About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The … into CI/CD pipelines. Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerability scanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers, DevOps, and compliance teams to align More ❯
Brighton, England, United Kingdom Hybrid / WFH Options
Anson McCade
Secure Access Service Edge Platforms Expert Troubleshooting and Analytical Approach to problems Good working knowledge of Security Architecture concepts & experience with Security Design Networking Knowledge - Routing and Switching CSPM Vulnerability Management & Email Hygiene Solutions – Such as Tenable, Mimecast Enterprise network monitoring tools Administrating network security access policies on firewalls Configuring new security profiles and protections Produce and review Documentation … and maintain network security measures to protect organization's data and systems - Monitor network traffic for potential security breaches and respond appropriately to incidents - Conduct regular security audits and vulnerability assessments to identify and address security risks - Collaborate with cross-functional teams to implement security policies and procedures - Provide technical support and guidance to IT staff on network security … and maintain network security measures to protect organization's data and systems - Monitor network traffic for potential security breaches and respond appropriately to incidents - Conduct regular security audits and vulnerability assessments to identify and address security risks - Collaborate with cross-functional teams to implement security policies and procedures - Provide technical support and guidance to IT staff on network security More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
Office (WFO) role. This role will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC) using Terraform. Their ideal candidate … Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & Penetration Testing: Review Penetration Testing, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk assessments, and ensure regulatory compliance. … Required Strong expertise in Azure cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetration testing, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of DevOps pipelines (CI/CD More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure system architecture and application development. Maintain and enhance incident response procedures and disaster recovery … Proven experience in a cyber security or information security engineering role. Strong knowledge of network and system security, encryption, and authentication protocols. Experience with security tools such as SIEM, vulnerability scanners, firewalls, antivirus, and endpoint protection platforms. Familiarity with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks and standards (ISO 27001, NIST, PCI More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Infinigate UK & Ireland
with internal and external audits relating to information security. Conducting security awareness training and education for staff and users on best practices and emerging trends in cyber security. Use vulnerability management to improve Infinigate’s security landscape. Performing risk assessments and vulnerability scans to identify and mitigate potential threats to the network, devices, applications, and data. Complete security … Understanding of Incident Response, Cyber Kill Chain, ATT&CK · Knowledge & experience of common program language e.g., Python, C++, PowerShell, JavaScript Being able to perform Root Cause Analysis Experience with vulnerability assessments Ability to discover, design and document security implementations. Strong networking skills. Good understanding of securing Cloud technologies through native and multi-cloud technologies. Performed Ethic Hacking, Intrusion Prevention More ❯
risk management, etc Assist with the design, engineering and management of automations to improve workflows and inefficiencies related to security processes Assists in responding to audits, penetration tests and vulnerability assessments Develop, manage, and measure KPIs, KRIs and additional metrics to understand the trends, quality, and insights from the vulnerability detection results to facilitate business decisions, automation development More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
play a critical role in protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
UNAVAILABLE
play a critical role in protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security More ❯
we utilise the best digital capabilities of the ServiceNow ITSM tooling product to provide the very best Experience to our Customers. We are seeking an experienced and results-driven Vulnerability & Security Compliance Lead who plays a critical role in ensuring the security and reliability of our customers IT infrastructure. This role is responsible for leading efforts to identify, assess … applications. Coordinate and implement regular patching cycles while minimizing downtime and disruption to business operations. Coordinate the testing of patches prior to deployment to validate functionality and compatibility. Utilize vulnerability scanning tools to identify weaknesses in the IT environment. Analyze and prioritize vulnerabilities based on risk impact and business-criticality. Oversee and enforce best practice for security hygiene; access … reviews, vulnerabilityassessment, key rotation, etc Collaborate with internal teams to remediate identified vulnerabilities in a timely and efficient manner. Ensure compliance with regulatory requirements, internal policies, and industry standards related to patching and vulnerability management Generate reports on vulnerability status, patching progress, and key metrics for senior leadership and audit purposes. Act as a point More ❯
