Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
london (city of london), south east england, united kingdom
Tosca
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
respond to Cyber Security Incidents Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others. Run VulnerabilityAssessment tools to measure compliance with security updates and security patches. Member of a Team who are responsible for making multiple daily CSOC checks to detect and respond … XDR and Microsoft Defender variants, and Elastic Security, or displays aptitude to learn how to work with a SIEM. Experience and knowledge of SIEM tools, Cyber Security Incident Response, Vulnerability Management and Cyber Threat Intelligence. Experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at it. More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
discussions. * Demonstrate proficiency with OWASP Top 10 and SANS Top 25 vulnerabilities, effectively communicating methodologies with development teams. * Utilise tools such as BurpSuite, Nessus, Nmap, Kali Linux, and other vulnerabilityassessment platforms. Essential Skills & Experience * Proficiency with penetration testing tools: Cobalt Strike, Caldera, Atomic Red Team, Pentera, Nessus, Burp, OSINT, etc. * Strong understanding of software testing methodologies and More ❯
Configure and maintain routers, switches, wireless systems, and firewalls. Deploy scalable, high-performance network solutions with minimal downtime. Conduct regular network maintenance, updates, and upgrades. Perform security audits and vulnerability assessments. Respond to and mitigate network security incidents. Automate network tasks and processes using scripting tools. Maintain comprehensive network documentation and diagrams. Collaborate with IT teams and third-party More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Devonshire Hayes Recruitment Specialists Limited
GDPR, etc.). Configure and monitor firewalls, intrusion detection/prevention systems, and endpoint security solutions. Support identity and access management, MFA, and secure network access policies. Conduct regular vulnerability assessments, patch management, and system hardening. Project Management & Delivery Lead infrastructure and network projects from scoping through delivery, ensuring quality, cost, and time objectives are met. Define technical requirements More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Devonshire Hayes
GDPR, etc.). Configure and monitor firewalls, intrusion detection/prevention systems, and endpoint security solutions. Support identity and access management, MFA, and secure network access policies. Conduct regular vulnerability assessments, patch management, and system hardening. Project Management & Delivery Lead infrastructure and network projects from scoping through delivery, ensuring quality, cost, and time objectives are met. Define technical requirements More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Devonshire Hayes
GDPR, etc.). Configure and monitor firewalls, intrusion detection/prevention systems, and endpoint security solutions. Support identity and access management, MFA, and secure network access policies. Conduct regular vulnerability assessments, patch management, and system hardening. Project Management & Delivery Lead infrastructure and network projects from scoping through delivery, ensuring quality, cost, and time objectives are met. Define technical requirements More ❯
london, south east england, united kingdom Hybrid / WFH Options
Citi
make strategic recommendations to senior manager on standards and policy changes Qualifications Experience or deep knowledge of key activities within software security group such Threat Modeling/Application Risk Assessment, Vulnerability Assessments, Governance and Metrics, Training, etc. Pre-requisites for this position are a Bachelor's Degree with 4 - 6 years' experience in web application development or application … of security, web-based and infrastructure vulnerabilities is required Experience in source code management, build and deployment technologies such as RLM, Ueploy, Jenkins, Artifactory, Maven, GitHub, etc Experience conducting vulnerability assessments and articulating security issues to technical and non-technical audience. Understanding of Snyk, Checkmarx, CDXGen, Dependency Track, Fortify, GitHub Adcance Security, Sonatype or Black Duck platform is a More ❯
sites and the Stone office. Key Responsibilities of the Senior ICS OT Cyber Security Engineer: Design and secure OT/ICS networks and cross-domain communications. Conduct threat modelling, vulnerability assessments, and red team exercises. Implement cybersecurity solutions, audit systems, and ensure compliance with relevant frameworks. Mentor junior team members and support project delivery. Maintain strong client and stakeholder More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Searchability NS&D
identify and document vulnerabilities, support red team operations, and collaborate with development and infrastructure teams to ensure effective remediation and security improvements. Key responsibilities include: Conducting penetration tests and vulnerability assessments across multiple environments Performing red team and threat simulation exercises Producing detailed reports outlining findings, risks, and mitigation strategies Staying current with emerging attack vectors, tools, and exploits … subject to required skills) your application to our client in conjunction with this vacancy only. KEY SKILLS: Penetration Tester, Ethical Hacker, Red Team, Cyber Security, OWASP, MITRE ATT&CK, VulnerabilityAssessment, OSCP, GPEN, CEH, CRTP, SC Cleared, NSD More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Searchability NS&D
identify and document vulnerabilities, support red team operations, and collaborate with development and infrastructure teams to ensure effective remediation and security improvements. Key responsibilities include: Conducting penetration tests and vulnerability assessments across multiple environments Performing red team and threat simulation exercises Producing detailed reports outlining findings, risks, and mitigation strategies Staying current with emerging attack vectors, tools, and exploits … subject to required skills) your application to our client in conjunction with this vacancy only. KEY SKILLS: Penetration Tester, Ethical Hacker, Red Team, Cyber Security, OWASP, MITRE ATT&CK, VulnerabilityAssessment, OSCP, GPEN, CEH, CRTP, SC Cleared, NSD More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Support bioinformaticians in building pipelines that are secure by design, version-controlled, and deployed through automated workflows. Collaborate with engineering teams to embed security throughout the development lifecycle. Automate vulnerability assessments to proactively identify and mitigate risks. Work closely with the security team to integrate best practices into new and existing features. Ensure compliance with security standards and regulations More ❯
Farnborough, Hampshire, United Kingdom Hybrid / WFH Options
Leidos
types of attacks and vulnerabilities. You will be responsible for planning and implementing appropriate security controls to ensure that the information within is kept secure. Key functions/outputs: Vulnerability Scanning & Reporting Endpoint Security Incident Management & Tickets System Hardening Change Work Participation in Regular Meetings Documentation Vulnerability Scanning & Reporting Code Scans: perform regular code scans to audit code … quality metrics, potential bugs, and security vulnerabilities. Vulnerability Management Tooling: perform regular Vulnerability Management Scans and ensure that the warehouse and plugins are kept up to date to capture new vulnerabilities. Reporting: assist the Vulnerability and Patch Manager with generating regular vulnerability management reports, which are to be provided to the cyber security and IA lead. … Assist in the design, reviews and updates to security enforcing functions (i.e. GPOs or System Policies) and system controls to ensure that they are compliant and fit for purpose. Vulnerability Assessments: conduct periodic assessments to identify and address potential vulnerabilities. Change Work: Security Impact Triage Tool (SITT): Assist in evaluation and impact assessment of system change to security More ❯
staff to support infrastructure needs and maintain comprehensive documentation of systems and procedures Security Management: implement and maintain security best practices for infrastructure, including patch management, antivirus solutions, and vulnerability assessments (Support) The automation of recurrent activities Propose harmonisation of existing automation developments. Participate in the Day-to-Day service support (incident, alerts, changes. Provide on-call support during More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
DMS Computer Recruitment
of the position include: Design and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments Participate More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