and cloud security standard frameworks, architecture, design, operations, controls, technology, solutions, and service orchestration, e.g. CIS, CSF; Skills in: Security Tooling: Proficiency in common security tools, such as SIEMs, vulnerability scanners, firewalls and EDR products; Scripting: Proficiency in scripting languages like Python, BASH, or PowerShell; Security Incident Management: Ability to assist with the detection, response, and recovery of escalated More ❯
Platform (e.g., Cloud IAM, Security Command Center, VPC Service Controls) and Azure/M365 (e.g., Azure Security Center, Azure AD, Microsoft Defender for Cloud). Conduct regular security assessments, vulnerabilityscanning, and penetration testing of cloud infrastructure and applications. Monitor cloud environments for security threats, anomalies, and incidents, and lead incident response efforts. Collaborate with development, operations, and More ❯
Platform (e.g., Cloud IAM, Security Command Center, VPC Service Controls) and Azure/M365 (e.g., Azure Security Center, Azure AD, Microsoft Defender for Cloud). Conduct regular security assessments, vulnerabilityscanning, and penetration testing of cloud infrastructure and applications. Monitor cloud environments for security threats, anomalies, and incidents, and lead incident response efforts. Collaborate with development, operations, and More ❯
with a focus on enterprise-level environments. Solid understanding of Cyber Security Best Practices, risk management, and network hardening techniques. Hands-on experience in CVE detection and remediation (including vulnerabilityscanning tools like Nessus, Qualys, etc.). Cisco Certifications (CCIE, CCNA, etc.) with recent experience working on Cisco switches, routers, and other networking devices. Preferred: Certifications such as More ❯
including preparing for and undergoing assessments. Familiarity with information security frameworks (e.g., NIST, CIS). Proficiency in risk management methodologies. Knowledge of common security technologies (e.g., firewalls, EDR, SIEM, vulnerability scanners). Exceptional analytical, problem-solving, and decision-making abilities. Excellent communication (written and verbal), interpersonal, and presentation skills. Ability to operate autonomously and manage multiple priorities in a More ❯
responsible for protecting enterprise systems and data. This role offers hands-on involvement with a wide range of technologies-from endpoint detection and SIEM platforms to firewalls, MFA, and vulnerability management-providing a well-rounded foundation in enterprise security operations. You'll gain exposure to advanced security practices, assist in running and responding to threat detection systems, and contribute … to projects that strengthen security across the organisation. Key Responsibilities Monitor and respond to security alerts and incidents (EDR, SIEM, Identity Protection, SOAR). Assist in vulnerabilityscanning and remediation activities. Help manage systems such as email and web security gateways, VPNs, MFA, SSO, and mobile device security. Support the maintenance of security certificates, PAM systems, and conditional … platforms in a corporate IT environment. Experience with some of the following: EDR platforms (e.g., CrowdStrike) Email or web security gateways (e.g., Mimecast) MFA/SSO (e.g., Duo, Okta) Vulnerability scanners (e.g., Rapid7, Tenable, Nessus) InTune and Conditional Access Exposure to: Imperva WAF KnowBe4 Certificate management tools Kali Linux toolset and penetration testing basics Qualifications: Working towards or holding More ❯
business and technology teams delivery of the security change programme. Provide support to the business and technology teams to understand and address vulnerabilities within SLA, identified through penetration testing, vulnerabilityscanning and red team exercises Foster relationships with internal business units to enhance cyber security communication, including knowledge of threats, vulnerabilities, and mitigation strategies. Provide strategic insights to More ❯
GuardDuty and a good understanding of cloud security frameworks are highly valued. Frameworks & Platforms: Comfortable working with industry standards and tools such as the MITRE ATT&CK framework, CSPMs, vulnerability scanners, endpoint protection platforms, and proxy technologies. Agility in Action: You thrive in dynamic environments, adapting quickly to emerging threats and evolving tech stacks with curiosity and composure. Good More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
As a Senior Security Penetration Tester , you will be responsible for supporting the design, implementation, and maintenance of TVM (Threat & Vulnerability Management) solutions, controls and processes across the organisation. You will be liaising with Digital teams to ensure appropriate mitigation and remediation of vulnerabilities detected across our IT estate. This role requires an understanding of TVM concepts, technologies, and … Tester Help support and develop an internal penetration testing function. Conduct network, application penetration testing, code and security reviews. Identify and exploit vulnerabilities through proof-of-concept testing. Support vulnerability management across the enterprise, ensuring that a framework for identification, categorisation and mitigation exists and is implemented and maintained. Responsible for supporting the creation of the operating model for … vulnerability management, that it is shared, agreed and operates effectively across the business. Develop and maintain penetration testing documentation, policies, and procedures. Integrate cybersecurity solutions (e.g. vulnerabilityscanning tools) with existing systems, applications, and infrastructure. Evaluate and recommend technologies, tools, and vendors to meet business needs. Investigate newly identified cybersecurity vulnerabilities and provide appropriate mitigation actions. Liaise More ❯
