Vulnerability Management Job Vacancies

226 to 250 of 993 Vulnerability Management Jobs

Principal Security Engineer (Vulnerability Management)

Leeds, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Principal Security Engineer (Vulnerability Management), leeds, west yorkshire col-narrow-left Client: Oracle Location: leeds, west yorkshire, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 4 Posted: 26.06.2025 Expiry Date: 10.08.2025 col-wide Job Description: Do you have a passion for high … scale services and working with some of Oracle's most critical customers? We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in vulnerability management and cloud security. This position is designed for technical security engineers adept at navigating the complexities of cloud security and leading efforts to increase security posture. In this … and create the future of software assurance at scale together. What You’ll Bring A minimum of 8 years of experience in the cybersecurity field, with a focus on vulnerability management, cloud security, and security architecture analysis. Strong understanding of vulnerability management processes, remediation workflows, and validation of security findings Experience designing and managing security metrics More ❯
Posted:

Principal Security Engineer (Vulnerability Management)

Hounslow, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Principal Security Engineer (Vulnerability Management), south west london col-narrow-left Client: Oracle Location: south west london, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 4 Posted: 26.06.2025 Expiry Date: 10.08.2025 col-wide Job Description: Do you have a passion for high … scale services and working with some of Oracle's most critical customers? We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in vulnerability management and cloud security. This position is designed for technical security engineers adept at navigating the complexities of cloud security and leading efforts to increase security posture. In this … and create the future of software assurance at scale together. What You’ll Bring A minimum of 8 years of experience in the cybersecurity field, with a focus on vulnerability management, cloud security, and security architecture analysis. Strong understanding of vulnerability management processes, remediation workflows, and validation of security findings Experience designing and managing security metrics More ❯
Posted:

Vulnerability Analyst

London, United Kingdom
VIQU Limited
Vulnerability Analyst Tenable SME Outside IR35 6 Months Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerability management programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerability management lifecycle from tooling and assessments to governance, reporting and stakeholder engagement. You ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerability management process using Tenable . Develop, deploy and maintain a comprehensive vulnerability management program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Employment Type: Contract
Rate: GBP 400 - 500 Daily
Posted:

Vulnerability Analyst

Kensington, London, England, United Kingdom
VIQU Limited
Vulnerability Analyst – Tenable SME – Outside IR35 – 6 Months – Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerability management programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerability management lifecycle — from tooling and assessments to governance, reporting and stakeholder engagement. You’ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerability management process using Tenable . Develop, deploy and maintain a comprehensive vulnerability management program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Employment Type: Contractor
Rate: £400 per day
Posted:

Vulnerability Analyst

Kensington, West Holland Park, Greater London, United Kingdom
VIQU Limited
Vulnerability Analyst – Tenable SME – Outside IR35 – 6 Months – Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerability management programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerability management lifecycle — from tooling and assessments to governance, reporting and stakeholder engagement. You’ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerability management process using Tenable . Develop, deploy and maintain a comprehensive vulnerability management program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Employment Type: Contract
Rate: £400 - £500/day Outside IR35
Posted:

Security Engineer

Basingstoke, Hampshire, South East, United Kingdom
Hybrid / WFH Options
Southern Communications Ltd
days in the office and 2 days from home) Key Tasks: Security assessments:?Create and perform security assessments and threat models Security standards:?Develop,implement&maintainsecurity standards and plans VulnerabilityManagement:?Research weaknesses and find ways to counter them Security incident response:?Respond to attack vectors and security incidents, and coordinate incident response across teams Security software testing:?Test company software … improvements on a continuous basis? Help develop platforms and tools to automate and improve security posture across the group Skills and Competencies Required: Knowledge and hands-on experience in management of IDS/IPS, Firewall, VPN, EDR/XDR, mail filtering and other security products Experience in Security Information Event Management (SIEM) tools, creation of basic co-relation … rules, and administration of SIEMpreferred Should haveexpertiseon TCP/IP network traffic and event log analysis Network Troubleshooting skillsrequired. Knowledge and hands-on experience in penetration testing/vulnerability scanning, security tools like tenable Nessus, kaliLinux Knowledge of ITIL disciplines such as Incident, Problem and Change Management Experience of infrastructure design and management in mission critical environments More ❯
Employment Type: Permanent, Work From Home
Salary: £55,000
Posted:

Cyber Security Engineer

London, UK
Gazelle Global
Remediation Engineer – Security & Vulnerability Management We are seeking a technically proficient Remediation Engineer – Security & Vulnerability Management to support our vulnerability management and threat remediation efforts. The successful candidate will play a pivotal role in analysing security vulnerabilities, coordinating with cross-functional teams, and implementing timely, effective remediation to reduce the organization’s risk exposure … including on-premise environments, AWS, and Azure—through effective vulnerability lifecycle management, stakeholder engagement, and comprehensive tracking and reporting. Key Responsibilities Lead the identification, assessment, and remediation of vulnerabilities across all operating systems (Windows, Linux, macOS) and platforms (on-premise and cloud). Analyze vulnerability scan results from tools such as Qualys, Nessus and cloud native tools. … and application patching using tools such as SCCM, Ansible, Tanium, or Satellite. Contribute to remediation playbooks, SOPs, and security incident response plans. Manage and support secure configurations, patching, and vulnerability remediation across AWS and Azure environments. Remediate security misconfigurations or threats in AWS, Azure, and/or GCP using cloud-native security tools (e.g., AWS Inspector, Azure Security Center More ❯
Posted:

SOC Manager - Security Vendor

United Kingdom
Trilaty Group
Operate within a global team that takes responsibility for the security monitoring of key technologies and tools across the estate Lead and manage a team of Security Analysts & the Vulnerability management team Comfortable operating in a technical capacity performing hands-on incident response and supporting/managing SOC analysts Act as a SME in matters related threat and … vulnerability management incl incident response Understand security incidents and the likely impact these will have on the business Define and report on KPIs with recommendations for improvement Identify security risks, threats and vulnerabilities of the company's network, systems, applications and new technology initiatives Implement and maintain operating run books, operating processes and procedures Help to develop and … configure use cases, and alerting rules within SIEM technologies Mange the vulnerability management programme that includes vulnerability scanning, security testing, threat monitoring and data loss and leakage prevention Direct on-going threat intelligence activities Mentor and develop security analysts Skills: Prior experience working/managing a SOC Demonstrable experience and operational knowledge of SIEM, firewalls, intrusion detection More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cloud Security Analyst (ICT TECH TD 2025 36)

Reigate, England, United Kingdom
Willis Towers Watson
Reigate, Surrey, United Kingdom Salary Competitive Closing date 29 May 2025 View more categories View less categories Sector Engineering ,IT ,Security Job Role Cloud Security Job Type Permanent Support Vulnerability and Patch Management for ICT. Resolve issues with internal stakeholders. Prioritize and reduce Vulnerability risk on ICT IT assets. Perform Vulnerability risk assessments. Analyze severe vulnerabilities … and provide mitigation strategies. Assess Cloud Security threats using native and third-party tools. Implement, monitor, and report on secondary security controls, ensuring policy compliance. Support the management of risk when patches or standards cannot be applied. Assist in audit programs. Update governance and MI reports. Maintain documentation for security controls, policies, and procedures. Collaborate with WTW (ICS) corporate … security team. Stay updated on cloud security threats and measures. Job Description The Role Support Vulnerability and Patch Management for ICT. Resolve issues with internal stakeholders. Prioritize and reduce Vulnerability risk on ICT IT assets. Perform Vulnerability risk assessments. Analyze severe vulnerabilities and provide mitigation strategies. Assess Cloud Security threats using native and third-party tools. More ❯
Posted:

IT Information Security Consultant

Horsforth, Leeds, West Yorkshire, England, United Kingdom
Headway Recruitment
Security Incident Management Compliance and Policy Development, ISO 27001, Cyber Essentials M365 Security Solutions Information Security Consultant – Leeds (On-site) We’re thrilled to be working with a globally renowned professional services firm as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery … operations, and program management services worldwide.This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. They’re looking for an experienced Information Security Consultant with expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management … policies and regulations. User Support & Alerts – Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development – Support compliance More ❯
Employment Type: Full-Time
Salary: Salary negotiable
Posted:

IT Information Security Consultant

Yorkshire, United Kingdom
Headway Recruitment
as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. They re looking for an experienced Information Security Consultant … with expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert … guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development Create More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Freelance Cybersecurity Project Manager

Antwerpen, Belgium
Vivid Resourcing
Freelance Cybersecurity Project Manager (Vulnerability , IAM, Access Control) Due to increasing audit pressures and a recent series of external and internal security assessments, the organization is scaling up efforts to proactively identify and remediate infrastructure and application-layer vulnerabilities, while also refining its IAM strategy to ensure least-privilege access, Role-Based Access Control (RBAC), and integration with cloud … seeks an experienced Freelance Cybersecurity Project Manager with strong experience managing compliance-focused IT Security projects in highly regulated environments. Day-to-Day Responsibilities Lead end-to-end project management across Vulnerability Management and IAM workstreams, aligning business, compliance, and IT Security teams. Coordinate vulnerability scanning activities (infrastructure and application layers), manage remediation timelines, and track … regular executive-level reporting. Ensure alignment with security frameworks and standards (ISO 27001, NIST, CIS Controls). Requirements for the Candidate Experience : 8+ years of experience in IT Project Management with at least 3+ years in Cybersecurity-related projects within financial or similarly regulated industries. Security Knowledge : Strong understanding of cybersecurity principles, compliance mandates (e.g., GDPR, NIS2, DORA), and More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

IT Information Security Consultant

LS18 4GH, Rodley, West Yorkshire, United Kingdom
Headway Recruitment
as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. They’re looking for an experienced Information Security Consultant … with expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management – Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring – Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts – Handle security alerts and inquiries, providing expert … guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development – Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development – Create More ❯
Employment Type: Permanent
Posted:

IT Information Security Consultant

Pudsey, West Yorkshire, Yorkshire, United Kingdom
CIIH Ltd T/A Headway Recruitment
as they expand their IT Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. Theyre looking for an experienced Information Security Consultant with … expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring Conduct regular security checks to ensure compliance with policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. … Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with Cyber Essentials, ISO 27001, GDPR , and other security standards. Training & Development Create and More ❯
Employment Type: Permanent
Salary: £55,000
Posted:

Security Engineer - Nessus Experience

Manchester Area, United Kingdom
Square One Resources
various components. While having experience with implementing the Tenable solution key, this job also requires full-time hands-on administration of the Tenable system as well as managing the vulnerability management aspect of the tool. You will be responsible for maintaining Nessus and the remediation of vulnerabilities across the bank. Installing and Configuring Nessus, Nessus Manager, Nessus Agents … the Analysis and validation of the scan results. Responsible for monitoring, defining and configuring dashboards Required Skills/Experience The ideal candidate will have the following: Strong experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues Experience in the design and implementation of enterprise-wide security … controls to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. Demonstrated understanding of TCP/IP networking concepts and DNS. Related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with one or more More ❯
Posted:

Network Security Engineer

Greater London, England, United Kingdom
Gazelle Global
This role demands a proactive, hands-on professional with a strong security mindset and deep technical expertise in securing enterprise network architectures. Key Responsibilities: Analyze and respond to network vulnerability reports from tools such as Tenable , Qualys , AWS Inspector , etc. Remediate network vulnerabilities including IP spoofing, open ports, unencrypted protocols, default credentials, and outdated firmware. Enforce secure alternatives to … and industry best practices to secure routers, switches, and firewalls. Configure and maintain key network security controls such as ACLs , VLANs , DMZs , and micro-segmentation strategies. Secure network equipment management interfaces through least-privilege access and strong encryption (e.g., TLS 1.2/1.3 ). Design secure cloud networking using AWS VPCs , Azure NSGs , and GCP firewall rules . Implement … and hybrid segmentation and egress controls to reduce lateral movement risks. Support incident response efforts by investigating and mitigating network-level threats and anomalies. Collaborate with penetration testers and vulnerability management teams to validate findings and ensure resolution. Partner with GRC and compliance teams to align network controls with standards such as PCI-DSS , ISO 27001 , etc. Requirements More ❯
Posted:

Security Engineer

Dummer, Hampshire, UK
SCG Connected
in the office and 2 days from home) Key Tasks: Security assessments: Create and perform security assessments and threat models Security standards: Develop, implement & maintain security standards and plans Vulnerability Management: Research weaknesses and find ways to counter them Security incident response: Respond to attack vectors and security incidents, and coordinate incident response across teams Security software testing … improvements on a continuous basis Help develop platforms and tools to automate and improve security posture across the group Skills and Competencies Required: Knowledge and hands-on experience in management of IDS/IPS, Firewall, VPN, EDR/XDR, mail filtering and other security products Experience in Security Information Event Management (SIEM) tools, creation of basic co-relation … of SIEM preferred Should have expertise on TCP/IP network traffic and event log analysis Network Troubleshooting skills required. Knowledge and hands-on experience in penetration testing/vulnerability scanning, security tools like tenable Nessus, kali Linux Knowledge of ITIL disciplines such as Incident, Problem and Change Management Experience of infrastructure design and management in mission More ❯
Posted:

Security Engineer

Dummer, England, United Kingdom
SCG Connected
in the office and 2 days from home) Key Tasks: Security assessments: Create and perform security assessments and threat models Security standards: Develop, implement & maintain security standards and plans Vulnerability Management: Research weaknesses and find ways to counter them Security incident response: Respond to attack vectors and security incidents, and coordinate incident response across teams Security software testing … improvements on a continuous basis Help develop platforms and tools to automate and improve security posture across the group Skills and Competencies Required: Knowledge and hands-on experience in management of IDS/IPS, Firewall, VPN, EDR/XDR, mail filtering and other security products Experience in Security Information Event Management (SIEM) tools, creation of basic co-relation … of SIEM preferred Should have expertise on TCP/IP network traffic and event log analysis Network Troubleshooting skills required. Knowledge and hands-on experience in penetration testing/vulnerability scanning, security tools like tenable Nessus, kali Linux Knowledge of ITIL disciplines such as Incident, Problem and Change Management Experience of infrastructure design and management in mission More ❯
Posted:

Network Security Engineer

London, United Kingdom
TestYantra Software Solutions
technical expertise in identifying, prioritizing, and remediating network vulnerabilities, including zero-day threats , across hybrid environments. The ideal candidate will have a strong security mindset , hands-on experience with vulnerability management tools , and the ability to harden infrastructure using best practices and industry standards. Key Responsibilities: Analyze and act upon vulnerability assessments from tools such as Tenable … Configure and maintain robust network security controls such as: ACLs (Access Control Lists) VLAN segmentation DMZ configurations Micro-segmentation for zero trust environments Secure and limit access to network management interfaces by applying least-privilege principles . Design and enforce segmentation and egress control within hybrid and cloud environments to mitigate lateral movement risks. Maintain security for cloud network … architectures , including: AWS VPCs, Security Groups Azure NSGs GCP Firewall Rules Support security incident response by investigating and remediating network-level threats and anomalies. Collaborate with penetration testing and vulnerability scanning teams to validate vulnerabilities and verify implemented remediations. Work with GRC and compliance teams to align network configurations with regulatory frameworks like PCI-DSS, ISO 27001 , etc. Preferred More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Application Security Architect

