Warrington, England, United Kingdom Hybrid / WFH Options
Tata Consultancy Services
Configure and manage Microsoft security solutions for optimal protection. Perform data profiling and analysis to identify patterns, trends, and insights. Conduct security assessments and vulnerability scanning. Respond to security incidents and participate in incident response activities. Stay updated on evolving security threats and Microsoft security solutions. Act as a more »
an Individual Contributor role. Besides writing code, you can expect to: Take the lead on projects to improve our DevOps: CI/CD pipeline (vulnerabilityscanning, static analysis, tests), blue/green deploys, auto load balancing, observability & instrumentation, infrastructure as code (eg Terraform) etc. Take the lead on more »
Basingstoke, England, United Kingdom Hybrid / WFH Options
Matrix
of network protocols, firewalls (Network Virtual Appliances) and routing Experience of hardening IT infrastructure based on security audits, standards and industry best practice (e.g. vulnerabilityscanning, Penetration testing and ISO27001/17/18). more »
detection, analysis, and remediation of technical security risk. You will ideally have: • Excellent knowledge of security technologies and domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. • Familiarity with DevOps principals and technologies such as Infrastructure as Code (IaC). • Experience working within more »
the release process. Solid knowledge of Azure, IaaS, SaaS, tools, and development cycles. Experience with IaC, Terraform, Bicep, pipelines, app services, private endpoints, code vulnerabilityscanning, and backup/recovery of services Experience or an interest in AI. The Package: Base Salary: £60,000-£80,000 Hybrid working more »
City Of Bristol, England, United Kingdom Hybrid / WFH Options
Peaple Talent
the release process. Solid knowledge of Azure, IaaS, SaaS, tools, and development cycles. Experience with IaC, Terraform, Bicep, pipelines, app services, private endpoints, code vulnerabilityscanning, and backup/recovery of services Experience or an interest in AI. The Package: Base Salary: £45,000-£65,000 Hybrid working more »
Vulnerability Management (TVM) Installation and configuration Engineer GlobalLogic have a new role for an Installation and configuration Enginee r with Tenable Nessus expertise ideally. This role is working INSIDE IR35 for an initial 6 months and will be a Hybrid working pattern, 2 days per week onsite at either … to someone with either CyberArk or Splunk and we are looking for someone who has the following skills and expertise: years of experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues in the design and implementation of … controls to secure systems, applications, network, or infrastructure services experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. understanding of TCP/IP networking concepts and DNS./Unix/Windows Operating systems experience years of related more »
control software; workstations (MAC, Windows), smartphones (Android, OS), printers, desk phones, Reliable technical knowledge about: Network infrastructure including SecOps operations (FW, Switch…), Monitoring and vulnerabilityscanning at performance for 4 types of assets: workstations, servers, applications, and network components, Microsoft product expertise will be advantageous: O365 (Power BI more »
research, code/script analysis, reverse engineering, exploitation, and documentation.- Identifying, testing, and implementing cutting-edge automated tools or enhancing existing ones to optimize vulnerability management efficiency and effectiveness.- Developing and refining code/scripts to bolster vulnerability detection, remediation/mitigation, and operational functions.- Integrating vulnerabilityscanning and configuration hardening in cloud environments (e.g., AWS, Microsoft Azure, Google Cloud Platform).- Conducting vulnerabilityscanning and reporting in alignment with the application development continuous integration and continuous delivery pipeline, streamlining work efforts through efficient use of security tools.- Spearheading security initiatives and projects more »
detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerabilityscanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA … of the organization.Participates in change management meetings and provides expert input to ensure security is maintained.Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering.Ability to manage and continuously improve upon vulnerability management program.Ability to propose more »
and manage all group security incidents. Whilst there are process aspects to the role there are two main areas of focus for the team: Vulnerability management. The team manage issues identified through internal and external vulnerability testing. Internally we use tools like Snyk (one of several tools available … expo or one of our regular social events after work. The Role Reporting to the Security Operations Manager, your key tasks may involve: Managing vulnerabilityscanning tools - SAST, SCA, IaC, Containers & DAST for all Egress products Investigate SIEM alerts, working with the Engineering and Operations teams to resolve more »