Container & Orchestration Security: Partner with Cloud Engineering, DevOps, Platform teams and stakeholders in the deployment of secure containerised environments using platforms like Docker, and ECS. With a focus on vulnerability mitigation, compliance automation, and secure orchestration practices to ensure container workloads are resilient and meet organisational security requirements. Security Policy Development & Enforcement: Develop, document, and enforce comprehensive cloud security … Collaborate with teams to integrate security best practices into the software development lifecycle (SDLC) and CI/CD pipelines. Ensure security is prioritised through automation tools, security testing, and vulnerabilityscanning as part of the continuous delivery process. Security Assessments & Incident Response: Conduct security assessments, vulnerability scans and risk analyses to identify and address potential security weaknesses More ❯
hear from you! KEY RESPONSIBILITIES: Configure and manage Windows laptops, MacBooks, and iPhones Use Intune for device provisioning, policy enforcement, and app deployment Manage ESET for antivirus, encryption, and vulnerability scans Conduct on-premises server vulnerability management using Nessus Tenable Ensure adherence to ISO27001 and Cyber Essentials Plus (CE+) standards Maintain on-premises Proxmox servers, including hardware and … Proficiency with Intune, ESET, Nessus, and Azure infrastructure Solid knowledge of Windows, macOS, and iOS ecosystems Working knowledge of ISO27001 and CE+ frameworks Proven ability in endpoint management, server vulnerabilityscanning, and user provisioning Effective problem-solving skills Ability to work independently and as part of a team INTERVIEW PROCESS: Stage 1: 20 min video call with the More ❯
security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity management and federation, firewalls, SIEM, vulnerabilityscanning, and cryptography. Experience overseeing incident response, vulnerability management, and security service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable More ❯
security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity management and federation, firewalls, SIEM, vulnerabilityscanning, and cryptography. Experience overseeing incident response, vulnerability management, and security service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable More ❯
Security Stack (including Microsoft Defender for Cloud, Microsoft Sentinel, Azure AD etc). Solid understanding of security frameworks (e.g., ISO 27001, Cyber Essentials, NIST, GDPR etc). Experience with vulnerabilityscanning, risk assessment, and remediation planning. Strong communication skills with the ability to work with both technical and non-technical teams. A proactive approach to identifying and addressing More ❯
Employment Type: Permanent
Salary: £50000 - £60000/annum Depending on Experience
Security Stack (including Microsoft Defender for Cloud, Microsoft Sentinel, Azure AD etc). Solid understanding of security frameworks (e.g., ISO 27001, Cyber Essentials, NIST, GDPR etc). Experience with vulnerabilityscanning, risk assessment, and remediation planning. Strong communication skills with the ability to work with both technical and non-technical teams. A proactive approach to identifying and addressing More ❯
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerability management programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national security … standards Experience required Extensive hands-on CTI and vulnerability management experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerabilityscanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry-leading More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Anson McCade
a strategic and hands-on role where you'll be the key bridge between clients and operational teams, ensuring smooth delivery of security services, incident response coordination, and ongoing vulnerability management. If you’ve got a deep background in cybersecurity operations, excel under pressure, and know how to guide both clients and internal teams, this could be your next … remediation activities Managing client-facing service reviews (weekly/monthly), presenting clear reports and insights Supporting internal delivery teams to ensure SLAs are met and quality standards maintained Overseeing vulnerabilityscanning and prioritisation , and guiding clients on remediation Supporting and managing IDS/IPS configuration and updates Driving continuous improvement across service delivery processes What We’re Looking … For 10+ years in Security Operations or SOC-related service delivery Strong technical understanding of incident response, vulnerability management, IDS/IPS Proven experience handling client relationships, stakeholder management , and crisis situations Excellent communication skills — both technical and non-technical Experience leading cross-functional teams in fast-paced environments Relevant certifications (e.g. CISSP, GCIH, CICM) UK SC clearance or More ❯
