person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability management-specific tooling, and have … an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process vulnerability data to provide reports, insights and metrics … that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerability management, security standards, and regulations More ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability management-specific tooling, and have … an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process vulnerability data to provide reports, insights and metrics … that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerability management, security standards, and regulations More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Atrium Workforce Solutions Ltd
SOC) Manager to lead the Cyber Security Operations Centre and be responsible for managing the day-to-day operations of the SOC team, overseeing incident detection and response, ensuring vulnerabilityscanning and remediation efforts across the organization. Predominantly remote work with occasional Lon don and Leeds office visit Lead and manage the SOC team, including security analysts and … incident responders, ensuring 24/7 coverage and effective incident handling. Oversee threat monitoring, detection, and response activities to minimize the impact of cyber incidents. Implement and manage vulnerabilityscanning programs, coordinate assessments, and ensure timely remediation of findings. Develop and enforce SOC processes, playbooks, and incident response procedures. Coordinate with IT and business units to mitigate risks … identified through vulnerabilityscanning or threat intelligence. Manage SOC tools and technologies, including SIEM, EDR, SOAR, and scanning platforms. Track and report key performance indicators (KPIs) for SOC operations and vulnerability management. Conduct regular security assessments and risk evaluations in partnership with internal audit and compliance teams. Keep abreast of emerging cyber threats and best practices More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
GTSC Talent Solutions
will ensure proper infrastructure functionality with PKI authentication, firewalls, and SSL/TLS, while also contributing to best practices for enterprise data analytics. Additional responsibilities include scripting for automation, vulnerabilityscanning, patch deployment, and documentation development to support security and IT teams. Location: Annapolis Junction, Maryland All work is on-site. This is not a hybrid or remote … of relevant experience. Experience with Splunk Machine Learning Toolkit (MLTK) Proficiency in scripting languages such as CSS, HTML, JavaScript, and Python Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning tools Experience with ServiceNow Ticketing System Proficiency in shell scripting to automate tasks and manipulate data Ability to ensure Splunk infrastructure functions properly with PKI-based authentication … firewall security logs Experience with Splunk Machine Learning Toolkit (MLTK) Experience with scripting languages such as CSS, HTML, JavaScript, and Python Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning ServiceNow Ticketing System Shell scripting to automate tasks and manipulate data Education and Required Qualification Bachelor's degree and Twenty (20) years of demonstrated combined experience in More ❯
processes and outcomes to reduce vulnerabilities across the Engineering estate; taking a lead role in detecting and responding to advanced threats across a growing portfolio of clients. Experience & responsibilities VulnerabilityScanning & Reporting - performing regular vulnerability scans and generating reports using SonarQube, Trivvy & Nessus; ensuring tool sets are kept up to date and that scans are performed regularly … regular system compliance audits and updates, ensuring systems are compliant with industry best practices. (CIS, STIG, NIST etc.) Performing regular reviews and updates to security enforcing GPOs, conducting periodic vulnerability assessments to identify and address potential vulnerabilities. About You You will possess hands on experience working in a similar Cyber Engineering role with a working knowledge of SonarQube, Nessus … and Ivanti and a broad experience spanning VulnerabilityScanning & Reporting, Endpoint Security, Incident Management & System Hardening. Security Clearance: Must hold an active SC clearance If you're interested in hearing more about this opportunity, please submit your application. Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we More ❯
access View job & apply Zero Trust Architect Location: Fully Remote Job type: Contract Position Overview: Leading FinTech company seeking a Zero Trust Architect to design and implement Cyber Security Vulnerability Management Analyst Cyber Security Vulnerability Management Analyst required for a market leading financial services firm. It's a great opportunity to get to work with industry-leading tools … your analytical, technical and communication skills, and to really make a difference to our customers and colleagues. This role will contribute to the development, maintenance and overall delivery of Vulnerability Management controls for the Bank, reporting to the Vulnerability Management Lead. The Vulnerability Management Analyst will contribute to the day-to-day running of the team, assisting … Specialists with managing the Bank's Vulnerability Management controls and providing security input for vulnerabilities which threaten the organisation. Experience Understanding of vulnerability lifecycles, standards and ratings Risk assessing findings to determine appropriate response with a proactive approach to recording, management and escalation of risks Increasing the quality of vulnerability reporting automation to reduce manual effort Advanced More ❯
