to support Security Consulting 'go to market' propositions and service offerings. Leading in the development and presentation of compelling client proposals collaborating with teams across our business. Strong stakeholder management and relationship building skills at senior levels that will enable consensus building in the shaping of secure client solutions Shaping, leading and delivering value through security advisory consultancy and … through guiding secure transformational delivery engagements. Providing security expertise across security standards and accreditations, measure and control the effectiveness of the security controls framework and maintain the Information Security Management System. Deriving and delivering documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies. Standards and guidelines Assiting with the identification … of identified risks and emerging cyber security vulnerabilities and threats. The subsequent analysis to quantify and lead risk mitigation plans Work with Service Management to ensure that partners and suppliers adhere to agreed standards, policies and verify/evidence appropriate compliance and security KPIs Work closely with 1st, 2nd and 3rd lines of defence on all matters relating to More ❯
of tools including Sentinel, Purview suite, Exchange Online, SharePoint, Teams VMware Server and Storage Hardware Microsoft Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Penetration Testing & VulnerabilityManagement Applications Cloud-based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption Candidate Profile The right candidate will have a demonstrable background in Cyber … the last 5 years. Working towards or holding a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (e.g., NIST or Cyber Security Essentials). Knowledge of vulnerability databases (e.g., NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tools. Experience with Code Security scanning tools. Educational Requirements This role More ❯
inc. Sentinel, Purview suite of tools, Exchange Online, SharePoint, Teams VMware Server and Storage Hardware Microsoft Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Penetration Testing & VulnerabilityManagement Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate for this role will have a demonstrable … years. Have obtained or be working towards a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (ie. NIST or Cyber Security Essentials). Knowledge of vulnerability databases (ie. NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tooling. Experience using Code Security scanning tooling. Educational Requirements This role isn More ❯
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics … and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerabilitymanagement, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented with the ability to multi-task and prioritize efforts - Ability to express More ❯
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics … and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerabilitymanagement, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented with the ability to multi-task and prioritize efforts - Ability to express More ❯
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) Understanding of APT, Cyber Crime and other associated tactics Understanding of host forensics … and network analysis techniques and tools Understanding of malware and reverse engineering Understanding of vulnerabilities. Vulnerabilitymanagement, remediation and implementation techniques. Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) Excellent verbal and written communication skills Excellent organizational and analytical skills Detail oriented with the ability to multi-task and prioritize efforts Ability to express More ❯
Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerabilitymanagement platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
safeguard national interests What We're Looking For 1-3 years of practical experience in Cyber Security Good understanding of core security principles and tools Exposure to network security, vulnerabilitymanagement, or risk assessments (preferred) Familiarity with security frameworks such as ISO 27001, NIST, or PCI DSS (preferred) Professional certifications like Security+, CEH, or CISSP are desirable Analytical … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
in DevSecOps pipelines Collaborate with developers to enable secure coding and privacy by design Drive adoption of secure development standards and practices across the organization Operate and evolve software vulnerabilitymanagement and bug bounty programs Work cross-functionally to identify risks and improve security posture continuously Support cloud-native app and ML security efforts across Azure and AWS More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
Benefact Group plc
of the business, helping guide solutions that align with security and project requirements by articulating the real-world cyber security risks associated. You will also be responsible for our VulnerabilityManagement program ensuring that agreed SLAs are achieved and provide consultation when solutions are not straight forward. As the Senior Cyber Security Consultant, you will be providing mentorship … requests, you will provide subject matter expertise for internal projects and stakeholders, identifying risks and advising on the correct approach to mitigate those risks You will have responsibility for VulnerabilityManagement managing outputs from internal tooling and external vendors in order to prioritise remediation by relevant internal parties in order to ensure the identified risks are mitigated You … of the Team, fostering an inclusive, supportive and engaged learning environment, being a key contributor to a high performing and professional Security Team. Knowledge, skills and experience Strong stakeholder management skills A strong understanding of enterprise ICT and security principles A strong understanding of cloud security concepts and technologies Understanding of the CI/CD process and security integrations More ❯
of the business, helping guide solutions that align with security and project requirements by articulating the real-world cyber security risks associated. You will also be responsible for our VulnerabilityManagement program ensuring that agreed SLAs are achieved and provide consultation when solutions are not straight forward. As the Senior Cyber Security Consultant, you will be providing mentorship … requests, you will provide subject matter expertise for internal projects and stakeholders, identifying risks and advising on the correct approach to mitigate those risks You will have responsibility for VulnerabilityManagement managing outputs from internal tooling and external vendors in order to prioritise remediation by relevant internal parties in order to ensure the identified risks are mitigated You More ❯
Gloucester, England, United Kingdom Hybrid / WFH Options
IMT Resourcing Solutions
reviews What they're looking for: Strong understanding of Microsoft technologies – Azure, Defender, Intune, Entra ID Experience working in large–scale or regulated environments Familiarity with SIEM, endpoint protection, vulnerabilitymanagement A practical, collaborative approach to security What's on offer? Paying up to GBP49,500 per annum Enhanced pension up to 20% Hybrid working 1 day per More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
EDF Energy
security engineer role, operating or maintaining network infrastructure. You'll have a strong working knowledge of next-generation firewalls and SASE platforms, exposure to email gateways, load balancers, and vulnerabilitymanagement tools in a complex enterprise environment would be a big plus. You'll be someone who takes pride in delivering exceptional customer service, with a background in More ❯
cultivating relationships with other teams and stakeholders. Does the work get challenging at times? Yes! But you’ll collaborate with a diverse group of talented people and gain invaluable management and organizational skills, which will come in handy as you move forward in your career. Every position at Kyndryl offers a way forward to grow your career, from Junior … Mainframe z/OS system operations Experience with Mainframe product installation Willing to learn and grow future Mainframe Skills Eligible for UK Security Clearance (must have) Nice to have: Vulnerabilitymanagement expertise Familiarity with ticketing tools (SM9, ServiceNow) Mainframe-related certifications are a plus #J-18808-Ljbffr More ❯