Woking, Surrey, England, United Kingdom Hybrid / WFH Options
Nomad Foods
and standards that support risk mitigation and compliance efforts in line with industry standards. Play an active, hands-on role in security initiatives and GRC activities, including incident management, vulnerability assessments, and compliance reviews. Provide reporting to leadership committees and the Board. About you: We need someone who can communicate at all levels and with the ability to summarise More ❯
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
maintain virtualised environments (e.g., VMware, Hyper-V) to facilitate scalable and secure development processes. This includes configuring virtual machines, monitoring system health, and automating deployment workflows for seamless operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate … advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits, and patch management for both IT and OT systems. Collaborate with cybersecurity and product teams to address vulnerabilities, apply security patches … security settings. Virtualisation: Expertise in virtualisation technologies such as VMware and Hyper-V, with a demonstrated ability to set up, maintain, and optimise virtual environments for industrial applications. Cybersecurity & Vulnerability Management: Strong understanding of cybersecurity practices and vulnerability management for both IT and OT systems. Experience implementing vulnerability assessments reports, securing systems, and applying necessary patches or More ❯
london (new malden), south east england, united kingdom
Northrop Grumman UK
maintain virtualised environments (e.g., VMware, Hyper-V) to facilitate scalable and secure development processes. This includes configuring virtual machines, monitoring system health, and automating deployment workflows for seamless operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate … advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits, and patch management for both IT and OT systems. Collaborate with cybersecurity and product teams to address vulnerabilities, apply security patches … security settings. Virtualisation: Expertise in virtualisation technologies such as VMware and Hyper-V, with a demonstrated ability to set up, maintain, and optimise virtual environments for industrial applications. Cybersecurity & Vulnerability Management: Strong understanding of cybersecurity practices and vulnerability management for both IT and OT systems. Experience implementing vulnerability assessments reports, securing systems, and applying necessary patches or More ❯
maintain virtualised environments (e.g., VMware, Hyper-V) to facilitate scalable and secure development processes. This includes configuring virtual machines, monitoring system health, and automating deployment workflows for seamless operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate … advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits, and patch management for both IT and OT systems. Collaborate with cybersecurity and product teams to address vulnerabilities, apply security patches … security settings. Virtualisation: Expertise in virtualisation technologies such as VMware and Hyper-V, with a demonstrated ability to set up, maintain, and optimise virtual environments for industrial applications. Cybersecurity & Vulnerability Management: Strong understanding of cybersecurity practices and vulnerability management for both IT and OT systems. Experience implementing vulnerability assessments reports, securing systems, and applying necessary patches or More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
MFK Recruitment
and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerability management, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement long More ❯
system logs and network traffic to identify suspicious activity and potential threats. *Respond to security incidents and support forensic investigations. *Develop and maintain security protocols, policies, and procedures. *Conduct vulnerability assessments and recommend mitigation strategies. *Deliver cybersecurity awareness training and guidance to staff. *Maintain the information security risk register and support audit processes. *Collaborate with IT and operational teams … We are proud to be an equal opportunities employer. Keywords IT Security Specialist, Cybersecurity Analyst, SOC Analyst, Azure Security, Information Security, Firewalls, Intrusion Detection, Antivirus, ITIL, CISSP, Security Compliance, Vulnerability Management, Risk Register, Public Sector IT, Hybrid Role, Manchester Jobs, Security Awareness Training More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
pipelines for integration, development, and deployment. Implement and maintain monitoring systems. Maintain and enhance the team's cloud infrastructure. Promote and implement automation processes. Enhance security protocols by conducting vulnerability assessments and risk management to deploy cybersecurity measures. Technical Proficient in Terraform and AWS. Solid experience with CI/CD, ideally with GitLab CI and Jenkins. Extensive experience using More ❯
pipelines for integration, development, and deployment. Implement and maintain monitoring systems. Maintain and enhance the team's cloud infrastructure. Promote and implement automation processes. Enhance security protocols by conducting vulnerability assessments and risk management to deploy cybersecurity measures. Technical Proficient in Terraform and AWS. Solid experience with CI/CD, ideally with GitLab CI and Jenkins. Extensive experience using More ❯
