and want to make a real impact, this is your chance to be at the forefront of enterprise security. What you will be doing: Lead deployment, configuration, and lifecycle management of Tenable Nessus and Tenable.SC across varied environments. Design and execute vulnerability scanning strategies aligned with business priorities and risk appetite. Validate results, investigate anomalies, and coordinate remediation … with infra, network, hosting, and app teams. Maintain gold-standard documentation (guides, SOPs, user manuals). Build tailored dashboards and reports to drive visibility and informed decision-making. Embed vulnerabilitymanagement into IT, security, and compliance workflows and planning. Provide training and mentorship to foster security awareness and technical excellence. Ensure practices meet Cyber Essentials Plus and ISO More ❯
Squadron (26NOS) is searching for qualified candidates for a position of Junior or Mid-Level ACAS Systems Operator I or II (depends upon experience). Seeking an individual for vulnerability assessment analysis and administration role with cybersecurity oriented principles to protect and defend information systems and networks. If you are seeking a challenging place to work, please review the … the qualifications, a candidate may still be considered depending on your level of experience. Duties & Responsibilities: • Operates the security and compliance baseline configuration, inventory, and best practices for the vulnerabilitymanagement solution (VMS) deployed across multiple unclassified and classified network locations supporting the implementation for Tenable products within Assured Compliance Assessment Solution (ACAS) including .SC (SecurityCenter ) and Nessus … configurations, enterprise or local policy • Ability to assess the level of risk, develop or recommend meaningful insights about the context of an organization threat environment to improve its risk management posture; measure effectiveness of systems/networks/endpoints that deviate from acceptable configurations, enclave or local policy • Work in concert with other Tenable operators, integrator and IA personnel More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Bright Purple Resourcing
assurance Electric Vehicle Scheme About the Role This is an exciting opportunity for a security professional who wants to make a real impact by leading and maturing an organisations vulnerabilitymanagement programme. You will: Own and optimise the vulnerabilitymanagement lifecycle using Tenable.io, Tenable.sc, and Nessus Perform and analyse vulnerability scans across on-premise, cloud … bring the expertise and confidence to influence both technical and strategic decisions. We are looking for someone with: At least 5 years experience in cybersecurity, with a focus on vulnerabilitymanagement and threat analysis Proven hands-on experience with Tenable.io, Tenable.sc, and Nessus Strong understanding of operating systems, networking, cloud platforms and containers The ability to interpret CVEs More ❯
will act as a critical liaison between client stakeholders and internal operational teams, ensuring the delivery of world-class cyber security services. You'll drive incident response coordination, lead vulnerabilitymanagement efforts, and ensure service excellence through strategic oversight and hands-on technical engagement. What You'll Be Doing Serve as the key point of contact and escalation … improvement initiatives. Support compliance with SLAs and ensure services meet contractual, operational, and quality standards. Lead service reviews and present performance reports to clients (weekly/monthly). Oversee vulnerabilitymanagement efforts including scanning, prioritisation, risk communication, and remediation coordination. Ensure IDS/IPS systems are maintained and aligned with the latest threat intelligence. Work closely with the … Manager to identify process improvements and implement best practices. What You'll Bring 10+ years of experience in technical support for SOC or Cyber Security operations. 5+ years of vulnerabilitymanagement experience, with demonstrable risk-based prioritisation skills. Proven leadership in high-pressure, crisis-response situations. Strong client relationship management and stakeholder engagement skills. In-depth understanding More ❯
s ready to move into a Head of role, take ownership, and shape strategy while staying close to the tech. What you'll be doing: Owning implementation, consolidation, and vulnerabilitymanagement across the group Leading a team (3 direct reports by year-end) — mentoring, developing, and embedding best practice Overseeing infrastructure, EUC, platform, cloud, and building security Partnering … with stakeholders across multiple business units to understand systems and improve visibility Driving improvements in security tooling, processes, and response Vulnerabilitymanagement tools (e.g. Rapid7, Microsoft Defender suite) Core enterprise security toolsets Networking, cloud infrastructure, and EUC environments You'll have: Experience as a team lead or manager (formal or informal) with direct reports or leadership responsibility Strong … grounding in infrastructure and security — ideally having moved from networking/cloud into security Hands-on experience with vulnerabilitymanagement tools and security platforms Why join? Progression: Step into a Head of role with mentoring from an experienced Group Infrastructure Director Influence: Work at a group level across multiple industries More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Circle Group
