Edinburgh, City of Edinburgh, United Kingdom Hybrid / WFH Options
Red Snapper Recruitment Limited
and enrich data to produce governance scorecards and reports spanning key cybersecurity areas such as Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM), and Threat and VulnerabilityManagement (TVM). Your insights More ❯
At Proact, we’re a pan European data management specialist with a focus on unlocking the power of data through strategy, storage, connectivity, and security. But that’s only part of our story.... We’re also here to break the mould. To stake new ground. To do things differently. … Windows and Linux) Hosting platforms, enterprise systems and infrastructure Virtual environments Security products such as anti-virus, IDS, IPS, SIEM, APT detection, VA systems Vulnerabilitymanagement (network scanning, ethical hacking, penetration testing) Malware, virus, botnet, MITRE ATT&CK framework techniques, etc. Security standards, including ISO-27001, PCI/… required Excellent communication skills The ability to document and explain technical details clearly and concisely to both technical peers and senior (non-technical) business management Solid attention to detail The ability to think “outside the box” and identify opportunities to improve current processes To be flexible - shift patterns may More ❯
Social network you want to login/join with: Operational Technology Vulnerability Analyst - Hyrbid - Permanent We're working with a market leader in the UK's energy transition who is on a mission to deliver a zero-emission future—and they need a Vulnerability Analyst like you to … help protect it. As a Vulnerability Analyst, you’ll join a team responsible for identifying and managing security weaknesses across IT and OT environments, ensuring the resilience of systems. This is your chance to work in a regulated critical infrastructure environment where your insights will directly impact the company … from cloud infrastructure to industrial control systems. Key Responsibilities: Conduct vulnerability assessments across OT systems, networks, and assets. Evaluate and prioritise risks specific to industrial control systems (ICS), SCADA, and other OT environments. Collaborate with engineering, operations, and cybersecurity teams to mitigate vulnerabilities and drive remediation. Maintain awareness of More ❯
Social network you want to login/join with: Operational Technology Vulnerability Analyst - Hyrbid - Permanent We're working with a market leader in the UK's energy transition who is on a mission to deliver a zero-emission future—and they need a Vulnerability Analyst like you to … help protect it. As a Vulnerability Analyst, you’ll join a team responsible for identifying and managing security weaknesses across IT and OT environments, ensuring the resilience of systems. This is your chance to work in a regulated critical infrastructure environment where your insights will directly impact the company … from cloud infrastructure to industrial control systems. Key Responsibilities: Conduct vulnerability assessments across OT systems, networks, and assets. Evaluate and prioritise risks specific to industrial control systems (ICS), SCADA, and other OT environments. Collaborate with engineering, operations, and cybersecurity teams to mitigate vulnerabilities and drive remediation. Maintain awareness of More ❯
Social network you want to login/join with: Operational Technology Vulnerability Analyst - Hyrbid - Permanent We're working with a market leader in the UK's energy transition who is on a mission to deliver a zero-emission future—and they need a Vulnerability Analyst like you to … help protect it. As a Vulnerability Analyst, you’ll join a team responsible for identifying and managing security weaknesses across IT and OT environments, ensuring the resilience of systems. This is your chance to work in a regulated critical infrastructure environment where your insights will directly impact the company … from cloud infrastructure to industrial control systems. Key Responsibilities: Conduct vulnerability assessments across OT systems, networks, and assets. Evaluate and prioritise risks specific to industrial control systems (ICS), SCADA, and other OT environments. Collaborate with engineering, operations, and cybersecurity teams to mitigate vulnerabilities and drive remediation. Maintain awareness of More ❯
in advisory capacity, to external audits and due diligence questionnaires. Key Technologies: Strong practical knowledge of M365 stack from a security perspective (Defender, Azure) VulnerabilityManagement Web Application Filtering DLP Cloudflare Secure File Transfer Firewalls Remote Access/VPN PKI Infrastructure DNS Email Gateways Security Audits ISO27001 Azure More ❯
Aberdeen, Scotland, United Kingdom Hybrid / WFH Options
JR United Kingdom
will be expected to cover the initiation through to the design and implementation, across several of the skills and technologies below: Microsoft Sentinel Tenable VulnerabilityManagement (Or similar technology) Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/Related Certifications DESIRED … Training and development in these technologies/solutions may be provided if required. Microsoft Intune (Focused on Security, not the full suite) Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee must be able to … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
software deployments. Cyber Security Act as a first responder to security incidents-triaging alerts, containing threats, and escalating to our SOC where appropriate. Support vulnerabilitymanagement through patching, configuration management, and reporting. Assist with endpoint detection and response (EDR) tools and threat monitoring platforms (e.g., Microsoft Defender More ❯
