About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The … into CI/CD pipelines. Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerability scanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers, DevOps, and compliance teams to align More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role … ability to work collaboratively with clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits and risk assessments to identify … alignment with industry standards and regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages (e.g., Python, Bash, PowerShell) for security More ❯
managing Vendor Strategy and roadmap for Information Security Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction within mandate Assessment of the organisation's technology risk exposure and measurement of the various parameters that make up technology risks. Support the Design for your area of responsibility Work closely with … intrusion detection and prevention, situational awareness of: network intrusions. security events. data spillage; and. Incident response actions. Identify and resolve vulnerabilities in networks, servers, systems, and applications by performing vulnerability scans Investigate improper access to ensure proper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements including but not limited to privilege account management. Provide … consistency of services Audit vendor services and report on non-performance or execution deficiencies to the Information Security Officer. Risk & Quality Management within one’s area of responsibility Drives vulnerability testing, risk analyses and security assessments providing findings to the Information Security Officer Maintain compliance with core risk management concepts, such as vulnerability management and threat intelligence. Guide More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, incident response, and compliance. Our mission is to protect businesses from cyber threats by delivering tailored security solutions that keep them resilient and secure. The Role … threats and attack techniques, and the ability to implement effective security controls to mitigate risks. This role involves proactively monitoring security events, investigating potential breaches, and supporting clients with vulnerability management and security best practices. About You You are passionate about cybersecurity and have a strong ability to think critically, solve complex problems, and anticipate security threats before they … to mitigate security risks. Conduct digital forensics and root cause analysis on security breaches. Work closely with internal teams and clients to ensure swift containment and resolution of threats. Vulnerability Management & Security Operations Perform regular vulnerability scans and assessments, identifying security gaps and misconfigurations. Recommend and implement security improvements based on assessment findings. Optimize security configurations and More ❯
Bradford, England, United Kingdom Hybrid / WFH Options
Techwaka
are seeking a motivated Cyber Security Analyst R2 to join our client's security team. In this role, you will be responsible for monitoring and analyzing security incidents, performing vulnerability assessments, and implementing security measures to protect the organization’s systems and data. You will work closely with cross-functional teams to ensure compliance with security policies and procedures. … Key Responsibilities: Monitor network and system activities for suspicious behavior and potential security breaches Conduct regular vulnerability assessments and penetration testing to identify security weaknesses Respond to security incidents and provide detailed analysis and reporting on findings Collaborate with IT and other departments to implement effective security controls and measures Stay updated on the latest cyber threats, vulnerabilities, and … security principles, frameworks, and best practices Experience with security monitoring tools (SIEM, IDS/IPS, etc.) and incident response Familiarity with network protocols, firewalls, and encryption technologies Knowledge of vulnerabilityassessment tools and techniques (e.g., Nessus, Qualys) Proficient in scripting languages (Python, Bash, etc.) for automation of tasks Strong analytical and problem-solving skills, with attention to detail More ❯
solid foundation in hands-on cyber defence Proficiency with tools such as SIEM, PAM, web/email filtering (e.g. Mimecast), IDS/IPS, antivirus, endpoint protection, Microsoft Sentinel, and vulnerabilityassessment tools (e.g. Tenable) Strong analytical mindset and attention to detail, with a passion for detecting and mitigating threats Excellent problem-solving skills and the ability to respond More ❯
enhance the security of IT systems both on-prem and cloud. Creation of reports, dashboards, metrics for SOC operations and presentation to senior management. Oversight, planning and execution of vulnerability assessments, penetration tests, audits or related security assessment exercises (eg Red Team) to improve the security posture of the infrastructure, applications and services. Manage the remediation of identified … networks and operating systems including firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, networks and cloud services Comprehensive knowledge or experience of information security principles, including risk assessment, intrusion detection, Security Incident and Event Management (SIEM) tools, threat and vulnerability management Detailed knowledge or experience of application or network based penetration testing tools and methodologies Experience More ❯
Doncaster, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Assess compliance with internal security policies and industry standards (e.g., ISO/IEC 27001/2, PCI-DSS). Conduct supplier risk assessments and third-party due diligence. Support vulnerability assessments, incident investigations, and operational resilience activities. Monitor security controls to ensure confidentiality, integrity, and availability (CIA). Assist with security certifications and regulatory frameworks including GDPR. Translate technical … clear, business-friendly advice. Stay on-call during scheduled weeks for incident support and response. Requirements Solid understanding of cybersecurity, governance, and risk management principles. Experience with risk/vulnerability assessments and incident management. Experience with first and second line support. Strong analytical thinking and attention to detail. Familiarity with compliance frameworks like ISO 27001/27002, NIST Cybersecurity More ❯
