technologies. Proven capability in creating and executing comprehensive threat and vulnerability management programmes, including vulnerability scanning, penetration testing, and security awareness training. Proficiency in using vulnerability scanning tools (e.g. Tenable, Qualys, Rapid7, Veracode, JFrog Xray), threat intelligence platforms, and incident response tools. Prior experience implementing automated solutions for vulnerability scanning, threat detection, and incident response, with a focus on More ❯
technologies. Proven capability in creating and executing comprehensive threat and vulnerability management programmes, including vulnerability scanning, penetration testing, and security awareness training. Proficiency in using vulnerability scanning tools (e.g. Tenable, Qualys, Rapid7, Veracode, JFrog Xray), threat intelligence platforms, and incident response tools. Prior experience implementing automated solutions for vulnerability scanning, threat detection, and incident response, with a focus on More ❯
Experience Proven experience (10+ years) in Cyber Security Engineering, Architecture, or Operations . Strong background in Microsoft Security Stack (Sentinel, Defender, SOAR). Hands-on experience with CrowdStrike XDR , Tenable , Rapid7 , Qualys , and ForcePoint . Deep understanding of Cisco, Check Point, and Juniper network security. Expertise in cloud security (Azure & AWS) . Demonstrated success leading or building CSOCs or More ❯
Experience Proven experience (10+ years) in Cyber Security Engineering, Architecture, or Operations . Strong background in Microsoft Security Stack (Sentinel, Defender, SOAR). Hands-on experience with CrowdStrike XDR , Tenable , Rapid7 , Qualys , and ForcePoint . Deep understanding of Cisco, Check Point, and Juniper network security. Expertise in cloud security (Azure & AWS) . Demonstrated success leading or building CSOCs or More ❯
bristol, south west england, united kingdom Hybrid / WFH Options
Logiq
malware, and DLP. Monitoring & Threat Detection Operate and optimise SIEM tools (Splunk, Microsoft Sentinel) for proactive threat detection and incident response. Vulnerability Management Perform vulnerability assessments using Qualys and Tenable, driving remediation and continuous improvement. Compliance & Governance Align security controls with frameworks such as ISO 27001, NIST, CIS, and Cyber Essentials, supporting audits and certification processes. What We're More ❯
the following skills and experience: Experience in SOC operations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Ability to perform triage of security events to determine their scope, priority, and impact, while More ❯
Security working within a high-threat government environment, with the following skills and experience: Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in SOC operations, incident response, and forensic analysis. Ability to perform triage of security More ❯
Azure Security Engineer are highly valued. Responsibilities: Be the go-to expert for security incidents—detect, respond, and remediate across regions. Drive vulnerability management using top-tier tools like Tenable, Nessus, and Microsoft Defender. Collaborate with franchisees, vendors, and internal teams to close security gaps and elevate resilience. Translate complex threats into clear, actionable insights for senior leadership. Help More ❯
Azure Security Engineer are highly valued. Responsibilities: Be the go-to expert for security incidents—detect, respond, and remediate across regions. Drive vulnerability management using top-tier tools like Tenable, Nessus, and Microsoft Defender. Collaborate with franchisees, vendors, and internal teams to close security gaps and elevate resilience. Translate complex threats into clear, actionable insights for senior leadership. Help More ❯
expert guidance across IT projects and infrastructure. Operational Oversight: Define and deploy control baselines, templates, and standards. Tooling & Effectiveness: Manage and monitor security operations tools such as Defender, Sentinel, Tenable, and CASB. Incident Response: Lead triage, coordinate crisis responses, and oversee post-incident reviews. Documentation & Governance: Maintain hardening guides, architecture diagrams, and lead working groups. Cross-Regional Alignment: Foster More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
British Veterinary Association
expert guidance across IT projects and infrastructure. Operational Oversight: Define and deploy control baselines, templates, and standards. Tooling & Effectiveness: Manage and monitor security operations tools such as Defender, Sentinel, Tenable, and CASB. Incident Response: Lead triage, coordinate crisis responses, and oversee post-incident reviews. Documentation & Governance: Maintain hardening guides, architecture diagrams, and lead working groups. Cross-Regional Alignment: Foster More ❯
or SentinelOne Experience with Microsoft Security platforms and Windows security fundamentals. Familiarity with Linux/Unix-based systems and basic scripting knowledge. Exposure to vulnerability management tools like Rapid7, Tenable, or Qualys. Understanding of the MITRE ATT&CK Framework and Cyber Kill Chain. Ability to communicate technical information clearly to both technical and non-technical audiences. Awareness of cloud More ❯
or SentinelOne Experience with Microsoft Security platforms and Windows security fundamentals. Familiarity with Linux/Unix-based systems and basic scripting knowledge. Exposure to vulnerability management tools like Rapid7, Tenable, or Qualys. Understanding of the MITRE ATT&CK Framework and Cyber Kill Chain. Ability to communicate technical information clearly to both technical and non-technical audiences. Awareness of cloud More ❯
