appropriate frameworks and languages Creating and maintaining RESTful APIs for integration across platforms Following secure coding practices and supporting compliance with government security standards Conducting security reviews and supporting remediation of vulnerabilities Translating technical requirements into delivery plans and code Communicating effectively with both technical and non-technical stakeholders What we're looking for: UK Developed Vetting (DV) clearance More ❯
to provide clear visibility of the process mapping journey. Document methodology, inputs, owners, and approvers for mapping and reporting processes. Continuously improve process mapping to identify vulnerabilities and drive remediation plans. Understand vulnerabilities and downstream impacts affecting service delivery. Experience in scenario testing to identify resilience gaps, including research, documentation, assessment, facilitation, and reporting. Required Skills: Experience in end More ❯
s IT environment and systems. Plan for and execute the Branch's local Disaster Recovery drills and/or contingency process. Monitor and manage the IT system vulnerabilities, take remediation actions to solve the relevant risks. Provide support and validation for HO's IT/system changes, Disaster Recovery drills and/or contingency process. Mandarin speaking Manager of More ❯
offensive security testing . You will lead manual and automated penetration testing, manage AppSec tooling (SAST, DAST, SCA), and build developer enablement programs. You'll also be responsible for vulnerability management, incident response for application-layer events, and ensuring compliance alignment for SOC 2, ISO 27001, and privacy requirements. This role blends offensive and defensive expertise with strategic influence … Simulate adversary attack scenarios to validate controls and identify gaps. Secure SDLC Integration Embed security into every stage of development; implement automated security tooling in CI/CD pipelines. Vulnerability Management Triage and prioritize application-layer vulnerabilities and guide engineering teams through remediation. Developer Enablemen t Deliver secure development and coding training; create resources to reduce recurring vulnerabilities. Bug … security. Deep expertise securing multi-tenant SaaS platforms and features. Strong communication and ability to influence software engineers and product managers. Advanced experience conducting penetration tests, code reviews, and vulnerability assessments. Expert knowledge of OWASP Top 10, web application and API security, and common vulnerability classes with practical remediation strategies. Hands-on experience with AppSec tooling (SAST More ❯
with relevant security frameworks and regulations, identifying potential compliance issues and contributing to mitigation strategies. Technology Evaluation, Deployment, and Management: Conducts security architecture reviews and perform security assessments, including vulnerability scanning, configuration reviews, and cloud security posture assessments, identifying vulnerabilities and recommending detailed remediation strategies. Contribute to the development of security architecture roadmaps and strategic plans, and support More ❯
support secure development across our engineering teams. In this hands-on role, you'll help identify and mitigate product risks by participating in security reviews, improving tooling, and supporting vulnerability remediation. You'll work closely with senior security engineers and cross-functional teams to build security into our software development lifecycle. This is a great opportunity for a security … in integrating security practices into the software development lifecycle, including design reviews and backlog grooming. Threat Modelling : Participate in structured threat modelling exercises with guidance from senior team members. Vulnerability Triage : Work with engineering teams to review findings from SAST, SCA, DAST, and container scans and track remediation progress. Code & Config Review : Conduct basic secure code and configuration More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Robert Walters
working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerability management activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party risks … Assist in managing third party risk processes by evaluating external partners' security postures and ensuring compliance with internal requirements. Work closely with Security Operations and IT teams to oversee vulnerability assessments and coordinate remediation efforts effectively. Conduct thorough reviews of security architecture for new systems and services to ensure robust protection measures are in place from the outset. … experience on protecting sensitive data within regulated environments. Your background should include hands-on involvement with risk assessments, policy development aligned with industry standards like ISO 27001 or NIST, vulnerability management activities spanning identification through remediation, and direct participation in incident response processes. Demonstrable experience applying risk assessment methodologies to identify vulnerabilities and recommend effective mitigations is highly More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Robert Walters
working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerability management activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party risks … Assist in managing third party risk processes by evaluating external partners' security postures and ensuring compliance with internal requirements. Work closely with Security Operations and IT teams to oversee vulnerability assessments and coordinate remediation efforts effectively. Conduct thorough reviews of security architecture for new systems and services to ensure robust protection measures are in place from the outset. … experience on protecting sensitive data within regulated environments. Your background should include hands-on involvement with risk assessments, policy development aligned with industry standards like ISO 27001 or NIST, vulnerability management activities spanning identification through remediation, and direct participation in incident response processes. Demonstrable experience applying risk assessment methodologies to identify vulnerabilities and recommend effective mitigations is highly More ❯
