with global operations team o Should have capability to guide operations team for mitigation/closure of vulnerabilities in systems. o Support teams in implementing security systems Perform risk assessment and recommend/guide management for continual improvements in overall security stance of project. Should possess skills to impart information security awareness. Must have experience in handling various security … tools for Vulnerability Assessment. ESSENTIAL EDUCATION/QUALIFICATION Postgraduate in Science and/or Engineering preferably in Computer Science/Information Technology Experience in telecom and/or call center domain(s). DESIRABLE QUALIFICATIONS Certifications o Certified Information Systems Security Professional (CISSP). o Certified Information Systems Auditor (CISA) o Certified Information Security Manager (CISM) o Certified Ethical More ❯
Monitoring and defending against security threats across the organization's network, systems, and applications ️ Implementing and managing security technologies such as firewalls, IDS/IPS, and encryption solutions ️ Conducting vulnerability assessments and penetration tests to identify and mitigate security risks ️ Collaborating with IT teams to implement secure configurations and ensure best practices are followed ️ Developing and enforcing cybersecurity policies … or in a similar role within IT security ️ Strong knowledge of cybersecurity principles, threat intelligence, and security controls ️ Experience with security tools (e.g., SIEM, firewalls, EDR, VPN, DLP) and vulnerability management ️ Solid understanding of regulatory frameworks and industry standards (e.g., GDPR, NIST, ISO 27001) ️ Certifications such as CISSP, CISM, CompTIA Security+, or CEH are highly desirable Ready to defend More ❯
support project implementation aligned with company objectives, including continuous improvement of margin, customer satisfaction, schedule, working capital, and safety performance. The role involves providing cybersecurity, networking, secure architectures, solutions, vulnerability & risk assessments, and supporting client assignments and project teams. The candidate should have experience in identifying vulnerabilities & risks in networks, software systems, and data centers through ongoing scans, monitoring … of architectures, technologies, & procedures in client facilities. Design solutions that meet client requirements and implement security measures (e.g., antivirus, patch management, insider threat protection, incident response, compliance). Conduct vulnerability assessments & audits on client systems & network devices, considering OT sensitivities. Provide expertise in network design, implementation, & testing for automation & control systems. Identify & define network requirements for automation & control solutions. More ❯
Your mission As a Security Analyst, you oversee incoming security vulnerability reports from our researchers' community, while continuously sharpening your cybersecurity skills. All of this happens through dedicated interaction with the researcher's community and with the goal of offering the best possible service to both companies and researchers. What you'll be doing Challenge and support both researchers … Outstanding interpersonal abilities and strong written and verbal communication skills. Fluent in English, both written and spoken. At least 2 years of experience in pen testing, security testing, or vulnerability assessments. Stress resistant and able to maintain focus during incident responses. A strong understanding of (Ethical) Hacker culture. Attention to detail, analytical, and problem-solving skills. Able to independently More ❯
key stakeholders). Help Members establish key performance indicators (KPIs) to measure the effectiveness of their information security programme. Supporting Members to complete the annual Mutual Accountability Framework self-assessment and coordinating resulting mitigation plans Support risk assessment activities to identify and prioritize potential security threats. Support the development of appropriate risk management processes where not in place. … Supporting the delivery of vulnerability assessments and penetration tests (and other Shared Services) with the SCI Information Security & Assurance team. Support and advise the Member's Point of Contacts (PoC) during the implementation, and maintenance of IT security policies, standards, and procedures. This could include the writing and reviewing of new policies and procedures. Support the delivery of Member … recruitment process: Application review by our recruiting team based on your CV and cover letter Two-stage competency-based interviews with the hiring team Some recruitmentmay include an additional assessment or case study stage, or a third stage interview If successful, you will receive a conditional offer of employment, followed by your contract subject to passing background checks We More ❯
