reach but a deep local presence, Colt is big enough to deliver and small enough to care. Why we need this role? We are seeking a dynamic and motivated Vulnerability Management Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The Vulnerability Management Lead … will play a crucial role in tracking and managing the identification, assessment, and remediation of security vulnerabilities across the organization’s infrastructure and monitoring and reporting on vulnerability and other security compliance status. The role requires collaboration with various partners to ensure that vulnerability assessments and emerging threats are prioritized and advanced. Additionally, the successful candidate will work … with management to continuously evolve the vulnerability management program. What you will do: You will be responsible for supporting CSOC in order to achieve the below: The development and implementation of the Colt Vulnerability Management Framework. Enhancing the scope and efficiency of current vulnerabilityscanning and management tools and integration between them. Design and manage the More ❯
at the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Threat and Vulnerability Manager to protect DIT and the wider UK government from cyber threats in a fast paced and exciting role, responsible for the Vulnerability Management and Threat Hunting of … government from cyber threats in a fast paced and exciting role. Reporting to the Head of Cyber Security Operations, you will manage and be responsible for the Threat and Vulnerability Management function within the SOC, by providing leadership on identification and improvement opportunities, and ensuring service owners are aware of weaknesses in their security posture and are empowered with … be found. Main responsibilities Your day-to-day role will involve the need to: Working with the Security Leadership team to develop a strategic road map for an effective vulnerability detection, assessment, remediation, and threat intelligence program. Line management of the threat and vulnerability management team. Building sustainable relationships to champion the adoption of vulnerability and threat More ❯
Edina, Minnesota, United States Hybrid / WFH Options
Jerry's Enterprises Inc
threat detection, incident response, and cybersecurity controls. Demonstrated knowledge of a broad range of technical concepts, examples include: firewall rule configuration, network segmentation, network intrusion detection and response, security vulnerabilityscanning, threat hunting, log analysis, security frameworks and methods both cloud and on-prem. Ability to work on-site or in a hybrid capacity as needed. Participation in … ability to influence decisions by identifying risks and opportunities. Our ideal candidate: Knowledge of cyber-attack stages (e.g., MITRE ATT&CK Framework, tactics, techniques and procedures for conducting reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). Experienced with EDR tools (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint). Understands Microsoft Windows and … Linux operating systems including Active Directory, Group Policy, system hardening, authentication protocols, privilege management. Familiar with SIEM/SOAR platforms, vulnerability scanners, and forensic tools. Knows scripting languages such as Python, PowerShell, or Bash. Experience with cloud security tools and practices in AWS, Azure, or GCP. Knowledge of AI and LLM concepts and ability to leverage IA toolsets. Knows More ❯
Engineer Are you looking for more in life than just building another web app? Does upending cyber security resonate with you? We're a rapidly expanding cybersecurity startup revolutionizing vulnerability management for organizations of all sizes. For our customers, vulnerability management has always been a game of catch-up, with limited asset coverage and manual processes. Nucleus Security … s primary mission is to create a fast, scalable platform that not only addresses these challenges but also makes vulnerability management simple, fun, and effortless. Currently, we're looking for a passionate Senior Python Software Engineer to join our growing team of engineers. About Nucleus Security Nucleus Security is transforming how security and development teams manage vulnerabilities at scale. … Our platform unifies vulnerability data across scanners and environments, enabling organizations to prioritize and remediate vulnerabilities efficiently. We work with some of the most security-forward enterprises, empowering them with tools that accelerate secure software delivery and infrastructure hardening. Role Overview As a Senior Software Engineer in our Engineering team, you'll operate at the frontier of innovation, taking More ❯
new technologies to enhance performance and resilience. Linux and Windows Administration Install, configure, and maintain Linux servers (Debian, Ubuntu, CentOS, Red Hat) across physical and virtual environments. Manage patching, vulnerabilityscanning, and system hardening. Troubleshoot hardware, software, and network issues with engineering and security teams. Support and manage Windows Server environments (), including Active Directory, DNS, DHCP, and Group More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Synergetic
new technologies to enhance performance and resilience. Linux and Windows Administration Install, configure, and maintain Linux servers (Debian, Ubuntu, CentOS, Red Hat) across physical and virtual environments. Manage patching, vulnerabilityscanning, and system hardening. Troubleshoot hardware, software, and network issues with engineering and security teams. Support and manage Windows Server environments (2012–2022), including Active Directory, DNS, DHCP More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Synergetic Recruitment Group Limited
