Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Curveball Solutions
evolving business objectives. Drafting, maintaining and implementing information security policies and Standard Operating Procedures (SOPs). Configuring and overseeing mobile securityMDM (MAM/BYOD)to protect business continuity. Leading vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Authoring compelling tender responses, clearly demonstrating technical capability and strategic value. Enhancing Microsoft 365 security leveraging Purview, Conditional Access, MFA More ❯
Platforms, including data services, storage, networking, and security components. Monitor and optimize system performance, and implement corrective actions on a hybrid/private cloud-based platform. Conduct regular cybersecurity vulnerability assessments and penetration testing. Develop and maintain security incident response plans and procedures. Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. Deploy More ❯
Platforms, including data services, storage, networking, and security components. Monitor and optimize system performance, and implement corrective actions on a hybrid/private cloud-based platform. Conduct regular cybersecurity vulnerability assessments and penetration testing. Develop and maintain security incident response plans and procedures. Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. Deploy More ❯
Platforms, including data services, storage, networking, and security components. Monitor and optimize system performance, and implement corrective actions on a hybrid/private cloud-based platform. Conduct regular cybersecurity vulnerability assessments and penetration testing. Develop and maintain security incident response plans and procedures. Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. Deploy More ❯
Platforms, including data services, storage, networking, and security components. Monitor and optimize system performance, and implement corrective actions on a hybrid/private cloud-based platform. Conduct regular cybersecurity vulnerability assessments and penetration testing. Develop and maintain security incident response plans and procedures. Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. Deploy More ❯
Group leaders to embed best-in-class practices across industrial operations. Security Operations Maintain and oversee the cyber security framework for industrial and operational technology (OT) environments. Lead audits, vulnerability assessments, and improvement programmes to continuously strengthen our cyber security and resilience posture. Support programme initiatives to ensure secure operations across manufacturing and plant facilities. Incident Management & Response Act More ❯
associated systems. The SOC is chartered to prevent, detect, contain, and eradicate cyber threats through monitoring, intrusion detection, and protective security services to information systems. The SOC also conducts vulnerability assessments, analyzes cyber threats, monitors the email gateway, and collects information on and investigates and reports on all confirmed or suspected security incidents. An average day: As Project Manager More ❯
You'll Do • Maintain and enhance the security posture of classified information systems within DoD environments. • Collaborate with the ISSM and ISO to manage day-to-day cybersecurity operations, vulnerability mitigation, and RMF compliance. • Coordinate and document system security changes, continuous monitoring efforts, and configuration management activities. • Conduct audit reviews, security assessments, and generate compliance reports for internal stakeholders … and managing Risk Management Framework (RMF) processes and conducting security impact analysis. Core Skills & Tools Cybersecurity & Compliance • NIST 800-53, RMF, DoD 8500 Series, Security Authorization Packages • Continuous Monitoring & VulnerabilityAssessment • Configuration Management and System Recovery Systems & Platforms • Windows and Linux Operating Systems • Secure Media Handling Procedures • System Topology Design (Logical and Physical) Documentation & Audit • Security Assessments and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Copello
optimise, automate and improve relevant systems. The Role The Principal Security Analyst will support busy pods on more complex issues, lead and coordinate threat hunting activities, perform and lead vulnerabilityassessment activities and perform SIEM-based event analysis, incident triage and coordinate incident response activities. Furthermore, the Principal Security Analyst will actively collaborate with other analysts and enhance … IT Security Operations in large and complex organisations -Some coding ability Beneficial -Splunk -Palo Alto (XDR/XSIAM) -Skills in Forensics -Experience or interest in Reverse Engineering, Malware Analysis, Vulnerability Research -Industry recognised qualifications (eg. SANS, OSCP, ISC2) Security Clearance Eligibility for UK SC will be sought but wont be required from the start. Remote Working This role can More ❯
optimise, automate and improve relevant systems. The Role The Principal Security Analyst will support busy pods on more complex issues, lead and coordinate threat hunting activities, perform and lead vulnerabilityassessment activities and perform SIEM-based event analysis, incident triage and coordinate incident response activities. Furthermore, the Principal Security Analyst will actively collaborate with other analysts and enhance … IT Security Operations in large and complex organisations Some coding ability Beneficial Splunk Palo Alto (XDR/XSIAM) Skills in Forensics Experience or interest in Reverse Engineering, Malware Analysis, Vulnerability Research Industry recognised qualifications (eg. SANS, OSCP, ISC2) Security Clearance Eligibility for UK SC will be sought but won’t be required from the start. Remote Working This role More ❯
