Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid/Remote Options
Experian Ltd
are in Dublin, Ireland. Learn more at experianplc.com. Internal Grade E Job Description As a Cyber Defence Analyst, you will join the Cyber Fusion Center, performing in-depth analysis, assessment, and response to security threats by following documented policies to meet Service Level Goals. The team provides global 24x7 security operations and monitoring for cybersecurity events affecting Experian. You … departments, responsible for receiving and prioritizing cybersecurity alerts, including being the dedicated contact for potential security incidents reported by users (e.g., Experian employees). Depending on the results of assessment, this team is then responsible for investigating, containing, eradicating, and recovering from events falling in its scope or escalating higher-risk events to dedicated incident response and management teams … security tools including Defender for Cloud, GuardDuty, CloudTrail, or CloudWatch. System administration on Unix, Linux, or Windows Network forensics, logging, and event management Defensive network infrastructure (operations or engineering) Vulnerabilityassessment and penetration testing concepts Malware analysis concepts, techniques, and reverse engineering In-depth knowledge of network and host security technologies and products (such as firewalls, network IDS More ❯
Central London, London, United Kingdom Hybrid/Remote Options
Colt Technology Services
Company description: We are seeking a dynamic and motivated Vulnerability Management Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The Vulnerability Management Lead will play a crucial role in tracking and managing the identification, assessment, and remediation of security vulnerabilities across the … organizations infrastructure and monitoring and reporting on vulnerability and other security compliance status. The role requires collaboration with various partners to ensure that vulnerability assessments and emerging threats are prioritized and advanced. Additionally, the successful candidate will work with management to continuously evolve the vulnerability management program. Job description: You will be responsible for supporting CSOC in … order to achieve the below: The development and implementation of the Colt Vulnerability Management Framework. Enhancing the scope and efficiency of current vulnerability scanning and management tools and integration between them. Design and manage the periodic penetration testing exercise. Collaborating with identified stakeholders to provide specialist guidance and support, ensuring effective vulnerability identification, prioritisation and remediation activity More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Altitude-Recruitment Limited
assessments for new features and system changes Evaluate and recommend security technologies and tools Operational (40%) Manage security environments across Azure and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerabilityassessment and penetration testing programs Maintain identity and access management controls Compliance & Assurance (30%) Maintain ISO27001 certification More ❯
assessments for new features and system changes Evaluate and recommend security technologies and tools Operational (40%) Manage security environments across Azure and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerabilityassessment and penetration testing programs Maintain identity and access management controls Compliance & Assurance (30%) Maintain ISO27001 certification More ❯
policies, standards, and procedures to ensure compliance with regulatory requirements. Collaborate with clients to understand their security needs and provide tailored solutions. Lead security assurance activities, including risk assessments, vulnerability assessments, penetration testing, and threat modelling techniques such as MITRE ATT&CK, STRIDE, DREAD, and PASTA. Provide expert guidance on security controls and measures to protect cloud infrastructure and More ❯
Houston, Texas, United States Hybrid/Remote Options
K.L. McKinney
incidents within our organization's IT infrastructure. The ideal candidate will have expertise in threat detection, vulnerability assessments, and security compliance to enhance our cybersecurity posture. Key Responsibilities: Threat Monitoring & Incident Response -Continuously monitor security logs, SIEM alerts, and network traffic for threats. -Analyze security events and escalate incidents based on severity and impact. -Investigate potential breaches, malware infections … and unauthorized access attempts. -Assist in incident response, containment, and remediation activities. Vulnerability Management & Risk Assessment -Conduct vulnerability scans, risk assessments, and penetration tests. -Work with IT teams to remediate security gaps and harden systems. -Research emerging threats and attack techniques to proactively improve defenses. Security Policies & Compliance -Ensure compliance with industry standards (ISO 27001, NIST, GDPR More ❯
Test, evaluate, and implement appropriate security solutions based on need. Support policy development, compliance enforcement, and security training. Define security requirements and deploy protective controls. Manage penetration testing and vulnerability assessments. Automate security processes and optimise protective measures. Manage security-related tickets and user communications. Assist with internal and external security audits to ensure compliance. Provide technical security guidance More ❯
3 THE CLOCKTOWER, MANOR LANE, HOLMES CHAPEL, CHESHIRE, England
UK IT NETWORKS LTD
wider IT and security teams. Role Assist in monitoring and maintaining the organisation’s information security systems and networks. Help identify, investigate, and respond to potential security incidents. Support vulnerability assessments, penetration testing, and system audits. Learn to implement and maintain firewalls, antivirus software, and other security tools. Assist in maintaining and updating security policies, procedures, and documentation. Help More ❯
and internal project managers. Responsible for delivering CE, CE+ audits, remediations and certification Lead and support the implementation of security controls, monitoring, and incident response processes. Conduct/facilitate vulnerability assessments, penetration testing, and risk analysis to identify and remediate threats. Maintain and improve security documentation, including policies, procedures, and incident reports. Be part of a team that manages More ❯
re Looking For: Technically minded security engineer. Experience with SentinelONE. Experience working with a third party to a managed SOC provision. Proficiency with Mimecast, antivirus, MS Sentinel. Experience with vulnerabilityassessment tools such as Tenable or Qualys. Excellent analytical skills for identifying and addressing security threats. Driver's License with consistent access to a vehicle. What's in More ❯
