ASA), NAC, IPS/IDS, and SD-WAN. Understanding of Zero Trust Architecture, microsegmentation, and secure cloud networking (e.g., Azure, AWS, GCP). Experience with security information and event management (SIEM), threat intelligence, and vulnerability management. Excellent communication and documentation skills, with the ability to influence and educate stakeholders. Relevant certifications strongly preferred (e.g., CISSP, CCNP Security, CCIE … is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
end-to-end delivery of cyber security projects, ensuring alignment with business goals and compliance requirements Work across InfoSec, IT, risk, and compliance teams to deliver initiatives such as vulnerabilitymanagement, identity and access management (IAM), SIEM upgrades, and cloud security improvements Manage third-party vendors and internal stakeholders to ensure smooth project execution Develop and maintain … adhere to regulatory and governance frameworks Skills and Experience Proven track record delivering cyber security or information security projects in large, complex organisations Strong understanding of cyber risk, threat management, and technical security controls Excellent stakeholder management and communication skills Experience with governance, risk, and compliance frameworks (e.g., ISO 27001, NIST, GDPR) PRINCE2, PMP, or similar project managementMore ❯
Vulnerability Analyst Tenable SME Outside IR35 6 Months Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerabilitymanagement programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerabilitymanagement lifecycle from tooling and assessments to governance, reporting and stakeholder engagement. You ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerabilitymanagement process using Tenable . Develop, deploy and maintain a comprehensive vulnerabilitymanagement program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Vulnerability Analyst – Tenable SME – Outside IR35 – 6 Months – Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerabilitymanagement programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerabilitymanagement lifecycle — from tooling and assessments to governance, reporting and stakeholder engagement. You’ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerabilitymanagement process using Tenable . Develop, deploy and maintain a comprehensive vulnerabilitymanagement program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Kensington, West Holland Park, Greater London, United Kingdom
VIQU Limited
Vulnerability Analyst – Tenable SME – Outside IR35 – 6 Months – Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerabilitymanagement programme and Tenable is central to the role. As the SME, you … will own the end-to-end vulnerabilitymanagement lifecycle — from tooling and assessments to governance, reporting and stakeholder engagement. You’ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading … the end-to-end vulnerabilitymanagement process using Tenable . Develop, deploy and maintain a comprehensive vulnerabilitymanagement program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to More ❯
Cambridge, Cambridgeshire, England, United Kingdom
Hays Specialist Recruitment Limited
proficient in automation and orchestration tools (e.g., SOAR platforms, scripting languages like Python, PowerShell, KQL) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Key Skills and Experience Experience contributing to large-scale, sprint-based, security automation and detection engineering projects in a SOC/Cyber Defense or similar … Defence Operation's efficiency, scalability, and incident response capabilities.Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management.Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve operational efficiency.Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to build More ❯
various components. While having experience with implementing the Tenable solution key, this job also requires full-time hands-on administration of the Tenable system as well as managing the vulnerabilitymanagement aspect of the tool. Installing and Configuring Nessus, Nessus Manager, Nessus Agents, Log Correlation Engine, Nessus Network Monitor, and Security Center on both Linux/Unix and … Responsible for the Analysis and validation of the scan results. Responsible the Monitoring the dashboards. Responsible for defining and configuring dashboards Technical Skills & Competencies: 5+ years of experience in Vulnerabilitymanagement domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues Experience in the design and implementation of enterprise-wide security … controls to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. Demonstrated understanding of TCP/IP networking concepts and DNS. 3+ years of related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with More ❯
housing of our MSP-managed infrastructure in-house, resetting and rebuilding our Azure environment, embedding cyber security practices, and supporting business-as-usual (BAU) operations. Key Responsibilities: Leadership & People Management Lead and mentor the Helpdesk and Infrastructure teams through their respective leads. Ensure effective resource planning, performance management, and development across the teams. Foster a culture of accountability … collaboration, and continuous improvement. Operational Management Oversee daily IT operations, ensuring high availability, performance, and user satisfaction. Manage escalations and prioritisation of support issues. Monitor and report on key operational metrics (e.g. SLAs, uptime, incident response). Project Delivery Lead the transition of managed services infrastructure and service desk from MSP to in-house. Oversee the reset and rebuild … Embed cyber security practices into operational and project workflows. Collaborate with relevant stakeholders to ensure compliance with policies, standards, and regulations (e.g. ISO27001, Cyber Essentials). Manage risk assessments, vulnerabilitymanagement, and incident response processes. Stakeholder Engagement Act as a senior point of contact for internal stakeholders regarding IT operations and service delivery. Work closely with other business More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Harvey Nash
