align with strategic needs, negotiating as necessary. Develop and implement security awareness training programs for employees to promote best practices and cultivate a vigilant workforce. Oversee penetration testing and vulnerabilityscanning to identify and remediate security vulnerabilities promptly. Data Privacy: Establish and maintain programs to ensure data handling, storage, and access comply with relevant privacy laws and regulations More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Tableau Server 2024.2 platform (Windows Server 2022), ensuring maximum uptime and performance. Includes load testing and infrastructure issue resolution. Security Management: Manage server security, including patching, upgrades, penetration testing, vulnerabilityscanning, security protocols, and authentication (SSO - SAML and OAuth). User Support: Provide technical support, guidance, and training to end-users; resolve connectivity issues and manage user access. More ❯
align with strategic needs, negotiating Develop and implement comprehensive security awareness training programs for employees, promoting best practices to cultivate a knowledgeable and vigilant workforce. Oversee penetration testing and vulnerabilityscanning operations, ensuring timely identification and remediation of security vulnerabilities to maintain a strong security posture Data Privacy: Establish and maintain programs to ensure all data handling, storage More ❯
Hull, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
2024.2 platform (Windows Server 2022) for maximum uptime, performance, and stability, including load testing and infrastructure issue resolution. Security Management: Manage server security aspects, including patching, upgrades, penetration testing, vulnerabilityscanning, security protocols, and authentication methods (SSO - SAML and OAuth). User Support: Provide technical support, guidance, and training to end-users, resolving connectivity issues and managing user More ❯
including executive briefings, and actionable recommendations to technical and non-technical stakeholders Set yourself apart: Monitoring, incident response and playbook development Detection creation within SIEM tools and using GitHub Vulnerabilityscanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Ability More ❯
charge in deploying high-tech solutions that not only meet compliance with regulations and industry standards but also exceed expectations. As a Cybersecurity Engineer you'll oversee incident response, vulnerability management, and cyber threat hunting. You'll execute security solutions applying cutting-edge technologies like firewalls, intrusion detection and prevention systems, antivirus software, and vulnerability scanners. You will … of our services. If you're ready to take on a role where every line of code and every solution you implement could be the difference between security and vulnerability, then Kyndryl is the place for you. Your expertise is not just welcome here – it’s celebrated and valued. Join us as a Cybersecurity Engineer, and together we’ll … Extensive experience escalating incidents to, and in driving incident resolution with, technology vendors and stakeholders. Demonstrable experience in supporting large, complex Networks and Hosting Estates using multiple technologies including: Vulnerability Management Technologies (e.g. Qualys, Tenable, Rapid7) o MDR Technologies (e.g. TrendMicro, SeninelOne, CrowdStrike) Ability to achieve SC & NPPV3 Clearances. Preferred Skills and Experience IDS/IPS technologies (e.g. Cisco More ❯
DevOps teams to implement security controls across cloud infrastructure (ideally AWS), including access control, encryption, and logging. Leading the incident response process and managing third-party penetration testing and vulnerability management activities. The ideal Information Security Lead will have experience with the following: 3-5 years of hands-on experience in an information security or IT risk/compliance … IAM), and SSO. A clear understanding of data privacy laws, particularly GDPR. Familiarity with a range of security tools for endpoint protection, SSO/IAM, monitoring/logging, and vulnerability scanning. Demonstrable experience with risk assessments, incident response planning, and the creation of security policies. Excellent communication skills with the ability to articulate security concepts to both technical and More ❯
Docker) Threat Hunting, Detection Engineering, Incident Response Security Automation (SOAR), Hyper Automation practices Familiarity with the MITRE ATT&CK framework Experience with Zero Trust Network Architecture, IDS/IPS, vulnerability scanners, and web proxies Scripting or programming (Python, PowerShell, Bash, etc.) Join a global leader at the forefront of data-driven customer insights, where you’ll contribute to meaningful More ❯
City of London, England, United Kingdom Hybrid / WFH Options
VE3
monitoring using tools like Ansible, Chef, or Puppet. Monitor system performance and troubleshoot issues across infrastructure and applications. Implement and enforce security best practices, including IAM policies, encryption, and vulnerability scanning. Collaborate with development teams to support deployment, testing, and release management. Create and maintain documentation related to infrastructure, policies, and procedures. Provide on-call support and participate in More ❯
native environments. Tool & Platform Proficiency: Hands-on experience with Azure services (e.g. Azure DevOps, Security Center, Key Vault, Policy) and security tools like Sentinel, Darktrace, IDS/IPS, and vulnerability scanners. Automation & Scripting: Skilled in automation and scripting using tools and languages such as PowerShell, JSON, and Bicep for infrastructure and security management. Security Monitoring & Testing: Experience managing penetration More ❯
London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
testing, and automated security validation. Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR, DLP, vulnerability scanners, firewalls, email gateways. Degree in Computer Science, Engineering, or a related STEM field. If you think that this could be a good fit for you, then please apply More ❯
do research autonomously to always be ahead of any security threat. SSDLC practices in DevOps, CI/CD environment. OWASP Top 10, SANS CWE, OpenSAMM, BSIMM, etc. Penetration testing, vulnerability scanning. Design security monitoring tools. Designing pipelines that make use of SCA, SAST, DAST, IAST and RASP solutions. Qualifications: SANS/SEC-540: Cloud Security and DevSecOps Automation. Systems More ❯
GCP preferred) . Track Record: Demonstrated success in building and scaling cloud security programs from scratch. Tooling: Familiarity with core cloud security components including IAM , WAFs , SIEM , CSPM , and vulnerability scanners. Technical Skills: Proficiency in at least one scripting or programming language (e.g. Python, Go, Bash). Threat Modeling: Practical knowledge of frameworks like STRIDE and PASTA. Education: Bachelor More ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability management-specific tooling, and have … an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process vulnerability data to provide reports, insights and metrics … that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerability management, security standards, and regulations More ❯
