desired outcomes and success criteria which is to be the baseline for post project review and benefit realisation validation, as well as measuring positive effects. Contribute to project risk management consulting and technical reviews, drafting mitigation plans and delivering on any actionable items allocated Draft procedures and or policies with regards to cyber security submitting them to the Information … intrusion detection and prevention, situational awareness of: network intrusions. security events. data spillage; and. Incident response actions. Identify and resolve vulnerabilities in networks, servers, systems, and applications by performing vulnerability scans Investigate improper access to ensure proper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements including but not limited to privilege account management. Provide … daily operational effectiveness reporting to the Information Security Officer Create and update weekly dashboard view of cyber risk ratings in the organisation. Prepare reports for circulation to the management teams related to investigations and threats for the month, this will also be rolled up into quarterly reporting. Support with managing vendor resource deliverables to ensure quality and consistency of More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, incident response, and compliance. Our mission is to protect businesses from cyber threats by delivering tailored security solutions that keep them resilient and secure. The Role We … threats and attack techniques, and the ability to implement effective security controls to mitigate risks. This role involves proactively monitoring security events, investigating potential breaches, and supporting clients with vulnerabilitymanagement and security best practices. About You You are passionate about cybersecurity and have a strong ability to think critically, solve complex problems, and anticipate security threats before … to mitigate security risks. Conduct digital forensics and root cause analysis on security breaches. Work closely with internal teams and clients to ensure swift containment and resolution of threats. VulnerabilityManagement & Security Operations Perform regular vulnerability scans and assessments, identifying security gaps and misconfigurations. Recommend and implement security improvements based on assessment findings. Optimize security configurations and More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role We … ability to work collaboratively with clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits and risk assessments to identify … alignment with industry standards and regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerabilitymanagement, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages (e.g., Python, Bash, PowerShell) for More ❯
Overview Reporting to the Director - Cybersecurity, the Cybersecurity Analyst is responsible for the day-to-day administration of the Information Security Management System (ISMS). This role will also involve performing key Security Operations duties, including system and application audits and reporting. Responsibilities Monitor and support all internal and external systems infrastructure (Incident & Problem Management), collaborating with colleagues … defining and testing specific information security controls and policies. Contribute to the global information security awareness program and ensure company-wide compliance. Conduct security assessments for projects and change management initiatives. Maintain the threat and information risk register and recommend appropriate remediation measures. Develop comprehensive documentation detailing system specifications and operating instructions. Ensure infrastructure, applications, and data security/… out-of-hours support coverage on a rotational basis (one week per month). Qualifications 1-3 years’ experience in security operations in the capacity of incident response and vulnerabilitymanagement; implementing and managing core Microsoft stack (MCSE equivalent certification); administering and supporting virtualization platforms (VMWare); implementing and managing with Linux operating systems. Experience in scripting technologies such More ❯
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Selby, England, United Kingdom Hybrid / WFH Options
Drax
vulnerabilities, assess their impact, and prioritize responses accordingly. Incident Response: Developing and implementing incident response plans for handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. VulnerabilityManagement: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate penetration testing of OT systems … level of attention to detail, be self-motivated and have the ability to think outside the box when working on complex problems. This role requires strong communication and stakeholder management skills, with the ability to influence beyond your sphere of control. Rewards and benefits As you help us to shape the future, we’ve shaped our rewards and benefits More ❯
York, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
the security stack, identify areas for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with partners in infrastructure, security operations … year experience with a background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a distributed workforce. Strong written and verbal More ❯