Required: Tenable Nessus Engineers IR35 Status: Inside Duration: 12 month initial contract Location: 1-2 days onsite in either Central London or Knutsford Role 1 As an experienced VulnerabilityAssessment Engineer responsible for maintaining the VulnerabilityAssessment toolsets and products. Primary Responsibilities The ability to review requirements, undertake product design followed by Implementation/deployment/… support of VulnerabilityAssessment tools suite (e.g Tenable, Rapid7, Qualys etc) and peripherals with Engineering. Maintains local and network credentials and provisions access to vulnerability scanning systems. Responsible for integration of Vulnerabilityassessment tooling with other security and IT systems management tools (i.e. Splunk, ServiceNow) Responsible for developing and maintaining standard processes and operating procedures … creating technical architecture diagrams and system build documentation. Responsible for operating the scanning tools and maintaining coverage along with supporting the vulnerability management and remediation teams in understating how to remediate vulnerabilities (i.e. laptops, VMs, wireless devices) Works with vulnerability management team to build asset repositories and asset scan policies Work closely with customer delivery managers to prioritize More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Hays
About the role As a Senior Vulnerability Manager, you will be responsible for working with all stakeholders within group security and throughout the business for developing and enforcing the strategy and vision for end-to-end vulnerability management. You will be accountable for vulnerabilityassessment, vulnerability hunting and research and risk management. Tell me more … any questions you may have about the role, between 8:30am-5:00pm Monday to Friday. Shifts: Monday – Friday (37.5 hours per week) The must haves: 5 years+ of vulnerability management experience 7 years + of cyber security experience Understanding of cloud technologies and CI/CD pipeline Experience in working in a large or federated enterprises in the More ❯
About the role As a Senior Vulnerability Manager, you will be responsible for working with all stakeholders within group security and throughout the business for developing and enforcing the strategy and vision for end-to-end vulnerability management. You will be accountable for vulnerabilityassessment, vulnerability hunting and research and risk management. Tell me more … any questions you may have about the role, between 8:30am-5:00pm Monday to Friday. Shifts: Monday – Friday (37.5 hours per week) The must haves: 5 years+ of vulnerability management experience 7 years + of cyber security experience Understanding of cloud technologies and CI/CD pipeline Experience in working in a large or federated enterprises in the More ❯
london, south east england, united kingdom Hybrid / WFH Options
Hays
About the role As a Senior Vulnerability Manager, you will be responsible for working with all stakeholders within group security and throughout the business for developing and enforcing the strategy and vision for end-to-end vulnerability management. You will be accountable for vulnerabilityassessment, vulnerability hunting and research and risk management. Tell me more … any questions you may have about the role, between 8:30am-5:00pm Monday to Friday. Shifts: Monday – Friday (37.5 hours per week) The must haves: 5 years+ of vulnerability management experience 7 years + of cyber security experience Understanding of cloud technologies and CI/CD pipeline Experience in working in a large or federated enterprises in the More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Hays
About the role As a Senior Vulnerability Manager, you will be responsible for working with all stakeholders within group security and throughout the business for developing and enforcing the strategy and vision for end-to-end vulnerability management. You will be accountable for vulnerabilityassessment, vulnerability hunting and research and risk management. Tell me more … any questions you may have about the role, between 8:30am-5:00pm Monday to Friday. Shifts: Monday – Friday (37.5 hours per week) The must haves: 5 years+ of vulnerability management experience 7 years + of cyber security experience Understanding of cloud technologies and CI/CD pipeline Experience in working in a large or federated enterprises in the More ❯
is for you. What you will do: Develop and implement proactive security strategies, policies, and procedures to protect our systems, networks, and data assets. Lead regular security assessments, including vulnerability scans and penetration tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents … the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerabilityassessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong … capability in risk assessment, vulnerability management, and data informed decision-making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in scripting and programming (i.e. More ❯
effectively across teams. What you'll do: Develop and implement proactive security strategies, policies, and procedures to protect our systems, networks, and data assets. Lead regular security assessments, including vulnerability scans and penetration tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents … the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerabilityassessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong … capability in risk assessment, vulnerability management, and data informed decision -making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in scripting and programming (i.e. More ❯