Barrow-in-Furness, Cumbria, England, United Kingdom Hybrid / WFH Options
Adecco
Job Title: Vulnerability Manager Location: Barrow-in-Furness (Hybrid - 3 days onsite per week) Type: Full-time | Permanent Overview I'm recruiting on behalf of a leading organisation in the technology and cybersecurity space, looking to bring on an experienced and proactive Vulnerability Manager . This is a great opportunity for someone with a strong background in cybersecurity … vulnerability management, and governance. You'll be working closely with internal teams, clients, and third-party stakeholders to manage and improve security posture across complex environments. Key Responsibilities Manage and execute the end-to-end vulnerability management process Conduct vulnerability analysis , risk assessments, and impact reporting Identify current and emerging threats and communicate these effectively to stakeholders … support remediation activities through to closure Deliver security awareness sessions and support a culture of cybersecurity best practices across the team Ideal Candidate Will Have: Hands-on experience with vulnerabilityscanning tools and related frameworks Strong understanding of risk assessment methodologies and security governance Ability to present complex technical findings clearly to both technical and non-technical audiences More ❯
Boston, Massachusetts, United States Hybrid / WFH Options
Digital Prospectors
individual with a passion for defending complex digital environments from sophisticated threats. The successful candidate will be part of a dedicated team responsible for executing and advancing a comprehensive Vulnerability Management Program supporting mission-critical systems in a high-security environment. Essential Duties and Responsibilities (but not limited to): • Conduct proactive cyber monitoring and vulnerability management activities across … a diverse enterprise IT environment. • Support the execution of vulnerabilityscanning, analysis, reporting, and remediation efforts, using tools such as Tenable Security Center (or equivalent platforms). • Collaborate with cross-functional teams to drive vulnerability remediation plans and lead working groups to assess, prioritize, and track mitigation efforts. • Collect, analyze, and validate open-source intelligence and threat … enterprise intrusion detection systems (IDS/IPS), host/network security tools, firewalls, HIPS, WAFs, and event correlation. • Proven experience in cybersecurity operations, including threat analysis, incident response, and vulnerability remediation across multiple OS platforms (Linux, Windows, Mac). • Technical expertise in at least one scripting/programming language: Python, PowerShell, Bash, C++, etc. • Familiarity with cyber threat intelligence More ❯
coordinating penetration testing and managing cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, data leakage prevention, patching, encryption, vulnerabilityscanning, and configuration of security tools. Prior experience in an international enterprise environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity … procedures annually for security compliance. Develop, test, and implement disaster recovery procedures. Manage cybersecurity projects to ensure timely delivery within budget. Perform or coordinate security assessments, penetration tests, and vulnerability scans. Ensure compliance with frameworks like COBIT, NIST, ISO, PCI, GDPR, HIPAA, etc. Provide internal support for security issues within SLAs. Evaluate and implement CIS controls as needed. Contribute More ❯
years of experience in the information security field. Hands-on experience with AWS (or similar cloud platforms) and Cloudflare. Infrastructure as Code: Proficiency with Terraform or similar IaC tools. Vulnerability Knowledge: Solid understanding of common vulnerability classes and the OWASP Top 10. Coding & Scripting: Proficient in reading code (e.g., Python, Scala) and using Git for version control of … code and configuration changes. Familiarity with iOS or Android security. Experience of industry-standard SIEM and vulnerabilityscanning tools. Nice to have: Relevant industry certifications (CISSP, OSCP, etc.). Experience of supporting audits such as ISO27001. Experience of working with security risk management frameworks such as ISO31000. Knowledge of security control frameworks such as CIS, NIST800-53 and More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
Skillcast
security operations, drive compliance efforts, and strengthen our cloud and infrastructure defenses. As a Cyber Security Manager you will play a key role in managing security incidents, audits, and vulnerability programs, while mentoring junior team members and helping shape the future of cybersecurity at Skillcast. Key Responsibilities: - Coordinate SOC 2, ISO 27001, and Cyber Essentials audits - including documentation, evidence … management, gap analysis, and communication with auditors - Administer and enhance Azure Sentinel SIEM - including data source configuration, detection rule creation, incident triage, and reporting - Oversee vulnerabilityscanning, prioritisation, stakeholder coordination, and remediation tracking - Implement and manage security controls across Azure and Kubernetes environments, ensuring scalable and secure architecture - Work closely with DevOps to embed security in CI/… experience in cybersecurity and IT infrastructure roles - Hands-on experience with Azure, Kubernetes/Docker, and CI/CD security practices - Proficient in SIEM platforms (especially Azure Sentinel) and vulnerability management tools - Strong knowledge of incident response, infrastructure hardening, and cloud security controls - Familiarity with SOC 2, ISO 27001, Cyber Essentials, and NIST frameworks - Experience with core security technologies More ❯
