Corsham, Wiltshire, South West, United Kingdom Hybrid / WFH Options
Robert Half
debt, and integration complexity. Documents infrastructure assets, licensing models, support agreements, and architectural decisions for transition. Identifies and prioritises compliance gaps between acquired environments and corporate IT standards. Leads remediation of inherited infrastructure vulnerabilities and misconfigurations. Acts as the point of coordination between IT, business stakeholders, vendors, and third-party providers. Supports the Project Manager by contributing to roadmaps … Server (2012/2016/2019/2022) administration and migration Virtualisation platforms (VMware, Hyper-V, Nutanix ) Networking - TCP/IP, DNS, DHCP, VPN, VLAN, firewalls Cybersecurity - endpoint protection, vulnerabilityremediation, access controls, secure configuration Clinical systems - understanding of healthcare IT environments and electronic health record (EHR) systems Experience working with hybrid environments and cloud integration (e.g., Azure … preferably with exposure to M&A or complex integration scenarios. Strong architectural and hands-on knowledge of enterprise systems and infrastructure technologies. Background in infrastructure risk analysis, documentation, and remediation planning. Ability to manage complex integration projects across diverse environments. Excellent stakeholder communication and coordination across business and technical teams. Familiarity with IT governance, service management, and regulatory requirements More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
SNG (Sovereign Network Group)
SIEM and other security tools Conduct triage of security incidents and escalate as appropriate Collaborate with the SOC and internal teams to respond to and resolve security events Drive vulnerabilityremediation across infrastructure and cloud environments Participate in incident response activities, forensic investigations, and risk mitigation Participate in an on-call rota for out-of-hours cyber incident … re Looking For Experience in a Cyber Security Analyst role or similar Solid understanding of cyber security principles and industry best practices Experience with SIEM tools, log analysis, and vulnerability management Understanding of cloud, network, and endpoint security concepts Strong analytical skills and attention to detail Excellent communication and documentation skills Your Benefits We have some great benefits on More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
SNG (Sovereign Network Group)
SIEM and other security tools Conduct triage of security incidents and escalate as appropriate Collaborate with the SOC and internal teams to respond to and resolve security events Drive vulnerabilityremediation across infrastructure and cloud environments Participate in incident response activities, forensic investigations, and risk mitigation Participate in an on-call rota for out-of-hours cyber incident … re Looking For Experience in a Cyber Security Analyst role or similar Solid understanding of cyber security principles and industry best practices Experience with SIEM tools, log analysis, and vulnerability management Understanding of cloud, network, and endpoint security concepts Strong analytical skills and attention to detail Excellent communication and documentation skills Your Benefits We have some great benefits on More ❯
secure architecture and coding standards Lead DevSecOps integration with automated security testing in CI/CD Drive continuous process improvements and automation adoption Monitor and report on KPIs like vulnerabilityremediation, tool adoption, and training uptake Collaborate cross-functionally with architects, engineers, and product owners What We’re Looking For Technical Expertise: 10+ years in secure software development More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson McCade
secure architecture and coding standards Lead DevSecOps integration with automated security testing in CI/CD Drive continuous process improvements and automation adoption Monitor and report on KPIs like vulnerabilityremediation, tool adoption, and training uptake Collaborate cross-functionally with architects, engineers, and product owners What We’re Looking For Technical Expertise: 10+ years in secure software development More ❯
architecture reviews, threat modelling and manual code reviews on web applications, mobile applications and other relevant services. - Interpret security tools and penetration testing results to stakeholders, providing advice on vulnerabilityremediation and risk mitigation. - Create relevant documentation and metrics to your stakeholders and business leaders and deliver these in a clear, concise manner. - Research and maintain proficiency in More ❯
In-depth knowledge and hands-on experience with SAST, DAST and API security testing Solid understanding of AWS and security configurations. Experience in securing Containerised environments Strong knowledge of vulnerability management tools and methodologies. Experience implementing automated deployments DevSecOps Engineer More ❯
including details of common vulnerabilities and emerging threats. Experience with authentication and authorization standards, including OAuth and SAML, and their weaknesses. Detailed knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits. Experience with Cloud Computing providers like AWS, GCP, Azure. Problem solving skills to resolve problems effectively and creatively while maintaining a More ❯
