Vulnerability Management Job Vacancies

101 to 125 of 466 Vulnerability Management Jobs

THreat Intelligence Lead

Stoke-on-trent, Staffordshire, United Kingdom
Anson Mccade
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerability management programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerability management experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cybersecurity ISSO / SOC Analyst with Security Clearance

San Miguel, California, United States
OASYS, INC
at Camp Roberts in San Miguel, California. Job Responsibilities include: Supports our Army customer by providing a critical cybersecurity role by ensuring continuous monitoring in accordance with DoD Risk Management Framework (RMF), and through system monitoring and analysis support for the detection of cyber incidents and provides recommendations on how to correct findings. This role combines the duties of … Assessment Reports (SARs), Risk Assessment Reports (RARs), and Plan of Action and Milestones (POA&Ms). Conduct security control assessments and facilitate ongoing authorization (ATO/ATC) activities. Lead vulnerability and compliance assessments using automated tools (e.g., ACAS, STIG Viewer) and ensure all findings are remediated or tracked via POA&Ms. Monitoring security logs, analyzing and reporting cyber incidents … experience. Security+, or other DoD 8570/8140 IAT Level II certification. Ability to work on-site daily. eMASS experience. Experience or familiarity with the ATO process. Familiarity with vulnerability management tools such as ACAS, STIG Viewer, and SCAP Compliance Checker. Familiarity with (DRAGOS, Corelight, Splunk, Snort). Proficiency in analyzing security events, logs, and alerts from various More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Analyst with Security Clearance

Portsmouth, Virginia, United States
Verigent, LLC
on experience) Summary: Verigent's client is seeking a Cybersecurity Analyst with an active Secret clearance to support critical cybersecurity operations in Portsmouth, VA. This position requires expertise in vulnerability management, incident response, risk analysis, and compliance with DoD and DON cybersecurity standards. The analyst will be responsible for monitoring, analyzing, and mitigating cyber risks, supporting contingency planning … and maintaining day-to-day VRAM (Vulnerability Remediation Asset Management) activities. The role also involves working with key security tools such as ACAS, HBSS, MDE, MDI, and Splunk, while ensuring compliance with federal, DoD, and Navy cybersecurity policies and directives. The ideal candidate will hold a bachelor's degree in IT or a related field (or equivalent DoD … 8570.01M certification such as Security+ or higher), and have at least four years of cybersecurity experience in system/network vulnerability analysis, risk mitigation, and security test & evaluation. Strong knowledge of INFOSEC concepts, firewall policy, ports & protocols, and Navy-specific security requirements (e.g., OPNAVINST N9210.3) is essential. Responsibilities: • Perform cybersecurity analysis in support of incident response, threat detection, and More ❯
Employment Type: Permanent
Salary: USD 115,000 Annual
Posted:

Azure Cloud Security Engineer

Nationwide, United Kingdom
Hybrid / WFH Options
CPS Group (UK) Limited
Role: Azure Cloud Security Engineer Specialism(s): Azure Cloud Security, Defender, Azure Security Administration, Security Alert Monitoring, ISO27001, CAF, Cyber Essentials, Cloud Network Security, Network Segmentation, Cisco, AZ-500, Vulnerability Management Type: Contract, Daily Rate Location: Remote (UK Only) Pay Rate: £500 - £625 per day IR35 Determination: Inside IR35 Start: ASAP/Urgent Duration: 3-6 Months (extension … on experience with Azure administration and governance * Deep knowledge of Microsoft Defender for Cloud and Cloud Security remediation * Experience of designing and implementing network segmentation and segregation * Knowledge of vulnerability management and threat intelligence tooling * Practical experience and understanding of cyber security frameworks (NCSC CAF, Cyber Essentials, ISO27001) * Excellent cloud and on-premise troubleshooting environments * Relevant Azure security More ❯
Employment Type: Contract
Rate: £550 - £615/day
Posted:

Senior Cyber Security Analyst (Network Project)

