Services , you're exactly the kind of person they want to speak with. Any hands-on background in DDoS, WAF, IDAM, EDR, MDM , or VulnerabilityManagement ? Even better. They're also super open to people who are coming from an operational security background and want to pivot into More ❯
Services , you're exactly the kind of person they want to speak with. Any hands-on background in DDoS, WAF, IDAM, EDR, MDM , or VulnerabilityManagement ? Even better. They're also super open to people who are coming from an operational security background and want to pivot into More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Southern Housing
processes & processes exist for all operational security workstreams, prioritising incident response procedures including runbooks exist for specific threat types e.g. Ransomware, Malware etc Oversee vulnerabilitymanagement Manage IT security incidents, investigations, and reports Work on Projects to implement improved security and work to ensure that change implemented in More ❯
that matters, through challenging projects which demand ambitious innovation and thought leadership. The Role As a CNI Infrastructure Support Administrator, you will monitor workflow management tools and react to logged tasks, incidents and requests. Key responsibilities: Monitor workflow management tools and react to logged tasks/incidents and … most Linux system administration tools and processes. Knowledge of Windows OS and its operations. Hands on experience on Patching, YUM commands/configs and vulnerabilitymanagement security tools. Need to have good knowledge on security tools configuration and endpoint deployment. Knowledge and understanding of Networking protocols - TCP, NFS More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Erin Associates
development environment Key Requirements: 3+ years in a similar role Strong skills in Python, AWS, Kubernetes, Terraform, Linux, and Ansible Experience with threat analysis, vulnerabilitymanagement, and Agile environments Relevant certifications are a plus Package & Benefits: £60,000 - £70,000 salary Flexible hybrid working (remote options for strong More ❯
Security isn't just about locking things down-it's about enabling innovation without compromise. If you're fluent in Terraform, experienced in vulnerabilitymanagement, and thrive in mobile and cloud security, this contract role offers the chance to make an immediate impact on a fast-growing global More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Manchester Digital
and approach highly. Experience with solutioning SIEM, SOAR, or Managed Security Services is preferred. Hands-on experience with DDoS, WAF, IDAM, EDR, MDM, or VulnerabilityManagement is a plus. We are also interested in candidates with operational expertise in these areas who are looking to transition into technical More ❯
and technical improvements for the environment Desirable Knowledge in a variety of endpoint solutions such as Sophos and/or Symantec AV Knowledge of VulnerabilityManagement and Risk Analysis AV policy enhancements for SACB solutions (Netskope) Vendor-specific AV/APT certifications Prior experience and/or training More ❯
and technical improvements for the environment Desirable Knowledge in a variety of endpoint solutions such as Sophos and/or Symantec AV Knowledge of VulnerabilityManagement and Risk Analysis AV policy enhancements for SACB solutions (Netskope) Vendor-specific AV/APT certifications Prior experience and/or training More ❯
SOAR, or Managed Security Services, this could be the perfect next step - and any hands-on experience with DDoS, WAF, IDAM, EDR, MDM, or VulnerabilityManagement will be a huge plus. We are also interested to hear from candidates with operational expertise in these areas, who are looking More ❯
customer service through clear and effective communication Monitor, identify, and troubleshoot network infrastructure issues Support data centre operations, including hardware installs, cabling, and power management Assist with network changes, firmware updates, and documentation Maintain asset and change control records, ensuring accuracy and compliance Help protect customer environments through security … best practices and vulnerabilitymanagement Required Experience & Skills Solid understanding of Layer 2/3 networking and security technologies (eg, VLANs, STP, NAT/PAT, DHCP) Experience with multi-vendor environments (Cisco, Fortinet, Juniper) Familiarity with virtual and physical network infrastructure Knowledge of operating systems and networking configurations … of change control processes and documentation Desirable Qualifications Cisco CCNA or equivalent networking certification Experience in data centre environments Exposure to asset and configuration management best practices To be considered, please ensure you complete your application on the Computappoint website. Services offered by Computappoint Limited are those of an More ❯
Security and Networking. Knowledge of SIEM, SOAR, or Managed Security Services is advantageous, particularly in areas like DDoS protection, WAF, IDAM, EDR, MDM, or Vulnerability Management. Multi-vendor knowledge, e.g. Fortinet, Palo Alto, CrowdStrike. Please apply now for immediate consideration More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
