Employer: DWS Group Title: Cyber Threat Intelligence and VulnerabilityManagement Specialist (VP) Location: London About DWS: Today, markets face a whole new set of pressures – but also a whole lot of opportunity too. Opportunity to innovate differently. Opportunity to invest responsibly. And opportunity to make change. Join us … and productive procedures, policies and processes are in place, and aligned and agreed with relevant stakeholders. Role Details: As a Cyber Threat Intelligence and VulnerabilityManagement Specialist you will (be): Lead the DWS Cyber Threat Intelligence and VulnerabilityManagement capability, liaising closely with the central Threat … VulnerabilityManagement function to provide relevant reports on threats to the sector; Tailor threat intelligence to the needs of a world-leading asset management firm operating across geographical regions; Provide threat intelligence to technical and non-technical stakeholders across tactical, operational, and strategic lines; Identify priority vulnerabilities more »
We are delighted to be recruiting on behalf of a global financial services leader for the position of Director of VulnerabilityManagement . This is a fantastic opportunity to join a distinguished company with over a century of expertise, serving more than 14 million customers worldwide. Currently undergoing … and security excellence. What You Can Expect Location - Milton Keynes Salary - Up to £90,000 Employment Type - Permanent Key Responsibilities as a Director of VulnerabilityManagement Provide leadership and mentorship to a team of vulnerabilitymanagement Subject Matter Experts. Oversee partnerships with third-party penetration testing … providers, ensuring seamless service delivery. Identify and escalate recurring vulnerability patterns to the Threat Management team. Contribute to strategic discussions focused on reducing cyber risks. Recommend tactical and long-term enhancements to vulnerabilitymanagement and security testing processes. Manage all aspects of penetration testing, from planning more »
York, North Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Concept Resourcing
Vulnerability Coordinator Location: [3 days a week in the office (York), 2 days a week work from home] Department: Cyber Security Type: Full-time Salary: £48,000 Reports To: Cyber Security Manager About the Role: Concept IT are seeking a skilled and proactive Vulnerability Coordinator to join our … Clients Cyber Security team. The ideal candidate will have extensive experience with Tenable One VulnerabilityManagement, Microsoft Defender Threat and VulnerabilityManagement (TVM) and the entire vulnerabilitymanagement lifecycle across various platforms (Windows, Linux, Applications, security appliances). Experience working with UK government or … NHS organisations is highly desirable. As a Vulnerability Coordinator, you will be responsible for identifying, assessing, and managing vulnerabilities to ensure the security and integrity of systems and data. Education: Associate degree in Computer Science, Information Security, or a related field (or equivalent experience). Experience: Minimum of more »
Vulnerability Coordinator Location: [3 days a week in the office (York), 2 days a week work from home] Department: Cyber Security Type: Full-time Salary: £48,000 Reports To: Cyber Security Manager About the Role: Concept IT are seeking a skilled and proactive Vulnerability Coordinator to join our … Clients Cyber Security team. The ideal candidate will have extensive experience with Tenable One VulnerabilityManagement, Microsoft Defender Threat and VulnerabilityManagement (TVM) and the entire vulnerabilitymanagement lifecycle across various platforms (Windows, Linux, Applications, security appliances). Experience working with UK government or … NHS organisations is highly desirable. As a Vulnerability Coordinator, you will be responsible for identifying, assessing, and managing vulnerabilities to ensure the security and integrity of systems and data. Education: Associate degree in Computer Science, Information Security, or a related field (or equivalent experience). Experience: Minimum of more »
Milton Keynes, England, United Kingdom Hybrid / WFH Options
Proprius Recruitment
Manager, VulnerabilityManagement/SME/Lead is responsible for leading and coaching team of subject matter experts specialised in vulnerability management. Oversee and coordinate end-to-end vulnerabilitymanagement & security testing activities by collaboratively working with colleagues. Close collaboration with global Vulnerability Management. … Bi-directional feedback with technology & business teams. Create, develop and maintain operational procedures and processes in coordination with colleagues to ensure vulnerabilitymanagement services are clearly documented. Manager, VulnerabilityManagement/SME/Lead To £96,000 + Benefits + Bonus Hybrid Working x3 days a … for managing relationships with 3rd party penetration testing providers and hold them accountable to quality and SLA standards. Responsible for escalating and highlighting thematic vulnerability patterns to Threat Management team and involved in strategic risk reduction planning discussions. Responsible for measuring effectiveness and proposing tactical and strategic improvements more »
