South East London, London, United Kingdom Hybrid / WFH Options
The Fortune Group (Recruitment) Limited
secure environment. Suitable Lead Security Engineers will work remotely or in the London office. Projects that need to be completed Security Awareness OpenSource Software scanning Automated VulnerabilityScanning Kubernetes VulnerabilityScanning Supply Chain monitoring (container images etc.) SIEM and Monitoring/Alerting service AntiVirus/ more »
research, code/script analysis, reverse engineering, exploitation, and documentation.- Identifying, testing, and implementing cutting-edge automated tools or enhancing existing ones to optimize vulnerability management efficiency and effectiveness.- Developing and refining code/scripts to bolster vulnerability detection, remediation/mitigation, and operational functions.- Integrating vulnerabilityscanning and configuration hardening in cloud environments (e.g., AWS, Microsoft Azure, Google Cloud Platform).- Conducting vulnerabilityscanning and reporting in alignment with the application development continuous integration and continuous delivery pipeline, streamlining work efforts through efficient use of security tools.- Spearheading security initiatives and projects more »
cyber risk exposure, providing meaningful risk advice and mitigations, reports to stakeholders Ensure the security of the organisations network infrastructure including managing firewalls, using vulnerabilityscanning, port monitoring tools and resolving security related incidents. Lead the design, implementation, testing and maintenance of WAN and LAN network solutions Manage … concepts required in the role including LAN, WAN, WiFi, data-centre networks, unified comms SIEM and IPS/IDS technologies and toolset used for vulnerabilityscanning including Nessus Cloud computing including IaaS, PaaS and SaaS. Core network skills to include, routing (IS-IS, BGP, MPLS, VRF's etc more »
Brecon, Powys, Wales, United Kingdom Hybrid / WFH Options
Morgan Hunt UK Limited
reporting to senior stakeholders, driving automation across processes and reporting where possible and ensuring the security of the network infrastructure including managing firewalls, using vulnerabilityscanning, port monitoring tools and resolving security related incidents. Experience and Skills: * Previous public sector experience is preferred * Experience of designing and implementing … reporting to senior stakeholders, driving automation across processes and reporting where possible and ensuring the security of the network infrastructure including managing firewalls, using vulnerabilityscanning, port monitoring tools and resolving security related incidents. Experience and Skills: * Previous public sector experience is preferred * Experience of designing and implementing more »
detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerabilityscanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA … of the organization.Participates in change management meetings and provides expert input to ensure security is maintained.Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering.Ability to manage and continuously improve upon vulnerability management program.Ability to propose more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
West Bend, Wisconsin, United States Hybrid / WFH Options
Delta Defense
Response team, apply keen investigative skills and take swift action in resolving security alerts or breaches, safeguarding our digital borders. Conduct penetration testing and vulnerabilityscanning on all company networks and applications. Collaborate with engineering stakeholders to prioritize and remediate vulnerabilities based on severity and impact. Lead company more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
and manage all group security incidents. Whilst there are process aspects to the role there are two main areas of focus for the team: Vulnerability management. The team manage issues identified through internal and external vulnerability testing. Internally we use tools like Snyk (one of several tools available … expo or one of our regular social events after work. The Role Reporting to the Security Operations Manager, your key tasks may involve: Managing vulnerabilityscanning tools - SAST, SCA, IaC, Containers & DAST for all Egress products Investigate SIEM alerts, working with the Engineering and Operations teams to resolve more »
knowledge of web application security practices, including OWASP Top Ten vulnerabilities. Experience with security tools and technologies such as SIEM, IDS/IPS, and vulnerability scanners. Analytical and Problem-Solving Skills: Ability to analyze complex security issues and develop effective solutions. Strong attention to detail and the ability to more »
control software; workstations (MAC, Windows), smartphones (Android, OS), printers, desk phones, Reliable technical knowledge about: Network infrastructure including SecOps operations (FW, Switch…), Monitoring and vulnerabilityscanning at performance for 4 types of assets: workstations, servers, applications, and network components, Microsoft product expertise will be advantageous: O365 (Power BI more »
with relevant rules and regulations related to financial crime and conduct. Technical Requirements: Excellent knowledge of security technologies and domains, including endpoint protection tools, vulnerability scanners, attack simulation, network security, and cloud security. Proficient in PAM best practices, technologies, and procedures. 2+ years knowledge of Windows Server, Active Directory more »
identifying vulnerabilities, enhancing security measures, and ensuring the safety of our clients’ digital environments. Your responsibilities will span a wide range of tasks, from vulnerabilityscanning to technical content creation. Responsibilities: Vulnerability Detection and Automation: Collaborate with our security team to scan customer systems for critical vulnerabilities. … Develop new vulnerability checks using tools like Nuclei. Curate crowd-sourced checks for inclusion in our Intruder platform. Automate penetration testing processes to scale across multiple clients simultaneously. Rapid Response and Custom Scanning: Conduct custom scans on customer targets to identify emerging critical weaknesses. Provide rapid response solutions … Occasionally participate in industry events and conferences. Qualifications and Experience: Industry Experience: Minimum of 2 years in offensive security roles. Proven track record in vulnerability assessment and penetration testing. Educational Background: Technical academic background in software engineering or cyber security. Certifications (One or More): OSCP OSWE OSEP CRT CCT more »
Oxfordshire, England, United Kingdom Hybrid / WFH Options
University of Oxford
Security Operations and the rest of the team. OxCERT runs an on-premises Elasticsearch-based SIEM solution, an Intrusion Detection System (IDS), and a vulnerabilityscanning service as well as other open source and commercial tools. We are one of the first UK universities to have the capability more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
team engagements to tune and validate detection tooling. Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetration testing, and vulnerability scanning. Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams. Manage the delivery of daily more »
Leeds, Horsforth, West Yorkshire, United Kingdom Hybrid / WFH Options
Headway Recruitment
Microsoft O365 environment and security solutions, threat intelligence analysis, Security Incident Response processes, disaster recovery, and business continuity principles. Familiarity with security testing principles, vulnerabilityscanning, risk identification, resolution, and reporting. Experience in formal document creation, such as reports or procedures. Key Responsibilities include but not limited to more »
Basingstoke, England, United Kingdom Hybrid / WFH Options
Matrix
of network protocols, firewalls (Network Virtual Appliances) and routing Experience of hardening IT infrastructure based on security audits, standards and industry best practice (e.g. vulnerabilityscanning, Penetration testing and ISO27001/17/18). more »
Warrington, England, United Kingdom Hybrid / WFH Options
Tata Consultancy Services
Configure and manage Microsoft security solutions for optimal protection. Perform data profiling and analysis to identify patterns, trends, and insights. Conduct security assessments and vulnerability scanning. Respond to security incidents and participate in incident response activities. Stay updated on evolving security threats and Microsoft security solutions. Act as a more »
tools (Terraform, CloudFormation, etc.) Expertise in configuration management (Ansible, Chef, Puppet) and container orchestration (Kubernetes, Docker Swarm) Deep understanding of security principles, threat modelling, vulnerabilityscanning, and secure coding practices Familiarity with mobile development frameworks (React Native, Flutter) and application security testing (SAST, DAST, IAST) Strong problem-solving more »
Warrington, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
Configure and manage Microsoft security solutions for optimal protection. Perform data profiling and analysis to identify patterns, trends, and insights. Conduct security assessments and vulnerability scanning. Respond to security incidents and participate in incident response activities. Stay updated on evolving security threats and Microsoft security solutions. Act as a more »