bath, south west england, united kingdom Hybrid / WFH Options
Revoco
a Senior Cyber Security Engineer, you’ll play a key role in strengthening our security posture and driving continuous improvement across systems and networks. You will: Lead and implement vulnerability management programmes across multiple environments. Oversee incident response processes, from detection to resolution and post-incident review. Manage and optimise security tools , ensuring effective monitoring, detection, and prevention. Design … and maintain network security controls — including firewalls, intrusion detection/prevention, and segmentation. Conduct and oversee offensive security testing and vulnerability assessments. Ensure secure-by-design principles are embedded across development and infrastructure. Collaborate closely with engineering and product teams to identify and mitigate risks early. Contribute to a multidisciplinary cybersecurity taskforce , responding rapidly to emerging threats. 🧠 What We … re Looking For Strong understanding of OWASP Top 10 , MITRE ATT&CK , and evolving threat landscapes. Proven experience across vulnerability management, incident response, and network security . Ideally skilled in at least one programming language (e.g. Go, Python, Rust ). Experience managing or integrating security tooling (SIEM, endpoint protection, scanning tools, etc.). Hands-on experience with firewalls , network More ❯
bradley stoke, south west england, united kingdom Hybrid / WFH Options
Revoco
a Senior Cyber Security Engineer, you’ll play a key role in strengthening our security posture and driving continuous improvement across systems and networks. You will: Lead and implement vulnerability management programmes across multiple environments. Oversee incident response processes, from detection to resolution and post-incident review. Manage and optimise security tools , ensuring effective monitoring, detection, and prevention. Design … and maintain network security controls — including firewalls, intrusion detection/prevention, and segmentation. Conduct and oversee offensive security testing and vulnerability assessments. Ensure secure-by-design principles are embedded across development and infrastructure. Collaborate closely with engineering and product teams to identify and mitigate risks early. Contribute to a multidisciplinary cybersecurity taskforce , responding rapidly to emerging threats. 🧠 What We … re Looking For Strong understanding of OWASP Top 10 , MITRE ATT&CK , and evolving threat landscapes. Proven experience across vulnerability management, incident response, and network security . Ideally skilled in at least one programming language (e.g. Go, Python, Rust ). Experience managing or integrating security tooling (SIEM, endpoint protection, scanning tools, etc.). Hands-on experience with firewalls , network More ❯
Tampa, Florida, United States Hybrid / WFH Options
Apetan Consulting
browser compatibility issues. Proficient in technical unit testing. Proficient in functional unit testing. Experience creating pull requests which include quality gates such as documentation, screenshots, gated builds, code coverage, vulnerability assessments, best practice comments, and peer comments. Will also be called upon to review other's pull requests. Good understanding of asynchronous request handling and partial page updates. Experience More ❯
Grand Prairie, Texas, United States Hybrid / WFH Options
Lockheed Martin
capture for Contract Research and Development (CRAD). • Demonstrated experience of advanced cyber research and development projects areas such as: embedded cyber resilient systems, software assurance, weapon system cyber vulnerability assessments, and other technologies. • Current knowledge of the DoD S&T (Science & Technologies) environment and acquisition process. Knowledge of technologies and products similar to or related to Lockheed Martin More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modeling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modeling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modeling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modeling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
warrington, cheshire, north west england, united kingdom
RED Global
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modeling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
Oracle Cloud Infrastructure The Oracle Threat and Vulnerability Management (TVM) team proactively identifies, assesses, prioritizes, and relentlessly drives the remediation of security weaknesses and vulnerabilities at scale across the total enterprise. The TVM team performs security assessments, vulnerability research, guides and advises mitigation strategies, and coordinates the response to zero-day and other urgent vulnerabilities. We ensure the … as that of their team, and has previous experience working in the cloud or hardware industry. This role is for a hands-on leader to drive day-to-day vulnerability assessments, deviation reviews, and remediation activities across cloud and non-cloud environments. Responsibilities Leading a diverse set of personalities and talent Understanding the importance of a healthy and supportive … from the most technical operator to senior leadership Maintain awareness of known vulnerabilities and work towards applying appropriate mitigations Guide and mentor security analysts and engineers as they perform vulnerability assessments Provide direction and advice on emerging threats, weaknesses, and security practices that may impact the security posture of Oracle Manage and lead the performance of vulnerability assessments More ❯