Paddington, Greater London, England Hybrid / WFH Options
Nexus Jobs Limited
security access and manage IDS/IPS configurations Establishing and implementing security 'best-practice' standards as well as departmental policies and procedures Responsible for Security scanning and the efficient remediation of vulnerabilities Responsible for analysing all security incidents to determine root cause Determine, recommend, and implement upgrade security measures and controls Delivery security responses for customer and client compliance More ❯
Security Architect Work Mode: Hybrid Work Location : London Job Description: We are seeking a highly skilled and experienced Lead Security Architect to join our team for the Protocol Analysis & Remediation project. The successful candidate will be responsible for designing and implementing security architectures related to lateral movement between workloads and endpoints and understanding and controlling the protocols they utilize … Collaborate with IT and security teams to ensure the integration of security best practices into network and system designs. Conduct security assessments and audits to identify vulnerabilities and recommend remediation actions. Provide technical leadership and guidance to the security team and other stakeholders. Stay updated with the latest security trends, threats, and technologies to ensure the organization's security … techniques. Experience with Azure Log Analytics, KQL, and Azure Alerts. Python, Shell, and PowerShell scripting. Experience with security tools and technologies (e.g., SIEM, IDS/IPS, NG Firewall capabilities, vulnerability scanners). Knowledge of Active Directory and Azure AD. Knowledge of application delivery and the infrastructures that enable it. Familiarity with SQL Server, Oracle, clustering/High Availability technologies More ❯
Indicators of Misconfiguration (IOMs) utilizing AWS built-in and third-party assessment tools. Utilizing tools like AWS Config, Security Hub, Inspector, Guardduty, and Crowdstrike Falcon, assess monitor and prioritize remediation of Cloud security vulnerabilities. Develop and maintain tools to detect and remove secrets from code check-ins. Establish development best practices for working with code libraries such as docker … desired. Additional certifications such as CCNA/CCNP, AWS Security etc. desired. 10+ years of IT experience, ideally with some project management. Familiarity with AWS, infrastructure-as-code, firewalls, vulnerability assessment tools, DLP, TCP/IP, web content filtering, VPN, endpoint protection, password management/Vaults, log management and correlation, and device/application hardening. Understanding of API programming. More ❯
security access and manage IDS/IPS configurations Establishing and implementing security 'best-practice' standards as well as departmental policies and procedures Responsible for Security scanning and the efficient remediation of vulnerabilities Responsible for analysing all security incidents to determine root cause Determine, recommend, and implement upgrade security measures and controls Delivery security responses for customer and client compliance More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
end client s, ensuring work is performed to the highest professional standards. Key Responsibilities Conduct thorough penetration tests on infrastructure, web applications, APIs, mobile applications, and cloud environments. Perform vulnerability and cloud assessments using a variety of tools and techniques. Document testing procedures, findings, and recommendations in detailed reports for both technical and non-technical audiences. Serve as the More ❯
Nuneaton, Warwickshire, United Kingdom Hybrid / WFH Options
IntaForensics
and private sectors, ensuring work is performed to the highest professional standards. Key Responsibilities Conduct thorough penetration tests on infrastructure, web applications, APIs, mobile applications, and cloud environments. Perform vulnerability and cloud assessments using a variety of tools and techniques. Document testing procedures, findings, and recommendations in detailed reports for both technical and non-technical audiences. Serve as the More ❯
platforms. A good understanding of network security and protocols like TCP/IP. Experience with technical concepts such as tunneling traffic and IP configuration. Experience delivering penetration tests and vulnerability assessments for networks, applications, and cloud services. Excellent communication skills, both verbal and written, with the ability to present to clients. Ability to manage time effectively and work to More ❯
and enforce security policies. o Ensure compliance with internal data governance standards. o Manage identity and access controls, MFA, and device compliance. o Collaborate with support partners on the remediation of security vulnerabilities, across datacentre, EUC, IaaS space and data network. o Design, implementation and administration of security features, including but not limited to: End Points, PKI, SCEP, NDES More ❯
South West London, London, England, United Kingdom
Tenth Revolution Group
Role Overview: We are seeking a highly skilled Networking Consultant with expertise in cybersecurity, Microsoft 365, and Azure to join our dynamic team. The ideal candidate will design, implement, and optimize secure network architectures, leveraging Microsoft cloud technologies to protect More ❯
