tools such as Burp Suite, Kali Linux, Metasploit, Wireshark, Nessus, or equivalent . Good knowledge of network security, firewalls, managed switches, and server configurations . Familiarity with SIEM tools, vulnerabilityscanning, and incident response . Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Preferred Qualifications Relevant certifications such as OSCP, CEH, CISSP, CISM, or ISO27001 … Network Security Engineer/Cyber Security/CISSP/CISA/CCNA Belfast, Northern Ireland, United Kingdom 2 days ago Belfast, Northern Ireland, United Kingdom 3 weeks ago Security Vulnerability and Penetration Testing (VAPT) Engineer Belfast, Northern Ireland, United Kingdom 3 months ago Information Security Analyst – Level 3 CTM/OES Belfast, Northern Ireland, United Kingdom 2 days ago More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
In Technology Group Limited
security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure system architecture and application development. Maintain and enhance incident response procedures and disaster recovery … Proven experience in a cyber security or information security engineering role. Strong knowledge of network and system security, encryption, and authentication protocols. Experience with security tools such as SIEM, vulnerability scanners, firewalls, antivirus, and endpoint protection platforms. Familiarity with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks and standards (ISO 27001, NIST, PCI More ❯
Bletchley, Buckinghamshire, United Kingdom Hybrid / WFH Options
In Technology Group
security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure system architecture and application development. Maintain and enhance incident response procedures and disaster recovery … Proven experience in a cyber security or information security engineering role. Strong knowledge of network and system security, encryption, and authentication protocols. Experience with security tools such as SIEM, vulnerability scanners, firewalls, antivirus, and endpoint protection platforms. Familiarity with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks and standards (ISO 27001, NIST, PCI More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure system architecture and application development. Maintain and enhance incident response procedures and disaster recovery … Proven experience in a cyber security or information security engineering role. Strong knowledge of network and system security, encryption, and authentication protocols. Experience with security tools such as SIEM, vulnerability scanners, firewalls, antivirus, and endpoint protection platforms. Familiarity with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks and standards (ISO 27001, NIST, PCI More ❯
tools such as Burp Suite, Kali Linux, Metasploit, Wireshark, Nessus, or equivalent . Good knowledge of network security, firewalls, managed switches, and server configurations . Familiarity with SIEM tools, vulnerabilityscanning, and incident response . Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Preferred Qualifications Relevant certifications such as OSCP, CEH, CISSP, CISM, or ISO27001 More ❯
tools such as Burp Suite, Kali Linux, Metasploit, Wireshark, Nessus, or equivalent . Good knowledge of network security, firewalls, managed switches, and server configurations . Familiarity with SIEM tools, vulnerabilityscanning, and incident response . Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Preferred Qualifications Relevant certifications such as OSCP, CEH, CISSP, CISM, or ISO27001 More ❯
tools such as Burp Suite, Kali Linux, Metasploit, Wireshark, Nessus, or equivalent . Good knowledge of network security, firewalls, managed switches, and server configurations . Familiarity with SIEM tools, vulnerabilityscanning, and incident response . Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Preferred Qualifications Relevant certifications such as OSCP, CEH, CISSP, CISM, or ISO27001 More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role … into CI/CD pipelines. Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerabilityscanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers, DevOps, and compliance teams to More ❯
access, threats, and vulnerabilities. Monitoring & Incident Response: Continuously monitor network traffic and system logs for security incidents, investigate, triage and contain breaches, and coordinate response efforts. Risk Assessment: Conduct vulnerability assessments and organise penetration testing to identify security gaps and deal with any recommendations, recommend necessary fixes or improvements as a result of those tests. Security Protocols: Develop and … will I bring to the role? Significant experience in a similar role. Hands-on experience with security technologies such as firewalls, IDS/IPS, SIEM, endpoint protection, encryption, and vulnerability scanners. Proficiency in security frameworks and standards such as NIST, ISO 27001, and CIS controls. Strong understanding of network protocols, firewalls, VPNs, and encryption techniques. Experience with scripting or More ❯
insights to inform executive briefings and assurance reports. Risk Management, Incident Management, and Regulatory Engagement Support the development and implementation of a robust risk management framework, including threat modelling, vulnerability assessments, and risk assessments aligned with FCA expectations. Lead and coordinate responses to security incidents, such as phishing attacks, malware infections, and data breaches, in compliance with FCA incident … technologies (e.g., email and web security gateways) that monitor operations, detect cyber threats, and respond to unauthorized events and incidents in line with established playbooks. Supervise penetration testing and vulnerabilityscanning activities, ensuring timely remediation of identified risks. Provide technical security guidance to project teams, embedding security considerations throughout the software development lifecycle (Security by Design). Maintain More ❯
South East London, England, United Kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised, successful bank … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely … of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical Admin Support - Azure, Oracle Cloud More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
NearTech Search
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
Strong interpersonal and presentation skills. Strong analytical skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of More ❯
Strong interpersonal and presentation skills. Strong analytical skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of More ❯
