an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient … Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerability scanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers, DevOps More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and … clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits … regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages (e.g. More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
to security events across a complex, multi-departmental IT environment. You'll maintain and use key security tools such as SIEM, IDS, EDR, and vulnerability management platforms. You will work closely with system owners and users to assess configurations, analyse logs, and improve security controls and procedures. In addition … career experience in a relative field Hands-on experience with security monitoring and incident response technologies such as SIEM, IDS and EDR. Experience with vulnerabilityassessment including practical assessments for risk analysis. A strong working knowledge of at least one major operating system (Windows, Linux, or MacOS). More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Broadstone
external vendors to maintain robust cybersecurity measures. This is a hands-on, fast-paced role where you'll be involved in monitoring security, conducting vulnerability assessments, responding to incidents, and performing security audits. Plus, you'll have the opportunity to shape and improve our cybersecurity strategy, tools, and practices More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Michael Page (UK)
IT infrastructure, including networks, servers, and cloud environments. Implement, monitor, and manage security solutions such as firewalls, IDS/IPS, and endpoint protection. Conduct vulnerability assessments on the infrastructure. Ensure compliance with regulatory requirements (e.g., GDPR, ISO 27001) and industry best practices. Investigate security incidents, perform root cause analysis More ❯
Newcastle upon Tyne, Tyne and Wear, Tyne & Wear, United Kingdom
Michael Page
IT infrastructure, including networks, servers, and cloud environments. Implement, monitor, and manage security solutions such as firewalls, IDS/IPS, and endpoint protection. Conduct vulnerability assessments on the infrastructure Ensure compliance with regulatory requirements (e.g., GDPR, ISO 27001) and industry best practices. Investigate security incidents, perform root cause analysis More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. … problem-solving abilities to translate business requirements into technical solutions. Collaboration and Influence: Effective communicator capable of navigating organizational complexities and influencing without authority. Vulnerability Management: Expertise in managing vulnerabilities across diverse assets and implementing application security in cloud environments. Security tooling: experience in any of the following; (Wiz More ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
security measures throughout the life cycle, from data ingestion to model deployment. Skills and Qualifications: Security Expertise: Strong understanding of cybersecurity principles, threat modelling, vulnerabilityassessment, and penetration testing. Cloud Computing: Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Data Privacy and Compliance: Knowledge of More ❯
Governance, Risk, and Compliance) SECOPS (Security Operations) Digital Identity You'll gain experience with industry-leading security technologies and practices, including firewalls, SIEM tools, vulnerabilityassessment, and more. As you apply your skills, you'll be mentored by industry experts and work in a high-performing team. Why More ❯
Experience securing cloud environments (AWS preferred). A background as a Cyber Security Officer or similar role within a large organisation. Strong knowledge of vulnerabilityassessment tools & techniques. A solid understanding of networking technologies, security best practices, and OS hardening. Awareness of cyber threats and adversarial techniques used More ❯
making processes. Hands-On Security Experience: Take an active role in the day-to-day management of security operations, including incident response, threat hunting, vulnerability management, and other proactive measures. Provide expertise in implementing technical security solutions and ensuring they align with organisational goals. Assist with the management of … operational goals and Legal/regulatory requirements. Contribute to the development of training programs to raise awareness about information security within the organisation. Risk Assessment & Mitigation: Conduct risk assessments of business processes and applications to identify security gaps and recommend solutions. Track, manage, and mitigate risks identified through internal … and external audits, vulnerability assessments, and other review processes. Reporting & Documentation: Prepare regular reports for the CISO and senior management, summarising security incidents, trends, and the effectiveness of security policies and controls. Document all security policies, procedures, and standards, ensuring they are updated regularly to reflect evolving threats and More ❯
crewe, north west england, United Kingdom Hybrid / WFH Options
Customer Talent Search
incident and problem management, and service level compliance. They will also be responsible for defining and managing secure configurations, monitoring systems for threats, conducting vulnerability assessments, and managing penetration testing activities. Additionally, the role involves responding to third-party security inquiries (Infosec queries), assisting with audit activities, and ensuring More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
Collaborate with security teams to implement and maintain robust protections, including firewalls, VPNs, intrusion detection/prevention systems, and access control protocols. Conduct periodic vulnerability assessments, applying patches and updates to mitigate risks while maintaining compliance with regulatory standards. Proactively identify potential threats and design strategies to minimize security More ❯
Bradford, Yorkshire, United Kingdom Hybrid / WFH Options
Freemans Grattan Holdings (fgh)
engineers QA teams and digital experience owners to improve DevOps best practices and workflows within an Agile framework. Implementing security measures, compliance policies, and vulnerability assessments following OWASP guidelines and applicable UK regulations such as UK-GDPR, UK Payment Services Regulations and PCI-DSS. Supporting disaster recovery planning and More ❯
lead liaison to communicate and investigate non-conformities related to raw materials. Maintain seasonality calendars to identify challenging periods and mitigate potential shortfalls. Conduct vulnerability assessments and communicate/mitigate risks to the business. Assist the customer support team in building specifications and answering queries related to raw materials. More ❯
bradford, yorkshire and the humber, united kingdom Hybrid / WFH Options
Attenti
AppSec team focused on building security automation into delivery pipelines and conducting security focused tests against digital services. Key Responsibilities Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc … GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with NCSC guidelines. Essential Criteria Penetration testing, ethical hacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security More ❯
york, yorkshire and the humber, united kingdom Hybrid / WFH Options
Attenti
AppSec team focused on building security automation into delivery pipelines and conducting security focused tests against digital services. Key Responsibilities Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc … GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with NCSC guidelines. Essential Criteria Penetration testing, ethical hacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security More ❯
doncaster, yorkshire and the humber, united kingdom Hybrid / WFH Options
Attenti
AppSec team focused on building security automation into delivery pipelines and conducting security focused tests against digital services. Key Responsibilities Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc … GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with NCSC guidelines. Essential Criteria Penetration testing, ethical hacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security More ❯
wakefield, yorkshire and the humber, united kingdom Hybrid / WFH Options
Attenti
AppSec team focused on building security automation into delivery pipelines and conducting security focused tests against digital services. Key Responsibilities Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc … GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with NCSC guidelines. Essential Criteria Penetration testing, ethical hacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security More ❯
manchester, north west england, united kingdom Hybrid / WFH Options
Attenti
AppSec team focused on building security automation into delivery pipelines and conducting security focused tests against digital services. Key Responsibilities Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc … GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with NCSC guidelines. Essential Criteria Penetration testing, ethical hacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security More ❯
aberdeen, north east scotland, united kingdom Hybrid / WFH Options
Attenti
AppSec team focused on building security automation into delivery pipelines and conducting security focused tests against digital services. Key Responsibilities Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc … GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with NCSC guidelines. Essential Criteria Penetration testing, ethical hacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom Hybrid / WFH Options
Attenti
AppSec team focused on building security automation into delivery pipelines and conducting security focused tests against digital services. Key Responsibilities Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc … GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with NCSC guidelines. Essential Criteria Penetration testing, ethical hacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security More ❯
leeds, west yorkshire, yorkshire and the humber, united kingdom Hybrid / WFH Options
Attenti
AppSec team focused on building security automation into delivery pipelines and conducting security focused tests against digital services. Key Responsibilities Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc … GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with NCSC guidelines. Essential Criteria Penetration testing, ethical hacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security More ❯