are in place, and aligned and agreed with relevant stakeholders. Roles within Information Security may cover one or more areas of speciality: Identity & Access Management (which may include, for example, authentication; access management & control; recertification etc.) Information Security (“IS”) Operations (which may for example include, cyber threat operations … GCP and Azure) Evaluate and enhance cloud security posture by identifying and mitigating security risks Implement best practices for cloud security, including identity & access management, encryption, and threat protection Ensure adherence to security policies, industry standards, and regulatory requirements Implement security measures for cloud-based infrastructure Oversee network security … firewalls, VPNs, IDS/IPS, and other perimeter defence systems Collaborate with infrastructure teams to implement system hardening and secure network architecture Work with VulnerabilityManagement team to assess and remediate across hybrid environments Implement and maintain security monitoring systems Monitor and respond to security alerts, and coordinate more »
Shift Rota). Respond to information security incidents working closely with the firms Managed Service Security Provider (MSSP) Respond to Vulnerability notifications from Vendors. Deliver small security projects and maintain and continuously optimise Sentinel. Handle cyber security queries from our IT Service desk and other Global Support teams. Review … maintain incident response playbooks. Assign and revoke admin rights, transactionally and also regular reviews. Perform Privileged Access Reviews Produce end of month security reporting (vulnerability position, hardening position, incidents handled) Maintain technical security policies. Review all High-Level Design documents for cybersecurity impact, prior to the Architectural Review Board … Monitor the threat landscape internally and externally and respond where necessary. BAU Responsibilities//Daily System Monitoring the security tools, key processes and vulnerabilitymanagement platforms. Assist with risk assessments and internal/external audits. Perform regular security monitoring. Review and resolve security tickets within the ITSM more »
focus on Threat Hunting (Sentinel) and 2nd/3rd line SOC work. Key Focus of the role: Threat Hunting Threat monitoring, compliance, event log management and vulnerabilitymanagement to help protect against cyber-attacks and vulnerabilities. Work with the 3rd Party SOC to provide support on cyber more »
Technology stack: Linux, Windows, AWS with some Azure Core responsibilities: Design and implementation of security architecture (both cloud and on-prem) Improving and managing VulnerabilityManagement Optimising and developing Threat Detection technology Performing Incident Response and Analysis for key events Risk assessments Security monitoring and reporting Collaborate with more »
now Active Defence we work to evolve cyber operations as a world-class capability. What you’ll be doing: Maintains the Global Attack Surface Management service to ensure perimeter assets are known and tested, and Shadow-IT assets are discovered and brought into governance Assists with complex purple team … the global external attack surface and performing continual testing of security controls Leading on policy implementation, high standards and best practices within Attack Surface Management and Active Defence Is responsible for specific work areas and provides mentorship and expertise to others in the team Supports the Active Defence Manager … on emerging threats Your skills and experiences: Essential: Broad and detailed experience of technologies including but not limited to VPN appliances, Firewalls, Attack Surface Management, IDS/IPS, Endpoint Protection, Microsoft Operating Systems, Linux, TCP/IP, Networking, Cloud, CDN's, Web Server’s, Open-Source tooling, and Vulnerabilitymore »
now Active Defence we work to evolve cyber operations as a world-class capability. What you’ll be doing: Maintains the Global Attack Surface Management service to ensure perimeter assets are known and tested, and Shadow-IT assets are discovered and brought into governance Assists with complex purple team … the global external attack surface and performing continual testing of security controls Leading on policy implementation, high standards and best practices within Attack Surface Management and Active Defence Is responsible for specific work areas and provides mentorship and expertise to others in the team Supports the Active Defence Manager … on emerging threats Your skills and experiences: Essential: Broad and detailed experience of technologies including but not limited to VPN appliances, Firewalls, Attack Surface Management, IDS/IPS, Endpoint Protection, Microsoft Operating Systems, Linux, TCP/IP, Networking, Cloud, CDN's, Web Server’s, Open-Source tooling, and Vulnerabilitymore »
technologies including but not limited to firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, Linux, TCP/IP, Networks, Cloud, CDN’s, VulnerabilityManagement Knowledge of Python 3 programming language more »
of our IT environment and supporting enterprise-wide security solutions, with a focus on proactive improvement and guidance. Key Responsibilities Assist in security incident management and response. Manage and respond to security alerts from systems and users. Conduct regular security checks and investigate exceptions. Complete client security questionnaires and … within an enterprise environment. Knowledge of security standards (Cyber Essentials, ISO 27001, GDPR). Familiarity with Microsoft O365 security solutions and networking. Experience in vulnerabilitymanagement, security auditing, and incident response. Strong communication skills, team-oriented, and customer-focused. Ability to work in a fast-paced environment and more »
