Role Overview: We are seeking a highly skilled Networking Consultant with expertise in cybersecurity, Microsoft 365, and Azure to join our dynamic team. The ideal candidate will design, implement, and optimize secure network architectures, leveraging Microsoft cloud technologies to protect More ❯
The Vulnerability Management Manager is a global role within ION's central services division, supporting the Group Security strategy through the identification, mitigation, and remediation of information security vulnerabilities, misconfigurations, and risks. This role reports to the Global Head of IT Security, who reports to the Group CISO. As a member of the ION Security team, you will … build and lead a team of Security professionals specializing in Vulnerability Management, managing partners and vendor deliverables, and developing a strategy for a world-class Vulnerability Management program. Your team will perform discovery scanning, risk assessments, mitigation activities, continuous validation, and lessons learned workshops to improve processes across Group Security and Verticals. We seek a diligent, dedicated, creative … capable of building relationships with teams of varying technical abilities. The ideal candidate will have extensive cybersecurity experience, at least 10+ years in security roles, with a focus on Vulnerability Management. Key Responsibilities: This role may require out-of-hours work for 24x7 global operations. Ensure team objectives and development plans align with company OKRs. Act as escalation point More ❯
implement scalable SaaS solutions (requirements gathering, architecting, configuring, and team training). Create and maintain technical documentation of systems and processes. Manage tickets of incidents, troubleshooting escalations, and security vulnerability remediations tasks. Handle tickets of incidents and Service Desk escalations. Keep informed and updated on feature updates/changes within areas of ownership Participate in the on-call incident More ❯
with relevant security frameworks and regulations, identifying potential compliance issues and contributing to mitigation strategies. Technology Evaluation, Deployment, and Management: Conducts security architecture reviews and perform security assessments, including vulnerability scanning, configuration reviews, and cloud security posture assessments, identifying vulnerabilities and recommending detailed remediation strategies. Contribute to the development of security architecture roadmaps and strategic plans, and support More ❯
a strong focus on automation, detection and secure by design principles. Additionally, as part of the role you will be leading and participating in threat detection, incident response and vulnerability management remediation. You will be serving as both a technical leader and operational responder, working closely with Product, infrastructure and Security Operations teams. We are looking for a hard … system visibility by expanding logging coverage and implementing additional monitoring capabilities. Maintain, update, and regularly test incident response runbooks, containment strategies, and escalation protocols. Lead the end-to-end vulnerability management process for ION Markets systems, from identification to remediation. Provide support for security architecture reviews of developed systems to ensure alignment with best practices. Stay up to date … or operating security technologies is preferred, such as endpoint security (e.g. AV/EPP/EDR), SIEM, DLP, SWG, CASB, UEBA, IDS, IPS, firewalls, IAM/PIM/PAM, vulnerability management, MDM, etc. About us We're a diverse group of visionary innovators who provide trading and workflow automation software, high-value analytics, and strategic consulting to corporations, central More ❯
appropriate frameworks and languages Creating and maintaining RESTful APIs for integration across platforms Following secure coding practices and supporting compliance with government security standards Conducting security reviews and supporting remediation of vulnerabilities Translating technical requirements into delivery plans and code Communicating effectively with both technical and non-technical stakeholders What we're looking for: UK Developed Vetting (DV) clearance More ❯
appropriate frameworks and languages Creating and maintaining RESTful APIs for integration across platforms Following secure coding practices and supporting compliance with government security standards Conducting security reviews and supporting remediation of vulnerabilities Translating technical requirements into delivery plans and code Communicating effectively with both technical and non-technical stakeholders What we're looking for: UK Developed Vetting (DV) clearance More ❯