Cyber Security Operations Manager to lead our Cyber Security Operations Centre; responsible for managing the day-to-day operations of the SOC team, overseeing incident detection and response, ensuring vulnerability scanning and remediation efforts across the organization. Role Overview: Job Title: SOC Manager/Cyber Security Operations Manager Location: Leeds/England/Remote Contract Type: Contract Duration … preferred). Minimum 5 years of experience in cybersecurity operations, with at least 2 years in a leadership or management role. Strong knowledge of SOC operations, incident response, and vulnerability management best practices. Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel), vulnerability scanners (e.g., Nessus, Qualys), and other security platforms. Relevant certifications such as CISSP, CISM More ❯
responsible for protecting enterprise systems and data. This role offers hands-on involvement with a wide range of technologies-from endpoint detection and SIEM platforms to firewalls, MFA, and vulnerability management-providing a well-rounded foundation in enterprise security operations. You'll gain exposure to advanced security practices, assist in running and responding to threat detection systems, and contribute … to projects that strengthen security across the organisation. Key Responsibilities Monitor and respond to security alerts and incidents (EDR, SIEM, Identity Protection, SOAR). Assist in vulnerability scanning and remediation activities. Help manage systems such as email and web security gateways, VPNs, MFA, SSO, and mobile device security. Support the maintenance of security certificates, PAM systems, and conditional … platforms in a corporate IT environment. Experience with some of the following: EDR platforms (e.g., CrowdStrike) Email or web security gateways (e.g., Mimecast) MFA/SSO (e.g., Duo, Okta) Vulnerability scanners (e.g., Rapid7, Tenable, Nessus) InTune and Conditional Access Exposure to: Imperva WAF KnowBe4 Certificate management tools Kali Linux toolset and penetration testing basics Qualifications: Working towards or holding More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
alignment. Control Documentation: Develop and maintain control narratives, walkthroughs, and documentation of compliance processes. Audit Findings: Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and … and implementing recommendations to improve the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. Vulnerability Management: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong expertise in audit and compliance More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
eTeam Inc
These are my high-level thoughts and not limited to just these activities : • MW/DB estate is patched timely and kept current always • Plans to remediate EOL timely • Vulnerabilityremediation - Critical/Zero day included • Ensure MW and DB platforms are built as per QBE standards • Projects related to the platforms are delivered on time and within More ❯
based on potential threats and exposure. Plan and schedule testing engagements based on threat assessments and client needs. Produce clear, detailed reports with technical findings, business impact, and strategic remediation recommendations for diverse audiences. Communicate complex security concepts and threat insights effectively to technical and non-technical stakeholders. Collaborate with client IT and cybersecurity teams to improve security protocols … and address vulnerabilities. Monitor remediation efforts and provide updates highlighting threat reduction. Conduct proactive security research and contribute to technical content on emerging threats and attack techniques. Enhance security monitoring by sharing offensive insights to improve detection and response. Drive patching efforts for vulnerabilities based on threat intelligence and exploitation potential. What experience you'll bring: Skills and Qualifications … manage multiple engagements effectively. Current CREST CRT certification or higher is required. Eligibility for SC Clearance is required. Desirable Skills: Experience with Breach Attack Simulation tools and threat-informed vulnerability management. Knowledge of Risk Management frameworks and their integration with threat intelligence. Hands-on experience with cloud security reviews (AWS, Azure, GCP) considering cloud-specific threats. Familiarity with ISO More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Marlin Selection
IT Security team. As the Senior Security Engineer, you will implement and maintain robust security systems and protocols across the our IT infrastructure. You will conduct risk assessments and vulnerability scans, mitigate vulnerabilities identified in penetration testing, and implement preventative measures to protect against cyber threats. You will monitor the security infrastructure and detect and respond to potential threats. … and DDoS systems Manage the Web Security Gateway Manage the Email Security Gateway Manage the SIEM, SOAR, Identity Protection and EDR, and respond to alerts and threats. Carry out vulnerability scans, identify risks, and remediation. Manage the perimeter and VPN firewalls. Manage MFA and SSO. Manage MDM\MAM and Conditional Access Manage security certificates and keys. Manage IDS and More ❯
drive key security initiatives, and play a pivotal role in mentoring junior team members. Key Responsibilities Monitor, manage, and respond to threats via SIEM, SOAR, and EDR platforms Conduct vulnerability scans and support remediation and risk mitigation efforts Oversee WAF, DDoS, VPN, and perimeter firewalls Manage Email and Web Security Gateways Administer MFA, SSO, PAM, MDM/MAM More ❯
drive key security initiatives, and play a pivotal role in mentoring junior team members. Key Responsibilities Monitor, manage, and respond to threats via SIEM, SOAR, and EDR platforms Conduct vulnerability scans and support remediation and risk mitigation efforts Oversee WAF, DDoS, VPN, and perimeter firewalls Manage Email and Web Security Gateways Administer MFA, SSO, PAM, MDM/MAM More ❯
