of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security … in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & VulnerabilityAssessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including … date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerability management program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work with stakeholders to develop mitigation strategies. Conduct regular security More ❯
understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: Vulnerability Analyst Location: London - We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular … IT and OT). Co-ordinate with various digital teams across NH to ensure all vulnerabilities are addressed in a timely manner. Continually improve vulnerability tooling and process while supporting the improvement of the security capability of National Highways through dashboard monitoring and retrospective assessments. Plan, execute and manage … vulnerabilityassessment and scanning activities across the National Highway's networks, systems, and applications. Ensure vulnerability scans and assessments are run periodically in line with policies and standards across the IT, OT, and cloud infrastructure. Prioritise vulnerabilities based on their severity, exploitability, and potential business impact to More ❯
will do: Design and implement robust, forward-thinking security strategies, policies, and procedures to safeguard our systems, networks, and data. Lead regular security assessments, vulnerability scans, and penetration tests to identify risks and deploy effective remediation measures. Monitor systems, networks, and logs for any signs of security incidents or … preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems, SIEM, antivirus, encryption, and vulnerabilityassessment tools. You own relevant certifications (Security+, IAT II/III level or similar). You excel in risk assessments, vulnerability management More ❯
Security Engineer II, Vulnerability Management and Remediation Operations Job ID: Amazon Support Services Pty Ltd Embark on a Mission to Fortify Amazon's Defenses as a Security Engineer with the Vulnerability Management & Remediation Operations team! Amazon Security is seeking an experienced and innovative Security Engineer to join our … Vulnerability Management and Remediation Operations (VMRO) team in Sydney, Australia. The VMRO team is responsible for discovering, assessing, triaging, detecting, and driving the remediation of vulnerabilities across the Amazon ecosystem. Key job responsibilities Analyse public and private vulnerability disclosures and exploit code. Deeply understand and assess the technical … Amazon. Support response and remediation efforts, assisting builder teams to fix their security issues in a timely manner. Engineer high quality, scalable, and accurate vulnerability detection mechanisms. Design and implement automation, tools and workflows to enhance our operations capabilities. Be part of a global team and participate in periodic More ❯
Create and update security event investigation notes, report on open cases, and maintain case data in the Incident Response Management platform. Monitor threat and vulnerability news services for any relevant information that may impact installed infrastructure. Analyse reports to understand threat campaign(s) techniques, lateral movements and extract indicators … Security, Forensics, or Computer Science; related experience and/or training in the field of IT security monitoring and analysis, cyber threat analysis, and vulnerability analysis. A Global Information Assurance Certification (GIAC) Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst (GCIA), or equivalent certification would be advantageous. Intermediate knowledge … VM platforms. Understanding or proven experience of using Security Information and Event Management (SIEM) platforms for analysing network and security incidents. Experience in using VulnerabilityAssessment (VA) platforms to identify network and platform risks and mis-configurations. Experience in Security Assessment tools/frameworks. Knowledge of network More ❯
Lead Vulnerability Manager/Cyber Threats Hybrid: 3 days York or Staines office £60k-£65k Our client are looking for a Lead Vulnerability Manager to join their growing successful business. Responsibilities You will be responsible for overseeing end-to-end vulnerability management programme, across multiple client environments. … Requires strong expertise in vulnerabilityassessment · Prioritisation · Remediation strategies · Ensure the security of their clients is robust Who are you? · You will have experience of vulnerability management, cyber security or in a related field · Tools with a strong experience level include MS Defender, Tenable, Qualys, Rapid7 · SIEM More ❯
Lead Vulnerability Manager/Cyber Threats Hybrid: 3 days York or Staines office £60k-£65k Our client are looking for a Lead Vulnerability Manager to join their growing successful business. Responsibilities You will be responsible for overseeing end-to-end vulnerability management programme, across multiple client environments. … Requires strong expertise in vulnerabilityassessment · Prioritisation · Remediation strategies · Ensure the security of their clients is robust Who are you? · You will have experience of vulnerability management, cyber security or in a related field · Tools with a strong experience level include MS Defender, Tenable, Qualys, Rapid7 · SIEM More ❯
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
required, as well as overseeing and maintaining an outsourced SOC team and additional cyber security partners. Additionally, facilitating and overseeing audits, penetration tests and vulnerability assessments and driving remedial actions and improvements will form a large part of the role. Other accountabilities will include: Review, recommend and or update More ❯
ensure secure access and enforce the principle of least privilege. Implement AWS security services (WAF, Shield, GuardDuty, Inspector) to safeguard cloud resources. Perform regular vulnerability assessments and implement proactive measures to mitigate security risks. Lead security incident response, conduct root cause analysis, and deploy corrective actions. Automate security tasks More ❯
teams to establish and enforce network access policies, ensuring that only authorized individuals and devices have the correct access privileges. Proactive Security Testing and Vulnerability Management Conduct vulnerability assessments and penetration testing to identify and address security weaknesses in mobile network architectures. Develop and enforce security policies and … together with system administrators and application owners to resolve discovered vulnerabilities by applying necessary patches or making configuration adjustments. Create and sustain a thorough vulnerability management program that includes tracking vulnerabilities, assessing risks, and planning remediation strategies. Engage in network security incident response efforts by providing technical expertise and … Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR, HIPAA, ISO 27001). In-depth understanding of routers, switches, firewalls, and switching/routing More ❯
