Permanent Vulnerability Management Jobs in the South East

1 to 23 of 23 Permanent Vulnerability Management Jobs in the South East

Cyber Threat & Vulnerability Analyst

Reading, England, United Kingdom
The People Network
Cyber Threat & Vulnerability Analyst – Reading/Hybrid up to £50k + Benefits An opportunity for a Cyber Threat & Vulnerability Analyst to join the team of a growing Cyber Security team at a large enterprise serving millions of customers! The business is making a big investment in Cyber and … impact and have your voice heard! In this role, you will be responsible for supporting the design, implementation, and maintenance of the Cyber Threat & Vulnerability Management solutions, controls, and processes across the business. Your responsibilities will be but not limited to: Support vulnerability management across the … infrastructure Investigate newly identified Cyber Security vulnerabilities and provide appropriate mitigation actions Work closely with technology and business stakeholders about Cyber Security patching and vulnerability management issues/actions Perform proactive threat hunting for new and emerging cyber threats Maintain dashboards with Cyber Security threat and vulnerability more »
Posted:

Penetration Test Manager

Crawley, West Sussex, United Kingdom
Morson Talent
enhance a comprehensive red and purple team penetration testing program, aligning it with major threat information and industry cybersecurity intelligence. Establish and maintain a vulnerability management process to identify, assess, prioritise, and track remediation of security vulnerabilities and weaknesses in accordance with UKPN policy. Ensure that robust IT … disaster recovery and business continuity strategies and plans are in place, with regular testing to verify their effectiveness. Key Skills and Qualifications Leadership and Management: Experience: in a leadership role within a Cybersecurity Assurance function or similar, such as Cybersecurity Integration or Engineering, with a focus on assurance testing … techniques and methodologies. Team Management: Proven track record in leading a security team or function, with an emphasis on collaboration across partners with varying levels of technical security competency. Educational Background: Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM more »
Employment Type: Permanent
Posted:

Penetration Test Manager

Hampshire, South East, United Kingdom
Morson Talent
enhance a comprehensive red and purple team penetration testing program, aligning it with major threat information and industry cybersecurity intelligence. Establish and maintain a vulnerability management process to identify, assess, prioritise, and track remediation of security vulnerabilities and weaknesses in accordance with UKPN policy. Ensure that robust IT … disaster recovery and business continuity strategies and plans are in place, with regular testing to verify their effectiveness. Key Skills and Qualifications Leadership and Management: Experience: in a leadership role within a Cybersecurity Assurance function or similar, such as Cybersecurity Integration or Engineering, with a focus on assurance testing … techniques and methodologies. Team Management: Proven track record in leading a security team or function, with an emphasis on collaboration across partners with varying levels of technical security competency. Educational Background: Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM more »
Employment Type: Permanent
Posted:

Cyber Security Engineer (IT digital systems)

South East, United Kingdom
Hudson Shribman
Engineer role will support the systems and applications that deliver enterprise security services for a global organisation. With a focus on identity and access management, the Security Engineer will provide expert knowledge to support the planning, design, development, and deployment of centralized IAM and PAM solutions and the delivery … of the enterprise-level Privileged Access Management program. The role will also support the implementation and management of all cyber security technologies and services in use at the company Role & Accountabilities KEY Identity access management, experience/involvement with Security services such as SIEM and Vulnerability … a subject matter expert on key principles of (IAM) with an in-depth knowledge in the areas of authentication and authorization systems, identity lifecycle management, and identity governance. Build the IAM strategy, and ensure its implementation is a success across the business. Staying up-to-date on current IAM more »
Employment Type: Permanent
Salary: £60,000
Posted:

Information Security Manager

Leatherhead, England, United Kingdom
Hybrid / WFH Options
Zest
to processing personal data with the highest level of diligence, and you’ll play a pivotal role in maintaining and enhancing our robust infosec management system, acquiring and upholding security certifications, fulfilling the role of our Data Protection Officer and ensuring we have appropriate controls to mitigate risk. You … Simultaneously, your comfort with detail will see you managing the day-to-day operations, keeping our platform and business secure. Key responsibilities Information Security Management & Certifications ISMS Oversight: Maintain and enhance Zest’s Information Security Management System. This includes maintaining documentation, conducting and documenting risk assessments, driving improvements … latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of security systems, controls and infrastructure. Incident Management: Take charge of the response to all information security and data protection incidents and collaborate with various business units to understand, document and learn more »
Posted:

Senior Information Technology Engineer

High Wycombe, England, United Kingdom
Arden Resourcing Limited
role will be a hands-on senior role within the organisation to implement and manage the entire companies’ internal infrastructure including desktop security, endpoint management, vulnerability management, asset management and working to provide security operations. The role will involve control and deployment of all processes for more »
Posted:

Threat and Vulnerability Analyst Reading 2 days PW to £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
Cyber Threat & Vulnerability Analyst - Reading 2 days PW, to £50k Are you ready to dive into the world of cyber security and protect critical digital landscapes? We are looking for a passionate and skilled Cyber Threat & Vulnerability Analyst to join a great team and help us safeguard systems … Play a pivotal role in our digital transformation journey. Collaborate with a dynamic team to enhance security measures. Engage in proactive threat hunting and vulnerability management. Key Responsibilities: Support enterprise-wide vulnerability management, ensuring effective identification, categorization, and mitigation. Develop and maintain threat assessment and vulnerability management (TVM) documentation, policies, and procedures. Integrate advanced cyber security solutions with existing systems and infrastructure. Investigate and mitigate newly identified cyber security vulnerabilities. Coordinate with stakeholders on cyber security patching and vulnerability management. Participate in major incident response when necessary. Perform proactive threat hunting for emerging more »
Employment Type: Permanent
Salary: £40,000
Posted:

Infrastructure Engineer (Security Career Development Opportunity)

Brighton, England, United Kingdom
JNC Recruitment Limited
systems and applications Responding to incidents and delivering fixes in line with SLAs and corporate processes Technical experience required includes: Comprehensive experience in SCCM management and administration Active Directory administration including DNS, DHCP, PKI and Group Policy Strong Microsoft Windows Server 2008 – 2022 Administration in a hybrid cloud environment … and Endpoint Manager PowerShell scripting ITIL Networking Fundamentals - Palo Alto and Cisco Bonus extra skills include: MS Defender/MS Defender for Cloud Tenable Vulnerability Management, or other Vulnerability Management tool Knowledge of monitoring tools such as Splunk, Netcrunch or Solarwinds (or others) This opportunity would … suit an engineer with an inherent interest in IT Security, as the role will develop the post holder's Monitoring and Vulnerabilty Management skills on the job. The role is available on a hybrid basis remotely and from the offices in easy to get to Central Brighton 1 day more »
Posted:

Cyber Security Engineer

Reading, England, United Kingdom
Hybrid / WFH Options
The People Network
with organisational goals Assist with the development and maintenance of cyber security engineering documentation, policies, and procedures Integrate cyber security solutions (e.g. privileged access management tools) with existing systems, applications, and infrastructure Perform assessments on cloud security and create documentation that enables the business to use the cloud securely … Liaise and coordinate with technology and business stakeholders about cyber security patching and vulnerability management issues/actions Develop and maintain dashboards with cyber security engineering metrics Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Reporting into … infrastructure, network security and application security Good knowledge of MS Stack including exposure to Active Directory, Entra ID and Sentinel Knowledge of Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Linux/Unix is desirable but not essential Ideally more »
Posted:

Cyber Security Testing Manager

Crawley, England, United Kingdom
Vallum Associates
related field or equivalent training and/or experience. Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+). Track … had to collaborate across partners with differing levels of technical security competency. Advanced knowledge and an understanding of operational excellence in Cloud Security Posture Management and Vulnerability Management programs. Understanding risk, resource availability and business objectives at a group level is necessary. Putting our customer's interests more »
Posted:

Cyber Engineer, PAM Cyberark 2 days PW Reading - £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What We more »
Employment Type: Permanent
Salary: £40,000
Posted:

Head of Information Security

Reading, England, United Kingdom
Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
Posted:

Cyber Security Consultant

Horsham, England, United Kingdom
83zero
relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, Vulnerability Management utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain more »
Posted:

Security Analyst

Hampshire, England, United Kingdom
Shaw Daniels Solutions
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and … monitor for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular Vulnerability Scanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. … Asses the urgency and severity of incidents. Determine whether an incident requires immediate action or further investigation. Escalate incidents to higher tiers when necessary. Vulnerability Scanning: scan systems for vulnerabilities. and manage vulnerabilities discovered during scans. Security Tool Management: Configure and manage security tools (e.g., SIEM, IDS/ more »
Posted:

Cyber Security Manager

Maidstone, Kent, South East, United Kingdom
Pearson Whiffin Recruitment Ltd
organisations assets and information. Role & Responsibilities: To act as a trusted advisor on information security matters. Oversee, manage , and maintain the companys information security management system and associated security certifications ( currently ISO 27001 and Cyber Essentials Plus in the UK) Support internal business teams with client and 3rd party … business. Manage and lead on security events and incidents reported or highlighted through internal processes and controls. Organise and support internal and external audits, vulnerability management processes, penetration testing and business continuity/disaster recovery planning. Contribute towards the annual budget and forecasting process for Infosec related items. … and communicate this appropriately to your audience. The ability to embrace and encourage change and provide continual improvement. Implementation of and/or ongoing management of security policies and associated documentation. A pragmatic view of information security and its relationship with the wider business objectives. A willingness to self more »
Employment Type: Permanent
Posted:

Cyber Security Consultant

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
one or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identity and access management , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and negotiating technical outcomes … with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group – Carbon positive tech recruitment more »
Posted:

Lead Cloud Security Engineer

Reading, England, United Kingdom
Opus Recruitment Solutions
IaC) for secure cloud deployments Implement and manage cloud security tools, including CSPM, CWPP, and CNAPP solutions Conduct security risk assessments, threat modeling, and vulnerability management Develop and enforce security policies, standards, and best practices Automate security processes and workflows using scripting and programming languages Collaborate with cross more »
Posted:

Information Security Consultant

Romsey, England, United Kingdom
Hybrid / WFH Options
CBSbutler Holdings
to a wide range of defence clients. You will contribute to the development of security capabilities ranging from Security & Assurance services to leading edge Vulnerability Management and Protective Monitoring capabilities. Based in Romsey/Gloucester (Remote working available) £55,000 - £60,000 per annum + 6% bonus Must … be eligible for Security Clearance Key Responsiblities: Production and maintenance of security documentation including, Secure by Design Documentation, Security Management Plans, RMADS, Security Operating Procedures, Security Cases and Test Security Instructions (TSI). Coordinate Security Risk Analysis and Management activity to support design and accreditation of solutions. This … includes creation and maintenance of the security risk register and management of Risk Balance Cases. Supporting the team lead in the development and deployment of cyber services. Acting as the Security SME for proposals and ITT/ITN responses. Working as part of an Integrated Delivery Team including: Technical more »
Posted:

Information Security Consultant

Romsey, Hampshire, South East, United Kingdom
Hybrid / WFH Options
CBSbutler Holdings Limited
to a wide range of defence clients. You will contribute to the development of security capabilities ranging from Security & Assurance services to leading edge Vulnerability Management and Protective Monitoring capabilities. Based in Romsey/Gloucester (Remote working available) £55,000 - £60,000 per annum + 6% bonus Must … be eligible for Security Clearance Key Responsiblities: Production and maintenance of security documentation including, Secure by Design Documentation, Security Management Plans, RMADS, Security Operating Procedures, Security Cases and Test Security Instructions (TSI). Coordinate Security Risk Analysis and Management activity to support design and accreditation of solutions. This … includes creation and maintenance of the security risk register and management of Risk Balance Cases. Supporting the team lead in the development and deployment of cyber services. Acting as the Security SME for proposals and ITT/ITN responses. Working as part of an Integrated Delivery Team including: Technical more »
Employment Type: Permanent, Work From Home
Salary: £60,000
Posted:

Senior Principal Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help engineering teams identify security-related weaknesses … IT security in one or more of the following areas: software/product security assessments, penetration testing, red teaming, web application assessments Interest in vulnerability research and exploit development Demonstrable experience in designing and evaluating complex systems for security Aptitude for self-study, setting and achieving long term goals … for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances are not required, and more »
Employment Type: Technology
Posted:

Information Security Officer

Farnborough, England, United Kingdom
Hybrid / WFH Options
Shaw Daniels Solutions
with stakeholders, to uncover emerging risks and opportunities for malicious actors. Produce written reports, status updates, actions, minutes to support decision making within the management systems governance programme. Conduct annual Business Impact Assessments with relevant teams Ensure and track that staff get the infosec training required Annual infosec and … the document review period. Compile a list of actions to address any lapses and track to conclusion. Assist with the monitoring of our platform vulnerability management systems and logging of identified vulnerabilities In the event of any security event, be part of the response team, by providing infosec more »
Posted:

Senior Cyber Security Analyst

Brighton, England, United Kingdom
Hybrid / WFH Options
Hays
infrastructure for the organisation. The role responsibilities: You will be supporting the Head of IT and Cyber Security with the day-to-day operational management of the cyber security function. You will work with the Senior Cyber Security Manager to define and evolve the cyber strategy across the organisation. … and analyse security incidents and breaches, and lead incident response efforts to contain and mitigate the impact in a timely manner. Reporting to senior management on Cyber related metrics and improvement needs. Foster a culture of security awareness and compliance amongst team members and stakeholders through training, education, and … initiatives. Leading any major cyber incidents should they arise. Escalating security concerns that are not being adequately addressed through the established risk/issue management framework. You will need: You will need to be able to influence and collaborate with other teams in the organisation, and the ability to more »
Posted:

Penetration Testing Manager

Winchester, Hampshire, United Kingdom
Matchtech Group PLC
and best practices.Key Responsibilities:Define and deliver the cyber security technical assurance strategyManage the cyber security technical assurance teamEstablish and improve penetration testing and vulnerability management processes, including red team and purple team exercisesDevelop and implement IT disaster recovery and business continuity plansDeputise for the Head of Cyber more »
Salary: £ 70 K
Posted:
Vulnerability Management
the South East
10th Percentile
£40,250
25th Percentile
£50,938
Median
£60,000
75th Percentile
£73,750
90th Percentile
£85,000