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: Lead the development and delivery of threat intelligence and … vulnerability products. Select and profile key threat actors posing the greatest risk to the client's estate. Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. Provide in-depth contextual threat analysis, including actor capability and intent. Maintain and improve internal documentation and … reporting processes. Lead, mentor, and support a multidisciplinary team of cyber analysts. Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: 5+ years of experience in Threat Intelligence, Vulnerability Management, or cyber research. Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. Experience in More ❯
bradford, yorkshire and the humber, united kingdom
Anson Mccade
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: Lead the development and delivery of threat intelligence and … vulnerability products. Select and profile key threat actors posing the greatest risk to the client's estate. Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. Provide in-depth contextual threat analysis, including actor capability and intent. Maintain and improve internal documentation and … reporting processes. Lead, mentor, and support a multidisciplinary team of cyber analysts. Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: 5+ years of experience in Threat Intelligence, Vulnerability Management, or cyber research. Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. Experience in More ❯
worldwide, the company enable clients to navigate complex security challenges, ensuring the safety of their people, data, and reputation. The company is looking for a skilled Penetration Tester/Vulnerability Assessor to join the growing security team. If you would like to learn more about this opportunity, feel free to reach out and apply today! Key Responsibilities: Perform vulnerability … within the team Stay up to date with emerging threats, tools, and techniques in the offensive security space Essential Skills and Experience: Hands-on experience with penetration testing or vulnerability assessments (commercial or demonstrable practical knowledge) Familiarity with tools such as Burp Suite, Nmap, Nessus, Metasploit, etc. Understanding of OWASP Top 10 and common exploitation techniques Strong written and More ❯
skilled to lead the development and implementation of a cyber risk management programme. Key Responsibilities • Design and deliver a robust cyber security risk management framework. • Conduct regular risk and vulnerability assessments • Work collaboratively across departments to define risk tolerance and align with strategic objectives. • Analyse cyber security data to identify risks and recommend mitigation strategies. • Maintain comprehensive risk documentation … cyber security risk management role. • Strong understanding of cyber security frameworks and standards (ISO 27001, SOC2, NIST, GDPR). • Excellent analytical, communication, and stakeholder engagement skills. • Proficient in risk assessment tools and methodologies. • Professional certifications such as CRISC, CISM or CISSP are desirable. Bright Purple is an equal opportunities employer: we are proud to work with clients who share More ❯
skilled ?????????? ???????????????? ???????? ?????????????? to lead the development and implementation of a cyber risk management programme. Key Responsibilities Design and deliver a robust cyber security risk management framework. Conduct regular risk and vulnerability assessments Work collaboratively across departments to define risk tolerance and align with strategic objectives. Analyse cyber security data to identify risks and recommend mitigation strategies. Maintain comprehensive risk documentation … cyber security risk management role. Strong understanding of cyber security frameworks and standards (ISO 27001, SOC2, NIST, GDPR). Excellent analytical, communication, and stakeholder engagement skills. Proficient in risk assessment tools and methodologies. Professional certifications such as CRISC, CISM or CISSP are desirable. Bright Purple is an equal opportunities employer: we are proud to work with clients who share More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Bright Purple
Manager to lead the development and implementation of a cyber risk management programme. Key Responsibilities • Design and deliver a robust cyber security risk management framework. • Conduct regular risk and vulnerability assessments • Work collaboratively across departments to define risk tolerance and align with strategic objectives. • Analyse cyber security data to identify risks and recommend mitigation strategies. • Maintain comprehensive risk documentation … cyber security risk management role. • Strong understanding of cyber security frameworks and standards (ISO 27001, SOC2, NIST, GDPR). • Excellent analytical, communication, and stakeholder engagement skills. • Proficient in risk assessment tools and methodologies. • Professional certifications such as CRISC, CISM or CISSP are desirable. Bright Purple is an equal opportunities employer: we are proud to work with clients who share More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
