South East London, London, United Kingdom Hybrid / WFH Options
The Fortune Group (Recruitment) Limited
secure environment. Suitable Lead Security Engineers will work remotely or in the London office. Projects that need to be completed Security Awareness OpenSource Software scanning Automated VulnerabilityScanning Kubernetes VulnerabilityScanning Supply Chain monitoring (container images etc.) SIEM and Monitoring/Alerting service AntiVirus/ more »
research, code/script analysis, reverse engineering, exploitation, and documentation.- Identifying, testing, and implementing cutting-edge automated tools or enhancing existing ones to optimize vulnerability management efficiency and effectiveness.- Developing and refining code/scripts to bolster vulnerability detection, remediation/mitigation, and operational functions.- Integrating vulnerabilityscanning and configuration hardening in cloud environments (e.g., AWS, Microsoft Azure, Google Cloud Platform).- Conducting vulnerabilityscanning and reporting in alignment with the application development continuous integration and continuous delivery pipeline, streamlining work efforts through efficient use of security tools.- Spearheading security initiatives and projects more »
cyber risk exposure, providing meaningful risk advice and mitigations, reports to stakeholders Ensure the security of the organisations network infrastructure including managing firewalls, using vulnerabilityscanning, port monitoring tools and resolving security related incidents. Lead the design, implementation, testing and maintenance of WAN and LAN network solutions Manage … concepts required in the role including LAN, WAN, WiFi, data-centre networks, unified comms SIEM and IPS/IDS technologies and toolset used for vulnerabilityscanning including Nessus Cloud computing including IaaS, PaaS and SaaS. Core network skills to include, routing (IS-IS, BGP, MPLS, VRF's etc more »
detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerabilityscanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA … of the organization.Participates in change management meetings and provides expert input to ensure security is maintained.Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering.Ability to manage and continuously improve upon vulnerability management program.Ability to propose more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
and manage all group security incidents. Whilst there are process aspects to the role there are two main areas of focus for the team: Vulnerability management. The team manage issues identified through internal and external vulnerability testing. Internally we use tools like Snyk (one of several tools available … expo or one of our regular social events after work. The Role Reporting to the Security Operations Manager, your key tasks may involve: Managing vulnerabilityscanning tools - SAST, SCA, IaC, Containers & DAST for all Egress products Investigate SIEM alerts, working with the Engineering and Operations teams to resolve more »
As a Senior Network Security Engineer, you will be instrumental in safeguarding our client's network infrastructure, focusing on perimeter networks, DMZs, firewalls, proxies, vulnerabilityscanning, and Network Access Control (NAC). You will lead the implementation of key security controls, conduct audits, and provide consultancy to the more »
and initiatives to ensure compliance with the organisational Security Policy. Lead security evaluation activities utilising security tests such as commissioned IT Health Checks, auditing, vulnerabilityscanning and penetration testing to name a few [but not exhaustive]. Report testing results to management and commissioning customers. Documenting and managing more »
able to effectively communicate security vulnerabilities to application developers and/or senior managers who may have little to no experience with application security vulnerability specifics.The Team:Understanding the requirements of the applications and how to use themTesting applications using a variety of tools to identify vulnerabilities that could … expose the Bank to riskMonitoring existing and proposed security standard setting groupsConducting meetings to communicate the findings and implications to stakeholdersPerforming vulnerability fix verification testing in support of the remediationProviding technical support to clients, management and staff throughout risk assessments and the implementation of appropriate data security procedures and … GPEN)SANS GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)SANS GIAC Web Application Penetration Tester (GWAPT)Certified Ethical Hacker (CEH)Experience in conducting vulnerability assessments, code reviews and penetration tests against web/mobile application technologies, services, platforms and languages to find flaws and exploits (e.g. SQL Injection more »
deliver targeted remediation activities after cyber security incidents; Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetration testing and vulnerabilityscanning; Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams; Acting as the subject … for future implementation of targeted improvements to increase cost to the attacker. Assessing organisations’ ability to detect and respond to cyber attacks; Understanding organisations’ vulnerability to specific cyber security threats; Delivering remediation projects for clients who have had cyber security incidents, and assisting plan cyber transformations; Testing and improving more »
with relevant rules and regulations related to financial crime and conduct. Technical Requirements: Excellent knowledge of security technologies and domains, including endpoint protection tools, vulnerability scanners, attack simulation, network security, and cloud security. Proficient in PAM best practices, technologies, and procedures. 2+ years knowledge of Windows Server, Active Directory more »
