Altrincham, Cheshire, North West, United Kingdom Hybrid / WFH Options
Cyber Security Specialists
accredited Cyber Essentials Certification Body who provide a range of Security consultancy and Managed security services.Examples include Cyber Security, Cloud Security & Data Privacy Consultancy, VulnerabilityScanning, Cloud Security Assessments & Penetration Testing services. We are growing and looking to recruit a Cyber Security Consultant with experience of supporting clients more »
ideal candidate will have hands-on experience with security tools such as Trend Anti-virus, Cloudflare, Email filtering, Microsoft 365 security, and Nessus Tenable scanning solutions. As part of our clients Cloud first strategy, you must have a strong working knowledge of Amazon Web Services (AWS) and be proficient … IT Security Engineer: Manage and administer day-to-day security tools, including Trend Anti-virus, Forescout, Email filtering, Microsoft 365 security, and Nessus Tenable scanning solutions. Maintain a strong working knowledge of AWS services and manage security aspects related to AWS, such as Active Directory, Entra, etc. Align company … access policies with the Zero Trust networking model, using SASE technologies like Cloudflare. Regularly review vulnerabilityscanning tool outputs and oversee the remediation process with multiple teams. Ensure compliance with our clients security policies, including ISO27001 requirements and customer-specific security requirements. Collaborate with cross-functional teams to more »
identifying vulnerabilities, enhancing security measures, and ensuring the safety of our clients’ digital environments. Your responsibilities will span a wide range of tasks, from vulnerabilityscanning to technical content creation. Responsibilities: Vulnerability Detection and Automation: Collaborate with our security team to scan customer systems for critical vulnerabilities. … Develop new vulnerability checks using tools like Nuclei. Curate crowd-sourced checks for inclusion in our Intruder platform. Automate penetration testing processes to scale across multiple clients simultaneously. Rapid Response and Custom Scanning: Conduct custom scans on customer targets to identify emerging critical weaknesses. Provide rapid response solutions … Occasionally participate in industry events and conferences. Qualifications and Experience: Industry Experience: Minimum of 2 years in offensive security roles. Proven track record in vulnerability assessment and penetration testing. Educational Background: Technical academic background in software engineering or cyber security. Certifications (One or More): OSCP OSWE OSEP CRT CCT more »
security technologies, such as firewalls, intrusion detection/prevention systems, SIEM, antivirus, and data loss prevention. Experience with security assessment tools and techniques, including vulnerabilityscanning and penetration testing. Proven experience as an IT Security Engineer with exposure to OT security - Claroty For more details, please reach out more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
team engagements to tune and validate detection tooling. Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetration testing, and vulnerability scanning. Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams. Manage the delivery of daily more »
management, application security & cloud security and associated compliance frameworks such as SOX, PCI-DSS etc. Previous use of security technologies (firewalls, WAFs, DLP, cryptography, vulnerabilityscanning, identity and access management, etc). The ability to carry out threat modelling, vulnerability assessment, control effectiveness review and risk assessment more »
ISO 27001, 27002, as well as regulations such as the Data Protection Act and GDPR Proficiency in Microsoft O365 Security solutions, networking, security operations, vulnerability management, and security auditing Solid grasp of security testing principles, including hands-on experience with vulnerabilityscanning, risk identification, resolution, and reporting more »
About this Role Role Title: Threat & Vulnerability Lead Location: UK- London La Fosse Associates are working with a global Insurance business who are looking to add a Threat & Vulnerability Lead to their strong internal security function. You will report directly into the BISO and be a senior individual … within their existing team. You will be joining the UK entity of their Security team to lead on vulnerabilityscanning and threat intelligence reporting. They are a large organisation with a huge amount of vulnerabilities and need somebody who understands how to approach on this scale. You will … in the business to ensure security is prioritised Work on and lead penetration tests across the global estate Requirements: Hands on experience working with vulnerability management technology- preferably Qualys Direct experience working within a regulated in-house security team Understanding and knowledge of different security frameworks- MITRE ATT&CK more »
WA1, Higher Walton, Warrington, Cheshire, United Kingdom
PAM Group Ltd
technical IT projects ·Experience with O365/M365 Administration including Intune/Endpoint Manager, PowerShell, Power Apps. Experienced with security controls such as SIEM, VulnerabilityScanning, Server and Client Security, SASE solutions and CloudFront/AWS WAF Good working knowledge of PowerShell and Automation tools Good knowledge of more »
including Hyper-V and VMWare. Practical experience in Storage Solutions, Backup and Replication Services (DFS, VEEAM, ASR). Experienced with security controls including SIEM, VulnerabilityScanning, Server and Client Security, ZScaler and Microsoft Defender for Cloud. Demonstrable experience of similar position/role or working within established architecture more »
cyber security architecture. - Deliver subject matter expertise to key stakeholders to drive the implementation of security controls to meet the target architecture. - Accountable for vulnerabilityscanning, including the prioritisation of unpatched vulnerabilities and reporting against agreed KPIs and KRIs. - Support the annual penetration testing schedule by arranging penetration … improvement work to automate and improve critical cyber security processes such as monitoring, patching, and hardening. - Develop and maintain process documentation for security architecture, vulnerability management, cyber incident response, and playbooks. - Provide security representation across multiple geographies, business units and teams to achieve objectives, including engagement with the Information more »