and resilient infrastructure for mission-critical services. Key Responsibilities: Design, implement, and manage Microsoft PKI with HSM integration Oversee disk encryption services and key management using KMIP-compliant solutions Manage Active Directory, Group Policy, DNS, and Role-Based Access Control (RBAC) Ensure compliance with CIS Benchmarks and perform security … audits and vulnerabilitymanagement Support high availability (HA) systems including SQL Server, Exchange DAGs, and Windows Clustering Manage VMware, VXRail, and enterprise storage solutions Develop and maintain backup strategies for critical systems Required Skills & Experience: Expertise in Microsoft Certificate Services (PKI), HSM integration, and disk encryption (CipherTrust) Strong … knowledge of Active Directory management, SQL Server (HA), and Exchange (DAGs) Proficiency with VMware, storage solutions (VSAN, NetApp), and Windows Clustering Familiarity with CIS Benchmarks, NTP, and secure environments Certifications: MCSE, VCP, CISSP (preferred) UKSV clearance (or eligibility) required Does this sound like you? Apply now and I'll more »
Employer: DWS Group Title: Cyber Threat Intelligence and VulnerabilityManagement Specialist (VP) Location: London About DWS: Today, markets face a whole new set of pressures – but also a whole lot of opportunity too. Opportunity to innovate differently. Opportunity to invest responsibly. And opportunity to make change. Join us … are in place, and aligned and agreed with relevant stakeholders. Roles within Information Security may cover one or more areas of speciality: Identity & Access Management (which may include, for example, authentication; access management & control; recertification etc.) Information Security (“IS”) Operations (which may for example include, cyber threat operations … data leakage etc.) IS Technology (which may include IS architecture, IS engineering, cryptographic services etc.). Role Details: As a Cyber Threat Intelligence and VulnerabilityManagement Specialist you will (be): Lead the DWS Cyber Threat Intelligence and VulnerabilityManagement capability, liaising closely with the central Threat more »
VulnerabilityManagement Lead - London (Hybrid 3x a week) - up to £160,000 + bonus + benefits As the VulnerabilityManagement Lead, you'll head the global program to identify, assess, and address vulnerabilities across systems, networks, and applications. This role requires both technical expertise and strong … coordination with internal teams to ensure vulnerabilities are quickly and efficiently fixed. You'll manage the entire process from vulnerability identification and prioritization to patch scheduling, while also handling communication, compliance, and reporting. You'll evaluate risks, oversee patch integrity, and work closely with cross-functional teams. Requirements: Strong … background and recent technical skills in vulnerabilitymanagement, with experience in a leadership position. Strong hands-on technical knowledge with vulnerability scanning tools. Experience in cloud and hybrid environments. Effective communicator with both technical and non-technical stakeholders. Experience in delivering patch management across large organizations more »
My client, a systematic trading firm are looking to hire a VulnerabilityManagement specialist to take ownership of the global vulnerabilitymanagement initiative, where you'll be responsible for overseeing both the technical processes involved in prioritising vulnerabilities and the broader coordination with various teams to … is conducted as several greenfield initiatives take place. This position will report directly to the Head of Security. Key Qualifications: Proven background in leading vulnerabilitymanagement efforts, preferably in a leadership role. Practical experience with a variety of vulnerability assessment tools. Expertise in managing technical risk across … domains such as Cloud, Web Applications, APIs, and more Skilled in coordinating patch management strategies. Comfortable engaging with stakeholders across different technical and non-technical levels Familiarity with working within a trading or financial services/regulated environment more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
hackajob
looking to recruit a Linux Engineer to join a team within Computershare Technology Services. The Linux Engineer role has global responsibilities across the Systems Management space, to continuously deliver quality platforms and a number of key services to the wider business groups, enabling automation and ease of request fulfilments … quality platforms and services to help wider audiences leverage to achieve their goals globally. This includes, but not limited to Automation, Application Delivery, Threat & Vulnerability remediation, System build Automation, Monitoring and Project delivery. Besides fulfilling the daily workloads, the role will be assigned larger pieces of work associated with … for new and existing defined solutions. They will work closely with the requestor to consult on the design, build and maintenance of the Systems Management Monitoring or Deployment solutions, for internal and external customer requirements. On these larger pieces of work, they will be assigned a portion of their more »
days Onsite: Reading. Required Skills: • Redhat Openshift v.4 • GitOps, Istio, tekton, Grafana, VMware, ACM, Artifactory, Bitbucket, Hashicorp Vault (YAML & Bash), Azure, • Kubernetes • VulnerabilityManagement • Risk Management Must either hold SC or be eligible to get it. more »
roles, ideally at a Senior level Experience in a range of security domains like Infrastructure, Cloud, Applications and Networks Technical skills in EDR & SIEM, VulnerabilityManagement, Network Security, Attack Surface Management and various other areas. This role will be based remotely but you will need to make more »
with some of the brightest minds in the industry. Desired Experience 5+ years experience in a technical security role Experience in DevSecOps Experience in vulnerability assessment, penetration testing, and vulnerabilitymanagement processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate more »
new security architectures for both cloud and on-premise environments. The successful applicant will report directly to the CISO and be responsible for improving vulnerabilitymanagement processes for the firm as well as designing threat detection techniques, risk assessments and security best practices. This is a very important more »