orchestration tools (e.g., SOAR platforms, scripting languages like Python, PowerShell) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Responsibilities: Build security automations, logging, and SIEM detections to improve the CDO's efficiency, scalability, and incident response capabilities. Design … implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with CDO analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to More ❯
Senior SOCAnalyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's Overall Cyber Incident Management Process. You will work closely with the InfoSec Engineering Team within the Security Department to Define Requirements of the Tools & Onboard New Functionality. You … take Responsibility for Tuning & Maintaining Security Platforms to Deliver the Best Capability to other Information Security Analysts & SOC Analysts & Clients in Identifying & Delivering Threat & Vulnerability Management. You will act as Subject Matter Expert & Escalation Point for other SOC Analysts and will work closely with both the Senior Security Operations … Skills & Experience Required for Senior SOC Analyst role will include: Strong Experience in Security Operations or a related Information Security role Ideally leadership or Management Experience Strong Understanding of Information Security Principles & Technologies. Excellent Analytical & Problem-Solving Skills. Commercial Awareness & (Ideally) Experience of PCI DSS (Current Version) Knowledge of More ❯
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
comply with Baseline Security Requirements and security policy. Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & Access Management, SIEM and Vulnerability Management. Ensure internal customers, external suppliers and delivery partners are aware of security standards and future … of IT and telecommunications solutions. Competent in applying security policies and principles defined in security architecture to real world scenarios. Understands and applies risk management principles. Effective communication skills to influence stakeholders and explain complex security requirements in simple terms. Stakeholder Management - established as the go-to person More ❯
Operational Services All Desktop applications specifically including O365 and associated applications. Application and OS lifecycle management. Patching, specifically Intune, Autopilot, MDM, and OS Patching. Vulnerability Management. Print Services. Facilities, physical security services and supporting platforms. More ❯
tools (e.g., SOAR platforms, scripting languages like Python, PowerShell, KQL) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Key Skills and Experience Experience contributing to large-scale, sprint-based, security automation and detection engineering projects in a SOC … incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response … and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to leverage automation opportunities and ensure successful integrations. Desirable Skills More ❯
experience e.g. Openshift and Kubernetes. An understanding of Agile Delivery (Kanban/SCRUM/XP/Lean/SAFe). An understanding of DevOps Management (JIRA, Confluence). Awareness of CI/CD tooling such as Jenkins, GitLab or similar. Knowledge of Hashicorp Terraform and Hashicorp Vault. Awareness of … Security Testing - GitLab, Checkmarx, Veracode. Awareness of DAST Security Testing - GitLab, Veracode. Awareness of SCA/IAST Security Testing - Checkmarx, GitLab, Veracode. Awareness of VulnerabilityManagement - PA Prisma. Awareness of QA Testing - Selenium. Certifications in Gitlab, Terraform and Vault would be preferable. About us With over More ❯
to implement security controls across infrastructure (e.g., access control, encryption, logging). Lead the incident response process and manage third-party pen testing and vulnerability management. Customer & Vendor Security: Support security questionnaires, RFPs, and due diligence for customer deals. Review third-party vendors and tools for security posture and … and SSO. Clear understanding of data privacy laws (especially GDPR). Familiarity with security tools (e.g., endpoint protection, SSO/IAM, monitoring/logging, vulnerability scanning). Experience with risk assessments, incident response planning, and writing security policies. Strong communication skills, with the ability to explain security concepts to More ❯
Provide expert advice and coordinate on IM&T network and systems to solve complex business issues and maintain service continuity during disruptions. Daily Systems Management: Oversee the day-to-day management, support, and administration of the IM&T infrastructure, ensuring services meet SLAs. System Optimisation: Develop & implement system … processes to enhance infrastructure performance. Team Management: Coordinate additional technical support for issues that cannot be resolved within the team, including liaising with third-party suppliers. Plan and recommend enhancements to improve staff capacity and support processes. About us At NHS Resolution, we operate as an arms-length body … under the Department of Health and Social Care. Our expertise lies in claims management, dispute resolution, and knowledge sharing within the NHS. Our mission is to provide the NHS with the expertise needed to resolve concerns fairly, share insights for continuous improvement, and preserve resources for patient care. Discover More ❯