Officer & wider compliance team to promote good security practices amongst stakeholders. The successful candidate will cover the full information security spectrum, from questionnaires to vulnerability management & everything in between. Main duties include: Be approachable and provide subject matter expert knowledge to colleagues, increasing their awareness of good security practices … within the group to ensure all accreditation requirements are fulfilled and any remediations are tracked through to completion Day-to-day management of the vulnerability management programme Review applications, suppliers, and proposed features from a security perspective What We Are Looking For The Information Security Officer will be an … high performing organisation. Ideally you will be/have: Experience in an Information Security role or similar Knowledge of information security good practice and vulnerability management programmes Demonstrable experience in an information security and privacy management environment, identifying risks and proposing viable solutions Broad understanding of security policies and more »
Greater London, England, United Kingdom Hybrid / WFH Options
Oliver Bernard
Great experience with PCI DSS. Good SIEM knowledge (Splunk is ideal) Great understanding of logs and log events across Linux, Windows, AWS, AV and Vulnerabilityscanning etc Good experience of Security Operations (SOC) Ideally a solid infrastructure understanding - Linux, networking, DevOps TCP/IP, Cloud etc Information Security more »
five case model would be a plus and certifications such as: CCP, CISMP, CISSP, Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master's degree or alternatively STEM degree are needed with an ability to more »
individual will be the key enabler between security, product, and engineering teams. You will need to understand security requirements from a variety of outputs (vulnerability scanners, pen testing, code scans, regulatory requirements), triage and prioritize the findings, and then work with Product Managers to implement changes to improve the more »
and maintain security measures across the Network infrastructure Reviewing network configurations and device hardening Ensuring compliance with industry best practice Development and maintenance of vulnerability management programs (Pen-testing, risk assessment, remediation planning) Designing and implementing network segmentation strategies to enhance network security and isolate sensitive data Conducting and … organising security assessments including vulnerabilityscanning and penetration testing Providing expert guidance on security related alerts and incidents Key Experience: experience in network security engineering (Cisco & Fortinet experience desired) with access control, VLANS and network segmentation techniques with pen-testing frameworks, security assessments and scanning tools to more »
Greater London, England, United Kingdom Hybrid / WFH Options
Premier Group Recruitment
management (LAN/WAN/Wi-Fi/Mobile) Solid understanding of IT security practices (email security, anti-virus/endpoint protection, patch management, vulnerabilityscanning, network security, MFA, SSO, DLP, etc.) Commitment to data security and privacy (GDPR, UK Data Protection Act, and Cyber Essentials Plus) Excellent more »
desktops, physical and virtual servers Network services, firewall, switches, wireless and network access control Network storage and backup Cloud services System and network analysis, vulnerabilityscanning, health monitoring and logging services. To act as higher-tier support to our team of IT Technicians, however excellent customer service skills more »
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Hays
and implement risk treatment plans. - Support Project Manager and Cyber Risk Consultant in delivery of project activities. - Scope, Arrange and Support penetration testing and vulnerability testing. - Support development of Supply Chain Security Policy and Processes. SKILLS - Extensive security risk management knowledge. - Experience with SIEM Monitoring, AV, DDoS Protection, vulnerabilityscanning and EDR. - Knowledge of authentication and authorisation techniques, network sniffing and working with remote access technologies. - Familiarity with NIST Cybersecurity Framework, CIS Critical Security controls, and ISO27001. What you need to do now If you're interested in this role, click 'apply now' to forward an up more »
Employment Type: Contract, Work From Home
Rate: £500.0 - £550.0 per day + £500-£550 Per Day Inside IR35
and implement risk treatment plans. - Support Project Manager and Cyber Risk Consultant in delivery of project activities. - Scope, Arrange and Support penetration testing and vulnerability testing. - Support development of Supply Chain Security Policy and Processes. SKILLS - Extensive security risk management knowledge. - Experience with SIEM Monitoring, AV, DDoS Protection, vulnerabilityscanning and EDR. - Knowledge of authentication and authorisation techniques, network sniffing and working with remote access technologies. - Familiarity with NIST Cybersecurity Framework, CIS Critical Security controls, and ISO27001. What you need to do now If you're interested in this role, click 'apply now' to forward an up more »
Employment Type: Contract
Rate: £500 - £550/day £500-£550 Per Day Inside IR35
and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerabilityscanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with … other experts in cybersecurity risk assessment, automated information sharing, threat analysis, vulnerability management, and network defense to enable holistic, integrated views of security threats to an organization, the Department, or the nation's security posture Applying knowledge of computer-controlled systems that monitor and impact industrial processes across physical more »
and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerabilityscanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with … other experts in cybersecurity risk assessment, automated information sharing, threat analysis, vulnerability management, and network defense to enable holistic, integrated views of security threats to an organization, the Department, or the nation's security posture Applying knowledge of computer-controlled systems that monitor and impact industrial processes across physical more »
and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerabilityscanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with … other experts in cybersecurity risk assessment, automated information sharing, threat analysis, vulnerability management, and network defense to enable holistic, integrated views of security threats to an organization, the Department, or the nation's security posture Applying knowledge of computer-controlled systems that monitor and impact industrial processes across physical more »
and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerabilityscanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with … other experts in cybersecurity risk assessment, automated information sharing, threat analysis, vulnerability management, and network defense to enable holistic, integrated views of security threats to an organization, the Department, or the nation's security posture Applying knowledge of computer-controlled systems that monitor and impact industrial processes across physical more »