Strong troubleshooting abilities in systems, networking, and cloud environments Proven hands-on experience with tools like PAM, EDR, CASB, SIEM, DLP, email filtering , and vulnerabilitymanagement Proficient in cloud services , especially in environments using virtual machines, identity management, web apps , and networking components (e.g., virtual networks, security More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead … clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits … regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerabilitymanagement, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages More ❯
investigates possible security exceptions Updating, maintaining and documenting security controls Participating in security operations support - Following up on information security related incidents Performing Patch & VulnerabilityManagement (Qualys) Identifying and advising on external risk (Bitsight) Participating in projects Consistently implementing security solutions at the business unit level Testing new More ❯
complex organisation, trading globally within a constantly evolving IT and information security threat environment. Impact of Role Implement governance framework to enable enforcement and management of IT and cyber policies across all JD entities. Help drive good security hygiene and the use of appropriate controls into the business culture … role resides in the Information Security Function and reports to the Global Head of Governance, Risk and Compliance. Direct Reports Individual contributor with possible management of a GRC Analyst and periodic oversight of seconded resources, contingent workers and systems integrators. Key Elements of the Role The job holder will … a company-wide consistent set of policies and standards used across all entities. Implement and maintain a robust policy development lifecycle ensuring effective policy management and review in line with compliance and technological advancements and changes. Analyse incidents and events to identify omissions and opportunities for improvement in accordance More ❯
architectures (e.g. microservice, distributed, monolithic) Infrastructure technologies such as load balancers, firewalls/WAFs, routers/routing, directory services, DNS Development tooling: Development work management (Azure DevOps Boards) Source control management (Azure DevOps, TFS, Git) Deployment (Azure DevOps Pipelines, Octopus Deploy) Code quality and vulnerabilitymanagement (SonarQube, Snyk, Qualys) Containerisation (Docker, Kubernetes) Infrastructure as code (Terraform) Development languages, frameworks and platforms: Web content management systems (Sitefinity, WordPress) C#/.NET Framework/.NET Core JavaScript & JavaScript frameworks Structured Query Language (SQL) PowerShell Web protocols and internet-based technologies - HTTP, XML, JSON, REST, JavaScript, LTI … TLS, API management Testing tools such as Selenium and JMeter Establishing and refining test strategies and methods across the development lifecycle, including: unit, acceptance, regression, security, automation, functional, and performance testing Proven track record developing or working on the following types of applications: Ecommerce and portal websites Enterprise resource More ❯
technologies to strengthen the organisation's defenses. Essential functions of the job: SOC operations: perform incident triaging, threat detection, and response activities. SIEM & EDR management: advance and configure SIEM and EDR systems to optimise threat detection and response in Azure environments. Incident response: investigate and mitigate security incidents, applying … delivering innovative security solutions. Experience required: Relevant certifications in public cloud security and experience managing Azure cloud infrastructure. Proven expertise in security testing, IAM, vulnerabilitymanagement, and SIEM configuration. Strong grasp of networking fundamentals, including DNS, WAF, and ingress, paired with experience in CPSM. Familiarity with GIT/ More ❯
automation, IaC and security by design. There's a broad range of responsibilities including handling requests related to system administration, operations governance, Azure subscription management (they have 85 subscriptions), threat/vulnerabilitymanagement and incident response, you'll collaborate with engineering teams to evaluate and identify optimal … have experience of designing, supporting, securing and building Azure cloud solutions; ideally with AZ-104 certification although it's not necessary You understand subscription management structures and have experience of managing Azure subscriptions You have a good knowledge of DevOps and IaC concepts You're familiar with cloud based … security (e.g. ISO27001, NIST, CIS, OWASP, SOC2) and Identity and Access Management (IAM) within Azure You're familiar with ARM templates and/or Pulumi Ideally you will have automation and scripting (PowerShell or similar) skills You're collaborative with great communication skills What's in it for you More ❯