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Proprius Recruitment Ltd
Head of VulnerabilityManagement/SME/Lead is responsible for leading and coaching team of subject matter experts specialised in vulnerability management. Oversee and coordinate end-to-end vulnerabilitymanagement & security testing activities by collaboratively working with colleagues. Close collaboration with global Vulnerability Management. Bi-directional feedback with technology & business teams. Create, develop and maintain operational procedures and processes in coordination with colleagues to ensure vulnerabilitymanagement services are clearly documented. Head of VulnerabilityManagement To £96,000 + Benefits + Bonus Hybrid Working x12 days a month … for managing relationships with 3rd party penetration testing providers and hold them accountable to quality and SLA standards. Responsible for escalating and highlighting thematic vulnerability patterns to Threat Management team and involved in strategic risk reduction planning discussions. Responsible for measuring effectiveness and proposing tactical and strategic improvements more »
A leading financial technology and data science firm requires a Lead VulnerabilityManagement Engineer who will be responsible for delivering a "greenfield" global vulnerabilitymanagement programme. The role entails delivering the technical aspects of vulnerabilitymanagement; identification and prioritisation, as well as the non … Head of Security. Please note: the role requires at least 3 days in the office. Your present skillset 5 -10 years of experience in vulnerabilitymanagement or a similar security role in globally distributed financial (or complex) technology environment Strong technical knowledge with hands-on experience using vulnerability … premise and cloud environments (AWS, Azure) and hybrid setups. Ability to communicate effectively with both technical and non-technical stakeholders. Experience in coordinating patch management processes across a large organisation and time zones, ensuring minimal business disruption Ability to evaluate vulnerabilities based on risk and exploitability, guiding patching priorities more »
is part of a global technology organisation with a strong focus on cybersecurity. The ideal candidate will work across various cybersecurity areas such as vulnerabilitymanagement, endpoint security, and will collaborate with clients. No remote working is allowed for this position, and the candidate must have DV clearance. … requirement. 2. Endpoint Security Expertise: Strong background in cyber security, specifically in Endpoint Protection across a range of devices from laptops to IoT. 3. VulnerabilityManagement: Experience with tools used to detect and respond to vulnerabilities across an organisation, including research into CVEs (Common Vulnerabilities and Exposures). … of governance and compliance aspects related to cyber security. Desired Skills: * Analytical mindset to proactively find solutions to potential risks. * Ability to work with vulnerabilitymanagement tools and conduct research into vulnerabilities and their impacts. Role Overview: The position involves a mix of vulnerabilitymanagement and more »
Industrial Control Systems Infrastructure Engineer Our client is a leading developer of Integrated Platform Management Systems used on Naval vessels. This position offers the unique opportunity to design, develop, and maintain cutting-edge infrastructure for naval platform management systems, including both surface ships and submarines. You will play … of the development environment itself, supporting mission-critical naval programmes. In addition to integrating IT/OT systems, you will be responsible for the management of IT assets within the development environment, ensuring compliance with company and regulatory standards such as ISO27001 and IEC62443. This role is ideal for … industrial networking architectures (e.g., Profinet, Ethernet/IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. * Platform Management Systems: Work closely with multidisciplinary teams to design and integrate ICS solutions into PMS, ensuring they meet rigorous naval requirements for performance, reliability, and more »
Industrial Control Systems Infrastructure Engineer Our client is a leading developer of Integrated Platform Management Systems used on Naval vessels. This position offers the unique opportunity to design, develop, and maintain cutting-edge infrastructure for naval platform management systems, including both surface ships and submarines. You will play … of the development environment itself, supporting mission-critical naval programmes. In addition to integrating IT/OT systems, you will be responsible for the management of IT assets within the development environment, ensuring compliance with company and regulatory standards such as ISO27001 and IEC62443. This role is ideal for … industrial networking architectures (e.g., Profinet, Ethernet/IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. * Platform Management Systems: Work closely with multidisciplinary teams to design and integrate ICS solutions into PMS, ensuring they meet rigorous naval requirements for performance, reliability, and more »
