As a Senior Network Security Engineer, you will be instrumental in safeguarding our client's network infrastructure, focusing on perimeter networks, DMZs, firewalls, proxies, vulnerabilityscanning, and Network Access Control (NAC). You will lead the implementation of key security controls, conduct audits, and provide consultancy to the more »
experience with Terraform) * Collaborate with security and engineering teams to implement DevSecOps principles and best practices. (Bonus points for experience with GCP, Kubernetes, and vulnerabilityscanning tools) * Monitor and troubleshoot IAM systems, ensuring optimal performance and security. Requirements: * 5+ years of hands-on experience in DevOps, with a more »
detection, analysis, and remediation of technical security risk. You will ideally have: • Excellent knowledge of security technologies and domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. • Familiarity with DevOps principals and technologies such as Infrastructure as Code (IaC). • Experience working within more »
applications in Linux environment · Good knowledge of Linux OS family · Experience with cloud technologies (Azure preferred) · Shell scripting (bash, powershell) · Python scripting · Experience with vulnerabilityscanning is a plus · Sound knowledge of Windows OS is a plus Nice to have · Network knowledge · Gitlab pipelines, Azure DevOps more »
Senior Account Executive - £100k Base Salary + OTE 5 days a week in South Manchester office. The Role Selling enterprise web vulnerabilityscanning software to application security teams at some of the largest organizations in the world. Being the primary contact for qualified and non-qualified inbound leads more »
the release process. Solid knowledge of Azure, IaaS, SaaS, tools, and development cycles. Experience with IaC, Terraform, Bicep, pipelines, app services, private endpoints, code vulnerabilityscanning, and backup/recovery of services Experience or an interest in AI. The Package: Base Salary: £60,000-£80,000 Hybrid working more »
documentation, and procedures. Resolve security operations support incidents promptly. Assist Information Security Architecture team with technical security matters. Support Internal Control Framework (ICF) development, vulnerability management, and technical audits. Promote security awareness and best practices within the company Collaborate with technical teams and third-party security partners on key … projects. Technical Requirements: Expertise in security technologies (endpoint protection, vulnerability scanners, network security, cloud security, etc.). Knowledge of Privileged Access Management (PAM) best practices and technologies. Proficiency with Microsoft technologies (Windows Server, Active Directory, SQL Server). Experience with Linux distributions (Ubuntu, Red Hat, Rocky). Familiarity with more »
pipeline to ensure secure code deployment and infrastructure management. Design and implement automated security testing, including static code analysis, dynamic application security testing, and vulnerability scanning. Collaborate with development and operations teams to identify and mitigate security risks throughout the software development lifecycle. Implement and manage security controls for … Strong knowledge of security principles, practices, and technologies, including encryption, authentication, and access control. Experience with security tools and technologies such as SAST, DAST, vulnerability scanners, SIEM, and WAF. Proficiency with CI/CD tools like Jenkins, GitLab, CircleCI, or similar, and infrastructure-as-code tools like Terraform, CloudFormation more »
after the status and configuration of shared computers in the meeting rooms. Support the IT Team's Cyber-Security policy by working with the vulnerability scanner and resolving issues where possible, with the support of the team. To work closely with the team in the provision of technical support more »
research, code/script analysis, reverse engineering, exploitation, and documentation.- Identifying, testing, and implementing cutting-edge automated tools or enhancing existing ones to optimize vulnerability management efficiency and effectiveness.- Developing and refining code/scripts to bolster vulnerability detection, remediation/mitigation, and operational functions.- Integrating vulnerabilityscanning and configuration hardening in cloud environments (e.g., AWS, Microsoft Azure, Google Cloud Platform).- Conducting vulnerabilityscanning and reporting in alignment with the application development continuous integration and continuous delivery pipeline, streamlining work efforts through efficient use of security tools.- Spearheading security initiatives and projects more »
detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerabilityscanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA … of the organization.Participates in change management meetings and provides expert input to ensure security is maintained.Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering.Ability to manage and continuously improve upon vulnerability management program.Ability to propose more »
and manage all group security incidents. Whilst there are process aspects to the role there are two main areas of focus for the team: Vulnerability management. The team manage issues identified through internal and external vulnerability testing. Internally we use tools like Snyk (one of several tools available … expo or one of our regular social events after work. The Role Reporting to the Security Operations Manager, your key tasks may involve: Managing vulnerabilityscanning tools - SAST, SCA, IaC, Containers & DAST for all Egress products Investigate SIEM alerts, working with the Engineering and Operations teams to resolve more »
and initiatives to ensure compliance with the organisational Security Policy. Lead security evaluation activities utilising security tests such as commissioned IT Health Checks, auditing, vulnerabilityscanning and penetration testing to name a few [but not exhaustive]. Report testing results to management and commissioning customers. Documenting and managing more »
with relevant rules and regulations related to financial crime and conduct. Technical Requirements: Excellent knowledge of security technologies and domains, including endpoint protection tools, vulnerability scanners, attack simulation, network security, and cloud security. Proficient in PAM best practices, technologies, and procedures. 2+ years knowledge of Windows Server, Active Directory more »