Trust in digital transactions and financial technologies is crucial for the smooth functioning of modern society. Neelam Kadbane, our next pathbreaker, Senior Vulnerability Analyst at Mastercard, identifies and addresses security vulnerabilities within Mastercard’s environment & products by conducting network penetration tests. Neelam talks to Shyam Krishnamurthy fromThe Interview Portal about the innumerable challenges and the satisfacation of her work … . It was a significant achievement for me, especially since it’s rare for companies to hire freshers directly into the InfoSec domain. At Qualys, I worked with the Vulnerability Management team, where we researched new CVEs and zero-day vulnerabilities, and developed signatures for vulnerability scanners. A zero-day vulnerability is a security flaw in software … or hardware that is unknown to the vendor or developer. Since the vendor is unaware of the vulnerability, no patch or fix is available, making it highly dangerous. The term “zero-day” comes from the fact that once the vulnerability is discovered by malicious actors, the vendor has zero days to fix it before it can be exploited. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Next Ventures
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerabilityscanning and remediation activities via Tenable Vulnerability Management Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerability management tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerabilityscanning and remediation activities via Tenable Vulnerability Management Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerability management tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Next Ventures
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerabilityscanning and remediation activities via Tenable Vulnerability Management Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerability management tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯
London, England, United Kingdom Hybrid / WFH Options
SafeSync Security
SafeSync Security is hiring a Security Engineer to design, implement, and maintain security protocols to protect our clients' data and systems. This role includes conducting vulnerability assessments, penetration testing, and security audits to identify and address potential risks. The Security Engineer will collaborate with IT teams to develop security policies, respond to security incidents, and ensure compliance with industry … technologies and trends to proactively defend against emerging threats. Responsibilities Design, implement, and maintain security solutions to protect the company's systems, networks, and infrastructure. Conduct security assessments, including vulnerabilityscanning, penetration testing, and security audits. Monitor systems for security breaches, respond to incidents, and investigate security-related issues. Develop and maintain security policies, procedures, and documentation. Collaborate More ❯
is embedded within the Software Development Life Cycle, while ensuring that all security requirements have been applied before product or function release. Analyse and interpret security scan results and vulnerability reports to develop prioritized remediation strategies, working closely with IT, Development and Hosting teams to address vulnerabilities effectively Engineer and implement security controls based on industry standards while continuously … ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetration testing and vulnerabilityscanning Ensure products compliance with security standards and regulations Ensure NAVBLUE Security strategy deployment within technical operations Ensure effective synchronization and alignment with Airbus Security Organization Education: Bachelor … influencing individuals at all levels of the organization to drive and implement change while identifying and minimizing the impact of risks Technical Systems Proficiency: Security Management Tools (email filtering, vulnerabilityscanning tools, security dashboards, etc.) Cloud security management tools like CNAPP, CSPM, CWPP, and CIEM. Security risk assessment methodology (EBIOS RM) Security Requirement Definition and Review Travel Required More ❯
Reading, England, United Kingdom Hybrid / WFH Options
THAMES WATER UTILITIES LIMITED
As a Senior Security Penetration Tester , you will be responsible for supporting the design, implementation, and maintenance of TVM (Threat & Vulnerability Management) solutions, controls and processes across the organisation. You will be liaising with Digital teams to ensure appropriate mitigation and remediation of vulnerabilities detected across our IT estate. This role requires an understanding of TVM concepts, technologies, and … Tester Help support and develop an internal penetration testing function. Conduct network, application penetration testing, code and security reviews. Identify and exploit vulnerabilities through proof-of-concept testing. Support vulnerability management across the enterprise, ensuring that a framework for identification, categorisation and mitigation exists and is implemented and maintained. Responsible for supporting the creation of the operating model for … vulnerability management, that it is shared, agreed and operates effectively across the business. Develop and maintain penetration testing documentation, policies, and procedures. Integrate cybersecurity solutions (e.g. vulnerabilityscanning tools) with existing systems, applications, and infrastructure. Evaluate and recommend technologies, tools, and vendors to meet business needs. Investigate newly identified cybersecurity vulnerabilities and provide appropriate mitigation actions. Liaise More ❯
XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Strong analytical and problem-solving skills. Good verbal and written communication skills, with the ability to tailor messages to different audiences. Commitment to More ❯
XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Strong analytical and problem-solving skills. Good verbal and written communication skills, with the ability to tailor messages to different audiences. Commitment to More ❯
and contributing across a broad range of responsibilities, such as: Threat Management Endpoint Detection Security Assurance (Security by Design Controls) Framework Governance and Compliance (ISO 27001, NIST, PCI-DSS) VulnerabilityScanning Risk Analysis Cybersecurity Awareness Campaigns Phishing Campaigns Experience The ideal candidate will bring hands-on experience in the above Cyber Security responsibilities, coupled with a strong analytical More ❯
and contributing across a broad range of responsibilities, such as: Threat Management Endpoint Detection Security Assurance (Security by Design Controls) Framework Governance and Compliance (ISO 27001, NIST, PCI-DSS) VulnerabilityScanning Risk Analysis Cybersecurity Awareness Campaigns Phishing Campaigns Experience The ideal candidate will bring hands-on experience in the above Cyber Security responsibilities, coupled with a strong analytical More ❯