to deployment Manage and monitor systems for availability, performance, and security Administer and troubleshoot across Windows Server, Linux, VMware, Azure, and Microsoft 365 Contribute to backup, disaster recovery, and vulnerabilitymanagement processes Support across 1st, 2nd, and 3rd line tiers — including participation in an on-call rota Maintain clear and up-to-date technical documentation Collaborate with internal More ❯
solution design packs Understanding of cyber security control frameworks (e.g. NIST CSF, ISO 27001, DSPT, CE+) Skilled in managing requirements across waterfall, agile, or hybrid delivery model Strong stakeholder management, communication, and facilitation skills High attention to detail when producing audit-ready documentation (Desirable) Familiarity with tooling such as PAM, MFA, EDR, or vulnerabilitymanagement from a More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Littlefish
of the most exciting technologies in the industry. You will: Designing, implementing and evolving secure, scalable architecture using Microsoft Security solutions (Defender, Sentinel, Entra, Purview, and more). EmbeddingQualysvulnerability management into real-world environments. Leading the charge onautomationandGenerative AIacross our security stack. Setting governance standards and shaping the future of secure service delivery. Collaborating with cross-functional teamsfrom SOC … work expereince in security architecture or engineering, ideally within an MSSP or consultancy. Deep hands-on experience with Microsoft Security technologies. Proven track record in automation, Gen AI, or vulnerabilitymanagement (especially Qualys). Strong grasp of security frameworks (MITRE ATT&CK, NIST, ISO 27001). Strategic mindset with the ability to communicate clearly across technical and non More ❯
e.g., Python, Bash) Proven track record in DevOps or engineering roles, with expertise in cloud platforms (e.g., AWS) and Infrastructure as Code (e.g., Terraform) Knowledge of incident response processes, vulnerabilitymanagement, and incident triage Experience implementing security controls and maintaining security tools Familiarity with agile methodologies in fast-paced environments Calm, evidence-based decision-maker in high-pressure More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
EDF Energy
security engineer role, operating or maintaining network infrastructure. You'll have a strong working knowledge of next-generation firewalls and SASE platforms, exposure to email gateways, load balancers, and vulnerabilitymanagement tools in a complex enterprise environment would be a big plus. You'll be someone who takes pride in delivering exceptional customer service, with a background in More ❯
We are seeking a dynamic and detail-oriented Cyber Security Business Analyst to join our clients team for an OT Asset & Vulnerability Project. This pivotal initiative aims to enhance our operational technology infrastructure by improving asset management and vulnerability processes. The project is preparing to enter the pilot phase in the coming month, followed by a rollout … will involve refining processes, gathering feedback, and driving improvements during the implementation phase. Key Responsibilities Collaborate with stakeholders to define project objectives, scope, and deliverables for the OT Asset & Vulnerability Project. Conduct requirements gathering sessions with users and translate these into detailed functional specifications. Analyze current workflows and identify areas for improvement in asset and vulnerabilitymanagement … issues proactively. Assist in user onboarding and training activities during the rollout phase. Skills and Qualifications Experience: 10+ years as a Business Analyst, preferably in OT, IT security, or vulnerabilitymanagement projects. Technical Understanding: Familiarity with operational technology environments, asset management, and vulnerability assessment processes. Analytical Skills: Ability to analyze complex systems, identify gaps, and propose More ❯
Your technical and domain expertise will make you the trusted SME in cybersecurity and operations, working with the Head of Risk to implement proactive and skilled end-to-end management and coordination of cybersecurity incidents. The ideal candidate will have strong working knowledge and experience in the management of complex cyber incidents, along with a track record of … technical and non-technical problem-solving skills. Expert-level knowledge of security management principles, procedures, and standards, including vulnerabilitymanagement, event management, application security, identity management, and incident response. (Incident Response work to strengthen our client's response maturity) Ability to communicate effectively with both technical and non-technical stakeholders, and to prepare written reporting … and presentational content with level-appropriate messaging up to the executive level. The candidate should be strategic, systematic, and able to work well under pressure. Technical Skills: Excellent stakeholder management and communication skills are imperative. This is an excellent opportunity to join a niche consulting organization focused on private businesses and organizations based in London. More ❯
to remediate security vulnerabilities through the environments. The successful candidate will have a solid background working with Linux Red Hat command line in a Production enterprise environment and security vulnerability management. Operational • Responsible for the security and configuration compliance of the Unix estate. • Maintain, develop, and improve the vulnerabilitymanagement remediation process. Develop solutions and automated methods … patching events. • Weekend work where required to deliver the required service goals. Experience/essential and desired for successful job performance Essential • Has experience of implementing automation using Configuration Management tools such as Ansible, Chef, Puppet, Salt Stack • Has experience of managing solutions, technologies and processes associated with vulnerability and configuration compliance in a Linux Red Hat/… writing skills. Desired • Has experience working in financial services sector. • Has experience of Qualys, and Ivanti Risk Sense. Qualifications/certifications Essential • Bachelor’s degree or equivalent • Prior IT Vulnerability Remediation experience across business-critical Production infrastructure. More ❯