Analyst role is positioned with the M&G Security Operations team that consists of the following functions: Security Operations Centre (Monitoring) Threat Intelligence and VulnerabilityManagement Security Operations Engineering (Tooling Support) Cyber Response (Security Incident Manage and Cyber Resilience) The role reports in directly to the SOC Manager … Sourcefire etc) Experience in other Microsoft Azure environment – including use of Azure Activity Directory, Identity Protection, Defender for Cloud etc. Exposure to use-case management (fine tuning of false positives etc) Ideally having worked in the financial services sector (or another highly regulated area) Desirable Certifications Desirable certifications for More ❯
affected/vulnerable systems, affected/vulnerable users Identify any business areas impacted and coordinate communications with all relevant stakeholders as per Major Incident Management process. Coordinate the remediation and containment activities as advised by either the NTT DATA SOC or Incident Response Team. Oversee, support, and manage through … service delivery processes and workflows, identifying areas for optimization and implementing best practices. Co-ordinate the running and reporting of a risk-based vulnerabilities management including: Scanning systems, networks, and applications to detect potential security weaknesses. Prioritize vulnerabilities based on their risk level, potential impact, and the criticality of … environment that supports the creation of tangible solutions that make an impact. You will need to have a broad experience of security service delivery management and have evidence of experience in a number of the following fields of expertise: At least 10 years of experience in providing technical support More ❯
delivering cyber resilient OT and IT, to enable a safe and reliable electricity supply to customers. You’ll own the cyber supply chain risk management for onshore and offshore, ensuring industry best practices is followed, and you’ll work to transparently reduce risk, achieve compliance with NIS regulations and … You’ll provide subject matter expertise on legal clauses in relation to cyber controls, as well as preparing and presenting reports to SPR cyber management groups and committees. Other aspects of the role include: Identifying, assessing, assuring, and mitigating risks. Coordinating and collaborating with other security functions, such as … SP Cyber, threat intelligence, vulnerabilitymanagement, security architecture, and security governance, to ensure a holistic and integrated approach to ensuring the impact from supply chain is mitigated. Liaising and cooperating with external parties, such as law enforcement, regulators, vendors, and industry peers, to share information, seek assistance, and More ❯
and is planned to deliver through to 2027. You’ll build key relationships, coordinating and collaborating with other security functions, such as threat intelligence, vulnerabilitymanagement, security architecture, and security governance, to ensure a holistic and integrated approach to security incident management. Other aspects of the role include … and lessons learned sessions, and ensuring the implementation of corrective and preventive actions. Monitoring and evaluating the performance and effectiveness of the security incident management process, and identifying and implementing opportunities for improvement and innovation. Contributing to the development and maintenance of the security strategy, policies, standards, and best … Record of academic achievement, including some form of recognised qualification from further education, such as a degree or diploma. Good knowledge of security incident management frameworks, methodologies, and best practices. Good knowledge of security concepts, principles, and standards. Awareness of key legislation and regulation impacting IT/OT General More ❯
including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for … and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerabilitymanagement platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service managementMore ❯
including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for … and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerabilitymanagement platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service managementMore ❯
Cybersecurity Software Company Remote £45,000 to £55,000 per annum (depending on experience) Who are we? Titania’s multi-award-winning risk-based vulnerabilitymanagement (RBVM) and network exposure management software has been used by elite cyber teams for over a decade to safeguard critical infrastructure. … qualifications are highly desirable: Experience in the Cybersecurity Industry 3-5years experience managing and executing effective demand/lead generation campaigns Strong project management and communication skills Understanding of B2B buyer journeys and sales funnels Self-motivation and proactive approach Strong ability to manage own time and prioritise … workload Experience managing external agencies to scale campaigns/execution KPI management (e.g. MQLs, MQL to SQL, MQL to customer, Cost per MQL, CAC, CLV) If you are the successful candidate, you will be rewarded with a generous holiday package starting at 25 days (plus bank holidays), including optional More ❯
