in design, management, and troubleshooting of industrial control systems Proven experience in hardening both Windows and Linux operating systems Working knowledge of a vulnerability scanning tool such as Nessus, Qualys, OpenVAS, etc Working knowledge of a source control tool such as GIT, Subversion, CVS, etc Working knowledge of cloud security in a cloud platform such as AWS, Azure, Google Cloud More ❯
Key activities in relation to Penetration Testing & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing risks, and coordinating with stakeholders for remediation. • Key activities in relation to threat monitoring and response will include monitoring networks, systems, and applications for More ❯
Key activities in relation to Penetration Testing & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing risks, and coordinating with stakeholders for remediation. • Key activities in relation to threat monitoring and response will include monitoring networks, systems, and applications for More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Logiq
EDR, anti-malware, and DLP. Monitoring & Threat Detection Operate and optimise SIEM tools (Splunk, Microsoft Sentinel) for proactive threat detection and incident response. Vulnerability Management Perform vulnerability assessments using Qualys and Tenable, driving remediation and continuous improvement. Compliance & Governance Align security controls with frameworks such as ISO 27001, NIST, CIS, and Cyber Essentials, supporting audits and certification processes. What We More ❯
Proven capability in creating and executing comprehensive threat and vulnerability management programmes, including vulnerability scanning, penetration testing, and security awareness training. Proficiency in using vulnerability scanning tools (e.g. Tenable, Qualys, Rapid7, Veracode, JFrog Xray), threat intelligence platforms, and incident response tools. Prior experience implementing automated solutions for vulnerability scanning, threat detection, and incident response, with a focus on continuous process More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
in Computer Science, Information Security, or equivalent practical experience Familiarity with frameworks such as MITRE ATT&CK, NIST, ISO 27001, Cyber Essentials+ Hands-on experience with tools like Nessus, Qualys, SIEM, EDR, DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency More ❯
for continuous security posture monitoring. Implement RBAC, MFA, and Zero Trust principles to strengthen identity and access control mechanisms. Conduct vulnerability assessments and remediation using tools like Nessus, Tenable, Qualys, and Trivy. Ensure compliance with industry frameworks and regulations (ISO 27001, NIST 800-53, PCI DSS, HIPAA, FedRAMP, CJIS). Collaborate with application and infrastructure teams to embed security best More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
significant experience in cyber security or information security roles Familiarity with frameworks such as MITRE ATT&CK, NIST, ISO 27001, Cyber Essentials+ Hands-on experience with tools like Nessus, Qualys, SIEM, EDR, DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
TXP
significant experience in cyber security or information security roles Familiarity with frameworks such as MITRE ATT&CK, NIST, ISO 27001, Cyber Essentials+ Hands-on experience with tools like Nessus, Qualys, SIEM, EDR, DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency More ❯
educate, and share information with non-technical people Contribute to the growth and mentorship of other team members Detailed knowledge in the inner workings of vulnerability scanners such as Qualys, Rapid7, Tenable, etc. Experience with identifying product and market changes and needed analysis/detection coverage changes in your existing sources History of identifying product and market changes and needed More ❯
including prioritization, investigation, and tracking remediation activities. Evaluate new tools and techniques in security testing and articulate their value and impact. Operate vulnerability and configuration scanning tools, like Tenable, Qualys, InsightVM. Perform technical and non-technical risk and vulnerability assessments of relevant technology focus areas. Defining, creating and implementing various SOPs (Standard Operating Procedures) and SOMs (Service Operating Models). More ❯
and network devices What We're Looking For? Self-driven individual with relevant vulnerability management function experience. Proven experience with products dealing with vulnerability management services which include - Rapid7, Qualys, Nessus etc. Strong understanding on Windows systems, Linux systems Strong understanding on Networking Should have completed certifications like CEH, ECSA or other equivalent security certifications Degree in Information Technology, Engineering More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
NLB Services
OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
capability. What You’ll Bring 2–5 years’ experience in ethical hacking or penetration testing. Strong understanding of OWASP, web, and infrastructure testing. Experience with Burp Suite, Nmap, Nessus, Qualys, Metasploit, Kali Linux. Familiarity with cloud security (AWS, Azure, or GCP). Confident communicator with client-facing experience. Bonus points for: Public sector testing experience. Code review skills (Python, Java More ❯
assurance Excellent communication skills with the ability to influence and engage stakeholders Confident leading governance forums and promoting a security first mindset Familiarity with tools such as ISMS Online, Qualys VMDR, and Cofense (a plus!) To apply for the Information Security Manager , please send your CV to Project People is acting as an Employment Agency in relation to this vacancy. More ❯
