effectively across teams. What you'll do: Develop and implement proactive security strategies, policies, and procedures to protect our systems, networks, and data assets. Lead regular security assessments, including vulnerability scans and penetration tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents … the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerabilityassessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong … capability in risk assessment, vulnerability management, and data informed decision -making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in scripting and programming (i.e. More ❯
Senior Vulnerability Analyst £50,000 - £57,000 + bonus and extensive benefits Full Time/Permanent West Midlands/Hybrid - 1-2 days a month in the office on average The Role and Company: I am looking for a driven Senior Vulnerability Analyst to join a large nationally recognised brand head quartered in the West Midlands. As a … Senior Vulnerability Analyst you will be joining a highly skilled Cyber Defence team. As a key part if this team you will manage threats to the organisation and safeguard systems that enable the business to function safely and effectively. We are ideally looking for someone Midlands based who can be on site in Warwickshire 1-2 days a month … on average. Responsibilities: Conducting regular vulnerability assessments using automated scanning tools, manual testing techniques, and security best practices to identify vulnerabilities in systems, networks, and applications Managing the lifecycle of vulnerabilities from discovery to remediation, including vulnerability triage, prioritisation, tracking, and reporting Analysing the impact and severity of identified vulnerabilities based on factors such as the likelihood of More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Contract Northwood, United Kingdom NATO Project) We are seeking a Cybersecurity & Risk Engineer to support mission-critical NATO operations. This is a hands-on cybersecurity position that combines technical vulnerability analysis with security accreditation, compliance, and risk assessment for deployable communications and information systems (CIS). What You ll Do Conduct vulnerability scanning using tools such as … teams Ensure systems meet NATO operational and cybersecurity requirements Deploy occasionally in support of NATO operations (fitness and readiness required) What We re Looking For Proven experience in cybersecurity vulnerabilityassessment and risk management Strong knowledge of security frameworks (NIST RMF, ISO 27001, DoD RMF, ITIL) Hands-on experience with vulnerability management tools Certifications such as CISSP More ❯
Contract – [Northwood, United Kingdom] – NATO Project) We are seeking a Cybersecurity & Risk Engineer to support mission-critical NATO operations. This is a hands-on cybersecurity position that combines technical vulnerability analysis with security accreditation, compliance, and risk assessment for deployable communications and information systems (CIS). What You’ll Do Conduct vulnerability scanning using tools such as … teams Ensure systems meet NATO operational and cybersecurity requirements Deploy occasionally in support of NATO operations (fitness and readiness required) What We’re Looking For Proven experience in cybersecurity vulnerabilityassessment and risk management Strong knowledge of security frameworks (NIST RMF, ISO 27001, DoD RMF, ITIL) Hands-on experience with vulnerability management tools Certifications such as CISSP More ❯
Contract – [Northwood, United Kingdom] – NATO Project) We are seeking a Cybersecurity & Risk Engineer to support mission-critical NATO operations. This is a hands-on cybersecurity position that combines technical vulnerability analysis with security accreditation, compliance, and risk assessment for deployable communications and information systems (CIS). What You’ll Do Conduct vulnerability scanning using tools such as … teams Ensure systems meet NATO operational and cybersecurity requirements Deploy occasionally in support of NATO operations (fitness and readiness required) What We’re Looking For Proven experience in cybersecurity vulnerabilityassessment and risk management Strong knowledge of security frameworks (NIST RMF, ISO 27001, DoD RMF, ITIL) Hands-on experience with vulnerability management tools Certifications such as CISSP More ❯
Oversee contractors and third-party delivery. Whats essential. Degree in a cyber security-related field. Professional certification (e.g. CISSP, Azure Security Engineer, or equivalent). Skilled in risk/vulnerability assessments, compliance checks, and audits. Experienced in penetration testing and remediation. Knowledge of business continuity, disaster recovery, and incident response. Hands-on with hybrid cloud security tools (e.g. M365 More ❯
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Michael Page
