London, England, United Kingdom Hybrid / WFH Options
Starling Bank
from home, that's to be agreed upon between you and your manager. About the Role We are seeking a highly motivated and experienced Vulnerability Manager to lead a growing vulnerability management team. A successful candidate will work with the team to analyse emerging vulnerabilities provided by threat … intelligence sources and penetration testing. The vulnerability manager will collaborate with various technology and engineering teams to share vulnerability findings, provide guidance, and assist through the remediation process. This person will help present this information in a simple digestible format, and coordinate remediation and mitigation efforts with teams … across remote and office locations. There will be opportunities to guide continual improvement of the vulnerability management process. Responsibilities Lead a team of information security professionals to: Assess, investigate and provide guidance on emerging vulnerabilities, incorporating information from threat intelligence sources, internal software and infrastructure scans. Collate and prioritise more »
cyber risk exposure, providing meaningful risk advice and mitigations, reports to stakeholders Ensure the security of the organisations network infrastructure including managing firewalls, using vulnerabilityscanning, port monitoring tools and resolving security related incidents. Lead the design, implementation, testing and maintenance of WAN and LAN network solutions Manage … concepts required in the role including LAN, WAN, WiFi, data-centre networks, unified comms SIEM and IPS/IDS technologies and toolset used for vulnerabilityscanning including Nessus Cloud computing including IaaS, PaaS and SaaS. Core network skills to include, routing (IS-IS, BGP, MPLS, VRF's etc more »
Brecon, Powys, Wales, United Kingdom Hybrid / WFH Options
Morgan Hunt UK Limited
reporting to senior stakeholders, driving automation across processes and reporting where possible and ensuring the security of the network infrastructure including managing firewalls, using vulnerabilityscanning, port monitoring tools and resolving security related incidents. Experience and Skills: * Previous public sector experience is preferred * Experience of designing and implementing … reporting to senior stakeholders, driving automation across processes and reporting where possible and ensuring the security of the network infrastructure including managing firewalls, using vulnerabilityscanning, port monitoring tools and resolving security related incidents. Experience and Skills: * Previous public sector experience is preferred * Experience of designing and implementing more »
detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerabilityscanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA … organization. Participates in change management meetings and provides expert input to ensure security is maintained. Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering. Ability to manage and continuously improve upon vulnerability management program. Ability more »
of sensitive data. This is a contract position offering a competitive daily rate and the opportunity to work remotely. Key Responsibilities Implement and maintain vulnerability management programs and processes. Identify, assess, and prioritize vulnerabilities within the company's technology infrastructure. Perform regular scans, audits, and penetration testing to identify … potential weaknesses. Create reports and provide insights to stakeholders regarding vulnerability status and remediation strategies. Collaborate with cross-functional teams to address vulnerabilities and implement security controls. Maintain up-to-date knowledge of emerging security threats and industry best practices. Participate in incident response and provide guidance in the … event of a security breach. Job Requirements Significant experience in vulnerability management, including vulnerability assessment, penetration testing, and remediation. Strong knowledge of vulnerabilityscanning tools such as Nessus, Qualys, or similar. Understanding of industry frameworks and standards, such as OWASP, NIST, and CVSS. Ability to analyze more »
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Intaso
Interviews available immediately Intaso’s long standing client are seeking a dynamic individual to join their Security Operations team as the Security Vulnerability Manager, a pivotal role within their organization. This position will focus on identifying, monitoring, analysing, and facilitating the remediation of vulnerabilities across their systems. Key Responsibilities … Develop and document a comprehensive vulnerability management strategy aligned with stakeholder and business need Create intuitive reporting and dashboarding mechanisms to convey threat and risk profiles associated with vulnerabilities to stakeholders Ensure regular vulnerability scans cover all IT and OT assets, maintaining up-to-date coverage. Collaborate with … IT and OT asset owners to execute vulnerability and compliance scans in a controlled manner. Partner with both technical and non-technical stakeholders to devise effective mitigation plans for identified vulnerabilities. Lead cross-functional teams in responding to high-risk or complex vulnerabilities, leveraging technical expertise. Stay informed about more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
and management of Azure PAAS database technologies (e.g. Azure SQL) of hardening IT infrastructure based on security audits, standards and industry best practice (e.g. vulnerabilityscanning, Penetration testing and ISO27001/17/18). more »
management of Azure PAAS database technologies (e.g. Azure SQL) Experience of hardening IT infrastructure based on security audits, standards and industry best practice (e.g. vulnerabilityscanning, Penetration testing and ISO27001/17/18). more »
West End, London, United Kingdom Hybrid / WFH Options
Eligo Recruitment Ltd
IT audits, risk assessments, and ensure compliance (ISO27001, SOC2, Cyber Essentials+), and formulate IT policies. IT Security: Manage malware, AV, password security, MFA, SSO, vulnerabilityscanning, penetration testing, and encryption. Device Management: Handle Mobile Device Management (MDM) using Kandji, Apple Device Enrolment Program (DEP), and asset management. Business more »
