automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript More ❯
automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript More ❯
Responsible for driving company IT security, and stability of all IT systems and services. Responsibilities Implement and enforce cybersecurity best practices (ISO 27001, CE+, CIS benchmarks), including endpoint protection, vulnerabilityscanning, penetration testing, and incident response planning. Ensure compliance with regulatory standards such as GDPR Ensure best security practice for Office 365, Exchange Online, and SharePoint administration. Administer More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
for driving company IT security, and stability of all IT systems and services. Key Responsibilities: Implement and enforce cybersecurity best practices (ISO 27001,CE+, CIS benchmarks), including endpoint protection, vulnerabilityscanning, penetration testing, and incident response planning. Ensure compliance with regulatory standards such as GDPR Ensure best security practice for Office 365, Exchange Online, and SharePoint administration. Administer More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
log parsing, SIEM query languages (KQL, SPL, AQL), and automation with Python/PowerShell. Deep understanding of incident response, threat detection, and frameworks (MITRE, NIST, CIS). Knowledge of vulnerabilityscanning, penetration testing, and network traffic analysis. Familiarity with ITIL processes (Incident, Problem, Change). Excellent stakeholder communication, with the ability to mentor and lead from a technical More ❯
WAF, DDoS, VPN, perimeter firewalls, email/web security, MFA, SSO, PAM, MDM/MAM, and conditional access. Partnering with InfoSec to align platforms with overall security strategy. Supporting vulnerabilityscanning, remediation, and risk mitigation efforts. Collaborating with external penetration testers and ensuring compliance with frameworks such as ISO 27001, NIST, and CIS . Staying up to date More ❯
WAF, DDoS, VPN, perimeter firewalls, email/web security, MFA, SSO, PAM, MDM/MAM, and conditional access. Partnering with InfoSec to align platforms with overall security strategy. Supporting vulnerabilityscanning, remediation, and risk mitigation efforts. Collaborating with external penetration testers and ensuring compliance with frameworks such as ISO 27001, NIST, and CIS . Staying up to date More ❯
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerability management programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national security … standards Experience required Extensive hands-on CTI and vulnerability management experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerabilityscanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry-leading More ❯
North London, London, United Kingdom Hybrid / WFH Options
VERTECH GROUP (UK) LTD
security roles Strong knowledge of web/mobile security (OWASP Top 10, API security), cloud security (AWS), and CI/CD pipeline hardening Familiar with SAST/DAST tools, vulnerability scanners, penetration testing frameworks, and monitoring platforms (e.g. Splunk, ELK, Datadog) Understanding of GDPR and data privacy best practices Tremendous opportunity offering plenty of scope for career progression in More ❯
security roles Strong knowledge of web/mobile security (OWASP Top 10, API security), cloud security (AWS), and CI/CD pipeline hardening Familiar with SAST/DAST tools, vulnerability scanners, penetration testing frameworks, and monitoring platforms (e.g. Splunk, ELK, Datadog) Understanding of GDPR and data privacy best practices Tremendous opportunity offering plenty of scope for career progression in More ❯
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
london (city of london), south east england, united kingdom
Damia Group
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
Experience with SolarWinds or similar Experience with URL filtering (Censornet or similar) Any experience with SOC solutions is desirable but not essential. Artic Wolf of Rapid7 Experience with Internal vulnerabilityscanning and reporting. Ideally with Nessus by Tenable. Experience with Aruba SD-WAN (Silverpeak) or similar. Experience with Check point Harmony or similar. Experience with Extreme Networks for More ❯
Experience with SolarWinds or similar Experience with url filtering (Censornet or similar) Any experience with SOC solutions is desirable but not essential. Artic Wolf of Rapid7 Experience with Internal vulnerabilityscanning and reporting. Ideally with Nessus by Tenable. Experience with Aruba SD-WAN (Silverpeak) or similar. Experience with Check point Harmony or similar. Experience with Extreme Networks for More ❯
CI/CD pipelines, container workflows, infra-as-code, and deployment tooling Define and enforce access controls, auditing, and logging for internal services Evaluate and manage security tools (EDR, vulnerability scanners, SCA, etc.) Own and manage internal authentication (SSO, MFA, identity lifecycle) Secure endpoints, laptops, and internal systems Lead security awareness and employee training programs Drive SOC 1/ More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