logging, cloud infrastructure security and policy-as-code.What You'll Do: Assess Acadian's cloud IAAS environments for Indicators of Misconfiguration (IOMs) utilizing AWS built-in and third-party assessment tools. Utilizing tools like AWS Config, Security Hub, Inspector, Guardduty, and Crowdstrike Falcon, assess monitor and prioritize remediation of Cloud security vulnerabilities. Develop and maintain tools to detect and … desired. Additional certifications such as CCNA/CCNP, AWS Security etc. desired. 10+ years of IT experience, ideally with some project management. Familiarity with AWS, infrastructure-as-code, firewalls, vulnerabilityassessment tools, DLP, TCP/IP, web content filtering, VPN, endpoint protection, password management/Vaults, log management and correlation, and device/application hardening. Understanding of API More ❯
systems meet security standards. Collaborate with finance and audit teams to support secure data flows and reporting. Cybersecurity operations Maintain endpoint protection, SIEM, firewalls, and intrusion detection systems. Conduct vulnerability assessments, patch management, and threat mitigation. Support incident response, forensic investigations, and security audits. Enforce identity and access management (IAM) policies and multi-factor authentication. Desktop and systems support More ❯
optimize native cloud security tools such as GCP Security Command Center, Cloud IAM, VPC Service Controls, Azure Security Center, Microsoft Defender for Cloud, and Azure Active Directory. Lead regular vulnerability assessments, security audits, and penetration testing activities across the cloud infrastructure and hosted applications. Monitor cloud platforms for security threats, suspicious activity, misconfigurations , and vulnerabilities using automated tools and More ❯
The Role: The Vulnerability Management Analyst is a global role within ION's central services division and will support the Group Security strategy and operational excellence through the identification, mitigation and remediation of information security vulnerabilities, misconfigurations and risks to the business. This role reports to the Vulnerability Management Manager who reports to the Global Head of IT … Security. As a member of the ION Security team, you will build and lead a team of Security professionals specialising in Vulnerability Management along with managing the partners and technology vendor deliverables and of course building and owning the strategy to deliver a world class Vulnerability Management program. The candidate must understand their role in the broader vulnerability … of varying technical ability. The role would suit a technically strong candidate with an extensive cybersecurity background, at least 5+ years working in a security role, with focus on Vulnerability Management. Responsibilities: This role may require work-out of hours in support of 24x7 globally coordinated operation The primary responsibilities of this role are to: Personnel Management Align deliverables More ❯
Security, preferably in a senior or advanced analyst role. Proven experience in managing and auditing Information Security Management Systems (ISMS) aligned with ISO 27001 standards. Strong skills in risk assessment, vulnerability identification, and development of practical security solutions for complex IT environments. Experience with penetration testing and vulnerability assessments; certifications such as CEH (Certified Ethical Hacker) are More ❯
Strong experience in building secure web and mobile apps Experience with Security architecture, Application Security assessments, penetration testing, vulnerabilityassessment, Secure SDLC, and Static code reviews Certified Secure Software Lifecycle Professional (CSSLP) (desirable) Responsibilities: - Design, develop, and implement security frameworks and solutions to safeguard company's assets and infrastructure. - Conduct regular security audits and risk assessments to identify More ❯
building, maturing, and operationalizing a configuration baselines program spanning physical and virtual systems, serverless workloads, container security, and other platforms. This engineer will assist in minimizing attack surfaces through vulnerability management, managing a baselines program, cloud configuration assessments, incorporating threat intelligence, and building policies, standards, and processes. The ideal candidate is passionate about cybersecurity, curious, and willing to challenge … for evolving attack surfaces. Excellent communication skills for diverse audiences. Effective in global team collaboration. Mentorship abilities for junior team members. TECHNICAL QUALIFICATIONS Experience with CIS Controls and risk assessment programs. Knowledge of cyber-attack types like DDoS, SQLi, XSS. Hands-on with vulnerabilityassessment tools and frameworks (CVE, CVSS, EPSS). Experience assessing and communicating security More ❯
player who wants to be part of a truly team driven environment. As a First Responder, you must display excellent outside-the-box thinking and communication skills. DESIRABLE EXPERIENCE. VulnerabilityAssessment experience. Knowledge of Penetration testing tools and techniques. Network and firewall alert management. Active Directory and group policy management experience. Experience in deploying, managing, and supporting of More ❯
Croydon, London, United Kingdom Hybrid / WFH Options
Gold Group Limited
following : In-depth knowledge of cybersecurity frameworks, tools, and technologies Strong understanding of networking protocols, cloud security, and secure software development principles Experience with incident response, risk management, and vulnerabilityassessment Familiarity with regulatory compliance and standards (e.g. GDPR, ISO 27001) Experience in an organisation running or being part of an ISO27001 adoption project Incident management & change Management More ❯
up on security vulnerabilities in IT systems. Help maintain an accurate IT asset inventory across various security platforms such as CMDB, AV, and SIEM. Participate in regular security reviews, vulnerability assessments, and ensure compliance with established security standards. Monitor user access and permissions, identifying and reporting potential unauthorized access. Implement and maintain Active Directory and File Share security controls More ❯
