Warrington, England, United Kingdom Hybrid / WFH Options
Tata Consultancy Services
Configure and manage Microsoft security solutions for optimal protection. Perform data profiling and analysis to identify patterns, trends, and insights. Conduct security assessments and vulnerability scanning. Respond to security incidents and participate in incident response activities. Stay updated on evolving security threats and Microsoft security solutions. Act as a more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
team engagements to tune and validate detection tooling. Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetration testing, and vulnerability scanning. Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams. Manage the delivery of daily more »
platforms. Support Windows patching process through the creation/update of ad-hoc scripting (Shell, PowerShell) on Windows Server/Desktop platforms. Assist with vulnerabilityscanning of devices utilizing standard security scanning tools. Manage customer expectations and resolve queries by working closely with Information Security through effective more »
and a pioneering mindset. Responsibilities Deploy, maintain, and enhance highly scalable multi-cloud infrastructure for blockchain nodes Contribute to hardening, logging and monitoring, and vulnerabilityscanning for infrastructure Identify where automation can enhance infrastructure scalability Qualifications 5+ years of experience as a DevOps Engineer Experience with AWS and more »
identifying vulnerabilities, enhancing security measures, and ensuring the safety of our clients’ digital environments. Your responsibilities will span a wide range of tasks, from vulnerabilityscanning to technical content creation. Responsibilities: Vulnerability Detection and Automation: Collaborate with our security team to scan customer systems for critical vulnerabilities. … Develop new vulnerability checks using tools like Nuclei. Curate crowd-sourced checks for inclusion in our Intruder platform. Automate penetration testing processes to scale across multiple clients simultaneously. Rapid Response and Custom Scanning: Conduct custom scans on customer targets to identify emerging critical weaknesses. Provide rapid response solutions … Occasionally participate in industry events and conferences. Qualifications and Experience: Industry Experience: Minimum of 2 years in offensive security roles. Proven track record in vulnerability assessment and penetration testing. Educational Background: Technical academic background in software engineering or cyber security. Certifications (One or More): OSCP OSWE OSEP CRT CCT more »
after the status and configuration of shared computers in the meeting rooms. Support the IT Team’s Cyber-Security policy by working with the vulnerability scanner and resolving issues where possible, with the support of the team. To work closely with the team in the provision of technical support more »
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and monitor … for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular VulnerabilityScanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. … Asses the urgency and severity of incidents. Determine whether an incident requires immediate action or further investigation. Escalate incidents to higher tiers when necessary. VulnerabilityScanning: scan systems for vulnerabilities. and manage vulnerabilities discovered during scans. Security Tool Management: Configure and manage security tools (e.g., SIEM, IDS/ more »
Tesco Technology are looking for a Senior Security Analyst reporting into the Vulnerability Management team. This is an exciting opportunity for a highly motivated security focused individual to join our expanding organisation. The scale and complexity of Tesco creates a huge opportunity for someone to apply their existing skills … public cloud environments. Following our Business Code of Conduct and always acting with integrity and due diligence and have these specific risk responsibilities: Maintaining vulnerabilityscanning platforms to identify and analyse vulnerabilities. Taking a risk-based approach to prioritise remediation efforts. Working with engineering teams to remediate issues. … security incidents and reporting about relevant security threats to contribute to our internal detection engineering programme. Work alongside our analysts to upskill them in Vulnerability Management and look for patterns and issues that can be fixed centrally. POC assessments from our active Bug Bounty Program. You will need: 5+ more »
Information Security Vulnerability Analyst – Permanent - £50,000 Annual Bestman Solutions is working with a leading energy company in their search for a Vulnerability Analyst. As a Vulnerability Analyst, you will play a vital role in identifying, prioritizing, and addressing vulnerabilities in the organization’s networks, applications, and … systems. Key responsibilities: and implement appropriate vulnerabilityscanning tools for both IT and OT environments. these tools to scan all assets regularly (e.g., daily, weekly) and identify potential vulnerabilities. with security teams during assessments and cyber exercises to identify vulnerabilities. the identified vulnerabilities based on severity, exploitability, and … potential impact. regular reports summarizing outstanding vulnerabilities, remediation plans, applied exceptions, and associated security risks. the vulnerability manager in navigating approval processes for remediation efforts. Qualifications: in IT Infrastructure, or Network, with a focus in cloud infrastructure and hybrid environments. experience in identifying and managing security vulnerabilities. Prior experience more »
response efforts/playbooks. -You will be monitoring, remediating, and reporting on security events. -You will be Security incident Manager (SIM). -You will vulnerability configure and scan reviews & improvements -You will ensure asset management across tools is accurate. -You will review security codes and security approvals. -You will … CloudTrail, Guardduty), Qualys tools and SIEM experience, to detect and respond to security events/incidents. -Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. -Proven track record of ensuring more »
knowledge of web application security practices, including OWASP Top Ten vulnerabilities. Experience with security tools and technologies such as SIEM, IDS/IPS, and vulnerability scanners. Analytical and Problem-Solving Skills: Ability to analyze complex security issues and develop effective solutions. Strong attention to detail and the ability to more »