Newcastle *Be the M365 Subject Matter Expert* IT Deployment Engineer/IT Infrastructure Engineer, providing 3rd line IT/M365 Application support with excellent M365, InTune, Azure, Modern Device Management & IT Security experience is required by a leading company in central Newcastle You will be the subject matter expert for Microsoft and M365, working on a range of 3rd … Active Directory, firewall, VPN, iOS, and networking protocols (TCP/IP, DNS, DHCP, SMTP). - Strong client-service approach with excellent communication and teamwork skills. - Strong IT Security, Endpoint management and Vulnerabilitymanagement experience - PowerShell Scripting experience within Microsoft Applications - Ability to prioritise, manage workload, and multitask effectively. Role Responsibilities: - 3rd line support and implement Intune, M365 … maintenance). - Assist in managing Microsoft Exchange, Mimecast security, Teams, and Autopilot. - Develop onboarding processes and provide feedback for service improvements. - Define the company's IT Security policies, including vulnerabilitymanagement - Admin of Endpoint management tools - Stay updated on Microsoft 365 tools and roadmap. - Conduct monitoring and analysis, including storage and usage reports. - Own problem managementMore ❯
of an IS. Maintain responsibility for the day-to-day security operations of the system. Responsibilities may also include: o Security Control Validation Visits o Secure Configuration and Change management o Event Management o Account Management o VulnerabilityManagement o Security Incident Management o POA&M Management o Reauthorization o Decommissioning o Collaborate … Owner to maintain Approval to Operate (ATO), including the resolution of any Plans of Action & Milestones (POA&M) documents issued by the DAO. o Maintain and validate account and vulnerability management. o Develop and provide updated System Security Plans (SSPs) and supporting documentation (e.g. SECONOPs, diagrams, Privileged User's Guide). • Respond to any data calls. • Provide security design … guidance and analysis to the project team throughout the Risk Management Framework (RMF) process. o Collaborate with the Information System Security Engineer (ISSE) in the design, build, and self-test of systems. o Perform reviews of technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and More ❯
Job Description - External Attack Surface Management Analyst () External Attack Surface Management Analyst - Job title: External Attack Surface Management Analyst Location: Preston or Frimley. We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular role. Salary: Circa 45k dependant on skills and experience What you'll be … doing: Supporting the Senior Attack Surface Management Analyst in maintaining the Global Attack Surface Management service to ensure BAE Systems perimeter assets are known and tested, and Shadow-IT assets are discovered and brought into governance Identifying and prioritising vulnerabilities across BAE Systems managed external assets as part of ongoing external attack surface management, coordinating remediation with … resolver teams Reviewing and validating vulnerabilities detected by SaaS-based scanning tools, confirming exploitability and severity to inform accurate remediation Supporting vulnerabilitymanagement across cloud and SaaS environments, identifying risks and coordinating remediation to safeguard externally hosted services Proactively detects external-facing security gaps and misconfigurations, ensuring timely escalation to relevant resolver teams for remediation Your skills and More ❯
for the MSP's own security posture ensuring tools, processes, and teams meet the same standards we deliver to clients. They monitor measurable posture metrics (e.g., Microsoft Secure Score, Vulnerability etc.), ensure continuous improvement, and keep the MSP's security practice relevant through ongoing training, certifications, and emerging threat awareness. While day-to-day execution is delegated to Security … the Security Lead owns security end-to-end: identifying risks, embedding controls, and ensuring compliance is demonstrable. Key Responsibilities Client-Facing Lead Quarterly Security Reviews (QSRs), presenting patch/vulnerability posture, incidents, compliance status, and risk register updates. Translate technical security risks into clear business impact and outcomes. Own the client exception process, ensuring risks are documented, communicated, and … escalation point for clients when risks require senior involvement. Internal MSP Security Own the MSP's internal security frameworks and certifications (e.g., CE+, ISO, SOC 2). Oversee patching, vulnerability, and risk management of MSP-owned infrastructure and tools. Ensure MSP's technology stack (RMM, XDR, PSA, backup, etc.) is securely deployed and monitored. Drive staff security awareness More ❯
