to security events across a complex, multi-departmental IT environment. You'll maintain and use key security tools such as SIEM, IDS, EDR, and vulnerability management platforms. You will work closely with system owners and users to assess configurations, analyse logs, and improve security controls and procedures. In addition … career experience in a relative field Hands-on experience with security monitoring and incident response technologies such as SIEM, IDS and EDR. Experience with vulnerabilityassessment including practical assessments for risk analysis. A strong working knowledge of at least one major operating system (Windows, Linux, or MacOS). More ❯
teams to establish and enforce network access policies, ensuring that only authorized individuals and devices have the correct access privileges. Proactive Security Testing and Vulnerability Management Conduct vulnerability assessments and penetration testing to identify and address security weaknesses in mobile network architectures. Develop and enforce security policies and … together with system administrators and application owners to resolve discovered vulnerabilities by applying necessary patches or making configuration adjustments. Create and sustain a thorough vulnerability management program that includes tracking vulnerabilities, assessing risks, and planning remediation strategies. Engage in network security incident response efforts by providing technical expertise and … Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR, HIPAA, ISO 27001). In-depth understanding of routers, switches, firewalls, and switching/routing More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Broadstone
external vendors to maintain robust cybersecurity measures. This is a hands-on, fast-paced role where you'll be involved in monitoring security, conducting vulnerability assessments, responding to incidents, and performing security audits. Plus, you'll have the opportunity to shape and improve our cybersecurity strategy, tools, and practices More ❯
stack. What Excites You Develop world-class security practices and controls within a high-growth financial technology business shaping the future of payments. Conduct vulnerability assessments, penetration testing, and risk analysis to identify and mitigate security weaknesses. Embed security by design and threat modelling principles into product development. Lead More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Michael Page (UK)
IT infrastructure, including networks, servers, and cloud environments. Implement, monitor, and manage security solutions such as firewalls, IDS/IPS, and endpoint protection. Conduct vulnerability assessments on the infrastructure. Ensure compliance with regulatory requirements (e.g., GDPR, ISO 27001) and industry best practices. Investigate security incidents, perform root cause analysis More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
detection/prevention systems (IDS/IPS). Ensure compliance with industry regulations and best-practices (GDPR, HIPAA, PCI-DSS, CIS). Conduct regular vulnerability assessments and implement security patches and updates. Collaboration and Documentation Work closely with other IT teams across the business and across the wider organisation More ❯
and intrusion detection/prevention systems (IDS/IPS) Ensure compliance with industry regulations and best-practices (GDPR, HIPAA, PCI-DSS, CIS) Conduct regular vulnerability assessments and implement security patches and updates Collaboration and Documentation Work closely with other IT teams across the business and across the wider organisation More ❯
and problem-resolution strategies. Performance Monitoring & Optimization: Utilize to proactively enhance system performance. Security & Compliance: Ensure adherence to industry best practices, including patch management, vulnerability assessments, and security hardening (e.g., CIS benchmarks, STIG compliance). Automation & Scripting: Develop automation scripts using Bash, Python, or Ansible to streamline system operations More ❯
and Network Security delivery teams. Clearly articulate and position Bytes' cybersecurity services, including Network Security, Compliance & Assurance (ISO 27001, PCI DSS), penetration testing, and vulnerability assessments. Provide thought leadership, offering expert guidance to customers, ensuring Bytes remains aligned with customer-specific requirements and outcomes. Maintain independence and objectivity in More ❯
Leominster, Herefordshire, United Kingdom Hybrid / WFH Options
Leidos
solutions. Performance Monitoring & Optimization: Utilize tools to monitor and fine-tune system performance. Security & Compliance: Ensure adherence to industry best practices, including patch management, vulnerability assessments, and security. Automation & Scripting: Develop automation scripts using Bash, Python, or Ansible to streamline system operations and deployments. Documentation & Knowledge Sharing: Maintain technical More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. … problem-solving abilities to translate business requirements into technical solutions. Collaboration and Influence: Effective communicator capable of navigating organizational complexities and influencing without authority. Vulnerability Management: Expertise in managing vulnerabilities across diverse assets and implementing application security in cloud environments. Security tooling: experience in any of the following; (Wiz More ❯
manager on standards and policy changes Qualifications Experience or deep knowledge of key activities within software security group such Threat Modeling/Application Risk Assessment, Vulnerability Assessments, Governance and Metrics, Training, etc. Pre-requisites for this position are a Bachelor's Degree with 4 - 6 years' experience in … infrastructure vulnerabilities is required Experience in source code management,build and deployment technologies such as RLM, Ueploy, Jenkins, Artifactory, Maven, GitHub, etc Experience conducting vulnerability assessments and articulating security issues to technical and non-technical audience. Understanding of Snyk, Checkmarx, CDXGen, Dependency Track, Fortify, GitHub Adcance Security, Sonatype or More ❯
technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerabilityassessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and More ❯
technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerabilityassessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and More ❯
technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerabilityassessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and More ❯
technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerabilityassessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and More ❯
for secure coding, threat modeling, and testing of connected devices, ensuring industry standards are met Lead efforts to review and improve security measures, including vulnerability assessments and risk evaluations Stay informed on emerging threats in the IoT and medical device sectors and contribute to thought leadership on security challenges More ❯
and Network Security delivery teams. Clearly articulate and position Bytes' cybersecurity services, including Network Security, Compliance & Assurance (ISO 27001, PCI DSS), penetration testing, and vulnerability assessments. Provide thought leadership, offering expert guidance to customers, ensuring Bytes remains aligned with customer-specific requirements and outcomes. Maintain independence and objectivity in More ❯
secure software development practices in compliance with FDA, IEC 62304, and ISO 27001. Implement identity management, authentication, and data encryption strategies. Conduct threat modeling, vulnerability assessments, and penetration testing. Address cybersecurity challenges in connected medical devices and healthcare IoT. Unit Testing, Quality Assurance & Documentation Implement automated testing frameworks for More ❯
systems Contributing to the organisation's security standards and procedures Assessing and approving requests Assisting ISO and/or lead security projects such as vulnerability scanning, DLP and/or privileged access monitoring Participating in 3rd party monitoring activities; Advising IT and business on security matters Building connectors to … various 3rd party products and services Maintenance and development of the in-house security framework Supporting vulnerabilityassessment scans and collaborating with other teams on remediation approach Collaborating with technology teams for incident handling, patching disciplines, and system hardening frameworks Collaborating with the Information Technology team on deployment More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
The Nottingham
environments using SIEM and EDR tools. Incident Investigation: Investigate security incidents and support the full incident response lifecycle, including documentation and root cause analysis. Vulnerability Assessments: Conduct regular vulnerability assessments and collaborate with IT teams to ensure timely remediation. Regulatory Compliance: Support compliance with regulatory requirements (FCA, PRA … and regulatory changes affecting the financial sector. About you: Security Tools Expertise: Strong understanding of security tools (SIEM, EDR, firewalls, IDS/IPS) and vulnerability management processes. Technical Knowledge: Solid grasp of networking, system administration, and secure configurations. Standards Familiarity: Familiarity with standards and frameworks such as ISO More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC … Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & Penetration Testing: Review Penetration Testing, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk … cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetration testing, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of More ❯
Employment Type: Contract, Work From Home
Rate: From £500 to £700 per day (direct contract with the client)