its adherence and updating or creating new processes for improvement and minimizing the wastage • Encouraging and building automated processes wherever possible • Identifying and deploying security measures by continuously performing vulnerabilityassessment and risk management • Incident management and root cause analysis • Coordination and communication with team and with customers both external and internal • Selecting and deploying appropriate CI/ More ❯
Configure and maintain Linux and Windows systems. Manage virtualized environments (e.g., VMware, VirtualBox). Troubleshoot networking issues, including IP address configuration and virtual NICs. 5. Security and Compliance: Conduct vulnerability assessments and remediation. Apply cybersecurity principles to ensure secure software and system design. Qualifications: Education: BS in Computer Science or equivalent technical field. Advanced degree preferred. Experience: 5+ years More ❯
implement corrective actions on current platform(s). - Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) - Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. - Develop and maintain security incident response plans and procedures. - Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. - Deploy More ❯
Security Operations Monitor OCI environments using tools like Oracle Cloud Guard and Oracle Security Zones. Respond to security incidents, conduct root cause analysis, and implement corrective actions. Perform regular vulnerability assessments and risk evaluations. Data Protection & Privacy Ensure encryption, tokenization, and secure handling of ePHI and other sensitive data. Conduct periodic audits to validate data protection controls and access More ❯
future of our cloud security posture, driving continuous improvement and strategic initiatives Accurately document cloud security configurations, processes, and knowledge, and effectively disseminate this information to other teams. Conduct vulnerability assessments and drive remediation for cloud infrastructure. Support requirements and evidence requested from auditors, compliance and regulators What you'll be working on As part of our Cloud Security More ❯
of security policies, technical controls, and procedural frameworks to ensure full compliance with DoD Information Assurance Risk Management Framework (DIARMF) standards and Marine Corps cybersecurity directives. Author detailed security assessment reports, System Security Plans (SSPs), and Risk Assessment Reports (RARs) for multiple Authority to Operate (ATO) packages. Conduct comprehensive security control testing and vulnerability assessments. Serve as … the primary technical expert for government customer interactions, delivering security posture briefings and technical demonstrations of cybersecurity capabilities. Administer critical cybersecurity platforms including Varonis data security and ACAS vulnerability scanning tools. Provide technical mentorship and guidance to junior cybersecurity personnel while conducting security assessments. Lead training initiatives on RMF processes, security tool administration, and incident response protocols for team … development. Execute immediate response actions for Information Assurance Vulnerability Assessments (IAVAs), IAV Bulletins, and Marine Corps Directives. Apply security patches, update system configurations, and validate remediation efforts across the enterprise infrastructure. Implement Security Technical Implementation Guides (STIGs) through direct system configuration and automated compliance scripting. Monitor network security posture through daily analysis of security logs, vulnerability scan results More ❯
Office, Security Operation Centre of Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and in line with local regulations.The ideal candidate will be responsible for managing information security systems, ensuring compliance with … respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on … MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Experience with security tools and technologies such as intrusion detection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for More ❯
Assurance Benchmarks for Supporting Infrastructure The general engineer should also have a working knowledge of USAF Civil Engineering governance, programming, and processes. The general engineer will conduct a thorough vulnerability assessments across various infrastructure elements, such as water, wastewater, electricity, heating, ventilation, and air conditioning (HVAC), petroleum products, fire protection systems, generators, and natural gas systems. A crucial aspect … of this position involves performing structural engineering vulnerability assessments that address perimeter security. Experience: Minimum 10 years operational experience in the military or other comparable civilian position in structural or civil engineering role. Extensive experience with all the following blast software: VulnerabilityAssessment and Protection Option (VAPO), Component Explosives Damage Assessment Workbook (CEDAW), Conventional Weapons Effects … Engineering Design Manuals. Working knowledge of issues and threats driving Design Based Threat (DBT) for military and Government facilities and construction programs. Ability to determine effects of blast, damage assessment, and physical barriers to mitigate blast affects. Excellent written and verbal communication skills. Education: Possess a Bachelor's of Science degree in Civil or Structural Engineering. Desired Skills: PhD More ❯
