security is embedded across the business. What You’ll Do Policy & Frameworks: Define and maintain security policies, standards, and governance models aligned with ISO 27001, SOC2, and NIST. Risk Management: Lead risk assessments, threat modelling, and vendor security reviews; maintain the company risk register. Monitoring & Detection: Implement and oversee vulnerabilitymanagement, SIEM, logging, and alerting capabilities. Incident … security engineering roles. Strong knowledge of security frameworks (ISO 27001, SOC2, NIST) and ability to apply them pragmatically in a start-up/scale-up. Hands-on experience with vulnerabilitymanagement, SIEM/logging tools, and incident response. Demonstrated ability to lead risk assessments and implement effective mitigations. Excellent stakeholder communication skills, including board-level reporting. Comfortable operating More ❯
security is embedded across the business. What You’ll Do Policy & Frameworks: Define and maintain security policies, standards, and governance models aligned with ISO 27001, SOC2, and NIST. Risk Management: Lead risk assessments, threat modelling, and vendor security reviews; maintain the company risk register. Monitoring & Detection: Implement and oversee vulnerabilitymanagement, SIEM, logging, and alerting capabilities. Incident … security engineering roles. Strong knowledge of security frameworks (ISO 27001, SOC2, NIST) and ability to apply them pragmatically in a start-up/scale-up. Hands-on experience with vulnerabilitymanagement, SIEM/logging tools, and incident response. Demonstrated ability to lead risk assessments and implement effective mitigations. Excellent stakeholder communication skills, including board-level reporting. Comfortable operating More ❯
security is embedded across the business. What You’ll Do Policy & Frameworks: Define and maintain security policies, standards, and governance models aligned with ISO 27001, SOC2, and NIST. Risk Management: Lead risk assessments, threat modelling, and vendor security reviews; maintain the company risk register. Monitoring & Detection: Implement and oversee vulnerabilitymanagement, SIEM, logging, and alerting capabilities. Incident … security engineering roles. Strong knowledge of security frameworks (ISO 27001, SOC2, NIST) and ability to apply them pragmatically in a start-up/scale-up. Hands-on experience with vulnerabilitymanagement, SIEM/logging tools, and incident response. Demonstrated ability to lead risk assessments and implement effective mitigations. Excellent stakeholder communication skills, including board-level reporting. Comfortable operating More ❯
london (city of london), south east england, united kingdom
Humanoid
security is embedded across the business. What You’ll Do Policy & Frameworks: Define and maintain security policies, standards, and governance models aligned with ISO 27001, SOC2, and NIST. Risk Management: Lead risk assessments, threat modelling, and vendor security reviews; maintain the company risk register. Monitoring & Detection: Implement and oversee vulnerabilitymanagement, SIEM, logging, and alerting capabilities. Incident … security engineering roles. Strong knowledge of security frameworks (ISO 27001, SOC2, NIST) and ability to apply them pragmatically in a start-up/scale-up. Hands-on experience with vulnerabilitymanagement, SIEM/logging tools, and incident response. Demonstrated ability to lead risk assessments and implement effective mitigations. Excellent stakeholder communication skills, including board-level reporting. Comfortable operating More ❯
security is embedded across the business. What You’ll Do Policy & Frameworks: Define and maintain security policies, standards, and governance models aligned with ISO 27001, SOC2, and NIST. Risk Management: Lead risk assessments, threat modelling, and vendor security reviews; maintain the company risk register. Monitoring & Detection: Implement and oversee vulnerabilitymanagement, SIEM, logging, and alerting capabilities. Incident … security engineering roles. Strong knowledge of security frameworks (ISO 27001, SOC2, NIST) and ability to apply them pragmatically in a start-up/scale-up. Hands-on experience with vulnerabilitymanagement, SIEM/logging tools, and incident response. Demonstrated ability to lead risk assessments and implement effective mitigations. Excellent stakeholder communication skills, including board-level reporting. Comfortable operating More ❯
Hull, North Humberside, England, United Kingdom Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerabilitymanagement: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerabilitymanagement, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non … technical staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey More ❯
North Ferriby, North Humberside, North East, United Kingdom Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerabilitymanagement: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerabilitymanagement, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non … technical staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey More ❯
