cyber security architecture. - Deliver subject matter expertise to key stakeholders to drive the implementation of security controls to meet the target architecture. - Accountable for vulnerabilityscanning, including the prioritisation of unpatched vulnerabilities and reporting against agreed KPIs and KRIs. - Support the annual penetration testing schedule by arranging penetration … improvement work to automate and improve critical cyber security processes such as monitoring, patching, and hardening. - Develop and maintain process documentation for security architecture, vulnerability management, cyber incident response, and playbooks. - Provide security representation across multiple geographies, business units and teams to achieve objectives, including engagement with the Information more »
ISO 27001, 27002, as well as regulations such as the Data Protection Act and GDPR Proficiency in Microsoft O365 Security solutions, networking, security operations, vulnerability management, and security auditing Solid grasp of security testing principles, including hands-on experience with vulnerabilityscanning, risk identification, resolution, and reporting more »
About this Role Role Title: Threat & Vulnerability Lead Location: UK- London La Fosse Associates are working with a global Insurance business who are looking to add a Threat & Vulnerability Lead to their strong internal security function. You will report directly into the BISO and be a senior individual … within their existing team. You will be joining the UK entity of their Security team to lead on vulnerabilityscanning and threat intelligence reporting. They are a large organisation with a huge amount of vulnerabilities and need somebody who understands how to approach on this scale. You will … in the business to ensure security is prioritised Work on and lead penetration tests across the global estate Requirements: Hands on experience working with vulnerability management technology- preferably Qualys Direct experience working within a regulated in-house security team Understanding and knowledge of different security frameworks- MITRE ATT&CK more »
Leeds, Horsforth, West Yorkshire, United Kingdom Hybrid / WFH Options
Headway Recruitment
Microsoft O365 environment and security solutions, threat intelligence analysis, Security Incident Response processes, disaster recovery, and business continuity principles. Familiarity with security testing principles, vulnerabilityscanning, risk identification, resolution, and reporting. Experience in formal document creation, such as reports or procedures. Key Responsibilities include but not limited to more »
including Hyper-V and VMWare. Practical experience in Storage Solutions, Backup and Replication Services (DFS, VEEAM, ASR). Experienced with security controls including SIEM, VulnerabilityScanning, Server and Client Security, ZScaler and Microsoft Defender for Cloud. Demonstrable experience of similar position/role or working within established architecture more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
team engagements to tune and validate detection tooling. Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetration testing, and vulnerability scanning. Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams. Manage the delivery of daily more »
individual will be the key enabler between security, product, and engineering teams. You will need to understand security requirements from a variety of outputs (vulnerability scanners, pen testing, code scans, regulatory requirements), triage and prioritize the findings, and then work with Product Managers to implement changes to improve the more »
Officer & wider compliance team to promote good security practices amongst stakeholders. The successful candidate will cover the full information security spectrum, from questionnaires to vulnerability management & everything in between. Main duties include: Be approachable and provide subject matter expert knowledge to colleagues, increasing their awareness of good security practices … within the group to ensure all accreditation requirements are fulfilled and any remediations are tracked through to completion Day-to-day management of the vulnerability management programme Review applications, suppliers, and proposed features from a security perspective What We Are Looking For The Information Security Officer will be an … high performing organisation. Ideally you will be/have: Experience in an Information Security role or similar Knowledge of information security good practice and vulnerability management programmes Demonstrable experience in an information security and privacy management environment, identifying risks and proposing viable solutions Broad understanding of security policies and more »
Greater London, England, United Kingdom Hybrid / WFH Options
Oliver Bernard
Great experience with PCI DSS. Good SIEM knowledge (Splunk is ideal) Great understanding of logs and log events across Linux, Windows, AWS, AV and Vulnerabilityscanning etc Good experience of Security Operations (SOC) Ideally a solid infrastructure understanding - Linux, networking, DevOps TCP/IP, Cloud etc Information Security more »
WA1, Higher Walton, Warrington, Cheshire, United Kingdom
PAM Group Ltd
technical IT projects ·Experience with O365/M365 Administration including Intune/Endpoint Manager, PowerShell, Power Apps. Experienced with security controls such as SIEM, VulnerabilityScanning, Server and Client Security, SASE solutions and CloudFront/AWS WAF Good working knowledge of PowerShell and Automation tools Good knowledge of more »
Xpertise are working with a client in the Insurance industry who are searching for a talented Threat and Vulnerability Lead to join their team. Job Title: Threat and Vulnerability Lead Salary: £75,000 - £90,000 Location: 3 days a week in Central London office About the role: You … Security teams to assess the vulnerabilities and reduce the Cyber related risks. My client is looking for people with the following skillset: - Familiarity with vulnerabilityscanning and detection technologies. - Familiarity with MITRE ATT&CK framework - Excellent ability to present information and results to the business - Pen testing experience … Key responsibilities in this role will include: - This role will involve working closely with the Enterprise Security team - Great understanding of Threat and vulnerability management practises - Working closely with, and reporting into the BISO If keen please apply more »