Altrincham, Cheshire, North West, United Kingdom Hybrid / WFH Options
Cyber Security Specialists
accredited Cyber Essentials Certification Body who provide a range of Security consultancy and Managed security services.Examples include Cyber Security, Cloud Security & Data Privacy Consultancy, VulnerabilityScanning, Cloud Security Assessments & Penetration Testing services. We are growing and looking to recruit a Cyber Security Consultant with experience of supporting clients more »
identifying vulnerabilities, enhancing security measures, and ensuring the safety of our clients’ digital environments. Your responsibilities will span a wide range of tasks, from vulnerabilityscanning to technical content creation. Responsibilities: Vulnerability Detection and Automation: Collaborate with our security team to scan customer systems for critical vulnerabilities. … Develop new vulnerability checks using tools like Nuclei. Curate crowd-sourced checks for inclusion in our Intruder platform. Automate penetration testing processes to scale across multiple clients simultaneously. Rapid Response and Custom Scanning: Conduct custom scans on customer targets to identify emerging critical weaknesses. Provide rapid response solutions … Occasionally participate in industry events and conferences. Qualifications and Experience: Industry Experience: Minimum of 2 years in offensive security roles. Proven track record in vulnerability assessment and penetration testing. Educational Background: Technical academic background in software engineering or cyber security. Certifications (One or More): OSCP OSWE OSEP CRT CCT more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
team engagements to tune and validate detection tooling. Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetration testing, and vulnerability scanning. Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams. Manage the delivery of daily more »
Officer & wider compliance team to promote good security practices amongst stakeholders. The successful candidate will cover the full information security spectrum, from questionnaires to vulnerability management & everything in between. Main duties include: Be approachable and provide subject matter expert knowledge to colleagues, increasing their awareness of good security practices … within the group to ensure all accreditation requirements are fulfilled and any remediations are tracked through to completion Day-to-day management of the vulnerability management programme Review applications, suppliers, and proposed features from a security perspective What We Are Looking For The Information Security Officer will be an … high performing organisation. Ideally you will be/have: Experience in an Information Security role or similar Knowledge of information security good practice and vulnerability management programmes Demonstrable experience in an information security and privacy management environment, identifying risks and proposing viable solutions Broad understanding of security policies and more »
Greater London, England, United Kingdom Hybrid / WFH Options
Oliver Bernard
Great experience with PCI DSS. Good SIEM knowledge (Splunk is ideal) Great understanding of logs and log events across Linux, Windows, AWS, AV and Vulnerabilityscanning etc Good experience of Security Operations (SOC) Ideally a solid infrastructure understanding - Linux, networking, DevOps TCP/IP, Cloud etc Information Security more »
Greater London, England, United Kingdom Hybrid / WFH Options
Premier Group Recruitment
management (LAN/WAN/Wi-Fi/Mobile) Solid understanding of IT security practices (email security, anti-virus/endpoint protection, patch management, vulnerabilityscanning, network security, MFA, SSO, DLP, etc.) Commitment to data security and privacy (GDPR, UK Data Protection Act, and Cyber Essentials Plus) Excellent more »
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Hays
and implement risk treatment plans. - Support Project Manager and Cyber Risk Consultant in delivery of project activities. - Scope, Arrange and Support penetration testing and vulnerability testing. - Support development of Supply Chain Security Policy and Processes. SKILLS - Extensive security risk management knowledge. - Experience with SIEM Monitoring, AV, DDoS Protection, vulnerabilityscanning and EDR. - Knowledge of authentication and authorisation techniques, network sniffing and working with remote access technologies. - Familiarity with NIST Cybersecurity Framework, CIS Critical Security controls, and ISO27001. What you need to do now If you're interested in this role, click 'apply now' to forward an up more »
Employment Type: Contract, Work From Home
Rate: £500.0 - £550.0 per day + £500-£550 Per Day Inside IR35
Greater London, England, United Kingdom Hybrid / WFH Options
Internet Matters
Maintain digital and web operations security through proactive management, encompassing measures such as secure credential storage and maintenance, timely application of security patches, code vulnerabilityscanning, and personal information safeguarding. Communication and Stakeholder Management: Effectively communicate with internal stakeholders to understand requirements and priorities and allocate tasks to more »
over to AWS. This role will be operating outside IR35, working remotely. Daily rate negotiable. Primary responsibilities will be to: Assess outputs from Qualys (VulnerabilityScanning Tool) Determine level of risk and therefore priority (as input recommendation) Prepare/package information so actionable by other technology teams (product … infrastructure engineers and/or application engineers). You must have: Proven experience working as Information Security Analyst Experience working with Qualys to assess vulnerability Excellent documentation and stakeholder engagement skills, able to communicate effectively to technical teams more »
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
offer a supportive, positive, inspiring, and fun environment, with significant opportunities for career progression. About AppCheck: AppCheck is a B2B cyber security software platform (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability scan for security vulnerabilities in more »