to provide clear visibility of the process mapping journey. Document methodology, inputs, owners, and approvers for mapping and reporting processes. Continuously improve process mapping to identify vulnerabilities and drive remediation plans. Understand vulnerabilities and downstream impacts affecting service delivery. Experience in scenario testing to identify resilience gaps, including research, documentation, assessment, facilitation, and reporting. Required Skills: Experience in end More ❯
s IT environment and systems. Plan for and execute the Branch's local Disaster Recovery drills and/or contingency process. Monitor and manage the IT system vulnerabilities, take remediation actions to solve the relevant risks. Provide support and validation for HO's IT/system changes, Disaster Recovery drills and/or contingency process. Mandarin speaking Manager of More ❯
support secure development across our engineering teams. In this hands-on role, you'll help identify and mitigate product risks by participating in security reviews, improving tooling, and supporting vulnerability remediation. You'll work closely with senior security engineers and cross-functional teams to build security into our software development lifecycle. This is a great opportunity for a security … in integrating security practices into the software development lifecycle, including design reviews and backlog grooming. Threat Modelling : Participate in structured threat modelling exercises with guidance from senior team members. Vulnerability Triage : Work with engineering teams to review findings from SAST, SCA, DAST, and container scans and track remediation progress. Code & Config Review : Conduct basic secure code and configuration More ❯
Cyber Security Operations Manager to lead our Cyber Security Operations Centre; responsible for managing the day-to-day operations of the SOC team, overseeing incident detection and response, ensuring vulnerability scanning and remediation efforts across the organization. Role Overview: Job Title: SOC Manager/Cyber Security Operations Manager Location: Leeds/England/Remote Contract Type: Contract Duration … preferred). Minimum 5 years of experience in cybersecurity operations, with at least 2 years in a leadership or management role. Strong knowledge of SOC operations, incident response, and vulnerability management best practices. Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel), vulnerability scanners (e.g., Nessus, Qualys), and other security platforms. Relevant certifications such as CISSP, CISM More ❯
responsible for protecting enterprise systems and data. This role offers hands-on involvement with a wide range of technologies-from endpoint detection and SIEM platforms to firewalls, MFA, and vulnerability management-providing a well-rounded foundation in enterprise security operations. You'll gain exposure to advanced security practices, assist in running and responding to threat detection systems, and contribute … to projects that strengthen security across the organisation. Key Responsibilities Monitor and respond to security alerts and incidents (EDR, SIEM, Identity Protection, SOAR). Assist in vulnerability scanning and remediation activities. Help manage systems such as email and web security gateways, VPNs, MFA, SSO, and mobile device security. Support the maintenance of security certificates, PAM systems, and conditional … platforms in a corporate IT environment. Experience with some of the following: EDR platforms (e.g., CrowdStrike) Email or web security gateways (e.g., Mimecast) MFA/SSO (e.g., Duo, Okta) Vulnerability scanners (e.g., Rapid7, Tenable, Nessus) InTune and Conditional Access Exposure to: Imperva WAF KnowBe4 Certificate management tools Kali Linux toolset and penetration testing basics Qualifications: Working towards or holding More ❯
regulated environment. You'll be responsible for advancing the organisation's incident response capabilities, leading investigations, and driving threat detection maturity through development of use cases, threat intelligence, and vulnerability management. Key Responsibilities Lead the DFIR function, overseeing incident detection, investigation, and response activities. Develop and implement IR methodologies (MITRE ATT&CK, Kill Chain, Threat Modelling, Diamond Model). … . Coordinate cross-functional security incident response with SOC, Threat Intelligence, and Red/Blue teams. Engage with technical and business teams on cyber risk reduction strategies. Contribute to vulnerability management and remediation plans. Required Skills & Experience Proven experience managing DFIR or cyber incident response teams. Deep technical knowledge of IR and forensic analysis (eg Wireshark, packet capture … working in financial services or a regulated environment preferred. Hands-on experience with SIEM tools, network forensics, and endpoint detection. Knowledge of CIS benchmarks, cloud security, IAM, DLP, and vulnerability management. Familiarity with Windows, Linux/Unix, networking, and virtualisation (VMware). Certifications (preferred): GCIA, GCIH, GCFA or equivalent. What's on Offer Up to £90,000 base salary More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
