Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
Office (WFO) role. This role will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC) using Terraform. Their ideal candidate … Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & Penetration Testing: Review Penetration Testing, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk assessments, and ensure regulatory compliance. … Required Strong expertise in Azure cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetration testing, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of DevOps pipelines (CI/CD More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure system architecture and application development. Maintain and enhance incident response procedures and disaster recovery … Proven experience in a cyber security or information security engineering role. Strong knowledge of network and system security, encryption, and authentication protocols. Experience with security tools such as SIEM, vulnerability scanners, firewalls, antivirus, and endpoint protection platforms. Familiarity with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks and standards (ISO 27001, NIST, PCI More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
play a critical role in protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
Mission Aviation Fellowship
play a critical role in protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security More ❯
on, focusing on stakeholder engagement. Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat detection and response. Collaborate with More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
role, it will now be based on an Umbrella solution. Essential skills/experience required: Certifications: OSCP or CREST/TIGER Scheme. Experience penetration testing, ethical hacking, or completing vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security, IaC scanning, etc.). Secure … of UK public sector security and data protection standards (e.g., NCSC, Cyber Essentials Plus) - desirable Threat modelling and secure design practices - desirable Role/Responsibilities: Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc), and make necessary recommendations. Collaborate … Vetting, Dv Strap, Active DV, Security, Cyber, Cybersecurity, Infosec, Cloud, AWS, Amazon Web Services, Azure, Python, Bash, Script, Scripting, Automate, Automation, Penetration, Pentest, Pentesting, Pen-Test, Pen-Testing, Hacking, Vulnerability, Threat, Engineer #vacancy #jobadvert #recruit #hiring #jobsearch #careers #talent #recruitment #job Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral bonus More ❯
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints for …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerabilityassessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend More ❯
Farnborough, England, United Kingdom Hybrid / WFH Options
Copello Global
infrastructure within the programme, applying appropriate security frameworks and implementing the right controls to ensure the security and integrity of relevant information. Your role will cover several core areas, vulnerability assessments (scanning and reporting), system hardening, endpoint security and incident management. You will ensure relevant documentation around these activities is maintained while working effectively with the wider team. The … Skills This role requires a Security Engineer possessing a blend of Information Security and Cyber Security skills with knowledge of: Cloud Security (AWS) Experience in Vulnerability Assessments and Incident Management, Implementation of security controls, UK Information Security standards (eg. MoD, NCSC, NIST), Excellent communication skills, Clearance UK Security Clearance is essential to start. Apply To apply, follow the instructions More ❯
Enfield, Middlesex, England, United Kingdom Hybrid / WFH Options
Eden Brown Synergy
systems to identify, mitigate, and respond to risks and potential threats. * Utilise Microsoft Sentinel and related tools to analyse security data, detect anomalies, and respond effectively to incidents. * Oversee vulnerability assessments and penetration testing to ensure robust security measures are maintained. * Contribute to the development and execution of incident response plans, ensuring prompt action to contain and remediate security More ❯
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerabilityassessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Goodman Masson
and information. You’ll work closely with the IT Security Manager to monitor networks, respond to incidents, and enhance cyber resilience across the organisation. The role also includes conducting vulnerability assessments, supporting audits, and helping to strengthen third-party security compliance. Key Responsibilities: Monitor security systems and investigate incidents Operate firewalls, EDR, SIEM tools, and encryption software Support vulnerabilityMore ❯
Enfield, Middlesex, England, United Kingdom Hybrid / WFH Options
Global Technology Solutions Ltd
Monitor a range of security systems to detect, assess, and respond to potential threats. Use Microsoft Sentinel to analyse logs and events, identifying patterns and anomalies. Conduct and review vulnerability assessments and penetration tests to maintain a robust defence posture. Incident Response & Management: Contribute to and execute incident response plans, ensuring swift containment and resolution. Collaborate with internal teams More ❯
Reading, England, United Kingdom Hybrid / WFH Options
