and Network Security delivery teams. Clearly articulate and position Bytes' cybersecurity services, including Network Security, Compliance & Assurance (ISO 27001, PCI DSS), penetration testing, and vulnerability assessments. Provide thought leadership, offering expert guidance to customers, ensuring Bytes remains aligned with customer-specific requirements and outcomes. Maintain independence and objectivity in More ❯
secure software development practices in compliance with FDA, IEC 62304, and ISO 27001. Implement identity management, authentication, and data encryption strategies. Conduct threat modeling, vulnerability assessments, and penetration testing. Address cybersecurity challenges in connected medical devices and healthcare IoT. Unit Testing, Quality Assurance & Documentation Implement automated testing frameworks for More ❯
expanding global enterprise. The OT Manager, Cybersecurity, will audit the Industrial Control System/Operational Technology (ICS/OT) environment and perform risk/vulnerability assessments leading to the development of an enterprise strategy/design plan. The OT Manager, Cybersecurity, will lead the team on implementation (hands-on More ❯
systems Contributing to the organisation's security standards and procedures Assessing and approving requests Assisting ISO and/or lead security projects such as vulnerability scanning, DLP and/or privileged access monitoring Participating in 3rd party monitoring activities; Advising IT and business on security matters Building connectors to … various 3rd party products and services Maintenance and development of the in-house security framework Supporting vulnerabilityassessment scans and collaborating with other teams on remediation approach Collaborating with technology teams for incident handling, patching disciplines, and system hardening frameworks Collaborating with the Information Technology team on deployment More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
The Nottingham
environments using SIEM and EDR tools. Incident Investigation: Investigate security incidents and support the full incident response lifecycle, including documentation and root cause analysis. Vulnerability Assessments: Conduct regular vulnerability assessments and collaborate with IT teams to ensure timely remediation. Regulatory Compliance: Support compliance with regulatory requirements (FCA, PRA … and regulatory changes affecting the financial sector. About you: Security Tools Expertise: Strong understanding of security tools (SIEM, EDR, firewalls, IDS/IPS) and vulnerability management processes. Technical Knowledge: Solid grasp of networking, system administration, and secure configurations. Standards Familiarity: Familiarity with standards and frameworks such as ISO More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC … Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & Penetration Testing: Review Penetration Testing, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk … cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetration testing, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of More ❯
Employment Type: Contract, Work From Home
Rate: From £500 to £700 per day (direct contract with the client)
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
security measures throughout the life cycle, from data ingestion to model deployment. Skills and Qualifications: Security Expertise: Strong understanding of cybersecurity principles, threat modelling, vulnerabilityassessment, and penetration testing. Cloud Computing: Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Data Privacy and Compliance: Knowledge of More ❯
Governance, Risk, and Compliance) SECOPS (Security Operations) Digital Identity You'll gain experience with industry-leading security technologies and practices, including firewalls, SIEM tools, vulnerabilityassessment, and more. As you apply your skills, you'll be mentored by industry experts and work in a high-performing team. Why More ❯
to protect organization's data and systems - Monitor network traffic for potential security breaches and respond appropriately to incidents - Conduct regular security audits and vulnerability assessments to identify and address security risks - Collaborate with cross-functional teams to implement security policies and procedures - Provide technical support and guidance to More ❯
hosted environments. Security and Compliance: Implement and maintain robust security protocols for hosted solutions, including firewalls, encryption, and access controls. Conduct regular security audits, vulnerability assessments, and patch management to meet compliance standards. Ensure hosted environments adhere to industry and regulatory security requirements. Utilize System Center Configuration Manager for More ❯
Albany Beck are seeking a Vulnerability Analyst with a strong background in Security Operations to join our growing consultancy team and work on a critical programme of work for a leading global investment bank. This role is pivotal in ensuring the security and resilience of the bank’s systems … by identifying, assessing, and mitigating vulnerabilities across a complex and dynamic IT landscape. As a Vulnerability Analyst, you’ll be responsible for proactively analysing security threats and system vulnerabilities across the bank’s infrastructure. You’ll work alongside security engineers, architects, and SOC teams to ensure threats are swiftly … identified and effectively mitigated. This role demands a keen analytical mindset, excellent communication skills, and deep knowledge of vulnerability scanning tools and remediation workflows in large-scale financial institutions. Key Responsibilities: Conduct regular vulnerability assessments and penetration tests across applications, infrastructure, and cloud environments. Analyse security threats and More ❯
Albany Beck are seeking a Vulnerability Analyst with a strong background in Security Operations to join our growing consultancy team and work on a critical programme of work for a leading global investment bank. This role is pivotal in ensuring the security and resilience of the bank’s systems … by identifying, assessing, and mitigating vulnerabilities across a complex and dynamic IT landscape. As a Vulnerability Analyst, you’ll be responsible for proactively analysing security threats and system vulnerabilities across the bank’s infrastructure. You’ll work alongside security engineers, architects, and SOC teams to ensure threats are swiftly … identified and effectively mitigated. This role demands a keen analytical mindset, excellent communication skills, and deep knowledge of vulnerability scanning tools and remediation workflows in large-scale financial institutions. Key Responsibilities: Conduct regular vulnerability assessments and penetration tests across applications, infrastructure, and cloud environments. Analyse security threats and More ❯
Incident Response: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. Vulnerability Management Tools: Conduct regular vulnerability assessments, prioritize and remediate issues, and stay updated on emerging threats. Policy & Compliance Support: Help develop and enforce More ❯
information systems. Governance Compliance: Develop, enforce, and monitor security policies, procedures, and standards in accordance with regulatory requirements. Risk Management: Conduct regular security audits, vulnerability assessments, and penetration tests to identify risks and recommend mitigation strategies. Incident Response: Lead and coordinate response efforts during security incidents, ensuring swift resolution More ❯
information systems. Governance Compliance: Develop, enforce, and monitor security policies, procedures, and standards in accordance with regulatory requirements. Risk Management: Conduct regular security audits, vulnerability assessments, and penetration tests to identify risks and recommend mitigation strategies. Incident Response: Lead and coordinate response efforts during security incidents, ensuring swift resolution More ❯
watford, hertfordshire, east anglia, united kingdom
Taylor Hall recruitment
information systems. Governance Compliance: Develop, enforce, and monitor security policies, procedures, and standards in accordance with regulatory requirements. Risk Management: Conduct regular security audits, vulnerability assessments, and penetration tests to identify risks and recommend mitigation strategies. Incident Response: Lead and coordinate response efforts during security incidents, ensuring swift resolution More ❯
through monitoring activities. Coordinate with Infrastructure, Support, and Security teams to implement technical controls and ensure security considerations are integrated into IT projects. Perform vulnerability assessments and recommend remedial actions. Qualifications and Experience Minimum of 4 years' experience in IT and security roles, with broad exposure to systems analysis More ❯
MOD, HMG, and NCSC frameworks and accreditations. Engage with national authorities (e.g., NCSC) to support accreditations and assurance. Oversee security testing activities (e.g., ITHC, vulnerability assessments). Maintain security risk records, support audits, and provide regular reporting. Promote a culture of high standards in information assurance and risk management. More ❯
MOD, HMG, and NCSC frameworks and accreditations. Engage with national authorities (e.g., NCSC) to support accreditations and assurance. Oversee security testing activities (e.g., ITHC, vulnerability assessments). Maintain security risk records, support audits, and provide regular reporting. Promote a culture of high standards in information assurance and risk management. More ❯
Lambda, RDS). Proven experience in designing secure, scalable cloud architectures with a focus on security at every layer. Experience in conducting threat modeling, vulnerability assessments, and developing risk mitigation strategies. In-depth knowledge of AWS security best practices for IAM, encryption, and data protection. Familiarity with cloud security More ❯
London, England, United Kingdom Hybrid / WFH Options
Client Server
infrastructures across Python, C++, and Kotlin/Java environments, ensuring robust protection that supports high-speed, data-driven operations. You will conduct threat modelling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle and provide mentorship, guidance and More ❯
documentation, collaborate on IT projects to ensure that security issues are addressed throughout the project life cycle and work with the team to perform vulnerability assessments to identify weaknesses and recommend remedial action As the Information Security Technical Lead you are required so show demonstrable knowledge and appreciation of More ❯
City of London, London, Canary Wharf, United Kingdom
Fusion People Ltd
documentation, collaborate on IT projects to ensure that security issues are addressed throughout the project life cycle and work with the team to perform vulnerability assessments to identify weaknesses and recommend remedial action As the Information Security Technical Lead you are required so show demonstrable knowledge and appreciation of More ❯
Employment Type: Permanent
Salary: £80000 - £88000/annum hybrid, great benefits
across various platforms. The consultant will play a critical role in evaluating and strengthening our clients’ cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with … including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerability management, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit, Burp … firewall configurations, and secure network design. Proficiency in scripting languages (e.g., Python, Bash, PowerShell) to automate tasks and streamline processes. Hands-on experience of vulnerability assessments, Incident response, penetration testing, threat hunting and compromise assessment. Experience collaborating with Sales teams as a pre-sale's cyber security consultant. Experience More ❯
across various platforms. The consultant will play a critical role in evaluating and strengthening our clients' cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with … including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerability management, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit, Burp … firewall configurations, and secure network design. Proficiency in scripting languages (e.g., Python, Bash, PowerShell) to automate tasks and streamline processes. Hands-on experience of vulnerability assessments, Incident response, penetration testing, threat hunting and compromise assessment. Experience collaborating with Sales teams as a pre-sale's cyber security consultant. Experience More ❯