stack. What Excites You Develop world-class security practices and controls within a high-growth financial technology business shaping the future of payments. Conduct vulnerability assessments, penetration testing, and risk analysis to identify and mitigate security weaknesses. Embed security by design and threat modelling principles into product development. Lead More ❯
manager on standards and policy changes Qualifications Experience or deep knowledge of key activities within software security group such Threat Modeling/Application Risk Assessment, Vulnerability Assessments, Governance and Metrics, Training, etc. Pre-requisites for this position are a Bachelor's Degree with 4 - 6 years' experience in … infrastructure vulnerabilities is required Experience in source code management,build and deployment technologies such as RLM, Ueploy, Jenkins, Artifactory, Maven, GitHub, etc Experience conducting vulnerability assessments and articulating security issues to technical and non-technical audience. Understanding of Snyk, Checkmarx, CDXGen, Dependency Track, Fortify, GitHub Adcance Security, Sonatype or More ❯
technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerabilityassessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and More ❯
technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerabilityassessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and More ❯
for secure coding, threat modeling, and testing of connected devices, ensuring industry standards are met Lead efforts to review and improve security measures, including vulnerability assessments and risk evaluations Stay informed on emerging threats in the IoT and medical device sectors and contribute to thought leadership on security challenges More ❯
for secure coding, threat modeling, and testing of connected devices, ensuring industry standards are met Lead efforts to review and improve security measures, including vulnerability assessments and risk evaluations Stay informed on emerging threats in the IoT and medical device sectors and contribute to thought leadership on security challenges More ❯
Requirements: Experience securing cloud environments (AWS preferred). Prior role as a Cyber Security Officer or similar in a large organization. Strong knowledge of vulnerability assessments, networking, and OS hardening. Awareness of cyber threats and security best practices. Preferred Qualifications: Security certifications (CompTIA Security+, CISSP, AWS/Cloud certs More ❯
london, south east england, united kingdom Hybrid / WFH Options
Gazelle Global
Requirements: Experience securing cloud environments (AWS preferred). Prior role as a Cyber Security Officer or similar in a large organization. Strong knowledge of vulnerability assessments, networking, and OS hardening. Awareness of cyber threats and security best practices. Preferred Qualifications: Security certifications (CompTIA Security+, CISSP, AWS/Cloud certs More ❯
Albany Beck are seeking a Vulnerability Analyst with a strong background in Security Operations to join our growing consultancy team and work on a critical programme of work for a leading global investment bank. This role is pivotal in ensuring the security and resilience of the bank’s systems … by identifying, assessing, and mitigating vulnerabilities across a complex and dynamic IT landscape. As a Vulnerability Analyst, you’ll be responsible for proactively analysing security threats and system vulnerabilities across the bank’s infrastructure. You’ll work alongside security engineers, architects, and SOC teams to ensure threats are swiftly … identified and effectively mitigated. This role demands a keen analytical mindset, excellent communication skills, and deep knowledge of vulnerability scanning tools and remediation workflows in large-scale financial institutions. Key Responsibilities: Conduct regular vulnerability assessments and penetration tests across applications, infrastructure, and cloud environments. Analyse security threats and More ❯
Albany Beck are seeking a Vulnerability Analyst with a strong background in Security Operations to join our growing consultancy team and work on a critical programme of work for a leading global investment bank. This role is pivotal in ensuring the security and resilience of the bank’s systems … by identifying, assessing, and mitigating vulnerabilities across a complex and dynamic IT landscape. As a Vulnerability Analyst, you’ll be responsible for proactively analysing security threats and system vulnerabilities across the bank’s infrastructure. You’ll work alongside security engineers, architects, and SOC teams to ensure threats are swiftly … identified and effectively mitigated. This role demands a keen analytical mindset, excellent communication skills, and deep knowledge of vulnerability scanning tools and remediation workflows in large-scale financial institutions. Key Responsibilities: Conduct regular vulnerability assessments and penetration tests across applications, infrastructure, and cloud environments. Analyse security threats and More ❯
Incident Response: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. Vulnerability Management Tools: Conduct regular vulnerability assessments, prioritize and remediate issues, and stay updated on emerging threats. Policy & Compliance Support: Help develop and enforce More ❯
through monitoring activities. Coordinate with Infrastructure, Support, and Security teams to implement technical controls and ensure security considerations are integrated into IT projects. Perform vulnerability assessments and recommend remedial actions. Qualifications and Experience Minimum of 4 years' experience in IT and security roles, with broad exposure to systems analysis More ❯
Lambda, RDS). Proven experience in designing secure, scalable cloud architectures with a focus on security at every layer. Experience in conducting threat modeling, vulnerability assessments, and developing risk mitigation strategies. In-depth knowledge of AWS security best practices for IAM, encryption, and data protection. Familiarity with cloud security More ❯
infrastructures across Python, C++, and Kotlin/Java environments, ensuring robust protection that supports high-speed, data-driven operations. You will conduct threat modelling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle and provide mentorship, guidance and More ❯