THAMES WATER UTILITIES LIMITED
As a Senior Security Penetration Tester , you will be responsible for supporting the design, implementation, and maintenance of TVM (Threat & Vulnerability Management) solutions, controls and processes across the organisation. You will be liaising with Digital teams to ensure appropriate mitigation and remediation of vulnerabilities detected across our IT estate. This role requires an understanding of TVM concepts, technologies, and … Tester Help support and develop an internal penetration testing function. Conduct network, application penetration testing, code and security reviews. Identify and exploit vulnerabilities through proof-of-concept testing. Support vulnerability management across the enterprise, ensuring that a framework for identification, categorisation and mitigation exists and is implemented and maintained. Responsible for supporting the creation of the operating model for … vulnerability management, that it is shared, agreed and operates effectively across the business. Develop and maintain penetration testing documentation, policies, and procedures. Integrate cybersecurity solutions (e.g. vulnerability scanning tools) with existing systems, applications, and infrastructure. Evaluate and recommend technologies, tools, and vendors to meet business needs. Investigate newly identified cybersecurity vulnerabilities and provide appropriate mitigation actions. Liaise and More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the criteria More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the criteria More ❯
Microsoft Sentinel. Key Responsibilities: Monitor security alerts and log data using Microsoft Sentinel and related SIEM tools Respond to security incidents, performing root cause analysis and recommending remediations Conduct vulnerability assessments and support threat detection activities Assist with the configuration and optimisation of the organisation's security infrastructure Collaborate with technical teams to ensure best practices in information security More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Spencer Clarke Group
to detect and respond to potential threats Utilise advanced tools and techniques to analyse security data and identify patterns or anomalies that may indicate a security breach Review regular vulnerability assessments and penetration testing to ensure the robustness of security measures Contribute to incident response plans to address security breaches promptly and effectively About you: You will have the More ❯
31.05.2025 Expiry Date: 15.07.2025 col-wide Job Description: We are seeking a dynamic and detail-oriented Cyber Security Business Analyst to join our clients team for an OT Asset & Vulnerability Project. This pivotal initiative aims to enhance our operational technology infrastructure by improving asset management and vulnerability processes. The project is preparing to enter the pilot phase in … will involve refining processes, gathering feedback, and driving improvements during the implementation phase. Key Responsibilities Collaborate with stakeholders to define project objectives, scope, and deliverables for the OT Asset & Vulnerability Project. Conduct requirements gathering sessions with users and translate these into detailed functional specifications. Analyze current workflows and identify areas for improvement in asset and vulnerability management processes. … issues proactively. Assist in user onboarding and training activities during the rollout phase. Skills and Qualifications Experience: 10+ years as a Business Analyst, preferably in OT, IT security, or vulnerability management projects. Technical Understanding: Familiarity with operational technology environments, asset management, and vulnerabilityassessment processes. Analytical Skills: Ability to analyze complex systems, identify gaps, and propose practical More ❯
Maidstone, Kent, United Kingdom Hybrid / WFH Options
Payter B.V
reporting Experience working with CI/CD pipelines, DevOps practices and methodologies, including infrastructure as code (IaC) and configuration management tools Knowledge of software security principles and practices, including vulnerabilityassessment, infrastructure, and penetration testing Technical skills: Automation Framework: Playwright Languages: Golang required. However, we'll train candidates proficient in other languages who are committed to learning Golang. More ❯
hands-on approach to deliver transformation deliverables, including reports, frameworks, and action plans. Skills and Experience Required Security Assurance Expertise: Deep understanding of security assurance principles, risk management, and vulnerability assessment. Communication Skills: Exceptional ability to communicate technical cybersecurity concepts in business terms to diverse audiences. Business Acumen: Proven capability to understand and articulate the business implications of cyber More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Searchability
Cyber Essentials Plus assessments, including practical remediation support (certification as a Cyber Essentials Plus Assessor or similar qualifications with the intention to certify is highly advantageous) Practical experience conducting vulnerability assessments across infrastructure, networks, and applications Working knowledge of threat and vulnerability management platforms such as Qualys Strong written and verbal communication skills, with the ability to clearly More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