analyse, and enhance the reliability of large-scale distributed systems to ensure seamless uptime and operational efficiency. Automation Solutions : Develop automation solutions for configuration management, system provisioning, and deployment, significantly streamlining operations and minimising manual processes. Security Compliance : Implement and maintain robust security protocols, ensuring that systems comply with … regulatory standards and best practises, including data encryption, access control, and vulnerability management. Incident Management : Lead efforts in resolving system outages or performance degradation, conduct root cause analysis, and implement preventive measures to mitigate future risks. Collaboration : Work closely with cross-functional teams, including software development, DevOps, and More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
FCDO Services
working depending on business need Free shuttle bus available between central Milton Keynes and Hanslope Park An expert in information security and information risk management, this may be the most unique and important opportunity in your career to date. Not only will you assure data that matters hugely to … its implementation. Crucially, youll enable us to be innovative safely and securely. Your broad remit will span everything from the information aspects of crisis management, through to chairing the Digital Assurance Board, and overseeing both regulatory compliance and continuous improvement. Influence at the highest levels while bringing people on … on how to mitigate risks in their areas and plans. Youll influence decisions around corporate information security matters including risks, assurance, compliance, threat and vulnerability management. In the event of an information security or IT related incident, youll be the primary point of contact, coordinating our response. Youll also More ❯
product designs, configurations,and support procedures. Security Testing: Planning and executing security testing activities, includingSAST/DAST/IAST, penetration testing, fuzz testing, and vulnerability scanning,to evaluate the effectiveness of security controls and identify weaknesses Security Architecture: Assisting in designing and implementing secureapplication architectures, including authentication mechanisms, accesscontrols … encryption, and secure communication protocols Who we’re looking for You’ll have experience in incident management processes and tools, as well asworking with APIs (Application Programming Interfaces) for … integrating securitysolutions. This role also requires experience of key cybersecurity controls such asAnti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, VulnerabilityManagement, SOAR/automation . Additionally, you’ll have an understanding ofcommon cybersecurity threats and mitigation techniques with a keen interest inkeeping your knowledge and skills More ❯
pontefract, yorkshire and the humber, united kingdom
Drax
product designs, configurations,and support procedures. Security Testing: Planning and executing security testing activities, includingSAST/DAST/IAST, penetration testing, fuzz testing, and vulnerability scanning,to evaluate the effectiveness of security controls and identify weaknesses Security Architecture: Assisting in designing and implementing secureapplication architectures, including authentication mechanisms, accesscontrols … encryption, and secure communication protocols Who we’re looking for You’ll have experience in incident management processes and tools, as well asworking with APIs (Application Programming Interfaces) for … integrating securitysolutions. This role also requires experience of key cybersecurity controls such asAnti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, VulnerabilityManagement, SOAR/automation . Additionally, you’ll have an understanding ofcommon cybersecurity threats and mitigation techniques with a keen interest inkeeping your knowledge and skills More ❯
castleford, yorkshire and the humber, united kingdom
Drax
product designs, configurations,and support procedures. Security Testing: Planning and executing security testing activities, includingSAST/DAST/IAST, penetration testing, fuzz testing, and vulnerability scanning,to evaluate the effectiveness of security controls and identify weaknesses Security Architecture: Assisting in designing and implementing secureapplication architectures, including authentication mechanisms, accesscontrols … encryption, and secure communication protocols Who we’re looking for You’ll have experience in incident management processes and tools, as well asworking with APIs (Application Programming Interfaces) for … integrating securitysolutions. This role also requires experience of key cybersecurity controls such asAnti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, VulnerabilityManagement, SOAR/automation . Additionally, you’ll have an understanding ofcommon cybersecurity threats and mitigation techniques with a keen interest inkeeping your knowledge and skills More ❯