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerabilitymanagement: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerabilitymanagement, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non … technical staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey More ❯
Oxfordshire, England, United Kingdom Hybrid / WFH Options
Tank Recruitment
leading Quarterly Security Reviews and presenting clear business-focused risk assessments. Own security governance processes, ensuring compliance with frameworks such as Cyber Essentials, ISO27001, and NIST . Oversee patching, vulnerabilitymanagement, and internal infrastructure security. Collaborate across service delivery, project, and account management teams to embed security consistently. Mentor and develop Security Analysts, ensuring certifications and knowledge … for C-level stakeholders. The ideal candidate will have: 5+ years in IT security or MSP environments . Strong knowledge of Cyber Essentials, ISO27001, or NIST frameworks. Experience in vulnerabilitymanagement, patch governance, and cloud security (M365/Azure). Excellent communication skills with the ability to influence both technical teams and business leaders. (Desirable) Certifications such as More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Nextech
expertise. What You'll Do Serve as the Cyber Security Subject Matter Expert, advising on secure systems design, change control, and implementation of robust security controls. Lead the technical vulnerabilitymanagement programme, with a strong focus on application security, web application firewalls, and secure DevOps pipelines. Provide security leadership and mentoring , supporting colleagues and enhancing security awareness across … evolving threats, and help shape our strategy using frameworks such as OWASP, SASE, and Zero Trust. What We're Looking For Essential: Proven experience in cyber security engineering, including vulnerabilitymanagement, SIEM, WAFs, and secure infrastructure design. Strong knowledge of TCP/IP, firewalls, routing, access controls, and threat-based security approaches. Excellent communication skills with the ability More ❯
to protect against evolving threats. What you'll do As part of a team of analysts, you'll be responsible for the overall day-to-day technical and operational management of cyber and information security within the University. This includes operating within a hybrid Security Operations Centre (SOC) model, leading the investigation and resolution of cyber security incidents, and … continuous monitoring across the University. Conduct proactive threat hunting activities to detect advanced threats and anomalous behaviour within the University's network, and provide solutions to support incident response, vulnerabilitymanagement, and strategic security decisions. Collaborate with third-party providers to scope, coordinate, and review network security assessments, and ensure that findings and recommendations are effectively prioritised, communicated … documented and implemented to improve the University's security posture. Support the network vulnerabilitymanagement process by identifying, assessing, and prioritising security vulnerabilities, and working with relevant teams and third parties to ensure timely remediation through patching, configuration changes, or other appropriate fixes. Design, implement, and support technical security controls to defend University network systems against security threats More ❯
Southampton, Hampshire, South East, United Kingdom
University of Southampton
Cisco technologies, to protect against evolving threats. What youll do - As part of a team of analysts, youll be responsible for the overall day-to-day technical and operational management of cyber and information security within the University. This includes operating within a hybrid Security Operations Centre (SOC) model, leading the investigation and resolution of cybersecurity incidents, and co … continuous monitoring across the University. - Conduct proactive threat hunting activities to detect advanced threats and anomalous behaviour within the University's network, and provide solutions to support incident response, vulnerabilitymanagement, and strategic security decisions. - Collaborate with third-party providers to scope, co-ordinate, and review network security assessments, and ensure that findings and recommendations are effectively prioritised … communicated, documented and implemented to improve the Universitys security posture. - Support the network vulnerabilitymanagement process by identifying, assessing, and prioritising security vulnerabilities, and working with relevant teams and third parties to ensure timely remediation through patching, configuration changes, or other appropriate fixes. - Design, implement, and support technical security controls to defend University network systems against security threats More ❯