London, England, United Kingdom
JR United Kingdom
and architecture teams to define technical security requirements and ensure cohesive, secure solutions. Lead on the resolution of high-priority and complex security incidents. Advise senior leadership on risk management strategies and mitigation plans. Oversee security for a portfolio of applications/projects from inception through delivery. Ensure security controls are effectively embedded throughout the SDLC. Maintain up-to … date InfoSec policies and technical security standards. Conduct vulnerability assessments, threat modelling, and architecture reviews. What You’ll Bring Strong ability to translate technical risk into clear, actionable business terms. Hands-on experience with secure DevOps pipelines and development practices. Excellent stakeholder management skills across technical and non-technical teams. Proven track record in large, regulated environments with … Azure/AWS Security. Working knowledge of GDPR, HIPAA, PCI-DSS. Familiarity with development in .NET, Java, Python, PowerShell, or Bash. Knowledge of tools like SIEM, SOAR, IDS, WAF, vulnerability management platforms. Experience with UI, API, microservices security patterns and cryptographic principles. Threat modelling and dynamic security testing skills. Background in business analysis or requirements engineering. #J More ❯
Posted:

Information Systems Security Engineer (ISSE) with Security Clearance

Washington, Washington DC, United States
Recruiters Workforce
Rate: Negotiated during the final interview Position Description: We are seeking a highly skilled Information Systems Security Engineer (ISSE) to provide cybersecurity support as a member of a Risk Management Framework (RMF) Team. The candidate should possess an expert knowledge of RMF/Authority to Operate (ATO) package requirements and eMASS. The ISSE will support the Information System Security … and maintain RMF ATO requirements within the customer's complex network infrastructure, spanning multiple platforms, networks and security enclaves. Job requirements (minimum): RMF and A&A Support: Provide Risk Management Framework (RMF) and Assessment and Authorization (A&A) support, including developing and maintaining systems' Authority to Operate (ATO) package documentation. ATO documentation includes but is not limited to Hardware … to effectively determine risk. POA&M Development and Maintenance: Develop and maintain approved Plan of Action and Milestone (POA&M) items via eMASS and ensure alignment with organizational requirements. Vulnerability Management: Ensure traceability of all vulnerabilities from raw assessment results to approved POA&M items. Additionally, the candidate must possess the ability to review all technical and procedural More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Business Partner

Liverpool, Lancashire, United Kingdom
Hybrid / WFH Options
B&M Retail Limited
of operational resilience. About the role: Reporting to the Head of Information Security Risk & Assurance, the ISBP plays a central role in embedding information security, business continuity, and risk management across our organisation.You'll support a broad range of stakeholders across the following business units:Retail Operations -Supply Chain & Logistics -Support Centre. Your responsibilities will include: Business continuity & incident … security risk & assurance Promoting security governance across business units Managing risk registers and facilitating quarterly risk reviews Coordinating audits, assessments, and compliance checks Supporting third-party due diligence and vulnerability remediation You'll work closely with internal teams including Operations, IT, Legal, Risk, Audit, Procurement, and Compliance - helping to ensure that security is embedded in our processes and partnerships. … continuity and disaster recovery Hands-on experience with security risk assessments, audits, and incident response Familiarity with key standards and regulations (e.g. ISO 27001, PCI DSS, GDPR) Excellent stakeholder management and communication skills And desirable would be: Certifications such as CISSP, CISM, CRISC, CBCI, or ISO 27001 Lead Auditor Experience in the retail, e-commerce, or supply chain sector More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Manager

