of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security … in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & VulnerabilityAssessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including … date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerability management program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work with stakeholders to develop mitigation strategies. Conduct regular security More ❯
City of London, England, United Kingdom Hybrid / WFH Options
All the top bananas UK
understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: Vulnerability Analyst Location: London - We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular … role. Grade: GG11 Referral Bonus: £5000 What You'll Be Doing The Vulnerability Analyst is to manage the identification and analysis of security vulnerabilities and support required remediation across National Highways infrastructure (IT and OT). The Vulnerability Analyst will co-ordinate with various digital teams across NH … to ensure all vulnerability are addressed in a timely manner. The Analyst will continually improve vulnerability tooling and process while supporting the improvement of the security capability of National Highways through dashboard monitoring and retrospective assessments. Planning, execution and management of vulnerabilityassessment and scanning activities More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Proftech Talent
Threat Intelligence . Provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. Vulnerability Assessment. Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. Risk Management . Ability to identify IT … of the Security Operations, establishing and delivering methods and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management. Maintain operational security processes and ensure that all requests for support are dealt with, investigating security breaches where necessary. Support monitoring on external … security environment, gathering information on emerging threats to the business and presenting them to leaders where required. Plan vulnerabilityassessment and penetration testing activities within IT, providing expert advice where necessary in the review of vulnerabilityassessment tools and techniques. Contribute to risk management initiatives by More ❯
understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: Vulnerability Analyst Location: London - We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular … IT and OT). Co-ordinate with various digital teams across NH to ensure all vulnerabilities are addressed in a timely manner. Continually improve vulnerability tooling and process while supporting the improvement of the security capability of National Highways through dashboard monitoring and retrospective assessments. Plan, execute and manage … vulnerabilityassessment and scanning activities across the National Highway's networks, systems, and applications. Ensure vulnerability scans and assessments are run periodically in line with policies and standards across the IT, OT, and cloud infrastructure. Prioritise vulnerabilities based on their severity, exploitability, and potential business impact to More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient … Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerability scanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers, DevOps More ❯
will do: Design and implement robust, forward-thinking security strategies, policies, and procedures to safeguard our systems, networks, and data. Lead regular security assessments, vulnerability scans, and penetration tests to identify risks and deploy effective remediation measures. Monitor systems, networks, and logs for any signs of security incidents or … preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems, SIEM, antivirus, encryption, and vulnerabilityassessment tools. You own relevant certifications (Security+, IAT II/III level or similar). You excel in risk assessments, vulnerability management More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
Mission Aviation Fellowship
protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and … clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits … regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages (e.g. More ❯
teams to resolve performance issues and ensure business continuity. Monitor and maintain security infrastructure, including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence processes … while contributing to the organisation's long-term security maturity. What you'll be doing as a Senior Cyber Threat Intelligence Analyst: Cyber Threat Assessment: Support and lead cyber threat assessments and provide recommendations to technical, managerial, and executive stakeholders. Incident Response Support: Act as part of the incident … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth profiles of More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence processes … while contributing to the organisation's long-term security maturity. What you'll be doing as a Senior Cyber Threat Intelligence Analyst: Cyber Threat Assessment: Support and lead cyber threat assessments and provide recommendations to technical, managerial, and executive stakeholders. Incident Response Support: Act as part of the incident … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth profiles of More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence processes … while contributing to the organisation's long-term security maturity. What you'll be doing as a Senior Cyber Threat Intelligence Analyst: Cyber Threat Assessment: Support and lead cyber threat assessments and provide recommendations to technical, managerial, and executive stakeholders. Incident Response Support: Act as part of the incident … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth profiles of More ❯
analysis. • Understanding of Cloud platforms e.g., GCP, AWS, Azure and cloud databases is desirable. • Understanding of cybersecurity principles, including threat detection, incident response, and vulnerabilityassessment is preferable. • Strong knowledge of networking protocols, firewall rules, & network security practices to onboard & monitor network traffic. • Strong verbal and written communication More ❯
Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
have experience designing and implementing security measures that protect sensitive information in complex environments. Your technical expertise spans areas such as encryption, access controls, vulnerability assessments and incident response. You have excellent problem-solving skills and a proactive mindset, enabling you to anticipate potential threats and address them effectively. More ❯
Employment Type: Permanent, Part Time, Work From Home
ensure secure access and enforce the principle of least privilege. Implement AWS security services (WAF, Shield, GuardDuty, Inspector) to safeguard cloud resources. Perform regular vulnerability assessments and implement proactive measures to mitigate security risks. Lead security incident response, conduct root cause analysis, and deploy corrective actions. Automate security tasks More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Broadstone
external vendors to maintain robust cybersecurity measures. This is a hands-on, fast-paced role where you'll be involved in monitoring security, conducting vulnerability assessments, responding to incidents, and performing security audits. Plus, you'll have the opportunity to shape and improve our cybersecurity strategy, tools, and practices More ❯
Surrey, England, United Kingdom Hybrid / WFH Options
Premier Group
Responsibilities: Design, implement, and manage network security solutions (firewalls, VPNs, IDS/IPS) Monitor and respond to security incidents, perform root‐cause analysis Conduct vulnerability assessments and penetration tests Develop and maintain security policies, standards, and best practices Collaborate with infrastructure and application teams to integrate security controls What More ❯
Central London, London, United Kingdom Hybrid / WFH Options
MONTPELLIER RESOURCING ASSOCIATES LIMITED
and endpoint security. Cybersecurity & Risk Management: Establish and maintain cybersecurity governance frameworks (ISO 27001, NIST, Cyber Essentials). Manage security audits, penetration testing, and vulnerability assessments. Develop and implement security roadmaps compliant with FCA, PRA, and payment industry regulations. Oversee identity and access management systems. Lead incident response and More ❯
required, as well as overseeing and maintaining an outsourced SOC team and additional cyber security partners. Additionally, facilitating and overseeing audits, penetration tests and vulnerability assessments and driving remedial actions and improvements will form a large part of the role. Other accountabilities will include: Review, recommend and or update More ❯
We are seeking a dynamic and detail-oriented Cyber Security Business Analyst to join our clients team for an OT Asset & Vulnerability Project. This pivotal initiative aims to enhance our operational technology infrastructure by improving asset management and vulnerability processes. The project is preparing to enter the pilot … feedback, and driving improvements during the implementation phase. Key Responsibilities Collaborate with stakeholders to define project objectives, scope, and deliverables for the OT Asset & Vulnerability Project. Conduct requirements gathering sessions with users and translate these into detailed functional specifications. Analyze current workflows and identify areas for improvement in asset … and vulnerability management processes. Support the pilot phase by documenting outcomes, challenges, and insights to inform process adjustments. Facilitate workshops and feedback sessions to ensure user needs are met and processes are optimized. Develop comprehensive documentation, including user stories, process maps, and reporting templates. Work closely with technical teams More ❯