Central London, London, United Kingdom Hybrid/Remote Options
Colt Technology Services
Company description: We are seeking a dynamic and motivated Vulnerability Management Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The Vulnerability Management Lead will play a crucial role in tracking and managing the identification, assessment, and remediation of security vulnerabilities across the organizations … infrastructure and monitoring and reporting on vulnerability and other security compliance status. The role requires collaboration with various partners to ensure that vulnerability assessments and emerging threats are prioritized and advanced. Additionally, the successful candidate will work with management to continuously evolve the vulnerability management program. Job description: You will be responsible for supporting CSOC in order … to achieve the below: The development and implementation of the Colt Vulnerability Management Framework. Enhancing the scope and efficiency of current vulnerabilityscanning and management tools and integration between them. Design and manage the periodic penetration testing exercise. Collaborating with identified stakeholders to provide specialist guidance and support, ensuring effective vulnerability identification, prioritisation and remediation activity More ❯
ethical hackers, helping test systems, applications, and networks for vulnerabilities - working alongside seasoned professionals while sharpening your offensive security skills.Expect to contribute to hands-on pen testing engagements, conduct vulnerability assessments, and support threat hunting within a well-established SOC. You'll develop your skills using industry-standard tools, investigate incidents, and provide actionable remediation advice.Role: Junior Penetration TesterLocation … London/HybridSalary: £30,000 - £50,000 (DOE)Ideally, you’ll have: 6+ months of proven penetration or security testing experience Knowledge of Metasploit, Burp Suite, and vulnerabilityscanning tools Experience with Windows, Linux and Mac operating systems Interest in threat hunting, incident response, and security monitoring CRT/OSCP/Cyber Scheme training or aspirations to achieve More ❯
City, London, United Kingdom Hybrid/Remote Options
Big Red Recruitment Midlands Limited
hackers, helping test systems, applications, and networks for vulnerabilities - working alongside seasoned professionals while sharpening your offensive security skills. Expect to contribute to hands-on pen testing engagements, conduct vulnerability assessments, and support threat hunting within a well-established SOC. You'll develop your skills using industry-standard tools, investigate incidents, and provide actionable remediation advice. Role: Junior Penetration … Location: London/Hybrid Salary: £30,000 - £50,000 (DOE) Ideally, you ll have: 6+ months of proven penetration or security testing experience Knowledge of Metasploit, Burp Suite, and vulnerabilityscanning tools Experience with Windows, Linux and Mac operating systems Interest in threat hunting, incident response, and security monitoring CRT/OSCP/Cyber Scheme training or aspirations More ❯
City, London, United Kingdom Hybrid/Remote Options
The Bridge IT Recruitment
Investigate and resolve cyber incidents promptly and effectively. Implement and manage security measures including firewalls, encryption, and endpoint protection. Maintain clear documentation of breaches, assessments, and remediation actions. Conduct vulnerability testing, penetration testing, and risk assessments. Collaborate with the IT Security Manager to identify and mitigate network vulnerabilities. Analyse logs from multiple sources to detect and respond to abnormal … a SOC (Security Operations Centre) or NOC (Network Operations Centre). Strong understanding of incident response methodologies and the MITRE ATT&CK framework. Experience using SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. Technical expertise in Microsoft Defender, EDR (Endpoint Detection and Response), and network architecture. Practical experience managing cyber incidents and implementing secure configurations. Excellent analytical More ❯