Vulnerability Management Job Vacancies

26 to 50 of 466 Vulnerability Management Jobs

Security SME (end point)

London, United Kingdom
Hybrid / WFH Options
Experis
and governing foundational security controls within a global enterprise environment. You will act as a strategic advisor and technical authority, supporting the development and implementation of endpoint security practices, vulnerability management, asset control, and governance-aligned with the organisation's broader 2026 security strategy . This is an ideal opportunity for someone who may not see themselves as … ensuring controls are robust, scalable, and fit for the future. Translate technical and business needs into actionable security architecture guidance. Support governance and process standardisation across shadow IT , asset management , and vulnerability management . Drive cross-functional collaboration across architecture, engineering, and operational teams. Ideal Candidate Profile: Strong technical understanding of endpoint security , including hardening, tooling, and More ❯
Employment Type: Contract
Posted:

Senior OT - IT Cyber Security Engineer

Hampton, New Hampshire, United States
Hybrid / WFH Options
Unitil Service Corporation
OT/IT environment from cyber threats and ensuring the continuous and safe operation of essential industrial processes. Additionally, this position will be responsible for OT asset inventory and vulnerability management for the company's network assets including firewalls, switches, IoT devices which includes physical security systems, cameras, UPS devices, HVAC and lighting controls. Key Responsibilities: Cybersecurity Assessment … Conduct security assessments and vulnerability assessments on IT/OT systems to identify potential weaknesses and threats. Incident Response: Develop and implement incident response plans specific to OT environments to detect and mitigate cyber incidents. Network Security: Design, implement, and maintain security measures for OT networks, including firewalls, intrusion detection systems, and access controls. Patch Management: Oversee patch … management processes for OT systems, ensuring timely updates and minimal disruption to critical operations. Security Policies: Develop and enforce security policies and procedures for the OT environment, aligned with industry standards and regulatory requirements. Security Monitoring: Implement real-time monitoring solutions to detect anomalies and unauthorized access in OT networks and systems. Risk Assessment: Perform risk assessments and develop More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

AppSec Lead

Central London, London, United Kingdom
Hybrid / WFH Options
Halian Technology Limited
engineering teamsproviding hands-on guidance, resolving concerns, and fostering a security-first mindset. DevSecOps Enablement : Promote and implement secure development practices across CI/CD pipelines, secrets and key management, dependency management, and secure design. Vulnerability Management : Lead vulnerability remediation effortstriaging findings, prioritizing risks, and partnering with teams to deliver effective, pragmatic fixes. Tooling & Automation … Hands-on experience with secure CI/CD practices, DevSecOps methodologies, GitHub workflows, and Terraform. Deep understanding of cloud security principles in AWS and Azure, particularly around IAM, secrets management, and networking. Proficient in secure coding practices, threat modeling, and vulnerability remediation. Familiar with a range of security tooling including static and dynamic analysis, software composition analysis, and More ❯
Employment Type: Permanent, Work From Home
Posted:

Chief Information Security Officer

Norwich, Norfolk, United Kingdom
Fluke Biomedical Corporation
s security architecture, ensuring it aligns with business objectives, regulatory requirements, and industry best practices. Design secure systems, networks, and infrastructure, considering scalability, resiliency, and emerging technologies. Security Operations Management: Lead the security operations team for product and infrastructure, ensuring the implementation of robust security controls, incident response protocols, vulnerability management, and security monitoring. Foster a proactive … and efficient security operations center (SOC) to detect, respond to, and recover from security incidents. Team Management: Effectively manage security champions for product responsible for security operations, architecture, and related functions. Establish and maintain strong communication channels, facilitate knowledge sharing, and drive team collaboration to achieve common security goals. Risk Assessment and Compliance: Conduct regular risk assessments and audits … functional teams to promptly detect, investigate, and resolve security incidents. Develop and maintain an incident response plan, ensuring effective communication, documentation, and post-incident analysis. Vendor and Third-Party Management: Assess and manage security risks associated with third-party vendors and partners. Establish and maintain security-related contracts, service-level agreements, and ongoing vendor assessments to ensure adherence to More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Database Administrator with Security Clearance

