and manage risks within our OT environments. We are seeking an experienced and dynamic OT Cyber Security Senior Manager to lead our risk and vulnerability management processes. In this role, you will be responsible for designing and implementing robust risk and vulnerability management processes, ensuring alignment with key … Cyber Hub and business units when vulnerabilities and policy compliance violations are identified. Establish plans to identify OT vulnerabilities and policy compliance violations through vulnerabilityscanning, patch reporting, management, and penetration testing. Categorize and prioritize OT vulnerabilities. Assess the effectiveness of vulnerability dispositions. Maintain relationships with business … unit stakeholders to assist with the remediation of critical-level alerts. Communicate vulnerability data to system and business owners. Establish and implement an OT vulnerability management communication and training plan. Determine necessary protective measures to address vulnerabilities on OT assets. Support patch management and vulnerability management product More ❯
InTune Knowledge of administering and supporting Entra (Azure AD), Azure IaaS/PaaS Management of backup/recovery solutions Experience with operating system hardening, vulnerability assessments, security audits, penetration testing, intrusion prevention systems and other security control systems for example PAM, SIEM etc. Experience with endpoint security, content filtering … vulnerabilityscanning and anti-malware Knowledge of at least one scripting language (e.g. PowerShell) MS InTune device management (mobile and Windows 10/11 OS) Demonstrable knowledge of common vulnerabilities and exploitation techniques would be beneficial Familiarity with Cyber Essentials/Plus or ISO 27001 and ITIL best More ❯
InTune Knowledge of administering and supporting Entra (Azure AD), Azure IaaS/PaaS Management of backup/recovery solutions Experience with operating system hardening, vulnerability assessments, security audits, penetration testing, intrusion prevention systems and other security control systems for example PAM, SIEM etc. Experience with endpoint security, content filtering … vulnerabilityscanning and anti-malware Knowledge of at least one scripting language (e.g. PowerShell) MS InTune device management (mobile and Windows 10/11 OS) Demonstrable knowledge of common vulnerabilities and exploitation techniques would be beneficial Familiarity with Cyber Essentials/Plus or ISO 27001 and ITIL best More ❯
InTune Knowledge of administering and supporting Entra (Azure AD), Azure IaaS/PaaS Management of backup/recovery solutions Experience with operating system hardening, vulnerability assessments, security audits, penetration testing, intrusion prevention systems and other security control systems for example PAM, SIEM etc. Experience with endpoint security, content filtering … vulnerabilityscanning and anti-malware Knowledge of at least one scripting language (e.g. PowerShell) MS InTune device management (mobile and Windows 10/11 OS) Demonstrable knowledge of common vulnerabilities and exploitation techniques would be beneficial Familiarity with Cyber Essentials/Plus or ISO 27001 and ITIL best More ❯
incident reports. Project Delivery Take part in the team's project delivery initiative, rotating between the following roles on a 1-3 monthly schedule: Vulnerability Management - maintain regular scans, interpret results, identify asset owners, track remediation activities and report on the agreed SLAs. Security Controls Administration - maintain availability and … and standard use cases of technical security products, such as firewalls, anti-virus, web proxies, SIEM, IDS/IPS, DLP, and EDR. Familiarity with vulnerabilityscanning and penetration testing tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but not required): Cyber More ❯
least 2 years in a managerial capacity. Strong knowledge of cybersecurity frameworks, standards, and best practices. Proficiency with security technologies and tools (e.g., SIEM, vulnerability scanners, encryption tools). Hands-on experience with incident response, penetration testing, and threat analysis. Familiarity with secure software development practices and DevSecOps principles. More ❯
least 2 years in a managerial capacity. Strong knowledge of cybersecurity frameworks, standards, and best practices. Proficiency with security technologies and tools (e.g., SIEM, vulnerability scanners, encryption tools). Hands-on experience with incident response, penetration testing, and threat analysis. Familiarity with secure software development practices and DevSecOps principles. More ❯
least 2 years in a managerial capacity. Strong knowledge of cybersecurity frameworks, standards, and best practices. Proficiency with security technologies and tools (e.g., SIEM, vulnerability scanners, encryption tools). Hands-on experience with incident response, penetration testing, and threat analysis. Familiarity with secure software development practices and DevSecOps principles. More ❯
reviews, threat modeling, and risk assessments; strong understanding of information security principles, including confidentiality, integrity, and availability. Experience with security tools and technologies, including vulnerability scanners, intrusion detection systems, and security information and event management (SIEM) systems. Excellent communication and interpersonal skills, with the ability to collaborate effectively with More ❯
documentation and root cause analysis/Assist in managing identity and access controls, including reviews of user entitlements and privileged accounts/Participate in vulnerabilityscanning, patch management and configuration reviews/Maintain and enforce security policies, standards and procedures/Conduct periodic risk assessments and contribute to … organizations that provide 24x7x365 operations/Familiar with networking fundamentals, protocols and network components/Experience with cloud security/Understanding of security tools, vulnerability management, penetration testing and remediation/Working knowledge of Qualys, Defender, Knowbe4 are essential./Exposure to MS Sentinel and Expel MDR are desirable More ❯