new technologies to enhance performance and resilience. Linux and Windows Administration Install, configure, and maintain Linux servers (Debian, Ubuntu, CentOS, Red Hat) across physical and virtual environments. Manage patching, vulnerabilityscanning, and system hardening. Troubleshoot hardware, software, and network issues with engineering and security teams. Support and manage Windows Server environments (20122022), including Active Directory, DNS, DHCP, and More ❯
cambridge, east anglia, united kingdom Hybrid / WFH Options
Synergetic
new technologies to enhance performance and resilience. Linux and Windows Administration Install, configure, and maintain Linux servers (Debian, Ubuntu, CentOS, Red Hat) across physical and virtual environments. Manage patching, vulnerabilityscanning, and system hardening. Troubleshoot hardware, software, and network issues with engineering and security teams. Support and manage Windows Server environments (2012–2022), including Active Directory, DNS, DHCP More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Oxfordshire, England, United Kingdom Hybrid / WFH Options
F5 Consultants
as designing and overseeing phishing simulations. Required Skills 2+ years' experience in an information security role Strong understanding of information security and cyber threat defence Hands-on experience with vulnerabilityscanning Ability to explain threats, vulnerabilities, and risks in a business context Experience delivering security training and running phishing simulations Experience with Microsoft Defender and/or third More ❯
oxford district, south east england, united kingdom Hybrid / WFH Options
F5 Consultants
as designing and overseeing phishing simulations. Required Skills 2+ years' experience in an information security role Strong understanding of information security and cyber threat defence Hands-on experience with vulnerabilityscanning Ability to explain threats, vulnerabilities, and risks in a business context Experience delivering security training and running phishing simulations Experience with Microsoft Defender and/or third More ❯
experience: Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in SOC operations, incident response, and forensic analysis. Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Last Mile Infrastructure Limited
a team of security professionals, oversee the delivery and ongoing management of our security infrastructure, and act as the go-to technical expert in threat detection, incident response, and vulnerability management. Were looking for someone with strong leadership skills, a deep knowledge of the cyber security landscape, and a real passion for safeguarding digital assets. Whats in it for … cyber security role, with a proven track record of leading and mentoring a team. Extensive experience with security technologies such as SIEM, firewalls, intrusion detection/prevention systems, and vulnerabilityscanning tools. In-depth knowledge of incident response procedures, threat hunting, and forensic investigation techniques. Strong understanding of networking protocols, operating systems, and cloud security principles. Qualifications Bachelor More ❯
into our pipelines, automate compliance and help us ship fast without compromise. Key Responsibilities: Integrate security tools and practices into CI/CD pipelines (GitHub Actions, Jenkins, GitLab) Automate vulnerabilityscanning, code analysis, and container hardening Collaborate with developers to design secure architectures and threat models Monitor cloud infrastructure (AWS, Azure, GCP) for misconfigurations and anomalies Lead incident More ❯
West Bridgford, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
loves to automate mundane tasks, make software and systems that are scalable, highly available, and robust, and making sure whatever you’re working on is secure, through things like vulnerabilityscanning, threat analysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with More ❯
analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient remediation. Experience in network security principles, firewalls, and access More ❯
DevSecOps Lead to set technical direction and ensure secure, scalable, and resilient systems. Key Responsibilities: Define and enforce platform architecture standards with a focus on security and resilience Lead vulnerability management and compliance alignment Implement security best practices across CI/CD pipelines and infrastructure Drive API security (OAuth, JWT, API keys) and lifecycle management Oversee disaster recovery strategies … and resilience testing Automate infrastructure upgrades using IaC tools 🛠️ Tech Stack: Cloud & DevOps: AWS (Lambda, API Gateway, ECS, DynamoDB, S3), Azure DevOps, GitHub Workflows Security: Secure coding, vulnerabilityscanning, compliance frameworks Infrastructure Automation: Terraform, Ansible, Docker Programming: Python, Node.js API Management: Apigee Edge/Apigee X What We’re Looking For: Strong expertise in cloud-native architecture and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
protocols and secure key lifecycle management - Securing microservices, APIs, and DevSecOps best practices Skilled in penetration testing and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerabilityscanning, remediation, and vendor management Collaborative mindset with the ability to partner across engineering, security, and product teams Desirable Skills: Hands-on configuration, deployment, and operation of ForgeRock More ❯
NG1, Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
You are someone who loves to automate mundane tasks, make scalable, highly available, and robust solutions, and making sure whatever you’re working on is secure, through things like vulnerabilityscanning, threat analysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with More ❯
NG2, West Bridgford, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
You are someone who loves to automate mundane tasks, create scalable, highly available, and robust solutions, and ensure that whatever you’re working on is secure, through measures like vulnerabilityscanning, threat analysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with More ❯