pipelines for integration, development, and deployment. Implement and maintain monitoring systems. Maintain and enhance the team's cloud infrastructure. Promote and implement automation processes. Enhance security protocols by conducting vulnerability assessments and risk management to deploy cybersecurity measures. Technical Proficient in Terraform and AWS. Solid experience with CI/CD, ideally with GitLab CI and Jenkins. Extensive experience using More ❯
Design and implement secure-by-default controls as they relate to our software supply chain, AI model training systems, and deployment environments. Perform security architecture reviews, threat modeling, and vulnerability assessments to identify and remediate risks. Support Anthropic's responsible disclosure and bug bounty programs and participate in the Security Engineering team's on-call rotation. Accelerate the development More ❯
newport, wales, united kingdom Hybrid / WFH Options
Revoco
a Senior Cyber Security Engineer, you’ll play a key role in strengthening our security posture and driving continuous improvement across systems and networks. You will: Lead and implement vulnerability management programmes across multiple environments. Oversee incident response processes, from detection to resolution and post-incident review. Manage and optimise security tools , ensuring effective monitoring, detection, and prevention. Design … and maintain network security controls — including firewalls, intrusion detection/prevention, and segmentation. Conduct and oversee offensive security testing and vulnerability assessments. Ensure secure-by-design principles are embedded across development and infrastructure. Collaborate closely with engineering and product teams to identify and mitigate risks early. Contribute to a multidisciplinary cybersecurity taskforce , responding rapidly to emerging threats. 🧠 What We … re Looking For Strong understanding of OWASP Top 10 , MITRE ATT&CK , and evolving threat landscapes. Proven experience across vulnerability management, incident response, and network security . Ideally skilled in at least one programming language (e.g. Go, Python, Rust ). Experience managing or integrating security tooling (SIEM, endpoint protection, scanning tools, etc.). Hands-on experience with firewalls , network More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Revoco
a Senior Cyber Security Engineer, you’ll play a key role in strengthening our security posture and driving continuous improvement across systems and networks. You will: Lead and implement vulnerability management programmes across multiple environments. Oversee incident response processes, from detection to resolution and post-incident review. Manage and optimise security tools , ensuring effective monitoring, detection, and prevention. Design … and maintain network security controls — including firewalls, intrusion detection/prevention, and segmentation. Conduct and oversee offensive security testing and vulnerability assessments. Ensure secure-by-design principles are embedded across development and infrastructure. Collaborate closely with engineering and product teams to identify and mitigate risks early. Contribute to a multidisciplinary cybersecurity taskforce , responding rapidly to emerging threats. 🧠 What We … re Looking For Strong understanding of OWASP Top 10 , MITRE ATT&CK , and evolving threat landscapes. Proven experience across vulnerability management, incident response, and network security . Ideally skilled in at least one programming language (e.g. Go, Python, Rust ). Experience managing or integrating security tooling (SIEM, endpoint protection, scanning tools, etc.). Hands-on experience with firewalls , network More ❯
bath, south west england, united kingdom Hybrid / WFH Options
Revoco
a Senior Cyber Security Engineer, you’ll play a key role in strengthening our security posture and driving continuous improvement across systems and networks. You will: Lead and implement vulnerability management programmes across multiple environments. Oversee incident response processes, from detection to resolution and post-incident review. Manage and optimise security tools , ensuring effective monitoring, detection, and prevention. Design … and maintain network security controls — including firewalls, intrusion detection/prevention, and segmentation. Conduct and oversee offensive security testing and vulnerability assessments. Ensure secure-by-design principles are embedded across development and infrastructure. Collaborate closely with engineering and product teams to identify and mitigate risks early. Contribute to a multidisciplinary cybersecurity taskforce , responding rapidly to emerging threats. 🧠 What We … re Looking For Strong understanding of OWASP Top 10 , MITRE ATT&CK , and evolving threat landscapes. Proven experience across vulnerability management, incident response, and network security . Ideally skilled in at least one programming language (e.g. Go, Python, Rust ). Experience managing or integrating security tooling (SIEM, endpoint protection, scanning tools, etc.). Hands-on experience with firewalls , network More ❯