tools (Terraform, CloudFormation, etc.) Expertise in configuration management (Ansible, Chef, Puppet) and container orchestration (Kubernetes, Docker Swarm) Deep understanding of security principles, threat modelling, vulnerabilityscanning, and secure coding practices Familiarity with mobile development frameworks (React Native, Flutter) and application security testing (SAST, DAST, IAST) Strong problem-solving more »
detection, analysis, and remediation of technical security risk. You will ideally have: • Excellent knowledge of security technologies and domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. • Familiarity with DevOps principals and technologies such as Infrastructure as Code (IaC). • Experience working within more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Sanderson Recruitment Plc
incidents relating to internal and customer assets. Designing and developing SIEM security use cases. Designing and implementing security controls and secure configurations. Maintaining proactive vulnerabilityscanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and more »
Senior Account Executive - £100k Base Salary + OTE 5 days a week in South Manchester office. The Role Selling enterprise web vulnerabilityscanning software to application security teams at some of the largest organizations in the world. Being the primary contact for qualified and non-qualified inbound leads more »
documentation, and procedures. Resolve security operations support incidents promptly. Assist Information Security Architecture team with technical security matters. Support Internal Control Framework (ICF) development, vulnerability management, and technical audits. Promote security awareness and best practices within the company Collaborate with technical teams and third-party security partners on key … projects. Technical Requirements: Expertise in security technologies (endpoint protection, vulnerability scanners, network security, cloud security, etc.). Knowledge of Privileged Access Management (PAM) best practices and technologies. Proficiency with Microsoft technologies (Windows Server, Active Directory, SQL Server). Experience with Linux distributions (Ubuntu, Red Hat, Rocky). Familiarity with more »
pipeline to ensure secure code deployment and infrastructure management. Design and implement automated security testing, including static code analysis, dynamic application security testing, and vulnerability scanning. Collaborate with development and operations teams to identify and mitigate security risks throughout the software development lifecycle. Implement and manage security controls for … Strong knowledge of security principles, practices, and technologies, including encryption, authentication, and access control. Experience with security tools and technologies such as SAST, DAST, vulnerability scanners, SIEM, and WAF. Proficiency with CI/CD tools like Jenkins, GitLab, CircleCI, or similar, and infrastructure-as-code tools like Terraform, CloudFormation more »
pipeline to ensure secure code deployment and infrastructure management. Design and implement automated security testing, including static code analysis, dynamic application security testing, and vulnerability scanning. Collaborate with development and operations teams to identify and mitigate security risks throughout the software development lifecycle. Implement and manage security controls for … Strong knowledge of security principles, practices, and technologies, including encryption, authentication, and access control. Experience with security tools and technologies such as SAST, DAST, vulnerability scanners, SIEM, and WAF. Proficiency with CI/CD tools like Jenkins, GitLab, CircleCI, or similar, and infrastructure-as-code tools like Terraform, CloudFormation more »
security 5. Security and Compliance: Collaborate with the security team to implement best practices for securing cloud resources, including IAM policies, network security, and vulnerability scanning. 6. Collaboration: Work closely with development and operations teams to identify opportunities for automation, performance optimization, and cost savings. 7. Troubleshooting: Troubleshoot infrastructure … Docker, Kubernetes). Strong understanding of infrastructure as code (IaC) principles and tools. (Terraform, CloudFormation) Knowledge of security best practices for cloud environments. (Security scanning, patching etc. ) Knowledge and good understanding for Ideal path to live Excellent problem-solving and communication skills. Relevant certifications in Azure and AWS (e.g. more »
West End, London, Oxford Circus, United Kingdom Hybrid / WFH Options
Eligo Recruitment Ltd
IT audits, risk assessments, and ensure compliance (ISO27001, SOC2, Cyber Essentials+), and formulate IT policies. IT Security: Manage malware, AV, password security, MFA, SSO, vulnerabilityscanning, penetration testing, and encryption. Device Management: Handle Mobile Device Management (MDM) using Kandji, Apple Device Enrolment Program (DEP), and asset management. Business more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
AppCheck Ltd
for you. We have a comprehensive training plan that we will tailor around you. About AppCheck: AppCheck is a B2B cyber security software platform (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability scan for security vulnerabilities in more »
core services design, deploy and troubleshoot. Familiar with ITIL service management. Security best practices, system and OS level security hardening (CISCAT benchmarking etc) security vulnerabilityscanning tools such as Nessus. GITOPs experience. Experience in Terraform, Ansible and ideally packer in an air gapped environment. Desirable knowledge:k8/ more »
Employment Type: Permanent
Salary: 25 days AL, buy / sell 5 days AL, birthday off, private healthcare
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
AppCheck Ltd
for you. We have a comprehensive training plan that we will tailor around you. About AppCheck: AppCheck is a B2B cyber security software platform (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability scan for security vulnerabilities in more »
an Individual Contributor role. Besides writing code, you can expect to: Take the lead on projects to improve our DevOps: CI/CD pipeline (vulnerabilityscanning, static analysis, tests), blue/green deploys, auto load balancing, observability & instrumentation, infrastructure as code (eg Terraform) etc. Take the lead on more »