at the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Threat and Vulnerability Manager to protect DIT and the wider UK government from cyber threats in a fast paced and exciting role, responsible for the Vulnerability Management and Threat Hunting of … government from cyber threats in a fast paced and exciting role. Reporting to the Head of Cyber Security Operations, you will manage and be responsible for the Threat and Vulnerability Management function within the SOC, by providing leadership on identification and improvement opportunities, and ensuring service owners are aware of weaknesses in their security posture and are empowered with … be found. Main responsibilities Your day-to-day role will involve the need to: Working with the Security Leadership team to develop a strategic road map for an effective vulnerability detection, assessment, remediation, and threat intelligence program. Line management of the threat and vulnerability management team. Building sustainable relationships to champion the adoption of vulnerability and threat More ❯
configuration and real-time threat visibility Oversee firewall, VPN, and intrusion prevention configurations to maintain secure network boundaries Support certificate and key management following encryption and PKI best practices Vulnerability, Threat, and Risk Management Automate vulnerabilityscanning and penetration testing using tools (Qualys, Nessus, OpenVAS) and custom scripts Coordinate third-party penetration tests and track remediation actions … cloud and on-premise environments Strong knowledge of network security, endpoint protection, and cloud security principles Hands-on experience with security tools such as SIEM, EDR/XDR, and vulnerability scanners Understanding of regulatory frameworks including GDPR, ISO 27001, and FCA requirements Experience with scripting and automation (Python, PowerShell, or similar) Ability to analyze security incidents and recommend appropriate More ❯
Cyber Security Engineer CyberSec Engineer/IT Security Specialist – Disaster Recovery, Resilience Testing, CyberSec Improvements, VulnerabilityScanning/Management, Infrastructure, Nutanix, Commvault, VMware, Azure, PowerShell, Python; Law Firm, Permanent, London/Hybrid (3/2). £80k - £95k (On Experience) +Bonus +Benefits Global Low Firm seeks experienced Cyber Security Engineer/IT Security Specialist to join the IT … infrastructure tooling and at least one scripting language (PowerShell or Python preferred). Experience with Nutanix, VMware, Commvault, and hybrid cloud platforms Azure (preferred), AWS or GCP. Understanding of vulnerability management, monitoring, and orchestration tools. Relevant certifications such as Microsoft SC-200, Certified Ethical Hacker (CEH), CBCP/CBCI or equivalent. We are open to receiving applications from across More ❯
technical implementations and transitioning to support teams IT Operations/Service Management, ITIL knowledge Azure-based infrastructure deployments Project delivery within Agile, Prince2, or Waterfall frameworks Desirable: Microsoft Certifications Vulnerabilityscanning, Open Source security methodologies Teams telephony, Cisco/Meraki networking, Veeam Backup POS systems, SAN storage, Defender stack, Cloudflare, Cisco ASA/Firepower/ISE, FortiGate Key More ❯
technical implementations and transitioning to support teams IT Operations/Service Management, ITIL knowledge Azure-based infrastructure deployments Project delivery within Agile, Prince2, or Waterfall frameworks Desirable: Microsoft Certifications Vulnerabilityscanning, Open Source security methodologies Teams telephony, Cisco/Meraki networking, Veeam Backup POS systems, SAN storage, Defender stack, Cloudflare, Cisco ASA/Firepower/ISE, FortiGate Key More ❯
technical implementations and transitioning to support teams IT Operations/Service Management, ITIL knowledge Azure-based infrastructure deployments Project delivery within Agile, Prince2, or Waterfall frameworks Desirable: Microsoft Certifications Vulnerabilityscanning, Open Source security methodologies Teams telephony, Cisco/Meraki networking, Veeam Backup POS systems, SAN storage, Defender stack, Cloudflare, Cisco ASA/Firepower/ISE, FortiGate Key More ❯
technical implementations and transitioning to support teams IT Operations/Service Management, ITIL knowledge Azure-based infrastructure deployments Project delivery within Agile, Prince2, or Waterfall frameworks Desirable: Microsoft Certifications Vulnerabilityscanning, Open Source security methodologies Teams telephony, Cisco/Meraki networking, Veeam Backup POS systems, SAN storage, Defender stack, Cloudflare, Cisco ASA/Firepower/ISE, FortiGate Key More ❯
