Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
adoption. Evaluate and recommend security technologies, tools, and vendors. Investigate vulnerabilities and implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & Access Management, Privileged Access Management, Endpoint Security, and More ❯
in-depth technical support for the identification, investigation, and resolution of security vulnerabilities and threats Work with internal support teams to advise and guide vulnerabilityremediation , improving organisational resilience Collaborate with the Group and the Information Security Leader to support key security processes and contribute to agreed security … timely response, mitigation, and lessons learned 🧠 Skills & Experience Required Strong background in technical information security, with a focus on security controls, system hardening, and vulnerability management Demonstrated experience managing and operating enterprise-grade security tools and platforms (e.g., SIEM, DLP, endpoint protection, identity & access management) Familiarity with Microsoft security More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Net Talent
in-depth technical support for the identification, investigation, and resolution of security vulnerabilities and threats Work with internal support teams to advise and guide vulnerabilityremediation , improving organisational resilience Collaborate with the Group and the Information Security Leader to support key security processes and contribute to agreed security … timely response, mitigation, and lessons learned 🧠 Skills & Experience Required Strong background in technical information security, with a focus on security controls, system hardening, and vulnerability management Demonstrated experience managing and operating enterprise-grade security tools and platforms (e.g., SIEM, DLP, endpoint protection, identity & access management) Familiarity with Microsoft security More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
The Granite Group
available within the current infrastructure solutions as well as any shifts in technology and enhancements that would benefit the business Work with SecOps performing vulnerabilityremediation actions and updates, and audit processes. Keep abreast of known and emerging Infrastructure technologies, trends and tools. Work with InfoSec and DPA More ❯
prem infrastructure (network switches, firewalls, desktops, Linux/Windows systems) Automate operational tasks using Shell, PowerShell, Ansible , and other scripting tools Implement patching and vulnerabilityremediation across infrastructure Troubleshoot and resolve complex support issues (L2/L3) Assist in writing operational procedures alongside the Solutions team Monitor systems More ❯
prem infrastructure (network switches, firewalls, desktops, Linux/Windows systems) Automate operational tasks using Shell, PowerShell, Ansible , and other scripting tools Implement patching and vulnerabilityremediation across infrastructure Troubleshoot and resolve complex support issues (L2/L3) Assist in writing operational procedures alongside the Solutions team Monitor systems More ❯
Hyper-V, VMM. Experience building out full environments from scratch. Networking & Security: Familiarity with switching, routing, TCP/IP, endpoint encryption (McAfee EPO), Nessus vulnerability remediation. Tools & Automation: SCCM, Intune, WSUS, App packaging (PSADT), SQL, Robocopy, and compliance reporting. ITIL Framework: Working knowledge of service management and SLA-driven More ❯
Hyper-V, VMM. Experience building out full environments from scratch. Networking & Security: Familiarity with switching, routing, TCP/IP, endpoint encryption (McAfee EPO), Nessus vulnerability remediation. Tools & Automation: SCCM, Intune, WSUS, App packaging (PSADT), SQL, Robocopy, and compliance reporting. ITIL Framework: Working knowledge of service management and SLA-driven More ❯
and ensure compliance with ISO27001, HIPAA, and GDPR regulations. Key Responsibilities Conduct penetration testing on various hardware and software systems, identifying vulnerabilities and recommending remediation measures. Manage and support ISO27001, HIPAA, and GDPR compliance, ensuring adherence to regulatory frameworks and assisting with audits. Perform security assessments and risk analysis … Kali Linux, Metasploit, Wireshark, Nessus, or equivalent . Good knowledge of network security, firewalls, managed switches, and server configurations . Familiarity with SIEM tools, vulnerability scanning, and incident response . Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Preferred Qualifications Relevant certifications such as OSCP, CEH More ❯
and ensure compliance with ISO27001, HIPAA, and GDPR regulations. Key Responsibilities Conduct penetration testing on various hardware and software systems, identifying vulnerabilities and recommending remediation measures. Manage and support ISO27001, HIPAA, and GDPR compliance, ensuring adherence to regulatory frameworks and assisting with audits. Perform security assessments and risk analysis … Kali Linux, Metasploit, Wireshark, Nessus, or equivalent . Good knowledge of network security, firewalls, managed switches, and server configurations . Familiarity with SIEM tools, vulnerability scanning, and incident response . Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Preferred Qualifications Relevant certifications such as OSCP, CEH More ❯