Role Overview Ipsotek is seeking a strategic and hands-on Security Lead to own and evolve our security posture across the business. This pivotal role will oversee security strategy , vulnerability management , and security operations (SecOps) , acting as the primary point of contact for all security-related matters within Ipsotek and externally with the Eviden Centre of Excellence . You … s security strategy aligned with business and regulatory requirements. Liaise with the Eviden COO and Eviden Centre of Excellence to ensure alignment with group-wide security standards and initiatives. Vulnerability Management, Penetration Testing & PSIRT Lead vulnerability assessments and coordinate penetration testing activities with external vendors and internal teams. Track and manage remediation efforts across infrastructure, applications, and cloud … Provide regular updates to leadership on risk posture and mitigation plans. Requirements Proven experience in a senior security role, ideally within a technology or SaaS environment. Strong understanding of vulnerability management, penetration testing, SecOps, and cloud security. Experience establishing or contributing to PSIRT processes. Experience working with cross-functional teams including engineering, operations, and client services. Excellent communication and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Ipsotek, an Eviden business
Role Overview Ipsotek is seeking a strategic and hands-on Security Lead to own and evolve our security posture across the business. This pivotal role will oversee security strategy , vulnerability management , and security operations (SecOps) , acting as the primary point of contact for all security-related matters within Ipsotek and externally with the Eviden Centre of Excellence . You … s security strategy aligned with business and regulatory requirements. Liaise with the Eviden COO and Eviden Centre of Excellence to ensure alignment with group-wide security standards and initiatives. Vulnerability Management, Penetration Testing & PSIRT Lead vulnerability assessments and coordinate penetration testing activities with external vendors and internal teams. Track and manage remediation efforts across infrastructure, applications, and cloud … Provide regular updates to leadership on risk posture and mitigation plans. Requirements Proven experience in a senior security role, ideally within a technology or SaaS environment. Strong understanding of vulnerability management, penetration testing, SecOps, and cloud security. Experience establishing or contributing to PSIRT processes. Experience working with cross-functional teams including engineering, operations, and client services. Excellent communication and More ❯
and capability to drive innovation are absolute mustDirect engagement with customer to provide support and understand customer needsAssist in responses to internal and external compliance audits, penetration tests and vulnerability assessments. More ❯
and capability to drive innovation are absolute mustDirect engagement with customer to provide support and understand customer needsAssist in responses to internal and external compliance audits, penetration tests and vulnerability assessments. More ❯
e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. Formulate HMG Information Assurance Risk Assessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST, CSF, and CSA … development of patterns and principles Working within environments utilising DevOps, DevSecOps, SRE, CI/CD, Infrastructure & Security as Code (Docker, Git, Terraform) Managing technical assessments of security related technologies, vulnerability assessments and penetration tools and techniques Enabling & informing risk-based decisions: Working with higher impact or more complex risks, advising on the impact and whether this is within risk More ❯
Poole, Dorset, England, United Kingdom Hybrid / WFH Options
Mexa Solutions LTD
week in the office) Scope : Work across IT, application, cloud, and physical security, no siloed remits here Responsibility : Be the go-to person for penetration testing, compliance audits, and vulnerability management Environment : Modern SaaS product environment, working alongside DevOps, engineering, and IT Growth : Get stuck into a wide variety of work, with support from leadership and autonomy to make … a real impact What you’ll be doing: Leading vulnerability assessments and coordinating regular penetration testing across systems and products Owning risk remediation actions, from security audits to PCI scans and compliance reporting Working across cloud (AWS), infrastructure, and software environments to ensure security best practices are embedded throughout Supporting the secure design of products and infrastructure, providing input More ❯
rapid incident response. 🌳 Cloud Security Enablement: Implement security tooling for Azure and hybrid environments, embedding security into DevOps workflows and CI/CD pipelines using GitHub Advanced Security . 🌳 Vulnerability Management: Lead enterprise-wide vulnerability assessments, remediation programmes, and Breach and Attack Simulation (BAS) exercises for proactive threat mitigation. 🌳 Compliance & Third-Party Security: Ensure adherence to PCI DSS … platforms such as Microsoft Defender for Cloud , Azure Security , or AWS Security . 🌳 Proficiency with security tools like Snyk , Datadog , CrowdStrike , or similar. 🌳 Knowledge of authentication, authorization, encryption , and vulnerability management . 🌳 Familiarity with secure coding practices and CI/CD pipeline security . 🌳 Certifications such as CEH , SSCP , or Elastic Security for SIEM are highly desirable. What We More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
