Vulnerability Management Jobs in England

1 to 25 of 143 Vulnerability Management Jobs in England

Security Consultant

York, Yorkshire, United Kingdom
INFUSED SOLUTIONS LIMITED
partnered with an award winning IT services consultancy based in York, who are looking to take on a Cyber Security Consultant with experience in Vulnerability Management to take the lead on this new project where they will be offering Tenable as a new service. This is a great more »
Employment Type: Full Time
Posted:

Technical Product Manager - Security

London, United Kingdom
Wise
manage our security risks through governance, we detect and protect Wise from unauthorised access, and we respond to and recover fast from security incidents. Vulnerability Management, Threat Management, Change Management, Access Management and Compliance are core products and strategic themes of the Squad.We are looking more »
Salary: £ 80 K
Posted:

InfoSec Analyst I

London, United Kingdom
Hybrid / WFH Options
MongoDB
The worldwide data management software market is massive (According to IDC, the worldwide database software market, which it refers to as the database management systems software market, was forecasted to be approximately $82 billion in 2023 growing to approximately $137 billion in 2027. This represents a 14% compound … reflect the current state of MongoDB’s productsCoordinate responses to high-profile supply chain eventsRequirementsBasic understanding of the following security concepts: encryption, access controls, vulnerability management, SSDLC, incident response, and business continuity/disaster recovery as they apply in a cloud environmentBasic understanding of the following cloud networking more »
Salary: £ 70 K
Posted:

Security Analyst

Doncaster, England, United Kingdom
Forward Role Recruitment
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and Vulnerability Management tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Posted:

Senior Principal Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help engineering teams identify security-related weaknesses … IT security in one or more of the following areas: software/product security assessments, penetration testing, red teaming, web application assessments Interest in vulnerability research and exploit development Demonstrable experience in designing and evaluating complex systems for security Aptitude for self-study, setting and achieving long term goals … for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances are not required, and more »
Posted:

Senior Security Analyst

London Area, United Kingdom
Hybrid / WFH Options
Korn Ferry
to contain and remediate security incidents. Threat Intelligence Keep up to date with latest trends in cybersecurity threats, vulnerabilities, and best practices. Security Infrastructure Management Assist with the maintenance of existing security tools and technologies, such as SIEM, EDR and firewalls. Contribute to the selection of new security tools. … Documentation and Reporting Create and maintain detailed documentation of security processes and procedures. Generate regular reports on security metrics, incidents, and trends for management review. Collaboration and Communication Work closely with other IT teams to identify and remediate security vulnerabilities. PROFESSIONAL EXPERIENCE/QUALIFICATIONS/SKILLS Hands on experience … with security tools such as SIEM/EDR and vulnerability Management. Proven experience in a security operations role. In-depth knowledge of cybersecurity principles, threat landscapes, and attack vectors. Experience working in a large, multinational, complex company. Good knowledge of infrastructure concepts – such as Windows/Linux, DNS, AD more »
Posted:

Infrastructure security engineer

London Area, United Kingdom
Lorien
includes the provision of escalation security support to the Service Desk, Desktop Support, participation in Infrastructure Security projects and being responsible for Information Security Management System (ISMS) maintenance. Key Responsibilities/Accountabilities Taking responsibility for leading, guiding, supporting and delivering secure architectural design for the group cyber security maturity … or multiple offices location in order to complete your tasks for off the network countries. Knowledge and Experience Experience in Azure cloud and identity management solutions. Specific focus on network equipment. Palo Alto Firewall, Imperva WAF and NAC experience Netskope proxy and CASB experience Microsoft Defender and Crowdstrike experience … SSO & MFA gateway Data loss prevention tools experience Azure security centre and Wiz io experience Cymulate and Ping Castel experience SCCM or enterprise patch management tools TenableOne or enterprise vulnerability management tools Sound knowledge of industry best practices such as OWASP, Cyber security framework and NCSC guidance more »
Posted:

Information Security Manager

Leatherhead, England, United Kingdom
Hybrid / WFH Options
Zest
to processing personal data with the highest level of diligence, and you’ll play a pivotal role in maintaining and enhancing our robust infosec management system, acquiring and upholding security certifications, fulfilling the role of our Data Protection Officer and ensuring we have appropriate controls to mitigate risk. You … Simultaneously, your comfort with detail will see you managing the day-to-day operations, keeping our platform and business secure. Key responsibilities Information Security Management & Certifications ISMS Oversight: Maintain and enhance Zest’s Information Security Management System. This includes maintaining documentation, conducting and documenting risk assessments, driving improvements … latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of security systems, controls and infrastructure. Incident Management: Take charge of the response to all information security and data protection incidents and collaborate with various business units to understand, document and learn more »
Posted:

Lead Cyber Security Consultant

Corsham, Wiltshire, United Kingdom
Searchability
clearance Willingness to be on-site in Corsham 5 days per week Experience required: SOC transformations and operations Developing security operation processes and procedures Vulnerability Management - using Tripwire and Tanium Incident Management - using DCC and Elastic Stack Endpoint security - using vSphere, SolarWinds, Trend Intelligence Driven Defence, Cyber … CONSULTANT/CYBER SECURITY/LEAD/LEAD CONSULTANT/LEAD CYBER CONSULTANT/LEAD CYBER SECURITY CONSULTANT/SOC/SOC OPERATIONS/VULNERABILITY MANAGEMENT/INCIDENT MANAGEMENT/NIST/ENDPOINT SECURITY/CORSHAM/BRISTOL/SOUTHWEST/DV/DV CLEARED/DV more »
Employment Type: Permanent
Salary: GBP 103,000 Annual
Posted:

Cyber Security Engineer - Firewall

Teddington, London, United Kingdom
Matchtech
number of Cyber Security Engineers to join our client, a leading technology company. As a Cyber Security Engineer you will be focused on Firewall management, network security and Vulnerability Management. You will play a vital role in protecting our client's systems and data from cyber threats. About … the Role As a Cyber Security Engineer your primary responsibility will be Firewall Management, Network Security, Network Segmentation and Vulnerability Management. In addition, you will work closely with the Cyber Security Manager and Security Architect to independently resolve complex issues. Key Responsibilities Experience with enterprise networks including next … generation firwalls, network segmentation technology (Forescout preferred) and internet connectivity. Experience with EDR, M365 security, SIEM, Vulnerability management, MITRE attack framework and Incident response. Experience of providing knowledge transfer to Service Delivery teams and developing other cybersecurity team members. Having an in-depth understanding of threats in a more »
Employment Type: Permanent
Salary: £50000 - £60000/annum
Posted:

Senior Cyber Security Engineer

Teddington, London, United Kingdom
Matchtech
career development opportunities. About the Role As a Cyber Security Engineer your primary responsibility will be Security Operations and Incident Response as well as Vulnerability Management and Threat Intelligence. In addition, you will work closely with the Cyber Security Manager and Security Architect to independently resolve complex issues. … security operations centre (SOC) and responding to security alerts. Experience in creating response playbooks and handling escalations. Additional experience in EDR, M365 security, SIEM, Vulnerability management, MITRE attack framework, and Incident response. Strong stakeholder engagement skills and the ability to promote a secure mindset within an organisation. Previous more »
Employment Type: Permanent
Salary: £50000 - £60000/annum
Posted:

Technical Analyst

West Bromwich, West Midlands, United Kingdom
Hybrid / WFH Options
West Bromwich Building Society
across a range of varied functions, such as M365 Migration, application upgrades and device refreshes. IT Security focused work including patch updates and general vulnerability management The Key Responsibilities Are: Windows 10/11 build automation and image management. Endpoint device set-up and configuration. Hardware and software … and processes are fully followed and advise on IT security related issues. Liaise with 3rd party service providers to resolve problems within agreed timescales. Vulnerability Management to identify and fix Security vulnerabilities. MDM solution administration. Support the Society branch network across 34 locations and our head office functions. … Experience of Windows based administration tools such as Active Directory and Group Policy. Strong troubleshooting, analytical and fault-finding skills Able to automate system management tasks. Excellent communication and interpersonal skills. A strong customer focus. Ability to produce clear and detailed technical documentation. Knowledge of network environments and concepts more »
Employment Type: Permanent, Work From Home
Salary: £35,000
Posted:

Cyber Security Engineer

Birmingham, West Midlands, West Midlands (County), United Kingdom
Hybrid / WFH Options
Delaney & Bourton
approach threat actors take to attacking a network, phishing, port scanning, web application attacks, DDoS, lateral movement. Experience with security monitoring, incident response, and vulnerability management. Understanding of malware analysis, intrusion detection/prevention systems, and endpoint security solutions. Ability to analyze and interpret security logs and data. Role more »
Employment Type: Permanent
Salary: £55000 - £65000/annum + Benefits Package
Posted:

Cyber Engineer, PAM Cyberark 2 days PW Reading - £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What We more »
Employment Type: Permanent
Salary: £40,000
Posted:

Senior System Engineer

Corby, England, United Kingdom
Iron Mountain
us and see how you can elevate the power of your work at Iron Mountain. We provide expert, sustainable solutions in records and information management, digital transformation services, data centers, asset lifecycle management, and fine art storage, handling, and logistics. We proudly partner every day with our … skills in a culture that will welcome your unique contributions? If so, let's start the conversation. The Role: Senior System Engineer, IT Systems Vulnerability & Patch Management In this role, the Vulnerability & Patch Management Engineer will lead high priority projects and day-to-day activities related … to our Vulnerability & Patch Management Program. The Vulnerability Management Engineer is expected to deliver results while maintaining positive relationships with other IT infrastructure teams and project sponsors. The Vulnerability & Patch Management Engineer will work in a team based environment performing technical duties supporting Vulnerability more »
Posted:

Security Engineer

London Area, United Kingdom
Marcus Donald People
Office 365, Defender for Cloud, Defender for Cloud Apps (CASB) Preferrable: Defender for Identity, Azure MFA), IBM QROC/QRadar. Desirable: Any experience of Vulnerability Management Optimisation at scale in an enterprise environment. (e.g., Kenna. VM/Cisco Vulnerability Management, Nucleus, Rapid 7, Armis – other similar … Vulnerability Management Optimisation platforms also considered) In addition you must have Prior experience in Security Engineering and track record in carrying out technical security risk assessments. Good understanding for how to assess third-party suppliers of cloud/SaaS based technology platforms. Experience in vulnerability management optimisation (e.g., Kenna. VM/Cisco Vulnerability Management, Nucleus, Rapid 7, Armis – other similar Vulnerability Management Optimisation platforms also accepted). Data Classification and Labelling, Microsoft Purview. Bachelor's degree in a security related field is preferred (i.e., Security Analysis, Penetration Testing, Malware Analysis, Digital more »
Posted:

Senior Security Engineer

Welwyn Garden City, England, United Kingdom
Tesco Technology
About the Role Tesco Technology are looking for a Security Engineer reporting into the Vulnerability Management and Pentesting team. This is an exciting opportunity for a highly motivated security focused engineer to join our expanding organisation. The role will involve being hands on with a focus on the … alongside other security colleagues bringing your experience to help. You will be responsible for: Building our detection, data correlation and response capabilities in the Vulnerability Management space. As a team we also feed into the standards and patterns for our engineering community. Create tooling and reporting to help … manage our external attack surface. Build a range of capabilities to inform our stakeholders on the status and progress of Vulnerability Management remediation efforts across the company. Automate integrations between platforms and tooling. Use your observations from security incidents and reporting about relevant security threats to contribute to more »
Posted:

Technical Business Analyst

Reading, England, United Kingdom
Hybrid / WFH Options
Hays
Business Analyst is needed to support a leading telecommunication provider. About the role As a Technical Business Analyst , you will join our client’s Vulnerability Management Team. This role will play a critical part in supporting projects within the team, ensuring key actions are captured, escalating issues as … and actions. Proficiency in data analysis tools (e.g., Excel, SQL, QQL) to extract and manipulate data for reporting purposes. Good to have: Knowledge of vulnerability management concepts, tools, and practices is a plus. Experience in project coordination or support is desirable. Certifications such as Certified Business Analysis Professional … concerns are addressed throughout project lifecycles. Prepare reports and presentations to convey project status, findings, and recommendations. Contribute to process improvements and optimisation of vulnerability management practices. What’s in it for you? – Our client loves to reward their people for doing a great job. This is a more »
Posted:

Senior Cyber Security Lead - Cloud, Risk, Technical, Agile, leadership, SC Clearance, Hybrid.