Ensure security controls are in-place based on ISO27001 and NIST As the regional security representative in the global Security/Technology project Lead/execute phishing campaign Conduct vulnerability assessments and implement measures to mitigate potential risks. Involve in global security operations process, analysis and escalate security alerts/tickets from global SOC team Maintain and update security More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
knowledge of cybersecurity who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and More ❯
Wallington, Surrey, England, United Kingdom Hybrid / WFH Options
Newmarket Holidays
Competencies: In-depth knowledge of cybersecurity frameworks, tools, and technologies Strong understanding of networking protocols, cloud security, and secure software development principles. Experience with incident response, risk management, and vulnerability assessment. Familiarity with regulatory compliance and standards (e.g., GDPR, ISO 27001). Excellent problem-solving and analytical skills, with the ability to handle complex security challenges. Strong communication and More ❯
Role: Vulnerability Management Job Type: Contract Day Rate: £300 - £330 per day (inside IR35) Duration: 4 Months Work Location: Milton Keynes, United Kingdom [thrice in a week at client office] - Mandatory Start date : ASAP Note: Candidate should be immediately available Understand and analyse vulnerability data before they becomes overdue Organize and create work packages for teams for resolution … Ensure fixes begin within SLA to prevent delays Help prioritize overdue and upcoming vulnerabilities effectively. Collaborate across teams to streamline technical remediation efforts." Understanding of vulnerabilityassessment and remediation processes Ability to triage and create meaningful work packages for remediation of vulnerabilities. Good coordination skills to facilitate work packages. Effective ability for cross-team collaboration. Planning and Management More ❯
Role: Vulnerability Management Job Type: Contract Day Rate: 300 - 330 per day (inside IR35) Duration: 4 Months Work Location: Milton Keynes, United Kingdom thrice in a week at client office - Mandatory Start date : ASAP Note: Candidate should be immediately available Understand and analyse vulnerability data before they becomes overdue Organize and create work packages for teams for resolution … Ensure fixes begin within SLA to prevent delays Help prioritize overdue and upcoming vulnerabilities effectively. Collaborate across teams to streamline technical remediation efforts." Understanding of vulnerabilityassessment and remediation processes Ability to triage and create meaningful work packages for remediation of vulnerabilities. Good coordination skills to facilitate work packages. Effective ability for cross-team collaboration. Planning and Management More ❯
Ashby de la Zouch, Ashby-de-la-Zouch, Leicestershire, United Kingdom
VIQU IT
Analyst: Support the design, implementation, and management of cyber security technologies across the business Monitor and respond to security incidents, alerts, and helpdesk requests, maintaining robust threat detection Conduct vulnerability assessments, penetration testing, and phishing simulations to identify and mitigate risks Collaborate closely with IT teams to embed security best practices into system management and project delivery Stay up More ❯
L33, Knowsley, Merseyside, United Kingdom Hybrid / WFH Options
Curveball Solutions
business objectives. Drafting, maintaining and implementing information security policies and Standard Operating Procedures (SOPs). Configuring and overseeing mobile security—MDM (MAM/BYOD)—to protect business continuity. Leading vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Authoring compelling tender responses, clearly demonstrating technical capability and strategic value. Enhancing Microsoft 365 security leveraging Purview, Conditional Access, MFA More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Curveball Solutions
evolving business objectives. Drafting, maintaining and implementing information security policies and Standard Operating Procedures (SOPs). Configuring and overseeing mobile securityMDM (MAM/BYOD)to protect business continuity. Leading vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Authoring compelling tender responses, clearly demonstrating technical capability and strategic value. Enhancing Microsoft 365 security leveraging Purview, Conditional Access, MFA More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Copello
optimise, automate and improve relevant systems. The Role The Principal Security Analyst will support busy pods on more complex issues, lead and coordinate threat hunting activities, perform and lead vulnerabilityassessment activities and perform SIEM-based event analysis, incident triage and coordinate incident response activities. Furthermore, the Principal Security Analyst will actively collaborate with other analysts and enhance … IT Security Operations in large and complex organisations -Some coding ability Beneficial -Splunk -Palo Alto (XDR/XSIAM) -Skills in Forensics -Experience or interest in Reverse Engineering, Malware Analysis, Vulnerability Research -Industry recognised qualifications (eg. SANS, OSCP, ISC2) Security Clearance Eligibility for UK SC will be sought but wont be required from the start. Remote Working This role can More ❯