Longmont, Colorado, United States
Caribou Thunder, LLC
standards. • Collaborate daily with System Administrators, DevSecOps, Cybersecurity, Software Engineers, and Integration Engineers on a highly technical team delivering reliable solutions. • Assist the Information Assurance (IA) Team with system vulnerability management, software patching, account management, and license compliance. Is This You? • 7+ years of database administration or engineering experience in secure environments • Bachelor's degree in STEM … MySQL, Microsoft SQL Server (Advanced experience required) • High-Availability Architecture, Clustering, Automated Failover • Backup Methodologies & Disaster Recovery Planning Systems & Security: • RHEL Linux Administration • Security Technical Implementation Guidelines (STIGs) • System Vulnerability Management & Patch Compliance Virtualization & Platforms: • KVM, VMware, RedHat OpenShift • Satellite Ground Systems & OPIR Program Exposure (Highly Preferred) DevOps & Automation: • Automated Scripting (Python or similar languages) • Infrastructure as Code … IaC) • Agile, Lean, and Continuous Process Improvement Frameworks • Configuration & Change Management Processes Collaboration & Communication: • Strong team player with excellent verbal and written communication • Ability to develop CONOPS, procedural documentation, and operational support materials If this sounds like you, we'd love to talk. Apply today and help us build mission-critical solutions that safeguard national security. More ❯
Employment Type: Permanent
Salary: USD 180,000 Annual
Posted:

Azure Cyber Security Analyst

Kings Hill, Kent, United Kingdom
Clearwater People Solutions
lead on: Driving the use of Azure Cloud based security tools such as Defender and Sentinel Configure and manage alerts through Defender First and second line security operations, including vulnerability management Investigating and responding to security incidents Ensuring policies and procedures remain aligned to industry best practice Promoting security awareness and education throughout the organisation particularly in relation … Azure Cyber Security Analyst: Azure environment - Essential Defender and Sentinel commercial experience - Essential Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerability management, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid understanding of risk assessment frameworks More ❯
Employment Type: Permanent
Salary: GBP 60,000 - 65,000 Annual
Posted:

Azure Cyber Security Analyst

West Malling, Kent, United Kingdom
Clearwater People Solutions
lead on: Driving the use of Azure Cloud based security tools such as Defender and Sentinel Configure and manage alerts through Defender First and second line security operations, including vulnerability management Investigating and responding to security incidents Ensuring policies and procedures remain aligned to industry best practice Promoting security awareness and education throughout the organisation particularly in relation … Azure Cyber Security Analyst: Azure environment - Essential Defender and Sentinel commercial experience - Essential Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerability management, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid understanding of risk assessment frameworks More ❯
Employment Type: Permanent
Salary: £60000 - £65000/annum Hybrid Working
Posted:

Senior Trellix/Microsoft Defender Administrator with Security Clearance

Fort Belvoir, Virginia, United States
TEKsystems c/o Allegis Group
Trellix/Microsoft Defender Administrator in Fort Belvoir, VA to join the I3TS team supporting DTRA. The I3TS program provides enterprise-wide IT support to enable DTRA's Information Management & Technology Directorate (ITD) to consolidate, modernize, and continuously innovate the delivery of IT services and mission capabilities to DTRA's internal and external mission partners operating in CONUS and … by running their Endpoint Security with experience in Trellix and Microsoft Defender. Administrator will also be responsible in applying Security Technical Implementation Guides (STIGs), managing system patches, and overseeing vulnerability management processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate will be responsible for identifying … points of vulnerability, non-compliance with established Information Assurance (IA) guidelines and regulations and recommend mitigation strategies, along with assisting users as needed in a classified computing environment. The selected candidate must be able to work independently as well as with a team of IT analysts, administrators, and engineers. The position requires excellent communications skills, both verbal and written. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

HBSS/MDE Administrator SME with Security Clearance

Fort Belvoir, Virginia, United States
Global Enterprise Services, LLC
HBSS/MDE Administrator SME in Fort Belvoir, VA to join the I3TS team supporting DTRA. The I3TS program provides enterprise-wide IT support to enable DTRA's Information Management & Technology Directorate (ITD) to consolidate, modernize, and continuously innovate the delivery of IT services and mission capabilities to DTRA's internal and external mission partners operating in CONUS and … by running their Endpoint Security with experience in Trellix and Microsoft Defender. Administrator will also be responsible in applying Security Technical Implementation Guides (STIGs), managing system patches, and overseeing vulnerability management processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate will be responsible for identifying … points of vulnerability, non-compliance with established Information Assurance (IA) guidelines and regulations and recommend mitigation strategies, along with assisting users as needed in a classified computing environment. The selected candidate must be able to work independently as well as with a team of IT analysts, administrators, and engineers. The position requires excellent communications skills, both verbal and written. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