Senior VulnerabilityManagement consultant sought by leading investment bank based in London. **Inside IR35** - Hybrid working Daily responsibilities: Provide vulnerabilitymanagement expertise involving infrastructure, cloud and enterprise applications. Primary contact for the companies vulnerabilitymanagement involving processes, reporting, enhancements, compliance and interacting with business stakeholders. Operationalize weekly vulnerability status reports for senior leadership … including UK CISO on company vulnerabilitymanagement KPIs/KRIs Preparation of vulnerabilitymanagement process and procedure documentation Provide consulting services to the vulnerabilitymanagement team to assist in their security design to identify potential risks Review the security issues and recommend the appropriate controls to mitigate these risks Provide security awareness to clients … Provide support to other consultants through mentoring and peer reviews of work products as required Provide ad hoc consulting services to the general user community Essential: Experience working with vulnerabilitymanagement tools and data such as Tenable, Qualys, Rapid 7, Microsoft Defender, Aqua, Palo Alto Xpanse. Jira to manage project work, timelines and operational tickets. 5+years of relevant More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harvey Nash
Senior VulnerabilityManagement consultant sought by leading investment bank based in London. **Inside IR35** - Hybrid working Daily responsibilities: Provide vulnerabilitymanagement expertise involving infrastructure, cloud and enterprise applications. Primary contact for the companies vulnerabilitymanagement involving processes, reporting, enhancements, compliance and interacting with business stakeholders. Operationalize weekly vulnerability status reports for senior leadership … including UK CISO on company vulnerabilitymanagement KPIs/KRIs Preparation of vulnerabilitymanagement process and procedure documentation Provide consulting services to the vulnerabilitymanagement team to assist in their security design to identify potential risks Review the security issues and recommend the appropriate controls to mitigate these risks Provide security awareness to clients … Provide support to other consultants through mentoring and peer reviews of work products as required Provide ad hoc consulting services to the general user community Essential: Experience working with vulnerabilitymanagement tools and data such as Tenable, Qualys, Rapid 7, Microsoft Defender, Aqua, Palo Alto Xpanse. Jira to manage project work, timelines and operational tickets. 5+years of relevant More ❯
Bath, Somerset, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Infrastructure Security Analyst, SCCM, Vulnerability, Patch management, Qualys/Nessus Our client, a leading private sector business based in Bath, is looking to hire contractor with a background in infrastructure and related security. The successful candidate will be responsible for ensuring security and integrity for our clients IT infrastructure, taking responsibility for patching and vulnerability remediation for … patches to Windows servers to address vulnerabilities, ensuring compliance with security policies. Manage patching windows and downtime coordination with various business units to minimize disruption during updates. Monitor patch management systems to ensure all systems are up to date and protected from security threats. Server hardening to Windows systems, both physical and virtual. Maintain accurate documentation of remediation activities … incident response by applying emergency patches and remediations Contribute to disaster recovery and business continuity plans Skills and experience required: - Windows server including patching processes Server/security hardening. Vulnerabilitymanagement tools e.g. Nessus, Qualys, for conducting vulnerability assessments Hands-on experience in patch management systems - SCCM, WSUS, or Azure Update Management - for deploying patches More ❯
analysis and hands-on maintenance to solve the issues. Designing, implementing and maintaining SIEM dashboards and detection rules using Splunk. Monitor and investigate security alerts using the CrowdStrike Platform. Management of identity, MDM, or directory services via Jump cloud. Conducting regular vulnerability scans and risk assessments using Qualys. Play a key role within the SecOps team and collaboration … Experience of the Security Engineer: Proven experience as a Security Engineer. Strong experience with Splunk for log analysis and alerting. Proven hands-on experience with CrowdStrike. Deep understanding of vulnerabilitymanagement tools, Qualys preferred. Expertise with handling escalated security related tickets. Experience within the professional regulated services, preferably financial sector is desirable. The successful Security Engineer candidate will More ❯
