automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript More ❯
automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript More ❯
automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript More ❯
Cyber Security Engineer CyberSec Engineer/IT Security Specialist – Disaster Recovery, Resilience Testing, CyberSec Improvements, VulnerabilityScanning/Management, Infrastructure, Nutanix, Commvault, VMware, Azure, PowerShell, Python; Law Firm, Permanent, London/Hybrid (3/2). £80k - £95k (On Experience) +Bonus +Benefits Global Low Firm seeks experienced Cyber Security Engineer/IT Security Specialist to join the IT … infrastructure tooling and at least one scripting language (PowerShell or Python preferred). Experience with Nutanix, VMware, Commvault, and hybrid cloud platforms Azure (preferred), AWS or GCP. Understanding of vulnerability management, monitoring, and orchestration tools. Relevant certifications such as Microsoft SC-200, Certified Ethical Hacker (CEH), CBCP/CBCI or equivalent. We are open to receiving applications from across More ❯
for the MSP's own security posture ensuring tools, processes, and teams meet the same standards we deliver to clients. They monitor measurable posture metrics (e.g., Microsoft Secure Score, Vulnerability etc.), ensure continuous improvement, and keep the MSP's security practice relevant through ongoing training, certifications, and emerging threat awareness. While day-to-day execution is delegated to Security … the Security Lead owns security end-to-end: identifying risks, embedding controls, and ensuring compliance is demonstrable. Key Responsibilities Client-Facing Lead Quarterly Security Reviews (QSRs), presenting patch/vulnerability posture, incidents, compliance status, and risk register updates. Translate technical security risks into clear business impact and outcomes. Own the client exception process, ensuring risks are documented, communicated, and … escalation point for clients when risks require senior involvement. Internal MSP Security Own the MSP's internal security frameworks and certifications (e.g., CE+, ISO, SOC 2). Oversee patching, vulnerability, and risk management of MSP-owned infrastructure and tools. Ensure MSP's technology stack (RMM, XDR, PSA, backup, etc.) is securely deployed and monitored. Drive staff security awareness, training More ❯
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding … a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
log parsing, SIEM query languages (KQL, SPL, AQL), and automation with Python/PowerShell. Deep understanding of incident response, threat detection, and frameworks (MITRE, NIST, CIS). Knowledge of vulnerabilityscanning, penetration testing, and network traffic analysis. Familiarity with ITIL processes (Incident, Problem, Change). Excellent stakeholder communication, with the ability to mentor and lead from a technical More ❯
threat hunting and tradecraft development Incident response and playbook development Change approvals (where applicable) Collection and interpretation of different sources of threat intelligence and researching emerging threats and TTPs. Vulnerabilityscanning, management and reporting This role includes an opportunity to operate in a management (within Accenture) and leadership capacity (within client) if this aligns with your personal career More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
protocols and secure key lifecycle management - Securing microservices, APIs, and DevSecOps best practices Skilled in penetration testing and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerabilityscanning, remediation, and vendor management Collaborative mindset with the ability to partner across engineering, security, and product teams Desirable Skills: Hands-on configuration, deployment, and operation of ForgeRock More ❯
protocols and secure key lifecycle management- Securing microservices, APIs, and DevSecOps best practices Skilled in penetration testing and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerabilityscanning, remediation, and vendor management Collaborative mindset with the ability to partner across engineering, security, and product teams Desirable Skills: Hands-on configuration, deployment, and operation of ForgeRock More ❯
Employment Type: Full-Time
Salary: £100,000 - £120,000 per annum, Negotiable, Inc benefits
Governance and Data Protection teams to ensure alignment. Vendor & System Assurance Conduct third-party security assessments and manage security clauses in supplier contracts and SLAs. Oversee penetration testing and vulnerabilityscanning of core systems, including client portals and emergency response platforms. People Management Lead and mentor a team of Analysts, ensuring high-quality output and continuous development. Create More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
AJ BELL BUSINESS SOLUTIONS LIMITED