EC3A, Tower, Greater London, United Kingdom Hybrid / WFH Options
Skillcast
security operations, drive compliance efforts, and strengthen our cloud and infrastructure defenses. As a Cyber Security Manager you will play a key role in managing security incidents, audits, and vulnerability programs, while mentoring junior team members and helping shape the future of cybersecurity at Skillcast. Key Responsibilities: - Coordinate SOC 2, ISO 27001, and Cyber Essentials audits – including documentation, evidence … management, gap analysis, and communication with auditors - Administer and enhance Azure Sentinel SIEM – including data source configuration, detection rule creation, incident triage, and reporting - Oversee vulnerabilityscanning, prioritisation, stakeholder coordination, and remediation tracking - Implement and manage security controls across Azure and Kubernetes environments, ensuring scalable and secure architecture - Work closely with DevOps to embed security in CI/… experience in cybersecurity and IT infrastructure roles - Hands-on experience with Azure, Kubernetes/Docker, and CI/CD security practices - Proficient in SIEM platforms (especially Azure Sentinel) and vulnerability management tools - Strong knowledge of incident response, infrastructure hardening, and cloud security controls - Familiarity with SOC 2, ISO 27001, Cyber Essentials, and NIST frameworks - Experience with core security technologies More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
ECS Resource Group Ltd
those related to physical security. Maintain and enhance the security posture of servers for both existing and new applications, on-premise and in Azure cloud environments. Monitor and manage vulnerabilityscanning tools, address findings, and coordinate remediation efforts with infrastructure and development teams. Support the development, testing, and annual validation of disaster recovery and backup plans. Create and … To Be Considered for This Role, You Will Need: Cybersecurity Experience: Demonstrated experience in implementing and managing security controls across hybrid environments. Familiarity with endpoint protection, threat detection, and vulnerability management tools. Incident Response & Problem Solving: Ability to respond swiftly and effectively to security incidents. Skilled in structured analysis and incident remediation to ensure rapid recovery. Threat Awareness & Risk More ❯
including preparing for and undergoing assessments. Familiarity with information security frameworks (e.g., NIST, CIS). Proficiency in risk management methodologies. Knowledge of common security technologies (e.g., firewalls, EDR, SIEM, vulnerability scanners). Exceptional analytical, problem-solving, and decision-making abilities. Excellent communication (written and verbal), interpersonal, and presentation skills. Ability to operate autonomously and manage multiple priorities in a More ❯
responsible for protecting enterprise systems and data. This role offers hands-on involvement with a wide range of technologies-from endpoint detection and SIEM platforms to firewalls, MFA, and vulnerability management-providing a well-rounded foundation in enterprise security operations. You'll gain exposure to advanced security practices, assist in running and responding to threat detection systems, and contribute … to projects that strengthen security across the organisation. Key Responsibilities Monitor and respond to security alerts and incidents (EDR, SIEM, Identity Protection, SOAR). Assist in vulnerabilityscanning and remediation activities. Help manage systems such as email and web security gateways, VPNs, MFA, SSO, and mobile device security. Support the maintenance of security certificates, PAM systems, and conditional … platforms in a corporate IT environment. Experience with some of the following: EDR platforms (e.g., CrowdStrike) Email or web security gateways (e.g., Mimecast) MFA/SSO (e.g., Duo, Okta) Vulnerability scanners (e.g., Rapid7, Tenable, Nessus) InTune and Conditional Access Exposure to: Imperva WAF KnowBe4 Certificate management tools Kali Linux toolset and penetration testing basics Qualifications: Working towards or holding More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Southern Communications Ltd
relation rules, and administration of SIEMpreferred Should haveexpertiseon TCP/IP network traffic and event log analysis Network Troubleshooting skillsrequired. Knowledge and hands-on experience in penetration testing/vulnerabilityscanning, security tools like tenable Nessus, kaliLinux Knowledge of ITIL disciplines such as Incident, Problem and Change Management Experience of infrastructure design and management in mission critical environments More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
N Brown Group
managing and enhancing the technology underpinning N Brown’s cyber security services.You’ll have a good understanding of a range of tools like web application firewalls, intrusion detection technologies, vulnerability scanners and SIEM’s; and the technical knowledge to integrate them to enhance our protection. You’ll also need a good understanding of the native tooling available in our … Azure, GCP) & SIEM (ideally Splunk) Endpoint Detection and Response (EDR) tools such as MS Defender APT. Network and Host Intrusion Detection/Prevention tools Web Application Firewalls (ideally Akamai) Vulnerabilityscanning tools (ideally Rapid7) What’s in it for you? Hybrid working (2-3 days in the office at a minimum) + 24 days holiday (+ 8 bank More ❯
