to maintain secure network boundaries Support certificate and key management following encryption and PKI best practices Vulnerability, Threat, and Risk Management Automate vulnerability scanning and penetration testing using tools (Qualys, Nessus, OpenVAS) and custom scripts Coordinate third-party penetration tests and track remediation actions Conduct ongoing threat modelling, patch management, and risk assessments Perform regular configuration reviews, compliance checks, and More ❯
to maintain secure network boundaries Support certificate and key management following encryption and PKI best practices Vulnerability, Threat, and Risk Management Automate vulnerability scanning and penetration testing using tools (Qualys, Nessus, OpenVAS) and custom scripts Coordinate third-party penetration tests and track remediation actions Conduct ongoing threat modelling, patch management, and risk assessments Perform regular configuration reviews, compliance checks, and More ❯
to maintain secure network boundaries Support certificate and key management following encryption and PKI best practices Vulnerability, Threat, and Risk Management Automate vulnerability scanning and penetration testing using tools (Qualys, Nessus, OpenVAS) and custom scripts Coordinate third-party penetration tests and track remediation actions Conduct ongoing threat modelling, patch management, and risk assessments Perform regular configuration reviews, compliance checks, and More ❯
to maintain secure network boundaries Support certificate and key management following encryption and PKI best practices Vulnerability, Threat, and Risk Management Automate vulnerability scanning and penetration testing using tools (Qualys, Nessus, OpenVAS) and custom scripts Coordinate third-party penetration tests and track remediation actions Conduct ongoing threat modelling, patch management, and risk assessments Perform regular configuration reviews, compliance checks, and More ❯
to maintain secure network boundaries Support certificate and key management following encryption and PKI best practices Vulnerability, Threat, and Risk Management Automate vulnerability scanning and penetration testing using tools (Qualys, Nessus, OpenVAS) and custom scripts Coordinate third-party penetration tests and track remediation actions Conduct ongoing threat modelling, patch management, and risk assessments Perform regular configuration reviews, compliance checks, and More ❯
london (city of london), south east england, united kingdom
UIB (also known as Union Insurance Services)
to maintain secure network boundaries Support certificate and key management following encryption and PKI best practices Vulnerability, Threat, and Risk Management Automate vulnerability scanning and penetration testing using tools (Qualys, Nessus, OpenVAS) and custom scripts Coordinate third-party penetration tests and track remediation actions Conduct ongoing threat modelling, patch management, and risk assessments Perform regular configuration reviews, compliance checks, and More ❯
to maintain secure network boundaries Support certificate and key management following encryption and PKI best practices Vulnerability, Threat, and Risk Management Automate vulnerability scanning and penetration testing using tools (Qualys, Nessus, OpenVAS) and custom scripts Coordinate third-party penetration tests and track remediation actions Conduct ongoing threat modelling, patch management, and risk assessments Perform regular configuration reviews, compliance checks, and More ❯
Key activities in relation to Penetration Testing & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing risks, and coordinating with stakeholders for remediation. • Key activities in relation to threat monitoring and response will include monitoring networks, systems, and applications for More ❯
Key activities in relation to Penetration Testing & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing risks, and coordinating with stakeholders for remediation. • Key activities in relation to threat monitoring and response will include monitoring networks, systems, and applications for More ❯
Key activities in relation to Penetration Testing & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing risks, and coordinating with stakeholders for remediation. • Key activities in relation to threat monitoring and response will include monitoring networks, systems, and applications for More ❯
newport, wales, united kingdom Hybrid / WFH Options
Logiq
EDR, anti-malware, and DLP. Monitoring & Threat Detection Operate and optimise SIEM tools (Splunk, Microsoft Sentinel) for proactive threat detection and incident response. Vulnerability Management Perform vulnerability assessments using Qualys and Tenable, driving remediation and continuous improvement. Compliance & Governance Align security controls with frameworks such as ISO 27001, NIST, CIS, and Cyber Essentials, supporting audits and certification processes. What We More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Logiq
