and logging tools (Prometheus, Grafana, ELK stack) Work with a software development team to troubleshoot, build and deploy to environmental issues. Integrate security best practice into DevOps lifecycle including vulnerabilityscanning, secrets management and code quality JBRP1_UKTJ More ❯
and logging tools (Prometheus, Grafana, ELK stack) Work with a software development team to troubleshoot, build and deploy to environmental issues. Integrate security best practice into DevOps lifecycle including vulnerabilityscanning, secrets management and code quality JBRP1_UKTJ More ❯
and logging tools (Prometheus, Grafana, ELK stack) Work with a software development team to troubleshoot, build and deploy to environmental issues. Integrate security best practice into DevOps lifecycle including vulnerabilityscanning, secrets management and code quality TPBN1_UKTJ More ❯
CI/CD pipelines, container workflows, infra-as-code, and deployment tooling Define and enforce access controls, auditing, and logging for internal services Evaluate and manage security tools (EDR, vulnerability scanners, SCA, etc.) Own and manage internal authentication (SSO, MFA, identity lifecycle) Secure endpoints, laptops, and internal systems Lead security awareness and employee training programs Drive SOC 1/ More ❯
run smoothly. What you'll be doing: Implementing and maintaining security controls across network, cloud, endpoints, and core infrastructure Owning key technologies like firewalls, SIEM, EDR, VPN, NAC, and vulnerability scanners Driving vulnerability management and hardening across the estate Supporting and responding to security incidents across infrastructure services Embedding security into infrastructure changes (firewall rules, access reviews, cloud … network security within a complex enterprise environment Solid knowledge of: Firewalls, VPN, IDS/IPS, network security controls Endpoint security (EDR, anti-malware, DLP) SIEM tools (e.g. Splunk, Sentinel) Vulnerability management (e.g. Qualys, Tenable) Cloud (Azure and/or AWS) Hands-on experience supporting or responding to security incidents Familiarity with frameworks such as ISO 27001, NIST, CIS, Cyber More ❯
Hull, North Humberside, England, United Kingdom Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerability management: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. Deliver … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerability management, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non-technical … staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey to More ❯
North Ferriby, North Humberside, North East, United Kingdom Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerability management: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. Deliver … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerability management, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non-technical … staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey to More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
through close collaboration with senior leadership. Owning the organisation’s risk register and assessment processes. Leading technical risk assessments across infrastructure, applications, and third parties. Overseeing threat modelling and vulnerability management initiatives. Providing risk-based recommendations to mitigate threats and vulnerabilities. Leading internal and external audits, including managing remediation plans. Reporting on compliance posture to executive stakeholders. Acting as … technical expertise in areas such as infrastructure, cloud, or application security. Deep understanding of GRC frameworks, methodologies, and risk assessment techniques. Familiarity with key security technologies (SIEM, DLP, IAM, vulnerability scanners). Strong knowledge of regulatory and compliance standards. Demonstrated experience leading teams and managing cross-functional projects. Relevant experience in CISSP, CISM, CRISC, ISO 27001 Lead Implementer/ More ❯