South East London, London, United Kingdom Hybrid / WFH Options
The Fortune Group (Recruitment) Limited
secure environment. Suitable Lead Security Engineers will work remotely or in the London office. Projects that need to be completed Security Awareness OpenSource Software scanning Automated VulnerabilityScanning Kubernetes VulnerabilityScanning Supply Chain monitoring (container images etc.) SIEM and Monitoring/Alerting service AntiVirus/ more »
research, code/script analysis, reverse engineering, exploitation, and documentation.- Identifying, testing, and implementing cutting-edge automated tools or enhancing existing ones to optimize vulnerability management efficiency and effectiveness.- Developing and refining code/scripts to bolster vulnerability detection, remediation/mitigation, and operational functions.- Integrating vulnerabilityscanning and configuration hardening in cloud environments (e.g., AWS, Microsoft Azure, Google Cloud Platform).- Conducting vulnerabilityscanning and reporting in alignment with the application development continuous integration and continuous delivery pipeline, streamlining work efforts through efficient use of security tools.- Spearheading security initiatives and projects more »
skills in a culture that will welcome your unique contributions? If so, let's start the conversation. The Role: Senior System Engineer, IT Systems Vulnerability & Patch Management In this role, the Vulnerability & Patch Management Engineer will lead high priority projects and day-to-day activities related to our … Vulnerability & Patch Management Program. The Vulnerability Management Engineer is expected to deliver results while maintaining positive relationships with other IT infrastructure teams and project sponsors. The Vulnerability & Patch Management Engineer will work in a team based environment performing technical duties supporting Vulnerability & Patch Management and be … responsible for executing patches and configuration updates through the production promote life cycle. The Vulnerability & Patch Management Engineer acts as a threat and vulnerability resource assisting with daily operations, specifically the remediation of identified vulnerabilities ensuring compliance and security goals. This role works with IMDC Information Security Risk more »
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and monitor … for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular VulnerabilityScanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. … Asses the urgency and severity of incidents. Determine whether an incident requires immediate action or further investigation. Escalate incidents to higher tiers when necessary. VulnerabilityScanning: scan systems for vulnerabilities. and manage vulnerabilities discovered during scans. Security Tool Management: Configure and manage security tools (e.g., SIEM, IDS/ more »
protection/management - VMware and guest OS and App integration. Security best practices, system and OS level security hardening (CISCAT benchmarking etc) using security vulnerabilityscanning tools such as Nessus. Creation of operating procedures and knowledge articles/process. Creation and on-going updates to detailed system design … Readiness and Application Modernisation experience Hyper-converged infrastructure experience – Dell vXrail Security best practices, system and OS level security hardening (CISCAT benchmarking etc) security vulnerabilityscanning tools such as Nessus Desirable knowledge: k8/container/Tanzu Kubernetes grid exposure/experience Security Clearance Requirements The successful candidate more »
cyber risk exposure, providing meaningful risk advice and mitigations, reports to stakeholders Ensure the security of the organisations network infrastructure including managing firewalls, using vulnerabilityscanning, port monitoring tools and resolving security related incidents. Lead the design, implementation, testing and maintenance of WAN and LAN network solutions Manage … concepts required in the role including LAN, WAN, WiFi, data-centre networks, unified comms SIEM and IPS/IDS technologies and toolset used for vulnerabilityscanning including Nessus Cloud computing including IaaS, PaaS and SaaS. Core network skills to include, routing (IS-IS, BGP, MPLS, VRF's etc more »
Security Analyst - SC - IT Health Check - Milton Keynes - £400-450/Day Outside Security Analyst - IT Health Check - penetration testing - vulnerabilityscanning The successful Security Analyst will need to demonstrate commercial experience in the following areas: Vulnerabilityscanning and manual analysis of internal network Desktop and more »
Tesco Technology are looking for a Senior Security Analyst reporting into the Vulnerability Management team. This is an exciting opportunity for a highly motivated security focused individual to join our expanding organisation. The scale and complexity of Tesco creates a huge opportunity for someone to apply their existing skills … public cloud environments. Following our Business Code of Conduct and always acting with integrity and due diligence and have these specific risk responsibilities: Maintaining vulnerabilityscanning platforms to identify and analyse vulnerabilities. Taking a risk-based approach to prioritise remediation efforts. Working with engineering teams to remediate issues. … security incidents and reporting about relevant security threats to contribute to our internal detection engineering programme. Work alongside our analysts to upskill them in Vulnerability Management and look for patterns and issues that can be fixed centrally. POC assessments from our active Bug Bounty Program. You will need: 5+ more »
detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerabilityscanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA … of the organization.Participates in change management meetings and provides expert input to ensure security is maintained.Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering.Ability to manage and continuously improve upon vulnerability management program.Ability to propose more »