London, United Kingdom
Hybrid / WFH Options
Bangura Solutions
requires a Senior Cyber Security Specialist to work alongside and lead the Cyber Defence team delivering cyber threat intelligence, threat detection, incident response, and vulnerability management capabilities for the organisation.you will be leading the defence function, by providing strategic direction and coordinating day-to-day delivery of threat … intelligence, threat detection, incident response, vulnerability management and ethical hacking capabilities identify and deliver opportunities for continual improvement of the cyber defence function brief senior stakeholders on the cyber threat to the organisation take a leadership role in the cyber security team, the organisation, and the government security … and risk management communitiesSkills and experience you should have a breadth of experience across cyber threat intelligence, detection, and response experience investigating, managing, and coordinating the response to, major cyber incidents have an in-depth understanding of the tools, techniques, and procedures used by threat actors Have experience taking more »
Salary: £ 70 K
Posted:

Security Engineer

London Area, United Kingdom
Hybrid / WFH Options
Cognitive Group | Part of the Focus Cloud Group
objectives. WHAT WILL YOU BE DOING? Mitigating security risks associated with Bring Your Own Device, securing personal devices in a corporate environment. Ownership of vulnerability management strategy. Preventing security breaches and ensuring system integrity Responsibility of deploying an Endpoint Detection and Response platform - which will involve configuring the … + years of working in IT, Network, and/or Security Engineering ● Experience in designing/deploying BYOD controls, for example Mobile Application Management solutions on iOS and Android ● Experience with Vulnerability Management ● Experience with EDR platforms (SentinelOne, CrowdStrike etc) Desirable ● Experience with Kandji, Jamf, Intune, Landscape more »
Posted:

Cyber Security Engineer

London Area, United Kingdom
Provide
Cyber Security Engineer, M&A, £635(inside) 10 months +Extension – SIEM, SOAR, IdAM, Vulnerability Management, Trellix Are you a Cyber Security Engineer and ready to take on a pivotal role in a global business? Working on a M&A, the largest in its sector. You will be joining … management. Create and maintain cyber action plan. Track and communicate progress, risks, and issues. Review, report, and sign-off Infrastructure designs. Security Tooling (EDR, Vulnerability Management, IdAM, SIEM, SOAR). Input/review into cyber security design artefacts (HLD/LLD) and provide security engineering consultancy. Implementation cyber more »
Posted:

Application Security Specialist

England, United Kingdom
Dragonfly People
Application Security Specialist Security | Application | DevSecOps | CI/CD | Burp Suite | Penetration Testing | Vulnerability Management | Fin-Tech An Application Security Specialist is required by a rapidly growing consumer Fin-Tech business who are based in London. The Application Security Specialist will need to have advanced knowledge of secure … well as understanding of IDE's & CI/CD solutions. The Application Security Specialist will have experience with application security assessment, penetration testing, and vulnerability management. Application Security Specialist Requirements: Experience with Application Security. Experience with SDLC and DevSecOps. Penetration Testing and Vulnerability Management experience. Used to more »
Posted:

Cyber Security Engineer

Reading, England, United Kingdom
Hybrid / WFH Options
The People Network
with organisational goals Assist with the development and maintenance of cyber security engineering documentation, policies, and procedures Integrate cyber security solutions (e.g. privileged access management tools) with existing systems, applications, and infrastructure Perform assessments on cloud security and create documentation that enables the business to use the cloud securely … Liaise and coordinate with technology and business stakeholders about cyber security patching and vulnerability management issues/actions Develop and maintain dashboards with cyber security engineering metrics Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Reporting into … infrastructure, network security and application security Good knowledge of MS Stack including exposure to Active Directory, Entra ID and Sentinel Knowledge of Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Linux/Unix is desirable but not essential Ideally more »
Posted:

Senior Information Security Engineer

London Area, United Kingdom
JNC Recruitment Limited
through developing the operational systems Maintain, support and develop their security procedures and tooling Assist and support the wider security teams including Architecture, Audits, Vulnerability Management, Project Management and 3rd parties Be available for out of hours support in case of critical issues - uncommon Skills Required: Security … Technologies & Tooling: endpoint protection tools, vulnerability scanners, network security, cloud security Access Management & Authentication: IAM, PAM, PIM, SSO, MFA etc Microsoft: Active Directory, Windows Server & SQL Server Linux: Ubuntu, RedHat, Rocky Cloud: 365, Azure, AWS DevOps/DevSecOps: Infrastructure as Code - IaC Scripting: PowerShell, Python, Bash In line more »
Posted:

Information Security Cloud Analyst

Northampton, England, United Kingdom
Peaple Talent
maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat intelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerability management programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of Information Security Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring more »
Posted:
Vulnerability Management
England
10th Percentile
£40,000
25th Percentile
£50,250
Median
£65,000
75th Percentile
£88,125
90th Percentile
£97,275