Vulnerability Management Jobs in the UK excluding London

1 to 25 of 82 Vulnerability Management Jobs in the UK excluding London

Senior Security Engineer

Welwyn Garden City, England, United Kingdom
Tesco Technology
About the Role Tesco Technology are looking for a Security Engineer reporting into the Vulnerability Management and Pentesting team. This is an exciting opportunity for a highly motivated security focused engineer to join our expanding organisation. The role will involve being hands on with a focus on the … alongside other security colleagues bringing your experience to help. You will be responsible for: Building our detection, data correlation and response capabilities in the Vulnerability Management space. As a team we also feed into the standards and patterns for our engineering community. Create tooling and reporting to help … manage our external attack surface. Build a range of capabilities to inform our stakeholders on the status and progress of Vulnerability Management remediation efforts across the company. Automate integrations between platforms and tooling. Use your observations from security incidents and reporting about relevant security threats to contribute to more »
Posted:

OT Cyber Security Testing Manager

Crawley, England, United Kingdom
InfoSec People Ltd
IT Service Providers and partners to implement and optimise cyber security technical assurance capabilities across four main services; Technical Security Compliance, Product Security Assurance, Vulnerability Management (VM), and Disaster Recovery and Business Continuity. Key responsibilities: Define and deliver the cyber security technical assurance strategy, setting out clear policies … variety of technologies and platforms. Ensure the IT estate is compliant with The Client's policies and technical standards to protect company assets having management responsibility for driving the necessary remediation actions and countermeasures to mitigate identified weaknesses and vulnerabilities. Establish and improve a regular red and purple team … penetration testing program aligned to main threat information and industry cyber security intelligence. Establish a Vulnerability Management process to ensure that all known security vulnerabilities and weaknesses are identified, contextually assessed, prioritised and tracked to remediation against The Client's policy. Ensure that an IT Disaster Recovery and more »
Posted:

Cyber Security Vulnerability Manager

Cardiff, Wales, United Kingdom
Hybrid / WFH Options
Intaso
Interviews available immediately Intaso’s long standing client are seeking a dynamic individual to join their Security Operations team as the Security Vulnerability Manager, a pivotal role within their organization. This position will focus on identifying, monitoring, analysing, and facilitating the remediation of vulnerabilities across their systems. Key Responsibilities … Develop and document a comprehensive vulnerability management strategy aligned with stakeholder and business need Create intuitive reporting and dashboarding mechanisms to convey threat and risk profiles associated with vulnerabilities to stakeholders Ensure regular vulnerability scans cover all IT and OT assets, maintaining up-to-date coverage. Collaborate … with IT and OT asset owners to execute vulnerability and compliance scans in a controlled manner. Partner with both technical and non-technical stakeholders to devise effective mitigation plans for identified vulnerabilities. Lead cross-functional teams in responding to high-risk or complex vulnerabilities, leveraging technical expertise. Stay informed more »
Posted:

Cyber Security Vulnerability Manger

Slough, England, United Kingdom
iFindTech Ltd
Job Overview: Join a dynamic and high-performing team as a Senior Analyst in Vulnerability Management & Security Testing. This role offers the unique opportunity to enhance a best-in-class Threat Defence capability and make significant contributions to our security operations. Ideal candidates will bring a strong background … in threat management, vulnerability assessment, and security testing, aiming to drive innovation and excellence in our security practices. Key Responsibilities: Conduct thorough vulnerability assessments across various platforms, including networks, systems, applications, and devices. Analyze risks associated with vulnerabilities, provide detailed reporting, and recommend actionable remediation strategies. Work … across IT, IoT, and OT environments. Coordinate and oversee remediation efforts to ensure timely and effective resolution of security vulnerabilities. Requirements: Extensive experience in vulnerability management and remediation, including hands-on experience with vulnerability scanning tools. Good knowledge of Exabeam, Tenable.io and Tenable.sc would be considered a more »
Posted:

Cyber Security Engineer (IT digital systems)

South East, United Kingdom
Hudson Shribman
Engineer role will support the systems and applications that deliver enterprise security services for a global organisation. With a focus on identity and access management, the Security Engineer will provide expert knowledge to support the planning, design, development, and deployment of centralized IAM and PAM solutions and the delivery … of the enterprise-level Privileged Access Management program. The role will also support the implementation and management of all cyber security technologies and services in use at the company Role & Accountabilities KEY Identity access management, experience/involvement with Security services such as SIEM and Vulnerability … a subject matter expert on key principles of (IAM) with an in-depth knowledge in the areas of authentication and authorization systems, identity lifecycle management, and identity governance. Build the IAM strategy, and ensure its implementation is a success across the business. Staying up-to-date on current IAM more »
Employment Type: Permanent
Salary: £49000 - £61000/annum
Posted:

IT and Security Technician Apprentice

Cumberland House, England
Intequal - Port Solent
The apprentice will be tasked with sending regular reports using tools like our Security Awareness Training platform, Vulnerability Management tool and conducting various scans to assess security posture. Role A IT and Security Apprentice is an integral part of the security team, responsible for a variety of tasks … protection and integrity of data and systems. The apprentice will be tasked with sending regular reports using tools like our Security Awareness Training platform, Vulnerability Management tool and conducting various scans to assess security posture. They will also be responsible for the setup and configuration of security solutions … cyber security services. They will assist in the automation and maintenance of various tools streamlining processes to enhance operational efficiency. The role extends to vulnerability management, where the apprentice will identify, evaluate, and address security vulnerabilities within the organization's network and systems. RMM (Remote Monitoring and Management more »
Employment Type: Advanced Apprenticeship
Salary: £22,308.00
Posted:

Information Security Manager

Leatherhead, England, United Kingdom
Hybrid / WFH Options
Zest
to processing personal data with the highest level of diligence, and you’ll play a pivotal role in maintaining and enhancing our robust infosec management system, acquiring and upholding security certifications, fulfilling the role of our Data Protection Officer and ensuring we have appropriate controls to mitigate risk. You … Simultaneously, your comfort with detail will see you managing the day-to-day operations, keeping our platform and business secure. Key responsibilities Information Security Management & Certifications ISMS Oversight: Maintain and enhance Zest’s Information Security Management System. This includes maintaining documentation, conducting and documenting risk assessments, driving improvements … latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of security systems, controls and infrastructure. Incident Management: Take charge of the response to all information security and data protection incidents and collaborate with various business units to understand, document and learn more »
Posted:

Cyber Incident Response Manager

Buckinghamshire, England, United Kingdom
Proprius Recruitment
Employment Benefits + Bonuses Lead cross-functional post-incident process reviews to identify and implement continuous improvement initiatives. Partner with Legal, 2LoD, Major Incident Management, Threat Management, Vulnerability Management, Attack Surface Reduction, Software Engineering, Security Architecture, Platform Support both locally and globally. You will have experience … in: Leading the response to complex incidents in a large-scale environments. Years of relevant experience in cyber security operations, incident management or risk management within an enterprise environment. Self-motivated interest in the latest cyber security threats and vulnerabilities and is able to integrate threat intelligence into more »
Posted:

Lead IT Security Manager

Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
Security Manager to join their fast-paced Operations team on a permanent basis. The Lead IT Security Manager is responsible for is the effective management of the Security Operations pillar within the IT Security, Compliance & Identity function. This includes Security technology and Security Operations Centre management. Key focus areas … for this role, the ideal candidate will have experience in each of the below; Threat & Vulnerability Management Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar, determining and delivering requirements, methods, and tools to … provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and compliance of security operations procedures, reviewing more »
Employment Type: Permanent
Posted:

Head of Security Operations

South East London, England, United Kingdom
dmg media
issues. Manage the day-to-day operations of the SOC, ensuring the timely and effective delivery of security monitoring, incident response, threat intelligence and vulnerability management services. Lead and develop a team of cyber analysts, providing coaching, mentoring, performance management and career development opportunities. Establish and maintain … strong relationships with internal and external stakeholders, including senior management, business units, IT teams, vendors, regulators and law enforcement agencies. Develop and implement security operations policies, procedures, standards and best practices, ensuring alignment with the organisation's security strategy, risk appetite and regulatory requirements. Monitor and report on the … in a large and complex organisation. Expert knowledge of security operations processes, tools and technologies, such as SIEM, SOAR, EDR, XDR NDR, threat intelligence, vulnerability management, forensics and malware analysis. Strong understanding of security frameworks, standards and regulations, such as ISO 27001, NIST, CIS, PCI DSS, GDPR and more »
Posted:

Cloud Security Architect - CGEMJP00253852

Knutsford, Cheshire, United Kingdom
Experis
of a broad range of security capabilities, technologies and concepts (e.g. cryptography, data security, network security, endpoint security, security penetration testing, identity and access management, vulnerability management etc). Desirable skills/Preferred Qualifications: * Understanding of the interplay between cyber security risk factors, regulatory requirements and changing … of controls and standards to both business and security solutions in order to maintain or increase the Bank's security posture. * Knowledge of risk management processes (e.g. methods for assessing and mitigating risk). * Skill in designing countermeasures to identified security risks. * Knowledge of cybersecurity and privacy principles and more »
Employment Type: Contract
Rate: £750 - £800/day Umbrella
Posted:

SC cleared Lead/Tier 3 SOC Analyst

Birmingham, West Midlands
LA International Computer Consultants Ltd
ATT&CK and CIS. * Legal and Regulatory Understanding: Familiarity with laws and regulations related to cybersecurity, such as GDPR, CCPA, or HIPAA. Skills * Personnel Management * In house training of personnel. * Stakeholder engagement * Risk Management * Threat Hunting * Threat Analysis * Use of vulnerability management tools * Malware reverse engineering … Detection rule engineering * Incident Management * Alert Triage * Crisis management Experience * Extensive working experience in a live SOC environment * Line management experience. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to more »
Employment Type: Contract
Rate: £500 - £550
Posted:

Information Technology Security Specialist

Aberdeen, Scotland, United Kingdom
Hybrid / WFH Options
prosource.it
leads to the creation of high quality, secure by design, project deliveries. Examples of projects: Secure Internet Access Privileged Remote Access VPN consolidation Information Management (Records Management & Data Governance) Infrastructure Road Mapping Security Email Gateway Identifying security related risk from projects and leading risk assessment processes Identify divergences … deliveries Technical Experience: Security Risk Assessment Network Architecture Principles Web & email security technologies Reviewing and assessing security policy configuration within cloud environments (preferably Azure) Vulnerability Management and Security logging and monitoring tools Cloud Virtualisation and Containerisation security assessments and review Edge Security Technology, IAM, PAM Data Security and … governance Network Monitoring Tools and SIEM Technology Risk Management Tools Ability to act proactively, escalating issues as required Strong documentation and communication skills (verbal and written) Excellent problem-solving skills Strong knowledge and experience of IT change management processes and principles Willingness to stay up to date on more »
Posted:

Security Operations Engineer

Belfast, Northern Ireland, United Kingdom
Hybrid / WFH Options
Idox plc
best practice, quality assurance and governance, as appropriate for each project. The SecOps Engineer will take a proactive approach to security matters and risk management, leading investigations, root cause analysis and vulnerabilities under the guidance of the cloud architecture team. There may be an opportunity to develop a management … Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage … automated scanning tools to ensure continuous security monitoring. Secure Configuration Management: Establish and enforce secure configuration standards for EC2 instances, Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Automate configuration management processes using infrastructure-as-code tools (Terraform). Security Compliance: Ensure AWS infrastructure and applications comply more »
Posted:

Cyber Security Testing Manager

Crawley, England, United Kingdom
Vallum Associates
related field or equivalent training and/or experience. Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+). Track … had to collaborate across partners with differing levels of technical security competency. Advanced knowledge and an understanding of operational excellence in Cloud Security Posture Management and Vulnerability Management programs. Understanding risk, resource availability and business objectives at a group level is necessary. Putting our customer's interests more »
Posted:

Senior Cyber Security Engineer

Reading, Berkshire, South East, United Kingdom
Hybrid / WFH Options
Proactive Appointments Limited
someone with previous experience in a Cyber Security Engineer role where they have gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. Experience working with cloud hosting providers, managing application testing and working with system owners/developers to improve application … in complex cross-technology environments. Maintain accurate logs of security events and incidents. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetration testing to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security … understanding of Security Infrastructure design, IT Security best practice and hardening standards. Strong understanding of common IT protocols, infrastructure and systems e.g. Networks, Domain management and virtualised infrastructure. Understanding of security operations and keen to learn. Strong communication skills and able to work collaboratively with IT and other stakeholders. more »
Employment Type: Permanent, Work From Home
Salary: £60,000
Posted:

Senior Cyber Security Engineer

Reading, Berkshire, South East, United Kingdom
Focus Resourcing Group
in Reading. For this exciting role we are seeking an engineer who has gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. They are also looking for experience working with cloud hosting providers, managing application testing and working with system owners … to recover service in complex cross-technology environments. Work to defined SLAs & KPIs. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetration testing to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security … understanding of Security Infrastructure design, IT Security best practice and hardening standards Strong understanding of common IT protocols, infrastructure and systems e.g. Networks, Domain management and virtualised infrastructure Understanding of security operations and keen to learn Strong communication skills and able to work collaboratively with IT and other stakeholders more »
Employment Type: Permanent
Posted:

IT Security Manager - Security Operations - Birmingham

Birmingham, West Midlands, West Midlands (County), United Kingdom
Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threat management, and vulnerability management, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »
Employment Type: Permanent
Salary: £50950 - £50951/annum
Posted:

Lead IT Security Manager

Birmingham, West Midlands, West Midlands (County), United Kingdom
Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threat management, and vulnerability management, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »
Employment Type: Permanent
Salary: £50950 - £56000/annum
Posted:

SOC Engineer

Bournemouth, Dorset, South West, United Kingdom
IP People Ltd
for hidden threats and vulnerabilities within the organization's network and systems. Employing various security tools and methodologies to address potential weaknesses before exploitation. Vulnerability Management: Assisting in vulnerability assessments and penetration testing. Collaborating with IT and system administrators to prioritize and remediate identified vulnerabilities. Security Reporting … Documentation: Generating detailed reports on security incidents, response actions, and improvement recommendations. Maintaining accurate records of incidents, investigations, and security-related activities. Security Tools Management: Configuring, updating, and maintaining security tools such as firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM solutions. more »
Employment Type: Permanent
Salary: £60,000
Posted:

Head of Cyber

Bristol, Avon, South West, United Kingdom
Synoptix
Lead and deliver Cybersecurity work packages on behalf of Synoptix clients or as part of internal delivery programmes. This may include: Development of Security Management Plans Understanding and defining the capability context Performance of Risk Assessments (System Driven or Component Driven) Define and architect of Security Controls Development of … SyOps Development of CoCos Vulnerability Management Planning Development of Key/Certificate Management Plans Development of Security Case Reports. Support to Security Working Groups Management (but not delivery of) Penetration Testing and/or TEMPEST Testing Act as an SME for security requirements. Assist in the …/certificate management. Extensive experience in embedding security best practices within multi-disciplinary product teams. Experience in conducting security risk assessments. Experience of Security Management Plan (SMP) Generation Experience of Security Case/Security Case Report Generation Strong communication and stakeholder management skills. Strong analytical and problem-solving more »
Employment Type: Permanent
Salary: £90,000
Posted:

Head of Information Security

Reading, England, United Kingdom
Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
Posted:

Head of Information Security Operations - Contract - URGENT - Reading/Thames Valley/Oxford

Reading, England, United Kingdom
Areti Group
the confidentiality, integrity, and availability of information systems are maintained to protect customer, corporate, and third-party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC partners. This is a hybrid position with … required on site each week. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are … is maintained and in line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes, and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Experience Minimum 5+ years commercial experience more »
Posted:

Cyber Security Analyst

Didcot, Oxfordshire, United Kingdom
Hybrid / WFH Options
Alexander Mann Solutions - Public Sector Resourcing
Infrastructure and rules harmonisation (multiple campus locations). You'll have relevant experience in: You will benefit from a relevant information security/information management background enabling you to work effectively with IT and business area representatives, academic staff (scientists, researchers) and innovation entrepreneurs You will have incident management experience, and an ability to quickly tailor responses to deal with fast-paced situations Proven people & Stakeholder management skills, allowing for communication of technical matters in a manner appropriate to the recipient. Knowledge and Expertise Knowledge of Information Security standards, legislation and practices, including GDPR & Data Protection act … Experience with a range of IT systems (both on-premises and cloud-based) Knowledge of technical areas, such as anti-virus, networking, vulnerability management, encryption (Microsoft & Linux environments is advantageous) Strong problem-solving ability, with flexibility to think creatively and adapt to and implement constantly evolving systems and more »
Employment Type: Contract
Rate: GBP Annual
Posted:

Security Lead

Hove, England, United Kingdom
Hybrid / WFH Options
HCLTech
Type of Role: Full-time Employee/Full-time contract Job Description: To front end/interface with client leadership team on security delivery management activities. Perform stakeholder management both within HCL and client. Chair periodic governance calls with client stakeholders. Ensure security deliverables are meeting the client … technologies/domains:- EDR/Nextgen AV solutions Data security platforms (Varonis, MS Purview, Stealthbit) FWs/IPS and perimeter security (Proxy, WAF etc) Vulnerability Management and security assessments Governance, Risk & Compliance areas Digital certificates/PKI SOC and SIEM tools/log management Qualifications & Experience Should more »
Posted:
Vulnerability Management
the UK excluding London
10th Percentile
£36,250
25th Percentile
£45,000
Median
£52,500
75th Percentile
£70,000
90th Percentile
£85,000