london (west end), south east england, united kingdom
Henderson Scott
technical implementations and transitioning to support teams IT Operations/Service Management, ITIL knowledge Azure-based infrastructure deployments Project delivery within Agile, Prince2, or Waterfall frameworks Desirable: Microsoft Certifications Vulnerabilityscanning, Open Source security methodologies Teams telephony, Cisco/Meraki networking, Veeam Backup POS systems, SAN storage, Defender stack, Cloudflare, Cisco ASA/Firepower/ISE, FortiGate Key More ❯
the day-to-day operation of security systems and tools, including firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus, anti-malware, SIEM (Security Information and Event Management), vulnerability scanners, and data encryption solutions. Manage vulnerability management programs, including regular scanning, penetration testing, and remediation of identified weaknesses. Lead and manage security incident response, including detection … Strong understanding of information security principles, frameworks (e.g., ISO 27001, NIST, Cyber Essentials), and best practices. Hands-on experience with security technologies such as firewalls, SIEM, IDS/IPS, vulnerability scanners, endpoint detection and response (EDR), and identity management solutions. Experience with cloud security (e.g., Azure Security). Proven experience in managing security incidents and conducting incident response. Familiarity More ❯
into our pipelines, automate compliance and help us ship fast without compromise. Key Responsibilities: Integrate security tools and practices into CI/CD pipelines (GitHub Actions, Jenkins, GitLab) Automate vulnerabilityscanning, code analysis, and container hardening Collaborate with developers to design secure architectures and threat models Monitor cloud infrastructure (AWS, Azure, GCP) for misconfigurations and anomalies Lead incident More ❯
analytics to enhance integrations and documentation. Key skills for this role Security & Compliance:o Implement and enforce security best practices across the platform, includingsecure coding, dependency management, and vulnerability scanning.o Ensure API security and access control using OAuth, API keys, JWT, and othermechanisms.o Monitor and remediate security vulnerabilities in third-party packages andlibraries.o Collaborate with security teams to More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
protocols and secure key lifecycle management - Securing microservices, APIs, and DevSecOps best practices Skilled in penetration testing and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerabilityscanning, remediation, and vendor management Collaborative mindset with the ability to partner across engineering, security, and product teams Desirable Skills: Hands-on configuration, deployment, and operation of ForgeRock More ❯
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
london (city of london), south east england, united kingdom
Ncounter Technology Recruitment
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
decisions around authentication, cryptography, and logging. You'll also ensure that tools such as SAST, DAST, and SCA are effective and efficient, and that testing programmes - including pen testing, vulnerabilityscanning, and bug bounty - are delivering value. You'll triage vulnerabilities, support engineering teams with practical mitigations, and contribute to documentation that strengthens our internal standards and processes. More ❯
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
london (city of london), south east england, united kingdom
Damia Group
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
experience building & enforcing technology standards, risk frameworks, & software asset policies. Control the adoption, contribution, and distribution of OSS across all engineering teams. Full OSS lifecycle selection, license review, onboarding, vulnerabilityscanning, and decommissioning. Comfortable working alongside Legal, Risk, Security, and Procurement. Translating license terms into enforceable technical and legal policies. Managing obligations that can lead to OSS license More ❯
experience building & enforcing technology standards, risk frameworks, & software asset policies. Control the adoption, contribution, and distribution of OSS across all engineering teams. Full OSS lifecycle selection, license review, onboarding, vulnerabilityscanning, and decommissioning. Comfortable working alongside Legal, Risk, Security, and Procurement. Translating license terms into enforceable technical and legal policies. Managing obligations that can lead to OSS license More ❯