Permanent Vulnerability Management Jobs in the Midlands

23 of 23 Permanent Vulnerability Management Jobs in the Midlands

Information Security Manager

Birmingham, UK
Inspired Thinking Group (ITG)
safeguard the organisation's information and technology systems. As the Information Security Manager , you will be responsible for overseeing the organisation's information security management system (ISMS). Your primary focus will be on managing the delivery of, and improving, security policies, practices, and standards to protect our company … mitigate potential vulnerabilities. The Information Security Manager will perform fundamental security and data protection tasks. You will conduct security and data protection assessments, supporting vulnerability management, reviewing security configurations, and contributing to the development of security and data protection policies. The ideal candidate is eager to learn and … posture of our systems and infrastructure Work collaboratively with other departments to ensure the alignment of security efforts with wider business objectives 2. Risk Management: Identify and assess information security risks Provide recommendations for mitigating and managing risks effectively Security system management, administration and reporting; Provide advice and More ❯
Posted:

MLOps Engineer

Worcester, Worcestershire, UK
Methods Analytics
regular performance reviews and data audits of deployed models, tracking model drift and identifying opportunities for optimisation to enhance performance and reliability. Security and Vulnerability Management: Participate in threat modelling to identify and assess potential security risks throughout the ML lifecycle. Implement and maintain vulnerability management … Infrastructure: Experience with cloud platforms (AWS, Azure, or GCP) and managing cloud-based ML workflows and resources at scale. Experience with Threat Modelling and Vulnerability Management: Proven ability to conduct threat modelling exercises to identify security risks. Experience in Security and Compliance: Demonstrated experience working within secure, high … that is making a difference in society. A supportive and collaborative environment. As well as this, we offer: Development: access to LinkedIn Learning, a management development programme and training. Wellness: 24/7 Confidential employee assistance programme. Time off: 25 days of annual leave a year, plus bank holidays More ❯
Posted:

Senior Service Delivery Manager

Warwickshire, West Midlands, United Kingdom
Hybrid / WFH Options
Searchability (UK) Ltd
infrastructure operations in a dynamic environment Hybrid working available (2 days onsite in Rugby) Salary £120,000 - £130,000 Opportunity to drive governance, risk management, and service excellence. ABOUT THE CLIENT Our client is a leading organisation that places cybersecurity and infrastructure at the core of its operations. Their … cybersecurity tools, enforce ITIL processes, drive governance, and mitigate risks. Your role will involve working closely with stakeholders to enhance security resilience, oversee incident management, and ensure SLAs are met while continuously improving service delivery frameworks. SERVICE DELIVERY SKILLS: Strong experience in cybersecurity and IT infrastructure roles. Strong background … and infrastructure operations Expertise in ITIL frameworks , including Incident, Change, and Problem Management. Hands-on experience with SIEM, IAM/PAM, Endpoint Security, Firewalls, Vulnerability Management, Encryption, and Cloud/On-Prem security solutions . Proven track record in risk management, SLA monitoring, and operational governance . More ❯
Employment Type: Permanent, Work From Home
Posted:

Senior DevSecOps Architect

Nottingham, UK
Computacenter AG & Co. oHG
Development. Container native technology and ecosystem projects e.g. OpenShift, EKS, AKS and vanilla K8s. The application of DevSecOps practices to application delivery e.g. Secrets Management, Application Security Testing, Vulnerability Management etc. Ability to integrate security controls into the DevSecOps lifecycle to ensure ongoing compliance with standards like … PCI DSS, etc. Technical knowledge Technical knowledge and hands-on experience in the following technologies (providing cert details where applicable): Issue and Project Management tools such as JIRA, Confluence. Hashicorp Terraform. Hashicorp Vault. SAST Security Testing such as GitLab, Checkmarx or Veracode. DAST Security Testing such as OWASP ZAP … or Veracode. SCA Security Testing such as Checkmarx, Trivy, or Veracode. IAST Security Testing such as Checkmarx. Vulnerability Management such as PA Prisma. QA Testing such as Selenium. Ready to make a difference? If you’re a leader in DevSecOps, with the technical know-how and the drive More ❯
Posted:

Senior DevSecOps Architect

Birmingham, UK
Computacenter AG & Co. oHG
Development. Container native technology and ecosystem projects e.g. OpenShift, EKS, AKS and vanilla K8s. The application of DevSecOps practices to application delivery e.g. Secrets Management, Application Security Testing, Vulnerability Management etc. Ability to integrate security controls into the DevSecOps lifecycle to ensure ongoing compliance with standards like … PCI DSS, etc. Technical knowledge Technical knowledge and hands-on experience in the following technologies (providing cert details where applicable): Issue and Project Management tools such as JIRA, Confluence. Hashicorp Terraform. Hashicorp Vault. SAST Security Testing such as GitLab, Checkmarx or Veracode. DAST Security Testing such as OWASP ZAP … or Veracode. SCA Security Testing such as Checkmarx, Trivy, or Veracode. IAST Security Testing such as Checkmarx. Vulnerability Management such as PA Prisma. QA Testing such as Selenium. Ready to make a difference? If you’re a leader in DevSecOps, with the technical know-how and the drive More ❯
Posted:

Senior TechOps Engineer

Nottingham, Nottinghamshire, East Midlands, United Kingdom
Hybrid / WFH Options
Microlise
Coordinate with Development and other departments to ensure these systems and records remain accurate and available Plan & Develop automation workflows to streamline deployments, infrastructure management and security processes with dry run testing and complete roll back functionality Analyse, diagnose and rectify system or service errors/faults as tasked … as Terraform, Ansible, PowerShell Experience with monitoring/logging tools SolarWinds, Grafana, Elastic Familiarity with security concepts such as Zero Trust, Identity and Access Management Vulnerability management, OWASP Understanding of CI/CD pipelines Familiar with Entra ID, AD, DNS, Azure Ability to troubleshoot complex issues across … desirable) Backup Concepts Database knowledge (MS SQL, Postgres) CI/CD Tools (Azure DevOps pipelines) IAM - OAuth/SAML/OIDC Credentials, Certificates, Secrets management SolarWinds Grafana Elastic Why Microlise? When your groceries arrive at your door or you sign for your online parcel, one or more of our More ❯
Employment Type: Permanent, Work From Home
Salary: £45,000
Posted:

MLOps Engineer

Worcester, Worcestershire, UK
Methods
/CD pipelines to streamline model deployment. Monitor and Maintain Deployed Models: Conduct regular performance reviews and data audits of deployed models. Security and Vulnerability Management: Participate in threat modelling to identify and assess potential security risks throughout the ML lifecycle. Troubleshoot and Resolve Issues: Proactively troubleshoot issues …/CD pipelines. Knowledge of Cloud and ML Infrastructure: Experience with cloud platforms and managing cloud-based ML workflows. Experience with Threat Modelling and Vulnerability Management: Proven ability to conduct threat modelling exercises. Experience in Security and Compliance: Demonstrated experience working within secure environments. Cross-Functional Collaboration Skills More ❯
Posted:

Security Operations Engineer

Worcester, Worcestershire, UK
Hybrid / WFH Options
Dynamic Search Solutions
threat hunting, tune alerts, and investigate security events. Operational Technology (OT) security monitoring - Identify vulnerabilities, malware, and suspicious activity using OT monitoring tools. Incident management - Handle security incidents from detection through to resolution. Vulnerability management - Conduct vulnerability scans and ensure timely remediation. Compliance & regulation alignment - Ensure More ❯
Posted:

C004174 Principal Technician (Cyber Security) (NS) - THU 10 Apr

Matlock, Derbyshire, UK
EMW
processes in Standard Operating Procedures Document and maintain details of ePO configuration Configures and distributes two-factor authentication devices Performs trend analysis of routine vulnerability assessments using automated and semi-automated tools, including Nessus Tenable Provides vulnerability mitigation advice to stakeholders Supports external service providers in management of local boundary protection and cyber security monitoring infrastructure Provides CIS Security advice and training, as required Executes the incident and change management processes in accordance with the Information Technology (IT) Information Library (ITIL) Version 4 framework Contributes to Asset Configuration Patching and Vulnerability Management activities … challenging environments and configurations Familiarity with NATO CIS Security directives Experience with VMWare virtual hosting infrastructure and applications Experience using Microsoft update and patch management systems, IT security frameworks and governance models, and Common Vulnerability Scoring System (CVSS) v3.X or later standards Familiarity ITIL Version 4 concepts including More ❯
Posted:

Cyber Security Manager

Stoke-On-Trent, Staffordshire, West Midlands, United Kingdom
Rapiscan Systems
Design & Documentation: Define cybersecurity design requirements and develop product security documentation for border protection and transportation security products within a standardized security framework. Risk Management: Analyze, report, and manage security-related risks, proposing further security improvements. Education & Training: Educate product design staff and stakeholders on cybersecurity impacts on product … design and support efforts. Innovative Solutions: Develop innovative solutions to secure and support networked products used in diverse settings over long periods. Vulnerability Assessment: Lead the development of product test protocols to assess vulnerabilities and recommend remediation techniques. Threat Assessment: Assess product vulnerabilities to new and emerging threats, identify … operating system and network security in physical, virtual, and cloud-based environments (AWS). Hands-On Experience: Proficiency in security systems, including endpoint security, vulnerability management, firewalls, IDS/IPS, wireless security, authentication systems, log management, and encryption. Communication: Strong verbal and written communication skills, with the More ❯
Employment Type: Permanent
Posted:

System Reliability Engineer

Birmingham, UK
Hybrid / WFH Options
Ampa Holdings LLP
requires the holder to actively participate in and support various IT systems and associated projects. The role is expected to work with and support management and the wider team in improving and enhancing key systems and processes. As SRE you will be a subject-matter expert leading by example … monitoring and event tools to support stabilization & lifecycle. Develops in depth knowledge of supported systems and applications and transfers knowledge to more junior staff. Vulnerability management by assessing security status and applying mitigation solutions. Liaising with internal and external partners, including user groups, technical IT consultants and project … manner aligned with ITIL best practices. Provide technical peer review of proposed changes to be made to the estate. Actively participate in the Change Management Board meetings and manage change within the infrastructure team. Ensure that all services are appropriately licenced and assist with tracking and costing license and More ❯
Posted:

Head of Cyber Security

Northampton, Northamptonshire, UK
Nigel Frank
travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerability management and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security More ❯
Posted:

Head of Cyber Security - Remote

Co. West Midlands, UK
Hybrid / WFH Options
Nigel Frank
travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerability management and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security More ❯
Posted:

Head of Cyber Security

Northampton, Northamptonshire, United Kingdom
Tenth Revolution Group
travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerability management and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security More ❯
Employment Type: Permanent
Salary: £80000 - £100000/annum Bonus
Posted:

Head of Cyber Security - Remote

Birmingham, West Midlands, West Midlands (County), United Kingdom
Hybrid / WFH Options
Tenth Revolution Group
travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerability management and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security More ❯
Employment Type: Permanent
Salary: £80000 - £100000/annum Bonus
Posted:

Information Security Manager

Birmingham, West Midlands (County), United Kingdom
Adria Solutions Ltd
join their Information Security governance and oversight team. This technically focused role involves delivering Information Security services such as consultancy, assurance reviews, and risk management while providing governance and oversight across the business to manage security risks effectively. Key Responsibilities: Implement and maintain security control frameworks such as ISO27001 … Conduct assurance reviews and assessments, including third-party evaluations and new solutions. Assess security risks, proactively developing countermeasures. Perform security risk assessments for change management, processes, and new solutions. Monitor emerging security threats through external research and internal engagement. Enhance information and cyber security maturity across the organisation. Deliver … Experience with Microsoft security technologies, including endpoint security and Azure. Proficiency in security controls and frameworks, particularly in cloud security. Hands-on experience with vulnerability management. Ability to translate security frameworks and standards into detailed control requirements. Experience conducting assurance reviews and identifying security gaps. In-depth understanding of More ❯
Employment Type: Permanent
Salary: £75000 - £80000/annum
Posted:

Lead Devsecops Engineer

Nottingham, UK
Hybrid / WFH Options
Erin Associates
development environment Key Requirements: 3+ years in a similar role Strong skills in Python, AWS, Kubernetes, Terraform, Linux, and Ansible Experience with threat analysis, vulnerability management, and Agile environments Relevant certifications are a plus Package & Benefits: £60,000 - £70,000 salary Flexible hybrid working (remote options for strong More ❯
Posted:

Lead DevSecOps Engineer

Nottingham, Nottinghamshire, East Midlands, United Kingdom
Hybrid / WFH Options
Erin Associates
development environment Key Requirements: 3+ years in a similar role Strong skills in Python, AWS, Kubernetes, Terraform, Linux, and Ansible Experience with threat analysis, vulnerability management, and Agile environments Relevant certifications are a plus Package & Benefits: £60,000 - £70,000 salary Flexible hybrid working (remote options for strong More ❯
Employment Type: Permanent, Work From Home
Salary: £70,000
Posted:

Lead DevSecOps Engineer

Nottingham, Nottinghamshire, East Midlands, United Kingdom
Hybrid / WFH Options
Erin Associates
Requirements: At least 3 years experience in a similar role Mentoring and training experience Python AWS Kubernetes Terraform Linux Ansible Agile Threat analysis and vulnerability management Relevant professional certifications and education would be desirable The company have an excellent reputation within their sector and have invested heavily into More ❯
Employment Type: Permanent, Work From Home
Salary: £70,000
Posted:

Cyber Security Engineer

Solihull, West Midlands
Viqu
resolution to incidents.' • Maintain compliance with ISO 27001, GDPR and SOC2 by developing security policies, conducting audits, and managing risk assessments.' • Conduct in-depth vulnerability assessments, penetration testing, and security reviews to identify and remediate weaknesses.' • Partner with development teams to integrate secure coding practices.' • Drive security initiatives and … Possess relevant industry certifications e.g. CISSP, CEH and Azure Security Engineer (desired).' • Deep knowledge of cybersecurity principles, including threat detection, incident response, and vulnerability management.' • Experienced in leading security initiatives and overseeing security projects from planning to execution.' • Strong communicator, capable of effectively engaging with technical and non More ❯
Employment Type: Permanent
Salary: £50,000 - £55,000
Posted:

Cyber Security Engineer

Birmingham, West Midlands, United Kingdom
VIQU Limited
resolution to incidents. Maintain compliance with ISO 27001, GDPR and SOC2 by developing security policies, conducting audits, and managing risk assessments. Conduct in-depth vulnerability assessments, penetration testing, and security reviews to identify and remediate weaknesses. Partner with development teams to integrate secure coding practices. Drive security initiatives and … Possess relevant industry certifications e.g. CISSP, CEH and Azure Security Engineer (desired). Deep knowledge of cybersecurity principles, including threat detection, incident response, and vulnerability management. Experienced in leading security initiatives and overseeing security projects from planning to execution. Strong communicator, capable of effectively engaging with technical and non More ❯
Employment Type: Permanent
Salary: £55,000
Posted:

System Integration and Test Engineer

Co. West Midlands, UK
Motorola Solutions
Manage trials and pilots Mentor other team members Provide integration support Direct and co-ordinate virtual teams on-site and manage local test schedules Management of local test teams and matrix management of virtual teams Technical project management of Security test schedules and activities Develop and maintain … facilitate customer acceptance. Basic Requirements Core Competencies/Technical Expertise: ITSQB foundation ITIL V3 foundation CompTIA Security+ Have a good working knowledge of Tenable vulnerability Mgmt tool. Have good working knowledge of Splunk Enterprise Security for SIEM. Degree in Computer Science, Information Security, or a related field Proven practical More ❯
Posted:

Information Security Manager

Castle Donington, Leicestershire, UK
TN United Kingdom
role of Information Security Manager. As the Information Security Manager, you will manage the security governance, risk, and compliance programme across all domains from vulnerability management. Role & Responsibilities: Develop and implement security standards, processes, procedures, and guidelines. Handle security incidents as they arise, ensuring a robust and thorough response … protect the company and its customers. Monitor and assess ongoing threats to ensure the group is well-positioned to meet them. Collaborate with senior management and stakeholders, keeping them informed for effective security-related decision-making. Ensure consistent application of policies and standards across all technology projects, systems, and … services. Lead and manage supplier and third-party compliance audits. Develop and enhance an information security management framework. Partner with business stakeholders to raise awareness of risk management concerns. Ensure IT security is implemented, maintained, and tested for perimeter and back-office systems. Proven substantial experience in information More ❯
Posted:
Vulnerability Management
the Midlands
10th Percentile
£43,750
25th Percentile
£49,250
Median
£60,000
75th Percentile
£61,875
90th Percentile
£73,125