IT & Cybersecurity Specialist

Camarillo, California, United States
GBL Systems Corporation
Note that this is a hybrid role that combines traditional IT support with implementation of cybersecurity measures. Qualified candidates should have an understanding of system and cybersecurity, DoD Risk Management Framework, Information Assurance and NIST Cybersecurity Framework processes. Qualified candidates should also have an understanding of IT infrastructure operations, LAN/WAN networking, virtualization, containerization, patch management, and … hands-on experience with networking and security appliances. Successful applicants should have the ability to work effectively and cooperatively with all management levels, the personality to support team goals, and the ability to work independently without close supervision. Applicants should exhibit strong interpersonal and oral/written communications skills. Primary Duties and Responsibilities: Knowledge, implementation and management of … Firewalls; Endpoint Protection, Detection and Response; Data Loss Prevention; Encryption; SIEM and similar security management tools and appliances Promoting user security training and awareness Assists in the development, maintenance and documentation of security operations procedures, processes, and standards Ensures that system security configurations are properly implemented, monitored and reported Knowledge of security risk management, tools, methodologies and implementation More ❯
Employment Type: Permanent
Salary: USD 79,000 Annual
Posted:

Senior Cyber Security Engineer - 12 months FTC. Maternity Cover

London, United Kingdom
TP ICAP Group
at TP ICAP. The Senior Cyber Security Engineer has the remit of proactively driving development of the cyber security capability in line with the evolving threat landscape. This includes; vulnerability management, access control, security platform engineering, detection and response activities. Coordinate with offensive security personnel to improve security posture based on Red/Purple team campaign findings. The … of the group. Fundamental to this is the ability to exercise an offensive security mindset. Role Responsibilities Maintain knowledge of current ATP TTPs Maintain knowledge of security tool landscape Vulnerability identification and remediation Penetration test report remediation Privileged access management Red/Purple offensive security activities Incident response and forensics Proactively identify opportunities for control improvements Develop strong … architecture best practices and emerging technologies Support the development and implementation of secure-by-design principles across projects Security platform engineering and projects Experience/Competences Essential Experience implementing vulnerability management, SIEM, PAM, IDS/IPS, EDR, DLP, CNAPP and AV platforms Intermediate level knowledge of incident response processes for OS and network level events Comfortable with Windows More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

HBSS Systems Administrator with Security Clearance

Fort Belvoir, Virginia, United States
TEKsystems c/o Allegis Group
Senior HBSS/MDE Administrator in Fort Belvoir, VA to join the I3TS team supporting DTRA. The I3TS program provides enterprise-wide IT support to enable DTRA's Information Management & Technology Directorate (ITD) to consolidate, modernize, and continuously innovate the delivery of IT services and mission capabilities to DTRA's internal and external mission partners operating in CONUS and … by running their Endpoint Security with experience in Trellix and Microsoft Defender. Administrator will also be responsible in applying Security Technical Implementation Guides (STIGs), managing system patches, and overseeing vulnerability management processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate will be responsible for identifying … points of vulnerability, non-compliance with established Information Assurance (IA) guidelines and regulations and recommend mitigation strategies, along with assisting users as needed in a classified computing environment. The selected candidate must be able to work independently as well as with a team of IT analysts, administrators, and engineers. The position requires excellent communications skills, both verbal and written. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer

Cambridge, Cambridgeshire, England, United Kingdom
Hybrid / WFH Options
REDTECH RECRUIT
Defender XDR suite Knowledge of cloud and on-premise environments, ideally Azure, including networking and firewalls Familiarity with incident response processes, playbooks, and tools Understanding of threat intelligence and vulnerability management Experience with ISO27001 and compliance frameworks Scripting and coding skills (e.g., Python, PowerShell, Bash) Exposure to CI/CD, Infrastructure as Code (IaC), and Azure DevOps pipelines … Microsoft Defender/Endpoint Security/PowerShell/Python/Bash/Azure DevOps/Infrastructure as Code/CI/CD/Network Security/Penetration Testing/Vulnerability Management/ISO27001/Information Assurance/Computer Science/Cyber Security/Information Security/Security Compliance More ❯
Employment Type: Full-Time
Salary: £45,000 - £50,000 per annum
Posted:

Information Systems Security Officer with Security Clearance

Boston, Massachusetts, United States
Digital Prospectors
crucial in maintaining and developing our Information Security (IS) program and ensuring compliance with established security policies and procedures. The ISSO will be responsible for overseeing operational security implementation, vulnerability management, system assessments, and recovery processes. The ideal candidate will play a key role in safeguarding critical information systems and contribute to a comprehensive security posture. Essential Duties … validate adherence to security standards. • Promote awareness of security issues across the organization. • Provide ongoing training to ensure all staff understand their security responsibilities. • Prepare technical documents, incident reports, vulnerability assessments, and other situational awareness information for key stakeholders. • Assist in ensuring systems and configurations comply with security guidelines and regulatory requirements. • Monitor and validate compliance through continuous security … assessments and audits. • Conduct system vulnerability scanning, configuration assessment, and remediation to maintain system integrity and security. Qualifications: • Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or a related field is required. • Proven experience in cybersecurity, risk management, or information security roles, particularly in relation to system security, vulnerability management, and compliance activities. • Strong knowledge More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

