Vulnerability Management Job Vacancies

51 to 75 of 1,281 Vulnerability Management Jobs

Head of Information Security

Manchester, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
Board Communicate the information security strategy to relevant parties, as well as developing supporting policies and procedures required to meet the strategy Develop, maintain, and expand the Cyber Risk Management Framework as part of the overall Information Security Management System (“ISMS”) Responsible for the Company’s information security capabilities, including the technical training and awareness of colleagues, ensuring … containment and mitigation activities, as well as preparing for incidents by running threat simulations, tabletop and red team exercises Assess emerging and potential security threats using the Cyber Risk Management Framework and act proactively to mitigate relevant threats End-to-end vulnerability management across the hybrid cloud environment Manage security toolset, including managing the relationship with the … GDPR, etc. Good communication and interpersonal skills, with the ability to effectively communicate security-related questions to technical and non-technical stakeholders (employees, customers, and/or partners) Project management skills, with the ability to manage projects such as processes implementation and improvement, security systems implementation Ability to collaborate cross-functionally and influence stakeholders at all levels of the More ❯
Posted:

Cyber Security Analyst

London, England, United Kingdom
Boston Hale
breakfast toast Responsibilities Security Monitoring & Incident Response: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. Vulnerability Management Tools: Conduct regular vulnerability assessments, prioritize and remediate issues, and stay updated on emerging threats. Policy & Compliance Support: Help develop and enforce security policies and procedures More ❯
Posted:

Head of Information Security

Altrincham, England, United Kingdom
Hybrid / WFH Options
Heywood Limited
Board Communicate the information security strategy to relevant parties, as well as developing supporting policies and procedures required to meet the strategy Develop, maintain, and expand the Cyber Risk Management Framework as part of the overall Information Security Management System (“ISMS”) Responsible for the Company’s information security capabilities, including the technical training and awareness of colleagues, ensuring … containment and mitigation activities, as well as preparing for incidents by running threat simulations, tabletop and red team exercises Assess emerging and potential security threats using the Cyber Risk Management Framework and act proactively to mitigate relevant threats End-to-end vulnerability management across the hybrid cloud environment Manage security toolset, including managing the relationship with the … GDPR, etc. Good communication and interpersonal skills, with the ability to effectively communicate security-related questions to technical and non-technical stakeholders (employees, customers, and/or partners) Project management skills, with the ability to manage projects such as processes implementation and improvement, security systems implementation Ability to collaborate cross-functionally and influence stakeholders at all levels of the More ❯
Posted:

Security Architect

Thornbury, Gloucestershire, United Kingdom
Applicable Limited
to support Security Consulting 'go to market' propositions and service offerings. Leading in the development and presentation of compelling client proposals collaborating with teams across our business. Strong stakeholder management and relationship building skills at senior levels that will enable consensus building in the shaping of secure client solutions Shaping, leading and delivering value through security advisory consultancy and … through guiding secure transformational delivery engagements. Providing security expertise across security standards and accreditations, measure and control the effectiveness of the security controls framework and maintain the Information Security Management System. Deriving and delivering documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies. Standards and guidelines Assiting with the identification … of identified risks and emerging cyber security vulnerabilities and threats. The subsequent analysis to quantify and lead risk mitigation plans Work with Service Management to ensure that partners and suppliers adhere to agreed standards, policies and verify/evidence appropriate compliance and security KPIs Work closely with 1st, 2nd and 3rd lines of defence on all matters relating to More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Manager