Industrial Control Systems Infrastructure Engineer Our client is a leading developer of Integrated Platform Management Systems used on Naval vessels. This position offers the unique opportunity to design, develop, and maintain cutting-edge infrastructure for naval platform management systems, including both surface ships and submarines. You will play … of the development environment itself, supporting mission-critical naval programmes. In addition to integrating IT/OT systems, you will be responsible for the management of IT assets within the development environment, ensuring compliance with company and regulatory standards such as ISO27001 and IEC62443. This role is ideal for … industrial networking architectures (e.g., Profinet, Ethernet/IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. * Platform Management Systems: Work closely with multidisciplinary teams to design and integrate ICS solutions into PMS, ensuring they meet rigorous naval requirements for performance, reliability, and more »
companies that are Britain s economic engine ambitious, entrepreneurially-spirited and high growth businesses that fuel the economy - and directly advise the owners and management teams that lead them. We ll broaden your horizons To ensure our services and applications are fit for the modern market, our IT team … ll be encouraged to identify and draw attention to opportunities for enhancing our delivery and providing additional services to organisations we work with. The Vulnerability and Exposure Manager (CTEM) will lead collecting threat information relating to technology vulnerabilities that effect BDO. This includes conducting and analyzing output from continuous … security assessments/security monitoring platforms and combining this, with relevant threat intelligence, producing risk-based and contextualized prioritization for remediation teams. Additionally, the Vulnerability and Exposure Manager (CTEM) will understand the purpose and role of breach and attack simulation tools and their role in a modern security aware more »
Junior Vulnerability Analyst Manchester, London or Cheltenham This is an exciting opportunity to join a dynamic security solutions team in which you will be responsible for the vulnerabilitymanagement and delivery of a client security programme. As part of an ever-growing delivery team, you must have … will be expected to have a solid knowledge of networking and cloud security concepts and be passionate about IT security. As part of the VulnerabilityManagement delivery team, you will be responsible for looking after the client’s scanning programmes, managing their on-going scanning needs, validating results … direction of the service as well as assist with the development of the service. Assist in prioritizing vulnerabilities based on guidance from the Lead Vulnerability Analyst and customer priorities. Conduct routine reviews of remediation policies and provide inputs for quarterly updates. Monitor changes to remediation and scan policies, reporting more »
Welwyn Garden City, England, United Kingdom Hybrid / WFH Options
PayPoint plc
overall delivery and strategic oversight of all PayPoint Group IT security systems and services. This includes providing leadership for the Security Operations Center (SOC), VulnerabilityManagement and Security teams, ensuring alignment with organizational goals. Collaborating closely with the managers of the respective departments within the team, the successful … security services across physical and cloud infrastructures, ensuring compliance with regulatory and organizational requirements. • Provide strategic leadership and oversight for the Security, SOC and VulnerabilityManagement teams, enabling their success through effective planning, guidance, and support. • Develop close working relationships with internal audit teams and act as the … and guide team members, fostering professional growth and building a high-performing security function. • Actively participate as a key member of the Cyber Security Management Team, contributing to the development and execution of the organization's cyber security strategy, policies, and initiatives. • Play a leading role in the response more »
Analyst Client: Banking Salary: £60,000-£75,000 + Bonus Location: London/Hybrid Skills: Information Security, Cyber Security, SIEM, EDR, Wireshark, Incident Response, VulnerabilityManagement The role: My client are seeking a knowledgeable Information & Cyber Security Analyst to join their team. This role is focused on the … will ideally have 5+ years experience working in Information/Cyber Security. The position is broadly split into a few core areas Incident Response VulnerabilityManagement SIEM Security Monitoring You will advise on Security best practices, and act as SME when assisting other teams. The ideal candidate will … have: Incident Response experience Security Monitoring experience VulnerabilityManagement experience Knowledge and understanding of technical Security tools: SIEM, EDR, DLP, Wireshark, Burp Suite etc. Understanding of threat modelling advantageous Investigation experience into Information and Cyber security incidents Broad technical understanding – Windows, Linux, Networks, VMware etc. Appreciation of GCIA more »