NIST, Cyber Essentials, GDPR, etc.). Experience in cybersecurity service delivery, such as penetration testing, risk assessments, compliance consulting, or managed security services. Familiarity with security tools (MDR, EDR, vulnerability scanners, firewalls, etc.). Understanding of cloud security (Azure is mandatory) and modern security best practices. The following certifications are beneficial though not mandatory: CISSP (Certified Information Systems Security … Allocate resources effectively across different projects and engagements. Service Delivery & Client Management: Oversee the delivery of cybersecurity services, including penetration testing, compliance assessments (Cyber Essentials, ISO 27001), cloud security, vulnerability management, and security consulting. Ensure all client projects are delivered on time, within scope, and meet high-quality standards. Work closely with clients to understand their security needs and More ❯
security policies, standards, and guidelines along with internal processes Implement and document new or enhanced security controls and system/process changes. Advise on and support penetration testing and vulnerability assessments across applications, systems, and networks. Conduct in-depth reviews of legacy systems to identify and remediate security gaps. Represent Information Security in project teams, ensuring alignment with security … recognized certifications such as CISSP, CISM, CompTIA Security+, CEH, or vendor-specific credentials (e.g., AWS Security, Microsoft SC-200). Experience with security tools and platforms (e.g., SIEM, DLP, vulnerability scanners). Familiarity with regulatory and compliance frameworks (e.g., ISO 27001, NIST, GDPR). Our benefits Boots Retirement Savings Plan Discretionary annual bonus Generous employee discounts Enhanced maternity/ More ❯
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding … a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
SW Group
with installation or processing of new security products and procedures Ensuring controls for monitoring products and systems for security breaches or intrusions Identifying production stability concerns via break point, vulnerabilityscanning, and impact analysis, and designing and developing implement remediation plans to address these concerns. Work on the trifecta of visibility, compliance and remediation for public cloud security. … with installation or processing of new security products and procedures Ensuring controls for monitoring products and systems for security breaches or intrusions Identifying production stability concerns via break point, vulnerabilityscanning, and impact analysis, and designing and developing implement remediation plans to address these concerns. Work on the trifecta of visibility, compliance and remediation for public cloud security. More ❯
South East London, England, United Kingdom Hybrid / WFH Options
FirstBank UK Limited
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months FirstBank UK is a globally recognised, top-tier bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business with over 10 million active customers in over 700 business locations is the oldest … African bank in the UK. Due to business requirements, we are now looking to acquire the services of an experienced Cyber Vulnerability Management Analyst Please note that this is a hybrid role with 3 days in the office and 2 days working from home. Key Responsibilities: In this fixed term contract role, you will be part of the team … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
preventive measures. Incident Response & Mitigation: Assess and maintain the Incident Response Plan, lead the response to security incidents and breaches, providing expertise in root cause analysis, containment, and remediation. Vulnerability Management: Conduct regular security assessments, including vulnerabilityscanning and writing penetration testing Statement of Works, and manage the remediation of identified vulnerabilities. Security Tools & Technologies Advice: Provide More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Murnen Design
threats, vulnerabilities, and mitigation techniques. Experience with a wide range of security technologies and practices, including: Intrusion detection and prevention systems (IDPS) Security information and event management (SIEM) system Vulnerabilityscanning and penetration testing Cloud security Identity and access management (IAM) Data loss prevention (DLP) Endpoint protection Security operations and incident response Experience in developing and implementing security More ❯
in basic shell scripting, creating Snort rules, or other log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of More ❯
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning and risk mitigation. Knowledge of security auditing and incident response processes. Experience with event and log analysis. Solid understanding of Disaster Recovery and Business Continuity principles. Excellent … a global organization, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery, Business Continuity Nice-to-have skills: ISO 27001 VulnerabilityScanning Disaster Recovery Work Experience: Cyber Security Specialist Security More ❯
more advanced security and data protection tasks with a higher level of autonomy. In this role, you will be responsible for conducting comprehensive security and data protection assessments, overseeing vulnerability management, developing and updating security and data protection policies, reviewing configurations, and providing expert guidance to the organization. You will be expected to operate with minimal supervision and mentor … to identify trends, areas of improvement, and potential security and data protection risks. Prepare detailed reports for management and advise on mitigation strategies. Lead Security Assessments: Perform risk assessments, vulnerability assessments, and commission penetration tests with minimal supervision. Prioritize and manage findings, providing actionable recommendations for remediation. Conduct security and data protection audits and collaborate with IT and development … Data Protection Impact Assessments). Configuration Reviews: Conduct detailed configuration reviews of systems, networks, and applications. Work with cross-functional teams to ensure that security configurations meet established standards. Vulnerability Management: Oversee the identification and remediation of vulnerabilities across systems. Coordinate vulnerabilityscanning, patching, and remediation efforts with internal teams. Provide leadership in addressing critical vulnerabilities and More ❯
of SIEM preferred. Should have expertise on TCP/IP network traffic and event log analysis. Network Troubleshooting skills required. Knowledge and hands-on experience in penetration testing/vulnerabilityscanning, security tools like Tenable Nessus, Kali Linux. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Experience of infrastructure design and management in mission critical … accountability and ownership. Knowledge of ISO27001, CE, CE+. Key Tasks Security assessments: Create and perform security assessments and threat models. Security standards: Develop, implement & maintain security standards and plans. Vulnerability Management: Research weaknesses and find ways to counter them. Security incident response: Respond to attack vectors and security incidents, and coordinate incident response across teams. Security software testing: Test More ❯