a wide range of security technologies within a large and complex environment (anti-malware/EDR, SIEM solutions, vulnerability scanners, patch management, CASB, DLP, penetrationtesting tools, etc.) Knowledge of TCP/IP and related network protocols: knowledge of standard network protocols like TCP, ARP, ICMP, DHCP, DNS More ❯
and supporting Entra (Azure AD), Azure IaaS/PaaS Management of backup/recovery solutions Experience with operating system hardening, vulnerability assessments, security audits, penetrationtesting, intrusion prevention systems and other security control systems for example PAM, SIEM etc. Experience with endpoint security, content filtering, vulnerability scanning and More ❯
to proactively mitigate risks Perform proactive threat hunting, research, and analysis, delivering actionable intelligence to IT and security teams Perform security assessments, audits, and penetrationtesting using industry-standard methodologies and tools. Deliver security awareness training and phishing simulations to internal stakeholders. Ensure compliance with company policies and More ❯
to proactively mitigate risks Perform proactive threat hunting, research, and analysis, delivering actionable intelligence to IT and security teams Perform security assessments, audits, and penetrationtesting using industry-standard methodologies and tools. Deliver security awareness training and phishing simulations to internal stakeholders. Ensure compliance with company policies and More ❯
cases of technical security products, such as firewalls, anti-virus, web proxies, SIEM, IDS/IPS, DLP, and EDR. Familiarity with vulnerability scanning and penetrationtesting tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but not required): Cyber/Information Security More ❯
performance issues and ensure business continuity. Monitor and maintain security infrastructure, including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and remediation. Perform root More ❯
Oversee and maintain security equipment including firewalls, intrusion prevention systems (IPS), web application firewalls (WAF), and antivirus systems. Perform periodic security drills and regular penetrationtesting to ensure the integrity of security systems. Harden security controls across Windows and Linux environments and ensure regular patching and firmware upgrades. … encryption practices during usage, storage, transfer, and disposal. Conduct security evaluations on network and firewall policies and manage application security in both development and testing phases (SAST, DAST). Liaise with internal audit teams and international cybersecurity operations centres to implement security policies and controls. Provide cybersecurity training to More ❯
Oversee and maintain security equipment including firewalls, intrusion prevention systems (IPS), web application firewalls (WAF), and antivirus systems. Perform periodic security drills and regular penetrationtesting to ensure the integrity of security systems. Harden security controls across Windows and Linux environments and ensure regular patching and firmware upgrades. … encryption practices during usage, storage, transfer, and disposal. Conduct security evaluations on network and firewall policies and manage application security in both development and testing phases (SAST, DAST). Liaise with internal audit teams and international cybersecurity operations centres to implement security policies and controls. Provide cybersecurity training to More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC … term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC … term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC … term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder More ❯
incidents, including forensics when necessary. Security Services: Drive the delivery of services including Threat & Vulnerability Management, Privileged Access Management, IAM, DLP, Network Security, and Penetration Testing. Project Leadership: Lead IT/Cybersecurity improvement projects as an SME. Risk & Compliance: Evaluate IT changes for security risks, ensuring compliance with security More ❯
be responsible for conducting security reviews, threat modeling, developing tooling that will help detect security issues at scale, and hands-on security evaluations (pen-testing). The successful candidate must be comfortable diving into complex engineering discussions and leveraging deep security expertise to ensure proper risk assessment and threat … opportunities as you gain new security skills in the course of your duties. Key job responsibilities Security reviews for hardware including servers and devices. Penetrationtesting & vulnerability research. Threat modeling. Security training and outreach to internal development teams. Security guidance documentation. Assistance with recruiting activities. BASIC QUALIFICATIONS BS … ROM, microcode, custom ASIC/FPGA) - x86 and/or ARM chipset and firmware security (TPM, UEFI, TrustZone, Secure Boot, JTAG, PCIe) - Physical security testing at the machine level. Security testing of compute platforms (Server, PC or Mobile). Working with diverse physical tamper resistance and/or More ❯
threats Knowledge and experience of network protocols, traffic analysis, and cyber-attack methodologies Knowledge and experience of threat intelligence, risk management, vulnerability management, and penetrationtesting Please note sponsorship is not available for this position, and you must be able to obtain a Security Clearance. Your new employer More ❯
security best practices for AI development and deployment. Stay up to date on the latest AI security threats and vulnerabilities. Conduct security audits and penetrationtesting of AI systems. Collaboration: Collaborate with data scientists, AI engineers, and other stakeholders to ensure security is integrated throughout the AI lifecycle. More ❯
and 62443 assessments. We also provide bespoke services tailored to the specific needs of organizations, including managed services, security architecture review, SOC, monitoring, DFIR, PenetrationTesting, Safety reviews, and cyber transformation programs. The role within our OT division offers an exciting opportunity for individuals with prior relevant experience More ❯
vulnerabilities and policy compliance violations are identified. Establish plans to identify OT vulnerabilities and policy compliance violations through vulnerability scanning, patch reporting, management, and penetration testing. Categorize and prioritize OT vulnerabilities. Assess the effectiveness of vulnerability dispositions. Maintain relationships with business unit stakeholders to assist with the remediation of More ❯
security best practices for AI development and deployment. Stay up to date on the latest AI security threats and vulnerabilities. Conduct security audits and penetrationtesting of AI systems. Collaborate with data scientists, AI engineers, and other stakeholders to ensure security is integrated throughout the AI lifecycle. Communicate More ❯
strong technical background across Networks, Security, Firewall, Vulnerability Management, SIEM and EDR technologies Experience with cyber security concepts, such as Threat Modelling, Incident Response, PenetrationTesting (external/internal) Advanced knowledge of cloud products and services e.g. Azure, Microsoft 365 Emotionally intelligent and able to recognise and manage More ❯
Excites You Develop world-class security practices and controls within a high-growth financial technology business shaping the future of payments. Conduct vulnerability assessments, penetrationtesting, and risk analysis to identify and mitigate security weaknesses. Embed security by design and threat modelling principles into product development. Lead incident More ❯
Salford, Manchester, United Kingdom Hybrid / WFH Options
Inspire People
level across multiple projects, including working with security tools, network security infrastructure technologies, and information security management frameworks (eg, ISO 27001, NIST) Experience overseeing penetrationtesting and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Inspire People
level across multiple projects, including working with security tools, network security infrastructure technologies, and information security management frameworks (e.g., ISO 27001, NIST) Experience overseeing penetrationtesting and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and More ❯
Darlington, County Durham, North East, United Kingdom Hybrid / WFH Options
Inspire People
level across multiple projects, including working with security tools, network security infrastructure technologies, and information security management frameworks (e.g., ISO 27001, NIST) Experience overseeing penetrationtesting and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and More ❯
and 62443 assessments. We also provide bespoke services tailored to the specific needs of organizations, including managed services, security architecture review, SOC, monitoring, DFIR, PenetrationTesting, Safety reviews, and cyber transformation programs. The role within our OT division offers an exciting opportunity for individuals with prior relevant experience More ❯
in the delivery of their Cloud security solutions. Cybersecurity architecture design and implementation experience, including Cloud. Security assessments qualifications related to threat, vulnerability and penetration testing. What We Look For We look for candidates with experience in the industry, who can prove their knowledge of Cyber regulations and frameworks More ❯