83zero Ltd
and incidents in line with ITIL processes Monitor and enhance network security controls including web security gateways, NAC, endpoint security, and perimeter defense Contribute to internal reviews, security audits, vulnerability assessments, and penetration testing Support firewall rule changes, VPN access, network segmentation, and performance improvements Participate in on-call rotation for high-priority issues and assist during major incidents … secure environments with a focus on proactive security posture Knowledge of network security tools such as Cisco Secure Access, Cisco ISE, Microsoft Defender XDR, Sentinel, and SentinelOne Comfortable with vulnerability management frameworks and tools Familiarity with network monitoring and performance management Previous experience working within an ITIL-based support framework Hands-on experience with Check Point, Cisco, or Palo More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Razorblue Group Ltd
accept, your responsibilities will encompass: Be the first line of defence: detect, analyse, and respond to real-time security incidents across razorblue and client networks Take the lead in vulnerability management - from scanning and risk analysis to remediation coordination Run proactive security audits and phishing simulations to strengthen awareness and resilience Collaborate with infrastructure and network teams to escalate … we would love you to apply. Full UK Driving License Entry-level security certifications (CompTIA Security+, CySA+, etc.) or working toward one Hands-on experience in security incident response, vulnerability assessments, and root cause analysis Skilled in producing incident reports, security metrics, and supporting training Comfortable with internal security audits and refining SOPs and playbooks Knowledge of key security More ❯
aligned with legal, regulatory, and architectural requirements. Lead periodic reviews in response to emerging threats, changes in business operations, or evolving technologies. Coordinate, commission, and interpret penetration testing and vulnerability assessments Oversee the planning and execution of penetration tests and vulnerability scans across GLD's digital estate. Work with external providers and internal teams to ensure tests are More ❯
aligned with legal, regulatory, and architectural requirements. Lead periodic reviews in response to emerging threats, changes in business operations, or evolving technologies. Coordinate, commission, and interpret penetration testing and vulnerability assessments Oversee the planning and execution of penetration tests and vulnerability scans across GLD's digital estate. Work with external providers and internal teams to ensure tests are More ❯
aligned with legal, regulatory, and architectural requirements. Lead periodic reviews in response to emerging threats, changes in business operations, or evolving technologies. Coordinate, commission, and interpret penetration testing and vulnerability assessments Oversee the planning and execution of penetration tests and vulnerability scans across GLD's digital estate. Work with external providers and internal teams to ensure tests are More ❯
aligned with legal, regulatory, and architectural requirements. Lead periodic reviews in response to emerging threats, changes in business operations, or evolving technologies. Coordinate, commission, and interpret penetration testing and vulnerability assessments Oversee the planning and execution of penetration tests and vulnerability scans across GLD's digital estate. Work with external providers and internal teams to ensure tests are More ❯
aligned with legal, regulatory, and architectural requirements. Lead periodic reviews in response to emerging threats, changes in business operations, or evolving technologies. Coordinate, commission, and interpret penetration testing and vulnerability assessments Oversee the planning and execution of penetration tests and vulnerability scans across GLD's digital estate. Work with external providers and internal teams to ensure tests are More ❯
In this role you’ll – Develop and implement a comprehensive cyber security risk management program to identify, assess and prioritise cyber threats and vulnerabilities. Conduct regular risk assessments and vulnerability assessments. Provide guidance to project teams to integrate risk management practices into the project life cycle. Collaborate with internal and external partners to enhance the organization's cyber resilience … You should have the following skills and experiences – Advanced certifications (CRISC, CISM, CISSP) are highly desirable. Proven experience in a cyber security risk management role, strong understanding of risk assessment methodologies. Experience with ServiceNow GRC is a plus. In-depth knowledge of cyber security principles, frameworks and best practices. Experience with risk assessment tools and methodologies. Familiarity with More ❯
