SIEM tools, EDR solutions, PAM, and Zero Trust Architecture. Proven ability to conduct security audits and manage compliance with industry standards. Experience of automated vulnerability testing tools such as AppCheck. Excellent problem-solving skills and the ability to communicate technical concepts clearly. Experience with working with a Security Operations … controls, including PAM and Zero Trust principles. Conduct third-party cyber audits and ensure compliance with frameworks like ISO 27001 and NIST CSF. Lead vulnerability assessments and incident response, ensuring timely remediation of risks. Collaborate with IT teams to embed security into all projects and processes. Benefits: Competitive salary More ❯
City Of London, England, United Kingdom Hybrid / WFH Options
Sarafin Partners
platforms in accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from … role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of More ❯
Experience in the following types of Security Testing: - Security Analysis and Consulting - Static Application Security Testing (SAST) - Dynamic Application Security Testing (DAST) - Infrastructure VulnerabilityAssessment - Mobile Application Penetration testing OWASP JBG81_UKTJ click apply for full job details More ❯
to ensure network integrity and compliance with stringent security protocols. Troubleshoot network issues and implement effective solutions swiftly. Participate in regular security audits and vulnerability assessments. Mentor junior engineers and provide technical guidance to the team. Why This Role? Work at the forefront of national security projects Collaborate with More ❯
ensuring key support functions are delivered in a smart, flexible and holistic manner to ensure the business continues to operate safely and securely. Support vulnerability management activities such as vulnerability assessments and security control assessments. Support the maintenance of the programme Information Security Management System (ISO27001). Support … the Information Security Manager to deliver Information Security best practices across the programme. Create and maintain high quality security documentation, such as vulnerability and control assessment reports. This role is full time, 37 hours per week and provides hybrid working arrangements with 2 days in the office/ More ❯
ensuring key support functions are delivered in a smart, flexible and holistic manner to ensure the business continues to operate safely and securely. Support vulnerability management activities such as vulnerability assessments and security control assessments. Support the maintenance of the programme Information Security Management System (ISO27001). Support … the Information Security Manager to deliver Information Security best practices across the programme. Create and maintain high quality security documentation, such as vulnerability and control assessment reports. This role is full time, 37 hours per week and provides hybrid working arrangements with 2 days in the office/ More ❯
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
Babcock Mission Critical Services España SA
ensuring key support functions are delivered in a smart, flexible and holistic manner to ensure the business continues to operate safely and securely. Support vulnerability management activities such as vulnerability assessments and security control assessments. Support the maintenance of the programme Information Security Management System (ISO27001). Support … the Information Security Manager to deliver Information Security best practices across the programme. Create and maintain high quality security documentation, such as vulnerability and control assessment reports. This role is full time, 37 hours per week and provides hybrid working arrangements with 2 days in the office/ More ❯
of ICT services in compliance with DORA. Design and implement advanced digital operational resilience testing programs, automation, stress testing, including threat-led penetration testing, vulnerability assessments, and scenario-based testing. Data & Privacy Compliance: Data Protection Management: Ensure that ICT systems and processes comply with GDPR, CCPA, and other relevant … process for data breaches, ensuring that breaches are detected, contained, mitigated, risk assessed, reported and notified, and resolved within breach reporting windows. Business Impact Assessment: Conduct regular Business Impact Assessments and manage Privacy Risk Assessments to ensure compliance with GDPR and mitigate data privacy risks. Penetration & Vulnerability Testing … Lead and manage continuous penetration testing (incorporating threat-led penetration testing techniques, simulations of advance cyber-attacks) and vulnerability assessments to identify and mitigate risks in our ICT systems, particularly in the crypto and payments environments (including third party providers). Cybersecurity Oversight: Manage the implementation of cybersecurity controls More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Get Staffed Online Recruitment
for their client's entire certification journey from understanding their requirements/vulnerabilities, assessing their compliance against the Cyber Essentials scheme requirements, completing remote vulnerability scans and workstation assessments, all the way through to conducting CE audits and authoring/presenting final reports. Additionally, you will also be involved … the potential to lead/evolve into IT Security, Penetration Testing, and Information Governance specialisations. Key Responsibilities Conduct Cyber Essentials and Cyber Essentials Plus Assessment: Perform comprehensive assessments of organisations' cybersecurity practices, systems, and controls to ensure compliance to the Cyber Essentials Scheme. Conduct in-depth vulnerability assessments … to identify potential security weaknesses. Verify the effectiveness of CE security controls through rigorous testing and analysis. Document CE and CE+ assessment findings, including detailed reports and recommendations. Provide Guidance and Recommendations: Offer advice and guidance to organisations on implementing and enhancing cybersecurity controls to become compliant to CE. More ❯
Shenley Brook End, Buckinghamshire, United Kingdom
Fortis Cyber Security
for our client s entire certification journey from understanding their requirements/vulnerabilities, assessing their compliance against the Cyber Essentials scheme requirements, completing remote vulnerability scans and workstation assessments, all the way through to conducting CE audits and authoring/presenting final reports. Additionally, you will also be involved … the potential to lead/evolve into IT Security, Penetration Testing, and Information Governance specialisations. Key Responsibilities Conduct Cyber Essentials and Cyber Essentials Plus Assessment: Perform comprehensive assessments of organisations' cybersecurity practices, systems, and controls to ensure compliance to the Cyber Essentials Scheme. Conduct in-depth vulnerability assessments … to identify potential security weaknesses. Verify the effectiveness of CE security controls through rigorous testing and analysis. Document CE and CE+ assessment findings, including detailed reports and recommendations. Provide Guidance and Recommendations: Offer advice and guidance to organisations on implementing and enhancing cybersecurity controls to become compliant to CE. More ❯
Role Title: Cyber Security Engineer - Penetration & Vulnerability Testing Client Details: Oliver James has partnered with a leading distribution organisation with a strong market presence and significant investment in their IT security strategy. They are expanding their Cybersecurity team to enhance their vulnerability management and testing capabilities. This is … an exciting opportunity for an experienced Cyber Security Engineer to contribute to strengthening the organisation's security posture through targeted vulnerability assessments and penetration testing, primarily focused on Microsoft Azure and associated technologies. Description: The Cyber Security Engineer will play a critical role in identifying and mitigating security vulnerabilities … across the organisation's technology estate. You will lead regular vulnerability assessments, conduct penetration tests, and work collaboratively with IT teams to address risks and improve security standards. Key Responsibilities: Perform penetration testing and vulnerability assessments across cloud and on-premises environments. Focused security testing within Microsoft Azure More ❯
lead liaison to communicate and investigate non-conformities related to raw materials. Maintain seasonality calendars to identify challenging periods and mitigate potential shortfalls. Conduct vulnerability assessments and communicate/mitigate risks to the business. Assist the customer support team in building specifications and answering queries related to raw materials. More ❯
to collaborate across our wider group. *** Must be eligible to work in the UK - No sponsorship available *** What you'll be doing: From running vulnerability assessments to delivering engaging security training sessions, this role is hands-on and high-impact. You’ll be: Proactively identifying and tackling system vulnerabilities … Microsoft Sentinel, Defender, Cloud App Security, or Purview A solid grasp of ISO27001, NIST, UK GDPR, and security frameworks Knowledge of vendor management and vulnerability assessments Bonus points for certifications like ISO27001 Lead Implementer, CISSP, or CISM What’s in it for you? Private healthcare & life insurance Generous pension More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Cyberteam
responsible for our clients entire certification journey from understanding their requirements/vulnerabilities, assessing their compliance against the Cyber Essentials scheme requirements, completing remote vulnerability scans and workstation assessments, all the way through to conducting CE audits and authoring/presenting final reports. Additionally, you will also be involved … the potential to lead/evolve into IT Security, Penetration Testing, and Information Governance specialisations. Key Responsibilities: Conduct Cyber Essentials and Cyber Essentials Plus Assessment: Perform comprehensive assessments of organisations' cybersecurity practices, systems, and controls to ensure compliance to the Cyber Essentials Scheme Conduct in-depth vulnerability assessments … to identify potential security weaknesses. Verify the effectiveness of CE security controls through rigorous testing and analysis. Document CE and CE+ assessment findings, including detailed reports and recommendations. Provide Guidance and Recommendations: Offer advice and guidance to organisations on implementing and enhancing cybersecurity controls to become compliant to CE. More ❯
Head of Vulnerability and Threat Intelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in … our attractions. The Head of Vulnerability and Threat Intelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting threat … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with Security More ❯
you have the expertise and drive to elevate our security, we are eager to welcome you to our team. We are Cambridge University Press & Assessment, a world-leading academic publisher and assessment organisation and a proud part of the University of Cambridge. About the role The Security Assurance … Lead plays a key role in safeguarding Cambridge University Press & Assessment's information assets and ensuring compliance with industry standards, regulations, and best practices. This role involves leading security assurance initiatives, conducting risk assessments, driving compliance activities, and implementing controls to enhance the organisation's security. Key accountabilities: Assurance … and Testing: Develop and improve security policies and guidance related to security assurance testing. Coordinate and manage vulnerability assessments, penetration testing, and other technical evaluations. Collaborate with technology teams to implement robust security controls and provide guidance on remediation. Perform third-party vendor risk assessments and report findings to More ❯
environments. You’ll play a key role in strengthening the security posture and ensuring compliance with security policies and industry best practices. Perform regular vulnerability assessments across endpoints, servers, applications, and cloud resources. Analyse scan results, validate findings, and prioritize based on risk, exploitability, and asset criticality. Collaborate with … compliance checks, and security assessments as needed. Implement and support endpoint protection, patching, and backup solutions. Skills Required 2 years+ of experience focussing on Vulnerability Management, with a background in cyber security or cloud/infrastructure security. Proficiency with tools such as CrowdStrike, Intune or Action1. Familiarity with patch More ❯
you to explore opportunities with us and help us deliver exceptional results. Job Summary: The Associate Director will be responsible for supporting the identification, assessment, and mitigation of cybersecurity risks and vulnerabilities within the organization. This role involves assisting in the development and implementation of cybersecurity frameworks and procedures … cybersecurity risk management framework, including procedures and tools for identifying, assessing, monitoring, and reporting cybersecurity risks and vulnerabilities. Support the execution of risk assessments, vulnerability assessments, and penetration testing to identify potential cybersecurity risks and their impact on the organization. Provide dedicated security functions in accordance with the needs … 6+ years information security experience in a large and complex business environment 3+ years experience identifying and remediating application security risks as part of vulnerability assessments and remediation programs Strong knowledge of the development of application security assessment and code review methodologies. Strong knowledge of application security vulnerabilities More ❯
development lifecycle (SDLC) with a focus on secure coding practices in languages like Python, C++, Rust, Go and Kotlin/Java. Conduct threat modeling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle. Provide mentorship, guidance, and training … or more cloud platforms such as AWS, Microsoft Azure and Alibaba Cloud used in a hybrid environment. In-depth knowledge of threat modeling, risk assessment and development of mitigation strategies for large-scale, complex systems in a fast-paced environment. Experience integrating security scanning tools into CI/CD More ❯
informed recommendations to IT Security Manager. Examine security systems and web applications. Monitor security access across the organisation. Assist with conducting security assessments through vulnerability testing and risk analysis within good time and to a high standard. Assist with performing both internal and external security audits. Analyse security logs … fulfill security requirements. Review daily security logs for abnormal events and escalate them to the IT Security teams in a timely manner. Conduct technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation. Knowledge, skills and experience More ❯
Billingham, County Durham, North East, United Kingdom
Risktec Solutions Ltd
Responsibilities, Tasks & Interactions: Technical Contribution Support the OT Cyber Security team in delivering cybersecurity services to industrial control systems (ICS). Perform system hardening, vulnerability assessments, and network troubleshooting. Assist in compliance checks and ensure solutions meet industry standards (IEC 62443, NIST) and customer requirements. Support in the creation … Self-motivated and eager to learn, with a proactive approach to work. Clean UK driving license. Desirable : Familiarity with cybersecurity principles, including system hardening, vulnerability assessments, and intrusion detection. Knowledge of relevant cybersecurity frameworks and standards, such as IEC 62443 and NIST. Experience working in a high-hazard industry More ❯
a comprehensive strategy for data protection (encryption, tokenization, masking) across the data lifecycle. Oversee security tool integration in CI/CD pipelines to automate vulnerability detection and resolution and conduct vulnerability assessments, network security audits, and code reviews to ensure application and infrastructure security. Skillswise you will have More ❯
development lifecycle (SDLC) with a focus on secure coding practices in languages like Python, C++, Rust, Go and Kotlin/Java Conduct threat modeling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle Provide mentorship, guidance, and training … or more cloud platforms such as AWS, Microsoft Azure and Alibaba Cloud used in a hybrid environment In-depth knowledge of threat modeling, risk assessment and development of mitigation strategies for large-scale, complex systems in a fast-paced environment Experience integrating security scanning tools into CI/CD More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Goodman Masson
closely with the IT Security Manager to monitor networks, respond to incidents, and enhance cyber resilience across the organisation. The role also includes conducting vulnerability assessments, supporting audits, and helping to strengthen third-party security compliance. Key Responsibilities: Monitor security systems and investigate incidents Operate firewalls, EDR, SIEM tools … and encryption software Support vulnerability testing and risk analysis Assist with third-party vendor assessments and internal audits Contribute to the ongoing improvement of security processes What We're Looking For: Experience in IT security or within a SOC/NOC environment Strong knowledge of Microsoft Defender, EDR, and More ❯