of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security … in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & VulnerabilityAssessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including … date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerability management program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work with stakeholders to develop mitigation strategies. Conduct regular security More ❯
understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: Vulnerability Analyst Location: London - We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular … IT and OT). Co-ordinate with various digital teams across NH to ensure all vulnerabilities are addressed in a timely manner. Continually improve vulnerability tooling and process while supporting the improvement of the security capability of National Highways through dashboard monitoring and retrospective assessments. Plan, execute and manage … vulnerabilityassessment and scanning activities across the National Highway's networks, systems, and applications. Ensure vulnerability scans and assessments are run periodically in line with policies and standards across the IT, OT, and cloud infrastructure. Prioritise vulnerabilities based on their severity, exploitability, and potential business impact to More ❯
meet your needs. What You'll Do Deliver cyber security assurance services to identify vulnerabilities in different areas on a variety of technologies, including vulnerability assessments on external networks, internal networks, applications, and enterprise security systems. Delivering presentations to technical and non-technical stakeholders. Main role will be as … For Qualifications : Relevant degree or one full year's minimum experience in penetration testing or cyber security assurance. Experience : Some experience of cyber security assessment, vulnerability assessments, or penetration testing. Certifications : such as CPSA or CEH would be advantageous. Tools: Experience of penetration testing tools, Linux, Windows, and … written communication skills. Ability to work effectively under pressure. Commitment to maintaining the highest ethical and professional standards. Are you experienced in cyber security assessment, vulnerability assessments, or penetration testing and looking to further improve your skills and take on more responsibilities? If so, this opportunity is perfect More ❯
experience in real-world cybersecurity scenarios. Your responsibilities will include assisting in the development of cyber solutions, testing products, troubleshooting, implementing security measures, conducting vulnerability assessments and penetration testing, and participating in cyber assessments while learning about standards such as the NIST Cybersecurity Framework (CSF) 2.0, NIST … as applicable to OT systems. Assist in evaluating new cyber solutions and introducing innovative approaches to existing solutions. Assist in varying stages of cyber assessmentvulnerabilityassessment and penetration testing. Assist in detailed design documents for various cyber solutions. Participate in design discussions with end customers and More ❯
drive initiatives to design and implement security solutions for Azure and M365 environments, ensuring adherence to industry best practices and regulatory standards. Supplier Security Assessment: Evaluate and ensure the security posture of Material IT Suppliers, ensuring compliance with security standards and contractual obligations. Risk Assessment: Conduct risk assessments … analyze vulnerability and penetration testing reports, and develop risk mitigation strategies. Access Management: Help develop and maintain a robust Role-Based Access Control Framework, ensuring efficient management of access rights. Key Skills & Experience: Ideally a Degree in Computer Science, Information Security, or related field (or equivalent experience). Advanced … of security frameworks (e.g., NIST, ISO27000 series). Expertise in network security protocols, Azure security solutions, firewalls, intrusion detection systems, VPNs, etc. Proficient in vulnerabilityassessment tools, incident response frameworks, and risk management methodologies. Ability to collaborate effectively with cross-functional teams. Analytical mindset to interpret security data More ❯
against potential threats. Endpoint Management and Administration : Overseeing the deployment, configuration, and maintenance of endpoint security solutions to safeguard all devices within the organisation. VulnerabilityAssessment and Management : Conducting regular vulnerability assessments, analysing findings, and coordinating remediation efforts to enhance our security posture. Implementation of Security Controls … design and implementation of security architectures and controls. Endpoint Security : Hands-on experience with endpoint protection solutions, ensuring devices are safeguarded against potential threats. Vulnerability Management : Proficiency in conducting vulnerability assessments using industry-standard tools and methodologies, and managing remediation processes. Compliance and Security Controls : Familiarity with implementing More ❯
client facing, to include leadership and executive management Draft root cause analysis reports and recommendations after cybersecurity incidents Identify risk areas that will require vulnerability prevention Stay current with Security technologies and make recommendations for use based on business value Skills & Qualifications Requirements SIEM administration, configuration, and optimization experience … endpoint protection solutions such as Cylance, Carbon Black, or CrowdStrike Understanding of network protocols coupled with experience with web proxies, web application firewalls, and vulnerabilityassessment tools. Experience working in a team-oriented, collaborative environment with a high level of analytical and problem-solving abilities Positive attitude with … strong oral and written communication skills Knowledge of IP networking and network security including Intrusion Detection Familiarity with common network vulnerability/penetration testing tools Familiarity with service management software such as ServiceNow Familiarity with data visualization platforms such as Domo Some experience with system hardening guidance and tools More ❯
will do: Design and implement robust, forward-thinking security strategies, policies, and procedures to safeguard our systems, networks, and data. Lead regular security assessments, vulnerability scans, and penetration tests to identify risks and deploy effective remediation measures. Monitor systems, networks, and logs for any signs of security incidents or … preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems, SIEM, antivirus, encryption, and vulnerabilityassessment tools. You own relevant certifications (Security+, IAT II/III level or similar). You excel in risk assessments, vulnerability management More ❯