consistency across environments. • Collaborate with cross-functional teams to understand application requirements and translate them into network solutions. • Ensure network security by implementing industry-best practices and conducting regular vulnerability assessments. • Troubleshoot and resolve network-related issues in a timely and efficient manner. • Stay abreast of the latest networking technologies and trends and recommend upgrades and improvements to keep More ❯
at all levels Security Posture Management: Develop and maintain a comprehensive security posture management program to proactively identify and address vulnerabilities. Continuously assess the organization's security posture through vulnerability assessments, penetration testing, and threat modelling. Collaborate with cross-functional teams to implement security best practices and ensure compliance with industry standards and regulations. Cyber Exposure Risk Management: Identify … identify areas for improvement. What You'll Bring: Experience: A depth of experience in cybersecurity, with at least 3 years in a leadership or management role. Proven experience in vulnerability management, threat modelling, and incident response. Strong understanding of security frameworks, compliance standards, and best practices. Education:Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related … field. Advanced degrees or certifications (e.g., CISSP, CISM, CEH) are highly desirable. Technical Skills: Proficiency in security tools and technologies, such as SIEM, vulnerability scanners, and endpoint protection platforms. Knowledge of cloud security, network security, and secure software development practices. Familiarity with scripting and automation tools to streamline security processes. Working with data centres and native cloud environments AWS More ❯
Life on the team Computacenter is growing our penetration testing capability and we are looking for an experienced penetration tester to support the delivery of vulnerabilityassessment and penetration testing services to Computacenter and our customers delivered services. As a highly skilled and motivated Penetration Tester, you will join our dynamic Cybersecurity team. In this role, you will … Conduct comprehensive penetration tests: Execute internal and external network penetration tests, web application penetration tests, mobile application penetration tests, API penetration tests, cloud security assessments, and social engineering simulations. Vulnerability identification and analysis: Research, identify, and exploit security vulnerabilities in a variety of systems and applications. Red/Purple/Blue Teaming: participate in exercises with the goal of More ❯
Business Unit: Cyber Security Life on the team Computacenter is growing our penetration testing capability and we are looking for an experienced penetration tester to support the delivery of vulnerabilityassessment and penetration testing services to Computacenter and our customers delivered services. As a highly skilled and motivated Penetration Tester, you will join our dynamic Cybersecurity team. In … Conduct comprehensive penetration tests : Execute internal and external network penetration tests, web application penetration tests, mobile application penetration tests, API penetration tests, cloud security assessments, and social engineering simulations. Vulnerability identification and analysis : Research, identify, and exploit security vulnerabilities in a variety of systems and applications. Red/Purple/Blue Teaming: participate in exercises with the goal of More ❯
testing for embedded systems, IoT devices while ensuring compliance with industry regulations Work alongside client R&D teams to lead on secure code reviews, threat modeling, security risk assessments, vulnerability assessments and validation and verification of controls Monitor emerging cybersecurity threats in the IoT and medical device landscape and write though leadership to showcase PA's point of view More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harrison Holgate
Administer and support Microsoft platforms and enterprise tools. Troubleshoot Windows operating systems and Microsoft applications. Support cloud-based solutions, including SaaS applications and integration technologies. Assist with cybersecurity controls, vulnerability assessments, compliance auditing, and security operations. Provide clear, non-technical explanations of IT concepts to colleagues across the business. Key Requirements 5+ years' IT experience in financial services (insurance More ❯
availability of Marex's critical systems Contributing to the organisation's security standards and procedures Assessing and approving requests Assisting ISO and/or lead security projects such as vulnerability scanning, DLP and/or privileged access monitoring Participating in 3rd party monitoring activities; Advising IT and business on security matters Building connectors to various 3rd party products and … services Maintenance and development of the in-house security framework Supporting vulnerabilityassessment scans and collaborating with other teams on remediation approach Collaborating with technology teams for incident handling, patching disciplines, and system hardening frameworks Collaborating with the Information Technology team on deployment, operation, and continual improvements of security solutions Collaborating with software developers to secure proprietary applications More ❯
Croydon, London, United Kingdom Hybrid / WFH Options
Gold Group
following : * In-depth knowledge of cybersecurity frameworks, tools, and technologies * Strong understanding of networking protocols, cloud security, and secure software development principles * Experience with incident response, risk management, and vulnerabilityassessment * Familiarity with regulatory compliance and standards (e.g. GDPR, ISO 27001) * Experience in an organisation running or being part of an ISO27001 adoption project * Incident management & change Management More ❯