individual will be the key enabler between security, product, and engineering teams. You will need to understand security requirements from a variety of outputs (vulnerability scanners, pen testing, code scans, regulatory requirements), triage and prioritize the findings, and then work with Product Managers to implement changes to improve the more »
Xpertise are working with a client in the Insurance industry who are searching for a talented Threat and Vulnerability Lead to join their team. Job Title: Threat and Vulnerability Lead Salary: £75,000 - £90,000 Location: 3 days a week in Central London office About the role: You … Security teams to assess the vulnerabilities and reduce the Cyber related risks. My client is looking for people with the following skillset: - Familiarity with vulnerabilityscanning and detection technologies. - Familiarity with MITRE ATT&CK framework - Excellent ability to present information and results to the business - Pen testing experience … Key responsibilities in this role will include: - This role will involve working closely with the Enterprise Security team - Great understanding of Threat and vulnerability management practises - Working closely with, and reporting into the BISO If keen please apply more »
Response activities for the Firm’s environment.Enforce security policies and procedures by administering and monitoring appropriate systems, events and answering client queries.Perform threat and vulnerability management functions including vulnerability scans and/or analyze results of scans and assist with remediation as required.Collaborate with the Information Security Team … to consume feeds from a suite of security tools including AV, Advanced Malware Detection, SIEM, IDS, Vulnerability scanners, etc.Ensure MLP enterprise security products are functioning and protecting the environment as expected while providing stability and maintaining policies and procedures.Actively monitor new and emerging security and privacy related technologies, trends … broad spectrum of technologies – including operating system, cloud, Active Directory, Group Policy, DNS, Messaging.High level understanding of internetworking, data transmission and encryption protocols.Experience with vulnerability management scanning platforms.Ability to handle sensitive and/or confidential materials with appropriate discretion.Scripting and development skills (Python, Powershell, VBscript, Rest a plus more »
after the status and configuration of shared computers in the meeting rooms. Support the IT Team's Cyber-Security policy by working with the vulnerability scanner and resolving issues where possible, with the support of the team. To work closely with the team in the provision of technical support more »
experience with Terraform) * Collaborate with security and engineering teams to implement DevSecOps principles and best practices. (Bonus points for experience with GCP, Kubernetes, and vulnerabilityscanning tools) * Monitor and troubleshoot IAM systems, ensuring optimal performance and security. Requirements: * 5+ years of hands-on experience in DevOps, with a more »
experience with Terraform) • Collaborate with security and engineering teams to implement DevSecOps principles and best practices. (Bonus points for experience with GCP, Kubernetes, and vulnerabilityscanning tools) • Monitor and troubleshoot IAM systems, ensuring optimal performance and security. Requirements: • 5+ years of hands-on experience in DevOps, with a more »
detection, analysis, and remediation of technical security risk. You will ideally have: • Excellent knowledge of security technologies and domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. • Familiarity with DevOps principals and technologies such as Infrastructure as Code (IaC). • Experience working within more »
applications in Linux environment · Good knowledge of Linux OS family · Experience with cloud technologies (Azure preferred) · Shell scripting (bash, powershell) · Python scripting · Experience with vulnerabilityscanning is a plus · Sound knowledge of Windows OS is a plus Nice to have · Network knowledge · Gitlab pipelines, Azure DevOps more »
Information Security Architecture team in matters of technical security at company Supporting the wider Information Security team in building the Internal Control Framework (ICF), vulnerability management, and responding to technical audits. Supporting the wider Information Security team in promoting security awareness and best practice throughout the company. Liaising with … relevant rules and regulations in relation to financial crime & conduct. Technical requirements: Excellent knowledge of security technologies and domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. Working knowledge of Privileged Access Management (PAM) best practice, technologies, and procedures. Working knowledge of Microsoft more »
the release process. Solid knowledge of Azure, IaaS, SaaS, tools, and development cycles. Experience with IaC, Terraform, Bicep, pipelines, app services, private endpoints, code vulnerabilityscanning, and backup/recovery of services Experience or an interest in AI. The Package: Base Salary: £60,000-£80,000 Hybrid working more »
through developing the operational systems Maintain, support and develop their security procedures and tooling Assist and support the wider security teams including Architecture, Audits, Vulnerability Management, Project Management and 3rd parties Be available for out of hours support in case of critical issues - uncommon Skills Required: Security Technologies & Tooling … endpoint protection tools, vulnerability scanners, network security, cloud security Access Management & Authentication: IAM, PAM, PIM, SSO, MFA etc Microsoft: Active Directory, Windows Server & SQL Server Linux: Ubuntu, RedHat, Rocky Cloud: 365, Azure, AWS DevOps/DevSecOps: Infrastructure as Code - IaC Scripting: PowerShell, Python, Bash In line with the Conduct more »