aberdeen, north east scotland, United Kingdom Hybrid / WFH Options
ESK Recruitment LTD
audits and lead training on cybersecurity awareness and best practices. Coordinate responses to incidents and ensure timely resolution and documentation. Oversee threat detection and vulnerabilityremediation processes. What We're Looking For: Previous experience in an Information Security Management or similar leadership role. Familiarity with industry standards and More ❯
efforts to implement and continuously improve our information security controls, aligning with ISO27001, Cyber Essentials+, and other compliance standards. From managing penetration testing and vulnerabilityremediation to ensuring robust data governance and disaster recovery plans, your leadership will ensure the integrity, confidentiality, and availability of our systems and More ❯
in a related field is a plus. Experience working with Oracle Solaris, AIX, or related enterprise Unix platforms. Familiarity with security standards, compliance, and vulnerabilityremediation processes. Previous experience working in a shift-based or out-of-hours support environment is advantageous. What we can offer you: Competitive More ❯
OpenShift) Infrastructure-as-Code (Terraform, Ansible, Crossplane) Container orchestration, networking, and automation (Kubernetes, Docker) Scripting (Bash, Powershell, Python) Programming languages (Golang, Java, Ruby, Python) Vulnerabilityremediation and mitigation tools (BlackDuck, Snyk) We value your ability to adapt over deep specialization. In addition, we're currently seeking folks with More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Container Solutions
OpenShift) Infrastructure-as-Code (Terraform, Ansible, Crossplane) Container orchestration, networking, and automation (Kubernetes, Docker) Scripting (Bash, Powershell, Python) Programming languages (Golang, Java, Ruby, Python) Vulnerabilityremediation and mitigation tools (BlackDuck, Snyk) We value your ability to adapt over deep specialization. In addition, we're currently seeking folks with More ❯
/IPS configurations Establishing and implementing security 'best-practice' standards as well as departmental policies and procedures Responsible for Security scanning and the efficient remediation of vulnerabilities Responsible for analysing all security incidents to determine root cause Determine, recommend, and implement upgrade security measures and controls Delivery security responses More ❯
practices to protect our infrastructure, applications, and data. The ideal candidate will have extensive experience in security governance, risk management, cloud security, incident response, vulnerability management, penetration testing, and leading business continuity and disaster recovery tests. You will drive ongoing compliance with various security frameworks and collaborate with internal … renewals. Ensure data protection and privacy controls align with regulatory requirements, continuously updating measures to safeguard sensitive information and maintain compliance. Cloud Security, Risk & Vulnerability Management Implement AWS and Azure security best practices across infrastructure, including IAM, networking, logging, and encryption. Conduct regular security risk assessments and Business Impact … Analysis (BIA) to evaluate vulnerabilities. Oversee security patching and vulnerability management to ensure timely remediation of threats. Monitor cloud security posture and recommend remediation strategies to reduce attack surfaces. Enforce CIS benchmarks, OWASP principles, and NIST cybersecurity controls across cloud and application security. Oversee third-party security More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Taxually
practices to protect our infrastructure, applications, and data. The ideal candidate will have extensive experience in security governance, risk management, cloud security, incident response, vulnerability management, penetration testing, and leading business continuity and disaster recovery tests. You will drive ongoing compliance with various security frameworks and collaborate with internal … renewals. Ensure data protection and privacy controls align with regulatory requirements, continuously updating measures to safeguard sensitive information and maintain compliance. Cloud Security, Risk & Vulnerability Management Implement AWS and Azure security best practices across infrastructure, including IAM, networking, logging, and encryption. Conduct regular security risk assessments and Business Impact … Analysis (BIA) to evaluate vulnerabilities. Oversee security patching and vulnerability management to ensure timely remediation of threats. Monitor cloud security posture and recommend remediation strategies to reduce attack surfaces. Enforce CIS benchmarks, OWASP principles, and NIST cybersecurity controls across cloud and application security. Oversee third-party security More ❯