Cardiff, Wales, United Kingdom
Hybrid / WFH Options
Creditsafe
intelligence accessible to all businesses big and small but most importantly, opened up new avenues of data intelligence for businesses with machine learning, AI and connected data. From risk management through to opportunity identification, our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger, grow faster and thrive. THE … RESPONSIBILITIES • Manage the day-to-day activities of the Security Operations Centre (SOC) and Security Engineering teams. • Produce reports on key security metrics across Security Operations, Application Security and Vulnerability Management. • Conduct regular 1-2-1s, Performance Reviews, and Personal Development Plans of team members. • Develop and implement security policies, processes, and procedures to comply with SOC2 and … ISO27001 standards. • Participate in Steering groups for Identity and Access Management and Data Protection • Setting and aligning team objectives and tasks to help achieve the overall Information Security and Compliance function’s strategy and goals • Participate in Quarterly Business Reviews with our security tooling vendors. Providing feedback to the vendors on product features, feature requests, SLA and reporting requirements More ❯
Posted:

Information Security Manager

Newport, Wales, United Kingdom
Hybrid / WFH Options
JR United Kingdom
intelligence accessible to all businesses big and small but most importantly, opened up new avenues of data intelligence for businesses with machine learning, AI and connected data. From risk management through to opportunity identification, our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger, grow faster and thrive. THE … RESPONSIBILITIES • Manage the day-to-day activities of the Security Operations Centre (SOC) and Security Engineering teams. • Produce reports on key security metrics across Security Operations, Application Security and Vulnerability Management. • Conduct regular 1-2-1s, Performance Reviews, and Personal Development Plans of team members. • Develop and implement security policies, processes, and procedures to comply with SOC2 and … ISO27001 standards. • Participate in Steering groups for Identity and Access Management and Data Protection • Setting and aligning team objectives and tasks to help achieve the overall Information Security and Compliance function’s strategy and goals • Participate in Quarterly Business Reviews with our security tooling vendors. Providing feedback to the vendors on product features, feature requests, SLA and reporting requirements More ❯
Posted:

Mandarin Speaking - IT Security Engineer

London, England, United Kingdom
dnevo Partners
London, England, United Kingdom 1 week ago City Of London, England, United Kingdom £45,000.00-£50,000.00 2 weeks ago London, England, United Kingdom 2 hours ago IT Security & Vulnerability Engineer - Investment Bank - 654/day GBP Network and Information Security Engineer London, England, United Kingdom $140,000.00-$180,000.00 5 days ago London, England, United Kingdom 1 week … Kingdom 1 week ago Greater London, England, United Kingdom 3 weeks ago London, England, United Kingdom 1 day ago London, England, United Kingdom 1 month ago Information Security Engineer - Vulnerability Management London, England, United Kingdom 1 week ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help More ❯
Posted:

Information Security Manager

London, England, United Kingdom
Hays
AD policy. Compile and develop cybersecurity policies and procedures, conduct regular reviews. Application Security: Ensure the security of applications by implementing secure coding practices, conducting code reviews, and performing vulnerability assessments. Information Security: Protect sensitive information by developing and enforcing security policies and procedures. Maintain the SIEM tools, make sure security logs generated from security systems and devices are … MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional; CCNA/CCNP Experience with security tools and technologies such as intrusion detection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. If you're interested in this role, click 'apply now' to forward an up-to More ❯
Posted:

Senior Security Engineer London

London, United Kingdom
Hybrid / WFH Options
Bondsmith Savings Ltd
is for you. What you will do: Develop and implement proactive security strategies, policies, and procedures to protect our systems, networks, and data assets. Lead regular security assessments, including vulnerability scans and penetration tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents … the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong capability … in risk assessment, vulnerability management, and data informed decision-making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in scripting and programming (i.e., Python More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Engineer

