an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient … Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerability scanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers, DevOps More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and … clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits … regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages (e.g. More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Broadstone
external vendors to maintain robust cybersecurity measures. This is a hands-on, fast-paced role where you'll be involved in monitoring security, conducting vulnerability assessments, responding to incidents, and performing security audits. Plus, you'll have the opportunity to shape and improve our cybersecurity strategy, tools, and practices More ❯
Portsmouth, yorkshire and the humber, united kingdom
TalentHawk
We are seeking a dynamic and detail-oriented Cyber Security Business Analyst to join our clients team for an OT Asset & Vulnerability Project. This pivotal initiative aims to enhance our operational technology infrastructure by improving asset management and vulnerability processes. The project is preparing to enter the pilot … feedback, and driving improvements during the implementation phase. Key Responsibilities Collaborate with stakeholders to define project objectives, scope, and deliverables for the OT Asset & Vulnerability Project. Conduct requirements gathering sessions with users and translate these into detailed functional specifications. Analyze current workflows and identify areas for improvement in asset … and vulnerability management processes. Support the pilot phase by documenting outcomes, challenges, and insights to inform process adjustments. Facilitate workshops and feedback sessions to ensure user needs are met and processes are optimized. Develop comprehensive documentation, including user stories, process maps, and reporting templates. Work closely with technical teams More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. … problem-solving abilities to translate business requirements into technical solutions. Collaboration and Influence: Effective communicator capable of navigating organizational complexities and influencing without authority. Vulnerability Management: Expertise in managing vulnerabilities across diverse assets and implementing application security in cloud environments. Security tooling: experience in any of the following; (Wiz More ❯
efficiently, managing containment, eradication, and recovery to minimise impact. Continuously maintain, enhance, and optimise cybersecurity tools, systems, and processes for improved protection. Perform regular vulnerability assessments and coordinate effective remediation activities. Work closely with IT and other departments to promote and uphold security best practices across the organisation. Create More ❯
Newcastle upon Tyne, Tyne and Wear, Tyne & Wear, United Kingdom
Michael Page
IT infrastructure, including networks, servers, and cloud environments. Implement, monitor, and manage security solutions such as firewalls, IDS/IPS, and endpoint protection. Conduct vulnerability assessments on the infrastructure Ensure compliance with regulatory requirements (e.g., GDPR, ISO 27001) and industry best practices. Investigate security incidents, perform root cause analysis More ❯
Crewe, England, United Kingdom Hybrid / WFH Options
Customer Talent Search
incident and problem management, and service level compliance. They will also be responsible for defining and managing secure configurations, monitoring systems for threats, conducting vulnerability assessments, and managing penetration testing activities. Additionally, the role involves responding to third-party security inquiries (Infosec queries), assisting with audit activities, and ensuring More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
Collaborate with security teams to implement and maintain robust protections, including firewalls, VPNs, intrusion detection/prevention systems, and access control protocols. Conduct periodic vulnerability assessments, applying patches and updates to mitigate risks while maintaining compliance with regulatory standards. Proactively identify potential threats and design strategies to minimize security More ❯
of the product which effects thousands of employees and large enterprise clients. You will use technology such as AWS, Splunk, End Point Protection and Vulnerabilityassessment software. If this sounds like the start of something you want to know more about, then apply. More ❯
Bradford, Yorkshire, United Kingdom Hybrid / WFH Options
Freemans Grattan Holdings (fgh)
engineers QA teams and digital experience owners to improve DevOps best practices and workflows within an Agile framework. Implementing security measures, compliance policies, and vulnerability assessments following OWASP guidelines and applicable UK regulations such as UK-GDPR, UK Payment Services Regulations and PCI-DSS. Supporting disaster recovery planning and More ❯
leeds, west yorkshire, yorkshire and the humber, united kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
ethical hacking processes, analysing and identifying vulnerabilities, and reporting on opportunities to increase defence strength, and actionable recommendations. Key Responsibilities Threat modelling and simulation Vulnerability assessments Ethical hacking of networks, operating systems, and web application Utilise tools for SIEM, Data Loss Prevention, and endpoint detection Collaborate with third-party More ❯
greater manchester, north west england, united kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
ethical hacking processes, analysing and identifying vulnerabilities, and reporting on opportunities to increase defence strength, and actionable recommendations. Key Responsibilities Threat modelling and simulation Vulnerability assessments Ethical hacking of networks, operating systems, and web application Utilise tools for SIEM, Data Loss Prevention, and endpoint detection Collaborate with third-party More ❯
bolton, greater manchester, north west england, united kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
ethical hacking processes, analysing and identifying vulnerabilities, and reporting on opportunities to increase defence strength, and actionable recommendations. Key Responsibilities Threat modelling and simulation Vulnerability assessments Ethical hacking of networks, operating systems, and web application Utilise tools for SIEM, Data Loss Prevention, and endpoint detection Collaborate with third-party More ❯
ashton-under-lyne, north west england, united kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
ethical hacking processes, analysing and identifying vulnerabilities, and reporting on opportunities to increase defence strength, and actionable recommendations. Key Responsibilities Threat modelling and simulation Vulnerability assessments Ethical hacking of networks, operating systems, and web application Utilise tools for SIEM, Data Loss Prevention, and endpoint detection Collaborate with third-party More ❯
lead liaison to communicate and investigate non-conformities related to raw materials. Maintain seasonality calendars to identify challenging periods and mitigate potential shortfalls. Conduct vulnerability assessments and communicate/mitigate risks to the business. Assist the customer support team in building specifications and answering queries related to raw materials. More ❯
Cyber Essentials and Cyber Essentials Plus certification. Key responsibilities include: Delivering Cyber Essentials and Cyber Essentials Plus assessments for new and existing clients Conducting vulnerability assessments, workstation/server security build reviews and MS 365 security reviews. Maintaining a proactive approach to service delivery and effectively managing a busy … of networking, including how the OSI model works Proficiency with modern Microsoft Windows operating systems In addition, the following would be desirable: Experience conducting vulnerability scanning or using Nessus/Qualys Experience delivering Cyber Essentials/Cyber Essentials Plus assessments Experience with ISO 27001 or IASME Cyber Assurance Certifications More ❯
Responsibilities, Tasks & Interactions: Technical Contribution Support the OT Cyber Security team in delivering cybersecurity services to industrial control systems (ICS). Perform system hardening, vulnerability assessments, and network troubleshooting. Assist in compliance checks and ensure solutions meet industry standards (IEC 62443, NIST) and customer requirements. Support in the creation … Self-motivated and eager to learn, with a proactive approach to work. Clean UK driving license. Desirable : Familiarity with cybersecurity principles, including system hardening, vulnerability assessments, and intrusion detection. Knowledge of relevant cybersecurity frameworks and standards, such as IEC 62443 and NIST. Experience working in a high-hazard industry More ❯
Billingham, Cowpen Bewley, County Durham, United Kingdom
Risktec
Responsibilities, Tasks & Interactions: Technical Contribution Support the OT Cyber Security team in delivering cybersecurity services to industrial control systems (ICS). Perform system hardening, vulnerability assessments, and network troubleshooting. Assist in compliance checks and ensure solutions meet industry standards (IEC 62443, NIST) and customer requirements. Support in the creation … Self-motivated and eager to learn, with a proactive approach to work. Clean UK driving license. Desirable : Familiarity with cybersecurity principles, including system hardening, vulnerability assessments, and intrusion detection. Knowledge of relevant cybersecurity frameworks and standards, such as IEC 62443 and NIST. Experience working in a high-hazard industry More ❯