to remediate security vulnerabilities through the environments. The successful candidate will have a solid background working with Linux Red Hat command line in a Production enterprise environment and security vulnerability management. Operational • Responsible for the security and configuration compliance of the Unix estate. • Maintain, develop, and improve the vulnerabilitymanagement remediation process. Develop solutions and automated methods … patching events. • Weekend work where required to deliver the required service goals. Experience/essential and desired for successful job performance Essential • Has experience of implementing automation using Configuration Management tools such as Ansible, Chef, Puppet, Salt Stack • Has experience of managing solutions, technologies and processes associated with vulnerability and configuration compliance in a Linux Red Hat/… writing skills. Desired • Has experience working in financial services sector. • Has experience of Qualys, and Ivanti Risk Sense. Qualifications/certifications Essential • Bachelor’s degree or equivalent • Prior IT Vulnerability Remediation experience across business-critical Production infrastructure. More ❯
the IT Infrastructure Security and Resilience Manager at Paragon Bank, you'll play a crucial role in ensuring our infrastructure's security and resilience. Your responsibilities will include: Team Management: Overseeing a team of 2 Security Analysts indirectly, with a Team Leader as a direct report. SOC Performance Management: Ensuring our outsourced SOC and internal analysts deliver top … security operations services, and acting as a key escalation point for incidents. VulnerabilityManagement: Overseeing the vulnerabilitymanagement program for infrastructure and cloud technologies, ensuring timely identification and mitigation, and driving continuous improvement. Obsolescence Management: Creating and maintaining a horizon plan for all obsolescence under the Infrastructure and Cloud remit, aligned with budget cycles. Disaster … aligning resources and third parties in a timely manner. What you'll bring to the team About You What you'll bring to the team Alongside technical experience and management skills, you should have: Experience in Cyber Security practices, ideally managing a third-party SOC provider Experience in vulnerabilitymanagement practices and technology (preferably Tenable) Experience managing More ❯
to remediate security vulnerabilities through the environments. The successful candidate will have a solid background working with Linux Red Hat command line in a Production enterprise environment and security vulnerability management. Operational • Responsible for the security and configuration compliance of the Unix estate. • Maintain, develop, and improve the vulnerabilitymanagement remediation process. Develop solutions and automated methods … patching events. • Weekend work where required to deliver the required service goals. Experience/essential and desired for successful job performance Essential • Has experience of implementing automation using Configuration Management tools such as Ansible, Chef, Puppet, Salt Stack • Has experience of managing solutions, technologies and processes associated with vulnerability and configuration compliance in a Linux Red Hat/… writing skills. Desired • Has experience working in financial services sector. • Has experience of Qualys, and Ivanti Risk Sense. Qualifications/certifications Essential • Bachelor’s degree or equivalent • Prior IT Vulnerability Remediation experience across business-critical Production infrastructure. More ❯
This growing investment management firm is seeking to hire an IT Security Engineer to report directly to the Head of InfoSec. Working as part of a small team, this role will see you implementing and managing security tooling for the firm. This includes: Vulnerabilitymanagement tooling (Tenable) Tooling in Azure IAM tooling Firewalls (Fortinet) Anti-virus Endpoint More ❯
advancements in managed file transfer technologies, recommending enhancements or upgrades Provide technical support and guidance to end-users, assisting with file transfer-related inquiries and issues Perform patching and vulnerability fixes on Globalscape servers Essential Skills & Experience: Proven experience as a Globalscape MFT Developer or Administrator, with a strong understanding of managed file transfer concepts and technologies Knowledge of … patching and vulnerabilitymanagement in Globalscape servers Proficiency in scripting languages such as PowerShell, Python, or VBScript for automation and customization In-depth knowledge of file transfer protocols: FTP, SFTP, FTPS, AS2, HTTP/S Familiarity with security concepts including encryption, digital certificates, SSL/TLS, and access controls Experience integrating file transfer systems with enterprise applications, databases … with occasional on-call and after-hours support as required Desirable Skills: Experience in export control work Experience with Sterling or other middleware technologies Familiarity with ServiceNow tool Project management experience More ❯
expertise to strengthen the firm's security posture. Key responsibilities: Lead and support security incident response, including investigation, containment, and remediation. Deploy, manage, and continuously improve security tools, including vulnerabilitymanagement, identity management, and attack surface monitoring. Analyse emerging threats and vulnerabilities, leveraging threat intelligence to proactively mitigate risks Perform proactive threat hunting, research, and analysis, delivering More ❯
expertise to strengthen the firm's security posture. Key responsibilities: Lead and support security incident response, including investigation, containment, and remediation. Deploy, manage, and continuously improve security tools, including vulnerabilitymanagement, identity management, and attack surface monitoring. Analyse emerging threats and vulnerabilities, leveraging threat intelligence to proactively mitigate risks Perform proactive threat hunting, research, and analysis, delivering More ❯
