Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Monitoring and defending against security threats across the organization's network, systems, and applications ️ Implementing and managing security technologies such as firewalls, IDS/IPS, and encryption solutions ️ Conducting vulnerability assessments and penetration tests to identify and mitigate security risks ️ Collaborating with IT teams to implement secure configurations and ensure best practices are followed ️ Developing and enforcing cybersecurity policies … or in a similar role within IT security ️ Strong knowledge of cybersecurity principles, threat intelligence, and security controls ️ Experience with security tools (e.g., SIEM, firewalls, EDR, VPN, DLP) and vulnerability management ️ Solid understanding of regulatory frameworks and industry standards (e.g., GDPR, NIST, ISO 27001) ️ Certifications such as CISSP, CISM, CompTIA Security+, or CEH are highly desirable Ready to defend More ❯
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: • Lead the development and delivery of threat intelligence and … vulnerability products. • Select and profile key threat actors posing the greatest risk to the client’s estate. • Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. • Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. • Provide in-depth contextual threat analysis, including actor capability and intent. • Maintain and improve internal documentation and … reporting processes. • Lead, mentor, and support a multidisciplinary team of cyber analysts. • Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: • 5+ years of experience in Threat Intelligence, Vulnerability Management, or cyber research. • Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. • Experience in More ❯
with engineering, maintenance and central teams, you’ll ensure robust protection of our electrical, automation, and industrial network systems. You’ll also drive key initiatives like cyber hygiene programmes, vulnerability assessments, and network monitoring – keeping us ahead of threats and ready to respond. Key Responsibilities Ensure OT assets and industrial control systems are protected against cyber threats. Implement and … support cyber security tools and practices defined in our global OT Cyber Strategy. Lead cyber hygiene and vulnerability management programmes, coordinating remediation where needed. Monitor OT network activity, detect insecure configurations or malicious activity, and take appropriate action. Own the site-level cyber incident response plan – coordinating with stakeholders and ensuring timely resolution. Support compliance efforts related to OT … and SCADA, and have strong knowledge of industrial networks. You have solid grounding in cyber security principles – TCP/IP, common protocols, OSI model, and cyber tooling such as vulnerability scanning, antivirus and endpoint protection. You can lead, influence and guide others – from site technicians to external contractors. You’re confident working independently and as part of a broader More ❯
What You'll Be Working On: ️ Designing, implementing, and managing security architectures for cloud environments (AWS, Azure, Google Cloud) ️ Conducting risk assessments and vulnerability assessments on cloud infrastructure to identify and mitigate security threats ️ Managing and securing cloud-based services, including identity and access management (IAM), encryption, and data protection ️ Collaborating with DevOps and development teams to integrate security More ❯
security (AWS, Azure, or GCP) and DevSecOps tooling Ensure security compliance across the development lifecycle, aligned with NCSC and industry standards Required Experience: Proven track record in pen testing, vulnerability assessments, and ethical hacking Hands-on with tools such as Burp Suite, ZAP, Nmap, Metasploit Deep understanding of secure cloud infrastructure (AWS/Azure) and scripting (Python, Bash) Familiarity More ❯
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
SIEM systems and firewalls to foster innovation and meet the evolving needs of the certification market and consultancy services. Serving as a key liaison with our technology partners. Supporting vulnerability assessments and security audits to ensure seamless security integration aligned with market demands and industry standards. Providing strategic insights on risk mitigation, UI security, and compliance, based on monitoring More ❯
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
consistency across environments. Collaborate with cross-functional teams to understand application requirements and translate them into network solutions. Ensure network security by implementing industry-best practices and conducting regular vulnerability assessments. Troubleshoot and resolve network-related issues in a timely and efficient manner. Stay abreast of the latest networking technologies and trends, recommending upgrades and improvements to keep our More ❯
on-premise. Key Responsibilities: Lead the design, documentation, and maintenance of Argenta’s Infrastructure and Security architecture, ensuring performance, scalability, and sustainability. Manage the organisation’s cybersecurity posture, including vulnerability assessments, incident response planning, and coordination with security MSPs for SIEM and threat detection. Assess current systems and infrastructure, identifying opportunities for optimisation, automation, and integration of new technologies More ❯
