Portsmouth, England, United Kingdom Hybrid/Remote Options
ProCheckUp (PCU)
security consultancy. Role Description This is a full-time, on-site role based in Portsmouth and potential work-from home for a Cyber Security Consultant. The consultant will conduct vulnerability assessments, application security reviews, and network security analyses. Responsibilities include evaluating risks, providing actionable security recommendations, and assisting clients with compliance to established standards like ISO 27001 and PCI … of Application Security, with the ability to identify vulnerabilities in web and mobile applications Skills in Network Security, including securing and evaluating infrastructure and cloud environments Expertise in performing Vulnerability Assessments and delivering actionable insights Background in Information Security, with experience in regulatory compliance (e.g., PCI DSS, ISO 27001) Strong analytical skills and the ability to effectively communicate complex … knowledge and experience of penetration testing, preferably supported by industry leading qualifications. In addition they will have: SPECIALITIES • Web Application Security (Implementation, detection, mitigation and education) • Penetration Testing and VulnerabilityAssessment (Network, SCADA and Web Application) • Mobile phone/Application Penetration Testing (Android/iPhone/iPad) • Computer and Network Forensics (including e-Discovery) • Delivery of Enterprise Wide More ❯
/or assist in the investigation, containment, eradication, and recovery phases of cybersecurity incidents, with a specific focus on those impacting our clients’ CPS, IoMT, xIoT systems and devices. Vulnerability Management: Perform regular vulnerability evaluations and assessments on CPS, IoMT and xIoT systems and devices. Prioritize and track remediation and mitigation efforts based on risk to safe operation … Proven experience in a cybersecurity analytics role or cybersecurity operations, a strong understanding of the healthcare environment and medical devices and systems would be advantageous. Proven experience in cybersecurity vulnerability and threat management, including cyber-risk assessments, pen-tests and audits. Familiarity with SOAR technologies, platforms, and 3rd party security tools, such as SIEMs & TMPs, NAC & Firewall solutions, NIDS …/NIPS platforms, VulnerabilityAssessment Tools, Patch Management Solutions, and endpoint protection solutions. Familiarity with xIoT/CPS/Clinical systems and platforms, such as SCADA, R-TAP, ICS/IACS, DCS, HIS/HIMS, PACS, HER, LIS, and similar systems. Familiarity with embedded operating systems and firmware, such as Embedded Windows (e.g. Windows CE), Linux (*NIX), RTOS More ❯
cyber security strategies and roadmaps Technical proficiency in a wide range of cyber risk management services, including cyber threat, risk and control assessments, secure software development practices, penetration testing, vulnerability assessments, among others Sound knowledge of applicable laws, compliance regulations, and industry standards as it relates to privacy, security, and compliance Sound knowledge of applicable frameworks, including MITRE ATT More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid/Remote Options
Experian Ltd
are in Dublin, Ireland. Learn more at experianplc.com. Internal Grade E Job Description As a Cyber Defence Analyst, you will join the Cyber Fusion Center, performing in-depth analysis, assessment, and response to security threats by following documented policies to meet Service Level Goals. The team provides global 24x7 security operations and monitoring for cybersecurity events affecting Experian. You … departments, responsible for receiving and prioritizing cybersecurity alerts, including being the dedicated contact for potential security incidents reported by users (e.g., Experian employees). Depending on the results of assessment, this team is then responsible for investigating, containing, eradicating, and recovering from events falling in its scope or escalating higher-risk events to dedicated incident response and management teams … security tools including Defender for Cloud, GuardDuty, CloudTrail, or CloudWatch. System administration on Unix, Linux, or Windows Network forensics, logging, and event management Defensive network infrastructure (operations or engineering) Vulnerabilityassessment and penetration testing concepts Malware analysis concepts, techniques, and reverse engineering In-depth knowledge of network and host security technologies and products (such as firewalls, network IDS More ❯
Central London, London, United Kingdom Hybrid/Remote Options
Colt Technology Services
Company description: We are seeking a dynamic and motivated Vulnerability Management Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The Vulnerability Management Lead will play a crucial role in tracking and managing the identification, assessment, and remediation of security vulnerabilities across the … organizations infrastructure and monitoring and reporting on vulnerability and other security compliance status. The role requires collaboration with various partners to ensure that vulnerability assessments and emerging threats are prioritized and advanced. Additionally, the successful candidate will work with management to continuously evolve the vulnerability management program. Job description: You will be responsible for supporting CSOC in … order to achieve the below: The development and implementation of the Colt Vulnerability Management Framework. Enhancing the scope and efficiency of current vulnerability scanning and management tools and integration between them. Design and manage the periodic penetration testing exercise. Collaborating with identified stakeholders to provide specialist guidance and support, ensuring effective vulnerability identification, prioritisation and remediation activity More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerabilityassessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerabilityassessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerabilityassessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerabilityassessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerabilityassessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerabilityassessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerabilityassessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerabilityassessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerabilityassessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
solutions and will be responsible for leading and executing the security efforts for secure system products. Activities will consist of security subsystem specifications, security subsystem architecture, interface descriptions, RMF assessment and authorization, and vulnerability assessments. This is an onsite position at Raytheon in Marlborough, MA. What You Will Do Lead a team of System Security Engineers (SSE) to … architecture artifacts, plans, and policies Project management experience, preferably using an Agile framework Hands on experience configuring and implementing cybersecurity tools Knowledge of information security toolsets including anti-virus, VulnerabilityAssessment, HIDS/NIDS, host-based or endpoint security solutions, Multi Factor Authentication (MFA), and Security Incident and Event Management (SIEM) and centralized auditing tools Knowledge of Host … Based Security System (HBSS)/Endpoint Security Services (ESS), Assured Compliance Assessment Solution (ACAS)/Tenable Security Center, and Security Content Automation Protocol (SCAP) Experience with IT and/or network and system security administration, including operating system security configuration and account management best practices for UNIX, MS Windows, Red Hat Enterprise Linux, and CISCO systems Understanding of Systems More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Altitude-Recruitment Limited
