in design, management, and troubleshooting of industrial control systems Proven experience in hardening both Windows and Linux operating systems Working knowledge of a vulnerability scanning tool such as Nessus, Qualys, OpenVAS, etc Working knowledge of a source control tool such as GIT, Subversion, CVS, etc Working knowledge of cloud security in a cloud platform such as AWS, Azure, Google Cloud More ❯
in design, management, and troubleshooting of industrial control systems Proven experience in hardening both Windows and Linux operating systems Working knowledge of a vulnerability scanning tool such as Nessus, Qualys, OpenVAS, etc Working knowledge of a source control tool such as GIT, Subversion, CVS, etc Working knowledge of cloud security in a cloud platform such as AWS, Azure, Google Cloud More ❯
to maintain secure network boundaries Support certificate and key management following encryption and PKI best practices Vulnerability, Threat, and Risk Management Automate vulnerability scanning and penetration testing using tools (Qualys, Nessus, OpenVAS) and custom scripts Coordinate third-party penetration tests and track remediation actions Conduct ongoing threat modelling, patch management, and risk assessments Perform regular configuration reviews, compliance checks, and More ❯
to maintain secure network boundaries Support certificate and key management following encryption and PKI best practices Vulnerability, Threat, and Risk Management Automate vulnerability scanning and penetration testing using tools (Qualys, Nessus, OpenVAS) and custom scripts Coordinate third-party penetration tests and track remediation actions Conduct ongoing threat modelling, patch management, and risk assessments Perform regular configuration reviews, compliance checks, and More ❯
to maintain secure network boundaries Support certificate and key management following encryption and PKI best practices Vulnerability, Threat, and Risk Management Automate vulnerability scanning and penetration testing using tools (Qualys, Nessus, OpenVAS) and custom scripts Coordinate third-party penetration tests and track remediation actions Conduct ongoing threat modelling, patch management, and risk assessments Perform regular configuration reviews, compliance checks, and More ❯
london (city of london), south east england, united kingdom
UIB (also known as Union Insurance Services)
to maintain secure network boundaries Support certificate and key management following encryption and PKI best practices Vulnerability, Threat, and Risk Management Automate vulnerability scanning and penetration testing using tools (Qualys, Nessus, OpenVAS) and custom scripts Coordinate third-party penetration tests and track remediation actions Conduct ongoing threat modelling, patch management, and risk assessments Perform regular configuration reviews, compliance checks, and More ❯
Key activities in relation to Penetration Testing & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing risks, and coordinating with stakeholders for remediation. • Key activities in relation to threat monitoring and response will include monitoring networks, systems, and applications for More ❯
Key activities in relation to Penetration Testing & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing risks, and coordinating with stakeholders for remediation. • Key activities in relation to threat monitoring and response will include monitoring networks, systems, and applications for More ❯
Key activities in relation to Penetration Testing & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing risks, and coordinating with stakeholders for remediation. • Key activities in relation to threat monitoring and response will include monitoring networks, systems, and applications for More ❯
newport, wales, united kingdom Hybrid / WFH Options
Logiq
EDR, anti-malware, and DLP. Monitoring & Threat Detection Operate and optimise SIEM tools (Splunk, Microsoft Sentinel) for proactive threat detection and incident response. Vulnerability Management Perform vulnerability assessments using Qualys and Tenable, driving remediation and continuous improvement. Compliance & Governance Align security controls with frameworks such as ISO 27001, NIST, CIS, and Cyber Essentials, supporting audits and certification processes. What We More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Logiq
EDR, anti-malware, and DLP. Monitoring & Threat Detection Operate and optimise SIEM tools (Splunk, Microsoft Sentinel) for proactive threat detection and incident response. Vulnerability Management Perform vulnerability assessments using Qualys and Tenable, driving remediation and continuous improvement. Compliance & Governance Align security controls with frameworks such as ISO 27001, NIST, CIS, and Cyber Essentials, supporting audits and certification processes. What We More ❯
bath, south west england, united kingdom Hybrid / WFH Options
Logiq
