London, South East, England, United Kingdom Hybrid/Remote Options
Context Recruitment Limited
industry best practice * Perform security reviews, identify gaps in security architecture and apply appropriate remediation * Ensure appropriate technical measures are in place to comply with regulations/legislations * Conduct vulnerabilityscanning, analysis and remediation * Patch management * Identify root cause of security issues and design appropriate solutions Required Experience: * Prior experience working within the security industry, with a strong … M365 infrastructure. * Experience of working with SIEM tools * Exposure to email security tools (Sophos, O365 etc) * Excellent patch management skills (Intune SCCM, MECM Endpoint Manager and WSUS) * Experience with vulnerabilityscanning and management (Insight VM) * Experience with Endpoint Security * Exposure to Cloud technologies (AWS, Azure etc.) * Excellent networking skills (TCP/IP, SMB, DNS, DHCP etc) Central London More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Urbanberry Recruitment Ltd
response activities Manage security projects including DPIAs, supplier assurance, penetration testing, and remediation Support evaluation and implementation of emerging technology, including AI security tools Conduct threat hunting and support vulnerabilityscanning and patch management Develop and refine security policies, playbooks, and response procedures Provide leadership and guidance to two direct reports Essential Experience & Knowledge Experience in Security Operations … Incident Response, or similar role Strong understanding of networking, Windows/Linux, and cybersecurity fundamentals Experience with SIEM (e.g., Sentinel, Splunk), EDR tools, and vulnerability platforms Understanding of security frameworks (ISO 27001, NIST, CIS) Working knowledge of Microsoft InTune Familiarity with GDPR and data protection requirements Desirable Certifications such as Security+, CEH, GIAC Experience with cloud security (Azure/ More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Urbanberry Recruitment Ltd
response activities Manage security projects including DPIAs, supplier assurance, penetration testing, and remediation Support evaluation and implementation of emerging technology, including AI security tools Conduct threat hunting and support vulnerabilityscanning and patch management Develop and refine security policies, playbooks, and response procedures Provide leadership and guidance to two direct reports Essential Experience & Knowledge Experience in Security Operations … Incident Response, or similar role Strong understanding of networking, Windows/Linux, and cybersecurity fundamentals Experience with SIEM (e.g., Sentinel, Splunk), EDR tools, and vulnerability platforms Understanding of security frameworks (ISO 27001, NIST, CIS) Working knowledge of Microsoft InTune Familiarity with GDPR and data protection requirements Desirable Certifications such as Security+, CEH, GIAC Experience with cloud security (Azure/ More ❯
Southampton, Hampshire, South East, United Kingdom
Adroit People Ltd
JD: Vulnerability Management Maintaining vulnerabilityscanning platforms to identify and analyse vulnerabilities Taking a risk-based approach to prioritise remediation efforts Working with support teams to remediate issues Building a range of reporting capabilities to inform our stakeholders on the status and progress of VM remediation efforts across engineering and up to leadership teams Data correlation and … identifying patterns and trends, building MI which can be shared with stakeholders Security Incident response Assist in the management of high priority vulnerability incidents Co-ordinate with support teams in order roll out mitigation of vulnerability solutions Monitor daily dashboards from security tooling and produce weekly reports to demonstrate progress of remediation by support teams Qualys Patch Management More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid/Remote Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
teams and shaping best practice. Essential Skills & Experience 5+ years in IT security or MSP environments . Strong understanding of Cyber Essentials, ISO27001, or NIST frameworks. Experience managing patching, vulnerability, and risk governance . Skilled communicator with the ability to explain risks to non-technical audiences. Proven experience leading client-facing security reviews . Desirable CISSP, CISM , or equivalent … certifications. Experience auditing or delivering compliance frameworks. Familiarity with RMM/XDR/EDR , SIEM, and vulnerabilityscanning platforms. Background in mentoring or managing small teams. Exposure to incident response and tabletop exercises. Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome More ❯
the day-to-day operation of security systems and tools, including firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus, anti-malware, SIEM (Security Information and Event Management), vulnerability scanners, and data encryption solutions. Manage vulnerability management programs, including regular scanning, penetration testing, and remediation of identified weaknesses. Lead and manage security incident response, including detection … Strong understanding of information security principles, frameworks (e.g., ISO 27001, NIST, Cyber Essentials), and best practices. Hands-on experience with security technologies such as firewalls, SIEM, IDS/IPS, vulnerability scanners, endpoint detection and response (EDR), and identity management solutions. Experience with cloud security (e.g., Azure Security). Proven experience in managing security incidents and conducting incident response. Familiarity More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Computappoint
