Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Proftech Talent
Threat Intelligence . Provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. Vulnerability Assessment. Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. Risk Management . Ability to identify IT … of the Security Operations, establishing and delivering methods and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management. Maintain operational security processes and ensure that all requests for support are dealt with, investigating security breaches where necessary. Support monitoring on external … security environment, gathering information on emerging threats to the business and presenting them to leaders where required. Plan vulnerabilityassessment and penetration testing activities within IT, providing expert advice where necessary in the review of vulnerabilityassessment tools and techniques. Contribute to risk management initiatives by More ❯
london, south east england, United Kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active … supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … relevant stakeholders and alleviate the workload of the IT Service desk function when required. The primary responsibilities of the role is to perform daily assessment of vulnerabilities identified by internal and external scans. Evaluate, risk assess and rate the results of the scan, prioritise all vulnerabilities discovered and remediate More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient … Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerability scanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers, DevOps More ❯
drive initiatives to design and implement security solutions for Azure and M365 environments, ensuring adherence to industry best practices and regulatory standards. Supplier Security Assessment: Evaluate and ensure the security posture of Material IT Suppliers, ensuring compliance with security standards and contractual obligations. Risk Assessment: Conduct risk assessments … analyze vulnerability and penetration testing reports, and develop risk mitigation strategies. Access Management: Help develop and maintain a robust Role-Based Access Control Framework, ensuring efficient management of access rights. Key Skills & Experience: Ideally a Degree in Computer Science, Information Security, or related field (or equivalent experience). Advanced … of security frameworks (e.g., NIST, ISO27000 series). Expertise in network security protocols, Azure security solutions, firewalls, intrusion detection systems, VPNs, etc. Proficient in vulnerabilityassessment tools, incident response frameworks, and risk management methodologies. Ability to collaborate effectively with cross-functional teams. Analytical mindset to interpret security data More ❯
client facing, to include leadership and executive management Draft root cause analysis reports and recommendations after cybersecurity incidents Identify risk areas that will require vulnerability prevention Stay current with Security technologies and make recommendations for use based on business value Skills & Qualifications Requirements SIEM administration, configuration, and optimization experience … endpoint protection solutions such as Cylance, Carbon Black, or CrowdStrike Understanding of network protocols coupled with experience with web proxies, web application firewalls, and vulnerabilityassessment tools. Experience working in a team-oriented, collaborative environment with a high level of analytical and problem-solving abilities Positive attitude with … strong oral and written communication skills Knowledge of IP networking and network security including Intrusion Detection Familiarity with common network vulnerability/penetration testing tools Familiarity with service management software such as ServiceNow Familiarity with data visualization platforms such as Domo Some experience with system hardening guidance and tools More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
UNAVAILABLE
protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and … clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits … regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages (e.g. More ❯
teams to resolve performance issues and ensure business continuity. Monitor and maintain security infrastructure, including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence processes … while contributing to the organisation's long-term security maturity. What you'll be doing as a Senior Cyber Threat Intelligence Analyst: Cyber Threat Assessment: Support and lead cyber threat assessments and provide recommendations to technical, managerial, and executive stakeholders. Incident Response Support: Act as part of the incident … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth profiles of More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence processes … while contributing to the organisation's long-term security maturity. What you'll be doing as a Senior Cyber Threat Intelligence Analyst: Cyber Threat Assessment: Support and lead cyber threat assessments and provide recommendations to technical, managerial, and executive stakeholders. Incident Response Support: Act as part of the incident … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth profiles of More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence processes … while contributing to the organisation's long-term security maturity. What you'll be doing as a Senior Cyber Threat Intelligence Analyst: Cyber Threat Assessment: Support and lead cyber threat assessments and provide recommendations to technical, managerial, and executive stakeholders. Incident Response Support: Act as part of the incident … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth profiles of More ❯
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
belfast, antrim, United Kingdom Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
lincoln, midlands, United Kingdom Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
northampton, midlands, United Kingdom Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
chesterfield, midlands, United Kingdom Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
wolverhampton, midlands, United Kingdom Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
newport, midlands, United Kingdom Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
shrewsbury, midlands, United Kingdom Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
west midlands, midlands, United Kingdom Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
leicester, midlands, United Kingdom Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
nottingham, midlands, United Kingdom Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