Warrington, Cheshire, North West, United Kingdom Hybrid / WFH Options
Oscar Associates (UK) Limited
security, and consultancy. They focus on proactive system health checks, monitoring, and intervention to ensure smooth business operations. Additionally, their IT security services help protect data and networks through vulnerability assessments, risk mitigation, and business continuity planning Apply now! Or email your CV to Referrals: If this role is not right for you, do you know someone that might More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
DMS Computer Recruitment
of the position include: Design and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments Participate More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
london (city of london), south east england, united kingdom
InterQuest Group
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
Wall, Hexham, Northumberland, England, United Kingdom Hybrid / WFH Options
Goodman Masson
and information. You’ll work closely with the IT Security Manager to monitor networks, respond to incidents, and enhance cyber resilience across the organisation. The role also includes conducting vulnerability assessments, supporting audits, and helping to strengthen third-party security compliance. Key Responsibilities: Monitor security systems and investigate incidents Operate firewalls, EDR, SIEM tools, and encryption software Support vulnerabilityMore ❯
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: Lead the development and delivery of threat intelligence and … vulnerability products. Select and profile key threat actors posing the greatest risk to the client's estate. Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. Provide in-depth contextual threat analysis, including actor capability and intent. Maintain and improve internal documentation and … reporting processes. Lead, mentor, and support a multidisciplinary team of cyber analysts. Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: 5+ years of experience in Threat Intelligence, Vulnerability Management, or cyber research. Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. Experience in More ❯
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: Lead the development and delivery of threat intelligence and … vulnerability products. Select and profile key threat actors posing the greatest risk to the client's estate. Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. Provide in-depth contextual threat analysis, including actor capability and intent. Maintain and improve internal documentation and … reporting processes. Lead, mentor, and support a multidisciplinary team of cyber analysts. Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: 5+ years of experience in Threat Intelligence, Vulnerability Management, or cyber research. Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. Experience in More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the criteria More ❯
ensuring mitigation plans are in place. · Support the development and maintenance of security policies and standards. · Assist with third-party security reviews and supplier risk management. · Provide oversight of vulnerability assessments. · Conduct architecture reviews for new systems and services. · Evaluate technical controls and recommend improvements. · Support the rollout of new security tools and technologies. · Provide input into incident management … and security metrics reporting. About You: · 2+ years' experience in an security role. · Strong understanding of risk assessment methodologies. · Knowledge of frameworks such as ISO 27001. · Experience with vulnerability management and technical controls. · Excellent problem-solving skills with strong attention to detail. · Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is more More ❯
ensuring mitigation plans are in place. · Support the development and maintenance of security policies and standards. · Assist with third-party security reviews and supplier risk management. · Provide oversight of vulnerability assessments. · Conduct architecture reviews for new systems and services. · Evaluate technical controls and recommend improvements. · Support the rollout of new security tools and technologies. · Provide input into incident management … and security metrics reporting. About You: · 2+ years' experience in an security role. · Strong understanding of risk assessment methodologies. · Knowledge of frameworks such as ISO 27001. · Experience with vulnerability management and technical controls. · Excellent problem-solving skills with strong attention to detail. · Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is more More ❯
ensuring mitigation plans are in place.· Support the development and maintenance of security policies and standards.· Assist with third-party security reviews and supplier risk management.· Provide oversight of vulnerability assessments.· Conduct architecture reviews for new systems and services.· Evaluate technical controls and recommend improvements.· Support the rollout of new security tools and technologies.· Provide input into incident management … and security metrics reporting. About You: · 2+ years' experience in an security role.· Strong understanding of risk assessment methodologies.· Knowledge of frameworks such as ISO 27001.· Experience with vulnerability management and technical controls.· Excellent problem-solving skills with strong attention to detail.· Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is more More ❯
ensuring mitigation plans are in place. · Support the development and maintenance of security policies and standards. · Assist with third-party security reviews and supplier risk management. · Provide oversight of vulnerability assessments. · Conduct architecture reviews for new systems and services. · Evaluate technical controls and recommend improvements. · Support the rollout of new security tools and technologies. · Provide input into incident management … and security metrics reporting. About You: · 2+ years' experience in an security role. · Strong understanding of risk assessment methodologies. · Knowledge of frameworks such as ISO 27001. · Experience with vulnerability management and technical controls. · Excellent problem-solving skills with strong attention to detail. · Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is more More ❯
ensuring mitigation plans are in place. · Support the development and maintenance of security policies and standards. · Assist with third-party security reviews and supplier risk management. · Provide oversight of vulnerability assessments. · Conduct architecture reviews for new systems and services. · Evaluate technical controls and recommend improvements. · Support the rollout of new security tools and technologies. · Provide input into incident management … and security metrics reporting. About You: · 2+ years' experience in an security role. · Strong understanding of risk assessment methodologies. · Knowledge of frameworks such as ISO 27001. · Experience with vulnerability management and technical controls. · Excellent problem-solving skills with strong attention to detail. · Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is more More ❯
Uxbridge, Middlesex, England, United Kingdom Hybrid / WFH Options
Network IT
design, implement, and maintain security network infrastructure to protect against cyber threats. Key Responsibilities: Act as a key reference point for network security , advising IT teams and stakeholders. Perform vulnerability assessments, audits, and continuous traffic monitoring for anomalies. Analyse and respond to security incidents, developing remediation and incident reports. Provide 2nd/3rd line support for network services, ensuring … Participate in project and change management, providing expertise on network security in planning and delivery. Experience Requirements: Strong technical background in network infrastructure and security operations . Experience with vulnerability assessments, incident response, and security tools. Knowledge of enterprise networking (wired, wireless, remote access). Familiarity with monitoring, alerting, and reporting solutions. Strong problem-solving skills and the ability More ❯
Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
Act as a security advocate and guide cross-functional teams in secure practices. Lead technical initiatives - Provide hands-on leadership and mentor more junior team members. Conduct threat and vulnerability assessments - Take a proactive role in identifying potential security threats. Skills and experience required: Strong experience in risk & controls within the information security, ideally in a regulated industry. Experience … e.g., multiple sites, technologies). Hands-on leadership in technical InfoSec initiatives. Strong understanding and implementation of control frameworks (NIST CSF, COBIT). Ability to run threat intelligence and vulnerability assessments. Experience collaborating with 2nd and 3rd line governance teams (e.g., audit, compliance). Strong stakeholder engagement and influencing skills. Reasonable Adjustments: Respect and equality are core values to More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the criteria More ❯