Vulnerability Management Jobs in the UK excluding London

1 to 25 of 78 Vulnerability Management Jobs in the UK excluding London

Security Consultant

York, Yorkshire, United Kingdom
INFUSED SOLUTIONS LIMITED
partnered with an award winning IT services consultancy based in York, who are looking to take on a Cyber Security Consultant with experience in Vulnerability Management to take the lead on this new project where they will be offering Tenable as a new service. This is a great more »
Employment Type: Full Time
Posted:

Information Security Manager

Leatherhead, England, United Kingdom
Hybrid / WFH Options
Zest
to processing personal data with the highest level of diligence, and you’ll play a pivotal role in maintaining and enhancing our robust infosec management system, acquiring and upholding security certifications, fulfilling the role of our Data Protection Officer and ensuring we have appropriate controls to mitigate risk. You … Simultaneously, your comfort with detail will see you managing the day-to-day operations, keeping our platform and business secure. Key responsibilities Information Security Management & Certifications ISMS Oversight: Maintain and enhance Zest’s Information Security Management System. This includes maintaining documentation, conducting and documenting risk assessments, driving improvements … latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of security systems, controls and infrastructure. Incident Management: Take charge of the response to all information security and data protection incidents and collaborate with various business units to understand, document and learn more »
Posted:

Senior Principal Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help engineering teams identify security-related weaknesses … IT security in one or more of the following areas: software/product security assessments, penetration testing, red teaming, web application assessments Interest in vulnerability research and exploit development Demonstrable experience in designing and evaluating complex systems for security Aptitude for self-study, setting and achieving long term goals … for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances are not required, and more »
Posted:

Security Analyst

Doncaster, England, United Kingdom
Forward Role Recruitment
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and Vulnerability Management tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Posted:

Cyber Security (Subject Matter Expert)

Oxford, Oxfordshire, South East, United Kingdom
Hybrid / WFH Options
Hays
infrastructure and enterprise servicesunderpinning our clients' programme activities. Their project portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral to the delivery of the cyber programme. … relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant information security/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder management skills. Knowledge of Information Security standards … Protection act 2018. Experience with a range of IT systems (bothon-premises and cloud-based). Knowledge of technical areas, such as antivirus,Networking, vulnerability management, encryption (Microsoft & Linuxenvironments are advantageous). Strong problem-solving ability, with flexibility tothink creatively and adapt to and implement constantly evolving systems more »
Employment Type: Contract, Work From Home
Rate: £450.0 - £500.0 per day + Up to £500 Per day
Posted:

Cyber Engineer, PAM Cyberark 2 days PW Reading - £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What We more »
Employment Type: Permanent
Salary: £40,000
Posted:

Lead Cyber Security Consultant

Corsham, Wiltshire, United Kingdom
Searchability
clearance Willingness to be on-site in Corsham 5 days per week Experience required: SOC transformations and operations Developing security operation processes and procedures Vulnerability Management - using Tripwire and Tanium Incident Management - using DCC and Elastic Stack Endpoint security - using vSphere, SolarWinds, Trend Intelligence Driven Defence, Cyber … CONSULTANT/CYBER SECURITY/LEAD/LEAD CONSULTANT/LEAD CYBER CONSULTANT/LEAD CYBER SECURITY CONSULTANT/SOC/SOC OPERATIONS/VULNERABILITY MANAGEMENT/INCIDENT MANAGEMENT/NIST/ENDPOINT SECURITY/CORSHAM/BRISTOL/SOUTHWEST/DV/DV CLEARED/DV more »
Employment Type: Permanent
Salary: GBP 103,000 Annual
Posted:

Information Security Consultant

Romsey, Hampshire, South East, United Kingdom
Hybrid / WFH Options
CBSbutler Holdings Limited
to a wide range of defence clients. You will contribute to the development of security capabilities ranging from Security & Assurance services to leading edge Vulnerability Management and Protective Monitoring capabilities. Based in Romsey/Gloucester (Remote working available) £55,000 - £60,000 per annum + 6% bonus Must … be eligible for Security Clearance Key Responsiblities: Production and maintenance of security documentation including, Secure by Design Documentation, Security Management Plans, RMADS, Security Operating Procedures, Security Cases and Test Security Instructions (TSI). Coordinate Security Risk Analysis and Management activity to support design and accreditation of solutions. This … includes creation and maintenance of the security risk register and management of Risk Balance Cases. Supporting the team lead in the development and deployment of cyber services. Acting as the Security SME for proposals and ITT/ITN responses. Working as part of an Integrated Delivery Team including: Technical more »
Employment Type: Permanent, Work From Home
Salary: £60,000
Posted:

Technical Analyst

West Bromwich, West Midlands, United Kingdom
Hybrid / WFH Options
West Bromwich Building Society
across a range of varied functions, such as M365 Migration, application upgrades and device refreshes. IT Security focused work including patch updates and general vulnerability management The Key Responsibilities Are: Windows 10/11 build automation and image management. Endpoint device set-up and configuration. Hardware and software … and processes are fully followed and advise on IT security related issues. Liaise with 3rd party service providers to resolve problems within agreed timescales. Vulnerability Management to identify and fix Security vulnerabilities. MDM solution administration. Support the Society branch network across 34 locations and our head office functions. … Experience of Windows based administration tools such as Active Directory and Group Policy. Strong troubleshooting, analytical and fault-finding skills Able to automate system management tasks. Excellent communication and interpersonal skills. A strong customer focus. Ability to produce clear and detailed technical documentation. Knowledge of network environments and concepts more »
Employment Type: Permanent, Work From Home
Salary: £35,000
Posted:

Cyber Security Engineer

Birmingham, West Midlands, West Midlands (County), United Kingdom
Hybrid / WFH Options
Delaney & Bourton
approach threat actors take to attacking a network, phishing, port scanning, web application attacks, DDoS, lateral movement. Experience with security monitoring, incident response, and vulnerability management. Understanding of malware analysis, intrusion detection/prevention systems, and endpoint security solutions. Ability to analyze and interpret security logs and data. Role more »
Employment Type: Permanent
Salary: £55000 - £65000/annum + Benefits Package
Posted:

Senior System Engineer

Corby, England, United Kingdom
Iron Mountain
us and see how you can elevate the power of your work at Iron Mountain. We provide expert, sustainable solutions in records and information management, digital transformation services, data centers, asset lifecycle management, and fine art storage, handling, and logistics. We proudly partner every day with our … skills in a culture that will welcome your unique contributions? If so, let's start the conversation. The Role: Senior System Engineer, IT Systems Vulnerability & Patch Management In this role, the Vulnerability & Patch Management Engineer will lead high priority projects and day-to-day activities related … to our Vulnerability & Patch Management Program. The Vulnerability Management Engineer is expected to deliver results while maintaining positive relationships with other IT infrastructure teams and project sponsors. The Vulnerability & Patch Management Engineer will work in a team based environment performing technical duties supporting Vulnerability more »
Posted:

Senior Security Engineer

Welwyn Garden City, England, United Kingdom
Tesco Technology
About the Role Tesco Technology are looking for a Security Engineer reporting into the Vulnerability Management and Pentesting team. This is an exciting opportunity for a highly motivated security focused engineer to join our expanding organisation. The role will involve being hands on with a focus on the … alongside other security colleagues bringing your experience to help. You will be responsible for: Building our detection, data correlation and response capabilities in the Vulnerability Management space. As a team we also feed into the standards and patterns for our engineering community. Create tooling and reporting to help … manage our external attack surface. Build a range of capabilities to inform our stakeholders on the status and progress of Vulnerability Management remediation efforts across the company. Automate integrations between platforms and tooling. Use your observations from security incidents and reporting about relevant security threats to contribute to more »
Posted:

Technical Business Analyst

Reading, England, United Kingdom
Hybrid / WFH Options
Hays
Business Analyst is needed to support a leading telecommunication provider. About the role As a Technical Business Analyst , you will join our client’s Vulnerability Management Team. This role will play a critical part in supporting projects within the team, ensuring key actions are captured, escalating issues as … and actions. Proficiency in data analysis tools (e.g., Excel, SQL, QQL) to extract and manipulate data for reporting purposes. Good to have: Knowledge of vulnerability management concepts, tools, and practices is a plus. Experience in project coordination or support is desirable. Certifications such as Certified Business Analysis Professional … concerns are addressed throughout project lifecycles. Prepare reports and presentations to convey project status, findings, and recommendations. Contribute to process improvements and optimisation of vulnerability management practices. What’s in it for you? – Our client loves to reward their people for doing a great job. This is a more »
Posted:

Cyber Security Engineer

Reading, England, United Kingdom
Hybrid / WFH Options
The People Network
with organisational goals Assist with the development and maintenance of cyber security engineering documentation, policies, and procedures Integrate cyber security solutions (e.g. privileged access management tools) with existing systems, applications, and infrastructure Perform assessments on cloud security and create documentation that enables the business to use the cloud securely … Liaise and coordinate with technology and business stakeholders about cyber security patching and vulnerability management issues/actions Develop and maintain dashboards with cyber security engineering metrics Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Reporting into … infrastructure, network security and application security Good knowledge of MS Stack including exposure to Active Directory, Entra ID and Sentinel Knowledge of Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Linux/Unix is desirable but not essential Ideally more »
Posted:

Information Security Cloud Analyst

Northampton, England, United Kingdom
Peaple Talent
maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat intelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerability management programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of Information Security Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring more »
Posted:

Vulnerability Analyst

Glasgow, Scotland, United Kingdom
TRIA
Information Security Vulnerability Analyst £50,000 - £55,000 Hybrid - 2 days per week in either Horley/Portsmouth/Glasgow office depending on location We are looking for a brilliant Vulnerability Analyst to join a constantly growing UK utilities company as they embark on a 5 year long … for an individual that has: At least 2 years’ cyber security experience, with a background in IT infrastructure or networking Experience or knowledge of vulnerability management tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for more »
Posted:

Information Security Manager

Mansfield, England, United Kingdom
Emberleigh
security posture. Playing a pivotal role in minimising risks & protecting assets. Here’s a taste of what the role will involve: Collaborating with senior management to develop and refine the organisation’s information security strategy, aligning it with business objectives and regulatory requirements. Developing, implementing, and maintaining information & data … as the company subject-matter expert for all security-related matters and develop campaigns/strategies to improve security posture. Manage technical risks via vulnerability management oversight & gap analysis, whilst also overseeing DLP alerts and creating reports. Develop and generate metrics & dashboards for senior management review. What more »
Posted:

Lead Cloud Security Engineer

Reading, England, United Kingdom
Opus Recruitment Solutions
IaC) for secure cloud deployments Implement and manage cloud security tools, including CSPM, CWPP, and CNAPP solutions Conduct security risk assessments, threat modeling, and vulnerability management Develop and enforce security policies, standards, and best practices Automate security processes and workflows using scripting and programming languages Collaborate with cross more »
Posted:

Presales Consultant

Manchester Area, United Kingdom
Hybrid / WFH Options
InfoSec People Ltd
Excellent understanding of cybersecurity trends Ability to interpret customer landscape and challenges Strong presentation and client-facing skills Desired Skills: Knowledge across EDR, SIEM, Vulnerability Management Operational experience with security technologies Existing relationships in Manchester area Self-motivation and ability to work autonomously Job Specifics: This is a more »
Posted:

End User Compute Engineer

York, England, United Kingdom
Investigo Change Solutions
applications specifically including O365 and associated applications. o Application and OS life cycle management. o Patching, specifically Intune, Autopilot, MDM, and OS Patching. o Vulnerability Management. o Print Services. o Facilities, physical security services and supporting platforms. * Make sure operational service are delivered to agreed SLAs, where service does more »
Posted:

Head of Product Cyber Security SME

Hemel Hempstead, England, United Kingdom
Smiths Detection
various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in-depth … security assessments, penetration testing, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for product cyber security initiatives across the organization. Collaborate with senior management to establish product cyber security goals, policies, and procedures aligned with … business objectives. Stay current with evolving cyber threats and industry best practices to ensure the organization's readiness and resilience. Team Leadership: Matrix management of a diverse team of product cyber security professionals across different geographical locations. Foster a collaborative and inclusive work culture that encourages innovation and excellence. more »
Posted:

Infrastructure Support Analyst – York (outskirts – hybrid/remote)

York, England, United Kingdom
Hybrid / WFH Options
Candour Solutions
skills: · Demonstrable experience in an IT infrastructure support or similar role. · Microsoft products (Windows, SCCM, O365, Intune, Azure, SQL) · VMWare (vCenter, ESX, Horizon) · Storage management and administration · Experience of configuring and troubleshooting TCP/IP networking, including switches, routers, firewalls, VLANs and VPNs · Understanding of ITIL And how you … externally provided IT services, including potential involvement with our customer-facing environments. · Maintain and manage the company’s IT security systems, including patching and vulnerability management. · Identify weaknesses in line with IT industry developments and implement improvements. · Monitor and manage backups, resolving any issues may that occur. · Implement IT more »
Posted:

Cyber Security Manager

South East London, London, United Kingdom
The Fortune Group (Recruitment) Limited
business on what is good practice, what are the current threats and how to avoid appearing in the news. Providing specialist security advice to management, project teams and internal stakeholders. Continuous improvement of MI reporting up to and including board level audience. Monitoring the vendor and product landscape to … know what products are available. Perform threat identification and vulnerability management duties. Responsible for ensuring that security vulnerabilities are raised to internal teams and/or 3rd parties suppliers and remediated according to agree timescales. Working with internal and external teams to mitigate and/or control Cyber … Cyber Security risks within IT Operations and escalating as required. Liaising with stakeholders to determine impacts, workarounds, analytical services and recommendations for improvement. Monitoring vulnerability and intelligence feeds for the latest news and alerts in the Cyber Security space. Required You need a proven track record in Security. You more »
Employment Type: Permanent
Salary: £75,000
Posted:

IT Asset Manager

Bradford, West Yorkshire, Yorkshire, United Kingdom
Yorkshire Water
a key part of how we plan to meet the changing expectations of customers and regulators. Where you fit in: As our IT Asset Management Manager you will Develop and mature the IT Asset Management strategy Design and maintain Asset Management policies, procedures and process Ensure our … systems of record and management are maintained and up to to date Provide standard and ad hoc reporting of software and hardware inventory, equipment inventory and other ad hoc reporting of hardware and software estates Monitor and manage software licenses to ensure they comply with license agreements and useage … software harvesting programme, recovering and redeploying unused licences. What skills & qualifications you will need: Considerable experience working in a leadership role in IT Asset Management Demonstratable background knowledge within licence management and software audit management Good understanding of mega vendors including SAP, Oracle, IBM and Microsoft licencing more »
Employment Type: Permanent
Posted:

Cyber Security (Subject Matter Expert) - Long term Project

Didcot, Oxfordshire, United Kingdom
Hybrid / WFH Options
Hays Technology
infrastructure and enterprise servicesunderpinning our clients' programme activities. Their project portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral to the delivery of the cyber programme. … relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant information security/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder management skills. Knowledge of Information Security standards … Protection act 2018. Experience with a range of IT systems (bothon-premises and cloud-based). Knowledge of technical areas, such as antivirus,Networking, vulnerability management, encryption (Microsoft & Linuxenvironments are advantageous). Strong problem-solving ability, with flexibility tothink creatively and adapt to and implement constantly evolving systems more »
Employment Type: Contract
Rate: £450 - £500/day Up to £500 Per day
Posted:
Vulnerability Management
the UK excluding London
10th Percentile
£36,250
25th Percentile
£45,000
Median
£52,500
75th Percentile
£71,125
90th Percentile
£91,250