role focuses on designing and implementing improvements to enhance their cybersecurity maturity, as measured by the NIST CSF v2 framework. You will primarily support VulnerabilityManagement improvements, dedicating your time to this key initiative, and helping to elevate their cyber resilience. Key Responsibilities: Improving Collaboration Between IT, Security … Leading Service Improvement Initiatives Focussed on Vulnerabilities Supporting Technology Integration Ensuring that security tools and platforms are integrated seamlessly into existing systems, enabling efficient vulnerability scanning Process Optimisation Define clear guidelines and ensure they align with industry good practices around vulnerabilitymanagement workflows and processes Desired experience … with: Familiarity with cyber security frameworks and standards (e.g., NIST Cybersecurity Framework, ISO 27001). Ideally an understanding of vulnerabilitymanagement processes, vulnerability tooling (e.g. Tenable), visualisation tools (e.g. Tenable One) and the complexities around remediation and patching. Ideally understanding of perimeter security technologies and practices, such more »
project objectives. Participate in Agile ceremonies such as daily stand-ups and work in 2-week sprints, following SAFe methodologies. Manage workloads using project management tools, ensuring timely delivery of tasks. Contribute to the security infrastructure, focusing on firewall estates. Triage customer requirements, converting them into actionable deliverables. Provide … for candidates with demonstrable experience and knowledge in the following areas: Enterprise-grade Next Generation Firewalls : Extensive experience with Fortinet and Palo Alto technologies. Management Platforms : Experience with tools like FortiManager and Panorama. Secure Access Service Edge (SASE) Platforms : Familiarity with secure access and edge solutions. Expert Troubleshooting : Ability … security architecture principles. Networking : Solid knowledge of routing, switching, and general network principles. Cloud Infrastructure : Experience with AWS and Azure environments. Cloud Security Posture Management (CSPM) : Understanding of cloud security best practices. VulnerabilityManagement & Email Hygiene Solutions : Experience with solutions such as Tenable and Mimecast. Enterprise Network more »
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Reed Technology
/3 days per week, with the rest WFH. Key Skills Proficiency in threat detection and response, with experience using SIEM, EDR, and VulnerabilityManagement tools. Experience With Microsoft Defender, Endpoint and Azure Sentinel specifically Experience in securing cloud services and enterprise applications, with a focus on IAM. more »
CEH) or Pentest+ - You will have good broad experience in multiple Cyber Security Pentesting areas such as Application Security/OWASP, Networking or Cloud VulnerabilityManagement, exploitation frameworks or scanning tools for example - Ideally you will have a good understanding of security compliance frameworks too such as ISO27001 more »
Leatherhead, Surrey, United Kingdom Hybrid / WFH Options
Proactive Appointments
Cyber Security Vulnerability Analyst Our client is urgently looking for an experienced Cyber Security Vulnerability Analyst to join their team on a contract basis, initially for 6 months with a view to extend. Please note, the role is INSIDE of IR35. The position is hybrid, with 2 days … on-site per week. Cyber Security Vulnerability Analyst - Key Skills: Vulnerabilitymanagement tools – able to scan parameters of websites as an example – tools such as Qualys Identify and manage vulnerabilities Attack Surface Management (ASM) and tools associated Escalations to developers Good Cyber Security background Cyber Security … Vulnerability Analyst Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted. Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities more »
CI/CD tools such as Jenkins, GitLab CI, CircleCI, etc. Skills: Strong understanding of security best practices, including secure coding, threat modeling, and vulnerability management. Experience with containerization and orchestration tools (e.g., Docker, Kubernetes). Proficiency in cloud platforms (AWS, Azure, GCP) and their security services. Strong scripting more »