techniques. Experience with Azure Log Analytics, KQL, and Azure Alerts. Python, Shell, and PowerShell scripting. Experience with security tools and technologies (e.g., SIEM, IDS/IPS, NG Firewall capabilities, vulnerability scanners). Knowledge of Active Directory and Azure AD. Knowledge of application delivery and the infrastructures that enable it. Familiarity with SQL Server, Oracle, clustering/High Availability technologies More ❯
Expertise: Strong knowledge of cloud (Azure, O365, Amazon) and server infrastructure, networks, firewalls, and endpoint systems. Security Tools & Technologies: Proficiency with security tools such as SIEM, IDS/IPS, vulnerability scanners, firewalls, endpoint protection, alert and remediation, and encryption technologies. Certifications: Relevant certifications such as CISSP, CISM, CCSP, CEH, or AWS/Azure security certifications are highly desirable. Scripting More ❯
years of experience in the information security field. Hands-on experience with AWS (or similar cloud platforms) and Cloudflare. Infrastructure as Code: Proficiency with Terraform or similar IaC tools. Vulnerability Knowledge: Solid understanding of common vulnerability classes and the OWASP Top 10. Coding & Scripting: Proficient in reading code (e.g., Python, Scala) and using Git for version control of … code and configuration changes. Familiarity with iOS or Android security. Experience of industry-standard SIEM and vulnerabilityscanning tools. Nice to have: Relevant industry certifications (CISSP, OSCP, etc.). Experience of supporting audits such as ISO27001. Experience of working with security risk management frameworks such as ISO31000. Knowledge of security control frameworks such as CIS, NIST800-53 and More ❯
with a focus on enterprise-level environments. Solid understanding of Cyber Security Best Practices, risk management, and network hardening techniques. Hands-on experience in CVE detection and remediation (including vulnerabilityscanning tools like Nessus, Qualys, etc.). Cisco Certifications (CCIE, CCNA, etc.) with recent experience working on Cisco switches, routers, and other networking devices. Preferred: Certifications such as More ❯
including preparing for and undergoing assessments. Familiarity with information security frameworks (e.g., NIST, CIS). Proficiency in risk management methodologies. Knowledge of common security technologies (e.g., firewalls, EDR, SIEM, vulnerability scanners). Exceptional analytical, problem-solving, and decision-making abilities. Excellent communication (written and verbal), interpersonal, and presentation skills. Ability to operate autonomously and manage multiple priorities in a More ❯
responsible for protecting enterprise systems and data. This role offers hands-on involvement with a wide range of technologies-from endpoint detection and SIEM platforms to firewalls, MFA, and vulnerability management-providing a well-rounded foundation in enterprise security operations. You'll gain exposure to advanced security practices, assist in running and responding to threat detection systems, and contribute … to projects that strengthen security across the organisation. Key Responsibilities Monitor and respond to security alerts and incidents (EDR, SIEM, Identity Protection, SOAR). Assist in vulnerabilityscanning and remediation activities. Help manage systems such as email and web security gateways, VPNs, MFA, SSO, and mobile device security. Support the maintenance of security certificates, PAM systems, and conditional … platforms in a corporate IT environment. Experience with some of the following: EDR platforms (e.g., CrowdStrike) Email or web security gateways (e.g., Mimecast) MFA/SSO (e.g., Duo, Okta) Vulnerability scanners (e.g., Rapid7, Tenable, Nessus) InTune and Conditional Access Exposure to: Imperva WAF KnowBe4 Certificate management tools Kali Linux toolset and penetration testing basics Qualifications: Working towards or holding More ❯
experience: Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in SOC operations, incident response, and forensic analysis. Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient More ❯
security best practices across the board, playing a critical role in our journey towards SOC2 compliance. Implement and manage security controls related to IAM, network security (VPCs, security groups), vulnerabilityscanning, and secrets management. Skills, Knowledge and Expertise Experience: Extensive hands-on experience in a DevOps, SRE, or Platform Engineering role, managing production systems in a cloud environment. More ❯
and policy design. •Practical knowledge of HAProxy or equivalent reverse proxies/load balancers, with experience configuring L4/L7 security protections. •Familiarity with CVE triage workflows and integrating vulnerability scanners into CI/CD and registry workflows. •Exposure to runtime security tooling (e.g. Falco, eBPF-based monitoring) and familiarity with basic incident response workflows. •Comfort representing engineering in More ❯
at all levels Security Posture Management: Develop and maintain a comprehensive security posture management program to proactively identify and address vulnerabilities. Continuously assess the organization's security posture through vulnerability assessments, penetration testing, and threat modelling. Collaborate with cross-functional teams to implement security best practices and ensure compliance with industry standards and regulations. Cyber Exposure Risk Management: Identify … identify areas for improvement. What You'll Bring: Experience: A depth of experience in cybersecurity, with at least 3 years in a leadership or management role. Proven experience in vulnerability management, threat modelling, and incident response. Strong understanding of security frameworks, compliance standards, and best practices. Education:Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related … field. Advanced degrees or certifications (e.g., CISSP, CISM, CEH) are highly desirable. Technical Skills: Proficiency in security tools and technologies, such as SIEM, vulnerability scanners, and endpoint protection platforms. Knowledge of cloud security, network security, and secure software development practices. Familiarity with scripting and automation tools to streamline security processes. Working with data centres and native cloud environments AWS More ❯
decisions around authentication, cryptography, and logging. You'll also ensure that tools such as SAST, DAST, and SCA are effective and efficient, and that testing programmes - including pen testing, vulnerabilityscanning, and bug bounty - are delivering value. You'll triage vulnerabilities, support engineering teams with practical mitigations, and contribute to documentation that strengthens our internal standards and processes. More ❯
skills, clean coding habits, git workflows, and excellent communication skills. Nice to Have Experience with auto-update flows, code-signed installers, and desktop-browser interoperability. Knowledge of security/vulnerabilityscanning pipelines for desktop agents. Exposure to BDD tooling (Cucumber, SpecFlow). Benefits Competitive salary Flexible, remote-first environment (occasional in-person sessions fully expensed) 25 days annual More ❯
on in architecture, engineering, and compliance, while leading the charge on modern, cloud-first security strategy. Responsibilties: Designing and implementing robust security policies, controls, and infrastructure protection strategies. Leading vulnerability management efforts, penetration testing, and remediation plans. Monitoring and investigating security events, managing incident response processes end-to-end. Ensuring compliance with security standards such as ISO 27001 and … or high-trust industries). Hands-on expertise in cloud security (preferably AWS), including securing hybrid and multi-region architectures. Practical knowledge of security tooling: IDS/IPS, SIEM, vulnerability scanners, encryption, SAST/DAST tools, OWASP ZAP, etc. Strong understanding of network security protocols and best practices. Scripting and automation experience (e.g. Python). Proven experience with incident More ❯
policies and standards are applied through a hands-on, consultative approach Translate technical risk into business-friendly language for a range of audiences Scope and support penetration testing and vulnerability assessments, ensuring timely remediation Conduct impact assessments in line with Smart Energy Code, GDPR, and internal policy Deliver artefacts such as Supplier Security Assessments, Software Security Reviews, and Business … security assurance in complex, fast-paced environments Broad knowledge of IT and security frameworks, regulations, and best practices (e.g., ISO 27001, DPA, GDPR) Familiarity with security tools such as vulnerability scanners, SIEM, DDoS protection, remote access, authentication/authorisation technologies, and data loss prevention Understanding of OWASP top vulnerabilities and methodologies Technical knowledge of cloud, networking, virtualisation, mobile technologies More ❯