Required: Tenable Nessus Engineers IR35 Status: Inside Duration: 12 month initial contract Location: 1-2 days onsite in either Central London or Knutsford Role 1 As an experienced Vulnerability Assessment Engineer responsible for maintaining the Vulnerability Assessment toolsets and products. Primary Responsibilities The ability to review requirements, undertake product design followed by Implementation/deployment/support of … Vulnerability Assessment tools suite (e.g Tenable, Rapid7, Qualys etc) and peripherals with Engineering. Maintains local and network credentials and provisions access to vulnerabilityscanning systems. Responsible for integration of Vulnerability assessment tooling with other security and IT systems management tools (i.e. Splunk, ServiceNow) Responsible for developing and maintaining standard processes and operating procedures, creating technical architecture … diagrams and system build documentation. Responsible for operating the scanning tools and maintaining coverage along with supporting the vulnerability management and remediation teams in understating how to remediate vulnerabilities (i.e. laptops, VMs, wireless devices) Works with vulnerability management team to build asset repositories and asset scan policies Work closely with customer delivery managers to prioritize daily tasks More ❯
Cyber Security Operations Manager to lead our Cyber Security Operations Centre; responsible for managing the day-to-day operations of the SOC team, overseeing incident detection and response, ensuring vulnerabilityscanning and remediation efforts across the organization. Role Overview: Job Title: SOC Manager/Cyber Security Operations Manager Location: Leeds/England/Remote Contract Type: Contract Duration … preferred). Minimum 5 years of experience in cybersecurity operations, with at least 2 years in a leadership or management role. Strong knowledge of SOC operations, incident response, and vulnerability management best practices. Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel), vulnerability scanners (e.g., Nessus, Qualys), and other security platforms. Relevant certifications such as CISSP, CISM … regulated industries (e.g., finance, healthcare, critical infrastructure). Knowledge of compliance frameworks such as ISO 27001, NIST, GDPR, or CIS Familiarity with scripting or automation for incident response or scanning processes. Please feel free to contact myself - Daisy Nguyen at Gibbs Consulting/Atrium UK for a confidential chat to know more details about the role. Please also note More ❯
Platform (e.g., Cloud IAM, Security Command Center, VPC Service Controls) and Azure/M365 (e.g., Azure Security Center, Azure AD, Microsoft Defender for Cloud). Conduct regular security assessments, vulnerabilityscanning, and penetration testing of cloud infrastructure and applications. Monitor cloud environments for security threats, anomalies, and incidents, and lead incident response efforts. Collaborate with development, operations, and More ❯
Platform (e.g., Cloud IAM, Security Command Center, VPC Service Controls) and Azure/M365 (e.g., Azure Security Center, Azure AD, Microsoft Defender for Cloud). Conduct regular security assessments, vulnerabilityscanning, and penetration testing of cloud infrastructure and applications. Monitor cloud environments for security threats, anomalies, and incidents, and lead incident response efforts. Collaborate with development, operations, and More ❯
Act as the operational interface with the other organisation (the shared service provider) Maintain the CMDB and configuration item lifecycle tracking Lead on cyber security risk assessments , patch assurance , vulnerability management , and coordination with SOC/XDR providers Ensure compliance with cyber and data protection standards (e.g. Cyber Essentials) Monitor service level agreements (SLAs), escalate issues, and lead service … house/outsourced environment Deep knowledge of ITIL v4 practices, especially Incident, Problem, Change, and Asset Management Experience with service desk systems and CMDBs Familiarity with cybersecurity operations (e.g., vulnerabilityscanning, patch management, access reviews) Strong stakeholder engagement and supplier management skills Ability to maintain service performance under pressure and manage conflicting priorities A pragmatic, delivery-focused mindset … IT changes ASMG Asset ManagementLevel 5Owns and manages the asset lifecycle (including CMDB) SCTY Information SecurityLevel 5Applies and oversees operational security practices SURE Security OperationsLevel 4-5Coordinates patching, vulnerability management, incident response RLMT Stakeholder Relationship ManagementLevel 5Acts as customer liaison for IT service experience SUPP Supplier ManagementLevel 5Manages relationships and performance of service providers COPL Change and Transformation More ❯
Trainer to deliver a hands-on, penetration testing-focused training course to adult learners and career changers. What You'll Do: Teach live, online sessions focused on penetration testing , vulnerabilityscanning , and ethical hacking Help learners understand core cyber principles and real-world offensive security techniques Deliver engaging and accessible training sessions remotely, Monday to Thursday, 6pm to More ❯
Trainer to deliver a hands-on, penetration testing-focused training course to adult learners and career changers. What You'll Do: Teach live, online sessions focused on penetration testing , vulnerabilityscanning , and ethical hacking Help learners understand core cyber principles and real-world offensive security techniques Deliver engaging and accessible training sessions remotely, Monday to Thursday, 6pm to More ❯
or 4.18) Advanced Kubernetes knowledge, especially within enterprise OpenShift environments Proven experience migrating applications, infrastructure components, and operators Familiar with OpenShift core operators: HashiCorp Vault Red Hat Quay Clair (vulnerabilityscanning) Keycloak (IAM) Istio (Service Mesh) Able to support validation, configuration checks, post-migration testing, and documentation Additional Technical Skills Infrastructure as Code: Ansible and/or Terraform More ❯
Newcastle upon Tyne, Tyne and Wear, Tyne & Wear, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
scripts. Experience migrating applications and operators between OpenShift clusters. Hands-on familiarity with the following operators: HashiCorp Vault - secrets management Red Hat Quay - internal container registry Clair - container image vulnerabilityscanning Keycloak - identity and access management OpenShift Service Mesh (Istio) - microservices communications Additional Skills: Infrastructure as Code (Ansible/Terraform) CI/CD and GitOps (e.g. Jenkins, ArgoCD More ❯
infrastructure design, development, and review, with a specific focus on security. Proven track record of designing and documenting security solutions. Knowledge and experience with the design and implementation of vulnerabilityscanning solutions. Adaptive ability to consider new innovations and technologies within compressed timeframes. Strong presentation skills to robustly defend security designs to both peer and leadership positions. Benefits More ❯