Havant, Hampshire, United Kingdom Hybrid / WFH Options
Reed Technology
month FTC (with likely extension to permanent) Salary: 50 - 53K plus benefits We are seeking a Cyber Security Specialist to lead the implementation of a new Information Security Management System (ISMS) and ensure compliance with security standards. This role is crucial in driving security improvements, managing risks, and maintaining regulatory compliance within a dynamic IT environment of circa … IT users. Key Accountabilities: * Lead the implementation of a new ISMS, ensuring alignment with industry security standards. * Develop and maintain cyber security policies, procedures, and risk management frameworks. * Manage compliance with cyber security regulations, standards, and frameworks (ISO27001, CAF/eCAF, Cyber Essentials Plus). * Implement and manage security monitoring tools to detect and respond to security events. * Identify … with hands-on involvement in ensuring compliance to security frameworks (ISO27001, NIST, eCAF). * Proven experience in implementing security systems and/or monitoring tools. * Strong knowledge of SIEM, VulnerabilityManagement, Threat Intelligence, and IAM systems. * Experience contributing to enterprise-level security initiatives and aligning with industry standards. * Strong collaboration skills, including experience working with IT Operations teams More ❯
enhance the SOC's scalability, efficiency, and incident response readiness. Designed and fine-tune proactive and reactive detections in Sentinel - working closely with Threat Intelligence, IR, and Attack Surface Management teams. Partnered with SOC analysts to identify repetitive tasks and implement automation to boost day-to-day operational efficiency in areas like threat hunting and vulnerability management. Continuously More ❯
VulnerabilityManagement Architect 5 Month Contract Hybrid - travel to Bracknell and London, Pimlico as and when required Our Retail client is seeking a VulnerabilityManagement Architect to join their team on a 5-month contract basis. As a VulnerabilityManagement Architect, you will play a crucial role in modernising the company's vulnerabilitymanagement capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerabilitymanagement architecture Capture our vulnerabilitymanagement requirements and usage scenarios, captured as a set of patterns that a future solution will need to support Build out … evaluate the drivers and benefits for change Provide market assessment as appropriate, partnering with our procurement teams as needed Provide a validated and recommended strategy solution architecture for our vulnerabilitymanagement services (i.e. this is all about explaining how the elements of the solution will work together, vendor agnostic) Compile vendor solution options to address the above (with More ❯
Asset data and mature a ServiceNow-Splunk integration for enhanced security monitoring and incident response. • Configure and enhance ServiceNow SIR and SecOps modules to support CSOC incident response and VulnerabilityManagement capability. • Develop and maintain documentation for all configurations and customisations. • Collaborate with operational, business and security teams and stakeholders to translate requirements into technical solutions. • Design and … technical services and supporting infrastructure using CSDM best practices • Create and manage service portfolio definitions aligned with business outcomes Technical Skills • ServiceNow Platform & Applications • Service Mapping and Application Service Management • Service Graph Connectors and CI Class Manager • Top-down and bottom-up service mapping approaches • CSDM framework implementation and governance • Business Application portfolio management • Dynamic CI Group configuration … and documentation abilities • Experience working with programme/project delivery focused environment • Experience working with Scrum and Kanban Agile • Strong focus on security best practices • Team collaboration and stakeholder management skills • Understanding of business service modelling and service portfolio management • Ability to translate business requirements into CSDM data structures • Desirable skills; SIR and SecOps More ❯
Asset data and mature a ServiceNow-Splunk integration for enhanced security monitoring and incident response. • Configure and enhance ServiceNow SIR and SecOps modules to support CSOC incident response and VulnerabilityManagement capability. • Develop and maintain documentation for all configurations and customisations. • Collaborate with operational, business and security teams and stakeholders to translate requirements into technical solutions. • Design and … technical services and supporting infrastructure using CSDM best practices • Create and manage service portfolio definitions aligned with business outcomes Technical Skills • ServiceNow Platform & Applications • Service Mapping and Application Service Management • Service Graph Connectors and CI Class Manager • Top-down and bottom-up service mapping approaches • CSDM framework implementation and governance • Business Application portfolio management • Dynamic CI Group configuration … and documentation abilities • Experience working with programme/project delivery focused environment • Experience working with Scrum and Kanban Agile • Strong focus on security best practices • Team collaboration and stakeholder management skills • Understanding of business service modelling and service portfolio management • Ability to translate business requirements into CSDM data structures • Desirable skills; SIR and SecOps More ❯