London, Tower, United Kingdom
Hybrid / WFH Options
Skillcast
security operations, drive compliance efforts, and strengthen our cloud and infrastructure defenses. As a Cyber Security Manager you will play a key role in managing security incidents, audits, and vulnerability programs, while mentoring junior team members and helping shape the future of cybersecurity at Skillcast. Key Responsibilities: - Coordinate SOC 2, ISO 27001, and Cyber Essentials audits – including documentation, evidence … management, gap analysis, and communication with auditors - Administer and enhance Azure Sentinel SIEM – including data source configuration, detection rule creation, incident triage, and reporting - Oversee vulnerability scanning, prioritisation, stakeholder coordination, and remediation tracking - Implement and manage security controls across Azure and Kubernetes environments, ensuring scalable and secure architecture - Work closely with DevOps to embed security in CI/… experience in cybersecurity and IT infrastructure roles - Hands-on experience with Azure, Kubernetes/Docker, and CI/CD security practices - Proficient in SIEM platforms (especially Azure Sentinel) and vulnerability management tools - Strong knowledge of incident response, infrastructure hardening, and cloud security controls - Familiarity with SOC 2, ISO 27001, Cyber Essentials, and NIST frameworks - Experience with core security More ❯
Employment Type: Permanent
Salary: £60000 - £65000/annum
Posted:

Cyber Security Manager

City of London, London, England, United Kingdom
Hybrid / WFH Options
Skillcast
security operations, drive compliance efforts, and strengthen our cloud and infrastructure defenses. As a Cyber Security Manager you will play a key role in managing security incidents, audits, and vulnerability programs, while mentoring junior team members and helping shape the future of cybersecurity at Skillcast. Key Responsibilities: - Coordinate SOC 2, ISO 27001, and Cyber Essentials audits – including documentation, evidence … management, gap analysis, and communication with auditors - Administer and enhance Azure Sentinel SIEM – including data source configuration, detection rule creation, incident triage, and reporting - Oversee vulnerability scanning, prioritisation, stakeholder coordination, and remediation tracking - Implement and manage security controls across Azure and Kubernetes environments, ensuring scalable and secure architecture - Work closely with DevOps to embed security in CI/… experience in cybersecurity and IT infrastructure roles - Hands-on experience with Azure, Kubernetes/Docker, and CI/CD security practices - Proficient in SIEM platforms (especially Azure Sentinel) and vulnerability management tools - Strong knowledge of incident response, infrastructure hardening, and cloud security controls - Familiarity with SOC 2, ISO 27001, Cyber Essentials, and NIST frameworks - Experience with core security More ❯
Employment Type: Full-Time
Salary: £60,000 - £65,000 per annum
Posted:

CHIEF INFORMATION SECURITY OFFICER-AEROSPACE AND DEFENSE

London, England, United Kingdom
Gentrian
requires a sophisticated operating model that allows for a stronger security posture centralized in a Security Operations Center (SOC). This role will oversee global operations with a unified management of API calls, space exploration & navigation, and integrate various tools into our systems of record to view interactions from a holistic risk management perspective. Areas to cover: Incident … response and remediation Orchestrating and automating signals Prioritizing cases and incident response Cyber threat intelligence and dark web monitoring Vulnerability management and exposure management Building a resilient cybersecurity culture Introducing new risk management techniques will undergo formal approval by the Change Approval Board (C.A.B). The role will also involve micromanaging cybersecurity engineers, penetration testing engineers … of hire. Visa sponsorship is not available for this position. QUALIFICATIONS, KEY REQUIREMENTS AND SKILLSET: 20+ years in cybersecurity and digital solutions engineering Proficiency in key generation, key lifecycle management, and risk management GSEC or Offensive Security Certified Professional (OSCP) Certified Information Security Manager (CISM) Certified Authorization Professional (CAP) Certified Network Defender (CND) Information Systems Security Architecture Professional More ❯
Posted:
Vulnerability Management
10th Percentile
£39,400
25th Percentile
£50,000
Median
£60,000
75th Percentile
£78,750
90th Percentile
£92,500