partner with engineering teams and proactively identify, assess, and remediate security risks across our product portfolio. This role will focus on secure development practices, vulnerability management, threat modelling, and driving a shift-left security culture. The ideal candidate is a pragmatic problem solver with strong technical expertise in application … every phase-from design to deployment. Threat Modeling & Security Design Reviews: Conduct structured threat modelling and security assessments for new features, architectures, and services. Vulnerability Management & Remediation: Work closely with engineering teams to identify and remediate vulnerabilities from SAST, DAST, SCA, container security, and cloud security scans. Code More ❯
in a related field is a plus. Experience working with Oracle Solaris, AIX, or related enterprise Unix platforms. Familiarity with security standards, compliance, and vulnerabilityremediation processes. Previous experience working in a shift-based or out-of-hours support environment is advantageous. What we can offer you: Competitive More ❯
in a related field is a plus. Experience working with Oracle Solaris, AIX, or related enterprise Unix platforms. Familiarity with security standards, compliance, and vulnerabilityremediation processes. Previous experience working in a shift-based or out-of-hours support environment is advantageous. What we can offer you: Competitive More ❯
a Cybersecurity Architect, you will specialize in DevSecOps, integrating security into the software development lifecycle, automating security practices, and ensuring robust threat modeling and vulnerability management. Your primary focus will be on cloud-native and on-premises environments, with a strong emphasis on application security, infrastructure as code (IaC More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
The Successful Applicant Solid experience in AWS Security Practical experience in automation, scripting, track record in automating security process Experience in vulnerabilities assessment and remediation Experience in using Terraform or other infrastructure-as-code tools Strong understanding of information security principles and practices. Familiar with fast-paced environment What More ❯
set up, maintain, monitor, and secure their networks • Dealing appropriately with major incidents • Making sure appropriate steps are in place and followed for the remediation of vulnerabilities • Performing safe upgrades and patches where required • Providing accurate and informed security insights internally and with the organisation's customers • Making sure More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Hays
set up, maintain, monitor, and secure their networks • Dealing appropriately with major incidents • Making sure appropriate steps are in place and followed for the remediation of vulnerabilities • Performing safe upgrades and patches where required • Providing accurate and informed security insights internally and with the organisation's customers • Making sure More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Rentokil Initial plc
and values 4. Excellent investigative skills, problem-solving, insatiable curiosity, and an innate drive to win 5. Technical experience with system security vulnerabilities and remediation techniques for identity, data, and access controls 6. Experience with understanding of business needs and commitment to delivering high-quality, prompt, and efficient service More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
maintain control narratives, walkthroughs, and documentation of compliance processes. Audit Findings: Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit … the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. Vulnerability Management: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Barbara Houghton Associates Limited
and systems. • Plan for and execute the local Disaster Recovery drills and/or contingency process. • Monitor and manage the IT system vulnerabilities, take remediation actions to solve the relevant risks. • Provide support and validation for IT/system changes, Disaster Recovery drills and/or contingency process. Skills More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Barbara Houghton Associates Limited
and systems. • Plan for and execute the local Disaster Recovery drills and/or contingency process. • Monitor and manage the IT system vulnerabilities, take remediation actions to solve the relevant risks. • Provide support and validation for IT/system changes, Disaster Recovery drills and/or contingency process. Skills More ❯
ll do: Develop and implement security policies, procedures, and standards to ensure compliance with regulatory requirements and industry best practices. Coordinate regular security assessments, vulnerability scans, and penetration tests to identify and remediate security vulnerabilities. Monitor and analyze security events, investigate incidents, and provide response and remediation support. More ❯
operator customers in a global marketplace? What You'll Do: Enhance the security of our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical … NIST Framework, OWASP top ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to the More ❯
warrington, cheshire, north west england, United Kingdom
SearchWorks
operator customers in a global marketplace? What You'll Do: Enhance the security of our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical … NIST Framework, OWASP top ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to the More ❯
bolton, greater manchester, north west england, United Kingdom
SearchWorks
operator customers in a global marketplace? What You'll Do: Enhance the security of our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical … NIST Framework, OWASP top ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to the More ❯