cyber security strategies and roadmaps Technical proficiency in a wide range of cyber risk management services, including cyber threat, risk and control assessments, secure software development practices, penetration testing, vulnerability assessments, among others Sound knowledge of applicable laws, compliance regulations, and industry standards as it relates to privacy, security, and compliance Sound knowledge of applicable frameworks, including MITRE ATT More ❯
cyber security strategies and roadmaps Technical proficiency in a wide range of cyber risk management services, including cyber threat, risk and control assessments, secure software development practices, penetration testing, vulnerability assessments, among others Sound knowledge of applicable laws, compliance regulations, and industry standards as it relates to privacy, security, and compliance Sound knowledge of applicable frameworks, including MITRE ATT More ❯
cyber security strategies and roadmaps Technical proficiency in a wide range of cyber risk management services, including cyber threat, risk and control assessments, secure software development practices, penetration testing, vulnerability assessments, among others Sound knowledge of applicable laws, compliance regulations, and industry standards as it relates to privacy, security, and compliance Sound knowledge of applicable frameworks, including MITRE ATT More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
london (city of london), south east england, united kingdom
Tosca
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Location: Belfast Workplace: Hybrid The opportunity: The Security Vulnerability and Penetration Testing Engineer will oversee and serve as a technical resource for all assessment activities related to the security posture of existing and proposed firm systems, platforms, and processes to protect and continually improve the confidentiality, integrity, and availability of information systems per the firm's business objectives … systems, platforms, and applications Serve as a Subject Matter Expert (SME) for the VAPT function Serve as the system owner for common VAPT toolsets, platforms, and processes Provide technical assessment reports that are easily understandable by the target audience and include practical and reasonable recommendations based upon sound risk management principles Skills and experience: A Computer Science bachelor's … preferred Offensive Security OSCP is required Commanding knowledge of VAPT concepts and best practices, including the requirements for WhiteHat/ethical hacking Expert understanding of the difference between a vulnerabilityassessment and a penetration test in the context of assessment scope, objectives, and deliverables Extensive experience with common automated VAPT tools such as Nessus, Appscan, Burp Suite More ❯
Crowdstrike. Experience working with a third party to a managed SOC provision. Proficiency with security tools such as SIEM, PAM, web filtering, Mimecast, antivirus, MS Sentinel. Strong proficiency of vulnerabilityassessment tools such as Tenable. Excellent analytical skills for identifying and addressing security threats. Ability to remain calm and effective under pressure, with strong problem-solving capabilities. Driver More ❯
to security incidents, including malware, phishing, and unauthorized access attempts. Document incidents and produce reports for internal stakeholders and governance teams. Threat Prevention & Risk Management Arrange/conduct regular vulnerability assessments and penetration testing. Implement and manage security tools such as firewalls, antivirus, and endpoint detection systems. Collaborate with third-party providers to maintain and enhance cyber resilience capabilities. More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
respond to Cyber Security Incidents Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others. Run VulnerabilityAssessment tools to measure compliance with security updates and security patches. Member of a Team who are responsible for making multiple daily CSOC checks to detect and respond … XDR and Microsoft Defender variants, and Elastic Security, or displays aptitude to learn how to work with a SIEM. Experience and knowledge of SIEM tools, Cyber Security Incident Response, Vulnerability Management and Cyber Threat Intelligence. Experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at it. More ❯
to take their first step into a fast-growing field. Key Responsibilities: Monitor and analyse security alerts to identify potential threats. Assist in investigating and resolving security incidents. Support vulnerability assessments and penetration testing activities. Help implement security policies, procedures, and compliance standards. Learn and apply industry best practices, tools, and frameworks (e.g., ISO 27001, NIST, CIS). Requirements More ❯
AWS, Azure, GCP) and common security patterns for cloud-native applications. Familiarity with security principles for on-premise network, application security and cloud environments. Understanding of threat modelling and vulnerabilityassessment processes. Awareness of common security standards and frameworks (PCI-DSS, NIST, ISO 27001). Preferred Qualifications: Exposure to security controls in GenAI platforms (e.g., LLMs, AI/… ML pipelines). Exposure to container technologies (Docker, Kubernetes) and associated security tools. Familiarity with DevOps practices and security automation. Experience with vulnerability management solutions. Awareness of regulatory and compliance requirements relevant to the payments industry (e.g., PCI, GDPR). Visa is an EEO Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex More ❯
Hatfield, Hertfordshire, England, United Kingdom Hybrid / WFH Options
Michael Page Technology
Ensure security controls are in-place based on ISO27001 and NIST As the regional security representative in the global Security/Technology project Lead/execute phishing campaign Conduct vulnerability assessments and implement measures to mitigate potential risks. Involve in global security operations process, analysis and escalate security alerts/tickets from global SOC team Maintain and update security More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
knowledge of cybersecurity who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and More ❯
the organization's network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetration testing and vulnerability assessments to identify and remediate potential security risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and More ❯
the organization's network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetration testing and vulnerability assessments to identify and remediate potential security risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and More ❯
the organization's network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetration testing and vulnerability assessments to identify and remediate potential security risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Tate Milton Keynes
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
Employment Type: Full-Time
Salary: £50,000 - £60,000 per annum, Negotiable, Inc benefits, OTE
documentation (e.g., designs, network diagrams, data flows) to ensure alignment with security policies and architecture. Conduct Information Security Impact Assessments and Data Protection Impact Assessments. Support penetration testing and vulnerability assessments, tracking remediation to closure or handover to BAU. Translate technical risks into business language for stakeholders. Maintain alignment with ISO27001 and other frameworks (e.g., NIST). Advise on More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Devonshire Hayes Recruitment Specialists Limited
GDPR, etc.). Configure and monitor firewalls, intrusion detection/prevention systems, and endpoint security solutions. Support identity and access management, MFA, and secure network access policies. Conduct regular vulnerability assessments, patch management, and system hardening. Project Management & Delivery Lead infrastructure and network projects from scoping through delivery, ensuring quality, cost, and time objectives are met. Define technical requirements More ❯
GDPR, etc.). Configure and monitor Firewalls, intrusion detection/prevention systems, and endpoint security solutions. Support identity and access management, MFA, and secure network access policies. Conduct regular vulnerability assessments, patch management, and system hardening. Project Management & Delivery Lead infrastructure and network projects from scoping through delivery, ensuring quality, cost, and time objectives are met. Define technical requirements More ❯
L33, Knowsley, Merseyside, United Kingdom Hybrid / WFH Options
Curveball Solutions
business objectives. Draft, maintain, and implement information security policies and Standard Operating Procedures (SOPs). Configure and oversee mobile security—MDM (MAM/BYOD)—to protect business continuity. Lead vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Author compelling tender responses, clearly demonstrating technical capability and strategic value. Enhance Microsoft 365 security—leveraging Purview, Conditional Access, MFA More ❯