on documenting security findings, incidents, and risks within our organization. The ideal candidate will work closely with the security operations, incident response, and risk management teams to ensure that all security incidents, vulnerabilities, and findings are thoroughly documented, analyzed, and reported. This is a critical role to support the … our security posture and maintain compliance with industry standards and best practices. Key Responsibilities: Document Security Findings: Accurately document findings from security assessments, audits, vulnerability scans, and incident investigations. Maintain clear, concise, and comprehensive records of security incidents, including timelines, actions taken, and outcomes. Produce and update detailed security … reports for various stakeholders, including management, technical teams, and auditors. Incident Documentation and Reporting: Record and categorize security incidents such as breaches, malware infections, phishing attacks, and other cyber threats. Collaborate with incident response teams to ensure accurate documentation of incident timelines, root cause analysis, and corrective actions. Track more »
the organization’s broader infrastructure. Risk Mitigation and Continuous Improvement Help assess IT systems and processes to identify vulnerabilities and recommend actionable improvements. Perform vulnerability assessments and track remediation progress in coordination with other team members. Stay informed of emerging threats, sharing insights and strategies to address potential risks … proactively Incident Management and Response Investigate security alerts and incidents, assisting in root cause analysis and remediation efforts. Contribute to the development and maintenance of incident response playbooks and team readiness for addressing security events. Support the use of monitoring tools and log analysis to detect and respond to … and Experience Required: A minimum of 7+ years of experience in an IT security role with a focus on system patching, firewall auditing, and vulnerability management. Firewall Expertise: Experience auditing, configuring, and securing firewalls and VPN systems as part of a collaborative environment. Technical Security Projects: Involvement in designing more »
toolsets, and implement new security solutions. The Security Engineer will work closely with next generation technologies utilising machine learning and artificial intelligence. Responsibilities: Implementation, management and maintenance of security toolsets Investigation of security events and incidents Resolution of service requests, incidents and problems Identification and remediation of vulnerabilities Identification … of control gaps and ensuring adherence to best practice and standards Creation and maintenance of operational procedures, configuration and technical documentation Management and maintenance of security metrics and reporting Maintaining an awareness of new and emerging security technologies and threats Ensuring continual development of technical skills through both external … training and certification Qualifications Essential Requirements: Strong knowledge of security technologies, including NGFW, WAF, IPS, EDR, NDR, AV, MDM, MFA, SIEM, email security, patch management, vulnerabilitymanagement and vulnerability scanning Good knowledge of infrastructure, cloud, virtualisation and network security Experience working within a regulated environment Experience more »
delivery and deployment of new features, enhancements, and fixes to customers. • Implement and enforce ITIL best practices, standards, and procedures for support, including incident management, problem management, change management, and knowledge management. • Proactively identify and recommend opportunities to improve processes, tools, and systems. • Build and maintain strong … and customers through regular engagement to enhance service delivery. • Collate records and generate reports on product and service performance, presenting findings to the senior management team. Customer and Employee Support: • Provide high-quality support to Feedback Medical's customers and staff via phone, email, and remote desktop, assisting both … Assist in problem investigations, including root cause analysis and prevention identification. Process and Compliance: • Comply with processes and procedures within Feedback Medical's Integrated Management System (IMS), which aligns with ISO 13485 quality management standards and ISO 27001 Information Security standards. • Work alongside the Information Security team to more »