scaling. Drive an evolution of services to support cloud-native managed services, including an evolution of Kubernetes. Drive efforts to enhance cloud infrastructure security, including access controls, encryption, and vulnerability assessments, focusing on engineering security solutions. Collaborate on CI/CD (TeamCity) pipelines to automate software deployment, including the build platform (Java, Gradle Enterprise) and QA/Testing tooling More ❯
up-to-date with the latest treds, tooling, techniques to continuously improve testing approaches. What will you need to do it? Some demonstrable practical experience in penetration testing and vulnerability assessments Understanding of common vulnerabilities and how to exploit or mitigate them. Basic Knowledge of network security, application security and cloud security principles. A passion for all things hacking More ❯
SQL Toolset/SSMS 18.xxx/Quest Spotlight | Replication Monitor and other industry standard monitoring tools. An understanding of and some exposure to SQL Server auditing/encryption/vulnerability assessments/data classification/Query Store etc. Creation and use of DACPAC and BACPACs. An appreciation of and willingness to learn SQL Azure PAAS and IAAS database solutions. More ❯
to quickly resolve issues affecting hosted environments. Security and Compliance: Implement and maintain robust security protocols for hosted solutions, including firewalls, encryption, and access controls. Conduct regular security audits, vulnerability assessments, and patch management to meet compliance standards. Ensure hosted environments adhere to industry and regulatory security requirements. Utilize System Center Configuration Manager for software deployments, updates, and compliance More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
to quickly resolve issues affecting hosted environments. Security and Compliance: Implement and maintain robust security protocols for hosted solutions, including firewalls, encryption, and access controls. Conduct regular security audits, vulnerability assessments, and patch management to meet compliance standards. Ensure hosted environments adhere to industry and regulatory security requirements. Utilize System Center Configuration Manager for software deployments, updates, and compliance More ❯
London, England, United Kingdom Hybrid / WFH Options
SERVPRO of Limestone and Lawrence Counties
SQL Toolset/SSMS 18.xxx/Quest Spotlight | Replication Monitor and other industry standard monitoring tools. An understanding of and some exposure to SQL Server auditing/encryption/vulnerability assessments/data classification/Query Store etc. Creation and use of DACPAC and BACPACs. An appreciation of and willingness to learn SQL Azure PAAS and IAAS database solutions. More ❯
London, England, United Kingdom Hybrid / WFH Options
Idox plc
to quickly resolve issues affecting hosted environments. Security and Compliance: Implement and maintain robust security protocols for hosted solutions, including firewalls, encryption, and access controls. Conduct regular security audits, vulnerability assessments, and patch management to meet compliance standards. Ensure hosted environments adhere to industry and regulatory security requirements. Utilize System Center Configuration Manager for software deployments, updates, and compliance More ❯
tailor IT and CS security control baselines based on RMF guidelines and categorization of the RMF boundary • Perform Ports, Protocols, and Services Management (PPSM). • Perform IT and CS vulnerability-level risk assessments. • Execute security control testing as required by a risk assessment or annual security review (ASR). • Mitigate and remediate IT and CS system level vulnerabilities … level IT and CS policies and procedures for respective RMF boundaries and/or guidance provided by the command ISSMs • Implement and assess STIG and SRGs. • Perform and develop vulnerability assessments with automated tools such as Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP) Compliance Check (SCC) and Evaluate STIG. • Deploy security updates to Information System … components. • Perform routine audits of IT system hardware and software components. • Maintain inventory of Information System components. • Participate in IT change control and configuration management processes. • Upload vulnerability data in Vulnerability Remediation Asset Manager (VRAM). • Image or re-image assets that are part of the assigned RMF boundary • Install software and troubleshoot software issues as necessary to More ❯
only, no telework. Design, implement, configure, and enforce security controls on network, hardware, and software components and devices. Implement STIGs and manage enterprise-level deployment of Active Directory. Perform vulnerability assessments using Assured Compliance Assessment Solution tools. Configure Cisco networking devices and utilize packet analyzer tools such as Wireshark and tcpdump. Troubleshoot network connectivity issues and implement firewalls … the design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices. o Performing STIG implementation. o Utilizing and configuring Active Directory. o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool. o Configuring Cisco networking devices. o Utilizing packet analyzer tools (examples, Wireshark and tcpdump, etc.); and o Implementing and managing More ❯