behaviour or policy violations - Investigate and manage security incidents, carrying out root cause analysis and reporting - Deploy, configure, and maintain key security platforms used by the analyst team - Conduct vulnerability assessments and coordinate remediation activities - Support patch management and compliance reporting - Perform regular reviews and health checks on security controls - Create and enhance measures to demonstrate the effectiveness of More ❯
behaviour or policy violations- Investigate and manage security incidents, carrying out root cause analysis and reporting- Deploy, configure, and maintain key security platforms used by the analyst team- Conduct vulnerability assessments and coordinate remediation activities- Support patch management and compliance reporting- Perform regular reviews and health checks on security controls- Create and enhance measures to demonstrate the effectiveness of More ❯
trends, and propose optimizations to improve efficiency Security and Compliance: Implement security best practices and industry standards for our infrastructure and applications. Collaborate with the security team to conduct vulnerability assessments, penetration testing, and remediation activities. Ensure compliance with relevant regulations and standards Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. Advanced degree preferred More ❯
in-depth technical analysis, documentation, and triage of security events and alerts Support threat hunting activities using cyber threat intelligence inputs Investigate security events by leveraging threat intelligence and vulnerability assessments Identify and respond to security-relevant anomalies, IOCs and TTPs Challenge existing detection rules and implement improvements Create and update security use cases and operational playbooks Report security More ❯
for monitoring system performance, troubleshooting issues, and implementing proactive measures to optimize infrastructure performance. Collaborate with security teams to implement and maintain IT security best practices, including patch management, vulnerability assessments, and access controls. Participate in infrastructure design and capacity planning to support business growth and technology advancements. Provide technical support and guidance to end-users and other IT More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
of security incidents from detection to resolution. Ensure compliance with SLAs and escalation protocols. Maintain and enhance incident response plans and procedures. Direct threat intelligence collection and analysis. Manage vulnerability assessments and coordinate remediation. Monitor and analyse security events across multiple platforms. Identify, assess, and escalate threats and vulnerabilities. Maintain and evolve SOC operational documentation and processes. Deliver training More ❯
Role They’re looking for an experienced Penetration Tester to join their expert team in Bristol. You’ll be responsible for conducting advanced penetration tests, red team exercises, and vulnerability assessments, helping clients strengthen their defences and reduce risk. What You’ll Do Perform penetration testing across networks, systems, and applications Lead vulnerability assessments and red teaming activities … Create detailed reports and communicate findings clearly to clients Contribute to internal research and tool development What You’ll Bring 2+ years’ experience in penetration testing or vulnerabilityassessment CHECK, CREST, or equivalent certification Strong technical understanding of networks, OS, and security tools (Metasploit, Burp Suite, Nmap, etc.) Excellent communication and problem-solving skills Nice to Have Coding More ❯
West Fargo, North Dakota, United States Hybrid/Remote Options
Midland Garage Door
ensure the best network solutions are in place. Implement and enforce network security policies and procedures. Ensure compliance with industry standards and regulatory requirements. Conduct regular security audits and vulnerability assessments. Maintain detailed documentation of network configurations, changes, and incidents. Generate reports on network performance, security incidents, and compliance status. Work closely with other teams to support overall IT More ❯
Office, Security Operation Centre or Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and in line with local regulations.The ideal candidate will be responsible for managing information security systems, ensuring compliance with … implement, and maintain information security policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001).- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage … risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information Security, Computer Science, or a related field. More ❯
Office, Security Operation Centre or Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and in line with local regulations. The ideal candidate will be responsible for managing information security systems, ensuring compliance … implement, and maintain information security policies, procedures, and guidelines. - Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001). - SIEM & Vulnerability Management. - Monitor and respond to security incidents, conducting investigations and implementing corrective actions. - Collaborate with IT and other departments to ensure the security of network infrastructure and data. - Manage … risk assessments and vulnerability assessments to identify potential security threats. - Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies. - Provide training and guidance to staff on information security best practices. - Stay updated on the latest cybersecurity trends and technologies. **Qualifications:** - Bachelor's degree in Information Security, Computer Science, or a related field. More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
ll help shape and implement cybersecurity standards across a complex, high-growth business operating in over 80 countries. Key focus areas: Implementing and monitoring governance, compliance & security controls Managing vulnerability assessments, risk remediation, and incident response Aligning with ISO 27001, NIST etc Driving security awareness and best practice across global teams What You’ll Bring Strong background in cybersecurity More ❯
Detroit, Michigan, United States Hybrid/Remote Options
Airspace Link
with development teams to improve software quality and reliability Disaster Recovery: Create disaster recovery plans to mitigate systems failures Security and Compliance: Implement security controls and conduct audits and vulnerability assessments. Ensure systems adhere to industry standards and regulations and conduct compliance audits and assessments Position Type: Full-Time, 40 hours per week Status: Exempt Location: Hybrid Requirements B.S. More ❯
WINDSOR HOUSE, GADBROOK BUSINESS CENTRE, RUDHEATH, NORTHWICH, England
A.S.M TECHNOLOGIES LTD
across various systems, managing access controls and permissions with a focus on 'least privilege' Assist in the routine maintenance and monitoring of network, server, and cloud infrastructure Conduct regular vulnerability assessments and system patching to ensure all devices and software are secure and up to date Actively support the Incident Response process by investigating security alerts and applying essential More ❯