Role Overview: We are seeking a highly skilled Networking Consultant with expertise in cybersecurity, Microsoft 365, and Azure to join our dynamic team. The ideal candidate will design, implement, and optimize secure network architectures, leveraging Microsoft cloud technologies to protect More ❯
Birmingham, West Midlands (County), United Kingdom
VIQU IT
document lifecycle processes in line with operational best practices Act as a trusted point of contact for business users, ensuring application needs are met effectively Support system compliance and vulnerabilityremediation activities aligned with security standards Key Requirements of the iManage Application Specialist: Strong hands-on experience with iManage, including Work 10, Control Center, and third-party integration More ❯
implement scalable SaaS solutions (requirements gathering, architecting, configuring, and team training). Create and maintain technical documentation of systems and processes. Manage tickets of incidents, troubleshooting escalations, and security vulnerability remediations tasks. Handle tickets of incidents and Service Desk escalations. Keep informed and updated on feature updates/changes within areas of ownership Participate in the on-call incident More ❯
a strong focus on automation, detection and secure by design principles. Additionally, as part of the role you will be leading and participating in threat detection, incident response and vulnerability management remediation. You will be serving as both a technical leader and operational responder, working closely with Product, infrastructure and Security Operations teams. We are looking for a hard … system visibility by expanding logging coverage and implementing additional monitoring capabilities. Maintain, update, and regularly test incident response runbooks, containment strategies, and escalation protocols. Lead the end-to-end vulnerability management process for ION Markets systems, from identification to remediation. Provide support for security architecture reviews of developed systems to ensure alignment with best practices. Stay up to date … or operating security technologies is preferred, such as endpoint security (e.g. AV/EPP/EDR), SIEM, DLP, SWG, CASB, UEBA, IDS, IPS, firewalls, IAM/PIM/PAM, vulnerability management, MDM, etc. About us We're a diverse group of visionary innovators who provide trading and workflow automation software, high-value analytics, and strategic consulting to corporations, central More ❯
The Vulnerability Management Manager is a global role within ION's central services division, supporting the Group Security strategy through the identification, mitigation, and remediation of information security vulnerabilities, misconfigurations, and risks. This role reports to the Global Head of IT Security, who reports to the Group CISO. As a member of the ION Security team, you will … build and lead a team of Security professionals specializing in Vulnerability Management, managing partners and vendor deliverables, and developing a strategy for a world-class Vulnerability Management program. Your team will perform discovery scanning, risk assessments, mitigation activities, continuous validation, and lessons learned workshops to improve processes across Group Security and Verticals. We seek a diligent, dedicated, creative … capable of building relationships with teams of varying technical abilities. The ideal candidate will have extensive cybersecurity experience, at least 10+ years in security roles, with a focus on Vulnerability Management. Key Responsibilities: This role may require out-of-hours work for 24x7 global operations. Ensure team objectives and development plans align with company OKRs. Act as escalation point More ❯
regulated environment. You'll be responsible for advancing the organisation's incident response capabilities, leading investigations, and driving threat detection maturity through development of use cases, threat intelligence, and vulnerability management. Key Responsibilities Lead the DFIR function, overseeing incident detection, investigation, and response activities. Develop and implement IR methodologies (MITRE ATT&CK, Kill Chain, Threat Modelling, Diamond Model). … . Coordinate cross-functional security incident response with SOC, Threat Intelligence, and Red/Blue teams. Engage with technical and business teams on cyber risk reduction strategies. Contribute to vulnerability management and remediation plans. Required Skills & Experience Proven experience managing DFIR or cyber incident response teams. Deep technical knowledge of IR and forensic analysis (eg Wireshark, packet capture … working in financial services or a regulated environment preferred. Hands-on experience with SIEM tools, network forensics, and endpoint detection. Knowledge of CIS benchmarks, cloud security, IAM, DLP, and vulnerability management. Familiarity with Windows, Linux/Unix, networking, and virtualisation (VMware). Certifications (preferred): GCIA, GCIH, GCFA or equivalent. What's on Offer Up to £90,000 base salary More ❯
appropriate frameworks and languages Creating and maintaining RESTful APIs for integration across platforms Following secure coding practices and supporting compliance with government security standards Conducting security reviews and supporting remediation of vulnerabilities Translating technical requirements into delivery plans and code Communicating effectively with both technical and non-technical stakeholders What we're looking for: UK Developed Vetting (DV) clearance More ❯