Uxbridge, London, United Kingdom Hybrid / WFH Options
Network IT
alignment with IT transformation goals. Lead and manage a high-performing team, responsible for wired, Wi-Fi, and remote access services. Oversee the security of the network , including compliance, vulnerability assessments, and incident response. Provide technical and strategic advice to senior stakeholders on network performance and emerging risks. Manage budgets, procurement, and vendor relationships, ensuring cost-effective service delivery. More ❯
Uxbridge, Middlesex, England, United Kingdom Hybrid / WFH Options
Network IT
alignment with IT transformation goals. Lead and manage a high-performing team, responsible for wired, Wi-Fi, and remote access services. Oversee the security of the network , including compliance, vulnerability assessments, and incident response. Provide technical and strategic advice to senior stakeholders on network performance and emerging risks. Manage budgets, procurement, and vendor relationships, ensuring cost-effective service delivery. More ❯
Stay up to date with the latest cyber-attack trends and technology developments. Conduct cyber risk and control assessments, design cyber programmes, and deliver offensive security services such as vulnerability assessments and incident response simulations. Key Requirements: Currently hold or be working towards a recognised cyber security certification. Practical experience in conducting cyber risk and control assessments. Relevant hands More ❯
leader in a team responsible for building and scaling AI-powered security solutions across Amazon's global infrastructure. This team is transforming how Amazon approaches security through autonomous detection, assessment, and remediation of security issues. We partner with security teams and service teams across Amazon to embed autonomous security capabilities throughout the development lifecycle. You will be an expert … and deploying automated security solutions in large-scale environments • Experience with formal methods, automated reasoning, or similar approaches to validating security decisions • Background in security testing, penetration testing, or vulnerabilityassessment • History of contributions to security automation or tooling in the broader security community • Experience driving adoption of new security technologies across large engineering organizations Amazon is an More ❯
Life on the team Computacenter is growing our penetration testing capability and we are looking for an experienced penetration tester to support the delivery of vulnerabilityassessment and penetration testing services to Computacenter and our customers delivered services. As a highly skilled and motivated Penetration Tester, you will join our dynamic Cybersecurity team click apply for full job More ❯
e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. Formulate HMG Information Assurance Risk Assessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST, CSF, and CSA … development of patterns and principles Working within environments utilising DevOps, DevSecOps, SRE, CI/CD, Infrastructure & Security as Code (Docker, Git, Terraform) Managing technical assessments of security related technologies, vulnerability assessments and penetration tools and techniques Enabling & informing risk-based decisions: Working with higher impact or more complex risks, advising on the impact and whether this is within risk More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
DMS Computer Recruitment
of the position include: Design and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments Participate More ❯
policies and standards are applied through a hands-on, consultative approach Translate technical risk into business-friendly language for a range of audiences Scope and support penetration testing and vulnerability assessments, ensuring timely remediation Conduct impact assessments in line with Smart Energy Code, GDPR, and internal policy Deliver artefacts such as Supplier Security Assessments, Software Security Reviews, and Business … security assurance in complex, fast-paced environments Broad knowledge of IT and security frameworks, regulations, and best practices (e.g., ISO 27001, DPA, GDPR) Familiarity with security tools such as vulnerability scanners, SIEM, DDoS protection, remote access, authentication/authorisation technologies, and data loss prevention Understanding of OWASP top vulnerabilities and methodologies Technical knowledge of cloud, networking, virtualisation, mobile technologies More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
london (city of london), south east england, united kingdom
InterQuest Group
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
Your mission As a Security Analyst, you oversee incoming security vulnerability reports from our researchers' community, while continuously sharpening your cybersecurity skills. All of this happens through dedicated interaction with the researcher's community and with the goal of offering the best possible service to both companies and researchers. What you'll be doing Challenge and support both researchers … Outstanding interpersonal abilities and strong written and verbal communication skills. Fluent in English, both written and spoken. At least 2 years of experience in pen testing, security testing, or vulnerability assessments. Stress resistant and able to maintain focus during incident responses. A strong understanding of (Ethical) Hacker culture. Attention to detail, analytical, and problem-solving skills. Able to independently More ❯
aligned with legal, regulatory, and architectural requirements. Lead periodic reviews in response to emerging threats, changes in business operations, or evolving technologies. Coordinate, commission, and interpret penetration testing and vulnerability assessments Oversee the planning and execution of penetration tests and vulnerability scans across GLD's digital estate. Work with external providers and internal teams to ensure tests are More ❯