individual will be the key enabler between security, product, and engineering teams. You will need to understand security requirements from a variety of outputs (vulnerability scanners, pen testing, code scans, regulatory requirements), triage and prioritize the findings, and then work with Product Managers to implement changes to improve the more »
Response activities for the Firm’s environment.Enforce security policies and procedures by administering and monitoring appropriate systems, events and answering client queries.Perform threat and vulnerability management functions including vulnerability scans and/or analyze results of scans and assist with remediation as required.Collaborate with the Information Security Team … to consume feeds from a suite of security tools including AV, Advanced Malware Detection, SIEM, IDS, Vulnerability scanners, etc.Ensure MLP enterprise security products are functioning and protecting the environment as expected while providing stability and maintaining policies and procedures.Actively monitor new and emerging security and privacy related technologies, trends … broad spectrum of technologies – including operating system, cloud, Active Directory, Group Policy, DNS, Messaging.High level understanding of internetworking, data transmission and encryption protocols.Experience with vulnerability management scanning platforms.Ability to handle sensitive and/or confidential materials with appropriate discretion.Scripting and development skills (Python, Powershell, VBscript, Rest a plus more »
experience with Terraform) • Collaborate with security and engineering teams to implement DevSecOps principles and best practices. (Bonus points for experience with GCP, Kubernetes, and vulnerabilityscanning tools) • Monitor and troubleshoot IAM systems, ensuring optimal performance and security. Requirements: • 5+ years of hands-on experience in DevOps, with a more »
Information Security Architecture team in matters of technical security at company Supporting the wider Information Security team in building the Internal Control Framework (ICF), vulnerability management, and responding to technical audits. Supporting the wider Information Security team in promoting security awareness and best practice throughout the company. Liaising with … relevant rules and regulations in relation to financial crime & conduct. Technical requirements: Excellent knowledge of security technologies and domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. Working knowledge of Privileged Access Management (PAM) best practice, technologies, and procedures. Working knowledge of Microsoft more »
through developing the operational systems Maintain, support and develop their security procedures and tooling Assist and support the wider security teams including Architecture, Audits, Vulnerability Management, Project Management and 3rd parties Be available for out of hours support in case of critical issues - uncommon Skills Required: Security Technologies & Tooling … endpoint protection tools, vulnerability scanners, network security, cloud security Access Management & Authentication: IAM, PAM, PIM, SSO, MFA etc Microsoft: Active Directory, Windows Server & SQL Server Linux: Ubuntu, RedHat, Rocky Cloud: 365, Azure, AWS DevOps/DevSecOps: Infrastructure as Code - IaC Scripting: PowerShell, Python, Bash In line with the Conduct more »
the Head of Operational Resilience and you will be responsible for mapping important business services, act as the SME, conduct awareness of Operational Resilience, Vulnerabilityscanning, and other responsibilities. To be successful with your application you must in extensive working experience on the UK Ops Res Regulations and more »
security partners and working with project management teams on key projects. Supporting the wider Information Security team in building the Internal Control Framework (ICF), vulnerability management, and responding to technical audits. Supporting the wider Information Security team in promoting security awareness and best practice throughout the Group. Required skills …/experience: Excellent knowledge of security technologies and domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. Working knowledge of Privileged Access Management (PAM) best practice, technologies, and procedures. Working knowledge of Microsoft technologies such as Windows Server, Active Directory and SQL Server. more »
South East London, London, United Kingdom Hybrid / WFH Options
The Fortune Group (Recruitment) Limited
secure environment. Suitable Lead Security Engineers will work remotely or in the London office. Projects that need to be completed Security Awareness OpenSource Software scanning Automated VulnerabilityScanning Kubernetes VulnerabilityScanning Supply Chain monitoring (container images etc.) SIEM and Monitoring/Alerting service AntiVirus/ more »
You will be joining a developing team as a technical resource where you will have the opportunity to lead on projects around incident response, vulnerability management, EDR scanning and more. You will work with an already wide ranging tech stack for an exciting scaling business with major expansion … Data Protection & GDPR would be highly sought after too. In this role you will: Work on a variety of technical projects across incident response, vulnerability management, triaging and more Work with third parties and vendors to ensure full security coverage Provide support to the governance and data protection teams … Requirements: Hands on experience working in an in-house security environment Direct experience working within a variety of security tools- SIEM, EDR, Vulnerability scanners, etc Understanding and knowledge of different security frameworks- ISO27001, PCI DSS, Cyber Essentials, etc. For more information, please apply or send your CV direct to more »
through developing the operational systems Maintain, support and develop their security procedures and tooling Assist and support the wider security teams including Architecture, Audits, Vulnerability Management, Project Management and 3rd parties Be available for out of hours support in case of critical issues - uncommon Skills Required: Security Technologies & Tooling … endpoint protection tools, vulnerability scanners, network security, cloud security Access Management & Authentication: IAM, PAM, PIM, SSO, MFA etc Microsoft: Active Directory, Windows Server & SQL Server Linux: Ubuntu, RedHat, Rocky Cloud: 365, Azure, AWS DevOps/DevSecOps: Infrastructure as Code - IaC Scripting: PowerShell, Python, Bash In line with the Conduct more »