Cambridge, Cambridgeshire, United Kingdom
Hybrid / WFH Options
RealVNC
our external SOC provider, to continuously monitor systems for security breaches and anomalies. Ensure that alerts, escalations, and incidents from the SOC are reviewed, validated, and appropriately handled internally. Vulnerability Management and Microsoft Defender Portal analysis: Administer and optimize Microsoft Defender for Endpoint, Defender for Identity and Defender for Cloud. Liaising with our IT team to ensure log … the environments for vulnerabilities, mitigate findings and further harden the infrastructure. Working with the Security Team, IT Team and CIO on the RealVNC cybersecurity roadmap. Threat Intelligence and Risk Management: Utilise third-party threat intelligence to identify and mitigate emerging threats and vulnerabilities. Prepare detailed reports and dashboards on security metrics, trends, and incidents using Microsoft Defender. Communicate security … status, risks, and issues to senior management and relevant stakeholders. Reporting and Communication: Prepare detailed reports and dashboards on security metrics, trends, and incidents using Microsoft Defender. Communicate security status, risks, and issues to senior management and relevant stakeholders. Provide regular updates on the progress of security initiatives and the overall security posture of the organization. Requirements: You More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security & Compliance Senior Manager

Newbury, England, United Kingdom
Vodafone
complicated technical issues to audiences of varying technical understanding. Ensure that all Vodafone IoT products and services launched undergo proper Secure by Design processes, by maintaining a proper Risk Management and Compliance across the company. The primary focus is protecting Vodafone and our customers (via products and services that they use). Deliver benefits of stronger control assurance and … Knowledge and understanding of relevant legal and regulatory requirements, such as GDPR, Sarbanes-Oxley Act (SOX), TISAX, Payment Card Industry/Data Security Standard Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, and COBIT Proficiency in security technologies and tools such as firewalls, IDS/IPS, SIEM, WAF, Vulnerability Management, certificates More ❯
Posted:

Consultant Penetration Tester

London, United Kingdom
Applicable Limited
manage multiple engagements effectively. Current CREST CRT certification or higher is required. Eligibility for SC Clearance is required. Desirable Skills: Experience with Breach Attack Simulation tools and threat-informed vulnerability management. Knowledge of Risk Management frameworks and their integration with threat intelligence. Hands-on experience with cloud security reviews (AWS, Azure, GCP) considering cloud-specific threats. Familiarity with More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Insider threat hunter with Security Clearance

Atlanta, Georgia, United States
TEKsystems c/o Allegis Group
controls to reduce unauthorized data transfers and improve visibility across cloud and on-prem environments. Conduct behavioral analysis and threat hunting using IOCs, TTPs, and threat intelligence feeds. Perform vulnerability assessments and risk analysis on high-value systems and personnel. Support compliance with NIST 800-53, DFARS , CMMC, and other regulatory frameworks. Engineer and maintain cybersecurity controls across IT … e.g., Code42, DTEX, UEBA platforms). Familiarity with NIST, DFARS, CMMC, and insider threat program frameworks (e.g., NISPOM, EO 13587). Strong understanding of incident response, threat hunting, and vulnerability management. Excellent communication skills and experience working cross-functionally with HR, legal, and compliance teams. One or more relevant certifications: CISSP, GCED, GCIH, GCFA, CEH, CySA+, or equivalent. Preferred More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Vulnerability Assessment Analyst

London, UK
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active customers in over 700 business locations. Due to business … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very … Cyber Security Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic More ❯
Posted:

Vulnerability Assessment Analyst

City of London, London, United Kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active customers in over 700 business locations. Due to business … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very … Cyber Security Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic More ❯
Posted:

Vulnerability Assessment Analyst

London, England, United Kingdom
JR United Kingdom
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) - 18 months Our client is a globally recognized, successful bank providing retail and corporate financial services/products. With over 10 million active customers across more than 700 locations, we are seeking an experienced Senior Compliance Officer, Monitoring & Assurance. Please note: This is a hybrid role with 3 days … Science, Cyber Security, or related certifications (CISM, CISSP preferred). Understanding of IT Security principles, standards, and regulations (ISO 27001, NIST, CIS, PCI DSS, GDPR). Experience with Patch Management Applications, EDR/XDR systems, Antivirus, NAC (e.g., Forescout). Knowledge of Vulnerability Scanning Tools (e.g., Tenable One, Qualys). Familiarity with vulnerability scoring systems (CVSS/… CMSS). Incident Response & Forensic Management skills. Support experience with Azure, Oracle Cloud Infrastructure. Support experience with Windows and Linux administration, CE+, ISO27001. Knowledge of Email and Information Security Filtering/Monitoring solutions. Hands-on support experience with Linux and Mac administration. Understanding of Windows and Linux patching processes. #J-18808-Ljbffr More ❯
Posted:

Cyber Security Analyst

London, England, United Kingdom
Hybrid / WFH Options
Techwaka
Title: Security Analyst Location: Remote Job Summary: We are seeking a skilled and experienced Security Analyst to join our team. The ideal candidate will have a strong background in vulnerability management and experience working with Security Information and Event Management (SIEM) tools such as Microsoft Sentinel. You will play a critical role in ensuring the security of … our cloud environments, infrastructure, and business units by identifying, analyzing, and addressing vulnerabilities and threats. Key Responsibilities: Vulnerability Management: Develop, implement, and operate vulnerability management capabilities using tools like Tenable One. Deploy, configure, and manage vulnerability assessment tools (e.g., Tenable, NCSC's Active Cyber Defence Toolkit) and Attack Surface Management tools. Deliver a seamless … vulnerability management service across infrastructure and business units, ensuring the effectiveness of security measures. Threat Analysis: Utilize various sources of information to identify, analyze, and report on relevant threats and vulnerabilities. Continuously monitor and assess the threat landscape to adjust security measures accordingly. SIEM and EDR: Implement and manage SIEM tools such as Microsoft Sentinel to monitor and More ❯
Posted:

Cyber Security Analyst

London, England, United Kingdom
Insight Investment
Security operation's function is responsible for the day-to-day provision of enterprise cyber security services to support the business. These services include all aspects of Cyber Risk Management, implementation and maintenance of technical security controls, vulnerability and patch management and operate effective incident management and cyber investigations. The department’s key objective is to … support the operation of cyber security controls and processes within Insight Investment in line with cyber security risks and the cyber security policies and standards. This includes Identity & Access Management (IAM), PAM security monitoring, cloud security, scheduled security checks, security monitoring working with the MSSP (SIEM and other), security incident management, pen-testing. vulnerability management and … reporting. Role Responsibilities • Developing a familiarity with new tools and best practices for security operations • Defining, implementing and maintaining operational security processes • Reviewing and maturing the Identity and Access Management process in line with industry best practice • Reviewing incoming SOC requests/incidents • Assisting in the investigation of SIEM alarms, reported by the MSSP and performing on call once More ❯
Posted:

Cybersecurity Risk Analyst

London, UK
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active customers in over 700 business locations. Due to business … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very … Cyber Security Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic More ❯
Posted:

Cybersecurity Risk Analyst

City of London, London, United Kingdom
Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active customers in over 700 business locations. Due to business … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very … Cyber Security Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic More ❯
Posted:

Head of Cyber Threat Exposure

Central London, London, England, United Kingdom
Hybrid / WFH Options
Bupa UK
yet profound: to help people live longer, happier, healthier lives, and to make a better world. As Head of Cyber Threat Exposure, you’ll play a crucial role in vulnerability management and offensive activities across Bupa. You’ll provide threat-led cyber security leadership, subject matter expertise, oversight, E2E process design and implementation, and coordination of vulnerability management and offensive security servicesacross all technology in Bupa. How you’ll help us make health happen Lead a team of technical security experts to drive a continuous ecosystem for managing vulnerabilities and offensive security to limit Bupa’s exposure from both strategic and tactical threats. End to end management and delivery of security services including penetration … and reporting capabilities leveraging threat intelligence and proactively identify, prioritise, and remediate vulnerabilities and threat exposures Ensure that all technology, cloud services and third-party solutions comply with defined vulnerability management and penetration testing requirements. Act as Bupa’s subject matter expert on vulnerability impact and risk, providing guidance on root cause and managing the full lifecycle More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

IT Security Manager ›

Southampton, England, United Kingdom
Aztec
systems. This position involves managing security operations, implementing security measures, and leveraging Microsoft Azure’s security features to safeguard the organization’s data and infrastructure. Key Responsibilities: Security Operations Management: Be the Technical Expert to support and advance the objectives of IT Security and the wider group In conjunction with the leadership team, develop and implement security policies, procedures … and protocols Actively engaged in continuous monitoring and protection of networks, systems, and applications Technical Security Implementation: Design, implement and support new and existing security solutions. (Privileged Access Management, Vulnerability Management, Threat Intelligence, etc) Expert in Microsoft Azure’s security tools and services. (Entra, Privileged Identity Management, conditional access, Microsoft defender, Sentinel, etc) Perform security input … and guidance on tools being adopted within the organisation. Oversee and assess the outputs of the vulnerability management platforms to effectively identify and mitigate vulnerabilities Ensure documentation of all solutions and designs are up to date, including technical design documents and associated policies, procedures and processes Azure Security Management: Utilize Microsoft Azure’s security features, including Azure More ❯
Posted:

GRC - Cyber Assurance and Risk Lead

London, England, United Kingdom
NTT DATA
to GRC challenges, applying agile methodologies to adapt to new regulations, compliance requirements and business change Advise on and foster continuous improvement and effectiveness of GRC processes, driving improved management information to better allow appropriate prioritisation and risk based decisions Lead initiatives that build a culture of accountability and responsibility across engagements Enhance governance processes and advise on how … good practice (including Secure by Design) Providing security expertise across security standards and accreditations, measure and control the effectiveness of the security controls framework and maintain the Information Security Management System. Deriving and delivering documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies. Standards and guidelines Assiting with the identification … of identified risks and emerging cyber security vulnerabilities and threats. The subsequent analysis to quantify and lead risk mitigation plans Work with Service Management to ensure that partners and suppliers adhere to agreed standards, policies and verify/evidence appropriate compliance and security KPIs Work closely with 1st, 2nd and 3rd lines of defence on all matters relating to More ❯
Posted:

Information Security Engineer

London, England, United Kingdom
Hybrid / WFH Options
watchTowr
some of the world's largest organisations, our mission is to enable organisations to continuously understand how an attacker would successfully compromise their business-with cutting-edge Attack Surface Management and Continuous Automated Red Teaming technology. watchTowr was named within Gartner's Emerging Tech Impact Radar report in 2023, in Gartner's Innovation Impact report for ASM in … security programme. Sounds great-what will I do? This role involves: Security Architecture in the Cloud : Designing and implementing secure cloud infrastructures, ensuring robust protection against potential threats. Endpoint Management and Administration : Overseeing the deployment, configuration, and maintenance of endpoint security solutions to safeguard all devices within the organisation. Vulnerability Assessment and Management : Conducting regular vulnerability … cloud platforms (AWS), including the design and implementation of security architectures and controls. Endpoint Security : Hands-on experience with endpoint protection solutions, ensuring devices are safeguarded against potential threats. Vulnerability Management : Proficiency in conducting vulnerability assessments using industry-standard tools and methodologies, and managing remediation processes. Compliance and Security Controls : Familiarity with implementing security controls aligned with More ❯
Posted:

IT Operations Platforms and Security Lead

London, England, United Kingdom
Jas Gujral
IT Operation s Platforms and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation’s IT operations, ensuring the stability, continuity, security, and efficiency of its technology … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … and systems, driving transformative operational change, enhancing IT processes and ensuring compliance with governance bodies and industry regulations. Due to the nature of the role, complexity Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection More ❯
Posted:
Vulnerability Management
10th Percentile
£40,000
25th Percentile
£50,000
Median
£60,000
75th Percentile
£78,750
90th Percentile
£92,500