Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
project to ensure the efficient operation of end user devices, including Laptops, phones, handheld devices etc. The primary responsibility with the role will be vulnerabilityManagement, including conducting regular assessments, implementing security measures and liaising with various depts. The successful candidate will implement and manage software patches promptly … and configure MS Teams, Intune and Endpoint Config Manager accordingly. Skills required: - Relevant experience in vulnerabilitymanagement and endpoint security Strong knowledge of MS Teams, Intune and Endpoint Configuration manager Familiar with identity and access management principles Responsibilities: Respond to incidents related to EUC reported through the … Implement and manage software patches for end user computing devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Duel
Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerability scanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development process. Assist in securing … to security compliance frameworks such as ISO 27001 or SOC 2, even if not previously responsible for certification processes. Experience working within security risk management, vulnerability tracking, or operational security efforts. Prior experience working with engineering teams on security topics is beneficial, particularly around secure development practices. Ability … or Vanta. Experience working with pen testing and bug bounties a plus. Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerabilitymanagement solutions. Experience or knowledge of cloud security (AWS, GCP, or Azure). Awareness of security best practices in application and infrastructure security. More ❯
Plymouth, Devon, South West, United Kingdom Hybrid / WFH Options
Inspire People
Security Operations Centre team providing technical oversight and direction. You will engage with various teams across DDaT to maintain security monitoring, threat intelligence and vulnerabilitymanagement controls to detect and alert across all HM Land Registry technical assets. Salary of £46,058 - £57,400 dependent upon interview assessment … and Business Strategies. Working closely with the Lead Infrastructure Engineers and subject matter experts, you will develop and maintain security monitoring, threat intelligence and vulnerabilitymanagement controls, to detect and alert across all HMLR technical assets. You will work with technical teams to develop SOC scenario-based run … books to respond to security events & incidents. Develop vulnerability tools to ensure awareness of threats and risks to security controls. Working with Lead Infrastructure Engineers and other security teams to advise and guide operational teams on Security controls. Engage with project teams to provide assurance around the security of More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
Benefact Group plc
solutions that align with security and project requirements by articulating the real-world cyber security risks associated. You will also be responsible for our VulnerabilityManagement program ensuring that agreed SLAs are achieved and provide consultation when solutions are not straight forward. As the Senior Cyber Security Consultant … matter expertise for internal projects and stakeholders, identifying risks and advising on the correct approach to mitigate those risks You will have responsibility for VulnerabilityManagement managing outputs from internal tooling and external vendors in order to prioritise remediation by relevant internal parties in order to ensure the … inclusive, supportive and engaged learning environment, being a key contributor to a high performing and professional Security Team. Knowledge, skills and experience Strong stakeholder management skills A strong understanding of enterprise ICT and security principles A strong understanding of cloud security concepts and technologies Understanding of the CI/ More ❯
Stroud, south east england, United Kingdom Hybrid / WFH Options
Ecotricity
Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Linux Operating Systems On-Premise Active Directory Networking - Cisco/Fortigate Penetration Testing & VulnerabilityManagement Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate for this … be working towards a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (ie. NIST or Cyber Security Essentials). Knowledge of vulnerability databases (ie. NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tooling. Experience using Code Security scanning More ❯
stroud, south west england, United Kingdom Hybrid / WFH Options
Ecotricity
Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Linux Operating Systems On-Premise Active Directory Networking - Cisco/Fortigate Penetration Testing & VulnerabilityManagement Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate for this … be working towards a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (ie. NIST or Cyber Security Essentials). Knowledge of vulnerability databases (ie. NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tooling. Experience using Code Security scanning More ❯
Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Frontier Resourcing
by embedding robust security controls throughout the development lifecycle, identifying and mitigating risks, and ensuring compliance with defence-grade standards. Key Responsibilities Risk Assessments & VulnerabilityManagement Conduct comprehensive security risk assessments at each product phase (design, implementation, deployment). Identify vulnerabilities in architectures, codebases, and configurations; drive remediation …/53, JSP 440/604, Def Stan 05-series). Lead the creation and maintenance of security documentation (RMADS, Security Assurance Documents, Security Management Plans). Testing & Assurance Design and execute penetration tests and automated vulnerability scans; validate fixes. Oversee third-party security assessments as required. Continuous … across teams. Qualifications & Experience Proven experience (5+ years) in product or application security within defence, government, or security-cleared environments. Deep knowledge of risk management frameworks (ISO 27001/2/5/31000, NIST 800-series) and Defence Standards (JSPs, Def Stan 05-138/139). Hands More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Frontier Resourcing Ltd
by embedding robust security controls throughout the development lifecycle, identifying and mitigating risks, and ensuring compliance with defence-grade standards. Key Responsibilities Risk Assessments & VulnerabilityManagement Conduct comprehensive security risk assessments at each product phase (design, implementation, deployment). Identify vulnerabilities in architectures, codebases, and configurations; drive remediation …/53, JSP 440/604, Def Stan 05-series). Lead the creation and maintenance of security documentation (RMADS, Security Assurance Documents, Security Management Plans). Testing & Assurance Design and execute penetration tests and automated vulnerability scans; validate fixes. Oversee third-party security assessments as required. Continuous … across teams. Qualifications & Experience Proven experience (5+ years) in product or application security within defence, government, or security-cleared environments. Deep knowledge of risk management frameworks (ISO 27001/2/5/31000, NIST 800-series) and Defence Standards (JSPs, Def Stan 05-138/139). Hands More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
Randstad Technologies Recruitment
guidance. Run scheduled audits and follow through with actionable improvements. Roll out and stress-test our business continuity approach. Turn data into insights with management reports that track compliance trends. Partner with teams across the globe to design, implement, and test security tools and controls. Lead the journey to … standards. A solid foundation in enterprise-level Information Security practices. Strong analytical skills and a calm approach under competing demands. Familiarity with threat landscapes, vulnerabilitymanagement, and risk frameworks. Willingness to travel within the UK and potentially abroad when needed-UK driving license required Why You'll Love More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
e.g., AWS Shield, Security Hub, IAM). Knowledge of security frameworks such as ISO 27001, NIST, or CIS benchmarks. Experience in application security reviews, vulnerabilitymanagement, and security controls implementation. Familiarity with OWASP Top 10, CWE, and secure coding practices. Proficiency in using security tools such as static More ❯