sales engineering within a relevant sector. Experience in network technologies, and certification (NSE7, CCNA, CCNP, Network +, or similar). Experience in Cyber Security (Security Operations, Risk Mitigation, Incident Management, VulnerabilityManagement, or similar disciplines). Experience in Compliance and Governance (ISO (phone number removed), NIST, GDPR, Cyber Essentials, or similar frameworks). Can build and develop More ❯
Hatfield, Hertfordshire, South East, United Kingdom
COMPUTACENTER (UK) LIMITED
Life on the team The Vulnerability Governance Analyst role will manage processes to detect, prevent and correct vulnerabilities to devices in a customers environment. The SC-cleared analyst will aim to mitigate business risks arising from both regulatory & security noncompliance. What youll do Integrate with customer and third-party security operations centre reporting as well as integration with security … incident procedures Build, manage and update Vulnerability Lifecycle Management Product Lists (VLMPLs) for all supported customers Responding to and helping to co-ordinate the response to Major Vulnerability incidents Sending out notifications and communications related to security vulnerabilities that affect multiple technologies Creation and ownership of vulnerability incidents providing a Start to Finish level of incident … management Proactive identification of vulnerabilities Provide supporting information on potential impacts and mitigating actions for new threats or vulnerabilities from vendor, threat intelligence and subscriptions Establishing good practice vulnerability treatment throughout the customer estate, this includes implementing policy, hardening, patching and fixes of all supported technology Working closely with technical and non-technical teams to coordinate changes and More ❯
Bedford, Bedfordshire, England, United Kingdom Hybrid / WFH Options
Reed Talent Solutions
advice to the organisation, ensuring compliance with appropriate regulations and, generally, on information risk Experience of optimising security and IAM toolsets – including antivirus (Windows Defender), Office 365 Security & Compliance, vulnerabilitymanagement and patching. Entra ID management and improvements. Understanding of a broad range of security tools using Microsoft security tooling where possible, including but not limited to … to date with changes in cybersecurity and IAM improvements in technologies. Build and maintain methodology and technology used to implement Identity Governance and Administration (IGA) and Identity and Access Management (IAM) systems including SSO. MFA, Provisioning/Reconciliation, Federations, Access reviews. In-depth knowledge of multifactor authentication (MFA) architectures, Role-based Access Control (RBAC) and Attribute-based access control … cybersecurity audit findings and recommendations. Ability to work independently and as part of a team when required. Work collaboratively within Infrastructure Services and other IT functions to ensure effective management and delivery of Security and Identity and Access Management services. Provide a clear documentation for services and projects. You will need to demonstrate the following skills and experience More ❯
Rickmansworth, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Senior plc
development. Key responsibilities: Reporting to the Director of Information Security & Information Technology, you will be responsible for: - Build and own Seniors threat intelligence strategy. Develop and own the threat management program with regular assessments, threat modelling, risk prioritisation and remediation activities. The individual will serve as a subject matter expert incyber threat management, advising our various businesses on … requirements. Produce trusted, actionable, accurate and relevant threat information. Key skills and experience: An experienced threat intelligence lead (or similar). Expert in cybersecurity, with a focus on threat management and defensive security in regulated environments. Proficient in threat management, incident response and remediation tools. Strategic development in cyber threat intelligence research, process automation, knowledge sharing and team … MITRE ATT&CK, Cyber Kill chain). Experienced in using OSINT and security analysis tools (e.g. Shodan, Censys, Qualys, Virus Total, EDR, AV). Experience supporting incident response or vulnerabilitymanagement programs. Professional certifications in Cyber and Information Security (e.g. OCSP, GREM, CEH). Strong analytical and problem-solving abilities, translating complex technical issues into actionable recommendations. An More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
Cambridge, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
The One Group
improving how they work. Your mission: Develop scalable automation workflows that improve how we detect, respond to, and recover from threats. Streamline processes across threat intel, incident response, and vulnerabilitymanagement by eliminating repetitive manual tasks. Design and fine-tune SIEM detections that surface real signals and support both proactive and reactive actions. Collaborate across multiple cyber disciplines More ❯
Employment Type: Full-Time
Salary: £70,000 - £80,000 per annum, Negotiable, OTE
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
controls , including host firewalls , SELinux , and intrusion detection. Knowledge of networking fundamentals , especially from a security perspective. Experience working in highly governed environments with tight SLAs. Skilled in patch management and system update procedures. It would be great if you had: Experience with secure environments and familiarity with JSP 440 and SCIDA requirements. Proficiency in scripting (e.g., Bash , Python … for secure automation. Familiarity with vulnerabilitymanagement tools such as OpenSCAP and Nessus . Exposure to Red Hat deployment tools and secure system state management. If you are interested in this role but not sure if your skills and experience are exactly what were looking for, please do apply, wed love to hear from you! Employment Type: Full More ❯
Server, Active Directory, networking, and cloud services . Support day-to-day operations of Azure IaaS/PaaS , Microsoft 365 , Exchange Online , and related platforms. Administer and improve endpoint management via Intune , SCCM , and Autopilot. Ensure security compliance through MFA , Microsoft Defender , and proactive vulnerability management. Collaborate with internal support teams and third-party vendors to drive service … Azure AD) , and Microsoft 365 services . Experience managing Windows Server environments , Active Directory , GPOs , Hyper-V , and networking (DNS, DHCP, VPN, firewalls) . Skilled in endpoint and device management tools such as Intune , SCCM , and Jamf (for macOS) . Scripting and automation ability (e.g., PowerShell ). Understanding of ITIL principles and familiarity with ITSM platforms like ServiceNow or More ❯