A Career with Point72's Global Information Security Team Our Global Information Security team's mission is to ensure the development, implementation, and management of a comprehensive program that effectively protects the confidentiality, integrity, and availability of Point72 information assets. Our team is comprised of security professionals with expertise … metal, VMware and public cloud (AWS, Azure, GCP) Collaborate with Endpoint Engineering teams to secure Windows endpoints using solutions including SCCM and InTune Configuration management for Windows Firewall and ASR rules across our endpoint estate Help to monitor and mature our Windows patching and vulnerabilitymanagement program … audits of Windows infrastructure Monitor and respond to security incidents related to Windows infrastructure Collaborate with infrastructure and security teams on identity and access management initiatives What's required Bachelor's degree in Computer Science, Information Security, or related field 7+ years of experience in Windows Server administration and More ❯
technologies (firewalls, IDS/IPS, SIEM, etc.). Experience with security tools such as SIEM/SOAR platforms, endpoint detection and response (EDR) solutions, vulnerabilitymanagement, detection and response/remediation (VMDR) solutions and threat intelligence platforms. Knowledge of security standards and frameworks (e.g., NIST, CIS Controls, ISO More ❯
Team collaborates closely with cross-functional teams across the Information Security organization and external partners. We lead key initiatives, including security monitoring, incident response, vulnerabilitymanagement, and threat intelligence, all aimed at strengthening our security posture and ensuring resilience against emerging threats. About the role & what you'll More ❯
you must have: 10+ years of progressive experience in information security including technical leadership roles. Extensive experience with secure software development lifecycle, security testing, vulnerability management. Experience with cloud technologies (AWS, Azure), security testing and automation (SAST, DAST, SCA), and AI/ML technologies. Deep understanding of DevSecOps principles More ❯
for this role. We're on the hunt for a motivated, engaged Security Operations Analyst to support, maintain and improve/contribute to the management of real time security operations, including real time analysis and ongoing security management across Vix's application suite. This opportunity will suit someone … judgment when working with sensitive information Experience with application/device security monitoring (i.e., Firewalls, IDS/IPS, Anti-Virus) Experience with SIEM tools & VulnerabilityManagement (AlienVault, Nessus, Qualys) Demonstrated ability to work as part of a team to deliver project outcomes within specified parameters including timeframes and More ❯
ISO 27001:2022. Ensure that any business changes, acquisitions, or transformations are accounted for within the scope of certification, through proactive risk identification and management with IT assets owners. Development and championing all Information Security Policies, Procedures and relevant standards, and produce supporting documentation and training material to ensure … across the organization. Experience working in a global, multi-business environment is a plus. Technical/Professional Qualification requirements: Proven experience in Information Security Management and IT risk management. In-depth knowledge of ISO27001 to Lead Auditor standard. Knowledge of relevant regulations (Data Protection, DORA, NIS2). Knowledge of … Three Lines of Defence Model and its application. Knowledge of vulnerabilitymanagement and Identity and Access management. A recognised IS qualification (e.g. CISA, CISM, CISSP, ISO 27001 Lead Auditor). Our Values: • We care about the safety of everyone. • We respect each other and the wider communities we More ❯
Farnborough, Hampshire, United Kingdom Hybrid / WFH Options
Thebusinessyear
expertise and strategic planning to prevent attacks and vulnerabilities. Your responsibilities include planning and implementing security controls to safeguard information. Key functions/outputs: Vulnerability Scanning & Reporting Change Work Participation in Regular Meetings Documentation Main Objectives: Vulnerability Scanning & Reporting Conduct regular vulnerability scans, generate reports, and ensure … tools are current to identify system weaknesses. Perform code scans, vulnerabilitymanagement scans, and assist in reporting to the cyber security team. Update endpoint protection, ensure antivirus and anti-malware are current, and audit network controls and access permissions. Recognize and respond to potential incidents, including containment and … SITT and perform security testing and assurance activities during planning phases. Participation in Regular Meetings: Lead or attend meetings such as Security Working Groups, Vulnerability Triage, Security Workshops, PI Planning, and Daily Standups, providing cybersecurity input. Documentation: Create and maintain detailed security documentation including design documents, SOPs, and compliance More ❯
some of the brightest minds in the industry. Desired Experience (full job spec available): 5+ years experience in a technical security role Experience in vulnerability assessment, penetration testing, and vulnerabilitymanagement processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate More ❯
some of the brightest minds in the industry. Desired Experience (full job spec available): 5+ years experience in a technical security role Experience in vulnerability assessment, penetration testing, and vulnerabilitymanagement processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate More ❯