aligned with legal, regulatory, and architectural requirements. Lead periodic reviews in response to emerging threats, changes in business operations, or evolving technologies. Coordinate, commission, and interpret penetration testing and vulnerability assessments Oversee the planning and execution of penetration tests and vulnerability scans across GLD's digital estate. Work with external providers and internal teams to ensure tests are More ❯
an enthusiastic Cyber Security Consultantto join our team. Working alongside ourexperienced team of specialists, you'll be delivering offensive securityservices including digital footprint reconnaissance, social engineering,penetration testing and vulnerability assessments and more to high profileclients across all industries. The purpose of this role is to deliver our offensivesecurity services including digital footprint reconnaissance, socialengineering, vulnerability assessments, penetration … Consultantto join our team. Working alongside ourexperienced team of specialists, you'll be delivering cyber risk and control assessments,developing cyber programmes as well as delivering offensive security servicesincluding vulnerability assessments and cyber incident response exercises. You'll benefit from ongoing coaching, careermentoring, and be supported by our career pathway. You will have an opportunityto continue to develop market More ❯
possibility of increasing. What You'll Be Doing Cyber Security Leadership: Design and implement advanced cyber security strategies tailored to the unique needs of our global projects. Conduct regular vulnerability assessments and provide actionable recommendations to enhance digital security. Ensure secure communication protocols for teams operating in high-risk environments. Physical And Human Security Advise on physical security measures … including site risk assessments and travel safety protocols. Develop human security strategies to protect personnel and project participants, focusing on situational awareness and mitigation of threats. Risk Assessment And Crisis Management Conduct thorough risk assessments across physical, human, and cyber security domains. Develop crisis management plans and lead response efforts in the event of security incidents. Training And Capacity More ❯
Uxbridge, London, United Kingdom Hybrid / WFH Options
Network IT
design, implement, and maintain security network infrastructure to protect against cyber threats. Key Responsibilities: Act as a key reference point for network security , advising IT teams and stakeholders. Perform vulnerability assessments, audits, and continuous traffic monitoring for anomalies. Analyse and respond to security incidents, developing remediation and incident reports. Provide 2nd/3rd line support for network services, ensuring … Participate in project and change management, providing expertise on network security in planning and delivery. Experience Requirements: Strong technical background in network infrastructure and security operations . Experience with vulnerability assessments, incident response, and security tools. Knowledge of enterprise networking (wired, wireless, remote access). Familiarity with monitoring, alerting, and reporting solutions. Strong problem-solving skills and the ability More ❯
Uxbridge, Middlesex, England, United Kingdom Hybrid / WFH Options
Network IT
design, implement, and maintain security network infrastructure to protect against cyber threats. Key Responsibilities: Act as a key reference point for network security , advising IT teams and stakeholders. Perform vulnerability assessments, audits, and continuous traffic monitoring for anomalies. Analyse and respond to security incidents, developing remediation and incident reports. Provide 2nd/3rd line support for network services, ensuring … Participate in project and change management, providing expertise on network security in planning and delivery. Experience Requirements: Strong technical background in network infrastructure and security operations . Experience with vulnerability assessments, incident response, and security tools. Knowledge of enterprise networking (wired, wireless, remote access). Familiarity with monitoring, alerting, and reporting solutions. Strong problem-solving skills and the ability More ❯
dynamic team to build innovative ways of building and assessing operationally resilient technology services. Principal Accountabilities: - Business Impact Assessments & Risk Identification: Develop asset management strategies, lead business impact and vulnerability assessments, conduct threat modelling, and maintain risk identification frameworks. - Risk Assessment & Evaluation: Ensure compliance with governance policies, provide expertise on operational resilience, and support risk assessments for internal More ❯
Embedded Consulting team is hiring a Regional Threat Monitoring Specialist to support a global tech client in producing reports and other threat-related products. This role will support threat, vulnerability, and risk assessments, as well as some other analytical content for the EMEA region. Role tasks and responsibilities Conduct in-depth research and analysis on specific locations within EMEAassessing … threats from natural hazards, infrastructure, terrorism, and political instability, among others. Produce clear, concise, and actionable intelligence reports tailored to stakeholders, including threat summaries, trending topics, and vulnerability assessments. Monitor and research emerging trends and topics related to data centers that could impact facility development, supply chains, and site operations. Collaborate with other analysts and internal stakeholders to gather More ❯