with relevant rules and regulations related to financial crime and conduct. Technical Requirements: Excellent knowledge of security technologies and domains, including endpoint protection tools, vulnerability scanners, attack simulation, network security, and cloud security. Proficient in PAM best practices, technologies, and procedures. 2+ years knowledge of Windows Server, Active Directory more »
Warrington, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
Configure and manage Microsoft security solutions for optimal protection. Perform data profiling and analysis to identify patterns, trends, and insights. Conduct security assessments and vulnerability scanning. Respond to security incidents and participate in incident response activities. Stay updated on evolving security threats and Microsoft security solutions. Act as a more »
experience with Terraform) • Collaborate with security and engineering teams to implement DevSecOps principles and best practices. (Bonus points for experience with GCP, Kubernetes, and vulnerabilityscanning tools) • Monitor and troubleshoot IAM systems, ensuring optimal performance and security. Requirements: • 5+ years of hands-on experience in DevOps, with a more »
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
for you. We have a comprehensive training plan that we will tailor around you. About AppCheck: AppCheck is a B2B cyber security software platform (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability scan for security vulnerabilities in more »
Information Security Architecture team in matters of technical security at company Supporting the wider Information Security team in building the Internal Control Framework (ICF), vulnerability management, and responding to technical audits. Supporting the wider Information Security team in promoting security awareness and best practice throughout the company. Liaising with … relevant rules and regulations in relation to financial crime & conduct. Technical requirements: Excellent knowledge of security technologies and domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. Working knowledge of Privileged Access Management (PAM) best practice, technologies, and procedures. Working knowledge of Microsoft more »
South East London, London, United Kingdom Hybrid / WFH Options
The Fortune Group (Recruitment) Limited
secure environment. Suitable Lead Security Engineers will work remotely or in the London office. Projects that need to be completed Security Awareness OpenSource Software scanning Automated VulnerabilityScanning Kubernetes VulnerabilityScanning Supply Chain monitoring (container images etc.) SIEM and Monitoring/Alerting service AntiVirus/ more »
Oxfordshire, England, United Kingdom Hybrid / WFH Options
University of Oxford
Security Operations and the rest of the team. OxCERT runs an on-premises Elasticsearch-based SIEM solution, an Intrusion Detection System (IDS), and a vulnerabilityscanning service as well as other open source and commercial tools. We are one of the first UK universities to have the capability more »
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
for you. We have a comprehensive training plan that we will tailor around you. About AppCheck: AppCheck is a B2B cyber security software platform (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability scan for security vulnerabilities in more »
cyber risk exposure, providing meaningful risk advice and mitigations, reports to stakeholders Ensure the security of the organisations network infrastructure including managing firewalls, using vulnerabilityscanning, port monitoring tools and resolving security related incidents. Lead the design, implementation, testing and maintenance of WAN and LAN network solutions Manage … concepts required in the role including LAN, WAN, WiFi, data-centre networks, unified comms SIEM and IPS/IDS technologies and toolset used for vulnerabilityscanning including Nessus Cloud computing including IaaS, PaaS and SaaS. Core network skills to include, routing (IS-IS, BGP, MPLS, VRF's etc more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Leeds, Horsforth, West Yorkshire, United Kingdom Hybrid / WFH Options
Headway Recruitment
Microsoft O365 environment and security solutions, threat intelligence analysis, Security Incident Response processes, disaster recovery, and business continuity principles. Familiarity with security testing principles, vulnerabilityscanning, risk identification, resolution, and reporting. Experience in formal document creation, such as reports or procedures. Key Responsibilities include but not limited to more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »