London, South East, England, United Kingdom Hybrid / WFH Options
Searchability
enjoys both technical implementation and supporting security frameworks such as Cyber Essentials. You will play a key role in deploying Microsoft security solutions and supporting client audits, assessments, and vulnerabilityremediation efforts. Responsibilities include: Delivering Microsoft security technologies including Defender XDR, Sentinel, and Endpoint Detection & Response Supporting Cyber Essentials and Cyber Essentials Plus audits and assessments Acting as … an escalation point for cyber incidents, security alerts, and engineering tasks Conducting vulnerabilityremediation and assessments (infrastructure and application level) Assisting with presales engagements and technical scoping Onboarding clients onto security management platforms Providing reporting, analytics, and technical support to clients and internal teams What will you need? Minimum 2 years' experience in a cyber security role, ideally … Meraki, Fortinet, WatchGuard) Excellent communication and client service skills Self-motivated and detail-oriented with strong problem-solving abilities What would be desirable? Experience deploying Tenable or Qualys for vulnerability management Knowledge of email security tools (e.g., Mimecast, Egress) Understanding of Azure Firewall and Defender for Cloud/Cloud Apps Experience conducting offensive security/web application assessments Strong More ❯
platforms leveraged by the business, and own documentation and expertise in resolution of relevant incidents, upgrades, and projects related to these Participate in security related exercises, such as patching, vulnerabilityremediation, security audit remediation tasks and cooperate with the Cyber Security team to ensure all actions are performed in a timely and compliant manner Understand the concepts More ❯
Conduct investigations of security related incidents Identify security vulnerabilities, perform solution security reviews and risk assessments, and partner with colleagues to respond to incidents and remediate system vulnerabilities. evaluate remediation Review, analyze and correlate security logs as well as improve SIEM solution. Strong knowledge in Security Cloud support for AWS, OCI, and Azure. Develop and maintain incident response playbooks More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
supporting documentation for secure cloud adoption. Evaluate and recommend security technologies, tools, and vendors. Investigate vulnerabilities and implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & Access Management, Privileged Access Management, Endpoint Security, and Network Security. Support compliance with More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ikhoi Recruitment
of Endpoint Detection and Response solutions including Sentinel One Deployment and management of networking solutions including firewalls, switches and access points including Cisco Meraki, Fortinet and Watchguard Deployment of vulnerability management solutions including Tenable and Qualys Deployment and management of email security solutions including Mimecast and Egress Main Tasks and Responsibilities Assisting with Cyber Essentials and Cyber Essentials Plus … audits and assessments Undertaking technical vulnerabilityremediation Providing escalation support for Cyber Security Incidents and Alerts from the SOC Team Providing Security Reporting and Analytics Undertake web application and offensive security assessments Undertake Microsoft 365 and Cloud security assessments Deployment of core Microsoft technology solutions including XDR, SIEM and Endpoint Detection and Response Security solution scoping including analysis More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
end client s, ensuring work is performed to the highest professional standards. Key Responsibilities Conduct thorough penetration tests on infrastructure, web applications, APIs, mobile applications, and cloud environments. Perform vulnerability and cloud assessments using a variety of tools and techniques. Document testing procedures, findings, and recommendations in detailed reports for both technical and non-technical audiences. Serve as the More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
alignment. Control Documentation: Develop and maintain control narratives, walkthroughs, and documentation of compliance processes. Audit Findings: Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and … and implementing recommendations to improve the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. Vulnerability Management: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong expertise in audit and compliance More ❯
risk. Ensure we are deploying solutions into a secure environment . Ensure we build solutions in alignment with our control requirements. Support on-going business-as-usual and champion vulnerability management. Provide internal security consultancy and lead on audit engagements, risk activities and project initiatives. Work closely with colleagues to ensure effective technology risk management. Work together . Collaborate … software engineering role, ideally with focus on security. Working knowledge of offensive security, Application and Infrastructure penetration testing (OWASP top 10, OWASP ASVS). Understanding of security vulnerabilities and remediation options in codebases & containers. Working knowledge of methods for authentication and authorization (ODIC, OAuth 2, FIDO 2, etc) Don't worry if you don't meet all the criteria More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
As a Senior Security Penetration Tester , you will be responsible for supporting the design, implementation, and maintenance of TVM (Threat & Vulnerability Management) solutions, controls and processes across the organisation. You will be liaising with Digital teams to ensure appropriate mitigation and remediation of vulnerabilities detected across our IT estate. This role requires an understanding of TVM concepts, technologies … Tester Help support and develop an internal penetration testing function. Conduct network, application penetration testing, code and security reviews. Identify and exploit vulnerabilities through proof-of-concept testing. Support vulnerability management across the enterprise, ensuring that a framework for identification, categorisation and mitigation exists and is implemented and maintained. Responsible for supporting the creation of the operating model for … vulnerability management, that it is shared, agreed and operates effectively across the business. Develop and maintain penetration testing documentation, policies, and procedures. Integrate cybersecurity solutions (e.g. vulnerability scanning tools) with existing systems, applications, and infrastructure. Evaluate and recommend technologies, tools, and vendors to meet business needs. Investigate newly identified cybersecurity vulnerabilities and provide appropriate mitigation actions. Liaise and More ❯
Solutions and Work Packages remain on-track. Responsibilities will also include but are not limited to: Assisting, preparing and undertaking Cyber Essentials Audits based on the IASME Standard Undertaking Vulnerability Assessments and remediation Undertaking penetration testing to include infrastructure, web applications and networks Assisting with client reporting and assurance audits Undertaking Cyber Essentials PLUS audits and assessments Providing More ❯