Role: Deliver security engineering across network, cloud, and endpoint infrastructure Support detection, response, and threat modelling Help mature identity & access management controls Lead on vulnerabilityremediation and risk assessments Act as SME in cross-functional projects involving security tooling & design What You Need: ✔ Proven experience in senior security More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Harrington Starr
Role: Deliver security engineering across network, cloud, and endpoint infrastructure Support detection, response, and threat modelling Help mature identity & access management controls Lead on vulnerabilityremediation and risk assessments Act as SME in cross-functional projects involving security tooling & design What You Need: ✔ Proven experience in senior security More ❯
PowerCLI and Infrastructure as Code (IaC) tools such as Packer, Terraform, and Ansible Secure the virtual environment by implementing best practices, including patch management, vulnerabilityremediation, and access control Develop and implement disaster recovery and business continuity plans using tools such as Zerto and VMware Live Recovery What More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
The Successful Applicant Solid experience in AWS Security Practical experience in automation, scripting, track record in automating security process Experience in vulnerabilities assessment and remediation Experience in using Terraform or other infrastructure-as-code tools Strong understanding of information security principles and practices. Familiar with fast-paced environment What More ❯
/IPS configurations Establishing and implementing security 'best-practice' standards as well as departmental policies and procedures Responsible for Security scanning and the efficient remediation of vulnerabilities Responsible for analysing all security incidents to determine root cause Determine, recommend, and implement upgrade security measures and controls Delivery security responses More ❯
liverpool, north west england, United Kingdom Hybrid / WFH Options
Maxwell Bond
across the business. Contribute to third-party security reviews and due diligence checks. Work with IT and security teams to monitor vulnerabilities and support remediation activities. Help coordinate security awareness initiatives to promote best practices across the organisation. Provide input during audits and security assessments. Support the wider InfoSec More ❯
of networking concepts and traffic flows. Understanding of how technology choices impact Cyber Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical More ❯
Newbury, England, United Kingdom Hybrid / WFH Options
Hays
of networking concepts and traffic flows. Understanding of how technology choices impact Cyber Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical More ❯
newbury, south east england, United Kingdom Hybrid / WFH Options
Hays
of networking concepts and traffic flows. Understanding of how technology choices impact Cyber Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical More ❯
Newbury, south west england, United Kingdom Hybrid / WFH Options
Hays
of networking concepts and traffic flows. Understanding of how technology choices impact Cyber Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical More ❯
Security isn't just about locking things down-it's about enabling innovation without compromise. If you're fluent in Terraform, experienced in vulnerability management, and thrive in mobile and cloud security, this contract role offers the chance to make an immediate impact on a fast-growing global platform. More ❯
sheffield, south yorkshire, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Hays
set up, maintain, monitor, and secure their networks • Dealing appropriately with major incidents • Making sure appropriate steps are in place and followed for the remediation of vulnerabilities • Performing safe upgrades and patches where required • Providing accurate and informed security insights internally and with the organisation's customers • Making sure More ❯
Chatham, Kent, South East, United Kingdom Hybrid / WFH Options
Intertek
will work on both infrastructure and applications, conduct IT Health Checks, and review IT configurations to identify gaps. About the Role Perform pen tests, vulnerability assessments and build reviews both remotely and at client sites, against network devices, servers, end user devices, cloud technologies, wireless networks, web and mobile More ❯
etc. Collaborate with development teams to integrate security best practices into the secure software development lifecycle (SDLC) and ensure products are built securely Oversee vulnerability management and remediation efforts, including leading responses to pen test findings and security assessments Experience conducting risk assessments and threat modelling for software More ❯
regulations, identifying potential compliance issues and contributing to mitigation strategies. Technology Evaluation, Deployment, and Management: Conduct security architecture reviews and perform security assessments, including vulnerability scanning, configuration reviews, and cloud security posture assessments, identifying vulnerabilities and recommending detailed remediation strategies. Contribute to the development of security architecture roadmaps More ❯