We are delighted to be recruiting on behalf of a global financial services leader for the position of Director of VulnerabilityManagement . This is a fantastic opportunity to join a distinguished company with over a century of expertise, serving more than 14 million customers worldwide. Currently undergoing … and security excellence. What You Can Expect Location - Milton Keynes Salary - Up to £90,000 Employment Type - Permanent Key Responsibilities as a Director of VulnerabilityManagement Provide leadership and mentorship to a team of vulnerabilitymanagement Subject Matter Experts. Oversee partnerships with third-party penetration testing … providers, ensuring seamless service delivery. Identify and escalate recurring vulnerability patterns to the Threat Management team. Contribute to strategic discussions focused on reducing cyber risks. Recommend tactical and long-term enhancements to vulnerabilitymanagement and security testing processes. Manage all aspects of penetration testing, from planning more »
York, North Yorkshire, United Kingdom Hybrid / WFH Options
Concept Resourcing
Vulnerability Coordinator Location: [3 days a week in the office (York), 2 days a week work from home] Department: Cyber Security Type: Full-time Salary: £48,000 Reports To: Cyber Security Manager About the Role: Concept IT are seeking a skilled and proactive Vulnerability Coordinator to join our … Clients Cyber Security team. The ideal candidate will have extensive experience with Tenable One VulnerabilityManagement, Microsoft Defender Threat and VulnerabilityManagement (TVM) and the entire vulnerabilitymanagement lifecycle across various platforms (Windows, Linux, Applications, security appliances). Experience working with UK government or … NHS organisations is highly desirable. As a Vulnerability Coordinator, you will be responsible for identifying, assessing, and managing vulnerabilities to ensure the security and integrity of systems and data. Education: Associate degree in Computer Science, Information Security, or a related field (or equivalent experience). Experience: Minimum of more »
Milton Keynes, England, United Kingdom Hybrid / WFH Options
Proprius Recruitment
Manager, VulnerabilityManagement/SME/Lead is responsible for leading and coaching team of subject matter experts specialised in vulnerability management. Oversee and coordinate end-to-end vulnerabilitymanagement & security testing activities by collaboratively working with colleagues. Close collaboration with global Vulnerability Management. … Bi-directional feedback with technology & business teams. Create, develop and maintain operational procedures and processes in coordination with colleagues to ensure vulnerabilitymanagement services are clearly documented. Manager, VulnerabilityManagement/SME/Lead To £96,000 + Benefits + Bonus Hybrid Working x3 days a … for managing relationships with 3rd party penetration testing providers and hold them accountable to quality and SLA standards. Responsible for escalating and highlighting thematic vulnerability patterns to Threat Management team and involved in strategic risk reduction planning discussions. Responsible for measuring effectiveness and proposing tactical and strategic improvements more »
is part of a global technology organisation with a strong focus on cybersecurity. The ideal candidate will work across various cybersecurity areas such as vulnerabilitymanagement, endpoint security, and will collaborate with clients. No remote working is allowed for this position, and the candidate must have DV clearance. … requirement. 2. Endpoint Security Expertise: Strong background in cyber security, specifically in Endpoint Protection across a range of devices from laptops to IoT. 3. VulnerabilityManagement: Experience with tools used to detect and respond to vulnerabilities across an organisation, including research into CVEs (Common Vulnerabilities and Exposures). … of governance and compliance aspects related to cyber security. Desired Skills: * Analytical mindset to proactively find solutions to potential risks. * Ability to work with vulnerabilitymanagement tools and conduct research into vulnerabilities and their impacts. Role Overview: The position involves a mix of vulnerabilitymanagement and more »
Industrial Control Systems Infrastructure Engineer Our client is a leading developer of Integrated Platform Management Systems used on Naval vessels. This position offers the unique opportunity to design, develop, and maintain cutting-edge infrastructure for naval platform management systems, including both surface ships and submarines. You will play … of the development environment itself, supporting mission-critical naval programmes. In addition to integrating IT/OT systems, you will be responsible for the management of IT assets within the development environment, ensuring compliance with company and regulatory standards such as ISO27001 and IEC62443. This role is ideal for … industrial networking architectures (e.g., Profinet, Ethernet/IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. * Platform Management Systems: Work closely with multidisciplinary teams to design and integrate ICS solutions into PMS, ensuring they meet rigorous naval requirements for performance, reliability, and more »