ensuring regulatory compliance, and collaborating across teams to enhance our cybersecurity posture across Europe. Main responsibilities Develop, implement, and maintain IT security policies, standards, and procedures. Lead security assessments, vulnerabilityscanning, and penetration testing. Monitor and respond to security incidents, conducting investigations and ensuring quick remediation. Oversee the implementation of security controls to safeguard digital assets and protect More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
GoDefend Limited
GoDefend is a growing UK-based cyber security company based in Newcastle upon Tyne, offering a wide-spectrum of cyber solutions whilst specialising in continuous vulnerabilityscanning and penetration testing. We are seeking a Penetration Tester with over three years of hands-on experience in offensive security. Youll join a growing, fast-paced cyber security team where your … with clients and translating complex risks into clear business language. What Youll Be Doing: Conduct penetration testing across web applications, mobile apps, cloud platforms, and internal networks. Perform detailed vulnerability assessments and provide actionable remediation guidance. Create professional, jargon-free reports suitable for both technical and non-technical audiences. Lead or support scoping calls with clients to define the More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
RogueThink Inc
Eligible). • Certifications such as CompTIA Security+, Network+, or AWS/Azure Fundamentals. • Experience or exposure to Ansible for automation is a plus. • Familiarity with secure coding practices and vulnerabilityscanning tools. Benefits: At RogueThink, we offer competitive compensation packages and flexible work environments. We ensure that compensation is competitive, as we hold integrity, intelligence, and passion in More ❯
and remediate application and cloud security vulnerabilities (e.g., XSS, SSRF, CSRF, CORS, SQL Injection, broken authentication/authorization, encryption flaws). Provide expert guidance on secure coding practices, common vulnerability classes (e.g., OWASP Top 10), and threat modeling for modern web applications. Conduct security reviews of design and architecture documents; lead threat modeling exercises using frameworks such as STRIDE … tooling (e.g., Burp Suite, ZAP, Amass, Nmap). Assess and mitigate static (SAST) and dynamic (DAST) vulnerabilities across services and components. Evaluate, implement, and maintain security tooling to support vulnerability management, secure development, and event detection workflows. Define and track metrics related to application security, vulnerability remediation, detection coverage, and incident response effectiveness. Support compliance initiatives (e.g., SOC … and log analysis. Proficient in log analysis, SIEM usage/configuration, threat hunting, and querying tools to support detection and response. Familiarity with static and dynamic analysis techniques and vulnerability mitigation. Strong understanding of modern cloud platforms-especially AWS-and cloud-native security practices. Experience conducting penetration tests, vulnerability assessments, and network scans. Excellent communication and collaboration skills More ❯
section below for more information. As a Lead Test Engineer focusing on security, you will: Take ownership of security testing within the software development lifecycle. This will involve running vulnerability scans using tools such as Burp, coordinating with relevant teams, and testing security-related issues. As a manager, you will provide advice, coaching and mentoring to testers on non … practices with a strong focus on Security Testing. Working knowledge of at least 5 of the following security tools and technologies: Burp Suite (including Burp Scanner) - for web application vulnerabilityscanning and manual security testing. OWASP ZAP - for DAST and automated security regression testing. Postman or SOAP UI - for API testing with a security focus (e.g. injection, authorisation … with secrets scanners. Static Application Security Testing (SAST) tools - e.g. SonarQube, Checkmarx, Semgrep. Dynamic Application Security Testing (DAST) tools - e.g. OWASP ZAP, Burp Suite Pro. Infrastructure-as-Code (IaC) scanning tools - e.g. tfsec, Checkov. Threat modelling methodologies - e.g. STRIDE, PASTA, or creating risk-based test charters. Familiarity with the OWASP Top 10 - and how to test for each category. More ❯
Aldershot, Hampshire, South East, United Kingdom Hybrid / WFH Options
JLA Resourcing Ltd
performance technical team focused on the secure delivery and support of new IT applications and infrastructure for a sensitive government customer. Your core responsibilities will include: Leading and executing vulnerabilityscanning, management, and reporting Implementing and maintaining endpoint security measures, including AV/anti-malware compliance Conducting system hardening and security compliance audits against frameworks like CIS, STIG … be successful in this role, you will need: Proven experience in a Cyber Security Engineering role, ideally within the defence or secure government sector Strong hands-on expertise across vulnerability management, endpoint protection, and incident response Familiarity with frameworks such as Government Functional Standard 007, CIS, STIG, and NIST A proactive, collaborative mindset with the ability to engage across More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