Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Stackstudio Digital Ltd
non-technical audiences, including executive stakeholders. Perform technical quality reviews and engage in direct technical conversations with clients. Utilize tools such as BurpSuite, Nessus, Nmap, Kali Linux for effective vulnerabilityassessment and penetration testing. Apply knowledge of OWASP Top 10 and SANS Top 25 vulnerabilities and communicate methodologies with development teams. Skills, Experience, and Abilities Required: Essential: Proficient More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
and SANS Top 25 vulnerabilities and ability to effectively communicate methodologies and techniques with development teams Utilize tools such as BurpSuite, Nessus, Nmap, Kali Linux, and Nessus for effective vulnerabilityassessment and penetration testing. Your Profile Essential skills/knowledge/experience: (Up to 10, Avoid repetition) Proficient Pen Testing Tools - Cobalt Strike, Caldera, Atomic Red team, Pentera More ❯
NHS England CSOC comprised of four primary functions: Intelligence Collection & Analysis - Perform collection, aggregation, analysis and contextualisation of healthcare and security information to produce actionable CTI. Cybersecurity Threat & Risk Assessment - Perform high-level risk assessments of current and emerging threats to the health & social care estate. Intelligence Dissemination & Reporting - Produce stakeholder-specific intelligence reporting for stakeholders. Specialist CTI Support … other supporting documents. Person Specification Knowledge Essential Proven knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats. Demonstrable Knowledge of vulnerabilityassessment tools, techniques, models, and systems; ability to utilises the knowledge to identify vulnerabilities on network, operating system, mobile application, etc. Desirable Demonstrable knowledge of and ability to More ❯
Knutsford, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
environments Manage secure configurations, access controls, and CI/CD workflows in GitLab Integrate and protect telemetry tools such as Cribl, Elastic, Splunk, Fluentd, and Syslog Perform threat modelling, vulnerability assessments, and risk analysis for the pipeline Partner with DevOps to embed security into infrastructure-as-code and deployment processes Monitor and respond to security events, maintaining clear documentation More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Adecco
against cyber threats. Accountabilities and Responsibilities Security Operations Support Serve as a reference point for network security across IT teams, providing guidance and specialised expertise on security measures. Conduct vulnerability assessments, security audits, and continuous monitoring of network traffic for anomalies using advanced security tools. Collaborate with IT teams to ensure security measures are integrated into network architecture and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Adecco
against cyber threats. Accountabilities and Responsibilities Security Operations Support Serve as a reference point for network security across IT teams, providing guidance and specialised expertise on security measures. Conduct vulnerability assessments, security audits, and continuous monitoring of network traffic for anomalies using advanced security tools. Collaborate with IT teams to ensure security measures are integrated into network architecture and More ❯
Automate deployment, configuration, and infrastructure provisioning (Infrastructure as Code) Work with virtualisation (VMware/vSphere, etc.) Configure/manage SAN/storage, Fibre Channel, zoning, LUN provisioning Participate in vulnerability assessments, patches, security hardening, and incident response Required Skills & Experience NPPV3 clearance, either current or active within the last 12 months (non-negotiable) Strong track record with Windows More ❯
Automate deployment, configuration, and infrastructure provisioning (Infrastructure as Code) Work with virtualisation (VMware/vSphere, etc.) Configure/manage SAN/storage, Fibre Channel, zoning, LUN provisioning Participate in vulnerability assessments, patches, security hardening, and incident response Required Skills & Experience NPPV3 clearance, either current or active within the last 12 months (non-negotiable) Strong track record with Windows More ❯
Automate deployment, configuration, and infrastructure provisioning (Infrastructure as Code) Work with virtualisation (VMware/vSphere, etc.) Configure/manage SAN/storage, Fibre Channel, zoning, LUN provisioning Participate in vulnerability assessments, patches, security hardening, and incident response Required Skills & Experience NPPV3 clearance, either current or active within the last 12 months (non-negotiable) Strong track record with Windows More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modelling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