London, England, United Kingdom Hybrid / WFH Options
Onyx-Conseil
and external cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerabilityscanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is essential. Responsibilities: • Collaborate … cybersecurity projects to ensure that the delivery is on-time, within budget, and adopted to meet the companys information protection requirements. • Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA, and other data privacy and … information security objectives of the organization. • Participates in change management meetings and provides expert input to ensure security is maintained. • Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering. • Ability to manage and continuously improve upon vulnerability management program. • Ability to propose solutions for closing More ❯
role-based access control (RBAC), and least-privilege enforcement across Microsoft Entra and AWS IAM. Support incident response processes including investigation, containment, eradication, and recovery of security events. Conduct vulnerabilityscanning and remediation follow-ups using tools. Develop and maintain security baselines, configuration hardening, and patch compliance reporting across endpoints and cloud systems. Assist in third-party risk … Basic scripting for automation and reporting using PowerShell or Python. Working knowledge of network security protocols, VPNs, firewalls, and web filtering tools. Understanding of patch management, application control, and vulnerability remediation. Desirable Qualifications Certifications such as CISSP, CISM, Security+, AWS Security Specialty, AZ-500, or MS-500 . Experience working in or with a Security Operations Centre (SOC) . More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
In Technology Group Limited
security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure system architecture and application development. Maintain and enhance incident response procedures and disaster recovery … Proven experience in a cyber security or information security engineering role. Strong knowledge of network and system security, encryption, and authentication protocols. Experience with security tools such as SIEM, vulnerability scanners, firewalls, antivirus, and endpoint protection platforms. Familiarity with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks and standards (ISO 27001, NIST, PCI More ❯
Bletchley, Buckinghamshire, United Kingdom Hybrid / WFH Options
In Technology Group
security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure system architecture and application development. Maintain and enhance incident response procedures and disaster recovery … Proven experience in a cyber security or information security engineering role. Strong knowledge of network and system security, encryption, and authentication protocols. Experience with security tools such as SIEM, vulnerability scanners, firewalls, antivirus, and endpoint protection platforms. Familiarity with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks and standards (ISO 27001, NIST, PCI More ❯
London, England, United Kingdom Hybrid / WFH Options
In Technology Group
security incidents and threats in real–time. Design and implement security solutions and controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure system architecture and application development. Maintain and enhance incident response procedures and disaster recovery … Proven experience in a cyber security or information security engineering role. Strong knowledge of network and system security, encryption, and authentication protocols. Experience with security tools such as SIEM, vulnerability scanners, firewalls, antivirus, and endpoint protection platforms. Familiarity with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks and standards (ISO 27001, NIST, PCI More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure system architecture and application development. Maintain and enhance incident response procedures and disaster recovery … Proven experience in a cyber security or information security engineering role. Strong knowledge of network and system security, encryption, and authentication protocols. Experience with security tools such as SIEM, vulnerability scanners, firewalls, antivirus, and endpoint protection platforms. Familiarity with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks and standards (ISO 27001, NIST, PCI More ❯
coordinating penetration testing and managing cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, data leakage prevention, patching, encryption, vulnerabilityscanning, and configuration of security tools. Prior experience in an international enterprise environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity … procedures annually for security compliance. Develop, test, and implement disaster recovery procedures. Manage cybersecurity projects to ensure timely delivery within budget. Perform or coordinate security assessments, penetration tests, and vulnerability scans. Ensure compliance with frameworks like COBIT, NIST, ISO, PCI, GDPR, HIPAA, etc. Provide internal support for security issues within SLAs. Evaluate and implement CIS controls as needed. Contribute More ❯
and remediate application and cloud security vulnerabilities (e.g., XSS, SSRF, CSRF, CORS, SQL Injection, broken authentication/authorization, encryption flaws). Provide expert guidance on secure coding practices, common vulnerability classes (e.g., OWASP Top 10), and threat modeling for modern web applications. Conduct security reviews of design and architecture documents; lead threat modeling exercises using frameworks such as STRIDE … tooling (e.g., Burp Suite, ZAP, Amass, Nmap). Assess and mitigate static (SAST) and dynamic (DAST) vulnerabilities across services and components. Evaluate, implement, and maintain security tooling to support vulnerability management, secure development, and event detection workflows. Define and track metrics related to application security, vulnerability remediation, detection coverage, and incident response effectiveness. Support compliance initiatives (e.g., SOC … and log analysis. Proficient in log analysis, SIEM usage/configuration, threat hunting, and querying tools to support detection and response. Familiarity with static and dynamic analysis techniques and vulnerability mitigation. Strong understanding of modern cloud platforms-especially AWS-and cloud-native security practices. Experience conducting penetration tests, vulnerability assessments, and network scans. Excellent communication and collaboration skills More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role … into CI/CD pipelines. Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerabilityscanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers, DevOps, and compliance teams to More ❯