Terraform/Bicep for AKS, container registries, application services, and networking Implement monitoring, alerting, and observability frameworks with SLOs and diagnostic tools Enforce security through access controls, secrets management, vulnerabilityscanning, and policy-as-code Manage environment consistency and optimise cloud costs through performance monitoring and capacity planning Create reusable automation tools, templates, and documentation for developer self More ❯
Technical Security Architect role Strong background in network infrastructure design and review , with a focus on security. Proven experience designing and documenting security architectures and solutions . Expertise in vulnerabilityscanning design and implementation . Ability to evaluate and integrate new technologies and innovations under tight delivery schedules. Excellent communication and presentation skills when engaging at all levels. More ❯
robust monitoring and alerting solutions Contributing to and maintaining CI/CD pipelines Driving ISO 27000 implementation and supporting ongoing compliance initiatives Introducing and managing cybersecurity tools such as vulnerability scanners, endpoint protection, SIEM, and cloud security monitoring solutions Requirements: Extensive experience in a DevOps team lead role using AWS, (IAM, S3, EKS). Experience with IaC such as More ❯
Banbury, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
wide range of internal teams, from IT colleagues to Train Engineers, to ensure security best practices are understood and integrated into their processes and systems. Key Accountabilities Threat and Vulnerability Management Develop incidence response and security measures for protection. Complete risk and exploitability assessments against vulnerabilities and live threats. Serve as a subject matter expert in vulnerability management … tools and technologies such as SIEM, DLP, network protection, threat detection, and endpoint protection. An understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, Intrusion Detection, and vulnerability scanning. Understanding of IT and cyber security frameworks, standards, and regulations (examples: ISO27001, NIS2, GDPR, and CAF). Understanding of the Cyber Kill Chain and MITRE ATT&CK frameworks. More ❯
Hook Norton, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
wide range of internal teams, from IT colleagues to Train Engineers, to ensure security best practices are understood and integrated into their processes and systems. Key Accountabilities Threat and Vulnerability Management Develop incidence response and security measures for protection. Complete risk and exploitability assessments against vulnerabilities and live threats. Serve as a subject matter expert in vulnerability management … tools and technologies such as SIEM, DLP, network protection, threat detection, and endpoint protection. An understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, Intrusion Detection, and vulnerability scanning. Understanding of IT and cyber security frameworks, standards, and regulations (examples: ISO27001, NIS2, GDPR, and CAF). Understanding of the Cyber Kill Chain and MITRE ATT&CK frameworks. More ❯
systems proactively for suspicious activity. Maintain and update cyber security procedures and documentation. Provide IT support when required, including first, second, and third line assistance. Attend monthly cyber/vulnerability meetings and contribute expertise as needed. Essential Skills & Experience: Minimum 2 years' experience in an IT security-related role ???. Experience with vulnerability management and reporting tools. Strong … verbal communication skills to explain risks to both technical and non-technical stakeholders. CompTIA Security+ or equivalent qualification ??. Desirable: Experience with SIEM systems, EDR, IDS/IPS, and vulnerability scanners. Previous experience in a law firm or professional services environment. Familiarity with Practice Management Systems (PMS) and Document Management Systems (DMS). Personal Attributes: Methodical, thorough, and detail More ❯
principles. Implement proactive security measures and controls to prevent security breaches and minimize potential impact, including managing and implementing various security technologies and tools (e.g., SIEM, IDS/IPS, vulnerability scanners). Lead the cloud security strategy, ensuring robust configuration, monitoring, and protection of our client's cloud infrastructure and services. Financial Management and Justification: Develop business cases that … and implement security awareness training programs for all staff. Metrics and KPIs: Develop and track relevant Key Performance Indicators (KPIs) such as incident response times, compliance audit results, and vulnerability management metrics. Cross-functional Collaboration: Work closely with the Engineering team and other technical departments to ensure security is integrated into all development and operational processes. More ❯