shape a secure and scalable platform at the crossroads of security, technology, and energy innovation. Key Responsibilities: Lead the architecture and design of ServiceNow SecOps modules (Security Incident Response, Vulnerability Response, Threat Intelligence, etc.). Integrate ServiceNow with cybersecurity tools (SIEM, SOAR, EDR, CMDB, OT/ICS). Work with cybersecurity, IT, and engineering teams to automate and improve … quality, performance, and security across implementations. What You Will Ideally Bring: Proven ServiceNow Architect experience, ideally across SecOps or IRM modules. Strong understanding of security operations, incident response, and vulnerability management. Hands-on expertise in ServiceNow workflows, Scripting, and integrations (REST/SOAP, MID Server). Experience supporting critical infrastructure (energy, utilities, or OT/ICS environments). Excellent More ❯
diverse business models, including franchisee and third-party environments. Responsibilities: Lead Incident Response across the organization, coordinating investigations and remediation. Conduct Security Gap Analysis and recommend control enhancements. Manage Vulnerability Detection & Remediation using tools like Tenable, Nessus, and Microsoft Defender. Maintain clear Documentation & Reporting for technical and non-technical stakeholders. Engage with IT teams, franchisees, vendors, and regional leaders … improvements. Contribute to the development of security programs and frameworks. Provide technical leadership in Microsoft-centric environments (Defender, Sentinel, Azure 365). Requirements: Proven experience in incident response and vulnerability management. Strong proficiency in Microsoft Defender, Sentinel, Azure 365, Tenable, Nessus. Ability to analyze and remediate security threats across distributed environments. Excellent communication skills for stakeholder engagement and executive More ❯
Saint Paul, Minnesota, United States Hybrid/Remote Options
Genesis10
LLMs); Automating and integrating application security capabilities in the SDLC/DevOps processes for AI/ML applications. Expert knowledge of Application Security practices including SAST, DAST, SCA, Application Vulnerability Management. Foundational knowledge of Cloud Security and IAM (Identity and Access Management) principles. Education/Experience: Associate's degree in computer programming or relevant field required. Bachelor's … LLMs); Automating and integrating application security capabilities in the SDLC/DevOps processes for AI/ML applications. Expert knowledge of Application Security practices including SAST, DAST, SCA, Application Vulnerability Management. Foundational knowledge of Cloud Security and IAM (Identity and Access Management) principles. Only candidates available and ready to work directly as Genesis10 employees will be considered for More ❯
Security Governance Lead Location: Birmingham, Snow Hill Rate: £500–£550 per day - Inside of IR35 6 month contract Are you passionate about driving cyber security excellence through governance, risk management, and data-driven insights? We are seeking a Cyber Security Governance Lead to strengthen our security posture and ensure compliance across our IT landscape. 💼 Key Responsibilities Lead the development … and compliance (GRC) . Experience in creating dashboards and reports using Power BI. Proven ability to document policies, procedures , and technical standards. Skilled in security operations , incident response, and vulnerability management. Familiarity with ITIL v4, Agile methodologies, and SOC environments. More ❯
proactively identify and remediate vulnerabilities before they can be exploited. This is an exciting opportunity to join a fast-moving startup that is redefining how enterprises approach attack surface management, red teaming, and adversary simulation. With a culture rooted in innovation, collaboration, and technical excellence, this company offers the chance to have a real impact on its growth trajectory … data entry. Schedule and facilitate discovery calls and demos between prospects and Account Executives. Maintain a deep understanding of the cybersecurity landscape, including offensive security trends, threat intelligence, and vulnerability management. Represent the brand at industry events, webinars, and networking opportunities where applicable. Contribute feedback from market interactions to help refine product positioning and outreach strategies. Experience Needed: Minimum More ❯
years of relevant experience to play a key role in maintaining and improving IT systems and ensuring compliance with Cyber Essentials Plus standards. Key Responsibilities Manage patching and vulnerability processes, using multiple scanning tools to identify and resolve security gaps. Coordinate and deploy updates across software and operating systems within agreed timescales. Monitor system performance and availability using the … tickets are accurately maintained and incidents managed effectively. Collaborate with cross-functional teams to deliver reliable and secure IT services. Skills & Experience Required Hands-on experience in patching and vulnerability management. Knowledge of centralised logging and SIEM platforms. Solid understanding of networking technologies including firewalls, switches, routers, VPNs, and IP subnetting. Familiarity with directory services (e.g. Active Directory). More ❯
Birmingham, England, United Kingdom Hybrid/Remote Options
EML
that are transforming businesses worldwide. Key Responsibilities: Cloud Engineering: Design, deploy, and manage scalable, secure, and cost-efficient cloud infrastructure. Implement Infrastructure as Code (IaC) to automate provisioning and management of resources while ensuring security best practices. Optimize cloud resources for performance, cost efficiency, and security compliance. Ensure compliance with security and governance standards, including encryption, access control, and … vulnerability management. DevOps: Build and maintain automated workflows for secure application deployment and testing. Collaborate with development teams to integrate DevOps practices with security principles into the software development lifecycle. Implement containerization and orchestration with secure configurations to protect workloads. Continuously improve build and deployment processes with a focus on minimizing security risks. Site Reliability Engineering (SRE): Ensure system … into cloud, DevOps, SRE, database, and network/system operations. Infrastructure Expertise : Experience in managing secure cloud, on-premises, and hybrid environments. Automation : Proficiency in automating workflows and infrastructure management with security controls. Reliability Practices : Strong knowledge of monitoring, incident management, and performance optimization with security considerations. Database Management : Experience with secure database design, optimization, and administration. More ❯
committed to achieving success. Mentor and support junior engineers, sharing best practices and knowledge. Ensuring that appropriate responses are made in a timely fashion to requests/instructions from management, the business or the SRI Group. Ensuring no personal action could negatively impact Company or IT's reputation. Essential Knowledge, Skills & Experience Skills Azure Cloud: Advanced proficiency in managing … administration. Windows OS: Strong experience with Windows Server 2016 and above, including IIS, DHCP, DNS. VMWare/Hyper-V: Advanced knowledge of virtualization technologies. Active Directory and Domain management: Advanced skills in managing and configuring AD and domain environments. Network Routers, Switches, Firewall: Hands-on experience with network hardware and security. MDM platforms: Experience with Intune or Manage Engine. … Project Management: Proven ability to manage IT projects, including upgrades and migrations. Backup Solutions: Knowledge of various backup technologies and strategies. Scripting Languages: Proficiency in scripting languages such as PowerShell, Python, or Bash. Monitoring Tools: Experience with monitoring tools like Nagios, Zabbix, or SolarWinds. Security Best Practices: Understanding of security best practices and tools, including firewalls, intrusion detection/ More ❯
have a strong technical foundation in system administration (Unix or Windows), familiarity with networking and cyber security API Infrastructure as code Terraform Scripting language RegEx Python. Experience with enterprise vulnerability management. Must have excellent communication skills - written and verbal Job Description: Vuln Mgmt and Config Compliance surge support is a mid to senior-level cyber security professional with experience … with Qualys, ServiceNow, and cloud compliance tools (Prisma, Wiz, etc.). They ll provide support where needed to ensure sustainable vulnerability and compliance data integration, support risk treatment processes, and enable cloud configuration compliance processes. This resource should be proactive, independent worker that takes initiative to ensure vulnerability and cloud compliance processes run smoothly. DTS offers excellent compensation More ❯