Role: VulnerabilityManagement Job Type: Contract Day Rate: £300 - £330 per day (inside IR35) Duration: 4 Months Work Location: Milton Keynes, United Kingdom [thrice in a week at client office] - Mandatory Start date : ASAP Note: Candidate should be immediately available Understand and analyse vulnerability data before they becomes overdue Organize and create work packages for teams for … resolution Ensure fixes begin within SLA to prevent delays Help prioritize overdue and upcoming vulnerabilities effectively. Collaborate across teams to streamline technical remediation efforts." Understanding of vulnerability assessment and remediation processes Ability to triage and create meaningful work packages for remediation of vulnerabilities. Good coordination skills to facilitate work packages. Effective ability for cross-team collaboration. Planning and ManagementMore ❯
Role: VulnerabilityManagement Job Type: Contract Day Rate: 300 - 330 per day (inside IR35) Duration: 4 Months Work Location: Milton Keynes, United Kingdom thrice in a week at client office - Mandatory Start date : ASAP Note: Candidate should be immediately available Understand and analyse vulnerability data before they becomes overdue Organize and create work packages for teams for … resolution Ensure fixes begin within SLA to prevent delays Help prioritize overdue and upcoming vulnerabilities effectively. Collaborate across teams to streamline technical remediation efforts." Understanding of vulnerability assessment and remediation processes Ability to triage and create meaningful work packages for remediation of vulnerabilities. Good coordination skills to facilitate work packages. Effective ability for cross-team collaboration. Planning and ManagementMore ❯
unique experience in an inclusive environment that helps them thrive. The role: .The role will develop, implement, and manage the Operational Resilience Framework within the region through the direct management of capabilities, as well as through coordination and partnership with other functions within the firm. Responsibilities: Strategy and Policy: Develop and lead the Operational Resilience Strategy and Policy, ensuring … alignment with the broader risk management and business continuity objectives. Framework and Documentation: Design, develop, and embed an Operational Resilience framework across EMEA, ensuring it aligns with the strategic objectives and regulatory requirements and design and implementation of underlying methodologies and processes including CIF/IBS identification and scenario testing Regulatory and Industry: Stay abreast of current and emerging … internal/external incidents and industry best practices related to operational resilience to continuously improve bank's ability to manage resilience risk and ensure inline with regulatory expectations. Operational Management: Build an engaged and motivated centralised EMEA regional operational resilience and testing function, with a clear vision, goals and objectives, as well as management of staff-related matters. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Pontoon
unique experience in an inclusive environment that helps them thrive. The role: .The role will develop, implement, and manage the Operational Resilience Framework within the region through the direct management of capabilities, as well as through coordination and partnership with other functions within the firm. Responsibilities: Strategy and Policy: Develop and lead the Operational Resilience Strategy and Policy, ensuring … alignment with the broader risk management and business continuity objectives. Framework and Documentation: Design, develop, and embed an Operational Resilience framework across EMEA, ensuring it aligns with the strategic objectives and regulatory requirements and design and implementation of underlying methodologies and processes including CIF/IBS identification and scenario testing Regulatory and Industry: Stay abreast of current and emerging … internal/external incidents and industry best practices related to operational resilience to continuously improve bank's ability to manage resilience risk and ensure inline with regulatory expectations. Operational Management: Build an engaged and motivated centralised EMEA regional operational resilience and testing function, with a clear vision, goals and objectives, as well as management of staff-related matters. More ❯
SOC and Vulnerability Analyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload, but … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and Vulnerability Analyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality and More ❯
Hybrid) US Citizen or Green Card - Education: Bachelor's degree in Cybersecurity, Information Technology, or a related field (Master's preferred). - Experience: 4+ years in cybersecurity, focusing on vulnerabilitymanagement, patch management, and threat detection in federal systems. - Technical Expertise: Expert knowledge of tools like Tenable Security Center, BigFix, JAMF, and Splunk for real-time monitoring … and compliance management. Familiar with DoD RMF and FISMA cybersecurity standards. - Leadership: Proven ability to lead vulnerabilitymanagement teams, implement security controls, and develop incident response strategies. Experience conducting security assessments and ensuring compliance with federal cybersecurity regulations. More ❯