Vulnerability Management Job Vacancies

301 to 325 of 991 Vulnerability Management Jobs

Security Consultant (Security Operations / SOC)

Lincoln, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Assistant Director of Cyber Security

Chelmsford, England, United Kingdom
Hybrid / WFH Options
Daxis Web BV
leadership and over 9,000 users - working collaboratively across internal teams and over 100 partners and suppliers. Oversee governance, risk, compliance, and security operations including incident response, threat intelligence, vulnerability management, and penetration testing. Direct the selection, deployment, and maintenance of appropriate security technologies and processes to protect ECCs data and assets. You will be responsible for designing … a team of approximately 15, including six direct reports, fostering a culture of professionalism, learning, and service excellence. Experience Needed: Deep expertise in cyber security governance, compliance, and risk management within complex organisations. Strong strategic leadership experience across large scale organisations, with the ability to influence and communicate effectively at senior and political levels. A track record of developing More ❯
Posted:

Security Consultant (Security Operations / SOC)

Swindon, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Luton, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Belfast, Northern Ireland, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Warrington, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Bolton, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Security Consultant (Security Operations / SOC)

Hounslow, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Posted:

Senior Security Engineer

London, England, United Kingdom
Hybrid / WFH Options
S-RM
role in maintaining and evolving S-RM's information security. Key Responsibilities: Improve and implement development pipeline security features, such as SAST and DAST Manage, monitor and improve compliance, vulnerability management, threat intelligence, detection/prevention tools across a multi-cloud environment. Provide expert security design and engineering guidance on complex cloud security challenges and risks. Defining the … experience of the Software Development Life Cycle and Agile frameworks. Fostering a positive culture of security with end users, engineers, developers, product managers. Excellent communication, teamwork, presentation and stakeholder management skills. The successful candidate must have permission to work in London by the start of their employment. Our benefits We offer thoughtful, balanced rewards and support to help our More ❯
Posted:

Cyber Security Instructor

City of London, London, United Kingdom
Hybrid / WFH Options
FIND | Creating Futures
at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetration testing and vulnerability management Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why Join? Be at More ❯
Posted:

Cyber Security Instructor

London Area, United Kingdom
Hybrid / WFH Options
FIND | Creating Futures
at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetration testing and vulnerability management Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why Join? Be at More ❯
Posted:

Senior Security Operations Analyst

Manchester, England, United Kingdom
Hybrid / WFH Options
Smart DCC
share information, coordinate responses, and improve inter-team relationships. Previous experience within a Security Operations role. Exposure to key security technologies, such as IDS, Web content filters, AV, SIEM, Vulnerability Management, Firewalls, and awareness of their purpose in a layered security approach alongside analysing their outputs for security anomaly detection. In-depth understanding of the cyber threat landscape … applications such as AWS, Azure, Office 365, & Defender. Must have the ability to gain and hold HMG Security Clearance at “Security Check” (SC) level. 3 years plus security incident management experience. About the DCC: At the DCC, we believe in making Britain more connected, so we can all lead smarter, greener lives. That desire to make a difference is More ❯
Posted:

Cyber Threat Analyst – National Security West

Leeds, England, United Kingdom
Hybrid / WFH Options
BAE Systems
them, and triaging results independently. Having knowledge of attacker TTPs and APT groups, conducting in-depth research. Verifying and refining Threat Hunt queries based on results. Incident Response and Management experience. Ensuring high-quality Threat Hunt Reports and effective documentation. Providing analysis, context, and predictions in deliverables. Assessing and improving the client's threat maturity, developing and delivering improvements. … source research skills. High-level knowledge of Windows, Azure, networking, and cloud platforms. Non-Technical: Bachelor’s in Cybersecurity, Computer Science, or equivalent. Experience in SOC, Threat Intelligence, or Vulnerability Management. Strong communication skills for technical and non-technical audiences. Team player, self-motivated, and capable of mentoring. Desirable Qualifications: Degree in Cyber Security or related. SANS, CySA+, CREST More ❯
Posted:

Associate Cybersecurity Analyst

London, South East, England, United Kingdom
How to Job Ltd
payments security. Your Day-to-Day Alert Triage: Analyze SIEM and threat-intelligence feeds to spot anomalies. Threat Hunting: Use forensic tools to track indicators of compromise across networks. Vulnerability Management: Run scans, prioritize remediation tasks, and validate fixes. Incident Response Support: Coordinate with SRE and DevOps teams to contain breaches. Report & Recommend: Draft concise, actionable incident summaries More ❯
Employment Type: Full-Time
Salary: £36,000 - £43,000 per annum, Negotiable, OTE
Posted:

SOC Analyst Gates

United Kingdom
CyberNorth
and reporting incidents and providing cyber security metrics. Evaluating and determining if/when information security violations have occurred through examination of network or device logs, open-source research, vulnerability and configuration scan data, and user provided reports. Demonstrate a strong understanding of information security policies and doctrine, ability to draft, modify and create SOPs for use of other … years in a cybersecurity or SOC environment. Strong understanding of OSI model, incident response, and threat analysis. Proficient in SIEM tools (e.g., Splunk), IAM, server/network security, and vulnerability management. Familiarity with ISO 27001, NIST CSF, and general security frameworks. Effective communicator across all organizational levels; strong multitasking and organization skills. Experience with Linux systems; cloud knowledge is More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

L3 SOC Analyst - Systems Integrator

England, United Kingdom
Hamilton Barnes Associates Limited
more about this opportunity, feel free to reach out and apply today! Responsibilities: Monitor and analyse security events within the SOC, ensuring timely detection and response. Perform threat analysis, vulnerability assessments, and implement mitigation strategies. Develop and refine incident response playbooks and procedures. Conduct root cause analysis (RCA) for high-priority incidents to prevent recurrence. Collaborate with internal teams … of two years' experience in a SOC or managed security environment. Strong knowledge of network security (firewalls, IDS/IPS, VPNs). Proficiency in incident response, threat analysis, and vulnerability management. Experience working with SIEM tools for monitoring and event analysis. Understanding of malware analysis, forensic investigations, and endpoint security. Strong analytical and problem-solving skills. Excellent communication skills More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

L2 SOC Analyst - Telecommunications

London, England, United Kingdom
Hamilton Barnes Associates Limited
more about this opportunity, feel free to reach out and apply today! Responsibilities: Monitor and analyse security events within the SOC, ensuring timely detection and response. Perform threat analysis, vulnerability assessments, and implement mitigation strategies. Develop and refine incident response playbooks and procedures. Conduct root cause analysis (RCA) for high-priority incidents to prevent recurrence. Collaborate with internal teams … of two years' experience in a SOC or managed security environment. Strong knowledge of network security (firewalls, IDS/IPS, VPNs). Proficiency in incident response, threat analysis, and vulnerability management. Experience working with SIEM tools for monitoring and event analysis. Understanding of malware analysis, forensic investigations, and endpoint security. Strong analytical and problem-solving skills. Excellent communication skills More ❯
Posted:

Junior Cyber Operations Analyst with Security Clearance

Chantilly, Virginia, United States
Hybrid / WFH Options
American Systems Corporation
team. As a Junior Cyber Operations Analyst, you will gain hands-on experience across the full spectrum of enterprise Cyber Operations-including incident response, log monitoring and analysis, and vulnerability management. This position is hybrid. Responsibilities Collaborate with experienced engineers, work with cutting-edge cloud security technologies, and actively contribute to strengthening our organization's security posture. Monitor and … triage security alerts in a Security Operations Center (SOC) environment. Endpoint Detection & Response (EDR): Investigate and respond to endpoint alerts. Sandbox Detonation: Analyze suspicious files for potential malware. Vulnerability Scanning: Run scans, review results, and coordinate patching with relevant teams. Email Advanced Threat Protection: Investigate and respond to email security incidents. Information Protection: Support implementation and monitoring of data More ❯
Employment Type: Permanent
Salary: USD 65,700 Annual
Posted:

Software Security Engineer

Oxford, England, United Kingdom
Aurora Energy Research
risk. Ensure we are deploying solutions into a secure environment . Ensure we build solutions in alignment with our control requirements. Support on-going business-as-usual and champion vulnerability management. Provide internal security consultancy and lead on audit engagements, risk activities and project initiatives. Work closely with colleagues to ensure effective technology risk management. Work together . Collaborate More ❯
Posted:

Security Engineer - Vulnerability Management

London, England, United Kingdom
Spencer Rose Ltd
Security Engineer - Vulnerability Management London - 2 days a week on site £90,000 An impressive global media company is looking to hire a Security Engineer - Vulnerability Management to take ownership of vulnerability remediation across a cloud and on-prem environment. This business is going through a big technology transformation programme that is estimated to take … years. The successful Security Engineer - Vulnerability Management will drive and automate the vulnerability management programme across this business. This is a great opportunity for a passionate Security Engineer - Vulnerability Management to build out a remediation programme and collaborate with a variety of stakeholders at all levels of this international superbrand Security Engineer - Vulnerability Management Duties and Responsibilities The successful Security Engineer - Vulnerability Management will: Develop, implement, and maintain an automated and scalable vulnerability management program using Tenable and related tools. Create and enforce vulnerability management policies, scan configurations, and best practices, aligned to frameworks such as NIST or ISO 27001. Integrate vulnerability scanning and More ❯
Posted:

Security Support Engineer, Vulnerability Management and Remediation Operations

London, England, United Kingdom
Amazon
Security Support Engineer, Vulnerability Management and Remediation Operations Job ID: 2980442 | Amazon UK Services Ltd. Embark on a Mission to Fortify Amazon's Defenses as a Support Engineer with the Vulnerability Management & Remediation Operations team! Amazon Security is seeking an experienced and innovative Support Engineer specialising in cybersecurity to join our Vulnerability Management and … London, UK. The VMRO team is a global team that is responsible for assessing, detecting, and driving the remediation of vulnerabilities across the Amazon ecosystem. Key job responsibilities Support vulnerability detection campaigns by working closely with Campaign Owners to launch and continuously improve the quality of campaigns across Amazon. Assess and negotiate with customers to drive down security risk … in their environments. Collaborate with builder teams to implement security fixes and improvements. Understand technical details of vulnerabilities affecting Amazon's infrastructure, services, and applications. Review and analyse common vulnerability disclosures and assist in evaluating potential impacts. Help triage vulnerabilities and contribute to impact and detection logic assessments. Contribute to the development of automation of repetitive tasks. Actively participate More ❯
Posted:

Security Support Engineer, Vulnerability Management and Remediation Operations

London, United Kingdom
Amazon
Security Support Engineer, Vulnerability Management and Remediation Operations Job ID: Amazon UK Services Ltd. Embark on a Mission to Fortify Amazon's Defenses as a Support Engineer with the Vulnerability Management & Remediation Operations team! Amazon Security is seeking an experienced and innovative Support Engineer specialising in cybersecurity to join our Vulnerability Management and Remediation … London, UK. The VMRO team is a global team that is responsible for assessing, detecting, and driving the remediation of vulnerabilities across the Amazon ecosystem. Key job responsibilities - Support vulnerability detection campaigns by working closely with Campaign Owners to launch and continuously improve the quality of campaigns across Amazon. - Assess and negotiate with customers to drive down security risk … in their environments. - Collaborate with builder teams to implement security fixes and improvements. - Understand technical details of vulnerabilities affecting Amazon's infrastructure, services, and applications. - Review and analyse common vulnerability disclosures and assist in evaluating potential impacts. - Help triage vulnerabilities and contribute to impact and detection logic assessments. - Contribute to the development of automation of repetitive tasks. - Actively participate More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Vulnerability Analyst

London, England, United Kingdom
Hybrid / WFH Options
NCC Group
Position Title: Vulnerability Analyst Location: Manchester/London/Cheltenham/Hybrid Role Purpose: This is an exciting opportunity to join a dynamic security solutions team in which you will be responsible for the management and delivery of client security programs. As part of a passionate delivery team, you should have a strong passion for IT security and … a customer-centric approach to providing high-quality service to our clients. Solid experience of running Vulnerability Exposure Management programs is essential. Summary: This is an opportunity to work in a fun and challenging environment, using market leading security testing tools and platforms to provide security testing services to our large client base. You will play a key … department as well as assist with the development of new service lines offered by the company. Client Security Programs: Design and set up security programs tailored to client requirements. Vulnerability Scans: Conduct network and application vulnerability scans. Validation: Manually verify vulnerabilities identified in scans. Reporting: Write and deliver comprehensive client reports. Client Support: Work directly with clients on More ❯
Posted:

Information System Security Engineer with Security Clearance

Saint Petersburg, Florida, United States
Cyber Defense Technologies
Information System Security Engineer to execute the implementation of security standards to a diverse set of systems for Tampa, FL. An advanced understanding of engineering principles, as well as vulnerability, compliance, and patch management is required. A working understanding of the Radio Frequency spectrum is desired. Clearance Requirements: An active Secret clearance is required, TS/SCI preferred. … design, configuration, hardening, testing and monitoring of a wide variety of moderately complex Information System technologies independently or as part of a larger design team. • Performs secure engineering and vulnerability testing on information systems to include but not limited to: Physical and Virtual Operating Systems, Web Applications, Databases, and Networking Devices. Applies knowledge of current compliance standards and associated … streamline AO/DAO ATOs (authorization to operate) in accordance with current DOD and IC policy guidance • Implement security monitoring solutions as required to meet IA requirements for Risk Management Framework (RMF) as applies to systems and sensors allocated to regions/AORs as outlined by end customer & users. • Identify and mapping NIST 800-53 controls, and DISA Control More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Analyst Devi Technologies

London, England, United Kingdom
Devitechs
What You’ll Be Working On: ️ Monitoring network traffic and system activity to detect potential security threats ️ Analyzing security incidents and performing root cause analysis ️ Conducting vulnerability assessments and risk evaluations to identify weaknesses ️ Implementing security measures and controls to protect against data breaches and cyberattacks ️ Assisting in the development and implementation of security policies and procedures What We … or in a similar cybersecurity role ️ Strong knowledge of network security, firewalls, IDS/IPS, and endpoint security ️ Familiarity with security monitoring tools (e.g., SIEM, Splunk, Qualys) ️ Experience with vulnerability management, penetration testing, and incident response ️ Certifications such as CISSP, CISM, CompTIA Security+ or equivalent are highly desirable #J-18808-Ljbffr More ❯
Posted:
Vulnerability Management
10th Percentile
£39,400
25th Percentile
£50,000
Median
£60,000
75th Percentile
£78,750
90th Percentile
£92,500