Junior Vulnerability Analyst Manchester, London or Cheltenham This is an exciting opportunity to join a dynamic security solutions team in which you will be responsible for the vulnerabilitymanagement and delivery of a client security programme. As part of an ever-growing delivery team, you must have … will be expected to have a solid knowledge of networking and cloud security concepts and be passionate about IT security. As part of the VulnerabilityManagement delivery team, you will be responsible for looking after the client’s scanning programmes, managing their on-going scanning needs, validating results … direction of the service as well as assist with the development of the service. Assist in prioritizing vulnerabilities based on guidance from the Lead Vulnerability Analyst and customer priorities. Conduct routine reviews of remediation policies and provide inputs for quarterly updates. Monitor changes to remediation and scan policies, reporting more »
Welwyn Garden City, England, United Kingdom Hybrid / WFH Options
PayPoint plc
overall delivery and strategic oversight of all PayPoint Group IT security systems and services. This includes providing leadership for the Security Operations Center (SOC), VulnerabilityManagement and Security teams, ensuring alignment with organizational goals. Collaborating closely with the managers of the respective departments within the team, the successful … security services across physical and cloud infrastructures, ensuring compliance with regulatory and organizational requirements. • Provide strategic leadership and oversight for the Security, SOC and VulnerabilityManagement teams, enabling their success through effective planning, guidance, and support. • Develop close working relationships with internal audit teams and act as the … and guide team members, fostering professional growth and building a high-performing security function. • Actively participate as a key member of the Cyber Security Management Team, contributing to the development and execution of the organization's cyber security strategy, policies, and initiatives. • Play a leading role in the response more »
the organization’s broader infrastructure. Risk Mitigation and Continuous Improvement Help assess IT systems and processes to identify vulnerabilities and recommend actionable improvements. Perform vulnerability assessments and track remediation progress in coordination with other team members. Stay informed of emerging threats, sharing insights and strategies to address potential risks … proactively Incident Management and Response Investigate security alerts and incidents, assisting in root cause analysis and remediation efforts. Contribute to the development and maintenance of incident response playbooks and team readiness for addressing security events. Support the use of monitoring tools and log analysis to detect and respond to … and Experience Required: A minimum of 7+ years of experience in an IT security role with a focus on system patching, firewall auditing, and vulnerability management. Firewall Expertise: Experience auditing, configuring, and securing firewalls and VPN systems as part of a collaborative environment. Technical Security Projects: Involvement in designing more »
toolsets, and implement new security solutions. The Security Engineer will work closely with next generation technologies utilising machine learning and artificial intelligence. Responsibilities: Implementation, management and maintenance of security toolsets Investigation of security events and incidents Resolution of service requests, incidents and problems Identification and remediation of vulnerabilities Identification … of control gaps and ensuring adherence to best practice and standards Creation and maintenance of operational procedures, configuration and technical documentation Management and maintenance of security metrics and reporting Maintaining an awareness of new and emerging security technologies and threats Ensuring continual development of technical skills through both external … training and certification Qualifications Essential Requirements: Strong knowledge of security technologies, including NGFW, WAF, IPS, EDR, NDR, AV, MDM, MFA, SIEM, email security, patch management, vulnerabilitymanagement and vulnerability scanning Good knowledge of infrastructure, cloud, virtualisation and network security Experience working within a regulated environment Experience more »
the worlds largest payments platform for virtual cards Weve engineered connectivity to over 80 of the worlds best commercial card partners, over 400 travel management companies and over 150 travel technology partners. Every day, our team members work together to make it easier for travellers to connect with people … excellence. Develop and implement the product security strategy in alignment with organisational goals. Provide strategic oversight and direction for all product security initiatives. Stakeholder Management: Own the relationship with product security vendors and ensure all findings are reviewed and appropriate actions are taken. Work closely with development teams, product … security, including threat modelling and application security reviews. Prepare and present regular reports on the status of the Conferma product security to senior management. VulnerabilityManagement: Oversee vulnerabilitymanagement assurance and ensure that teams are remediating vulnerabilities. Assist teams in reproducing, triaging, and addressing application security more »
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Yolk Recruitment