Cybersecurity Software Company Remote £45,000 to £55,000 per annum (depending on experience) Who are we? Titania’s multi-award-winning risk-based vulnerabilitymanagement (RBVM) and network exposure management software has been used by elite cyber teams for over a decade to safeguard critical infrastructure. … qualifications are highly desirable: Experience in the Cybersecurity Industry 3-5years experience managing and executing effective demand/lead generation campaigns Strong project management and communication skills Understanding of B2B buyer journeys and sales funnels Self-motivation and proactive approach Strong ability to manage own time and prioritise … workload Experience managing external agencies to scale campaigns/execution KPI management (e.g. MQLs, MQL to SQL, MQL to customer, Cost per MQL, CAC, CLV) If you are the successful candidate, you will be rewarded with a generous holiday package starting at 25 days (plus bank holidays), including optional More ❯
Cybersecurity Software Company Remote £45,000 to £55,000 per annum (depending on experience) Who are we? Titania’s multi-award-winning risk-based vulnerabilitymanagement (RBVM) and network exposure management software has been used by elite cyber teams for over a decade to safeguard critical infrastructure. … qualifications are highly desirable: Experience in the Cybersecurity Industry 3-5years experience managing and executing effective demand/lead generation campaigns Strong project management and communication skills Understanding of B2B buyer journeys and sales funnels Self-motivation and proactive approach Strong ability to manage own time and prioritise … workload Experience managing external agencies to scale campaigns/execution KPI management (e.g. MQLs, MQL to SQL, MQL to customer, Cost per MQL, CAC, CLV) If you are the successful candidate, you will be rewarded with a generous holiday package starting at 25 days (plus bank holidays), including optional More ❯
architecture for IT security and end-user service domains, ensuring security is integrated into all aspects of the organisation's IT. Driving and facilitating vulnerabilitymanagement and secure the design of IT services. Monitoring, identifying, resolution activities, and reporting IT security KPI's and incidents. Liaising with the More ❯
architecture for IT security and end-user service domains, ensuring security is integrated into all aspects of the organisation’s IT. Driving and facilitating vulnerabilitymanagement and secure the design of IT services. Monitoring, identifying, resolution activities, and reporting IT security KPI’s and incidents. Liaising with the More ❯
to enable secure coding and privacy by design Drive adoption of secure development standards and practices across the organization Operate and evolve our software vulnerabilitymanagement and bug bounty programs Work cross-functionally to identify risks and improve security posture continuously Support cloud-native app and ML security More ❯
to enable secure coding and privacy by design Drive adoption of secure development standards and practices across the org Operate and evolve our software vulnerabilitymanagement and bug bounty programs Work cross-functionally to identify risks and improve security posture continuously Support cloud-native app and ML security More ❯
of systems security and maintain security compliance with internal security standards and external laws, regulations and industry schemes. Comprehensive knowledge of security testing and vulnerability management. Experience of leading and promoting a strong security culture and sharing cyber security knowledge and awareness. Proven success in delivering complex accountabilities with More ❯
teams, you'll ensure robust protection of our electrical, automation, and industrial network systems. You'll also drive key initiatives like cyber hygiene programmes, vulnerability assessments, and network monitoring - keeping us ahead of threats and ready to respond. KEY RESPONSIBILITIES Ensure OT assets and industrial control systems are protected … against cyber threats. Implement and support cyber security tools and practices defined in our global OT Cyber Strategy. Lead cyber hygiene and vulnerabilitymanagement programmes, coordinating remediation where needed. Monitor OT network activity, detect insecure configurations or malicious activity, and take appropriate action. Own the site-level cyber … knowledge of industrial networks. You have solid grounding in cyber security principles - TCP/IP, common protocols, OSI model, and cyber tooling such as vulnerability scanning, antivirus and endpoint protection. You can lead, influence and guide others - from site technicians to external contractors. You're confident working independently and More ❯
for the represented network service capability. The network delivery lead represents all DXC Network Services seamlessly and provides a conduit between our DXC account management team, network operations, project, engineering, architecture, other DXC support groups, client counterparts, and other third-party network service providers or suppliers where required. The … reporting line to the account delivery executive (ADE) directly or through the account run lead (ARL) and a hard line to the Network Delivery Management Organization. Practice 'extreme ownership' of everything DXC network services manage, to an extreme degree. Be responsible for not just those tasks which you directly … DXC GNS should be accompanied by a formal Risk Acceptance Form or similar signed by the persons who have accepted the risk. Ensure proactive management of network performance and operability. Work with ASO to ensure compliance with contractually agreed security vulnerabilitymanagement and or security report findings. More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
TSB Bank
Ten, MITRE to 25 CWE’s etc) and secure coding practices. • Strong ability to communicate security issues to non-technical stakeholders. • Knowledge of driving vulnerabilitymanagement strategy, policy, controls, services, compliance. What we offer in return • Hybrid and flexible working arrangements to support a healthy work/life More ❯