cyber risk governance, and assurance frameworks. This is a cross-functional role with both advisory and hands-on responsibilities, focusing on security assurance, risk management and supporting architecture reviews, vulnerability management, risk assessments, cyber defence posture, driving technical assurance, and embedding risk-aligned security controls across IT and OT systems and secure-by-design practices. You will work across … SSCP, CISM, CRISC, CCSP, SABSA, or SANS GIAC (GSEC, GCCC, GCPM). o Demonstrable experience in designing and implementing secure infrastructure or cloud architectures. o Proven experience with risk assessment methodologies and maintaining enterprise risk registers. o Working knowledge of risk assessment methodologies (e.g. ISO 31000, FAIR, OWASP risk rating). o Strong understanding of Gov Assure, CAF … Azure AD), Microsoft 365 E5, Azure IaaS/PaaS, Windows/Linux/Unix. o Strong knowledge of security tooling such as SIEM, endpoint detection (EDR/XDR), and vulnerability management platforms. o Hands-on experience with policy development, access control models (RBAC, ABAC), and logging standards. o Experience supporting assurance activities or government-mandated reviews (e.g. GovAssure, Secure More ❯
large-scale international security programme, delivering high-quality offensive security assessments across applications, infrastructure, and networks. You'll be joining a specialist team responsible for delivering structured penetration tests, vulnerability assessments and security design reviews. Working within a defined AGILE sprint model, you will plan, execute and report on testing activities, producing clear technical findings, risk assessments and remediation More ❯
Automate deployment, configuration, and infrastructure provisioning (Infrastructure as Code) Work with virtualisation (VMware/vSphere, etc.) Configure/manage SAN/storage, Fibre Channel, zoning, LUN provisioning Participate in vulnerability assessments, patches, security hardening, and incident response Required Skills & Experience NPPV3 clearance, either current or active within the last 12 months (non-negotiable) Strong track record with Windows More ❯
keep up with the high demand. In this varied role you will be accountable for a broad range of Security Operations activities, including proactive monitoring, incident response, threat and vulnerability management, managing the external Security Operations Centre (SOC) partnership and developing security capabilities. You will also play a key part in providing expert technical advice for risk assessments and … compliance initiatives. The ideal candidate will possess strong experience in managing and delivering security operations, including planning vulnerability assessments and penetration testing, investigating security breaches, maintaining operational security processes, maturity assessments and actively contributing technical expertise to risk management. An understanding of ISO27001 and Power BI would be beneficial and having previous experience with government policies such as GovAssure More ❯
Employment Type: Contract
Rate: £500 - £550 per day + Inside IR35 + ASAP Start
recent experience of using Vulcan, to be considered for the role, you will need Vulcan and the following: - Assist with the deployment of Vulcan Cyber for orchestrating and automating vulnerability management workflows, prioritisation, and remediation tracking. Assist with the vulnerability management lifecycle, from detection to remediation, ensuring robust protection against threats. Operate and optimise vulnerability management tools … including Vulcan Cyber, to conduct comprehensive vulnerability assessments and generate actionable reports. Develop and deliver regular vulnerability reporting, metrics, and dashboards for management and technical teams via Vulcan Cyber, Tenable and Defender. Collaborate with incident response teams using CrowdStrike and Microsoft Defender to correlate vulnerability data with threat intelligence and active security incidents. Maintain up-to-date … business stakeholders. Work closely with IT operations, development, and compliance teams to ensure timely remediation of identified vulnerabilities and adherence to regulatory standards. Contribute to the continuous improvement of vulnerability management processes and integration with other security platforms. If this could be your next role, please forward your CV in the first instance. Due to the volume of applications More ❯
Birmingham, West Midlands, United Kingdom Hybrid/Remote Options
Crimson
data will be the core responsibility of this position. Key Skills and Responsibilities: Oversee security operations, implementing tools and processes to enhance proactive monitoring, incident response, threat management, and vulnerability management. Maintain security processes, handle support requests, and investigate breaches as required. Monitor external security environments, identify emerging threats, and communicate findings to leadership when necessary Plan and coordinate … vulnerability assessments and penetration testing, providing expert advice on tools and techniques. Support risk assessments, recommend mitigations, and ensure compliance with security policies and standards. Drive improvements within the external Security Operations Centre and act as an escalation point for complex or sensitive issues. Manage the design, delivery, and continuous improvement of IT Security Operations capabilities aligned with business More ❯
Luton, Bedfordshire, South East, United Kingdom Hybrid/Remote Options
Crimson
data will be the core responsibility of this position. Key Skills and Responsibilities: Oversee security operations, implementing tools and processes to enhance proactive monitoring, incident response, threat management, and vulnerability management. Maintain security processes, handle support requests, and investigate breaches as required. Monitor external security environments, identify emerging threats, and communicate findings to leadership when necessary Plan and coordinate … vulnerability assessments and penetration testing, providing expert advice on tools and techniques. Support risk assessments, recommend mitigations, and ensure compliance with security policies and standards. Drive improvements within the external Security Operations Centre and act as an escalation point for complex or sensitive issues. Manage the design, delivery, and continuous improvement of IT Security Operations capabilities aligned with business More ❯