Information Security Vulnerability Analyst – Permanent - £50,000 Annual Bestman Solutions is working with a leading energy company in their search for a Vulnerability Analyst. As a Vulnerability Analyst, you will play a vital role in identifying, prioritizing, and addressing vulnerabilities in the organization’s networks, applications, and … systems. Key responsibilities: and implement appropriate vulnerabilityscanning tools for both IT and OT environments. these tools to scan all assets regularly (e.g., daily, weekly) and identify potential vulnerabilities. with security teams during assessments and cyber exercises to identify vulnerabilities. the identified vulnerabilities based on severity, exploitability, and … potential impact. regular reports summarizing outstanding vulnerabilities, remediation plans, applied exceptions, and associated security risks. the vulnerability manager in navigating approval processes for remediation efforts. Qualifications: in IT Infrastructure, or Network, with a focus in cloud infrastructure and hybrid environments. experience in identifying and managing security vulnerabilities. Prior experience more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, VulnerabilityScanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
and manage all group security incidents. Whilst there are process aspects to the role there are two main areas of focus for the team: Vulnerability management. The team manage issues identified through internal and external vulnerability testing. Internally we use tools like Snyk (one of several tools available … expo or one of our regular social events after work. The Role Reporting to the Security Operations Manager, your key tasks may involve: Managing vulnerabilityscanning tools - SAST, SCA, IaC, Containers & DAST for all Egress products Investigate SIEM alerts, working with the Engineering and Operations teams to resolve more »
As a Senior Network Security Engineer, you will be instrumental in safeguarding our client's network infrastructure, focusing on perimeter networks, DMZs, firewalls, proxies, vulnerabilityscanning, and Network Access Control (NAC). You will lead the implementation of key security controls, conduct audits, and provide consultancy to the more »
control software; workstations (MAC, Windows), smartphones (Android, OS), printers, desk phones, Reliable technical knowledge about: Network infrastructure including SecOps operations (FW, Switch…), Monitoring and vulnerabilityscanning at performance for 4 types of assets: workstations, servers, applications, and network components, Microsoft product expertise will be advantageous: O365 (Power BI more »
and initiatives to ensure compliance with the organisational Security Policy. Lead security evaluation activities utilising security tests such as commissioned IT Health Checks, auditing, vulnerabilityscanning and penetration testing to name a few [but not exhaustive]. Report testing results to management and commissioning customers. Documenting and managing more »
platforms. Support Windows patching process through the creation/update of ad-hoc scripting (Shell, PowerShell) on Windows Server/Desktop platforms. Assist with vulnerabilityscanning of devices utilizing standard security scanning tools. Manage customer expectations and resolve queries by working closely with Information Security through effective more »
platforms. Support Windows patching process through the creation/update of ad-hoc scripting (Shell, PowerShell) on Windows Server/Desktop platforms. Assist with vulnerabilityscanning of devices utilizing standard security scanning tools. Manage customer expectations and resolve queries by working closely with Information Security through effective more »
able to effectively communicate security vulnerabilities to application developers and/or senior managers who may have little to no experience with application security vulnerability specifics.The Team:Understanding the requirements of the applications and how to use themTesting applications using a variety of tools to identify vulnerabilities that could … expose the Bank to riskMonitoring existing and proposed security standard setting groupsConducting meetings to communicate the findings and implications to stakeholdersPerforming vulnerability fix verification testing in support of the remediationProviding technical support to clients, management and staff throughout risk assessments and the implementation of appropriate data security procedures and … GPEN)SANS GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)SANS GIAC Web Application Penetration Tester (GWAPT)Certified Ethical Hacker (CEH)Experience in conducting vulnerability assessments, code reviews and penetration tests against web/mobile application technologies, services, platforms and languages to find flaws and exploits (e.g. SQL Injection more »
able to effectively communicate security vulnerabilities to application developers and/or senior managers who may have little to no experience with application security vulnerability specifics.The Team:Understanding the requirements of the applications and how to use themTesting applications using a variety of tools to identify vulnerabilities that could … expose the Bank to riskMonitoring existing and proposed security standard setting groupsConducting meetings to communicate the findings and implications to stakeholdersPerforming vulnerability fix verification testing in support of the remediationProviding technical support to clients, management and staff throughout risk assessments and the implementation of appropriate data security procedures and … GPEN)SANS GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)SANS GIAC Web Application Penetration Tester (GWAPT)Certified Ethical Hacker (CEH)Experience in conducting vulnerability assessments, code reviews and penetration tests against web/mobile application technologies, services, platforms and languages to find flaws and exploits (e.g. SQL Injection more »
with relevant rules and regulations related to financial crime and conduct. Technical Requirements: Excellent knowledge of security technologies and domains, including endpoint protection tools, vulnerability scanners, attack simulation, network security, and cloud security. Proficient in PAM best practices, technologies, and procedures. 2+ years knowledge of Windows Server, Active Directory more »
Oxfordshire, England, United Kingdom Hybrid / WFH Options
University of Oxford
Security Operations and the rest of the team. OxCERT runs an on-premises Elasticsearch-based SIEM solution, an Intrusion Detection System (IDS), and a vulnerabilityscanning service as well as other open source and commercial tools. We are one of the first UK universities to have the capability more »