DMS Computer Recruitment
of the position include: Design and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments Participate More ❯
information governance and IT risk management strategy and plan.Provide expert cyber security advice to senior stakeholders and technical teams across the organisation.Work directly with key stakeholders to facilitate risk assessment and risk management processes. Collaborate with all departments within the Trust (and ICS) where necessary to identify and disseminate high-quality information that facilitates effective cyber and information security … management and improvement.Use advanced analytic tools (artificial intelligence) to determine emerging threat patterns and vulnerabilities. Scoping and delivery of penetration tests and ensure actions from vulnerability assessments are resolvedLead on audit and audit preparation relating to IT securityMaintaining compliance with various standards in place e.g. Data Security and Protection Toolkit, CareCERT, Cyber Essentials+, Network and Information Systems Regulations etc. More ❯
is looking to take their career to the next level by having more input into organisations as you help them strengthen their security posture, conduct vital areas such as vulnerability analysis and security audits that meet recommended industry standards. You will be working closely with stakeholders in order to implement Cybersecurity strategies, manage client information and provide expertise across … Conduct detailed risk assessments and gap analysis for client environments Deliver control reviews and maturity assessments aligned to relevant frameworks (ISO 27001, NIST, CIS, Cyber Essentials/Plus) Perform vulnerability assessments and develop mitigation strategies Support the deployment of Managed Detection and Response (MDR), Penetration Testing, and Data Loss Prevention (DLP) solutions Advise clients on governance, incident response, and … Experience Proven experience in a Cybersecurity consultancy role Professional certifications such as CISSP or CISM Strong working knowledge of ISO 27001, NIST and Cyber Essentials/Plus Proficiency with vulnerability management, endpoint protection and SIEM tools The role is genuinely exciting with a forward thinking business who have their employees careers at the forefront of their minds and due More ❯
systems against ever evolving cyber threats, while ensuring compliance with Security standards. What will you be doing? Manage security controls across on prem and AWS environments. Lead incident response, vulnerability assessments and pentest co-ordination. Manage IAM systems and support Engineering teams with threat modelling and secure development practices. Own ISO27001, Cyber Essentials+, PCI-DSS and GDPR compliance. Manage … physical security (access control etc) What experience do you need? 2+ years experience within Cyber Security – hands on experience with SIEM, Vulnerability scanners and endpoint protection a plus! Cloud security knowledge Scripting skills (e.g. python, Powershell or Bash What to do next? If interested please click apply now to forward me an up to date copy of your CV. More ❯
IIoT solutions? Then this role is for you! Main Responsibilities Develop & enforce IIoT security policies Define standards for device hardening, authentication, encryption, patching, and secure connectivity. Perform risk and vulnerability assessments Identify threats in IIoT environments, assess system weaknesses, and propose mitigation measures. Ensure regulatory compliance Align all IIoT products and systems with the Cyber Resilience Act (CRA) , IEC … IEC 62443 , ISO/IEC 27001 , NIST SP 800-82 , or ENISA guidelines Secure software development lifecycle (SSDLC) and patch/update management Proven track record in risk and vulnerability assessments Certifications (advantage): CISSP, CISM, CEH, GICSP, or similar. Excellent teamwork, communication , and cross-functional coordination skills What You'll Gain : Work in an agile international environment with emphasis More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the criteria More ❯
Newark, New Jersey, United States Hybrid / WFH Options
eSolutionsFirst, LLC
breaches, records management and structured/unstructured data) Must have prior hands on experience reviewing code designs from a security standpoint Prior experience with Internal and External Applications Security Assessment Demonstrated experience with Secure Development Lifecycle Demonstrated experience with defending OWASP Top Ten Attack types Must have prior experience with SSL, and can articulate what it can/cannot … cover and why it's important Experience with C, Python, Ruby, C++ and other relevant languages Demonstrated experience with Vulnerability assessments, penetration testing and experience fixing vulnerabilities. Prior Data Encryption solutions experience Prior ITCAM/SOA experience Additional Qualifications/Knowledge: Prefer 5+ years of management experience Experience working in controlled regulatory environment is preferred Skills and Abilities Strong More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
RSM UK
enthusiastic Cyber Security Consultant to join our team. Working alongside our experienced team of specialists, you'll deliver offensive security services including digital footprint reconnaissance, social engineering, penetration testing, vulnerability assessments, and more to high-profile clients across all industries. The purpose of this role is to deliver offensive security services such as digital footprint reconnaissance, social engineering, vulnerabilityMore ❯