Bradford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Assess compliance with internal security policies and industry standards (e.g., ISO/IEC 27001/2, PCI-DSS). Conduct supplier risk assessments and third-party due diligence. Support vulnerability assessments, incident investigations, and operational resilience activities. Monitor the effectiveness of security controls to ensure confidentiality, integrity, and availability (CIA). Assist with security certifications and regulatory frameworks including … business-friendly advice. Stay on-call during scheduled weeks for incident support and response. Requirements Solid understanding of cyber security, governance, and risk management principles. Experience with risk/vulnerability assessments and incident management. Experience first and second line support Strong analytical thinking and attention to detail. Familiarity with compliance frameworks like ISO 27001/27002, NIST Cybersecurity Framework More ❯
Wakefield, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Assess compliance with internal security policies and industry standards (e.g., ISO/IEC 27001/2, PCI-DSS). Conduct supplier risk assessments and third-party due diligence. Support vulnerability assessments, incident investigations, and operational resilience activities. Monitor the effectiveness of security controls to ensure confidentiality, integrity, and availability (CIA). Assist with security certifications and regulatory frameworks including … business-friendly advice. Stay on-call during scheduled weeks for incident support and response. Requirements Solid understanding of cyber security, governance, and risk management principles. Experience with risk/vulnerability assessments and incident management. Experience first and second line support Strong analytical thinking and attention to detail. Familiarity with compliance frameworks like ISO 27001/27002, NIST Cybersecurity Framework More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
Lead the response to security incidents, ensuring effective investigation, containment, and resolution to a successful outcome. Threat Analysis: Using a combination of in-house tooling and external resources, conduct vulnerability analysis, and penetration tests to identify, evaluate, and mitigate potential threats. Policy Development: Refresh existing, and where required, author robust cyber security policies, procedures, and standards for the organization. … OT systems in a manufacturing environment. Proven experience in cybersecurity roles, with a focus on MOD-related projects. Strong understanding of MOD security standards and policies. Experience in conducting vulnerability assessments and penetration testing. What you will get in return This role is paying up to £75,000 per year, working 3-4 days per week in Sheffield with More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role More ❯
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: • Lead the development and delivery of threat intelligence and … vulnerability products. • Select and profile key threat actors posing the greatest risk to the client’s estate. • Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. • Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. • Provide in-depth contextual threat analysis, including actor capability and intent. • Maintain and improve internal documentation and … reporting processes. • Lead, mentor, and support a multidisciplinary team of cyber analysts. • Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: • 5+ years of experience in Threat Intelligence, Vulnerability Management, or cyber research. • Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. • Experience in More ❯
with engineering, maintenance and central teams, you’ll ensure robust protection of our electrical, automation, and industrial network systems. You’ll also drive key initiatives like cyber hygiene programmes, vulnerability assessments, and network monitoring – keeping us ahead of threats and ready to respond. Key Responsibilities Ensure OT assets and industrial control systems are protected against cyber threats. Implement and … support cyber security tools and practices defined in our global OT Cyber Strategy. Lead cyber hygiene and vulnerability management programmes, coordinating remediation where needed. Monitor OT network activity, detect insecure configurations or malicious activity, and take appropriate action. Own the site-level cyber incident response plan – coordinating with stakeholders and ensuring timely resolution. Support compliance efforts related to OT … and SCADA, and have strong knowledge of industrial networks. You have solid grounding in cyber security principles – TCP/IP, common protocols, OSI model, and cyber tooling such as vulnerability scanning, antivirus and endpoint protection. You can lead, influence and guide others – from site technicians to external contractors. You’re confident working independently and as part of a broader More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Finsbury Food Group Plc
demonstrable experience in: Leading cybersecurity governance, risk management, and compliance initiatives within an enterprise environment. Managing incident response frameworks, including cross-functional planning and coordination. Conducting security audits and vulnerability assessments, with a proven track record of risk mitigation. Designing and implementing cybersecurity awareness programs to enhance company-wide security culture. Handling third-party cybersecurity risk, ensuring secure vendor More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Eames Consulting
team, purple team, or adversary emulation experience. Programming/scripting skills (Python, PowerShell, Bash). Cloud pentesting experience (AWS, Azure, GCP). Familiarity with threat modeling or risk-based vulnerability assessments. Advanced certifications such as OSCE, OSEP, OSWE, CRTP, CREST CRT/CCT . Join us if you want to make a real impact, tackle diverse challenges, and grow More ❯
Castleford, England, United Kingdom Hybrid / WFH Options
Northern Powergrid
managing risk to the network, drawing on asset data and climate related research and projections and deriving models to facilitate the development of asset, network and system risk assessments, vulnerability assessments and adaptation analyses Utilise fault data and forecasts to establish vulnerability thresholds and trigger levels for our adaptative pathways to assist in our climate change adaptation planning More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯
timely manner. Serve as the lead liaison to communicate and investigate non-conformities related to raw materials. Maintain seasonality calendars to identify challenging periods and mitigate potential shortfalls. Conduct vulnerability assessments and communicate/mitigate risks to the business. Assist the customer support team in building specifications and answering queries related to raw materials. Address customer complaints related to More ❯