assessments for new features and system changes Evaluate and recommend security technologies and tools Operational (40%) Manage security environments across Azure and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerabilityassessment and penetration testing programs Maintain identity and access management controls Compliance & Assurance (30%) Maintain ISO27001 certification More ❯
assessments for new features and system changes Evaluate and recommend security technologies and tools Operational (40%) Manage security environments across Azure and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerabilityassessment and penetration testing programs Maintain identity and access management controls Compliance & Assurance (30%) Maintain ISO27001 certification More ❯
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. Responsibilities: Thoroughly evaluate proposed and current solutions to ensure compliance with established standards for secure system design. This includes meeting requirements outlines … in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. Essential Criteria: Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat …/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityassessment and a penetration test in the context of assessment scope, objectives, and deliverables. Working knowledge of information security frameworks such as ISO27001, NIST, and CIS. If this sounds like a good opportunity More ❯
standards. Responsibilities: • Security Implementation: Design, implement, and manage security solutions for Kubernetes (OpenShift) and DoD cloud environments, including firewalls, intrusion detection/prevention systems, endpoint protection, and encryption mechanisms. • VulnerabilityAssessment: Conduct regular security assessments to identify vulnerabilities and weaknesses in systems, networks, and applications. • Incident Response: Develop and implement incident response plans for Kubernetes (OpenShift) and DoD … in Risk Management Framework (RMF), Joint SAP Implementation Guide, or ICD 503 processes. • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, Engineering, or a related field • Familiarity with vulnerability scanning tools, STIG compliance, Security Content Automation Protocol (SCAP), and security event information management (SIEM). • Knowledge in Infrastructure-as-Code and scripting technologies such as Ansible, Terraform, PowerShell More ❯
investigating, and managing cyber and data handling incidents within KPMG’s Global Information Security Services (ISS) function. ISS delivers and oversees critical cybersecurity capabilities—including Security Monitoring & Response (SMR), VulnerabilityAssessment & Secure Development (VASD), and Cyber Threat Intelligence (CTI)—across Global, Global Functions, and the broader KPMG network of member firms. This position offers an exciting opportunity to More ❯
reach but a deep local presence, Colt is big enough to deliver and small enough to care. Why we need this role? We are seeking a dynamic and motivated Vulnerability Management Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The Vulnerability Management Lead … will play a crucial role in tracking and managing the identification, assessment, and remediation of security vulnerabilities across the organization’s infrastructure and monitoring and reporting on vulnerability and other security compliance status. The role requires collaboration with various partners to ensure that vulnerability assessments and emerging threats are prioritized and advanced. Additionally, the successful candidate will … work with management to continuously evolve the vulnerability management program. What you will do: You will be responsible for supporting CSOC in order to achieve the below: The development and implementation of the Colt Vulnerability Management Framework. Enhancing the scope and efficiency of current vulnerability scanning and management tools and integration between them. Design and manage the More ❯
Houston, Texas, United States Hybrid/Remote Options
K.L. McKinney
incidents within our organization's IT infrastructure. The ideal candidate will have expertise in threat detection, vulnerability assessments, and security compliance to enhance our cybersecurity posture. Key Responsibilities: Threat Monitoring & Incident Response -Continuously monitor security logs, SIEM alerts, and network traffic for threats. -Analyze security events and escalate incidents based on severity and impact. -Investigate potential breaches, malware infections … and unauthorized access attempts. -Assist in incident response, containment, and remediation activities. Vulnerability Management & Risk Assessment -Conduct vulnerability scans, risk assessments, and penetration tests. -Work with IT teams to remediate security gaps and harden systems. -Research emerging threats and attack techniques to proactively improve defenses. Security Policies & Compliance -Ensure compliance with industry standards (ISO 27001, NIST, GDPR More ❯
internal business process area project teams. May be required tosupport Critical Infrastructure Protection (CIP) readiness and compliance activities. Generate regular risk management reports using various security technologies. Perform internal vulnerability assessments and ensure remediation of vulnerabilitiesfor business process area infrastructure and web applications. May be requested toperform internal penetration testing. Support incident response activities. Assiston RFP specifications, participate in More ❯
alerts, logs, and network traffic for suspicious activity. Conduct forensic investigations, malware analysis, and incident remediation. Work with SOC teams to develop and improve security monitoring and response strategies. Vulnerability Management & Risk Assessment Perform penetration testing, vulnerability assessments, and security audits. Identify and remediate security misconfigurations, weaknesses, and risks. Ensure security policies align with industry standards (ISO … NIST, GDPR, SOC 2, etc.). Security Automation & DevSecOps Integrate security controls into CI/CD pipelines and cloud environments. Automate security monitoring, log analysis, and vulnerability scanning. Develop scripts and tools for incident response and threat mitigation. Compliance & Security Awareness Ensure adherence to regulatory and compliance frameworks applicable to the organization. Provide security guidance and training for IT More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid/Remote Options
Leidos Innovations UK Limited
respond to Cyber Security Incidents Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others. Run VulnerabilityAssessment tools to measure compliance with security updates and security patches. Member of a Team who are responsible for making multiple daily CSOC checks to detect and respond … XDR and Microsoft Defender variants, and Elastic Security, or displays aptitude to learn how to work with a SIEM. Experience and knowledge of SIEM tools, Cyber Security Incident Response, Vulnerability Management and Cyber Threat Intelligence. Experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at it. More ❯