Portsmouth, England, United Kingdom Hybrid / WFH Options
ProCheckUp (PCU)
security consultancy. Role Description This is a full-time, on-site role based in Portsmouth and potential work-from home for a Cyber Security Consultant. The consultant will conduct vulnerability assessments, application security reviews, and network security analyses. Responsibilities include evaluating risks, providing actionable security recommendations, and assisting clients with compliance to established standards like ISO 27001 and PCI … of Application Security, with the ability to identify vulnerabilities in web and mobile applications Skills in Network Security, including securing and evaluating infrastructure and cloud environments Expertise in performing Vulnerability Assessments and delivering actionable insights Background in Information Security, with experience in regulatory compliance (e.g., PCI DSS, ISO 27001) Strong analytical skills and the ability to effectively communicate complex … knowledge and experience of penetration testing, preferably supported by industry leading qualifications. In addition they will have: SPECIALITIES • Web Application Security (Implementation, detection, mitigation and education) • Penetration Testing and VulnerabilityAssessment (Network, SCADA and Web Application) • Mobile phone/Application Penetration Testing (Android/iPhone/iPad) • Computer and Network Forensics (including e-Discovery) • Delivery of Enterprise Wide More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Altitude-Recruitment Limited
assessments for new features and system changes Evaluate and recommend security technologies and tools Operational (40%) Manage security environments across Azure and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerabilityassessment and penetration testing programs Maintain identity and access management controls Compliance & Assurance (30%) Maintain ISO27001 certification More ❯
assessments for new features and system changes Evaluate and recommend security technologies and tools Operational (40%) Manage security environments across Azure and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerabilityassessment and penetration testing programs Maintain identity and access management controls Compliance & Assurance (30%) Maintain ISO27001 certification More ❯
and risk assessments for new features and system changes Evaluate and recommend security technologies and tools Manage security environments across Azure and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerabilityassessment and penetration testing programs Maintain identity and access management controls Maintain ISO27001 certification and manage audit More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
respond to Cyber Security Incidents Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others. Run VulnerabilityAssessment tools to measure compliance with security updates and security patches. Member of a Team who are responsible for making multiple daily CSOC checks to detect and respond … XDR and Microsoft Defender variants, and Elastic Security, or displays aptitude to learn how to work with a SIEM. Experience and knowledge of SIEM tools, Cyber Security Incident Response, Vulnerability Management and Cyber Threat Intelligence. Experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at it. More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Tate Milton Keynes
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
Employment Type: Full-Time
Salary: £50,000 - £60,000 per annum, Negotiable, Inc benefits, OTE
enterprise applications, data and infrastructure and by identifying, assessing, and mitigating security risks. This is a hands-on, predominantly office-based role requiring experience in application and data security, vulnerability assessments, security administration, threat monitoring and response. You will work alongside a multidisciplinary team of infrastructure, support staff and developers, cross-functionally supporting colleagues from across the business and … endpoint protection, etc.). • Monitoring security policies, standards, and best practices. • Reviewing and monitoring user access and identity management controls across systems. • Key activities in relation to Penetration Testing & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing … Cyber Security practices like NIST, Cyber Essentials +, ISO27001. • Familiarity with regulatory compliance and auditing standards. • Ability to identify, assess and mitigate security risks. • Knowledge of penetration testing and vulnerability scanning tools like Nessus and Qualys. • Proficiency in applying security tooling including firewalls, VPN’s, Network Traffic Analysis. • Knowledge of network protocols TCP/IP, HTTP, DNS, SSH • Familiarity More ❯
Office, Security Operation Centre or Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and in line with local regulations.The ideal candidate will be responsible for managing information security systems, ensuring compliance with … implement, and maintain information security policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001).- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage … risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information Security, Computer Science, or a related field. More ❯
Support bioinformaticians in building pipelines that are secure by design, version-controlled, and deployed through automated workflows. Collaborate with engineering teams to embed security throughout the development lifecycle. Automate vulnerability assessments to proactively identify and mitigate risks. Work closely with the security team to integrate best practices into new and existing features. Ensure compliance with security standards and regulations More ❯
Compliance Apply security best practices across OCI and Fusion applications. Manage identity and access control (IAM, roles, policies). Ensure compliance with ITIL, SOX, and internal governance frameworks. Conduct vulnerability assessments and implement remediations. Performance Optimisation & Support Optimise performance across cloud and on-prem integrations. Troubleshoot complex issues involving Fusion, middleware, and OCI services. Collaborate with Oracle support for More ❯