Key Responsibilities Operate within a Security Operations Centre (SOC) or equivalent environment Monitor and respond to incidents using SIEM platforms Conduct system log analysis and threat detection Assist in vulnerability assessments and management Support incident resolution and reporting ?? Required Skills & Experience At least 2 years' experience in a dedicated Security Analyst role Hands-on experience with: SOC operations SIEM … tools Vulnerability management Incident response and investigation Log and event analysis ?? Preferred Qualifications Industry certifications such as CompTIA Security+ or equivalent (desirable) Practical experience preferred over formal education ?? Security Clearance Requirements UK Nationals only Current SC clearance required DV preferred - or must be DV-eligible (as DV clearance will be needed) DV Bonus: 10% of base salary upon clearance More ❯
skillset What You'll Be Doing Leading incident response and managing containment, analysis, and resolution Monitoring security systems (SIEM, EDR, threat intel) to identify and respond to threats Conducting vulnerability assessments and supporting remediation for financial systems Ensuring compliance with GLBA, PCI, FFIEC, and other regulatory frameworks Supporting risk reviews, vendor assessments, and internal audits Participating in security exercises … What You'll Need to be Considered 3-5+ years of relevant experience Prior experience in financial services, banking, or fintech cybersecurity Expertise with SIEM, EDR, NGFW, and vulnerability management tools Familiarity with scripting (Python, PowerShell) for automation and threat detection Experience conducting third-party risk reviews and regulatory reporting ITAC Solutions firstName lastName Email Address Phone Number More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
OpenSourced Ltd
an experienced Penetration Tester specialising in Infrastructure Testing on behalf of a leading UK-based security consultancy. This company is renowned for its innovative approach to security, providing ongoing vulnerability assurance and continuous threat management through its advanced portal solution, beyond traditional point-in-time assessments. The Role: As an Infrastructure Penetration Tester , you will be responsible for conducting … Responsibilities: Conduct Comprehensive Testing: Perform formal, in-depth penetration tests focused on infrastructure and occasionally other areas. Reporting: Deliver detailed, well-structured technical and non-technical reports in English. Vulnerability Assessments: Identify vulnerabilities and provide actionable remediation recommendations. Pre-Engagement Support: Assist in scoping client projects and drafting proposals to ensure clear and accurate planning. Project Management: Manage penetration More ❯
an enthusiastic Cyber Security Consultantto join our team. Working alongside ourexperienced team of specialists, you'll be delivering offensive securityservices including digital footprint reconnaissance, social engineering,penetration testing and vulnerability assessments and more to high profileclients across all industries. The purpose of this role is to deliver our offensivesecurity services including digital footprint reconnaissance, socialengineering, vulnerability assessments, penetration … Consultantto join our team. Working alongside ourexperienced team of specialists, you'll be delivering cyber risk and control assessments,developing cyber programmes as well as delivering offensive security servicesincluding vulnerability assessments and cyber incident response exercises. You'll benefit from ongoing coaching, careermentoring, and be supported by our career pathway. You will have an opportunityto continue to develop market More ❯
Security Engineer will support project implementation aligned with company objectives, focusing on improving margins, customer satisfaction, schedules, working capital, and safety performance. Responsibilities include providing cybersecurity, networking, secure architectures, vulnerability and risk assessments, and supporting project teams and clients with technical solutions. Our Systems Integration (SI) team works with high-profile clients in the energy sector, delivering automation and … Key Objectives: Assess cybersecurity architecture robustness within customer facilities. Design and implement solutions to mitigate security risks, including antivirus, patch management, insider threat protection, incident response, and compliance. Conduct vulnerability assessments and audits on client systems and network devices, considering OT sensitivities. Provide expertise in network design, implementation, and testing for automation and control systems. Define network requirements supporting More ❯
are comfortable working independently or leading a presentation or meeting. What kind of work would you be doing? Leading on or being part of the technical delivery team for vulnerability assessments projects. You will oversee or deliver on vulnerability assessments projects and penetration testing activities, focusing on project scope, smooth execution, and client communications. This includes technical activities More ❯