Cisco technologies, to protect against evolving threats. What youll do - As part of a team of analysts, youll be responsible for the overall day-to-day technical and operational management of cyber and information security within the University. This includes operating within a hybrid Security Operations Centre (SOC) model, leading the investigation and resolution of cybersecurity incidents, and co … continuous monitoring across the University. - Conduct proactive threat hunting activities to detect advanced threats and anomalous behaviour within the University's network, and provide solutions to support incident response, vulnerabilitymanagement, and strategic security decisions. - Collaborate with third-party providers to scope, co-ordinate, and review network security assessments, and ensure that findings and recommendations are effectively prioritised … communicated, documented and implemented to improve the Universitys security posture. - Support the network vulnerabilitymanagement process by identifying, assessing, and prioritising security vulnerabilities, and working with relevant teams and third parties to ensure timely remediation through patching, configuration changes, or other appropriate fixes. - Design, implement, and support technical security controls to defend University network systems against security threats More ❯
CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and More ❯
CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and More ❯
CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and More ❯
day infrastructure and security operations across our hybrid environment. In addition, you'll also take ownership for the delivery of key governance activities including risk assessments, audits, compliance checks, vulnerabilitymanagement and cyber incident response. Working closely with the Head of IT, you'll support the development of long-term plans while taking full ownership of technical delivery. … Azure (IaaS, PaaS, networking, storage, compute, security and monitoring) Networking technologies (firewalls, VPNs, LAN/WAN, DNS/DHCP, TCP/IP, virtualisation) Enterprise security tools (SIEM, endpoint protection, vulnerabilitymanagement, XDR, MDM, IDPS) Backup, replication and disaster recovery solutions Microsoft services such as Windows Server, Intune, Autopilot, Entra ID, Defender, Exchange and SharePoint You'll have proven More ❯
stakeholders and providing clear, actionable reporting. Skills & experience sought: Strong background in IT Security, Cyber Assurance, or IT Audit. Hands-on knowledge across areas such as governance, IAM, threat management, vulnerabilitymanagement, and incident response. Good understanding of security frameworks (e.g. ISO27001, NIST, PCI-DSS, SOX). Experience engaging with senior stakeholders within complex environments. Relevant certifications More ❯
stakeholders and providing clear, actionable reporting. Skills & experience sought: Strong background in IT Security, Cyber Assurance, or IT Audit. Hands-on knowledge across areas such as governance, IAM, threat management, vulnerabilitymanagement, and incident response. Good understanding of security frameworks (e.g. ISO27001, NIST, PCI-DSS, SOX). Experience engaging with senior stakeholders within complex environments. Relevant certifications More ❯
Vulnerability Analyst – 3-month contract My Customer is seeking a proactive and skilled Vulnerability Analyst to join their team in a highly regulated, mission-critical 24/7 environment. Their infrastructure includes over 450 servers operating across both Windows and Linux platforms — making secure access and timely response essential. Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools is needed for this role. Key Skills from the Vulnerability Analyst: Demonstrated experience in vulnerabilitymanagement within large-scale enterprise or corporate environments . Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools. Strong working knowledge of Windows and Linux operating systems , including their associated technology … stacks. Able to operate effectively in a secure, complex, and highly regulated setting with restricted access considerations. Key responsibilities for the Vulnerability Analyst: Daily monitoring and analysis of security events and vulnerabilities. Proactively reviewing Qualys reports to identify missing patches, misconfigurations, and other potential threats. Collaborating closely with infrastructure and operations teams to coordinate and apply remediation actions. Ensuring More ❯
Sunderland, Tyne and Wear, England, United Kingdom
Nigel Wright Group