of compliance audits and ensure adherence to existing and emerging regulations and standards, including NIS, NIS2, NIST, CSF, ISO27001, IEC62443, etc. Main Responsibilities Risk Management: Manage risks and vulnerabilities, including assessments, compliance reviews, audits, and tracking using the GRC tool (OneTrust) in accordance with NIST standards. Compliance: Ensure the … Security Committee. Security Standards: Manage security standards, policies, and practices annually to ensure they meet the company's assurance plan. Incident Assessment: Assess incidents, vulnerabilitymanagement, patching status, penetration test results, phishing, and social engineering tests and attacks. Framework Adoption: Lead the adoption, continual improvement, and certification on … experience in managing third-party audits, compiling evidence, and organizing audit responses. Education: Bachelor’s degree in information cybersecurity or certifications in cybersecurity, risk management, governance, or a related field. Skills and Competencies: Highly effective written and verbal communication skills; excellent presentation skills. Attention to detail and a strong more »
ecosystem experience e.g. Openshift and Kubernetes An understanding of Agile Delivery (Kanban/SCRUM/XP/Lean/SAFe) An understanding of DevOps Management (JIRA, Confluence) Awareness of CI/CD tooling such as Jenkins, GitLab or similar. Knowledge of Hashicorp Terraform and Hashicorp Vault Awareness of SAST … Security Testing - GitLab, Checkmarx, Veracode Awareness of DAST Security Testing - GitLab, Veracode Awareness of SCA/IAST Security Testing - Checkmarx, GitLab, Veracode Awareness of VulnerabilityManagement - PA Prisma Awareness of QA Testing - Selenium Certifications in Gitlab, Terraform and Vault would be preferable more »
by the customer (creating run books, joining CAB’s and executing the changes). • Execute Production plan activities such as (solving vulnerabilities found by vulnerabilitymanagement, executing, or supervising Monthly patch cycles). • Execute Manage LCM within their scope (new releases of software/firmware/patches Mandatory more »
Job title: Cyber Security Engineer Salary: £100,000 + Bonus/Benefits Location : London (Hybrid) Skills: Incident Response, VulnerabilityManagement, Monitoring, Security Frameworks My client is a top ranked, technology-driven trading firm run by Computer Scientists and Olympiad winning mathematicians from some of the top global tech … Desktop, Storage, Network, Database, F/Walls, SaaS, Virtual Machines. · Understanding of enterprise security . Demonstrate Understanding of DLP, IPS, Endpoint, anti-malware, Sandbox, Vulnerability scanners · Good communication skills If you think that this could be a good fit for you, then please apply by submitting a copy of more »
Greater London, England, United Kingdom Hybrid / WFH Options
Infinite Computer Solutions
team and local AV vendor Regional Technical Lead Escalation point for the other desktop members Adoption of Tanium & ControlUp Opening tickets with Microsoft Windows Vulnerabilitymanagement via RiskSense and powershell scripting Asset life-cycle replacement, reporting and recycling EMEA Meeting room monthly reporting Process automation – power automate, MS more »
now Active Defence we work to evolve cyber operations as a world-class capability. What you’ll be doing: Maintains the Global Attack Surface Management service to ensure perimeter assets are known and tested, and Shadow-IT assets are discovered and brought into governance Assists with complex purple team … the global external attack surface and performing continual testing of security controls Leading on policy implementation, high standards and best practices within Attack Surface Management and Active Defence Is responsible for specific work areas and provides mentorship and expertise to others in the team Supports the Active Defence Manager … on emerging threats Your skills and experiences: Essential: Broad and detailed experience of technologies including but not limited to VPN appliances, Firewalls, Attack Surface Management, IDS/IPS, Endpoint Protection, Microsoft Operating Systems, Linux, TCP/IP, Networking, Cloud, CDN's, Web Server’s, Open-Source tooling, and Vulnerabilitymore »
Analyst you will focus on Technical Information Security within the Information Security Function , within a major part of the Organisation's Overall Cyber Incident Management Process. You will work closely with the InfoSec Engineering Team within the Security Department to Define Requirements of the Tools & Onboard New Functionality. You … take Responsibility for Tuning & Maintaining Security Platforms to Deliver the Best Capability to other Information Security Analysts & SOC Analysts & Clients in Identifying & Delivering Threat & Vulnerability Management. You will act as Subject Matter Expert & Escalation Point for other SOC Analysts and will work closely with both the Senior Security Operations … Experience Required for Senior Information Security Analyst role will include: Strong Experience in Security Operations or a related Information Security role Ideally leadership or Management Experience Strong Understanding of Information Security Principles & Technologies. Excellent Analytical & Problem-Solving Skills. Commercial Awareness & (Ideally) Experience of PCI DSS (Current Version) Knowledge of more »
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Akkodis
investigation and response as required. Work with cross-functional teams to respond to incidents - be they an escalated security event or remediating a critical vulnerability - when the need arises Contribute effectively to the establishment and maintenance of the IT Security knowledge base, documenting clear instructions and known fixes. Work … Any relevant AWS Certifications are desirable, especially AWS Cloud Practitioner (Foundational), AWS Security (Speciality). Content Delivery Networks and Web Application Firewalls. Experience with vulnerability management. A broad technical knowledge of server, endpoint, and networking hardware and related security configurations. A strong technical knowledge of modern cloud offerings and more »