part of the Information Security function, ensuring critical systems are protected, optimised, and aligned with evolving business objectives. This role emphasises the hands-on management of advanced security tools and platforms to safeguard against emerging threats while supporting internal stakeholders with expert guidance and security strategies. Your Key Responsibilities … guidelines for security tools and their administration. Manage Endpoint Detection and Response (EDR) platforms to detect, investigate, and respond to potential threats efficiently. Lead vulnerabilitymanagement efforts, including risk assessments and collaboration with IT Operations to address findings through timely patching. Configure and manage web security gateways to … understanding of core security principles, including zero trust models, system hardening, and access control strategies. Practical experience with key security technologies, including EDR tools, vulnerabilitymanagement platforms, firewalls, web security gateways, and email security solutions. Familiarity with cloud environments such as Okta and Azure, alongside expertise in traditional more »
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Creditsafe
wider array of technologies and issues, but primarily covering all Security Toolig, platforms, technology and controls (such as Firewalls, DLP, SIEM, Identity and Access management). To support SIEM by maintaining the integrations with AWS, Azure and other appliances and/or technologies including troubleshooting and building out or … API’s. To support Security Automation, Orchestration and Response activities and building out additional capabilities for the SOC Team. Broader security knowledge on IAM, VulnerabilityManagement and Zero trust models would be a plus. To further support Security activities, including support to Governance, Risk and Compliance functions. To … configuring SIEM products. Ability to utilise manipulate and utilise API’s and Powershell scripting (Graph API a distinct advantage) Broader security knowledge on IAM, VulnerabilityManagement and Zero trust models. Clear communicator to security literate and non-security literate stakeholders Qualifications (desired) SC-900/AZ-900/ more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Eden Scott
risk and compliance background . You’ll define processes, ensure compliance with standards and regulations, and oversee daily operations. As part of the IT Management team, you'll manage security strategy, incident response, and system improvements, while also handling budgets and vendor collaboration. A proactive approach to team performance … security assessments. Perform and manage penetration testing and audits. Candidate Criteria: Extensive experience in IT Security within a globally distributed environment. Administration and Service Management experience of the following Infrastructure technologies to expert level: End Point Protection, VulnerabilityManagement, Privileged Access Management, Certificate Management, Internet … Security – Content Filtering, Cloud Security (Azure), File Security – NTFS, Information Protection/Rights Management, Microsoft Windows, Microsoft/Office 365 platform, Microsoft SQL Strong knowledge of networks and data protection legislation (e.g., GDPR). Be able to identify gaps in the teams' knowledge and implement plans. Experience in coaching more »
ll lead on integrating new tools, processes, and ensure best practices are followed. You'll be responsible for: - Managing incident response, threat intelligence, and vulnerabilitymanagement - Integrating new tools and processes - Ensuring compliance with industry regulations You'll have experience in: - IT and Operational Technology security - Security operations … incident response, vulnerabilitymanagement, threat intelligence) - Leading security teams - Managing security incidents and service providers You'll work from their Glasgow office twice a week, and earn up to £75,000 plus 15% bonus, 10% pension contribution, and private healthcare. Please contact (url removed) to discuss. more »
Reading, England, United Kingdom Hybrid / WFH Options
Hays
hours per week) The must haves: Proven experience in deploying and managing Qualys solutions and working with the Qualys toolset. Familiarity with Agile project management methodologies and tools. Strong understanding of web applications setup and protocols. Excellent troubleshooting and problem-solving skills. Relevant certifications (e.g., Qualys Certifications, networking qualifications … functional teams to integrate Qualys into existing workflows and systems. Provide knowledge and support to the rest of the project team and the Operational VulnerabilityManagement Team. Ensure what is set up works for the operational Vulnerabilitymanagement team and that all work is documented to more »
York, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
development opportunities, ensuring career growth and success. Role Overview: As a Security Analyst, you'll play a pivotal role as the technical lead for vulnerabilitymanagement within our client's dynamic team. Your primary focus will be on leveraging Tenable solutions, serving as a subject matter expert (SME … support and guidance to valued customers. Additionally, you'll engage with Microsoft Sentinel and Defender, contributing to their holistic security offerings. Key Responsibilities: Lead vulnerabilitymanagement initiatives, primarily utilizing Tenable technologies. Serve as an SME for customers, offering expert guidance and support. Collaborate with the team to enhance … services, leveraging Microsoft Sentinel and Defender. Contribute to the continuous improvement of security processes and protocols. Requirements: Demonstrable experience in level 2/3 vulnerability management. Proficiency with Tenable solutions is preferred, although experience with Rapid7 and Qualys will also be considered. Microsoft security experience is advantageous. Strong analytical more »
