london, south east england, United Kingdom Hybrid / WFH Options
Lorien
technical and advisory expertise to help clients securely craft and deploy Industrial Control Systems (ICS) and operation technology. Main responsibilities: Provide OT/ITS VulnerabilityAssessment and Remediation Services to help clients identify, assess, prioritise and mitigate potentially exposed network components Work collaboratively with various cyber teams to … models and marketing campaigns to enhance the company’s market coverage with a key focus on: Strategy and Target Operating Model, Asset Discovery, Risk Assessment and Classification, Change management along with Implementation of OT products and services Build strong relationships with stakeholders Provide ad-hoc OT, subject matter expertise More ❯
risk , with strong familiarity with DORA compliance and payments/settlement systems . What You’ll Do: Lead and execute advanced penetration testing and vulnerability assessments Own IAM strategy and operations , ensuring airtight access controls Drive compliance with DORA (Digital Operational Resilience Act) standards Evaluate and mitigate third-party More ❯
risk , with strong familiarity with DORA compliance and payments/settlement systems . What You’ll Do: Lead and execute advanced penetration testing and vulnerability assessments Own IAM strategy and operations , ensuring airtight access controls Drive compliance with DORA (Digital Operational Resilience Act) standards Evaluate and mitigate third-party More ❯
risk , with strong familiarity with DORA compliance and payments/settlement systems . What You’ll Do: Lead and execute advanced penetration testing and vulnerability assessments Own IAM strategy and operations , ensuring airtight access controls Drive compliance with DORA (Digital Operational Resilience Act) standards Evaluate and mitigate third-party More ❯
to protect organization's data and systems - Monitor network traffic for potential security breaches and respond appropriately to incidents - Conduct regular security audits and vulnerability assessments to identify and address security risks - Collaborate with cross-functional teams to implement security policies and procedures - Provide technical support and guidance to More ❯
strengthen detection and response capabilities. The Role: Engage in purple team exercises alongside the SOC to simulate attack scenarios and improve detection Run internal vulnerability assessments and pen tests to support compliance and readiness for audits Deliver external penetration testing services — from scoping and testing to risk analysis and More ❯
strengthen detection and response capabilities. The Role: Engage in purple team exercises alongside the SOC to simulate attack scenarios and improve detection Run internal vulnerability assessments and pen tests to support compliance and readiness for audits Deliver external penetration testing services — from scoping and testing to risk analysis and More ❯
strengthen detection and response capabilities. The Role: Engage in purple team exercises alongside the SOC to simulate attack scenarios and improve detection Run internal vulnerability assessments and pen tests to support compliance and readiness for audits Deliver external penetration testing services — from scoping and testing to risk analysis and More ❯
and network coverage. Ensuring secure authentication, data encryption, and penetration testing for IoT devices. Conducting security tests on IoT devices, ensuring data privacy and vulnerability assessments. Verifying data integrity, synchronization, and handling of big data in IoT systems. Knowledge of writing & automating IoT testing scripts and integrating with CI More ❯
build innovative ways of assessing and managing technology risk. Principal Accountabilities Service Asset & Configuration: Support asset management strategies, collect and catalogue metadata, assist in vulnerability assessments, and ensure accuracy in asset data onboarding. Risk & Event Analysis: Analyse technology issues and risks, assist in risk assessments and control testing, and More ❯
programming with at least one modern language such as Java, C++, or C# including object-oriented design. Experience in penetration testing and exploitability-focused vulnerability assessment. Experience in platform-level security mitigations and hardening for Linux and Windows. PREFERRED QUALIFICATIONS Knowledge of overall system architecture, scalability, reliability, and performance More ❯
InTune Knowledge of administering and supporting Entra (Azure AD), Azure IaaS/PaaS Management of backup/recovery solutions Experience with operating system hardening, vulnerability assessments, security audits, penetration testing, intrusion prevention systems and other security control systems for example PAM, SIEM etc. Experience with endpoint security, content filtering … vulnerability scanning and anti-malware Knowledge of at least one scripting language (e.g. PowerShell) MS InTune device management (mobile and Windows 10/11 OS) Demonstrable knowledge of common vulnerabilities and exploitation techniques would be beneficial Familiarity with Cyber Essentials/Plus or ISO 27001 and ITIL best practice More ❯
InTune Knowledge of administering and supporting Entra (Azure AD), Azure IaaS/PaaS Management of backup/recovery solutions Experience with operating system hardening, vulnerability assessments, security audits, penetration testing, intrusion prevention systems and other security control systems for example PAM, SIEM etc. Experience with endpoint security, content filtering … vulnerability scanning and anti-malware Knowledge of at least one scripting language (e.g. PowerShell) MS InTune device management (mobile and Windows 10/11 OS) Demonstrable knowledge of common vulnerabilities and exploitation techniques would be beneficial Familiarity with Cyber Essentials/Plus or ISO 27001 and ITIL best practice More ❯
InTune Knowledge of administering and supporting Entra (Azure AD), Azure IaaS/PaaS Management of backup/recovery solutions Experience with operating system hardening, vulnerability assessments, security audits, penetration testing, intrusion prevention systems and other security control systems for example PAM, SIEM etc. Experience with endpoint security, content filtering … vulnerability scanning and anti-malware Knowledge of at least one scripting language (e.g. PowerShell) MS InTune device management (mobile and Windows 10/11 OS) Demonstrable knowledge of common vulnerabilities and exploitation techniques would be beneficial Familiarity with Cyber Essentials/Plus or ISO 27001 and ITIL best practice More ❯
