Strong interpersonal and presentation skills. Strong analytical skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of More ❯
Strong interpersonal and presentation skills. Strong analytical skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of More ❯
in basic shell scripting, creating Snort rules, or other log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of More ❯
Shrewsbury, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
Wolverhampton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
Worcester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
systems (Windows, OS X, Linux). Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of VulnerabilityScanning, Management, and Ethical Hacking (Penetration Testing). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work More ❯
and checks to ensure security tooling is optimised Provide advice and support to business units on security best practice and control implementation Hands-on experience with security tooling (EDR, vulnerabilityscanning, access control) Familiarity with Security frameworks such as NIST, PCI-DSS, and GDPR Experience working with Microsoft environments (O365, Azure) Clear communicator, able to engage with both … role, and wants to take on broader responsibilities Has been the security point-person in an IT team, leading on patching or endpoint protection Has hands-on experience with vulnerability management tools like Tenable, and is ready to play a bigger role in shaping how security tools are implemented and optimised across the business. This is a chance to More ❯
tooling is optimised Provide advice and support to business units on security best practice and control implementation What We’re Looking For Hands-on experience with security tooling (EDR, vulnerabilityscanning, access control) Familiarity with Security frameworks such as NIST, PCI-DSS, and GDPR Experience working with Microsoft environments (O365, Azure) Clear communicator, able to engage with both … role, and wants to take on broader responsibilities Has been the security point-person in an IT team, leading on patching or endpoint protection Has hands-on experience with vulnerability management tools like Tenable, and is ready to play a bigger role in shaping how security tools are implemented and optimised across the business. This is a chance to More ❯
Sentinel or similar SIEM tools. Strong verbal and written English communication skills. Interpersonal and presentation skills. Strong analytical skills. Understanding network traffic flows, normal vs. suspicious activities. Knowledge of VulnerabilityScanning, Management, and Ethical Hacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines (Incident, Problem, Change Management). Ability More ❯
spend most of your time: • Supporting the implementation of the clients' cybersecurity strategies, policies, and procedures tailored to the specific needs of our organisation. • Conducting regular security assessments and vulnerability scans, to identify potential weaknesses and recommend appropriate remediation measures. • Monitoring and analysing security logs, events, and alerts to detect and respond to potential security incidents in a timely … promote a culture of security throughout the organisation. • Assist with compliance with relevant security frameworks, regulations, and standards, such as Cyber Essentials, CAF/Gov Assure and NCSC. • Support vulnerability management report and process • Assist with any other tasks/projects which need prioritising • Documenting of alerts and creation of playbooks Professional Skills Required: Proficiency with Microsoft Security Technologies … such as Sentinel, Entra and Defender Proven experience designing, implementing, and maintaining security controls. Experience with security assessment tools, vulnerabilityscanning, and penetration testing methodologies. Understanding of current cybersecurity threats, attack vectors, and mitigation strategies. Ability to analyse and interpret security logs, events, and alerts to detect and respond to security incidents effectively. Familiarity with security frameworks and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
Wolverhampton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
Stoke-on-Trent, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
bottlenecks - e.g. Grafana, Datadog Networking Concepts - Knowledge in TCP/IP, DNS, VPN, load balancing, and firewalls Security Best Practices - Implementing security in DevOps (e.g., IAM policies, network security, vulnerabilityscanning, encryption) Security Protocols - Experience with modern security protocols and practices - e.g. Zero Trust, OAuth, OpenID, TLS/SSL Agile Methodologies - Experience with Agile, Scrum, and Kanban DevOps More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Arthur J. Gallagher & Co. (AJG)
/CRT or equivalent. Enthusiastic about cybersecurity, excellent communication skills, and a willingness to learn and develop. Certifications like CPSA, Sec+, CEH, Pentest+, PPNT. Industry cybersecurity experience. Experience with vulnerabilityscanning technologies. Compensation and benefits On top of a competitive salary, great teams and exciting career opportunities, we also offer a wide range of benefits. Below are the More ❯
Stafford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
col-narrow-right Job Views: 5 Posted: 16.06.2025 Expiry Date: 31.07.2025 col-wide Job Description: Who we are looking for An Information Security Analyst, who will work within our vulnerability management team, which focuses on the technical side, ensuring IT systems are operated in a secure manner. The Information Security department monitor our live operation, creating and reacting to … alerts and other anomalies identified through automated tools or manual analysis. The vulnerability management (VM) function covers two high-level areas, including owning the processes and schedules relating to the vulnerabilityscanning of all endpoints in the Business. You will review the results in terms of risk and impact assessment, additionally you will own the scheduling of … and planning for specialist third-party vulnerability and penetration testing, in addition to the collation of reports. Liaising with parts of the Business, will aid your understanding of the risk profile then advice on options to resolve any issues identified. You will work closely with colleagues in the governance and compliance functions to ensure the Company meets its requirements More ❯
Stoke-on-Trent, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
col-narrow-right Job Views: 5 Posted: 16.06.2025 Expiry Date: 31.07.2025 col-wide Job Description: Who we are looking for An Information Security Analyst, who will work within our vulnerability management team, which focuses on the technical side, ensuring IT systems are operated in a secure manner. The Information Security department monitor our live operation, creating and reacting to … alerts and other anomalies identified through automated tools or manual analysis. The vulnerability management (VM) function covers two high-level areas, including owning the processes and schedules relating to the vulnerabilityscanning of all endpoints in the Business. You will review the results in terms of risk and impact assessment, additionally you will own the scheduling of … and planning for specialist third-party vulnerability and penetration testing, in addition to the collation of reports. Liaising with parts of the Business, will aid your understanding of the risk profile then advice on options to resolve any issues identified. You will work closely with colleagues in the governance and compliance functions to ensure the Company meets its requirements More ❯
Join the frontline of digital defense with our Cybersecurity Internship, perfect for students passionate about ethical hacking and protecting data. Learn vulnerabilityscanning and penetration testing Conduct security audits and analysis Assist in identifying and mitigating threats Hands-on with firewalls, antivirus & encryption Understand security protocols and compliance Support internal cybersecurity awareness Work on real case studies and More ❯
recruit for a Security Operations Analyst on a permanent basis. Role Responsibilities: Develop security policies and frameworks. Drive patch management across infrastructure and application teams. Conduct risk assessments and vulnerability scans. Respond to security incidents and alerts. Ensure compliance with regulations (e.g., PCI-DSS, GDPR). Skills & Experience Required: Knowledge of PCI-DSS and GDPR An understanding of Security … best practices SIEM, Vulnerabilityscanning and common security frameworks Security management systems and organisational security controls, including standards, best practices, and approaches to risk assessment and mitigation. If you would like to hear more about this fantastic opportunity, please click apply or send your CV directly to nick.oakley@infinitetalent.co.uk More ❯
recruit for a Security Operations Analyst on a permanent basis. Role Responsibilities: Develop security policies and frameworks. Drive patch management across infrastructure and application teams. Conduct risk assessments and vulnerability scans. Respond to security incidents and alerts. Ensure compliance with regulations (e.g., PCI-DSS, GDPR). Skills & Experience Required: Knowledge of PCI-DSS and GDPR An understanding of Security … best practices SIEM, Vulnerabilityscanning and common security frameworks Security management systems and organisational security controls, including standards, best practices, and approaches to risk assessment and mitigation. If you would like to hear more about this fantastic opportunity, please click apply or send your CV directly to nick.oakley@infinitetalent.co.uk More ❯