understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: Vulnerability Analyst Location: London - We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular … IT and OT). Co-ordinate with various digital teams across NH to ensure all vulnerabilities are addressed in a timely manner. Continually improve vulnerability tooling and process while supporting the improvement of the security capability of National Highways through dashboard monitoring and retrospective assessments. Plan, execute and manage … vulnerabilityassessment and scanning activities across the National Highway's networks, systems, and applications. Ensure vulnerability scans and assessments are run periodically in line with policies and standards across the IT, OT, and cloud infrastructure. Prioritise vulnerabilities based on their severity, exploitability, and potential business impact to More ❯
meet your needs. What You'll Do Deliver cyber security assurance services to identify vulnerabilities in different areas on a variety of technologies, including vulnerability assessments on external networks, internal networks, applications, and enterprise security systems. Delivering presentations to technical and non-technical stakeholders. Main role will be as … For Qualifications : Relevant degree or one full year's minimum experience in penetration testing or cyber security assurance. Experience : Some experience of cyber security assessment, vulnerability assessments, or penetration testing. Certifications : such as CPSA or CEH would be advantageous. Tools: Experience of penetration testing tools, Linux, Windows, and … written communication skills. Ability to work effectively under pressure. Commitment to maintaining the highest ethical and professional standards. Are you experienced in cyber security assessment, vulnerability assessments, or penetration testing and looking to further improve your skills and take on more responsibilities? If so, this opportunity is perfect More ❯
against potential threats. Endpoint Management and Administration : Overseeing the deployment, configuration, and maintenance of endpoint security solutions to safeguard all devices within the organisation. VulnerabilityAssessment and Management : Conducting regular vulnerability assessments, analysing findings, and coordinating remediation efforts to enhance our security posture. Implementation of Security Controls … design and implementation of security architectures and controls. Endpoint Security : Hands-on experience with endpoint protection solutions, ensuring devices are safeguarded against potential threats. Vulnerability Management : Proficiency in conducting vulnerability assessments using industry-standard tools and methodologies, and managing remediation processes. Compliance and Security Controls : Familiarity with implementing More ❯
client facing, to include leadership and executive management Draft root cause analysis reports and recommendations after cybersecurity incidents Identify risk areas that will require vulnerability prevention Stay current with Security technologies and make recommendations for use based on business value Skills & Qualifications Requirements SIEM administration, configuration, and optimization experience … endpoint protection solutions such as Cylance, Carbon Black, or CrowdStrike Understanding of network protocols coupled with experience with web proxies, web application firewalls, and vulnerabilityassessment tools. Experience working in a team-oriented, collaborative environment with a high level of analytical and problem-solving abilities Positive attitude with … strong oral and written communication skills Knowledge of IP networking and network security including Intrusion Detection Familiarity with common network vulnerability/penetration testing tools Familiarity with service management software such as ServiceNow Familiarity with data visualization platforms such as Domo Some experience with system hardening guidance and tools More ❯
will do: Design and implement robust, forward-thinking security strategies, policies, and procedures to safeguard our systems, networks, and data. Lead regular security assessments, vulnerability scans, and penetration tests to identify risks and deploy effective remediation measures. Monitor systems, networks, and logs for any signs of security incidents or … preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems, SIEM, antivirus, encryption, and vulnerabilityassessment tools. You own relevant certifications (Security+, IAT II/III level or similar). You excel in risk assessments, vulnerability management More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
UNAVAILABLE
protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID More ❯
protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Awaze
a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence processes … while contributing to the organisation's long-term security maturity. What you'll be doing as a Senior Cyber Threat Intelligence Analyst: Cyber Threat Assessment: Support and lead cyber threat assessments and provide recommendations to technical, managerial, and executive stakeholders. Incident Response Support: Act as part of the incident … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth profiles of More ❯
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
City, Edinburgh, United Kingdom Hybrid / WFH Options
Deloitte LLP
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Motability Operations
have experience designing and implementing security measures that protect sensitive information in complex environments. Your technical expertise spans areas such as encryption, access controls, vulnerability assessments and incident response. You have excellent problem-solving skills and a proactive mindset, enabling you to anticipate potential threats and address them effectively. More ❯
Employment Type: Permanent, Part Time, Work From Home
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
have experience designing and implementing security measures that protect sensitive information in complex environments. Your technical expertise spans areas such as encryption, access controls, vulnerability assessments and incident response. You have excellent problem-solving skills and a proactive mindset, enabling you to anticipate potential threats and address them effectively. More ❯
Employment Type: Permanent, Part Time, Work From Home
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
required, as well as overseeing and maintaining an outsourced SOC team and additional cyber security partners. Additionally, facilitating and overseeing audits, penetration tests and vulnerability assessments and driving remedial actions and improvements will form a large part of the role. Other accountabilities will include: Review, recommend and or update More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage More ❯
and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS More ❯
Omagh, Northern Ireland, United Kingdom Hybrid / WFH Options
Digital Waffle
and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS More ❯
Londonderry, Northern Ireland, United Kingdom Hybrid / WFH Options
Digital Waffle
and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS More ❯