we utilise the best digital capabilities of the ServiceNow ITSM tooling product to provide the very best Experience to our Customers. We are seeking an experienced and results-driven Vulnerability & Security Compliance Lead who plays a critical role in ensuring the security and reliability of our customers IT infrastructure. This role is responsible for leading efforts to identify, assess … applications. Coordinate and implement regular patching cycles while minimizing downtime and disruption to business operations. Coordinate the testing of patches prior to deployment to validate functionality and compatibility. Utilize vulnerability scanning tools to identify weaknesses in the IT environment. Analyze and prioritize vulnerabilities based on risk impact and business-criticality. Oversee and enforce best practice for security hygiene; access … reviews, vulnerabilityassessment, key rotation, etc Collaborate with internal teams to remediate identified vulnerabilities in a timely and efficient manner. Ensure compliance with regulatory requirements, internal policies, and industry standards related to patching and vulnerability management Generate reports on vulnerability status, patching progress, and key metrics for senior leadership and audit purposes. Act as a point More ❯
Cirrus Logic an exceptional place to grow your career! We are seeking a highly motivated, seasoned security professional to join Information Security as a Senior Attack Surface Management/Vulnerability Management Information Security Analyst. You will be responsible for managing the scanning architecture, as well as the program to identify, analyze, prioritize, and mitigate security vulnerabilities in our digital … assets to enhance cybersecurity and protect sensitive data. This role supports business strategy in a dynamic environment. Responsibilities: VulnerabilityAssessment: Conduct regular vulnerability assessments to identify security weaknesses in our systems, applications, and network infrastructure. Risk Analysis: Analyze and prioritize vulnerabilities based on risk level and potential impact on the organization. Mitigation Strategies: Develop and implement effective … with the incident response team to investigate and respond to security incidents, ensuring swift resolution and minimizing damage. Security Tools: Manage and maintain security tools and technologies used for vulnerability management, including scanning tools. Security Policies: Develop and enforce security policies, standards, and best practices to ensure compliance with industry regulations and internal security requirements. Reporting: Prepare detailed reports More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role … ability to work collaboratively with clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits and risk assessments to identify … alignment with industry standards and regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages (e.g., Python, Bash, PowerShell) for security More ❯
managing Vendor Strategy and roadmap for Information Security Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction within mandate Assessment of the organisation's technology risk exposure and measurement of the various parameters that make up technology risks. Support the Design for your area of responsibility Work closely with … intrusion detection and prevention, situational awareness of: network intrusions. security events. data spillage; and. Incident response actions. Identify and resolve vulnerabilities in networks, servers, systems, and applications by performing vulnerability scans Investigate improper access to ensure proper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements including but not limited to privilege account management. Provide … consistency of services Audit vendor services and report on non-performance or execution deficiencies to the Information Security Officer. Risk & Quality Management within one’s area of responsibility Drives vulnerability testing, risk analyses and security assessments providing findings to the Information Security Officer Maintain compliance with core risk management concepts, such as vulnerability management and threat intelligence. Guide More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
As a Cyber Defence Analyst, you will join the Cyber Fusion Center, performing in-depth analysis, assessment, and response to security threats by following documented policies to meet Service Level Goals. The team provides global 24x7 security operations and monitoring for cybersecurity events affecting Experian. You will be a part of the first line of defence in Experian's … departments, responsible for receiving and prioritizing cybersecurity alerts, including being the dedicated contact for potential security incidents reported by users (e.g., Experian employees). Depending on the results of assessment, this team is then responsible for investigating, containing, eradicating, and recovering from events falling in its scope or escalating higher-risk events to dedicated incident response and management teams … security tools including Defender for Cloud, GuardDuty, CloudTrail, or CloudWatch. System administration on Unix, Linux, or Windows Network forensics, logging, and event management Defensive network infrastructure (operations or engineering) Vulnerabilityassessment and penetration testing concepts Malware analysis concepts, techniques, and reverse engineering In-depth knowledge of network and host security technologies and products (such as firewalls, network IDS More ❯