We are looking for an experienced Attack Surface Management (ASM) Consultant to lead efforts in identifying, monitoring, and reducing the organization's digital attack surface. In this role, you will assess the exposure of assets, evaluate potential vulnerabilities, and work with cross-functional teams to implement risk mitigation strategies. … organization’s attack surface and ASM program effectiveness. Security Program Development and Continuous Improvement Assist in the development and enhancement of the Attack Surface Management program, including setting standards for asset discovery and risk management. Develop processes and workflows to automate attack surface discovery, monitoring, and assessment. Provide training … a related field. Equivalent experience may be considered. Experience : Minimum of [3-5] years of experience in cybersecurity, with a focus on Attack Surface Management, Threat Intelligence, VulnerabilityManagement, or related fields. Hands-on experience with ASM tools (e.g., RiskIQ, Expanse, CyCognito) and asset discovery methodologies. Familiarity more »
Cyber Security Engineer, across a global business of thousands of staff. In terms of focus for the position, the three key areas are across VulnerabilityManagement, Pen Testing, Control Assurance as well as looking at modern tech and emerging threats. They need someone with enough knowhow in these … and Experience: ** A number of years in security with a specific Cyber focus (7+ years) ** A strong Cyber focus, with knowledge across areas including: VulnerabilityManagement, Risk Management, Control Assurance, Penetration Testing, Emerging Threats, Assessing Technical Designs etc ** The ability to interact with a wide-range of more »
the worlds largest payments platform for virtual cards Weve engineered connectivity to over 80 of the worlds best commercial card partners, over 400 travel management companies and over 150 travel technology partners. Every day, our team members work together to make it easier for travellers to connect with people … excellence. Develop and implement the product security strategy in alignment with organisational goals. Provide strategic oversight and direction for all product security initiatives. Stakeholder Management: Own the relationship with product security vendors and ensure all findings are reviewed and appropriate actions are taken. Work closely with development teams, product … security, including threat modelling and application security reviews. Prepare and present regular reports on the status of the Conferma product security to senior management. VulnerabilityManagement: Oversee vulnerabilitymanagement assurance and ensure that teams are remediating vulnerabilities. Assist teams in reproducing, triaging, and addressing application security more »
top-notch OSS Solutions for network monitoring, performance optimization, and analytics. You will play a crucial role in supporting and managing IP & Data Network Management Systems, covering server hardware, operating systems, applications, backup solutions, and UAM. This hybrid position allows you to work from home, Magdalene offices, or the … customer offices and data centers. As part of Magdalene's Professional Services, you will collaborate closely with Network Security Engineers, Network Engineers, the Network Management Centre, and other support teams to deliver exceptional service. If you are passionate about driving excellence in operational support and have a knack for … role offers a dynamic environment to showcase your skills and contribute to a cutting-edge industry. Join us in shaping the future of network management and support services. Who are we? Magdalene operates as a Telecommunication Infrastructure Services Company and is part of the Telecom Division of M Group more »
Employment Type: Permanent, Work From Home
Salary: 4% Matched pension, Health cash plan, Life assurance, 33 Holidays
team. This role will be responsible for the day-to-day operations, including the effective delivery of security monitoring, incident response, threat intelligence, and vulnerabilitymanagement services. Responsibilities include management and development of a multi-site team of SOC analysts, including recruitment, training development, process improvement, and … cybersecurity. Technically, you'll need a solid understanding of security operations processes, tools, and technologies, such as SIEM, SOAR, EDR, XDR, NDR, threat intelligence, vulnerabilitymanagement, forensics, and malware analysis. A strong understanding of security frameworks, standards, and regulations, such as ISO 27001, NIST, CIS, GDPR, and others more »
Security Specialist Job Location: London Salary: 70k Per annum Job Description: CERTIFIED INFORMATION SECURITY MANAGER 5-6 years of experience in cyber security. Qualys vulnerabilitymanagement certified specialist. Knowledge of vulnerabilitymanagement and remediation. Expert knowledge of Qualys vulnerability scanning tool. Knowledge about web application … and infrastructure architect. Knowledge about web server/Database/Operating servers and clients. Proficient in vulnerability assessment and reporting. Understanding about SOC. Knowledge of Kali Linux and its scanning and penetration testing tools. Suggest the mitigation plan for identified vulnerabilities to the stakeholder. more »