cyber risk governance, and assurance frameworks. This is a cross-functional role with both advisory and hands-on responsibilities, focusing on security assurance, risk management and supporting architecture reviews, vulnerability management, risk assessments, cyber defence posture, driving technical assurance, and embedding risk-aligned security controls across IT and OT systems and secure-by-design practices. You will work across … SSCP, CISM, CRISC, CCSP, SABSA, or SANS GIAC (GSEC, GCCC, GCPM). o Demonstrable experience in designing and implementing secure infrastructure or cloud architectures. o Proven experience with risk assessment methodologies and maintaining enterprise risk registers. o Working knowledge of risk assessment methodologies (e.g. ISO 31000, FAIR, OWASP risk rating). o Strong understanding of Gov Assure, CAF … Azure AD), Microsoft 365 E5, Azure IaaS/PaaS, Windows/Linux/Unix. o Strong knowledge of security tooling such as SIEM, endpoint detection (EDR/XDR), and vulnerability management platforms. o Hands-on experience with policy development, access control models (RBAC, ABAC), and logging standards. o Experience supporting assurance activities or government-mandated reviews (e.g. GovAssure, Secure More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Adecco
against cyber threats. Accountabilities and Responsibilities Security Operations Support Serve as a reference point for network security across IT teams, providing guidance and specialised expertise on security measures. Conduct vulnerability assessments, security audits, and continuous monitoring of network traffic for anomalies using advanced security tools. Collaborate with IT teams to ensure security measures are integrated into network architecture and More ❯
Woking, Surrey, England, United Kingdom Hybrid / WFH Options
Nomad Foods
and standards that support risk mitigation and compliance efforts in line with industry standards. Play an active, hands-on role in security initiatives and GRC activities, including incident management, vulnerability assessments, and compliance reviews. Provide reporting to leadership committees and the Board. About you: We need someone who can communicate at all levels and with the ability to summarise More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
MFK Recruitment
and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerability management, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement long More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
BAE Systems, Lyon Way, Frimley, Camberley, England
BAE SYSTEMS PLC
of-the-art vessels. Role • Support the design, development, testing, and implementation of software applications using technologies such as Java, C#, C++, and web platforms • Assist with security analysis, vulnerability assessments, and the integration of secure engineering solutions into products and systems • Collaborate with multidisciplinary teams to deliver innovative and secure digital solutions • Produce technical documentation, troubleshoot issues, and More ❯
BAE Systems, Lyon Way, Frimley, Camberley, England
BAE SYSTEMS PLC
of-the-art vessels. Role Support the design, development, testing, and implementation of software applications using technologies such as Java, C#, C++, and web platforms Assist with security analysis, vulnerability assessments, and the integration of secure engineering solutions into products and systems Collaborate with multidisciplinary teams to deliver innovative and secure digital solutions Produce technical documentation, troubleshoot issues, and More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Hays
DSPT and GDPR. Responsibilities Conduct risk assessments for systems, projects and third parties; document findings and remediation. Review and respond to supplier/security questionnaires and tender submissions. Support vulnerability and patch management; interpret scans and prioritise fixes. Advise IT teams on alerts, incidents and security configuration (M365/Azure/Defender/DLP/Conditional Access). Maintain … risk management practices and frameworks such as ISO 27005 and NIST RMF. Familiar with key compliance standards including ISO 27001, Cyber Essentials Plus, DSPT, and GDPR. Capable of interpreting vulnerability assessments and advising on appropriate remediation strategies. Excellent communication skills, both written and verbal, with the ability to engage effectively with stakeholders. What you'll get in return An More ❯
Employment Type: Contract, Work From Home
Rate: Up to £36.0 per hour + £36 per hour inside IR35 (via Umbrella)
You’ll Do Lead and investigate high-impact cyber security incidents across global customer environments. Proactively hunt for threats, triage alerts, and identify anomalous behaviours before they escalate. Manage vulnerability assessments end-to-end, driving remediation outcomes with customers and internal teams. Optimise the Microsoft Security Stack: Sentinel, Defender (for Endpoint/Identity), Purview, and XDR. Support Zero Trust … build detections, correlations, and meaningful insights. Experience centralising log sources and onboarding new tools and data feeds into a SIEM/SOAR platform. Strong understanding of threat hunting methodologies, vulnerability management, and incident response. Knowledge of frameworks: ISO27001, NIST CSF, SOC2, Cyber Essentials Plus. Comfortable adapting to unfamiliar tooling and integrating new technologies quickly. Why Join? Work at the More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
DMS Computer Recruitment
of the position include: Design and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments Participate More ❯
information governance and IT risk management strategy and plan.Provide expert cyber security advice to senior stakeholders and technical teams across the organisation.Work directly with key stakeholders to facilitate risk assessment and risk management processes. Collaborate with all departments within the Trust (and ICS) where necessary to identify and disseminate high-quality information that facilitates effective cyber and information security … management and improvement.Use advanced analytic tools (artificial intelligence) to determine emerging threat patterns and vulnerabilities. Scoping and delivery of penetration tests and ensure actions from vulnerability assessments are resolvedLead on audit and audit preparation relating to IT securityMaintaining compliance with various standards in place e.g. Data Security and Protection Toolkit, CareCERT, Cyber Essentials+, Network and Information Systems Regulations etc. More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the criteria More ❯