with relevant security frameworks and regulations, identifying potential compliance issues and contributing to mitigation strategies. Technology Evaluation, Deployment, and Management: Conducts security architecture reviews and perform security assessments, including vulnerabilityscanning, configuration reviews, and cloud security posture assessments, identifying vulnerabilities and recommending detailed remediation strategies. Contribute to the development of security architecture roadmaps and strategic plans, and support More ❯
respond to threats. Conduct thorough risk assessments and implement mitigation strategies. Work with the wider IT teams to enhance access control and identity management. Perform regular security audits and vulnerability assessments. Respond promptly to security incidents, document findings, and recommend improvements. Educate staff on cybersecurity best practices and protocols. Essential Skills and Qualifications: Bachelor's degree in Cybersecurity, Computer … or equivalent experience. Previous experience in Cybersecurity or a related IT role, ideally working in public sector environments. Proficiency with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Strong understanding of network security, firewalls, and access control. Knowledge of regulatory frameworks like GDPR, HIPAA, PCI-DSS, or NIST. Experience in incident response and forensic analysis. Excellent More ❯
access, threats, and vulnerabilities. Monitoring & Incident Response: Continuously monitor network traffic and system logs for security incidents, investigate, triage and contain breaches, and coordinate response efforts. Risk Assessment: Conduct vulnerability assessments and organise penetration testing to identify security gaps and deal with any recommendations, recommend necessary fixes or improvements as a result of those tests. Security Protocols: Develop and … will I bring to the role? Significant experience in a similar role. Hands-on experience with security technologies such as firewalls, IDS/IPS, SIEM, endpoint protection, encryption, and vulnerability scanners. Proficiency in security frameworks and standards such as NIST, ISO 27001, and CIS controls. Strong understanding of network protocols, firewalls, VPNs, and encryption techniques. Experience with scripting or More ❯
London, England, United Kingdom Hybrid / WFH Options
The Curve Group
Tenable Vulnerability Management Analyst - Banking sector Tenable Vulnerability Management Analyst - Banking sector 2 days ago Be among the first 25 applicants Direct message the job poster from The Curve Group Executive Search, Talent Acquisition & Recruitment Outsourcing Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely … of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical Admin Support - Azure, Oracle Cloud More ❯
insights to inform executive briefings and assurance reports. Risk Management, Incident Management, and Regulatory Engagement Support the development and implementation of a robust risk management framework, including threat modelling, vulnerability assessments, and risk assessments aligned with FCA expectations. Lead and coordinate responses to security incidents, such as phishing attacks, malware infections, and data breaches, in compliance with FCA incident … technologies (e.g., email and web security gateways) that monitor operations, detect cyber threats, and respond to unauthorized events and incidents in line with established playbooks. Supervise penetration testing and vulnerabilityscanning activities, ensuring timely remediation of identified risks. Provide technical security guidance to project teams, embedding security considerations throughout the software development lifecycle (Security by Design). Maintain More ❯
with relevant security frameworks and regulations, identifying potential compliance issues and contributing to mitigation strategies. Technology Evaluation, Deployment, and Management: Conduct security architecture reviews and perform security assessments, including vulnerabilityscanning, configuration reviews, and cloud security posture assessments, identifying vulnerabilities and recommending detailed remediation strategies. Contribute to the development of security architecture roadmaps and strategic plans, and support More ❯
support JRC members in decision-making processes. Hands-On Security Experience: Take an active role in the day-to-day management of security operations, including incident response, threat hunting, vulnerability management, and other proactive measures. Provide expertise in implementing technical security solutions and ensuring they align with organisational goals. Assist with the management of security tools, systems, and processes … Risk Assessment & Mitigation: Conduct risk assessments of business processes and applications to identify security gaps and recommend solutions. Track, manage, and mitigate risks identified through internal and external audits, vulnerability assessments, and other review processes. Reporting & Documentation: Prepare regular reports for the CISO and senior management, summarising security incidents, trends, and the effectiveness of security policies and controls. Document … Skills: Deep understanding of security frameworks (e.g., NIST, ISO 27001, CIS Controls, etc.). Practical experience with security tools such as SIEM, firewalls, IDS/IPS, endpoint protection, and vulnerability scanners. Proficiency in risk management practices and tools. Knowledge of cloud security, network security, and data protection technologies. Policy & Standards Expertise: Extensive experience in writing, reviewing, and implementing information More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised, successful bank … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely … of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical Admin Support - Azure, Oracle Cloud More ❯
