control traffic flow. - Collaborate with other teams to define and enforce network access policies, ensuring that only authorized personnel and devices have appropriate access rights. Proactive Security Testing and Vulnerability Management: - Conduct and organise regular security assessments, including vulnerabilityscanning and testing, to identify weaknesses in the network infrastructure. - Collaborate with system administrators and application owners to … address identified vulnerabilities and implement necessary patches or configuration changes. - Develop and maintain a comprehensive vulnerability management program, including vulnerability tracking, risk assessment, and remediation planning. Stakeholder Collaboration: - Act as a stakeholder for the response team, providing expert guidance on security-related alerts, incidents, and potential improvements. - Collaborate with cross-functional teams, including network engineers, system administrators, and More ❯
cause harm. This involves continuous monitoring and analysis of network traffic, system logs, and other data sources to identify unusual patterns or behaviours that may indicate a security threat. Vulnerability Management: Identify and address security weaknesses in our systems. Conduct regular vulnerability assessments, apply patches and updates, and implement security controls to mitigate risks. Defence Management: Oversee and … experience and skills that include: IT Security Operations Experience: Recent experience as a senior member of a multi-disciplinary team managing operational security (firewall, content filtering, DMZ, Pen Testing, Vulnerability Management) and external managed service partners. Security Qualifications: Accredited to a recognised Security qualification (e.g., CISSP, CCP, CCSP). The successful candidate must be willing to work towards obtaining … Demonstrated ability to actively seek out and neutralise potential threats. Experience with threat intelligence tools and techniques, and a deep understanding of the latest cyber threats and attack vectors. Vulnerability Identification: Expertise in identifying and mitigating security vulnerabilities. Experience with vulnerabilityscanning tools, penetration testing, and risk assessment methodologies. Defence and Firewall Management: Experience in managing defences More ❯
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding … a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerability management programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national security … standards Experience required Extensive hands-on CTI and vulnerability management experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerabilityscanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry-leading More ❯
Newcastle upon Tyne, Tyne and Wear, Tyne & Wear, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
scripts. Experience migrating applications and operators between OpenShift clusters. Hands-on familiarity with the following operators: HashiCorp Vault - secrets management Red Hat Quay - internal container registry Clair - container image vulnerabilityscanning Keycloak - identity and access management OpenShift Service Mesh (Istio) - microservices communications Additional Skills: Infrastructure as Code (Ansible/Terraform) CI/CD and GitOps (e.g. Jenkins, ArgoCD More ❯
Stockport, Lancashire, United Kingdom Hybrid / WFH Options
zyncgroup.io
responsible for: Contributing to the setup and ongoing enhancement of the Security Operations Center (SOC). Investigating security incidents and implementing effective countermeasures. Utilizing SOC tools such as SIEM, vulnerability scanners, and incident response solutions. Performing threat hunting by analyzing and assessing security events on central platforms. Documenting incidents thoroughly in ticketing and SIEM systems, and generating detailed reports. … Monitoring systems for attacks or unusual behavior and taking appropriate action. Running automated vulnerability scans, interpreting results, and reporting findings to clients. This role is hybrid in Schleswig-Holstein. Essential qualifications: At least one year of professional experience working in a SOC or similar role (working student experience is acceptable). Experience working with EDR/XDR. Strong knowledge More ❯