Southampton, Hampshire, United Kingdom
University of South Hampton
to protect against evolving threats. What you'll do As part of a team of analysts, you'll be responsible for the overall day-to-day technical and operational management of cyber and information security within the University. This includes operating within a hybrid Security Operations Centre (SOC) model, leading the investigation and resolution of cyber security incidents, and … continuous monitoring across the University. Conduct proactive threat hunting activities to detect advanced threats and anomalous behaviour within the University's network, and provide solutions to support incident response, vulnerability management, and strategic security decisions. Collaborate with third-party providers to scope, coordinate, and review network security assessments, and ensure that findings and recommendations are effectively prioritised, communicated … documented and implemented to improve the University's security posture. Support the network vulnerability management process by identifying, assessing, and prioritising security vulnerabilities, and working with relevant teams and third parties to ensure timely remediation through patching, configuration changes, or other appropriate fixes. Design, implement, and support technical security controls to defend University network systems against security threats More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cyber Security Analyst (Network Project)

Southampton, Hampshire, South East, United Kingdom
University of Southampton
Cisco technologies, to protect against evolving threats. What youll do - As part of a team of analysts, youll be responsible for the overall day-to-day technical and operational management of cyber and information security within the University. This includes operating within a hybrid Security Operations Centre (SOC) model, leading the investigation and resolution of cybersecurity incidents, and co … continuous monitoring across the University. - Conduct proactive threat hunting activities to detect advanced threats and anomalous behaviour within the University's network, and provide solutions to support incident response, vulnerability management, and strategic security decisions. - Collaborate with third-party providers to scope, co-ordinate, and review network security assessments, and ensure that findings and recommendations are effectively prioritised … communicated, documented and implemented to improve the Universitys security posture. - Support the network vulnerability management process by identifying, assessing, and prioritising security vulnerabilities, and working with relevant teams and third parties to ensure timely remediation through patching, configuration changes, or other appropriate fixes. - Design, implement, and support technical security controls to defend University network systems against security threats More ❯
Employment Type: Contract
Rate: £55,000
Posted:

ISSO with Security Clearance

San Antonio, Texas, United States
OASYS, INC
our Army customer in San Antonio, Texas Job Responsibilities include: Supports our Army customer by providing a critical cybersecurity role by ensuring continuous monitoring in accordance with DoD Risk Management Framework (RMF), and through system monitoring and analysis support for the detection of cyber incidents and provides recommendations on how to correct findings. This role combines the duties of … Assessment Reports (SARs), Risk Assessment Reports (RARs), and Plan of Action and Milestones (POA&Ms). Conduct security control assessments and facilitate ongoing authorization (ATO/ATC) activities. Lead vulnerability and compliance assessments using automated tools (e.g., ACAS, STIG Viewer) and ensure all findings are remediated or tracked via POA&Ms. Monitoring security logs, analyzing and reporting cyber incidents … experience. Security+, or other DoD 8570/8140 IAT Level II certification. Ability to work on-site daily. eMASS experience. Experience or familiarity with the ATO process. Familiarity with vulnerability management tools such as ACAS, STIG Viewer, and SCAP Compliance Checker. Familiarity with (DRAGOS, Corelight, Splunk, Snort). Proficiency in analyzing security events, logs, and alerts from various More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Service Desk Analyst

Epsom, Surrey, England, United Kingdom
Required IT
with users. Escalate issues appropriately and manage major incidents in line with agreed processes. Provide outstanding customer service, maintaining accurate records and regular updates. Support problem, change, and project management activities, representing the Service Desk where required. Manage and document IT assets, processes, and knowledge bases. Contribute to vulnerability management, regulatory compliance, and audit requirements. Assist in … written and verbal communication skills, with the ability to explain technical issues to non-technical audiences. Desirable Skills: Experience in financial services or multi-site support environments. Exposure to vulnerability management tools (e.g., Qualys) and remote access administration. Experience with Microsoft Power Apps and automation of Service Desk processes. ITIL 4 Foundation and/or Service Desk Analyst More ❯
Employment Type: Full-Time
Salary: £36,000 - £42,000 per annum
Posted:

Cyber Security - Secure by Design Consultant

London, United Kingdom
Deerfoot Recruitment Solutions Limited
stakeholders and providing clear, actionable reporting. Skills & experience sought: Strong background in IT Security, Cyber Assurance, or IT Audit. Hands-on knowledge across areas such as governance, IAM, threat management, vulnerability management, and incident response. Good understanding of security frameworks (e.g. ISO27001, NIST, PCI-DSS, SOX). Experience engaging with senior stakeholders within complex environments. Relevant certifications More ❯
Employment Type: Contract
Rate: £650 - £680/day
Posted:

Cyber Security - Secure by Design Consultant

London, South East, England, United Kingdom
Deerfoot Recruitment Solutions Ltd
stakeholders and providing clear, actionable reporting. Skills & experience sought: Strong background in IT Security, Cyber Assurance, or IT Audit. Hands-on knowledge across areas such as governance, IAM, threat management, vulnerability management, and incident response. Good understanding of security frameworks (e.g. ISO27001, NIST, PCI-DSS, SOX). Experience engaging with senior stakeholders within complex environments. Relevant certifications More ❯
Employment Type: Contractor
Rate: £650 - £680 per day
Posted:

Director of Assurance & Cyber Security

Manchester, United Kingdom
Hybrid / WFH Options
Manchester University NHS Foundation Trust
requires a thorough understanding of the technology underpinning the Trust digital systems, as well as a broad, up-to-date knowledge of information security frameworks, pertinent regulation and legislation, vulnerability management, incident management and response, secure development techniques and approaches, Cyber Security engineering and operations, and management and governance of Cyber risk and Cyber Security. Please … using a range of IT applications Significant evidence of continued professional development Desirable ITIL Qualification COBIT Knowledge and Experience Essential Proven and significant leadership experience and/or formal management qualification Demonstrated expertise in an IT Security environment Direct experience of strategic and budgetary planning and financial management and controls Previously worked within the NHS A good practical … knowledge of security technologies and wider business solutions including Firewalls, IDS/IPS, Identity and access management, SIEM, remote working and cloud technologies Proven experience of working at a senior level leading and delivering IT Security in a sensitive and complex environment which is undergoing significant change Experience of delivering presentations to large groups of stakeholders Demonstrable commitment to More ❯
Employment Type: Permanent
Salary: £91342.00 - £105337.00 a year
Posted:

Security Engineer - Product & Production Infrastructure / Product Security Remote - United Kingdom

London, United Kingdom
Hybrid / WFH Options
Wiz
secure cloud environments that allow the best companies to move faster. SUMMARY Wiz is looking for a Security Engineer for Product & Production Infrastructure who has experience performing security reviews, vulnerability management, and detection and response operations in cloud-native environments. You'll get to collaborate with our software development and DevOps teams to secure Wiz's products, CI … modeling and security review exercises across Wiz's production and CI/CD environments - identifying and mitigating risks in our products and the cloud services that support them Drive vulnerability management and remediation efforts - prioritizing issues, implementing mitigations, and designing strategic preventative controls Extend our detection and response capabilities - building scalable solutions to identify malicious activity, triage alerts … Azure and GCP) Kubernetes (AWS EKS) and container infrastructure IAM and managing cloud identities at-scale Secure development and application of IAC solutions (Terraform, Helm) Cloud-native observability and management tools Development experience in Go, Python and Rust PREFERRED QUALIFICATIONS Bachelor's degree in computer science or a related field and/or candidates with equivalent job experience in More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cybersecurity Specialist 3

Atlanta, Georgia, United States
Hybrid / WFH Options
Burgeon IT Services
Cybersecurity Specialist 3 to lead the development, delivery, and optimization of IT security standards, best practices, and system architecture. This role focuses on advanced threat hunting, complex incident response, vulnerability management, and security design to protect critical state systems and sensitive data. Key Responsibilities: Proactively hunt for advanced threats that bypass automated detection tools. Investigate, triage, and respond … to complex security incidents; conduct root cause analysis. Perform vulnerability assessments and analyze asset discovery data for security gaps. Design and implement security architecture and recommend improvements. Monitor networks and systems for unauthorized activities and respond to incidents. Optimize cybersecurity tools (SIEM, EDR, IDS) and integrate new technologies. Incorporate threat intelligence feeds into platforms to enhance detection. Required Skills … years of proven success in technology leadership with focus on information security and data governance. Hands-on expertise with SIEM, EDR, IDS, and network monitoring tools. Strong knowledge of vulnerability management tools and practices. Advanced understanding of threat intelligence, incident response, and proactive defense. Excellent analytical, problem-solving, and documentation skills. Working Conditions: Hybrid work model (onsite in More ❯
Employment Type: Any
Salary: USD Annual
Posted:

Senior infrastructure and security manager

London, United Kingdom
Hybrid / WFH Options
Supporter Care Team
day infrastructure and security operations across our hybrid environment. In addition, you'll also take ownership for the delivery of key governance activities including risk assessments, audits, compliance checks, vulnerability management and cyber incident response. Working closely with the Head of IT, you'll support the development of long-term plans while taking full ownership of technical delivery. … Azure (IaaS, PaaS, networking, storage, compute, security and monitoring) Networking technologies (firewalls, VPNs, LAN/WAN, DNS/DHCP, TCP/IP, virtualisation) Enterprise security tools (SIEM, endpoint protection, vulnerability management, XDR, MDM, IDPS) Backup, replication and disaster recovery solutions Microsoft services such as Windows Server, Intune, Autopilot, Entra ID, Defender, Exchange and SharePoint You'll have proven More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Microsoft Defender Admin

United Kingdom
Hybrid / WFH Options
Hamilton Barnes 🌳
Configure and administer Defender policies (AV, EDR, ASR, AIR), dashboards, exclusions, and reporting to ensure secure and compliant endpoint protection. Monitor, investigate, and remediate threats using Defender EDR, Threat & Vulnerability Management, and automated remediation to resolve high-priority security issues. Collaborate with cross-functional teams and stakeholders to provide end-to-end Defender support, documentation, and continuous security … Strong background in Legacy AV solutions (Symantec, McAfee) with the ability to plan and execute smooth migrations to Microsoft Defender. Deep knowledge of endpoint security operations, including EDR, Threat & Vulnerability Management, attack surface reduction, and incident investigation/remediation. Collaborative and problem-solving mindset, with the ability to work across infrastructure, application, and client teams while providing clear More ❯
Posted:

Windows System Administrator with Security Clearance

Montgomery, Alabama, United States
TEKsystems c/o Allegis Group
802.1x, AAA, DHCP, DNS, ICMP, LDAPS, NetFlow, Polling, SCP, SMTP, SNMP, Syslog, TCP/IP, VLANs, WinRM, WMI • Exposure to SCCM/WSUS/MECM patch/software endpoint management technologies • Knowledge about virtualized environments such as VMware vSphere's vCenter Server Appliance (vCSA), ESXi hosts, virtual machines (VMs), VMTools and VMware hardware version • Familiarity with networking security, desktops … the flexibility to cope with a changing environment and short deadlines Secondary Skills - Nice to Haves Job Description • Conduct administration of Microsoft Windows workstations and servers to include configuration management, security updates, patching, software upgrades and mitigation of vulnerabilities • Effective and timely communication with users both in and outside 26NOS is required, including analyzing issues, understanding needs and operational … practices, or vendor hardening guidance • Ability or experience in evaluating scan report data from ACAS Tenable.SC or Tenable Nessus Scanners; participate in the review and response phases of the Vulnerability Management (VM) life cycle • Aptitude to support provisional installation, configuration, operation and maintenance of server systems hardware (Dell PowerEdge, HPe ProLiant, etc.), and utilize related infrastructure devices such More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Vulnerability Analyst

Ipswich, Suffolk, United Kingdom
VIQU IT
Vulnerability Analyst – 3-month contract My Customer is seeking a proactive and skilled Vulnerability Analyst to join their team in a highly regulated, mission-critical 24/7 environment. Their infrastructure includes over 450 servers operating across both Windows and Linux platforms — making secure access and timely response essential. Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools is needed for this role. Key Skills from the Vulnerability Analyst: Demonstrated experience in vulnerability management within large-scale enterprise or corporate environments . Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools. Strong working knowledge of Windows and Linux operating systems , including their associated technology … stacks. Able to operate effectively in a secure, complex, and highly regulated setting with restricted access considerations. Key responsibilities for the Vulnerability Analyst: Daily monitoring and analysis of security events and vulnerabilities. Proactively reviewing Qualys reports to identify missing patches, misconfigurations, and other potential threats. Collaborating closely with infrastructure and operations teams to coordinate and apply remediation actions. Ensuring More ❯
Employment Type: Contract
Rate: £400 - £500/day
Posted:

Third Line Support

Sunderland, Tyne and Wear, England, United Kingdom
Nigel Wright Group
challenging and interesting products and technologies. Key Responsibilities: - Prioritising and assess the impact of new incidents via phone, email, Microsoft Teams and our help desk system- Incident and Queue Management- Implementing first time fixes and resolving technical issues at a 3rd line support level- Providing first point contact support to our users and maintaining excellent customer service via phone … Directory/Microsoft Entra ID- Microsoft Office 365 Administration Desirable Skills & Experience - Microsoft Office 365 Administration- Windows Server 2016-2022 Administration- Microsoft SQL Server Administration (Database support, maintenance plan management)- Management and maintenance of our Anti-Virus, MDR/EDR and Cloud Optix platform- Vulnerability Management and resolution More ❯
Employment Type: Full-Time
Salary: £45,000 per annum
Posted:

Journeyman Information Assurance Specialist with Security Clearance

Hampton, Virginia, United States
Barbaricum
cybersecurity operations for TRADOC G2 at Fort Eustis, VA, ensuring the protection and compliance of mission-critical IT systems. The selected candidate will assist in security assessments, risk mitigation, vulnerability management, and RMF accreditation while supporting incident response, system hardening, and compliance with DoD cybersecurity policies in both classified and unclassified environments. Responsibilities Conduct security assessments and audits … of IT systems. Assist in preparing accreditation packages for system authorization. Implement vulnerability management strategies, including patching and updates. Support incident response and mitigation efforts. Maintain security documentation in compliance with DoD standards. Qualifications: Active DoD Top Secret/SCI clearance required. Bachelor's degree in IT or cybersecurity preferred. 3-8 years' experience. Security+ or equivalent certification More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Endpoint Engineer - INTUNE SPECIFIC with Security Clearance

Oxon Hill, Maryland, United States
Prism, Inc
Endpoint Engineer Responsibilities: Lead the administration and engineering of a Microsoft endpoint management solution (e.g., Intune), including policy creation and management, application deployment, device compliance, and conditional access configurations. Design and implement hybrid identity solutions leveraging cloud-based directory services (e.g., Azure AD) and on-premises Active Directory for seamless identity management. Utilize cloud automation tools (e.g., Azure … Automation) and endpoint management platforms to manage and secure cloud-based and on-premises workstations and servers, ensuring they are patched to correct levels. Develop and maintain cloud-based system templates and images for rapid deployment. Manage and maintain Windows Server and PC images in both cloud and on-premises environments. Identify, analyze, and resolve system problems with both … advanced scripts (e.g., PowerShell) and leverage cloud scripting services (e.g., Azure Functions) to automate systems administration tasks across cloud and on-premises environments. Implement and manage a comprehensive endpoint management solution (e.g., Microsoft Endpoint Manager, combining Intune and SCCM). Design and implement cloud-based security solutions, including cloud security monitoring and management tools (e.g., Azure Security Center More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Architect

Reading, Berkshire, South East, United Kingdom
Hybrid / WFH Options
Queen Square Recruitment Limited
Experience designing and securing AI/ML and MLOps environments , including awareness of risks such as adversarial attacks, model poisoning, and data privacy issues. Deep knowledge of: Identity & Access Management (IAM) Network and Application Security Data Protection & Encryption Kubernetes, Containers, and DevSecOps/MLOps practices SIEM, logging, and monitoring Zero Trust architectures Skilled in applying frameworks such as NIST … CSF, ISO 27001, PCI DSS, CSA CCM, NIST AI RMF . Hands-on with tools for vulnerability management, secrets management, CSPM, and CWPP . Relevant certifications strongly preferred (CISSP, CCSP, TOGAF, AWS/Azure/GCP security certifications). Excellent communication and leadership skills, with the ability to influence at all levels. Esther Urtecho Senior Delivery Consultant More ❯
Employment Type: Contract
Rate: Up to £765 per day
Posted:

Senior Vulnerability Analyst

Warwickshire, United Kingdom
Akkodis
Senior Vulnerability Analyst £50,000 - £57,000 + bonus and extensive benefits Full Time/Permanent West Midlands/Hybrid - 1-2 days a month in the office on average The Role and Company: I am looking for a driven Senior Vulnerability Analyst to join a large nationally recognised brand head quartered in the West Midlands. As a … Senior Vulnerability Analyst you will be joining a highly skilled Cyber Defence team. As a key part if this team you will manage threats to the organisation and safeguard systems that enable the business to function safely and effectively. We are ideally looking for someone Midlands based who can be on site in Warwickshire 1-2 days a month … on average. Responsibilities: Conducting regular vulnerability assessments using automated scanning tools, manual testing techniques, and security best practices to identify vulnerabilities in systems, networks, and applications Managing the lifecycle of vulnerabilities from discovery to remediation, including vulnerability triage, prioritisation, tracking, and reporting Analysing the impact and severity of identified vulnerabilities based on factors such as the likelihood of More ❯
Employment Type: Permanent
Salary: £50000 - £57000/annum bonus, benefits
Posted:

Sr Cyber Security Engineer - Cleared On-site

Lompoc, California, United States
The Computer Merchant, LTD
RANGE : 92.00-96.00 PER HOUR JOB NUMBER: REQUIRED EXPERIENCE: Qualifications You Must Have: Experience with performing assessments of various operating systems with DISA STIGs and SRGs Experience with IA vulnerability testing and related network and system test tools, e.g., ACAS and Security Content Automation Protocol (SCAP) An active and transferable DoD Secret security clearance is required on Day … clearance. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance Experience with network and system security administration, including operating system security configuration and account management best practices for LINUX, Microsoft, and CISCO Systems (Previous experience with RHEL 6 and 7 is highly desired) Understand DoD RMF Certification and Accreditation Processes, assessing and validating compliance … M IAT-III or DoD 8140 (CISSP or equivalent) Compliant Certification Qualifications We Prefer: An advanced degree in STEM with 5+ years of engineering experience Familiar with NIST Risk Management Framework as described in NIST Special Publication 800-37 Experience with information security toolsets such as LogRhythm and/or SPLUNK or other related Intrusion Detection Tools Self-Starter More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

CYBER SECURITY ENGINEER with Security Clearance

Tampa, Florida, United States
Blue Obsidian Solutions
maintain security controls and monitoring throughout the software development lifecycle (SDLC). Automation: Develop automated security processes and tools to detect and prevent vulnerabilities in CI/CD pipelines. Vulnerability Management: Conduct regular vulnerability assessments, penetration testing, and ensure timely remediation of findings. Protect all company data, especially sensitive information, from internal and external threats by creating … for detail and an ability to multitask in a fast-paced environment Strong abilities in critical thinking, problem-solving, logic, and forensics Knowledge of security tools like SAST, DAST, vulnerability scanners, and SIEM solutions. Familiarity with scripting languages (Python, Bash, etc.) and automation frameworks. In depth knowledge of application security principles, OWASP Top 10, and threat modeling. Proficiency in More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Strategy and Transformation - Senior Manager

United Kingdom
Hybrid / WFH Options
Anson McCade
through business development, recruitment, and thought leadership Coaching and mentoring consultants to develop the next generation of cyber leaders Ideal Background Proven experience in cyber strategy, transformation, and risk management within complex organisations Strong knowledge of regulatory and security frameworks (e.g. NIST CSF, ISO27001, GDPR, NIS2, NCSC CAF) Experience across areas such as GRC, security architecture, threat management, or vulnerability management Outstanding communication and stakeholder engagement skills, with the ability to influence at C-suite and board level Track record of leading large-scale client engagements and delivery teams in consulting environments Relevant certifications (CISSP, CISM, CISA, MSc Cyber Security) advantageous What You’ll Receive Salary: £86,000–£107,000 + benefits 25 days annual More ❯
Posted:
Vulnerability Management
10th Percentile
£32,500
25th Percentile
£47,500
Median
£60,000
75th Percentile
£87,500
90th Percentile
£95,000