Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC … Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & Penetration Testing: Review Penetration Testing, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk … cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetration testing, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC … Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & Penetration Testing: Review Penetration Testing, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk … cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetration testing, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of More ❯
basildon, east anglia, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
ipswich, east anglia, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
peterborough, east anglia, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
norwich, east anglia, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
chelmsford, east anglia, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
colchester, east anglia, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
stevenage, east anglia, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
bedford, east anglia, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
cambridge, east anglia, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
watford, hertfordshire, east anglia, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
luton, bedfordshire, east anglia, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
hemel hempstead, east anglia, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
information systems. Governance Compliance: Develop, enforce, and monitor security policies, procedures, and standards in accordance with regulatory requirements. Risk Management: Conduct regular security audits, vulnerability assessments, and penetration tests to identify risks and recommend mitigation strategies. Incident Response: Lead and coordinate response efforts during security incidents, ensuring swift resolution More ❯
information systems. Governance Compliance: Develop, enforce, and monitor security policies, procedures, and standards in accordance with regulatory requirements. Risk Management: Conduct regular security audits, vulnerability assessments, and penetration tests to identify risks and recommend mitigation strategies. Incident Response: Lead and coordinate response efforts during security incidents, ensuring swift resolution More ❯
information systems. Governance Compliance: Develop, enforce, and monitor security policies, procedures, and standards in accordance with regulatory requirements. Risk Management: Conduct regular security audits, vulnerability assessments, and penetration tests to identify risks and recommend mitigation strategies. Incident Response: Lead and coordinate response efforts during security incidents, ensuring swift resolution More ❯
watford, hertfordshire, east anglia, United Kingdom
Taylor Hall recruitment
information systems. Governance Compliance: Develop, enforce, and monitor security policies, procedures, and standards in accordance with regulatory requirements. Risk Management: Conduct regular security audits, vulnerability assessments, and penetration tests to identify risks and recommend mitigation strategies. Incident Response: Lead and coordinate response efforts during security incidents, ensuring swift resolution More ❯
Ely, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
IT Governance Limited, a GRC Solutions Company
Conduct Cyber Essentials assessments to ensure compliance with IASME scheme guidelines. Assist clients in aligning with Cyber Essentials requirements and implementing effective solutions. Support vulnerability assessments and PCI DSS scanning services. Identify process improvements and contribute to automation opportunities with our Head of Cyber Essentials. We're seeking a More ❯
programming with at least one modern language such as Java, C++, or C#, including object-oriented design; Experience in penetration testing and exploitability-focused vulnerabilityassessment; Experience with platform-level security mitigations and hardening for Linux and Windows; Experience in professional, non-internship software development; Experience building test More ❯
programming with at least one modern language such as Java, C++, or C# including object-oriented design - Experience in penetration testing and exploitability-focused vulnerabilityassessment - Experience in platform-level security mitigations and hardening for Linux and Windows - Experience in professional, non-internship software development - Experience building test More ❯
equipment, including PLCs, HMIs, and VFDs Experience analyzing and improving ICS programs to meet industry standards Knowledge of cybersecurity functions such as risk management, vulnerability assessments, and security strategy Understanding of security systems including firewalls, intrusion detection, antivirus software, authentication, log management, and content filtering Ability to work with … and blogs Bachelor's degree Additional Qualifications: Experience with IEC 62443, NIST SP 800-82, NERC CIP, or other industrial control regulations Experience analyzing vulnerability and security risk assessment tools, including OT Passive Monitoring Tools Knowledge of cybersecurity tools, network topologies, intrusion detection, PKI, and secured networks Knowledge More ❯
PLCs, HMIs, and VFDs Experience analyzing and improving ICS programs to meet industry standards and best practices Knowledge of cybersecurity functions, including risk management, vulnerability assessments, and security strategies Understanding of security systems such as firewalls, intrusion detection, anti-virus software, authentication systems, log management, and content filtering Ability … white papers, and blogs Bachelor's degree Additional Qualifications: Experience with IEC 62443, NIST SP 800-82, NERC CIP, or similar regulations Experience analyzing vulnerability and security risk assessment tools, including OT Passive Monitoring Tools Knowledge of cybersecurity tools, network topologies, intrusion detection, PKI, and secured networks Knowledge More ❯