to embed security into cloud environments (AWS, Azure, Google Cloud) and application development lifecycles. Implantation and management of SOC and EDR functions. Conduct regular vulnerability assessments, penetration testing, and red-team exercises, working closely with external partners to continuously test and improve security defences. Develop a comprehensive risk register More ❯
local IT Security Officers Experience in sourcing and managing vendor relationships , staff and service providers across multiple countries, with expertise in information risk analysis, vulnerabilityassessment, incident response, and root cause resolution. Specific Technical skills - Excellent knowledge of NIST CSF (1.1 and 2.0), ISO2700x, ISO22301 and NIS 2. … with Training and Awareness platforms, Cyber Security Testing, Threat Detection and Response, Security Information and Event Management (SIEM) platforms. As a plus : Expertise in Vulnerability management tools, forensic analysis tools and methods, GRC Tools Identity, Access & Network Security: Proficiency in Identity and Access Management (IAM), Secure Access Service Edge More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient … Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerability scanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers, DevOps More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
UNAVAILABLE
protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID More ❯
protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID More ❯
teams to resolve performance issues and ensure business continuity. Monitor and maintain security infrastructure, including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and More ❯
Security Engineer II, Vulnerability Management and Remediation Operations Job ID: Amazon Support Services Pty Ltd Embark on a Mission to Fortify Amazon's Defenses as a Security Engineer with the Vulnerability Management & Remediation Operations team! Amazon Security is seeking an experienced and innovative Security Engineer to join our … Vulnerability Management and Remediation Operations (VMRO) team in Sydney, Australia. The VMRO team is responsible for discovering, assessing, triaging, detecting, and driving the remediation of vulnerabilities across the Amazon ecosystem. Key job responsibilities Analyse public and private vulnerability disclosures and exploit code. Deeply understand and assess the technical … Amazon. Support response and remediation efforts, assisting builder teams to fix their security issues in a timely manner. Engineer high quality, scalable, and accurate vulnerability detection mechanisms. Design and implement automation, tools and workflows to enhance our operations capabilities. Be part of a global team and participate in periodic More ❯
with SIEM tools, intrusion detection, firewalls, and threat analysis Knowledge of identity and access management (IAM), zero-trust architectures, and encryption techniques Experience conducting vulnerability assessments, and risk analysis Strong analytical and problem-solving skills, with the ability to interpret security data and provide actionable insights Familiarity with compliance More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Awaze
a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. More ❯
Create and update security event investigation notes, report on open cases, and maintain case data in the Incident Response Management platform. Monitor threat and vulnerability news services for any relevant information that may impact installed infrastructure. Analyse reports to understand threat campaign(s) techniques, lateral movements and extract indicators … Security, Forensics, or Computer Science; related experience and/or training in the field of IT security monitoring and analysis, cyber threat analysis, and vulnerability analysis. A Global Information Assurance Certification (GIAC) Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst (GCIA), or equivalent certification would be advantageous. Intermediate knowledge … VM platforms. Understanding or proven experience of using Security Information and Event Management (SIEM) platforms for analysing network and security incidents. Experience in using VulnerabilityAssessment (VA) platforms to identify network and platform risks and mis-configurations. Experience in Security Assessment tools/frameworks. Knowledge of network More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and … clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits … regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages (e.g. More ❯
Strategic Resources European Recruitment Consultants Ltd
requirements. Responsibilities The role involves continuously monitoring the organisation's network and systems for potential security breaches while conducting threat analysis, risk assessments, and vulnerability assessments. By identifying security risks, the position requires providing recommendations and implementing measures to re mediate vulnerabilities and strengthen cyber defences. In the event More ❯
Lead Vulnerability Manager/Cyber Threats Hybrid: 3 days York or Staines office £60k-£65k Our client are looking for a Lead Vulnerability Manager to join their growing successful business. Responsibilities You will be responsible for overseeing end-to-end vulnerability management programme, across multiple client environments. … Requires strong expertise in vulnerabilityassessment · Prioritisation · Remediation strategies · Ensure the security of their clients is robust Who are you? · You will have experience of vulnerability management, cyber security or in a related field · Tools with a strong experience level include MS Defender, Tenable, Qualys, Rapid7 · SIEM More ❯
Lead Vulnerability Manager/Cyber Threats Hybrid: 3 days York or Staines office £60k-£65k Our client are looking for a Lead Vulnerability Manager to join their growing successful business. Responsibilities You will be responsible for overseeing end-to-end vulnerability management programme, across multiple client environments. … Requires strong expertise in vulnerabilityassessment · Prioritisation · Remediation strategies · Ensure the security of their clients is robust Who are you? · You will have experience of vulnerability management, cyber security or in a related field · Tools with a strong experience level include MS Defender, Tenable, Qualys, Rapid7 · SIEM More ❯
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