and compliance status About You 3-5 years of experience in cyber security roles, with hands-on involvement in implementing frameworks like NIST, eCAF, or ISO27001 Experience in SIEM, VulnerabilityManagement, Threat Intelligence, and IAM tools Background in supporting enterprise-level security initiatives aligned with regulatory or certification standards If you're interested in hearing more about the More ❯
Strategic Resources European Recruitment Consultants Ltd
MAIN ACTIVITIES: Implement Critical Requirements: Ensure compliance with CR GR SSI 001, CR GR SSI 023, GS EP INS 135, and L2-OPS-17-001 across all assets. Incident Management: Review, investigate, mitigate, and resolve cybersecurity incidents, anomalies, and threats promptly. Cyber Security Road Map: Assist in delivering key activities and act as a delegate for the Lead Cyber … out UK government cybersecurity self-assessment reports. Solution Support: Roll out HQ security solutions, including administration and troubleshooting. Audits: Conduct site audits, recommend improvements, and track actions to completion. VulnerabilityManagement: Manage the client industrial cybersecurity vulnerability process and ensure timely patching. Training: Develop and maintain industrial cybersecurity training materials and competence procedures. Emergency Response: Create and … REQUIREMENTS: Essential Qualifications/Knowledge Required: Education: Relevant degree in Instrumentation and Controls, Computer Science, or Cyber Security. Experience: Prior relevant industry experience. Knowledge: Understanding of offshore operations, project management, and UK industry regulations. Expertise: In-depth understanding of IEC/ISA 62443 and OG-86. Management Skills: Experience managing contractors, vendors, and service providers. Communication: Effective communicator More ❯
Practice Leads and technical specialists. This role requires true Operational Technology Consulting experience and exposure to/hands-on experience with Cisco Cyber Vision. Role Requirements * Conduct cybersecurity and vulnerability criticality assessments of OT systems, categorising risks and recommending appropriate mitigation measures based on assessment findings. * Benchmarking cybersecurity posture of OT environments against industry standards (e.g. ISA/IEC … SP 800-82, ONG-C2M2, and NERC-CIP. * Technical Experience with: · Cisco CyberVision or Claroty · Security Orchestration, Automation, and Response (SOAR) platforms · OT asset inventory and change detection tools · Vulnerabilitymanagement solutions · OT network and communications monitoring tools · Familiarity with the Purdue Enterprise Reference Architecture (ISA-95) For more information or immediate consideration for this opportunity, please contact More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
CPS Group
the Practice Leads and technical specialists.This role requires true Operational Technology Consulting experience and exposure to/hands-on experience with Cisco Cyber Vision. Role Requirements* Conduct cybersecurity and vulnerability criticality assessments of OT systems, categorising risks and recommending appropriate mitigation measures based on assessment findings.* Benchmarking cybersecurity posture of OT environments against industry standards (e.g. ISA/IEC … SP 800-82, ONG-C2M2, and NERC-CIP.* Technical Experience with:· Cisco CyberVision or Claroty · Security Orchestration, Automation, and Response (SOAR) platforms· OT asset inventory and change detection tools· Vulnerabilitymanagement solutions· OT network and communications monitoring tools· Familiarity with the Purdue Enterprise Reference Architecture (ISA-95)For more information or immediate consideration for this opportunity, please contact More ❯
My client within the wealth management space I currently looking to bring in a Security VulnerabilityManagement Analyst on 6 month rolling contract. Please see below. Requirements: Strong understanding of vulnerabilitymanagement processes, procedures and principles Exposure to application security best practices such as secure coding, security testing techniques Expert knowledge of Security Policies and More ❯
My client within the wealth management space I currently looking to bring in a Security VulnerabilityManagement Analyst on 6 month rolling contract. Please see below. Requirements: Strong understanding of vulnerabilitymanagement processes, procedures and principles Exposure to application security best practices such as secure coding, security testing techniques Expert knowledge of Security Policies and More ❯
and vCente Managing and troubleshooting Linux servers (RHEL, CentOS, Ubuntu), including installation, configuration, and performance tuning. Implementing security best practices for Linux and VMware environments, including system hardening and vulnerability management. Using scripting languages like Python or Bash to automate tasks, manage infrastructure, and optimize performance Working with cross-functional teams to integrate Linux and VMware solutions within the More ❯
advice and guidance on secure development methodologies and tooling. Contribute to the design and implementation of secure infrastructure solutions. Key Skills and Experience: Proven expertise in Application Security and vulnerability management. Strong background in DevSecOps , including experience with CI/CD pipeline security integration. Familiarity with Cyber Assurance frameworks and practices. Hands-on development experience with security automation and More ❯