and maintain security measures across the Network infrastructure Reviewing network configurations and device hardening Ensuring compliance with industry best practice Development and maintenance of vulnerability management programs (Pen-testing, risk assessment, remediation planning) Designing and implementing network segmentation strategies to enhance network security and isolate sensitive data Conducting and … organising security assessments including vulnerabilityscanning and penetration testing Providing expert guidance on security related alerts and incidents Key Experience: experience in network security engineering (Cisco & Fortinet experience desired) with access control, VLANS and network segmentation techniques with pen-testing frameworks, security assessments and scanning tools to more »
Greater London, England, United Kingdom Hybrid / WFH Options
Premier Group Recruitment
management (LAN/WAN/Wi-Fi/Mobile) Solid understanding of IT security practices (email security, anti-virus/endpoint protection, patch management, vulnerabilityscanning, network security, MFA, SSO, DLP, etc.) Commitment to data security and privacy (GDPR, UK Data Protection Act, and Cyber Essentials Plus) Excellent more »
desktops, physical and virtual servers Network services, firewall, switches, wireless and network access control Network storage and backup Cloud services System and network analysis, vulnerabilityscanning, health monitoring and logging services. To act as higher-tier support to our team of IT Technicians, however excellent customer service skills more »
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Hays
and implement risk treatment plans. - Support Project Manager and Cyber Risk Consultant in delivery of project activities. - Scope, Arrange and Support penetration testing and vulnerability testing. - Support development of Supply Chain Security Policy and Processes. SKILLS - Extensive security risk management knowledge. - Experience with SIEM Monitoring, AV, DDoS Protection, vulnerabilityscanning and EDR. - Knowledge of authentication and authorisation techniques, network sniffing and working with remote access technologies. - Familiarity with NIST Cybersecurity Framework, CIS Critical Security controls, and ISO27001. What you need to do now If you're interested in this role, click 'apply now' to forward an up more »
Employment Type: Contract, Work From Home
Rate: £500.0 - £550.0 per day + £500-£550 Per Day Inside IR35
and implement risk treatment plans. - Support Project Manager and Cyber Risk Consultant in delivery of project activities. - Scope, Arrange and Support penetration testing and vulnerability testing. - Support development of Supply Chain Security Policy and Processes. SKILLS - Extensive security risk management knowledge. - Experience with SIEM Monitoring, AV, DDoS Protection, vulnerabilityscanning and EDR. - Knowledge of authentication and authorisation techniques, network sniffing and working with remote access technologies. - Familiarity with NIST Cybersecurity Framework, CIS Critical Security controls, and ISO27001. What you need to do now If you're interested in this role, click 'apply now' to forward an up more »
Employment Type: Contract
Rate: £500 - £550/day £500-£550 Per Day Inside IR35
desktops, physical and virtual Servers Network services, Firewall, Switches, wireless and network access control. Network storage and backup. Cloud services System and network analysis, vulnerabilityscanning, health monitoring and logging services. To act as higher-tier support to the team of IT Technicians, however excellent customer service skills more »
Stone, Staffordshire, West Midlands, United Kingdom
Spain
Various (integrated control system) COTS products. SIEM solutions. Configuration of Windows and COTS products to meet user requirements and customer/industry standards. Perform vulnerabilityscanning and address any resultant issues. Troubleshoot installation/configuration issues. Internal/customer testing and resolution of any resultant issues. On site more »
varied role, which includes things like: • Build, deployment and maintenance of new and existing environments • Designing and maintaining highly available architectures • Security (patch management, vulnerabilityscanning & monitoring) • Uptime - design and maintain the systems and networking for uptime, resilience, architecting for failure. • Evaluation of new, cutting-edge technologies to more »
and methodologies in the tech industry What is Cyber Security Threat Modelling throughout the SDLC Vulnerabilities - social, hardware, software, networking, including the related technology Vulnerabilityscanning of operating systems, applications, and networks. Web Application Security Pen Testing Approaches and Techniques, including Red vs Blue team activities. Monitoring, Detection more »
and methodologies in the tech industry What is Cyber Security Threat Modelling throughout the SDLC Vulnerabilities - social, hardware, software, networking, including the related technology Vulnerabilityscanning of operating systems, applications, and networks. Web Application Security Pen Testing Approaches and Techniques, including Red vs Blue team activities. Monitoring, Detection more »
Grafana and New Relic Understanding of industry authentication and authorization patterns. A keen eye for security and experience building secure systems, including secrets management, vulnerabilityscanning and identity and access management (IAM). Our focus is to ensure we're inclusive every day, building an organisation that reflects more »
Greater London, England, United Kingdom Hybrid / WFH Options
Internet Matters
Maintain digital and web operations security through proactive management, encompassing measures such as secure credential storage and maintenance, timely application of security patches, code vulnerabilityscanning, and personal information safeguarding. Communication and Stakeholder Management: Effectively communicate with internal stakeholders to understand requirements and priorities and allocate tasks to more »
practices especially with implementation in GCP In-depth understanding of GCP services, security controls, and best practices. Proficiency in using GCP-specific security tools, vulnerability scanners, and penetration testing tools. Strong experience with infrastructure-as-code (IaC) using Terraform for GCP resource provisioning and management. Familiarity with CI/ more »