of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security … in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & VulnerabilityAssessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including … date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerability management program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work with stakeholders to develop mitigation strategies. Conduct regular security More ❯
City of London, England, United Kingdom Hybrid / WFH Options
All the top bananas UK
understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: Vulnerability Analyst Location: London - We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular … role. Grade: GG11 Referral Bonus: £5000 What You'll Be Doing The Vulnerability Analyst is to manage the identification and analysis of security vulnerabilities and support required remediation across National Highways infrastructure (IT and OT). The Vulnerability Analyst will co-ordinate with various digital teams across NH … to ensure all vulnerability are addressed in a timely manner. The Analyst will continually improve vulnerability tooling and process while supporting the improvement of the security capability of National Highways through dashboard monitoring and retrospective assessments. Planning, execution and management of vulnerabilityassessment and scanning activities More ❯
understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: Vulnerability Analyst Location: London - We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular … IT and OT). Co-ordinate with various digital teams across NH to ensure all vulnerabilities are addressed in a timely manner. Continually improve vulnerability tooling and process while supporting the improvement of the security capability of National Highways through dashboard monitoring and retrospective assessments. Plan, execute and manage … vulnerabilityassessment and scanning activities across the National Highway's networks, systems, and applications. Ensure vulnerability scans and assessments are run periodically in line with policies and standards across the IT, OT, and cloud infrastructure. Prioritise vulnerabilities based on their severity, exploitability, and potential business impact to More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … relevant stakeholders and alleviate the workload of the IT Service desk function when required. The primary responsibilities of the role is to perform daily assessment of vulnerabilities identified by internal and external scans. Evaluate, risk assess and rate the results of the scan, prioritise all vulnerabilities discovered and remediate More ❯
will do: Design and implement robust, forward-thinking security strategies, policies, and procedures to safeguard our systems, networks, and data. Lead regular security assessments, vulnerability scans, and penetration tests to identify risks and deploy effective remediation measures. Monitor systems, networks, and logs for any signs of security incidents or … preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems, SIEM, antivirus, encryption, and vulnerabilityassessment tools. You own relevant certifications (Security+, IAT II/III level or similar). You excel in risk assessments, vulnerability management More ❯
analysis. • Understanding of Cloud platforms e.g., GCP, AWS, Azure and cloud databases is desirable. • Understanding of cybersecurity principles, including threat detection, incident response, and vulnerabilityassessment is preferable. • Strong knowledge of networking protocols, firewall rules, & network security practices to onboard & monitor network traffic. • Strong verbal and written communication More ❯
Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat More ❯
at the edge. Security Operations & Threat Defence Act as the technical escalation point for complex threat investigations and incident response. Lead red-teaming simulations, vulnerability assessments, and threat hunting activities. Support proactive telemetry monitoring and improvement of detection logic and alert fidelity. Leadership & Mentoring Provide engineering mentorship to junior More ❯
ensure secure access and enforce the principle of least privilege. Implement AWS security services (WAF, Shield, GuardDuty, Inspector) to safeguard cloud resources. Perform regular vulnerability assessments and implement proactive measures to mitigate security risks. Lead security incident response, conduct root cause analysis, and deploy corrective actions. Automate security tasks More ❯
Central London, London, United Kingdom Hybrid / WFH Options
MONTPELLIER RESOURCING ASSOCIATES LIMITED
and endpoint security. Cybersecurity & Risk Management: Establish and maintain cybersecurity governance frameworks (ISO 27001, NIST, Cyber Essentials). Manage security audits, penetration testing, and vulnerability assessments. Develop and implement security roadmaps compliant with FCA, PRA, and payment industry regulations. Oversee identity and access management systems. Lead incident response and More ❯
required, as well as overseeing and maintaining an outsourced SOC team and additional cyber security partners. Additionally, facilitating and overseeing audits, penetration tests and vulnerability assessments and driving remedial actions and improvements will form a large part of the role. Other accountabilities will include: Review, recommend and or update More ❯
stack. What Excites You Develop world-class security practices and controls within a high-growth financial technology business shaping the future of payments. Conduct vulnerability assessments, penetration testing, and risk analysis to identify and mitigate security weaknesses. Embed security by design and threat modelling principles into product development. Lead More ❯
Incident Response: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. Vulnerability Management Tools: Conduct regular vulnerability assessments, prioritize and remediate issues, and stay updated on emerging threats. Policy & Compliance Support: Help develop and enforce More ❯
teams to establish and enforce network access policies, ensuring that only authorized individuals and devices have the correct access privileges. Proactive Security Testing and Vulnerability Management Conduct vulnerability assessments and penetration testing to identify and address security weaknesses in mobile network architectures. Develop and enforce security policies and … together with system administrators and application owners to resolve discovered vulnerabilities by applying necessary patches or making configuration adjustments. Create and sustain a thorough vulnerability management program that includes tracking vulnerabilities, assessing risks, and planning remediation strategies. Engage in network security incident response efforts by providing technical expertise and … Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR, HIPAA, ISO 27001). In-depth understanding of routers, switches, firewalls, and switching/routing More ❯
Lambda, RDS). Proven experience in designing secure, scalable cloud architectures with a focus on security at every layer. Experience in conducting threat modeling, vulnerability assessments, and developing risk mitigation strategies. In-depth knowledge of AWS security best practices for IAM, encryption, and data protection. Familiarity with cloud security More ❯
s respoinsibilities: Contributing to building world-class security practices and controls within a high-growth financial technology business shaping the future of payments. Conducting vulnerability assessments, leading external penetration testing, and performing risk analysis to proactively identify weaknesses in our applications, systems, and networks. Developing and maintaining comprehensive security More ❯
to protect organization's data and systems - Monitor network traffic for potential security breaches and respond appropriately to incidents - Conduct regular security audits and vulnerability assessments to identify and address security risks - Collaborate with cross-functional teams to implement security policies and procedures - Provide technical support and guidance to More ❯
and optimal performance. Implement and maintain network security protocols, working closely with the cybersecurity team to safeguard systems. Conduct regular network performance tests and vulnerability assessments. Manage routers, switches, and other networking hardware and software. Collaborate with internal departments to understand and meet their network requirements. Maintain comprehensive documentation More ❯
expanding global enterprise. The OT Manager, Cybersecurity, will audit the Industrial Control System/Operational Technology (ICS/OT) environment and perform risk/vulnerability assessments leading to the development of an enterprise strategy/design plan. The OT Manager, Cybersecurity, will lead the team on implementation (hands-on More ❯
systems and multi-cloud platforms (AWS, Azure, Alibaba Cloud) Collaborate with engineering teams to integrate secure coding practices into the SDLC Conduct threat modeling, vulnerability assessments, and code reviews Automate security processes through CI/CD integration using SAST, DAST, and related tools Assess third-party vendors and enforce More ❯
systems and multi-cloud platforms (AWS, Azure, Alibaba Cloud) Collaborate with engineering teams to integrate secure coding practices into the SDLC Conduct threat modeling, vulnerability assessments, and code reviews Automate security processes through CI/CD integration using SAST, DAST, and related tools Assess third-party vendors and enforce More ❯
infrastructures across Python, C++, and Kotlin/Java environments, ensuring robust protection that supports high-speed, data-driven operations. You will conduct threat modelling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle and provide mentorship, guidance and More ❯
London, England, United Kingdom Hybrid / WFH Options
Client Server
infrastructures across Python, C++, and Kotlin/Java environments, ensuring robust protection that supports high-speed, data-driven operations. You will conduct threat modelling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle and provide mentorship, guidance and More ❯