environment to support the specification, development, and application of computer security technologies, cybersecurity and information assurance management techniques to DoD systems. Tasks may include: Leading systems engineering teams Leading Assessment and Authorization (A&A) activities for DoD Systems in accordance with Risk Management Framework Supporting traditional systems engineering tasks such as CONOPS, requirements development and allocation, cyber design engineering … and assessing system security plans including, security concepts of operation, risk management matrix, security control traceability matrix, security test procedures, and plan of action and milestones Conducting and analyzing vulnerability assessments to validate system compliance with RMF controls and DISA Security Technical Information Guidelines (STIG) Analyzing static code scans and dynamic code scans to validate Application Security and Development … A tools: ACAS Nessus, SCAP Scanner, STIG Viewer Demonstrated expertise in national Cybersecurity policies, DoD A&A processes and procedures and industry best practices on complex systems Expertise in vulnerabilityassessment, control allocation and risk mitigation Preferred Skills and Education: Other cyber certifications (CISSP-ISSAP, CISSP-ISSEP, CCSP, CEH, OSCP, etc.) Top Secret/SCI security clearance by More ❯
maintain security controls and monitoring throughout the software development lifecycle (SDLC). Automation: Develop automated security processes and tools to detect and prevent vulnerabilities in CI/CD pipelines. Vulnerability Management: Conduct regular vulnerability assessments, penetration testing, and ensure timely remediation of findings. Protect all company data, especially sensitive information, from internal and external threats by creating comprehensive … for detail and an ability to multitask in a fast-paced environment Strong abilities in critical thinking, problem-solving, logic, and forensics Knowledge of security tools like SAST, DAST, vulnerability scanners, and SIEM solutions. Familiarity with scripting languages (Python, Bash, etc.) and automation frameworks. In depth knowledge of application security principles, OWASP Top 10, and threat modeling. Proficiency in More ❯
standards. Key Responsibilities Develop comprehensive test plans, automated test scripts, and test cases to validate system requirements across SCOR platforms. Conduct functional, integration, regression, performance, and security testing-including vulnerability and compliance checks. Integrate automated tests within CI/CD pipelines; support DevOps workflows. Hire for Belonging+1Jobed.ai+1 Log, track, and manage defects; collaborate with stakeholders to drive timely resolution. … ability to obtain). Preferred Skills Prior experience testing within government or law enforcement environments. Familiarity with cloud testing platforms (AWS GovCloud, Azure Government). Experience in cybersecurity testing, vulnerabilityassessment, or penetration testing. Certifications such as ISTQB, CSTE, or technical certifications related to tools or CI/CD practices. More ❯
Assurance & Compliance Ensure commission controls comply with MOD policies (e.g. JSP 440/JSP 604) and security frameworks such as NIST, ISO 27005, STIGs, and UK Functional Standard 007 VulnerabilityAssessment & Access Review Support regular access reviews, entitlement audits, and role certification; identify and remediate potential vulnerabilities in provisioning and access enforcement. Incident Management & Response Participate in access More ❯
Assurance & Compliance Ensure commission controls comply with MOD policies (eg JSP 440/JSP 604) and security frameworks such as NIST, ISO 27005, STIGs, and UK Functional Standard 007 VulnerabilityAssessment & Access Review Support regular access reviews, entitlement audits, and role certification; identify and remediate potential vulnerabilities in provisioning and access enforcement. Incident Management & Response Participate in access More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
or similar technical positions. Fundamental understanding of security threats and compromise methods. Proficiency in server, client, and network technologies. Knowledge of malware, network reconnaissance, and emerging threats. Competence in vulnerabilityassessment and remediation procedures. Strong analytical skills, logical thinking, and sound judgment. Proficiency in KQL. Familiarity with the Microsoft Defender Suite. Education/Qualifications: CompTIA Security+ or equivalent More ❯
in the central London office. What you'll be doing: Monitoring and analysing network traffic and logs for threats Managing security tools - Firewalls, IDS/IPS, endpoint protection Driving vulnerability assessments and audits Leading on incident response and remediation Developing security policies, standards and best practice Acting as an escalation point for the business and projects What we're More ❯