challenging and interesting products and technologies. Key Responsibilities: - Prioritising and assess the impact of new incidents via phone, email, Microsoft Teams and our help desk system- Incident and Queue Management- Implementing first time fixes and resolving technical issues at a 3rd line support level- Providing first point contact support to our users and maintaining excellent customer service via phone … Directory/Microsoft Entra ID- Microsoft Office 365 Administration Desirable Skills & Experience - Microsoft Office 365 Administration- Windows Server 2016-2022 Administration- Microsoft SQL Server Administration (Database support, maintenance plan management)- Management and maintenance of our Anti-Virus, MDR/EDR and Cloud Optix platform- VulnerabilityManagement and resolution More ❯
Title: CREST Accredited Security Tester 6 Month Contract Hybrid (Central London based) £670 Per Day Inside IR35 Overview: Seeking a CREST-accredited Security Tester with strong penetration testing and vulnerabilitymanagement expertise. Skilled in Tenable Nessus and experienced in managing third-party testing engagements , you'll deliver high-impact security assurance across complex environments. Key Responsibilities: Conduct internal … clear, high-quality scopes, proposals, and technical reports . Provide SME guidance on threats, risks, and testing methodologies. Manage and coordinate third-party CHECK/CREST testers . Lead vulnerabilitymanagement activities, validating remediation. Contribute to testing frameworks, playbooks, and secure-by-design practices . Research and assess emerging threats to enhance testing capability. Skills & Experience: CREST certification More ❯
Worthing, West Sussex, England, United Kingdom Hybrid / WFH Options
VIQU IT Recruitment
Vulnerability Analyst – 6 Months – Remote - Qualys A client is seeking a Vulnerability analyst/Patching Engineer to help tackle a critical security backlog across 2,700 devices. This is a hands-on contract role focused on patching end users and security remediation to ensure systems are up to date and secure. Key Skills of the Vulnerability Analyst … Strong experience in vulnerabilitymanagement and patching within enterprise environments. Hands-on experience with Qualys for vulnerability scanning and reporting. Solid Windows 10/11 expertise with a focus on security hardening and patching. Proficient with SCCM is beneficial but not necessary. Excellent documentation skills. Strong verbal and written communication skills. Responsibilities of the Vulnerability Analyst … end patching for end user devices. Support and transfer knowledge of Qualys alerts and patching workflows. Ensure all systems run on the latest and most secure versions. The successful Vulnerability t Analyst will be working remotely however may require occasional ad hoc travel to Worthing. Apply now to speak with VIQU IT in confidence. Or reach out to Matt More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
VANLOQ LIMITED
requirements. Contribute to the development of new architecture patterns and strategies, particularly within cybersecurity. Essential Skills & Experience Proven expertise in at least one domain of cybersecurity: security operations, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, networks, applications, data, or cloud. Strong understanding of enterprise and solution architecture principles. Experience delivering solutions within large-scale IT transformation … programmes. Skilled in Identity & Access Management (IAM), including secrets management (e.g., HashiCorp Vault), workload identity frameworks, privileged access management, and authentication protocols (Kerberos, OAuth, SAML). Proficiency with architecture tools such as BizzDesign, Archi, UML, and collaboration platforms (Jira, Confluence). Excellent communication skills, with the ability to engage both technical and non-technical stakeholders. Preferred Qualifications More ❯
the senior lead to ensure our state of the art security centre is as effective and as efficient as can possibly be. As well as the proactive and responsive management of your team you will also have input for the strategy and future direction of our operation. Main tasks and responsibilities: Manage Shared SOC for more than 100 FTE … improvisation to achieve operational objectives Revise and develop processes to strengthen the current Security Operations Framework, Review policies and highlight the challenges in managing SLAs Responsible for team & vendor management, overall use of resources and initiation of corrective action where required for Security Operations Centre Management, administration & maintenance of security devices under the purview of SOC which consists … build and maintain positive working relationships with them Pre-requisites: Experience of more than 12 years in advanced security technologies Strong security professional skilled in Security Information and Event Management (SIEM), VulnerabilityManagement and Security Intelligence, IDAM, Digital Rights Management (DRM), Anti-APT, Data Leak Prevention (DLP), Phishing simulation tools etc Experience in managing P1 incidents More ❯