eTeam Inc
These are my high-level thoughts and not limited to just these activities : • MW/DB estate is patched timely and kept current always • Plans to remediate EOL timely • Vulnerabilityremediation - Critical/Zero day included • Ensure MW and DB platforms are built as per QBE standards • Projects related to the platforms are delivered on time and within More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Marlin Selection
IT Security team. As the Senior Security Engineer, you will implement and maintain robust security systems and protocols across the our IT infrastructure. You will conduct risk assessments and vulnerability scans, mitigate vulnerabilities identified in penetration testing, and implement preventative measures to protect against cyber threats. You will monitor the security infrastructure and detect and respond to potential threats. … and DDoS systems Manage the Web Security Gateway Manage the Email Security Gateway Manage the SIEM, SOAR, Identity Protection and EDR, and respond to alerts and threats. Carry out vulnerability scans, identify risks, and remediation. Manage the perimeter and VPN firewalls. Manage MFA and SSO. Manage MDM\MAM and Conditional Access Manage security certificates and keys. Manage IDS and More ❯
drive key security initiatives, and play a pivotal role in mentoring junior team members. Key Responsibilities Monitor, manage, and respond to threats via SIEM, SOAR, and EDR platforms Conduct vulnerability scans and support remediation and risk mitigation efforts Oversee WAF, DDoS, VPN, and perimeter firewalls Manage Email and Web Security Gateways Administer MFA, SSO, PAM, MDM/MAM More ❯
drive key security initiatives, and play a pivotal role in mentoring junior team members. Key Responsibilities Monitor, manage, and respond to threats via SIEM, SOAR, and EDR platforms Conduct vulnerability scans and support remediation and risk mitigation efforts Oversee WAF, DDoS, VPN, and perimeter firewalls Manage Email and Web Security Gateways Administer MFA, SSO, PAM, MDM/MAM More ❯
based on potential threats and exposure. Plan and schedule testing engagements based on threat assessments and client needs. Produce clear, detailed reports with technical findings, business impact, and strategic remediation recommendations for diverse audiences. Communicate complex security concepts and threat insights effectively to technical and non-technical stakeholders. Collaborate with client IT and cybersecurity teams to improve security protocols … and address vulnerabilities. Monitor remediation efforts and provide updates highlighting threat reduction. Conduct proactive security research and contribute to technical content on emerging threats and attack techniques. Enhance security monitoring by sharing offensive insights to improve detection and response. Drive patching efforts for vulnerabilities based on threat intelligence and exploitation potential. What experience you'll bring: Skills and Qualifications … manage multiple engagements effectively. Current CREST CRT certification or higher is required. Eligibility for SC Clearance is required. Desirable Skills: Experience with Breach Attack Simulation tools and threat-informed vulnerability management. Knowledge of Risk Management frameworks and their integration with threat intelligence. Hands-on experience with cloud security reviews (AWS, Azure, GCP) considering cloud-specific threats. Familiarity with ISO More ❯
Security Engineer Level: Mid-Level Location: One of our London, Basingstoke or Bristol offices, minimum of 2 days per week Team: Security/Engineering Salary: £48,120 - £64,150 About the Role: Welcome to Hawk-Eye Innovations; I'm Jon More ❯
man IT Security team. As the Senior Security Engineer, you will implement and maintain robust security systems and protocols across the IT infrastructure. You will conduct risk assessments and vulnerability scans, mitigate vulnerabilities identified in penetration testing, and implement preventative measures to protect against cyber threats. You will monitor the security infrastructure, detect and respond to potential threats, and … WAF and DDoS systems Manage the Web Security Gateway Manage the Email Security Gateway Manage the SIEM, SOAR, Identity Protection, EDR, and respond to alerts and threats Carry out vulnerability scans, identify risks, and perform remediation Manage perimeter and VPN firewalls Manage MFA and SSO Manage MDM/MAM and Conditional Access Manage security certificates and keys Manage More ❯