City Of London, England, United Kingdom Hybrid / WFH Options
Sarafin Partners
platforms in accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from … role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of More ❯
City of London, Greater London, UK Hybrid / WFH Options
Sarafin Partners
platforms in accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from … role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of More ❯
london (city of london), south east england, United Kingdom Hybrid / WFH Options
Sarafin Partners
platforms in accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from … role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of More ❯
Provides cyber security advice and Level 1 support as required; • Implements security settings at the local level; • Executes the security incident management process; • Conducts vulnerability assessments within policy guidelines and as directed; • Responsible for the monitoring and support of assigned systems and portions of the networks including the support More ❯
Role Title: Cyber Security Engineer - Penetration & Vulnerability Testing Client Details: Oliver James has partnered with a leading distribution organisation with a strong market presence and significant investment in their IT security strategy. They are expanding their Cybersecurity team to enhance their vulnerability management and testing capabilities. This is … an exciting opportunity for an experienced Cyber Security Engineer to contribute to strengthening the organisation's security posture through targeted vulnerability assessments and penetration testing, primarily focused on Microsoft Azure and associated technologies. Description: The Cyber Security Engineer will play a critical role in identifying and mitigating security vulnerabilities … across the organisation's technology estate. You will lead regular vulnerability assessments, conduct penetration tests, and work collaboratively with IT teams to address risks and improve security standards. Key Responsibilities: Perform penetration testing and vulnerability assessments across cloud and on-premises environments. Focused security testing within Microsoft Azure More ❯
Vulnerability and Threat Hunting Manager Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in our … attractions. The Vulnerability and Threat Hunting Manager is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting threat assessments, and … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with Security More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Merlin Entertainments
Vulnerability and Threat Hunting Manager Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in our … attractions. The Vulnerability and Threat Hunting Manager is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting threat assessments, and … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with Security More ❯
to collaborate across our wider group. *** Must be eligible to work in the UK - No sponsorship available *** What you'll be doing: From running vulnerability assessments to delivering engaging security training sessions, this role is hands-on and high-impact. You’ll be: Proactively identifying and tackling system vulnerabilities … Microsoft Sentinel, Defender, Cloud App Security, or Purview A solid grasp of ISO27001, NIST, UK GDPR, and security frameworks Knowledge of vendor management and vulnerability assessments Bonus points for certifications like ISO27001 Lead Implementer, CISSP, or CISM What’s in it for you? Private healthcare & life insurance Generous pension More ❯
Vulnerability and Threat Hunting Manager Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in our … attractions. The Vulnerability and Threat Hunting Manager is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting threat assessments, and … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with Security More ❯
implementing, and managing security solutions to protect our organisation's information assets, with a specific focus on migrating from Cyber Essentials to the Cyber Assessment Framework (CAF). What you'll need to succeed Security ArchitectureDesign : Develop and maintain security architecture frameworks and standards,focusing on Microsoft technologies such … as Azure, Office 365, and WindowsServer. Migration to CAF : Leadthe migration from Cyber Essentials to the Cyber Assessment Framework (CAF),including planning, execution, and documentation of the transition process. Risk Assessment: Conduct security risk assessments and vulnerability assessments to identify andmitigate potential security threats. Security SolutionsImplementation: Design … Microsoft Azure security services (e.g., Azure Security Center, AzureSentinel). Experiencewith security features and configurations. Proven experience of migrating from Cyber Essentialsto the Cyber Assessment Framework (CAF). Proven experience implementing SOAR services. StrongKnowledge of Windows Server security and Active Directory. Familiaritywith security frameworks and standards (e.g., NIST, ISO More ❯
implementing, and managing security solutions to protect our organisation's information assets, with a specific focus on migrating from Cyber Essentials to the Cyber Assessment Framework (CAF). What you'll need to succeed Security ArchitectureDesign : Develop and maintain security architecture frameworks and standards,focusing on Microsoft technologies such … as Azure, Office 365, and WindowsServer. Migration to CAF : Leadthe migration from Cyber Essentials to the Cyber Assessment Framework (CAF),including planning, execution, and documentation of the transition process. Risk Assessment: Conduct security risk assessments and vulnerability assessments to identify andmitigate potential security threats. Security SolutionsImplementation: Design … Microsoft Azure security services (e.g., Azure Security Center, AzureSentinel). Experiencewith security features and configurations. Proven experience of migrating from Cyber Essentialsto the Cyber Assessment Framework (CAF). Proven experience implementing SOAR services. StrongKnowledge of Windows Server security and Active Directory. Familiaritywith security frameworks and standards (e.g., NIST, ISO More ❯