to implement security controls across infrastructure (e.g., access control, encryption, logging). Lead the incident response process and manage third-party pen testing and vulnerability management. Customer & Vendor Security: Support security questionnaires, RFPs, and due diligence for customer deals. Review third-party vendors and tools for security posture and … and SSO. Clear understanding of data privacy laws (especially GDPR). Familiarity with security tools (e.g., endpoint protection, SSO/IAM, monitoring/logging, vulnerabilityscanning). Experience with risk assessments, incident response planning, and writing security policies. Strong communication skills, with the ability to explain security concepts More ❯
Self-motivated, very detail-oriented and organized. Comprehensive understanding of customer/server technologies. Understanding of cyber security concepts (e.g. phishing tests, penetration testing, vulnerabilityscanning, SIEM, email security, endpoint Protection, MDM, etc.). Some technical proficiency in the following areas are required: Understanding public vs hybrid infrastructure More ❯
security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusion detection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform More ❯
methodology and/or industry certifications. Experience in working in a regulated environment. Experience of; configuration management tools, Jenkins, host virtualisation, containerisation, ELK, Splunk, vulnerability scanners, proxies, WAFs, artefact management, serverless deployments, data streaming and transformation. Experience in secured AWS, or other, Cloud architectures and engineering solutions. What You More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
SOC team to enhance Sentinel SIEM, runbooks, and threat detection. Lead investigations into security incidents and conduct proactive threat hunting. Manage endpoint security, patching, vulnerabilityscanning, and system hardening. Support audits and compliance with Cyber Essentials Plus , ISO 27001 , and other frameworks. Partner with DevOps, InfoSec, and platform … Participate in a 1-in-6 on-call rota after completing probation. Key Requirements: Hands-on knowledge of SIEM platforms (preferably Sentinel), EDR, and vulnerability management. Familiarity with frameworks like Cyber Essentials Plus and ISO 27001. Experience in securing hybrid cloud environments (Microsoft Azure desirable). Experience in DevOps More ❯
cloud providers (AWS, Microsoft, Google, IBM) The most loved cloud native open-source tools with the world's largest open-source community tool for vulnerabilityscanning, Trivy The world's leading dedicated cloud native threat research team, Aqua Nautilus If you're ready for an exciting opportunity to More ❯
Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR, DLP, vulnerability scanners, firewalls, email gateways. Degree in Computer Science, Engineering, or a related STEM field. If you think that this could be a good fit More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR, DLP, vulnerability scanners, firewalls, email gateways. Degree in Computer Science, Engineering, or a related STEM field. If you think that this could be a good fit More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Hunter Bond
Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR, DLP, vulnerability scanners, firewalls, email gateways. Degree in Computer Science, Engineering, or a related STEM field. If you think that this could be a good fit More ❯
range of security technologies, including SIEM solutions, DLP solutions, firewall solutions, cloud security centers, IPS (Intrusion Prevention Systems), CTI (Cyber Threat Intelligence) solutions, and vulnerability scanners. Proxy solutions like Zscaler are essential. At least one professional certification; CISSP, CISM, CCSP. What we offer you 18% Bonus Car allowance (or More ❯
for identifying vulnerabilities, conducting security assessments, and implementing robust security measures to protect our systems and client data. Key Responsibilities: Perform security assessments and vulnerabilityscanning for web applications, APIs, and infrastructure. Collaborate with development teams to implement secure coding practices and address vulnerabilities. Review and advise on … practices. Strong understanding of security vulnerabilities (OWASP Top 10, etc.) and secure coding techniques. Experience with security tools (e.g., static/dynamic analysis tools, vulnerability scanners). Familiarity with common web technologies (e.g., Java, Python, JavaScript, SQL). Knowledge of security frameworks and standards (e.g., NIST, ISO 27001). More ❯
sector exposure What you’ll be doing: Managing incidents, change requests, and service delivery Working closely with executives, offering 2nd/3rd line support Vulnerabilityscanning, remediation (Nessus, Defender 365), and patch management Project support and client site technical improvements Key Technologies you'll work with: Office More ❯
sector exposure What you’ll be doing: Managing incidents, change requests, and service delivery Working closely with executives, offering 2nd/3rd line support Vulnerabilityscanning, remediation (Nessus, Defender 365), and patch management Project support and client site technical improvements Key Technologies you'll work with: Office More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Digital Republic Talent
sector exposure What you’ll be doing: Managing incidents, change requests, and service delivery Working closely with executives, offering 2nd/3rd line support Vulnerabilityscanning, remediation (Nessus, Defender 365), and patch management Project support and client site technical improvements Key Technologies you'll work with: Office More ❯