EDR, anti-malware, and DLP. Monitoring & Threat Detection Operate and optimise SIEM tools (Splunk, Microsoft Sentinel) for proactive threat detection and incident response. Vulnerability Management Perform vulnerability assessments using Qualys and Tenable, driving remediation and continuous improvement. Compliance & Governance Align security controls with frameworks such as ISO 27001, NIST, CIS, and Cyber Essentials, supporting audits and certification processes. What We More ❯
bradley stoke, south west england, united kingdom Hybrid / WFH Options
Logiq
EDR, anti-malware, and DLP. Monitoring & Threat Detection Operate and optimise SIEM tools (Splunk, Microsoft Sentinel) for proactive threat detection and incident response. Vulnerability Management Perform vulnerability assessments using Qualys and Tenable, driving remediation and continuous improvement. Compliance & Governance Align security controls with frameworks such as ISO 27001, NIST, CIS, and Cyber Essentials, supporting audits and certification processes. What We More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
in Computer Science, Information Security, or equivalent practical experience Familiarity with frameworks such as MITRE ATT&CK, NIST, ISO 27001, Cyber Essentials+ Hands-on experience with tools like Nessus, Qualys, SIEM, EDR, DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency More ❯
for continuous security posture monitoring. Implement RBAC, MFA, and Zero Trust principles to strengthen identity and access control mechanisms. Conduct vulnerability assessments and remediation using tools like Nessus, Tenable, Qualys, and Trivy. Ensure compliance with industry frameworks and regulations (ISO 27001, NIST 800-53, PCI DSS, HIPAA, FedRAMP, CJIS). Collaborate with application and infrastructure teams to embed security best More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
significant experience in cyber security or information security roles Familiarity with frameworks such as MITRE ATT&CK, NIST, ISO 27001, Cyber Essentials+ Hands-on experience with tools like Nessus, Qualys, SIEM, EDR, DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
TXP
significant experience in cyber security or information security roles Familiarity with frameworks such as MITRE ATT&CK, NIST, ISO 27001, Cyber Essentials+ Hands-on experience with tools like Nessus, Qualys, SIEM, EDR, DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency More ❯
educate, and share information with non-technical people Contribute to the growth and mentorship of other team members Detailed knowledge in the inner workings of vulnerability scanners such as Qualys, Rapid7, Tenable, etc. Experience with identifying product and market changes and needed analysis/detection coverage changes in your existing sources History of identifying product and market changes and needed More ❯
including prioritization, investigation, and tracking remediation activities. Evaluate new tools and techniques in security testing and articulate their value and impact. Operate vulnerability and configuration scanning tools, like Tenable, Qualys, InsightVM. Perform technical and non-technical risk and vulnerability assessments of relevant technology focus areas. Defining, creating and implementing various SOPs (Standard Operating Procedures) and SOMs (Service Operating Models). More ❯
Proven capability in creating and executing comprehensive threat and vulnerability management programmes, including vulnerability scanning, penetration testing, and security awareness training. Proficiency in using vulnerability scanning tools (e.g. Tenable, Qualys, Rapid7, Veracode, JFrog Xray), threat intelligence platforms, and incident response tools. Prior experience implementing automated solutions for vulnerability scanning, threat detection, and incident response, with a focus on continuous process … both technical and non-technical stakeholders, including executive leadership. Education/Qualifications/Technical Competencies Essential Recognised cybersecurity certification: CISSP and/or CISM Strong knowledge of: Ivanti LANDesk, Qualys, Splunk Windows Server/Desktop, RHEL/OEL Linux PowerShell and Python scripting Proven experience leading strategic security initiatives and process automation in large-scale environments Desirable Additional certifications: CCSP More ❯
and network devices What We're Looking For? Self-driven individual with relevant vulnerability management function experience. Proven experience with products dealing with vulnerability management services which include - Rapid7, Qualys, Nessus etc. Strong understanding on Windows systems, Linux systems Strong understanding on Networking Should have completed certifications like CEH, ECSA or other equivalent security certifications Degree in Information Technology, Engineering More ❯
Coventry, Warwickshire, United Kingdom Hybrid / WFH Options
NLB Services
OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
NLB Services
OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
leicester, midlands, united kingdom Hybrid / WFH Options
NLB Services
OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
binley, midlands, united kingdom Hybrid / WFH Options
NLB Services
OT environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