Central London, London, United Kingdom Hybrid/Remote Options
Colt Technology Services
Company description: We are seeking a dynamic and motivated Vulnerability Management Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The Vulnerability Management Lead will play a crucial role in tracking and managing the identification, assessment, and remediation of security vulnerabilities across the … organizations infrastructure and monitoring and reporting on vulnerability and other security compliance status. The role requires collaboration with various partners to ensure that vulnerability assessments and emerging threats are prioritized and advanced. Additionally, the successful candidate will work with management to continuously evolve the vulnerability management program. Job description: You will be responsible for supporting CSOC in … order to achieve the below: The development and implementation of the Colt Vulnerability Management Framework. Enhancing the scope and efficiency of current vulnerability scanning and management tools and integration between them. Design and manage the periodic penetration testing exercise. Collaborating with identified stakeholders to provide specialist guidance and support, ensuring effective vulnerability identification, prioritisation and remediation activity More ❯
as the primary point of contact, ensuring service levels are met, and coordinating incident response. * Oversee operational security including server and endpoint protection, M365 security, identity and access management, vulnerability assessments, patching, and system hardening. Required Experience: * Extensive experience in information security management, ideally within professional services environments. * Proven management capabilities, including team management and effective stakeholder engagement. * Hands More ❯
Office, Security Operation Centre or Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and in line with local regulations. The ideal candidate will be responsible for managing information security systems, ensuring compliance … implement, and maintain information security policies, procedures, and guidelines. - Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001). - SIEM & Vulnerability Management. - Monitor and respond to security incidents, conducting investigations and implementing corrective actions. - Collaborate with IT and other departments to ensure the security of network infrastructure and data. - Manage … risk assessments and vulnerability assessments to identify potential security threats. - Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies. - Provide training and guidance to staff on information security best practices. - Stay updated on the latest cybersecurity trends and technologies. **Qualifications:** - Bachelor's degree in Information Security, Computer Science, or a related field. More ❯
Security Operation Centre or Data Centre for implementing security policies, procedures, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and in line with local regulations. The ideal candidate will be responsible for managing information security systems, ensuring compliance … maintain information security policies, procedures, and guidelines. - Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., Cyber Essentials & ISO 27001). - SIEM & Vulnerability Management. - Monitor and respond to security incidents, conducting investigations and implementing corrective actions. - Collaborate with IT and other departments to ensure the security of network infrastructure and data. - Manage … risk assessments and vulnerability assessments to identify potential security threats. - Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies. - Provide training and guidance to staff on information security best practices. - Stay updated on the latest cybersecurity trends and technologies. **Qualifications:** - Bachelor's degree in Information Security, Computer Science, or a related field. More ❯
e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. Formulate HMG Information Assurance Risk Assessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST, CSF, and CSA … development of patterns and principles Working within environments utilising DevOps, DevSecOps, SRE, CI/CD, Infrastructure & Security as Code (Docker, Git, Terraform) Managing technical assessments of security related technologies, vulnerability assessments and penetration tools and techniques Enabling & informing risk-based decisions: Working with higher impact or more complex risks, advising on the impact and whether this is within risk More ❯
ethical hackers, helping test systems, applications, and networks for vulnerabilities - working alongside seasoned professionals while sharpening your offensive security skills.Expect to contribute to hands-on pen testing engagements, conduct vulnerability assessments, and support threat hunting within a well-established SOC. You'll develop your skills using industry-standard tools, investigate incidents, and provide actionable remediation advice.Role: Junior Penetration TesterLocation … London/HybridSalary: £30,000 - £50,000 (DOE)Ideally, you’ll have: 6+ months of proven penetration or security testing experience Knowledge of Metasploit, Burp Suite, and vulnerability scanning tools Experience with Windows, Linux and Mac operating systems Interest in threat hunting, incident response, and security monitoring CRT/OSCP/Cyber Scheme training or aspirations to achieve them More ❯
City, London, United Kingdom Hybrid/Remote Options
Big Red Recruitment Midlands Limited
hackers, helping test systems, applications, and networks for vulnerabilities - working alongside seasoned professionals while sharpening your offensive security skills. Expect to contribute to hands-on pen testing engagements, conduct vulnerability assessments, and support threat hunting within a well-established SOC. You'll develop your skills using industry-standard tools, investigate incidents, and provide actionable remediation advice. Role: Junior Penetration … Location: London/Hybrid Salary: £30,000 - £50,000 (DOE) Ideally, you ll have: 6+ months of proven penetration or security testing experience Knowledge of Metasploit, Burp Suite, and vulnerability scanning tools Experience with Windows, Linux and Mac operating systems Interest in threat hunting, incident response, and security monitoring CRT/OSCP/Cyber Scheme training or aspirations to More ❯