the threats targeting AJ Bell and ensuring our defences provide and effective response. Key responsibilities: Reviewing and assessing Security Operations Centre alerts to ensure an appropriate response taken. Overseeing vulnerabilityscanning to confirm the effectiveness of patching Monitoring systems for compliance with policy and supporting remediation where required. Track and manage penetration testing programs. Investigate and respond to More ❯
Huddersfield, West Yorkshire, England, United Kingdom
Aindale KTD
customer training through to ongoing support Working on Cyber Essentials & IASME Assured Level 1 assessments Working on Cyber Essentials Plus & IASME Assured Level 2 (Audited) audits Carrying out Internal VulnerabilityScanning (including customising reporting) Carrying out External Penetration Testing (including customising reporting) Using enterprise level tools to analyse and assess vulnerabilities Assist with the evolving product and services More ❯
Hampshire Support : Full training and certification support provided Growth : Build on your 2nd line support experience and step confidently into cyber Variety : Get hands-on with patching, threat prevention, vulnerabilityscanning, phishing protection, and more Stability : Join a respected organisation with excellent benefits, including 26% pension and 43 days holiday What you’ll be doing: Managing system patching … perimeter Monitoring and responding using Microsoft Defender and Endpoint Protection tools Running phishing simulations and awareness training for staff Implementing data loss protection controls and securing Microsoft 365 Conducting vulnerability scans and acting on results Supporting continuous improvements in the business’s cyber security posture What we’re looking for: Experience in 2nd line IT support, infrastructure, or a More ❯
Essentials etc. SolarWinds, NetFlow and logicmonitor Extreme networks for Access points/switching. Checkpoint firewalls. Endpoint security - Checkpoint Harmony. Censornet for URL filtering Nessus by tenable for scanning. Internal vulnerabilityscanning and reporting SD wan Silver peak or HP Aruba SD wan Microsoft O365 and Entra ID Hybrid. Salary/Work pattern: Up to £85,000 per annum More ❯
NG1, Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
You are someone who loves to automate mundane tasks, make scalable, highly available, and robust solutions, and making sure whatever you’re working on is secure, through things like vulnerabilityscanning, threat analysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with More ❯
North London, London, United Kingdom Hybrid / WFH Options
VERTECH GROUP (UK) LTD
security roles Strong knowledge of web/mobile security (OWASP Top 10, API security), cloud security (AWS), and CI/CD pipeline hardening Familiar with SAST/DAST tools, vulnerability scanners, penetration testing frameworks, and monitoring platforms (e.g. Splunk, ELK, Datadog) Understanding of GDPR and data privacy best practices Tremendous opportunity offering plenty of scope for career progression in More ❯
and logging tools (Prometheus, Grafana, ELK stack) Work with a software development team to troubleshoot, build and deploy to environmental issues. Integrate security best practice into DevOps lifecycle including vulnerabilityscanning, secrets management and code quality JBRP1_UKTJ More ❯
and logging tools (Prometheus, Grafana, ELK stack) Work with a software development team to troubleshoot, build and deploy to environmental issues. Integrate security best practice into DevOps lifecycle including vulnerabilityscanning, secrets management and code quality JBRP1_UKTJ More ❯
and logging tools (Prometheus, Grafana, ELK stack) Work with a software development team to troubleshoot, build and deploy to environmental issues. Integrate security best practice into DevOps lifecycle including vulnerabilityscanning, secrets management and code quality TPBN1_UKTJ More ❯
CI/CD pipelines, container workflows, infra-as-code, and deployment tooling Define and enforce access controls, auditing, and logging for internal services Evaluate and manage security tools (EDR, vulnerability scanners, SCA, etc.) Own and manage internal authentication (SSO, MFA, identity lifecycle) Secure endpoints, laptops, and internal systems Lead security awareness and employee training programs Drive SOC 1/ More ❯
run smoothly. What you'll be doing: Implementing and maintaining security controls across network, cloud, endpoints, and core infrastructure Owning key technologies like firewalls, SIEM, EDR, VPN, NAC, and vulnerability scanners Driving vulnerability management and hardening across the estate Supporting and responding to security incidents across infrastructure services Embedding security into infrastructure changes (firewall rules, access reviews, cloud … network security within a complex enterprise environment Solid knowledge of: Firewalls, VPN, IDS/IPS, network security controls Endpoint security (EDR, anti-malware, DLP) SIEM tools (e.g. Splunk, Sentinel) Vulnerability management (e.g. Qualys, Tenable) Cloud (Azure and/or AWS) Hands-on experience supporting or responding to security incidents Familiarity with frameworks such as ISO 27001, NIST, CIS, Cyber More ❯