secure network architectures. Monitor network traffic for suspicious activity and respond to security incidents. Conduct regular network security assessments and audits to ensure compliance with security policies and standards. Vulnerability Analysis: Conduct regular vulnerability assessments and penetration testing to identify and mitigate security risks. Develop and implement strategies to address vulnerabilities. Track and report on the status of … are properly configured and updated. Evaluate and recommend new security tools and technologies to enhance security operations. Documentation: Create and maintain detailed documentation of security incidents, forensic analysis, and vulnerability assessments. Prepare reports for management and stakeholders. Collaboration: Work closely with other IT and Digital teams to ensure comprehensive security coverage. Provide security guidance to projects and programs as … solutions. Network Security: Strong understanding of network protocols, VPNs, and network security architecture. Incident Response: Ability to detect, analyse, and respond to security incidents, including forensics and malware analysis. Vulnerability Management: Experience in identifying, assessing, and mitigating vulnerabilities in systems and applications. Automation: Skills in scripting and automation for security tasks (e.g. Python, PowerShell). Information Security Frameworks: Working More ❯
and practices. Implementing data security policies such as DLP, privileged access management, and insider risk management. Designing and managing automation to improve security workflows. Supporting audits, penetration tests, and vulnerability assessments. Developing and analyzing KPIs, KRIs, and other metrics to inform security decisions and reporting. Ensuring the safety of company information and IT equipment through appropriate security measures. Experience More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, incident response, and compliance. Our mission is to protect businesses from cyber threats by delivering tailored security solutions that keep them resilient and secure. The Role … threats and attack techniques, and the ability to implement effective security controls to mitigate risks. This role involves proactively monitoring security events, investigating potential breaches, and supporting clients with vulnerability management and security best practices. About You You are passionate about cybersecurity and have a strong ability to think critically, solve complex problems, and anticipate security threats before they … to mitigate security risks. Conduct digital forensics and root cause analysis on security breaches. Work closely with internal teams and clients to ensure swift containment and resolution of threats. Vulnerability Management & Security Operations Perform regular vulnerability scans and assessments, identifying security gaps and misconfigurations. Recommend and implement security improvements based on assessment findings. Optimize security configurations and More ❯
Bradford, England, United Kingdom Hybrid / WFH Options
Techwaka
are seeking a motivated Cyber Security Analyst R2 to join our client's security team. In this role, you will be responsible for monitoring and analyzing security incidents, performing vulnerability assessments, and implementing security measures to protect the organization’s systems and data. You will work closely with cross-functional teams to ensure compliance with security policies and procedures. … Key Responsibilities: Monitor network and system activities for suspicious behavior and potential security breaches Conduct regular vulnerability assessments and penetration testing to identify security weaknesses Respond to security incidents and provide detailed analysis and reporting on findings Collaborate with IT and other departments to implement effective security controls and measures Stay updated on the latest cyber threats, vulnerabilities, and … security principles, frameworks, and best practices Experience with security monitoring tools (SIEM, IDS/IPS, etc.) and incident response Familiarity with network protocols, firewalls, and encryption technologies Knowledge of vulnerabilityassessment tools and techniques (e.g., Nessus, Qualys) Proficient in scripting languages (Python, Bash, etc.) for automation of tasks Strong analytical and problem-solving skills, with attention to detail More ❯
Loughton, Essex, England, United Kingdom Hybrid / WFH Options
Profile 29
Office (WFO) role. This role will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC) using Terraform. Their ideal candidate … Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & Penetration Testing: Review Penetration Testing, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk assessments, and ensure regulatory compliance. … Required Strong expertise in Azure cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetration testing, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of DevOps pipelines (CI/CD More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
security compliance and best practices, ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks … MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
security compliance and best practices, ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks … MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree More ❯
security policies, standards, and guidelines along with internal processes Implement and document new or enhanced security controls and system/process changes. Advise on and support penetration testing and vulnerability assessments across applications, systems, and networks. Conduct in-depth reviews of legacy systems to identify and remediate security gaps. Represent Information Security in project teams, ensuring alignment with security … recognized certifications such as CISSP, CISM, CompTIA Security+, CEH, or vendor-specific credentials (e.g., AWS Security, Microsoft SC-200). Experience with security tools and platforms (e.g., SIEM, DLP, vulnerability scanners). Familiarity with regulatory and compliance frameworks (e.g., ISO 27001, NIST, GDPR). Our benefits Boots Retirement Savings Plan Discretionary annual bonus Generous employee discounts Enhanced maternity/ More ❯
vulnerabilities or breaches. Collaborate with teams to resolve performance issues and ensure business continuity. Monitor and maintain security infrastructure, including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and remediation. Perform root cause analysis More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