you can expect to: Lead incident response for breaches, malware attacks, root cause analysis, and recovery Monitor threat feeds and correlate intelligence with tooling to identify emerging risks Oversee vulnerability management and assess remediation effectiveness Collaborate with IT, DevOps, and GRC to align security efforts with business goals Manage and refine configurations for our security tools, and recommend new … threats, ensuring zero-day vulnerabilities are discovered and actioned quickly Own the planning and execution of our annual penetration testing activity To be successful, you'll have: Experience using vulnerabilityscanning tools and remediating software/hardware issues A solid understanding of both automated and manual penetration testing Hands-on experience identifying, testing, and mitigating system vulnerabilities A More ❯
The Infrastructure Engineer (Vulnerability Management) is a hands-on technical role aimed at enhancing this banks security posture. Positioned within the IT Security team, this role is responsible for addressing open vulnerabilities and assurance findings. The Infrastructure Engineer will remediate vulnerabilities using change and release management methodologies and automate security updates using a suit of patch management tools. Client … managing Group Policy Objects (GPOs) and Azure Policies. Hands-on experience deploying and configuring various patching solutions (e.g., SCCM, Intune, Ninja One). Experience configuring and interpreting reports from vulnerabilityscanning tools. Experience working with third-party vendors to deliver changes or perform impact assessments. Proficiency in scripting languages (preferred). Degree in Computer Science or a related More ❯
security best practices across the board, playing a critical role in our journey towards SOC2 compliance. Implement and manage security controls related to IAM, network security (VPCs, security groups), vulnerabilityscanning, and secrets management. Skills, Knowledge and Expertise Experience: Extensive hands-on experience in a DevOps, SRE, or Platform Engineering role, managing production systems in a cloud environment. More ❯
and policy design. •Practical knowledge of HAProxy or equivalent reverse proxies/load balancers, with experience configuring L4/L7 security protections. •Familiarity with CVE triage workflows and integrating vulnerability scanners into CI/CD and registry workflows. •Exposure to runtime security tooling (e.g. Falco, eBPF-based monitoring) and familiarity with basic incident response workflows. •Comfort representing engineering in More ❯
at all levels Security Posture Management: Develop and maintain a comprehensive security posture management program to proactively identify and address vulnerabilities. Continuously assess the organization's security posture through vulnerability assessments, penetration testing, and threat modelling. Collaborate with cross-functional teams to implement security best practices and ensure compliance with industry standards and regulations. Cyber Exposure Risk Management: Identify … identify areas for improvement. What You'll Bring: Experience: A depth of experience in cybersecurity, with at least 3 years in a leadership or management role. Proven experience in vulnerability management, threat modelling, and incident response. Strong understanding of security frameworks, compliance standards, and best practices. Education:Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related … field. Advanced degrees or certifications (e.g., CISSP, CISM, CEH) are highly desirable. Technical Skills: Proficiency in security tools and technologies, such as SIEM, vulnerability scanners, and endpoint protection platforms. Knowledge of cloud security, network security, and secure software development practices. Familiarity with scripting and automation tools to streamline security processes. Working with data centres and native cloud environments AWS More ❯
Market Harborough, Leicestershire, East Midlands, United Kingdom
CDS Global
and networking components The ability to work unsupervised with strong self-motivation Experience with scripting and automation Experience with virtualization platforms Experience using SIEM platforms Experience with EDR and vulnerabilityscanning Knowledge of Windows Servers and Azure Cloud Desirable: Experience with ITIL, PCI and GDPR Driving Licence Programming experience with PowerShell, C# and\or Python In addition to More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
of cyber security regulatory landscape: e.g. CAF, NCSC, NIS. Knowledge of OT network protocols: e.g. modbus, DNP3, LoRaWAN. Tools: Experience with standard penetration testing tools, such as port and vulnerability scanners, BurpSuite, Kali Linux, etc as well as OT/ICS related tools and traffic analysis solutions (e.g. Malcom, Hedgehog Linux). Communication: Strong verbal and written communication skills More ❯