Vulnerability Management Job Vacancies

276 to 300 of 993 Vulnerability Management Jobs

Information Security Analyst

Nechells, England, United Kingdom
JR United Kingdom
tooling is optimised Provide advice and support to business units on security best practice and control implementation What We’re Looking For Hands-on experience with security tooling (EDR, vulnerability scanning, access control) Familiarity with Security frameworks such as NIST, PCI-DSS, and GDPR Experience working with Microsoft environments (O365, Azure) Clear communicator, able to engage with both IT … role, and wants to take on broader responsibilities Has been the security point-person in an IT team, leading on patching or endpoint protection Has hands-on experience with vulnerability management tools like Tenable, and is ready to play a bigger role in shaping how security tools are implemented and optimised across the business. This is a chance More ❯
Posted:

Information Security Manager - Corporation

London, England, United Kingdom
Hybrid / WFH Options
Nest pensions
at Nest pensions Role Overview We're looking for a pragmatic, risk focussed Information Security Manager to work within Nest and maintain our ISO 27001 certified corporation Information Security Management System (ISMS). We sit in the second line of defence and advise the business on security risks, incidents, audits, assurance and the implementation and monitoring of security controls … that protects Nest. You'll have a solid background in information security management systems, technology and love communicating technical concepts to non-technical people. Please note the minimum criteria for this role is: Practical experience of operating certified ISMS using ISO 27001/2, NIST CSF and other security standards in the design and management of information security … to audit and evidence compliance with security policies, standards etc. Understanding and experience of various Information Security domains including Security Architecture, Information Security Governance, Network Security, Data Protection, Risk Management, Identity & Access Management, Vulnerability Management, Anti-Malware, Mobile Device Management and Cloud Security We are open to discussing working patterns. We welcome all internal applicants More ❯
Posted:

Microsoft Security Sentinel Automation and Detection Engineer

Cambridge, Cambridgeshire, England, United Kingdom
Hays Specialist Recruitment Limited
proficient in automation and orchestration tools (e.g., SOAR platforms, scripting languages like Python, PowerShell, KQL) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Key Skills and Experience Experience contributing to large-scale, sprint-based, security automation and detection engineering projects in a SOC/Cyber Defense or similar … Defence Operation's efficiency, scalability, and incident response capabilities.Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management.Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve operational efficiency.Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to build More ❯
Employment Type: Contractor
Rate: £550 - £750 per day
Posted:

Cyber Security Manager - Technical Delivery

Milton Keynes, England, United Kingdom
Mphasis
Functional Domain Responsibility:  Previous work experience managing below three or more Cybersecurity delivery engagements o Audit principles and associated compensating controls o Enterprise Security architecture o Cloud Security o Vulnerability Management o E-Mail security o Web Application Firewall o Cyber Incident Management (CERT) Delivery Operations & Excellence:  Manage & maintain steady state global delivery operations (Green)  Manage Operational … Service Quality Review governance  Provides leadership & direction to Delivery team in complex problems and creates innovative solutions  Facilitates Business Continuity for the account during regional/location outages Team Management  Responsible for Performance Appraisal for direct reports  Support Delivery Head to manage team functions viz. resource selection, allocation, availability planning, effort estimation, utilization & attrition management  Tracking individual and …/weekly basis and continually improve them efficiently and effectively  Ensure that the productivity goals for the team are met, including service level, utilization, and customer satisfaction Customer Relationship Management  Acts as a trusted security advisor to the clients  Interlock with Management to define operations strategy and action plan based on Customer feedback & CSAT result  Analyzing customer requirements More ❯
Posted:

Lead Software Security Engineer

London, United Kingdom
BDO
world. We work with the companies that are Britain's economic engine - ambitious, entrepreneurially-spirited and high growth businesses that fuel the economy - and directly advise the owners and management teams that lead them. We'll broaden your horizons To ensure our services and applications are fit for the modern market, our IT team collaborates with every department. They … Lead Software Security Engineer to join our team. You will have a strong background in software development, security, and operations. This role is required to support the Digital Product Management team in embedding security requirements and best practices into new Digital Products and Services. You will work closely with the Digital Product Management and IT Security teams to … such as Powershell, YAML, JASON, etc. Collaborate with development teams to integrate security best practices into the secure software development lifecycle (SDLC) and ensure products are built securely Oversee vulnerability management and remediation efforts, including leading responses to pen test findings and security assessments Experience conducting risk assessments and threat modelling for software development and advise where necessary More ❯
Employment Type: Permanent
Posted:

Cyber Security Analyst

London, England, United Kingdom
ASA RECRUITMENT
security data. Drive training and awareness, leading phishing simulations and crafting internal communications to build security culture. Leverage threat intelligence to conduct proactive threat hunting and surface risks. Manage vulnerability and configuration scanning tools, prioritising findings and collaborating with technical teams for remediation. Conduct regular access control reviews to identify and report excessive permissions. Investigate and troubleshoot complex security … strong experience preferred) Strong analytical and troubleshooting ability — comfortable solving problems from first principles. Proven operational cyber security experience at enterprise scale. Hands-on expertise in cyber incident response, vulnerability management, and threat detection. A self-starter with excellent communication skills and a proactive approach to continuous improvement. Desirable Qualifications: Security certifications (SANS, vendor-based) ITIL certification This More ❯
Posted:

Security Analyst

Bristol, England, United Kingdom
myGwork - LGBTQ+ Business Community
continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role Monitor security alerts and events using Splunk and other SIEM (Security Information and Event Management) tools. Analyse security incidents to determine their impact and severity and conduct thorough investigations of security breaches and incidents. Develop and implement incident response plans and procedures. Collaborate with … other IT and security teams to resolve security issues. Maintain and update security documentation and incident reports and perform regular security assessments and vulnerability scans. You can bring your whole self to work. At Capgemini building an inclusive future is part of everyday life and will be part of your working reality. We have built a representative and welcoming … environment, for everyone. Your Skills And Experience Proven experience as a SOC Analyst in a similar cybersecurity role. Experience with Flexera for vulnerability management Strong knowledge of Splunk or other industry standard SIEM tool for security monitoring and analysis. Familiarity with security technologies and understanding of network protocols, firewalls, and intrusion detection/prevention systems. Knowledge of Threat More ❯
Posted:

Senior Product Security Engineer

London, England, United Kingdom
Trainline
and static/dynamic security testing (SAST/DAST). Security Tooling And Automation Implement and maintain security tools used in the development and deployment processes (e.g., scanning tools, vulnerability management systems, SAST, DAST, ASPM). Automate security processes to streamline secure development and operational workflows. Incident Detection And Response Work with engineering and platform teams to detect … Expertise Deep understanding of identifying, assessing, and mitigating security risks in application designs, code, and deployed products. Experience managing and using security testing tools such as SAST, DAST, and vulnerability scanning solutions. Strong grasp of secure coding practices and proficiency in integrating security into the Software Development Lifecycle (SDLC). Technical Knowledge And Implementation Experience Direct experience with threat … Demonstrated ability to seamlessly integrate secure development practices into SDLC/SSDLC workflows. Skilled in implementing technical security controls and driving security automation within CI/CD pipelines. Risk Management And Compliance Knowledge Experience with identifying and managing security risks, including conducting risk assessments. Working knowledge of regulatory compliance standards and frameworks. More Information Enjoy fantastic perks like private More ❯
Posted:

Security Engineer

London, England, United Kingdom
Direct Line Group
for your skills but encouraged to build upon them and empowered to do your absolute best. Our CISO function is created by Cyber Defence Centre, Business Resilience, Privacy & Information Management, Strategy & Operating Office and Security Design, Innovation & Enablement. What we look for We are looking for a Security Engineer who will provide security-related technical and functional support for … for securing DLG's environments in line with compliance commitments. Ensure security technical platforms are configured to optimise the overall security offered to DLG. Improve Security Information and Event Management (SIEM) coverage of DLG's overall environment. Make sure that all changes to the production environment have been reviewed and approved. Communicate and build relationships at various levels with … routing, TCP/IP, Internet protocols, and network security management. Security Technologies : Expertise in Web Application & Network Firewalls, IDS/IPS, File Integrity Monitoring, SIEM, Advanced Endpoint Protection. Security Management : Advanced skills in vulnerability management, event management, application security, incident response, forensics, and encryption. Technical Proficiency : Strong foundation in algorithms, data structures, databases, networks, and tool More ❯
Posted:

Cyber Security Engineer

London, United Kingdom
Hybrid / WFH Options
Ashdown Group
knowledge of the UK Telecoms Security Act would be advantageous to your application. You will develop and maintain the cyber security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Consultant (Security Operations / SOC)

Wakefield, England, United Kingdom
Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Posted:

Offensive Security Tester – Red Team

London, England, United Kingdom
Euroclear
critical financial infrastructure, the protection of Euroclear information and assets is fundamental to the company’s business. Security is at the core of our services, firmly embedded in the management systems and processes of the company. You will be joining our CISO division in charge of putting in place the required controls to adequately and effectively protect our information … assets. You will join the Offensive Security Center who manage and coordinate: Penetration testing Red team Exercises Purple team Exercises Static Code Analysis Vulnerability Management As a member of the Red Team, you will play a crucial role in safeguarding our organization's digital assets by simulating real-world cyber-attacks and identifying vulnerabilities in our systems. This More ❯
Posted:

Senior Information Systems Security Officer with Security Clearance

Arlington, Virginia, United States
Gemini Industries Inc
Gemini Industries Inc. provides technical, management and operations services to support National Security projects. We provide rapid response to the critical needs of our customers and those they serve. We perform analyses and develop operations plans to anticipate and prepare for the future. And we deliver advanced technology to improve our customer's success in executing its mission. Gemini … but are not limited to: •Assist with coordination of cybersecurity related processes and activities for AAZ Information Systems and related interfaces. The processes include: bare not limited to, Risk Management Framework (RMF) and system authorization, Cyber Incident Handling, System Life Cycle Management Processes (e.g. Engineering Change and Configuration Management), Vulnerability Management, Malware Protection, Security Assessments … cybersecurity assessments, security impact analysis and system authorization of AAZ information Systems per ISSM guidance. •Assist with maintaining an Information Assurance Program and ensure compliance with DODO 8510.01 - Risk Management Framework (RMF) for DOD IT. • Develop system security and information assurance documentation consistent with the standards above to support system assessment and authorization, as well as interim authority and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Security Operations Analyst

Dundee, Scotland, United Kingdom
NHS National Services Scotland
the CSOC team, they will develop and improve operationally relevant KPIs and KRIs and associated reporting mechanisms that are suitable to evidence performance to the CCoE and NSS DaS management team, and that demonstrate value to our stakeholders. During an active incident, the post holder is required to provide level-headed and hands-on response actions alongside the CSOC …/7, 365 days a year Delivering and operating IT infrastructure (networks, servers, desktop, cloud, etc.) Working on or leading security operations functions, including: Cyber Security Incident Response and Management; Monitoring & Alerting; Vulnerability Management; Threat Intelligence; Security Architecture Acting as a significant technical authority within the information and cyber security specialist area Developing, designing, and implementing new More ❯
Posted:

Assistant Director of Cyber Security

Chelmsford, Essex, South East, United Kingdom
Hybrid / WFH Options
Keystream Group Limited
leadership and over 9,000 users - working collaboratively across internal teams and over 100 partners and suppliers. Oversee governance, risk, compliance, and security operations including incident response, threat intelligence, vulnerability management, and penetration testing. Direct the selection, deployment, and maintenance of appropriate security technologies and processes to protect ECCs data and assets. You will be responsible for designing … a team of approximately 15, including six direct reports, fostering a culture of professionalism, learning, and service excellence. Experience Needed: Deep expertise in cyber security governance, compliance, and risk management within complex organisations. Strong strategic leadership experience across large scale organisations, with the ability to influence and communicate effectively at senior and political levels. A track record of developing More ❯
Employment Type: Permanent, Work From Home
Posted:

Security Consultant (Security Operations / SOC)

Basildon, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

London, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Chesterfield, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Telford, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Shrewsbury, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Ipswich, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Worcester, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Chester, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Northampton, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Lincoln, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:
Vulnerability Management
10th Percentile
£39,400
25th Percentile
£50,000
Median
£60,000
75th Percentile
£78,750
90th Percentile
£92,500