City of London, London, United Kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised, successful bank … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely … of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical Admin Support - Azure, Oracle Cloud More ❯
South East London, England, United Kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised, successful bank … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely … of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical Admin Support - Azure, Oracle Cloud More ❯
City of London, London, United Kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised, successful bank … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely … of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical Admin Support - Azure, Oracle Cloud More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised, successful bank … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely … of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical Admin Support - Azure, Oracle Cloud More ❯
detection, triage, and escalation of security incidents, helping to protect our organisation and customers from evolving cyber threats. You'll monitor security alerts, assist with investigations, and contribute to vulnerability management and compliance efforts. This is an excellent opportunity for someone early in their cybersecurity career to gain hands-on experience, grow their skills, and be part of a … taken. Regularly perform compliance checks and IT health check schedules against internal components and against our services. Working on Remedial Action Plans and mitigations on completion of ITHC and vulnerabilityscanning activity. Participate in on-call or out-of-hours technical support where appropriate and supported by senior staff. Threat intelligence and analysis: Stay updated with the latest … audits and assessments, providing evidence of SOC activities and controls. Maintain accurate records of all events handled, including triage notes and escalation details. Support the delivery of incident and vulnerability summaries to the management team and customers as part of Service Reviews or Security Working Groups. Participate in post-incident reviews and help document lessons learned. Assist in ensuring More ❯
security systems and processes. This position is a technically focused role working within the IT Department. The role has responsibility for maintaining our core suite of security tools (including vulnerabilityscanning, patch management, anti-virus, intrusion detection/prevention) as well as advising on security aspects of all existing and incoming IT systems. The IT Department's mission … of the firm's IT Security posture through constant awareness of issues and threats, applying the appropriate controls in a timely and effective manner whilst maintaining productivity. Complete regular vulnerability scans across the firm’s network, working with colleagues to ensure remediation in line with industry standards and the firm’s SLAs. Fulfilling patch management, including the testing and … including server and desktop OS hardening. Cloud based services experience, in particular Microsoft Azure, Office 365/Exchange Online and cloud-based authentication services (AAD). Good understanding of vulnerabilityscanning and patch management principles. Good understanding of Anti-virus and DLP in an enterprise environment. Logical thinker and creative problem solver. Excellent written and verbal communication skills. More ❯
be considered for this position. Responsibilities Engineer security solutions without oversight and collaborate with multiple departments; Analyze security systems and seek improvements on a continuous basis; Research vulnerabilities, perform vulnerabilityscanning, and mitigate threats; Develop security best practices and policies for the organization; Document new processes, cross-train coworkers, and assist employees on security-related matters; Provide security … with the ability to solve problems as they arise, and ability to prioritize projects; and Basic scripting skills, such as PowerShell/Python scripting. Nice to have: Experience with vulnerability assessment tools such as Nessus and Tenable; Experience with enterprise web proxy solutions, web filters, and VPN; Experience with email security solutions; Experience with firewall and network architecture; Experience More ❯
London, England, United Kingdom Hybrid / WFH Options
Sumsub
Design and implement robust infrastructure security measures utilizing modern security solutions such as SIEM platforms, host-based intrusion detection systems (HIDS), endpoint detection and response (EDR), AWS Security Hub, vulnerabilityscanning tools, and intrusion detection systems (IDS) Proactively research, evaluate, and integrate emerging security tools/technologies to strengthen infrastructure defences, ensuring alignment with industry best practices and … cybersecurity innovations About You: Proven experience in information security. Knowledge of cloud infrastructures, with a focus on AWS In-depth knowledge and hands-on experience with SIEM systems and vulnerability management tools Proficiency in using Terraform and Ansible for infrastructure automation Experience in Kubernetes security, including the use of tools for monitoring and securing containers Knowledge of DevSecOps practices More ❯