or SentinelOne Experience with Microsoft Security platforms and Windows security fundamentals. Familiarity with Linux/Unix-based systems and basic scripting knowledge. Exposure to vulnerability management tools like Rapid7, Tenable, or Qualys. Understanding of the MITRE ATT&CK Framework and Cyber Kill Chain. Ability to communicate technical information clearly to both technical and non-technical audiences. Awareness of cloud More ❯
london (city of london), south east england, united kingdom
Orro Group
or SentinelOne Experience with Microsoft Security platforms and Windows security fundamentals. Familiarity with Linux/Unix-based systems and basic scripting knowledge. Exposure to vulnerability management tools like Rapid7, Tenable, or Qualys. Understanding of the MITRE ATT&CK Framework and Cyber Kill Chain. Ability to communicate technical information clearly to both technical and non-technical audiences. Awareness of cloud More ❯
or SentinelOne Experience with Microsoft Security platforms and Windows security fundamentals. Familiarity with Linux/Unix-based systems and basic scripting knowledge. Exposure to vulnerability management tools like Rapid7, Tenable, or Qualys. Understanding of the MITRE ATT&CK Framework and Cyber Kill Chain. Ability to communicate technical information clearly to both technical and non-technical audiences. Awareness of cloud More ❯
security engineer. Experience with SentinelONE. Experience working with a third party to a managed SOC provision. Proficiency with Mimecast, antivirus, MS Sentinel. Experience with vulnerability assessment tools such as Tenable or Qualys. Excellent analytical skills for identifying and addressing security threats. Driver's License with consistent access to a vehicle. What's in it for me? This is an More ❯
security engineer. Experience with SentinelONE. Experience working with a third party to a managed SOC provision. Proficiency with Mimecast, antivirus, MS Sentinel. Experience with vulnerability assessment tools such as Tenable or Qualys. Excellent analytical skills for identifying and addressing security threats. Driver's License with consistent access to a vehicle. What's in it for me? This is an More ❯
in meetings, while maintaining clear boundaries and ensuring discussions remain aligned with agreed project scope and priorities Experience with security tools and technologies such as SIEM (Splunk), vulnerability management (Tenable), and PAM Strong understanding of security frameworks and standards (e.g., ISO 27001, NIST), as well as asset management and risk assessment solutions It would be a real bonus if More ❯
within a high-threat government environment, with the following skills and experience: Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, Sentinel, ELK, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in Protective Monitoring & SOC operation Experience in network security principles, firewalls, and access control More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
network teams, systems and processes Experience of security products, e.g., firewalls, web filtering, anti-virus etc. Some knowledge of specialized security tools would be highly desirable (e.g. Palo Alto, Tenable, Defender, Sentinel tools). would be very beneficial A security professional qualification such as CISSP, CISM, CCSP, CISA, ISO27001 Lead Implementor/Auditor, CEH or equivalent Cloud Computing experience More ❯
Hyper-V, VMWare) Strong knowledge of core Microsoft technologies including Active Directory, SCCM, Intune, and Microsoft 365 Proven experience with security tools: antivirus solutions (SOPHOS, Microsoft Defender), vulnerability scanning (Tenable Nessus), mail/web filtering (Clearswift, Fortinet) Proficiency with monitoring platforms such as SolarWinds and Azure Monitor Excellent analytical skills and ability to create comprehensive design documentation Experience working More ❯
review and validate the restructured documentation Key Responsibilities Perform configuration compliance scanning using Qualys Policy Compliance/Policy Audit (experience in other compliance tools such as Symantec, Tanium, and Tenable would be helpful) Collaborate with cross-functional teams to ensure alignment with security standards Support the development and refinement of compliance policies and automation scripts Provide expert guidance on More ❯
review and validate the restructured documentation Key Responsibilities Perform configuration compliance scanning using Qualys Policy Compliance/Policy Audit (experience in other compliance tools such as Symantec, Tanium, and Tenable would be helpful) Collaborate with cross-functional teams to ensure alignment with security standards Support the development and refinement of compliance policies and automation scripts Provide expert guidance on More ❯
EC1N, Farringdon, Greater London, United Kingdom Hybrid / WFH Options
Metropolitan Thames Valley
phases, ensuring milestones are met within agreed tolerances for time, cost, and quality. Establish and manage the project board and governance structures. Coordinate procurement and onboarding of tools (e.g., Tenable add-ons) and services. Identify and engage all stakeholders, ensuring clear communication of objectives, progress, and changes. Prepare and deliver stakeholder presentations and communications plans. Identify, document, and manage More ❯