Strong knowledge of network security, cloud security (AWS/Azure/GCP), encryption, IAM, endpoint protection, and SIEM solutions . Hands-on experience with tools such as Splunk, CrowdStrike, Qualys, Nessus, Palo Alto, Fortinet, or similar . Solid understanding of security frameworks and standards: NIST, CIS Controls, ISO 27001 , and compliance mandates relevant to banking. Familiarity with secure coding practices More ❯
infrastructure-as-code tools like Terraform or CloudFormation Strong scripting and automation skills using Python, Bash, or similar languages Experience with security testing tools such as SonarQube, SNYK, Nessus, Qualys, or similar Familiarity with containerization technologies like Docker and Kubernetes Knowledge of security best practices for cloud environments (AWS, Azure, GCP) Understanding of security frameworks and compliance standards such as More ❯
configurations. Integrate systems for identity and privileged access management. Support audit, forensic, and security event investigations in coordination with InfoSec teams. Regularly review and remediate security vulnerabilities identified by Qualys, Nessus, or other scanning tools. Contribute to incident response planning, patching SLAs, and compliance reporting. Design and maintain logging, audit trails, and syslog/SIEM integrations Authentication, Authorization, and Directory More ❯
a suitable maturity model to develop the SOC, and the subsequent implementation of an agreed standard to improve this maturity where appropriate. Familiar with the following tools: Microsoft Sentinel Qualys VMDR Tenable VM MITRE ATT&CK Framework Desirable Certifications, Qualifications Experience: Computer Security Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst One More ❯
in data analysis, ideally within cybersecurity, risk or IT operations, with experience in: Using data tools such as PowerBI, SQL and ServiceNow Reporting Working with vulnerability management tools (e.g. Qualys, Tenable, Rapid7) Understanding vulnerability management processes and security frameworks Automating data collection and reporting using Python or PowerShell Developing and monitoring KPIs and KRIs Communicating complex technical data to non More ❯
with security accreditation, compliance, and risk assessment for deployable communications and information systems (CIS). What You ll Do Conduct vulnerability scanning using tools such as Tenable/Nessus, Qualys, or OpenVAS Develop, maintain, and review Security Accreditation documentation in line with NIST RMF, DoD RMF, and ISO 27001 Perform and support Security Risk Assessments (SRA) across CIS assets Coordinate More ❯
with security accreditation, compliance, and risk assessment for deployable communications and information systems (CIS). What You’ll Do Conduct vulnerability scanning using tools such as Tenable/Nessus, Qualys, or OpenVAS Develop, maintain, and review Security Accreditation documentation in line with NIST RMF, DoD RMF, and ISO 27001 Perform and support Security Risk Assessments (SRA) across CIS assets Coordinate More ❯
with security accreditation, compliance, and risk assessment for deployable communications and information systems (CIS). What You’ll Do Conduct vulnerability scanning using tools such as Tenable/Nessus, Qualys, or OpenVAS Develop, maintain, and review Security Accreditation documentation in line with NIST RMF, DoD RMF, and ISO 27001 Perform and support Security Risk Assessments (SRA) across CIS assets Coordinate More ❯
cyber-attacks. You will work closely with internal teams as well as third-party support partners to monitor systems and evaluate threats as they arise. Required Skills: Experience with Qualys, Microsoft Defender, and Ironscales Ability to identify and mitigate network vulnerabilities Understanding of firewalls, proxies, SIEM, antivirus and IDPS concepts Experience of working directly with SIEM/SOC and how More ❯
cyber-attacks. You will work closely with internal teams as well as third-party support partners to monitor systems and evaluate threats as they arise. Required Skills: Experience with Qualys, Microsoft Defender, and Ironscales Ability to identify and mitigate network vulnerabilities Understanding of firewalls, proxies, SIEM, antivirus and IDPS concepts Experience of working directly with SIEM/SOC and how More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
london (city of london), south east england, united kingdom
HCLTech
environments to centralize security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and More ❯
heart of their SecOps function, helping to shape and improve their cyber capabilities. What they are looking for : Someone comfortable with SIEM, EDR, and vulnerability management tooling (Rapid7, CrowdStrike, Qualys etc.) Scripting and automation Strong foundational IT and networking knowledge Familiarity with patching solutions and email security tools A proactive mindset and good communication skills A genuine passion for InfoSec More ❯
skills, with the ability to explain technical issues to non-technical audiences. Desirable Skills: Experience in financial services or multi-site support environments. Exposure to vulnerability management tools (e.g., Qualys) and remote access administration. Experience with Microsoft Power Apps and automation of Service Desk processes. ITIL 4 Foundation and/or Service Desk Analyst certification. Shift pattern covering the following More ❯
Epsom, Surrey, United Kingdom Hybrid / WFH Options
Lloyd Recruitment - Epsom
competing priorities in a fast-paced environment ITIL knowledge and experience working to SLAs Nice to Have: Experience in the financial services sector Familiarity with vulnerability management tools (e.g., Qualys) Knowledge of remote support tools and collaboration platforms Experience with Power Apps and automating service processes Refer a friend and earn a retail voucher worth up to £500! Unfortunately, due More ❯
Engineering Activities driving Application Monitoring, Metrics, Incident Reviews and Long Term Actions Support BISO activities/implementing InfoSec changes and experience of working with security based tooling such as Qualys, Wiz, Trufflehog, GitHub Advanced Security, etc 10+ years experience and proven background working in a technical, Cyber Security related position. 2+ years experience management (including people management) BSc Engineering/ More ❯
Rickmansworth, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Senior plc
knowledge sharing and team training. Skilled in using threat frameworks (e.g. MITRE ATT&CK, Cyber Kill chain). Experienced in using OSINT and security analysis tools (e.g. Shodan, Censys, Qualys, Virus Total, EDR, AV). Experience supporting incident response or vulnerability management programs. Professional certifications in Cyber and Information Security (e.g. OCSP, GREM, CEH). Strong analytical and problem-solving More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
of HMG Security Standards and Processes. Ability to balance business needs with technical and security standards. Attributes: Commercial awareness. Familiarity with ITIL practices. Technologies: Microsoft Sentinel AT&T USM Qualys Office365 MS Exchange Defender Suite & ADX Platform What can we offer you? Referral Bonus Earn £1000 when you refer a friend to join us! Endless Learning Get access to Linked More ❯