Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
respond to Cyber Security Incidents Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others. Run VulnerabilityAssessment tools to measure compliance with security updates and security patches. Member of a Team who are responsible for making multiple daily CSOC checks to detect and respond … XDR and Microsoft Defender variants, and Elastic Security, or displays aptitude to learn how to work with a SIEM. Experience and knowledge of SIEM tools, Cyber Security Incident Response, Vulnerability Management and Cyber Threat Intelligence. Experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at it. More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Stackstudio Digital Ltd
non-technical audiences, including executive stakeholders. Perform technical quality reviews and engage in direct technical conversations with clients. Utilize tools such as BurpSuite, Nessus, Nmap, Kali Linux for effective vulnerabilityassessment and penetration testing. Apply knowledge of OWASP Top 10 and SANS Top 25 vulnerabilities and communicate methodologies with development teams. Skills, Experience, and Abilities Required: Essential: Proficient More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
and SANS Top 25 vulnerabilities and ability to effectively communicate methodologies and techniques with development teams Utilize tools such as BurpSuite, Nessus, Nmap, Kali Linux, and Nessus for effective vulnerabilityassessment and penetration testing. Your Profile Essential skills/knowledge/experience: (Up to 10, Avoid repetition) Proficient Pen Testing Tools - Cobalt Strike, Caldera, Atomic Red team, Pentera More ❯
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Michael Page
Ensure security controls are in-place based on ISO27001 and NIST As the regional security representative in the global Security/Technology project Lead/execute phishing campaign Conduct vulnerability assessments and implement measures to mitigate potential risks. Involve in global security operations process, analysis and escalate security alerts/tickets from global SOC team Maintain and update security More ❯
Cheshire, England, United Kingdom Hybrid / WFH Options
Morgan Law
IT Security Manager, wider IT team, and third-party partners to ensure security best practices are maintained across their cloud and on-premise environments. Key Responsibilities Conduct threat and vulnerability assessments and recommend remediation steps Support the investigation of security incidents and policy violations Assist with risk assessments and security audits Implement and maintain security standards, and guidelines Work More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
knowledge of cybersecurity who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and More ❯
the organization's network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetration testing and vulnerability assessments to identify and remediate potential security risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and More ❯
Knutsford, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
environments Manage secure configurations, access controls, and CI/CD workflows in GitLab Integrate and protect telemetry tools such as Cribl, Elastic, Splunk, Fluentd, and Syslog Perform threat modelling, vulnerability assessments, and risk analysis for the pipeline Partner with DevOps to embed security into infrastructure-as-code and deployment processes Monitor and respond to security events, maintaining clear documentation More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Devonshire Hayes Recruitment Specialists Limited
GDPR, etc.). Configure and monitor firewalls, intrusion detection/prevention systems, and endpoint security solutions. Support identity and access management, MFA, and secure network access policies. Conduct regular vulnerability assessments, patch management, and system hardening. Project Management & Delivery Lead infrastructure and network projects from scoping through delivery, ensuring quality, cost, and time objectives are met. Define technical requirements More ❯
GDPR, etc.). Configure and monitor firewalls, intrusion detection/prevention systems, and endpoint security solutions. Support identity and access management, MFA, and secure network access policies. Conduct regular vulnerability assessments, patch management, and system hardening. Project Management & Delivery Lead infrastructure and network projects from scoping through delivery, ensuring quality, cost, and time objectives are met. Define technical requirements More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Devonshire Hayes
GDPR, etc.). Configure and monitor firewalls, intrusion detection/prevention systems, and endpoint security solutions. Support identity and access management, MFA, and secure network access policies. Conduct regular vulnerability assessments, patch management, and system hardening. Project Management & Delivery Lead infrastructure and network projects from scoping through delivery, ensuring quality, cost, and time objectives are met. Define technical requirements More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Devonshire Hayes
GDPR, etc.). Configure and monitor firewalls, intrusion detection/prevention systems, and endpoint security solutions. Support identity and access management, MFA, and secure network access policies. Conduct regular vulnerability assessments, patch management, and system hardening. Project Management & Delivery Lead infrastructure and network projects from scoping through delivery, ensuring quality, cost, and time objectives are met. Define technical requirements More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Devonshire Hayes
GDPR, etc.). Configure and monitor firewalls, intrusion detection/prevention systems, and endpoint security solutions. Support identity and access management, MFA, and secure network access policies. Conduct regular vulnerability assessments, patch management, and system hardening. Project Management & Delivery Lead infrastructure and network projects from scoping through delivery, ensuring quality, cost, and time objectives are met. Define technical requirements More ❯
L33, Knowsley, Merseyside, United Kingdom Hybrid / WFH Options
Curveball Solutions
business objectives. Draft, maintain, and implement information security policies and Standard Operating Procedures (SOPs). Configure and oversee mobile security—MDM (MAM/BYOD)—to protect business continuity. Lead vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Author compelling tender responses, clearly demonstrating technical capability and strategic value. Enhance Microsoft 365 security—leveraging Purview, Conditional Access, MFA More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Curveball Solutions
evolving business objectives. Draft, maintain, and implement information security policies and Standard Operating Procedures (SOPs). Configure and oversee mobile securityMDM (MAM/BYOD)to protect business continuity. Lead vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Author compelling tender responses, clearly demonstrating technical capability and strategic value. Enhance Microsoft 365 securityleveraging Purview, Conditional Access, MFAto safeguard More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Michael Page Technology
provide expert guidance on works and reports from the MSSP to ensure quality and relevance. Proactively identify emerging threats and continuously enhance threat detection and response processes. Conduct regular vulnerability assessments, ensure timely remediation, and recommend strategic improvements to reduce risk exposure. Design and maintain comprehensive security playbooks to standardise incident response and operational procedures. Partner with engineering teams … guidance and training to staff on cybersecurity best practices to foster a security-conscious culture. Profile Demonstrated experience in Cyber Security operations, including threat hunting, detection and response, and vulnerabilityassessment and remediation. Extensive hands-on experience working within a Security Operations Center (SOC) environment. Proven ability to design and implement effective security playbooks for incident response and More ❯
Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
Russell Taylor Group Ltd
within OT/ICS environments, leveraging frameworks such as MITRE ATT&CK for ICS and modelling using Bow-Tie Analysis to proactively identify and exploit vulnerabilities. You'll conduct vulnerability assessments and administrative audits on client computer systems and network devices considering the sensitivity of Operational Technology testing. You'll lead collaboration efforts with other cybersecurity experts on team More ❯
Nottinghamshire, England, United Kingdom Hybrid / WFH Options
Digital Waffle
response plans, ensuring continuous improvements Integrate security practices seamlessly into the DevOps pipeline Manage and optimise monitoring tools to provide real-time threat visibility Carry out regular threat and vulnerability assessments, applying effective remediation strategies Coach and mentor colleagues, keeping the team ahead of evolving risks and technologies What you bring: Significant experience in security operations across both cloud More ❯
nottingham, midlands, united kingdom Hybrid / WFH Options
Digital Waffle
response plans, ensuring continuous improvements Integrate security practices seamlessly into the DevOps pipeline Manage and optimise monitoring tools to provide real-time threat visibility Carry out regular threat and vulnerability assessments, applying effective remediation strategies Coach and mentor colleagues, keeping the team ahead of evolving risks and technologies What you bring: Significant experience in security operations across both cloud More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Searchability NS&D
identify and document vulnerabilities, support red team operations, and collaborate with development and infrastructure teams to ensure effective remediation and security improvements. Key responsibilities include: Conducting penetration tests and vulnerability assessments across multiple environments Performing red team and threat simulation exercises Producing detailed reports outlining findings, risks, and mitigation strategies Staying current with emerging attack vectors, tools, and exploits … subject to required skills) your application to our client in conjunction with this vacancy only. KEY SKILLS: Penetration Tester, Ethical Hacker, Red Team, Cyber Security, OWASP, MITRE ATT&CK, VulnerabilityAssessment, OSCP, GPEN, CEH, CRTP, SC Cleared, NSD More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Searchability NS&D
identify and document vulnerabilities, support red team operations, and collaborate with development and infrastructure teams to ensure effective remediation and security improvements. Key responsibilities include: Conducting penetration tests and vulnerability assessments across multiple environments Performing red team and threat simulation exercises Producing detailed reports outlining findings, risks, and mitigation strategies Staying current with emerging attack vectors, tools, and exploits … subject to required skills) your application to our client in conjunction with this vacancy only. KEY SKILLS: Penetration Tester, Ethical Hacker, Red Team, Cyber Security, OWASP, MITRE ATT&CK, VulnerabilityAssessment, OSCP, GPEN, CEH, CRTP, SC Cleared, NSD More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