East Grinstead, West Sussex, South East, United Kingdom Hybrid / WFH Options
Blue Cube Security
experience in cyber security or network engineering. Strong understanding of network security principles and practices. Knowledge of leading vendor security technologies with experience in vendor products such as Fortinet, Qualys, Trend Micro, Thales or Imperva (desirable). Working knowledge of cloud providers such as Amazon Web Services. Awareness of industry standards and frameworks including NIST, and UK specific schemes such More ❯
new development efforts. Collaboration & Other Duties: Perform other duties as required. Requirements: Experience in information security or security operations, typically demonstrated over several years.Practical experience with security tools, including Qualys, SIEM platforms (such as Splunk or Sentinel), and antivirus/endpoint detection and response (AV/EDR) solutions. Familiarity with compliance frameworks, such as ISO 27001. Ability to communicate security More ❯
platforms (e.g., Microsoft Sentinel, IBM QRadar, CrowdStrike Falcon). Architect and deploy cloud security solutions across Azure and AWS environments. Manage and optimise vulnerability management tools (e.g., Tenable.SC, Rapid7, Qualys). Support the development and operation of Cyber Security Operations Centres (CSOCs) . Conduct threat modelling, risk assessments, and incident response . Implement and manage identity and access management (IAM … experience (10+ years) in Cyber Security Engineering, Architecture, or Operations . Strong background in Microsoft Security Stack (Sentinel, Defender, SOAR). Hands-on experience with CrowdStrike XDR , Tenable , Rapid7 , Qualys , and ForcePoint . Deep understanding of Cisco, Check Point, and Juniper network security. Expertise in cloud security (Azure & AWS) . Demonstrated success leading or building CSOCs or security programmes . More ❯
platforms (e.g., Microsoft Sentinel, IBM QRadar, CrowdStrike Falcon). Architect and deploy cloud security solutions across Azure and AWS environments. Manage and optimise vulnerability management tools (e.g., Tenable.SC, Rapid7, Qualys). Support the development and operation of Cyber Security Operations Centres (CSOCs) . Conduct threat modelling, risk assessments, and incident response . Implement and manage identity and access management (IAM … experience (10+ years) in Cyber Security Engineering, Architecture, or Operations . Strong background in Microsoft Security Stack (Sentinel, Defender, SOAR). Hands-on experience with CrowdStrike XDR , Tenable , Rapid7 , Qualys , and ForcePoint . Deep understanding of Cisco, Check Point, and Juniper network security. Expertise in cloud security (Azure & AWS) . Demonstrated success leading or building CSOCs or security programmes . More ❯
Job Description Microsoft Defender; Qualys; Exposure Mgt; Attack Path analysis; IT and Infrastructure experience (Windows Server and/or Red Hat Linux); development of monitoring use cases; collaboration and remediation engagement 3+ years of experience in vulnerability management or compliance monitoring Experience in design and implementation of security technologi Experience with IT controls monitoring for regulatory and compliance requirements Experience More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
or ethical hacking. Strong background in web, API, and infrastructure testing . Familiarity with cloud environments and associated security considerations. Proficient with standard tools like Burp Suite, Nmap, Nessus, Qualys, Metasploit, Kali Linux . Understanding of OWASP and modern testing methodologies. Confident communicator — able to work directly with clients. Bonus Points For: Code review capability in Python, Java, or JavaScript More ❯
large enterprises, across a diverse technology stack (IaaS/PaaS/SaaS/physical/mainframe/hybrid-cloud) and delivery lifecycles (Project/COTS applications, DevOps) Expertise with Qualys and other vulnerability and exposure management technologies Expertise in the full vulnerability management lifecycle Vendor and market analysis and engagement Ability to translate technical information into Risks, Threats, and Vulnerabilities More ❯
large enterprises, across a diverse technology stack (IaaS/PaaS/SaaS/physical/mainframe/hybrid-cloud) and delivery lifecycles (Project/COTS applications, DevOps) Expertise with Qualys and other vulnerability and exposure management technologies Expertise in the full vulnerability management lifecycle Vendor and market analysis and engagement Ability to translate technical information into Risks, Threats, and Vulnerabilities More ❯
compliance frameworks Skilled in vulnerability management, penetration testing, and supplier assurance Strong communicator with the ability to translate technical risk into business impact Experience with tools like ISMS Online, Qualys VMDR, and Cofense phishing simulation A proactive leader with sound judgement and stakeholder engagement skills This is a high-impact opportunity for someone who thrives in a collaborative, fast-paced More ❯
experience: • Experience with containerization technologies e.g., Docker, and orchestration platforms e.g., Kubernetes. • Familiarity with other cloud platforms (AWS, GCP). • Knowledge of configuration management tools e.g., Snyk, SonarQube, or Qualys • Understanding of compliance frameworks and security best practices. Rewards & Benefits TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care More ❯