deploy and manage cloud environments and integrate technologies that are part of customer stacks, to accurately replicate and resolve customer issues Knowledge of SIEM, vulnerabilitymanagement tools, firewalls, malware, exploits, operating system structure and behavior Strong consulting and project management skills, with validated results working as a More ❯
deploy and manage cloud environments and integrate technologies that are part of customer stacks, to accurately replicate and resolve customer issues Knowledge of SIEM, vulnerabilitymanagement tools, firewalls, malware, exploits, operating system structure and behavior Strong consulting and project management skills, with validated results working as a More ❯
Reigate, Surrey, United Kingdom Hybrid / WFH Options
Willis Towers Watson
Runbooks and SQL Servers (IaaS and PaaS) Day to day handling of requests, covering system administration, operations governance, Azure B2B Tenant issues, threat/vulnerabilitymanagement and incident response Maintain the Customised PowerShell functions/modules Administrate the Pipelines, Repo, Test Plan including ADO Project Management Collaborate … DevOps concept in a cloud environment Experience of Host, Network and Permitter Security design and implementation. Have a working knowledge of Identify and Access Management within Azure. Should have sound knowledge on multi-Tenant environments along with Azure B2B and Entra Tenants. Familiar with Pulumi, ARM templates or other More ❯
government programmes. The role will involve: Designing and implementing secure architectures across complex environments Leading technical teams and advising on security controls and risk management Shaping cloud and DevSecOps security strategies (AWS/Azure/GCP) Supporting accreditation and compliance with security frameworks (ISO 27001, NIST, JSP 440, Secure … Architecture role Knowledge of frameworks such as ISO 27001, NIST, CIS Familiarity with TOGAF/SABSA methodology Understanding of SIEM, firewalls, IDS/IPS, vulnerabilitymanagement Cloud security expertise – AWS, Azure, or Google Cloud DevSecOps knowledge, CI/CD, automation tooling Background in defence, government or critical national More ❯
government programmes. The role will involve: Designing and implementing secure architectures across complex environments Leading technical teams and advising on security controls and risk management Shaping cloud and DevSecOps security strategies (AWS/Azure/GCP) Supporting accreditation and compliance with security frameworks (ISO 27001, NIST, JSP 440, Secure … Architecture role Knowledge of frameworks such as ISO 27001, NIST, CIS Familiarity with TOGAF/SABSA methodology Understanding of SIEM, firewalls, IDS/IPS, vulnerabilitymanagement Cloud security expertise – AWS, Azure, or Google Cloud DevSecOps knowledge, CI/CD, automation tooling Background in defence, government or critical national More ❯
cyber threats, improved resilience and business continuity As a Cyber Security Engineer, you will have experience/knowledge of: Threat Monitoring and Incident response VulnerabilityManagement and Risk Assessments Third party & Supplier Chain Risk assessments Security Assurance & Compliance Security tools & System management including Sentinel & MS Defender Security More ❯
london (hounslow), south east england, united kingdom
Allen Lane
cyber threats, improved resilience and business continuity As a Cyber Security Engineer, you will have experience/knowledge of: Threat Monitoring and Incident response VulnerabilityManagement and Risk Assessments Third party & Supplier Chain Risk assessments Security Assurance & Compliance Security tools & System management including Sentinel & MS Defender Security More ❯
include: Security Analysis and Improvement: Continuously analyse our security systems for potential improvements, ensuring that our defences remain at the forefront of cybersecurity practices. VulnerabilityManagement: Proactively identify, assess, and remediate security vulnerabilities to maintain the integrity and confidentiality of our customer data. Security Automation: Automate security processes … development teams to ensure that web and mobile front-ends, as well as microservice architectures, are designed with robust security measures in mind. Risk Management and Compliance: Assist teams in ensuring that products and services are secure by design, align with the organisation's risk appetite, and comply with … the following: Threat modelling and risk assessments Working knowledge of secure coding principles (OWASP and OWASP mobile, SANS ) Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2) Working knowledge of cryptography including encryption, signing and digital certificates Principles More ❯
City of London, London, United Kingdom Hybrid / WFH Options
JobHeron
Design and manage security in the cloud, including AWS Control Tower, Azure, and MS O365. Conduct or coordinate regular security assessments, penetration tests, and vulnerability scans to identify and address potential vulnerabilities and weaknesses. Assist in investigating security breaches, incidents, and unauthorized access attempts, and develop and implement incident … and guide junior security engineers, sharing knowledge and best practices. Skills & Experience: 5+ years' experience in Security Engineering. Strong skills in PAM/IAM, vulnerabilitymanagement, and cloud security. Knowledge of system hardening and network security protocols. Leadership and mentoring experience. Nice to have: CISSP, CEH, or CISM More ❯