TIER 2 SOC ENGINEER

San Jose, California, United States
INSPYR Solutions
capability to work autonomously with minimal supervision. Experience with the following tools/platforms: Cloud Security: Wiz, Azure Defender for Cloud, AWS Security Hub, related cloud native security tools Vulnerability Management: Tenable SIEM & Monitoring: Splunk, Microsoft Sentinel, Amazon CloudWatch, AWS CloudTrail EDR & Threat Protection: Microsoft Defender for Cloud, Microsoft Defender for Endpoint, Cisco AMP Identity & Access: Microsoft Defender … network protocols, and common attack vectors. Ability to interpret and analyze log data from various sources. Understanding of incident response methodologies and frameworks (e.g., NIST, SANS). Knowledge of vulnerability management processes and remediation. Experience with scripting (Python) for automation and investigation is a plus. Excellent written and verbal communication skills. Ability to work in a fast-paced More ❯
Employment Type: Permanent
Salary: USD 7,000 Hourly
Posted:

ACAS System Remediation Administrator with Security Clearance

Washington, Washington DC, United States
SRG Government Services
Clearance: Active Top Secret/SCI clearance required Schedule: Monday to Friday, 8am to 5pm Overview: We are seeking a talented and motivated ACAS System Remediation Administrator to support vulnerability management and cybersecurity compliance for networks. The successful candidate will manage and optimize ACAS tools such as Tenable Nessus and Security Center, perform vulnerability scans, and collaborate … with RMF and engineering teams to remediate risks and ensure system compliance. Responsibilities: Build and execute vulnerability remediation plans in coordination with Systems Engineering and RMF teams Configure, schedule, execute, and troubleshoot ACAS/Nessus scans Maintain and update Security Center with successful syncs and scan results Conduct analysis of scan results and provide mitigation strategies or author POA … Ms as needed Administer and support both Windows and Linux systems with a security-focused lens Implement and analyze STIGs, IAVAs, and vulnerability compliance frameworks Create and maintain documentation on vulnerabilities, remediation efforts, and RMF/eMASS artifacts Support automation of ACAS operations and contribute to scripting for system efficiencies Maintain compliance with DISA OPORDs, FRAGOs, and other cybersecurity More ❯
Employment Type: Permanent
Salary: USD 140,000 Annual
Posted:

Information Security Analyst

Hull, North Humberside, England, United Kingdom
Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerability management: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerability management, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non … technical staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey More ❯
Employment Type: Full-Time
Salary: £35,000 - £45,000 per annum
Posted:

Information Security Analyst

North Ferriby, North Humberside, North East, United Kingdom
Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerability management: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerability management, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non … technical staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey More ❯
Employment Type: Permanent, Work From Home
Salary: £40,000
Posted:

Global Security Operations Center Analyst

Windsor, Berkshire, South East, United Kingdom
Centrica - CHP
efficiency. Proactively hunt for potential threats within the environment, leveraging threat intelligence and advanced analytics to identify and mitigate risks. Work closely with other cyber defence teams, including Intelligence, Vulnerability Management, Threat Hunting, and Purple Teams. Effectively communicate findings and recommendations to various stakeholders. Utilise your technical expertise to analyse telemetry related to incidents and identify appropriate investigation … in scripting or programming languages. Preferred experience dealing with incidents in various environments, including OT and ICS technologies. Preferred experience working with wider Cyber Defence teams, such as Intelligence, Vulnerability Management, Threat Hunting, and Purple Teams. Understanding of cyber security legislation and experience with information risk and security-related best practices, policies, standards, and regulations. What's in More ❯
Employment Type: Permanent
Posted:

THreat Intelligence Lead

North West, United Kingdom
Anson Mccade
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerability management programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerability management experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
Employment Type: Permanent
Posted:

THreat Intelligence Lead

United Kingdom
Anson Mccade
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerability management programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerability management experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

THreat Intelligence Lead

Glasgow, United Kingdom
Anson Mccade
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerability management programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerability management experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

THreat Intelligence Lead

Birmingham, United Kingdom
Anson Mccade
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerability management programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerability management experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

THreat Intelligence Lead

South West, United Kingdom
Anson Mccade
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerability management programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerability management experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

THreat Intelligence Lead

Bristol, United Kingdom
Anson Mccade
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerability management programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerability management experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Vulnerability Management
10th Percentile
£32,500
25th Percentile
£47,500
Median
£60,000
75th Percentile
£87,500
90th Percentile
£95,000