corrective actions where required for the cyber security function. Forming part of a team responsible for various cyber security functions such as 3rd party management, data management, response & recovery and training and awareness plans. The role will be integrated into an active and ambitious global cyber security function … Revise and develop processes to strengthen the current Cyber Security posture. Review 3rd party supplier arrangements and highlight the challenges in security. Ensuring data management, administration of risk management activities & maintenance of assurance frameworks to achieve control effectiveness. Ensure the orchestration and integration of security services and platforms … to maximise its usage and coverage. Technical Skills: Experience of management of Cyber Security, with or working towards an industry renowned information security qualification such as CISSP, CISM, BCS ISMP, or equivalent. Experience of managing cyber security in an IT environment with both internal and external service provision notably more »
Response: Use advanced tools, such as SIEM platforms, Firewalls, and intrusion detection systems, to detect and respond to threats in Real Time. Risk and VulnerabilityManagement: Conduct comprehensive vulnerability assessments and coordinate external penetration testing to identify and address potential weaknesses. Incident Investigation: Lead forensic investigations into more »
Response: Use advanced tools, such as SIEM platforms, firewalls, and intrusion detection systems, to detect and respond to threats in real-time. Risk and VulnerabilityManagement: Conduct comprehensive vulnerability assessments and coordinate external penetration testing to identify and address potential weaknesses. Incident Investigation: Lead forensic investigations into more »
Clarify incident severity Knowledge of security methodologies for investigation Comfortable with RAW output Threat Intel Info - against alerts Threat Hunting Internal Security and Log Management On top of the SOC Management you can be working on other services:- Dark Web monitoring service Guiding and Shaping Ideas for Crisis … Produce incident reports to present activity and outcome of operational security services and activity. Select appropriately from applicable standards, methods, tools and applications. Incident management Aid with the investigation of security breaches following established procedures and make sure any recommended follow up actions are taken to ensure a reduction … Incidents, the operation and optimisation of security tooling/products, including network security (IDS/IPS/Firewalls), logging and auditing, event and incident management, and privileged access management controls. Act on security incidents, requests and events to ensure that threats, vulnerabilities and breaches are managed to minimise more »
and non-technical stakeholders. We'll also look for your experience and knowledge in: • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • CyberARK • IT asset management and tracking • VulnerabilityManagement and Patching • Containerisation and more »
Aberdeen, Scotland, United Kingdom Hybrid / WFH Options
prosource.it
leads to the creation of high quality, secure by design, project deliveries. Examples of projects: *Secure Internet Access *Privileged Remote Access *VPN consolidation *Information Management (Records Management & Data Governance) *Infrastructure Road Mapping *Security Email Gateway Identifying security related risk from projects and leading risk assessment processes Identify divergences … deliveries Technical Experience: *Security Risk Assessment *Network Architecture Principles *Web & email security technologies *Reviewing and assessing security policy configuration within cloud environments (preferably Azure) *VulnerabilityManagement and Security logging and monitoring tools *Cloud Virtualisation and Containerisation security assessments and review *Edge Security Technology, IAM, PAM *Data Security and … governance *Network Monitoring Tools and SIEM Technology *Risk Management Tools Ability to act proactively, escalating issues as required Strong documentation and communication skills (verbal and written) Excellent problem-solving skills Strong knowledge and experience of IT change management processes and principles Willingness to stay up to date on more »
away from home for long periods. As the Lead Penetration Tester/Client Lead you will take the lead in advanced penetration tests and vulnerability assessments across a diverse range of cutting-edge applications. You will take a hands-on approach to evaluating the security of applications, networks, and … expertise will be instrumental in fortifying the organisation’s digital assets and ensuring resilience against cyber adversaries. Responsibilities of Lead Penetration Tester: Penetration Testing & Vulnerability Assessment Lead penetration tests and vulnerability assessments on applications, networks, and systems, exposing and documenting critical risks with actionable remediation strategies. Stay ahead … of emerging threats, ensuring cutting-edge testing methodologies and solutions are applied effectively. Security Risk Management Drive the vulnerabilitymanagement program, performing risk assessments and enhancing security posture through strategic mitigation plans. Leadership & Collaboration Mentor and guide a dedicated security team while working cross-functionally to embed more »
as well as experience working with Defender XDR, Threat intelligence, Microsoft Purview, SIEM and security monitoring, Azure Cloud, Network security (WAF, Firewalls, Network Segmentation), Vulnerabilitymanagement, Identity and access management (Entra ID), and mobile device management. You will possess demonstrable experience working with Power BI, Zero Trust more »
frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • VulnerabilityManagement and more »