and static/dynamic security testing (SAST/DAST). Security Tooling and Automation : Implement and maintain security tools used in the development and deployment processes (e.g., scanning tools, vulnerability management systems, SAST, DAST, ASPM). Automate security processes to streamline secure development and operational workflows. Incident Detection and Response : Work with engineering and platform teams to detect, analyse … Expertise: Deep understanding of identifying, assessing, and mitigating security risks in application designs, code, and deployed products. Experience managing and using security testing tools such as SAST, DAST, and vulnerability scanning solutions. Strong grasp of secure coding practices and proficiency in integrating security into the Software Development Lifecycle (SDLC). Technical Knowledge and Implementation experience: Direct experience with threat More ❯
IT Security Engineering Manager is a global role within ION's central services division and will support the Group Security strategy and operational excellence through the identification, mitigation and remediation of information security risks to the business. This role reports to the Global Head of IT Security, who reports to the Group Chief Information Security Officer (CISO). As … to determine exposure. Assist and/or lead efforts to isolate, contain, respond to, and recover from security incidents Identify, review, prioritize, plan, coordinate, and follow-up on the remediation of vulnerabilities Configure, customize, tune, manage, troubleshoot, and maintain effective and efficient operation of security technologies, such as SIEM, endpoint security, secure web gateway, CASB, DLP, email security, intrusion More ❯
and secure data storage Security Tooling & Automation Build and maintain security testing pipelines Integrate security tools with GitHub Actions Develop custom security linters and pre-commit hooks Create automated vulnerability tracking and remediation workflows Implement secret scanning and dependency checking Build security dashboards and metrics reporting Create secure coding guidelines for different technology stacks Develop a security champions … Strong Customer Authentication requirements Understanding of cloud-native security patterns Ability to identify security vulnerabilities through manual code review Experience with static and dynamic analysis tools Understanding of common vulnerability patterns across languages Knowledge of secure architecture patterns and anti-patterns Ability to provide actionable remediation guidance Professional Requirements Experience in financial services or high-security environments Strong More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
prior to commencement. General responsibilities: - Manage backlog of items and prioritizing agile sprints Prioritizing and allocating tasks and owning BAU work items Managing risks and working towards resolution and remediation of risk Work on strategic roadmap deliverables including requests arriving from the business via small change enhancements e.g. M365 add-ons, device rollouts, email enhancements Maintaining stability of AV … email services, and email routing technologies (eg M365 Exchange Online/Hybrid Exchange) Mail protection e.g. Mimecast Security and Threat management in an enterprise environment (eg Defender for Endpoint, Vulnerability reporting and remediation) Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome More ❯
JS11154CF £450 - 500 per day Infrastructure Engineer Location: London (4 days a week onsite) Type: Contract Our client is seeking an experienced Infrastructure Engineer with strong vulnerability management experience to join their dynamic IT team. This is a fantastic opportunity to play a key role in strengthening the organisation's cyber resilience and ensuring a secure, compliant IT environment. … Key Responsibilities: Automate patch management across servers, endpoints, appliances, and network equipment using tools like SCCM, Intune, and ManageEngine. Analyse vulnerabilities from Tenable scans, determine effective remediation strategies, and implement solutions. Lead the technical implementation of a new patch management platform and drive resolution of vulnerabilities outside SLA. Prepare risk acceptance submissions when direct fixes are not feasible. Skills … Experience Required: Hands-on experience patching and hardening IT systems, including configuration-level vulnerability remediation. Strong knowledge of Microsoft technologies including Windows Server, SQL Server, Windows 10, Microsoft 365, and Azure. Experience managing GPOs, Azure Policies, and various patch management tools (e.g., SCCM, Intune, Ivanti). Familiarity with scripting, vulnerability management, and security tooling. ITIL Foundation certification, degree More ❯