risk. Ensure we are deploying solutions into a secure environment . Ensure we build solutions in alignment with our control requirements. Support on-going business-as-usual and champion vulnerability management. Provide internal security consultancy and lead on audit engagements, risk activities and project initiatives. Work closely with colleagues to ensure effective technology risk management. Work together . Collaborate … software engineering role, ideally with focus on security. Working knowledge of offensive security, Application and Infrastructure penetration testing (OWASP top 10, OWASP ASVS). Understanding of security vulnerabilities and remediation options in codebases & containers. Working knowledge of methods for authentication and authorization (ODIC, OAuth 2, FIDO 2, etc) Don't worry if you don't meet all the criteria More ❯
Security Engineer Level: Mid-Level Location: One of our London, Basingstoke or Bristol offices, minimum of 2 days per week Team: Security/Engineering Salary: £48,120 - £64,150 About the Role: Welcome to Hawk-Eye Innovations; I'm Jon More ❯
Security Engineer Level: Mid-Level Location: One of our London, Basingstoke or Bristol offices, minimum of 2 days per week Team: Security/Engineering Salary: £48,120 - £64,150 About the Role: Welcome to Hawk-Eye Innovations; I'm Jon More ❯
Security Engineer Level: Mid-Level Location: One of our London, Basingstoke or Bristol offices, minimum of 2 days per week Team: Security/Engineering Salary: £48,120 - £64,150 About the Role: Welcome to Hawk-Eye Innovations; I'm Jon More ❯
skillset What You'll Be Doing Leading incident response and managing containment, analysis, and resolution Monitoring security systems (SIEM, EDR, threat intel) to identify and respond to threats Conducting vulnerability assessments and supporting remediation for financial systems Ensuring compliance with GLBA, PCI, FFIEC, and other regulatory frameworks Supporting risk reviews, vendor assessments, and internal audits Participating in security … What You'll Need to be Considered 3-5+ years of relevant experience Prior experience in financial services, banking, or fintech cybersecurity Expertise with SIEM, EDR, NGFW, and vulnerability management tools Familiarity with scripting (Python, PowerShell) for automation and threat detection Experience conducting third-party risk reviews and regulatory reporting ITAC Solutions firstName lastName Email Address Phone Number More ❯
man IT Security team. As the Senior Security Engineer, you will implement and maintain robust security systems and protocols across the IT infrastructure. You will conduct risk assessments and vulnerability scans, mitigate vulnerabilities identified in penetration testing, and implement preventative measures to protect against cyber threats. You will monitor the security infrastructure, detect and respond to potential threats, and … WAF and DDoS systems Manage the Web Security Gateway Manage the Email Security Gateway Manage the SIEM, SOAR, Identity Protection, EDR, and respond to alerts and threats Carry out vulnerability scans, identify risks, and perform remediation Manage perimeter and VPN firewalls Manage MFA and SSO Manage MDM/MAM and Conditional Access Manage security certificates and keys Manage More ❯
and secure data storage Security Tooling & Automation Build and maintain security testing pipelines Integrate security tools with GitHub Actions Develop custom security linters and pre-commit hooks Create automated vulnerability tracking and remediation workflows Implement secret scanning and dependency checking Build security dashboards and metrics reporting Create secure coding guidelines for different technology stacks Develop a security champions … Strong Customer Authentication requirements Understanding of cloud-native security patterns Ability to identify security vulnerabilities through manual code review Experience with static and dynamic analysis tools Understanding of common vulnerability patterns across languages Knowledge of secure architecture patterns and anti-patterns Ability to provide actionable remediation guidance Professional Requirements Experience in financial services or high-security environments Strong More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
OpenSourced Ltd
an experienced Penetration Tester specialising in Infrastructure Testing on behalf of a leading UK-based security consultancy. This company is renowned for its innovative approach to security, providing ongoing vulnerability assurance and continuous threat management through its advanced portal solution, beyond traditional point-in-time assessments. The Role: As an Infrastructure Penetration Tester , you will be responsible for conducting … Responsibilities: Conduct Comprehensive Testing: Perform formal, in-depth penetration tests focused on infrastructure and occasionally other areas. Reporting: Deliver detailed, well-structured technical and non-technical reports in English. Vulnerability Assessments: Identify vulnerabilities and provide actionable remediation recommendations. Pre-Engagement Support: Assist in scoping client projects and drafting proposals to ensure clear and accurate planning. Project Management: Manage More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
prior to commencement. General responsibilities: - Manage backlog of items and prioritizing agile sprints Prioritizing and allocating tasks and owning BAU work items Managing risks and working towards resolution and remediation of risk Work on strategic roadmap deliverables including requests arriving from the business via small change enhancements e.g. M365 add-ons, device rollouts, email enhancements Maintaining stability of AV … email services, and email routing technologies (eg M365 Exchange Online/Hybrid Exchange) Mail protection e.g. Mimecast Security and Threat management in an enterprise environment (eg Defender for Endpoint, Vulnerability reporting and remediation) Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome More ❯