SOC and Vulnerability Analyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload, but … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and Vulnerability Analyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality and More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
safeguard national interests What We're Looking For 1-3 years of practical experience in Cyber Security Good understanding of core security principles and tools Exposure to network security, vulnerabilitymanagement, or risk assessments (preferred) Familiarity with security frameworks such as ISO 27001, NIST, or PCI DSS (preferred) Professional certifications like Security+, CEH, or CISSP are desirable Analytical … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
Benefact Group plc
of the business, helping guide solutions that align with security and project requirements by articulating the real-world cyber security risks associated. You will also be responsible for our VulnerabilityManagement program ensuring that agreed SLAs are achieved and provide consultation when solutions are not straight forward. As the Senior Cyber Security Consultant, you will be providing mentorship … requests, you will provide subject matter expertise for internal projects and stakeholders, identifying risks and advising on the correct approach to mitigate those risks You will have responsibility for VulnerabilityManagement managing outputs from internal tooling and external vendors in order to prioritise remediation by relevant internal parties in order to ensure the identified risks are mitigated You … of the Team, fostering an inclusive, supportive and engaged learning environment, being a key contributor to a high performing and professional Security Team. Knowledge, skills and experience Strong stakeholder management skills A strong understanding of enterprise ICT and security principles A strong understanding of cloud security concepts and technologies Understanding of the CI/CD process and security integrations More ❯
systems, subsystems, products and external interfaces, and may include a mixture of operational cybersecurity functions and governance, risk and compliance (GRC) activities. Key responsibilities include: Perform systems security risk management activities, including identifying security threats, analysing the risk exposure and presenting treatment options to mitigate security risk. Conduct asset management including maintaining accurate inventories of all hardware and … software configuration items. Maintain change management, through evaluation of system changes for cybersecurity impact and updating any affected security authorisation artefacts. Perform vulnerabilitymanagement, including conducting automated vulnerability scans, using the provided toolset, to identify any open vulnerabilities and ensure they are appropriately documented, tracked and remediated in the given timeframes. Present cybersecurity solutions to non More ❯
Key Responsibilities Operate within a Security Operations Centre (SOC) or equivalent environment Monitor and respond to incidents using SIEM platforms Conduct system log analysis and threat detection Assist in vulnerability assessments and management Support incident resolution and reporting ?? Required Skills & Experience At least 2 years' experience in a dedicated Security Analyst role Hands-on experience with: SOC operations … SIEM tools Vulnerabilitymanagement Incident response and investigation Log and event analysis ?? Preferred Qualifications Industry certifications such as CompTIA Security+ or equivalent (desirable) Practical experience preferred over formal education ?? Security Clearance Requirements UK Nationals only Current SC clearance required DV preferred - or must be DV-eligible (as DV clearance will be needed) DV Bonus: 10% of base salary More ❯
Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Frontier Resourcing
encompassing software, hardware, and services-by embedding robust security controls throughout the development lifecycle, identifying and mitigating risks, and ensuring compliance with defence-grade standards. Key Responsibilities Risk Assessments & VulnerabilityManagement Conduct comprehensive security risk assessments at each product phase (design, implementation, deployment). Identify vulnerabilities in architectures, codebases, and configurations; drive remediation with development and operations teams. …/27005, NIST 800-30/53, JSP 440/604, Def Stan 05-series). Lead the creation and maintenance of security documentation (RMADS, Security Assurance Documents, Security Management Plans). Testing & Assurance Design and execute penetration tests and automated vulnerability scans; validate fixes. Oversee third-party security assessments as required. Continuous Improvement Drive security tooling and … security technologies; evangelise best practices across teams. Qualifications & Experience Proven experience (5+ years) in product or application security within defence, government, or security-cleared environments. Deep knowledge of risk management frameworks (ISO 27001/2/5/31000, NIST 800-series) and Defence Standards (JSPs, Def Stan 05-138/139). Hands-on experience with security testing More ❯
experience in a Security Analyst role , ideally in a SOC or equivalent environment. Proficiency in SIEM tools , system log analysis, and incident response. Strong understanding of data networks and vulnerabilitymanagement . SC Clearance (essential); must be eligible for DV clearance . UK nationality only (sole nationality required for this role). Relevant certifications (e.g. CompTIA Security+, CySA+ More ❯
successful candidate. You can expect: Design and manage scalable, secure cloud environments using Azure Bicep, ARM, or Terraform Lead the implementation of DevSecOps practices including CI/CD, secrets management, zero-trust security, and vulnerabilitymanagement Develop secure cloud-native architectures including microservices, containers, and serverless patterns Ensure compliance with industry security and privacy standards ( e.g. ISO … to succeed in this role Deep experience in Azure infrastructure (with IaC using Bicep, ARM, or Terraform) Hands-on knowledge of DevSecOps tooling and techniques (CI/CD, secrets management, threat modelling) Experience implementing security standards across cloud and hybrid environments Familiarity with container security ( e.g. Docker, Kubernetes) A strong understanding of compliance frameworks such as ISO 27001 and More ❯
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics … and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerabilitymanagement, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented with the ability to multi-task and prioritize efforts - Ability to express More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Thales Group
high-quality, secure, and scalable applications on the cloud with automated tools and scripts Work with the product owner to address user needs Participate in agile threat modelling and vulnerabilitymanagement Ensure compliance with security and regulatory requirements for MOD and high Design assurance software Support the Customer Enterprise/Solution Data Architects in coordinating the data landscaping More ❯
Exeter, Devon, England, United Kingdom Hybrid / WFH Options
Exposed Solutions
fostering a positive, motivated team environment. The Role Design, build, and maintain our cloud infrastructure, optimising for cost, security, and performance. Lead on system monitoring, security best practices, and vulnerability management. Drive development and optimisation of CI/CD pipelines and containerised environments. Develop and manage Infrastructure as Code (IaC) using Terraform. Provide Level 4 support and act as … Lambda, VPC, IAM, ECS, ECR, and CloudFront. Strong skills in Terraform, Jenkins/Bitbucket CI/CD pipelines, and Docker. Scripting and automation experience (bash, PowerShell, Python) and configuration management tools (Ansible, Puppet, or Chef). Familiarity with monitoring and logging tools such as CloudWatch, Prometheus, and Grafana. Certified AWS Solutions Architect Associate (or equivalent experience). Strong knowledge More ❯
Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Exposed Solutions
fostering a positive, motivated team environment. The Role Design, build, and maintain our cloud infrastructure, optimising for cost, security, and performance. Lead on system monitoring, security best practices, and vulnerability management. Drive development and optimisation of CI/CD pipelines and containerised environments. Develop and manage Infrastructure as Code (IaC) using Terraform. Provide Level 4 support and act as … Lambda, VPC, IAM, ECS, ECR, and CloudFront. Strong skills in Terraform, Jenkins/Bitbucket CI/CD pipelines, and Docker. Scripting and automation experience (bash, PowerShell, Python) and configuration management tools (Ansible, Puppet, or Chef). Familiarity with monitoring and logging tools such as CloudWatch, Prometheus, and Grafana. Certified AWS Solutions Architect Associate (or equivalent experience). Strong knowledge More ❯