EDR, anti-malware, and DLP. Monitoring & Threat Detection Operate and optimise SIEM tools (Splunk, Microsoft Sentinel) for proactive threat detection and incident response. Vulnerability Management Perform vulnerability assessments using Qualys and Tenable, driving remediation and continuous improvement. Compliance & Governance Align security controls with frameworks such as ISO 27001, NIST, CIS, and Cyber Essentials, supporting audits and certification processes. What We More ❯
bath, south west england, united kingdom Hybrid / WFH Options
Logiq
EDR, anti-malware, and DLP. Monitoring & Threat Detection Operate and optimise SIEM tools (Splunk, Microsoft Sentinel) for proactive threat detection and incident response. Vulnerability Management Perform vulnerability assessments using Qualys and Tenable, driving remediation and continuous improvement. Compliance & Governance Align security controls with frameworks such as ISO 27001, NIST, CIS, and Cyber Essentials, supporting audits and certification processes. What We More ❯
bradley stoke, south west england, united kingdom Hybrid / WFH Options
Logiq
EDR, anti-malware, and DLP. Monitoring & Threat Detection Operate and optimise SIEM tools (Splunk, Microsoft Sentinel) for proactive threat detection and incident response. Vulnerability Management Perform vulnerability assessments using Qualys and Tenable, driving remediation and continuous improvement. Compliance & Governance Align security controls with frameworks such as ISO 27001, NIST, CIS, and Cyber Essentials, supporting audits and certification processes. What We More ❯
Proven capability in creating and executing comprehensive threat and vulnerability management programmes, including vulnerability scanning, penetration testing, and security awareness training. Proficiency in using vulnerability scanning tools (e.g. Tenable, Qualys, Rapid7, Veracode, JFrog Xray), threat intelligence platforms, and incident response tools. Prior experience implementing automated solutions for vulnerability scanning, threat detection, and incident response, with a focus on continuous process More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
in Computer Science, Information Security, or equivalent practical experience Familiarity with frameworks such as MITRE ATT&CK, NIST, ISO 27001, Cyber Essentials+ Hands-on experience with tools like Nessus, Qualys, SIEM, EDR, DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency More ❯
in Computer Science, Information Security, or equivalent practical experience Familiarity with frameworks such as MITRE ATT&CK, NIST, ISO 27001, Cyber Essentials+ Hands-on experience with tools like Nessus, Qualys, SIEM, EDR, DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
significant experience in cyber security or information security roles Familiarity with frameworks such as MITRE ATT&CK, NIST, ISO 27001, Cyber Essentials+ Hands-on experience with tools like Nessus, Qualys, SIEM, EDR, DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
TXP
significant experience in cyber security or information security roles Familiarity with frameworks such as MITRE ATT&CK, NIST, ISO 27001, Cyber Essentials+ Hands-on experience with tools like Nessus, Qualys, SIEM, EDR, DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency More ❯
Proven capability in creating and executing comprehensive threat and vulnerability management programmes, including vulnerability scanning, penetration testing, and security awareness training. Proficiency in using vulnerability scanning tools (e.g. Tenable, Qualys, Rapid7, Veracode, JFrog Xray), threat intelligence platforms, and incident response tools. Prior experience implementing automated solutions for vulnerability scanning, threat detection, and incident response, with a focus on continuous process … both technical and non-technical stakeholders, including executive leadership. Education/Qualifications/Technical Competencies Essential Recognised cybersecurity certification: CISSP and/or CISM Strong knowledge of: Ivanti LANDesk, Qualys, Splunk Windows Server/Desktop, RHEL/OEL Linux PowerShell and Python scripting Proven experience leading strategic security initiatives and process automation in large-scale environments Desirable Additional certifications: CCSP More ❯
and network devices What We're Looking For? Self-driven individual with relevant vulnerability management function experience. Proven experience with products dealing with vulnerability management services which include - Rapid7, Qualys, Nessus etc. Strong understanding on Windows systems, Linux systems Strong understanding on Networking Should have completed certifications like CEH, ECSA or other equivalent security certifications Degree in Information Technology, Engineering More ❯
Coventry, Warwickshire, United Kingdom Hybrid / WFH Options
NLB Services
OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
NLB Services
OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
leicester, midlands, united kingdom Hybrid / WFH Options
NLB Services
OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
binley, midlands, united kingdom Hybrid / WFH Options
NLB Services
OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