an essential part in the safeguarding of the firm s assets, and the strengthening of the firm s Cyber Security posture. Ensure Vulnerabilities highlighted by the CTI team or VulnerabilityManagement team are correctly triaged and if required prepare a remediation plan and ensure an incident is stood up to coordinate this including any required detection rules to More ❯
mid-size enterprises to household-name multinationals (ranging from 1,000 to 100,000+ employees). What You’ll Do: Assist with IT and cybersecurity consultancy projects including patching, vulnerabilitymanagement, automation, and transformation. Troubleshoot OS-level issues (Windows/macOS/Linux) and document solutions. Apply security best practices and problem-solving skills to customer challenges. Write … OS administration and troubleshooting. Knowledge of basic security principles (e.g. IAM, encryption). Scripting skills in Python, Bash, or PowerShell (essential). Understanding of networking fundamentals and patch/vulnerability management. Desirable: Exposure to Tanium or similar endpoint management tools, and automation with Ansible. What’s On Offer: Fully remote work £40k–£50k depending on experience 10% pension More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
writing a fuzzer for an undocumented network protocol or the grammar of a new programming language. Other responsibilities includes as below Scope and execute in-depth security assessments and vulnerability research across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to … for self-study, setting and achieving long term goals (for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances are not required, and active … or assisted review with code analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerabilitymanagement, risk assessments, bug bounty hunting, malware analysis, forensics OSCP, OSWE certification, or interest in achieving certification Experience navigating and working with extremely large codebases is also highly More ❯
knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • VulnerabilityManagement and Patching • SIEM principles, products and More ❯
knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • VulnerabilityManagement and Patching • SIEM principles, products and More ❯
knowledge in: Security standards and frameworks (MoD and HMG experiences helpful) Cloud-based cyber security principles and architecture points Boundary controls, network segmentation and access control Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA Cryptographic techniques and implementations IT asset management and tracking VulnerabilityManagement and Patching SIEM principles, products More ❯
critical for our Monetary Analysis, Forecasting, and Modelling activities. The Platform Engineer will focus on creating a self-service, scalable, and reliable platform that streamlines development workflows, simplifies infrastructure management, and enhances overall productivity. This role requires a strong understanding of cloud computing (specifically Azure), infrastructure-as-code (IaC), DevOps practices, containerisation, orchestration, and a passion for building developer … Security & Compliance: Implement security best practices and controls within the platform infrastructure and CI/CD pipelines. Ensure compliance with relevant security standards and regulations. Implement security scanning and vulnerabilitymanagement processes. Documentation & Support: Develop and maintain comprehensive documentation for the platform, including API documentation, user guides, and troubleshooting guides. Provide support to users of the platform. Collaboration … concepts and security best practices. Excellent problem-solving and troubleshooting skills. Strong communication and collaboration skills. Experience with Azure Databricks and its integration with platform tooling. Experience with configuration management tools like Ansible, Puppet, or Chef. Experience building and maintaining internal developer platforms. Experience working in a regulated industry (e.g., financial services). Azure certifications (e.g., Azure DevOps Engineer More ❯
critical for our Monetary Analysis, Forecasting, and Modelling activities. The Platform Engineer will focus on creating a self-service, scalable, and reliable platform that streamlines development workflows, simplifies infrastructure management, and enhances overall productivity. This role requires a strong understanding of cloud computing (specifically Azure), infrastructure-as-code (IaC), DevOps practices, containerisation, orchestration, and a passion for building developer … Security & Compliance: Implement security best practices and controls within the platform infrastructure and CI/CD pipelines. Ensure compliance with relevant security standards and regulations. Implement security scanning and vulnerabilitymanagement processes. Documentation & Support: Develop and maintain comprehensive documentation for the platform, including API documentation, user guides, and troubleshooting guides. Provide support to users of the platform. Collaboration … concepts and security best practices. Excellent problem-solving and troubleshooting skills. Strong communication and collaboration skills. Experience with Azure Databricks and its integration with platform tooling. Experience with configuration management tools like Ansible, Puppet, or Chef. Experience building and maintaining internal developer platforms. Experience working in a regulated industry (e.g., financial services). Azure certifications (e.g., Azure DevOps Engineer More ❯
Establish and manage the Working Age Services security posture and initiatives, ensuring the protection of information assets from internal and external threats. Develop, manage, and enhance the fraud risk management framework to minimize the department's exposure to fraud risks. Oversee the implementation, management, and proper utilization of security tools such as intrusion detection systems, vulnerabilitymanagement … and data encryption. Assess and manage the identification and mitigation plans of existing and emerging security threats, vulnerabilities, and risks. Maintain awareness in information security technologies and fraud risk management methodologies, applying best practices and driving knowledge through Working Age Services. Lead security awareness and education programs to encourage all employees to maintain a high level of vigilance. An More ❯