Office, Security Operation Centre of Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and in line with local regulations.The ideal candidate will be responsible for managing information security systems, ensuring compliance with … respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on … MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Experience with security tools and technologies such as intrusion detection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for More ❯
Urgent Contract Vulnerability Manager Job Type: Contract Duration: 4 Months Work Location: Milton Keynes, United Kingdom x3 a week at client office - Mandatory Start date : ASAP Note: Candidate should be immediately available Understand and analyse vulnerability data before they becomes overdue Organize and create work packages for teams for resolution Ensure fixes begin within SLA to prevent delays … Help prioritize overdue and upcoming vulnerabilities effectively. Collaborate across teams to streamline technical remediation efforts." Understanding of vulnerabilityassessment and remediation processes Ability to triage and create meaningful work packages for remediation of vulnerabilities. Good coordination skills to facilitate work packages. Effective ability for cross-team collaboration. Planning and Management skills More ❯
MK9, Milton Keynes, Buckinghamshire, United Kingdom
Uniting People
Urgent Contract Vulnerability Manager Job Type: Contract Duration: 4 Months Work Location: Milton Keynes, United Kingdom [x3 a week at client office] - Mandatory Start date : ASAP Note: Candidate should be immediately available Understand and analyse vulnerability data before they becomes overdue Organize and create work packages for teams for resolution Ensure fixes begin within SLA to prevent delays … Help prioritize overdue and upcoming vulnerabilities effectively. Collaborate across teams to streamline technical remediation efforts." Understanding of vulnerabilityassessment and remediation processes Ability to triage and create meaningful work packages for remediation of vulnerabilities. Good coordination skills to facilitate work packages. Effective ability for cross-team collaboration. Planning and Management skills More ❯
Croydon, London, United Kingdom Hybrid / WFH Options
Gold Group
following : In-depth knowledge of cybersecurity frameworks, tools, and technologies Strong understanding of networking protocols, cloud security, and secure software development principles Experience with incident response, risk management, and vulnerabilityassessment Familiarity with regulatory compliance and standards (e.g. GDPR, ISO 27001) Experience in an organisation running or being part of an ISO27001 adoption project Incident management & change Management More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
or similar technical positions. Fundamental understanding of security threats and compromise methods. Proficiency in server, client, and network technologies. Knowledge of malware, network reconnaissance, and emerging threats. Competence in vulnerabilityassessment and remediation procedures. Strong analytical skills, logical thinking, and sound judgment. Proficiency in KQL. Familiarity with the Microsoft Defender Suite. Education/Qualifications: CompTIA Security+ or equivalent More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harrison Holgate
Administer and support Microsoft platforms and enterprise tools. Troubleshoot Windows operating systems and Microsoft applications. Support cloud-based solutions, including SaaS applications and integration technologies. Assist with cybersecurity controls, vulnerability assessments, compliance auditing, and security operations. Provide clear, non-technical explanations of IT concepts to colleagues across the business. Key Requirements 5+ years' IT experience in financial services (insurance More ❯
for a driven technology auditor who wants to play a role in audit execution which focuses on the review of technology processes, the analysis of risks involved, and the assessment of the design and operating effectiveness of the controls implemented to mitigate the risk. Audits may include the assessment of areas such as access management, IT operations, job … scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerabilityassessment and penetration testing, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology consulting or other relevant industry experience Basic understanding of software More ❯
Office, Security Operation Centre of Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and in line with local regulations.The ideal candidate will be responsible for managing information security systems, ensuring compliance with … implement, and maintain information security policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001).- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage … risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information Security, Computer Science, or a related field. More ❯