with internal teams and clients to deliver exceptional IT services. - Bootstrap the new IT arm, actively engaging in hands-on tasks as needed. - Conduct vulnerability assessments and manage incident response and monitoring. - Set up and configure consoles and development kits (Sony, Microsoft, Nintendo) with multiple network connections. - Negotiate SLAs More ❯
such as JSP 440, 604 and Defence Standards (Def stans) Produce security documentation like RMADS, Security Assurance Document, Security Management Plan Conduct penetration testing, vulnerability assessments and remediation activities Your skillset may include: Understanding and application of risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/ More ❯
upgrades, adhering to best practices. Respond promptly to incidents, resolving issues within defined SLAs. Implement and manage system security measures, including patch management and vulnerability assessments. Collaborate with cross-functional teams to support infrastructure projects and deployments. Develop and maintain scripts to automate routine tasks and improve system efficiency. More ❯
RMF packages. Location This is a hybrid position based in Suffolk, VA. Onsite Monday, Tuesday, Wednesday and teleworking Thursday, Friday. Responsibilities Performs risk and vulnerability assessments, remediation/mitigation techniques, and documents and provides technical reports and whitepapers on vulnerabilities associated with complex information systems and modern technologies in More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
Collaborate with security teams to implement and maintain robust protections, including firewalls, VPNs, intrusion detection/prevention systems, and access control protocols. Conduct periodic vulnerability assessments, applying patches and updates to mitigate risks while maintaining compliance with regulatory standards. Proactively identify potential threats and design strategies to minimize security More ❯
technical and advisory expertise to help clients securely craft and deploy Industrial Control Systems (ICS) and operation technology. Main responsibilities: Provide OT/ITS VulnerabilityAssessment and Remediation Services to help clients identify, assess, prioritise and mitigate potentially exposed network components Work collaboratively with various cyber teams to … models and marketing campaigns to enhance the company’s market coverage with a key focus on: Strategy and Target Operating Model, Asset Discovery, Risk Assessment and Classification, Change management along with Implementation of OT products and services Build strong relationships with stakeholders Provide ad-hoc OT, subject matter expertise More ❯
london, south east england, united kingdom Hybrid / WFH Options
Lorien
technical and advisory expertise to help clients securely craft and deploy Industrial Control Systems (ICS) and operation technology. Main responsibilities: Provide OT/ITS VulnerabilityAssessment and Remediation Services to help clients identify, assess, prioritise and mitigate potentially exposed network components Work collaboratively with various cyber teams to … models and marketing campaigns to enhance the company’s market coverage with a key focus on: Strategy and Target Operating Model, Asset Discovery, Risk Assessment and Classification, Change management along with Implementation of OT products and services Build strong relationships with stakeholders Provide ad-hoc OT, subject matter expertise More ❯
best practices, including ISO27001, SOC2 and Cyber Essentials controls. Experience with firewalls, intrusion detection systems, anti-virus software, and data encryption. Knowledge of risk assessment tools, technologies, and methods. Experience designing secure networks, systems, and application architectures. Eligible for SC Clearance (lived in the UK for 5 years or … more). Vulnerability Management Carry out internal vulnerability assessments in line with industry best practice. Manage our 3rd party penetration testing (Continuous Security Testing) service, review of reports and ensure technical teams resolve defects in a timely manner. Ensuring our automated scanning tools (Nessus and Qualys) are maintained More ❯
functional limits. By pioneering autonomous OS and third-party patching - AEM’s foundational use case - through peer-to-peer patch distribution and real-time vulnerabilityassessment without needing a VPN, it eliminates costly, time-consuming routine labor, preempts ransomware and security risks, and protects the digital employee experience. More ❯
normal. The role would be based on site in Central London. Experience Consistent experience within large cyber security environments. Knowledge of information assurance audits, vulnerability assessments, and cyber security frameworks. Cloud security knowledge would be helpful. If you are an experienced Information Security professional looking for a new long More ❯
risk , with strong familiarity with DORA compliance and payments/settlement systems . What You’ll Do: Lead and execute advanced penetration testing and vulnerability assessments Own IAM strategy and operations , ensuring airtight access controls Drive compliance with DORA (Digital Operational Resilience Act) standards Evaluate and mitigate third-party More ❯
risk , with strong familiarity with DORA compliance and payments/settlement systems . What You’ll Do: Lead and execute advanced penetration testing and vulnerability assessments Own IAM strategy and operations , ensuring airtight access controls Drive compliance with DORA (Digital Operational Resilience Act) standards Evaluate and mitigate third-party More ❯
Northallerton, Yorkshire, United Kingdom Hybrid / WFH Options
CyberNorth
of open-source security , we actively build and maintain tools for public use, and you'll have the chance to contribute. Key Responsibilities Conduct vulnerability assessments and support security reviews of cloud and on-prem environments. Work with senior engineers to design and implement security controls. Support the implementation More ❯
based services. Implement security best practices to protect sensitive voice communications. Ensure compliance with relevant industry regulations and standards. Conduct regular security audits and vulnerability assessments. Provide technical support to users regarding Teams Phone System features and troubleshooting. Train and educate users on the effective use of Teams Phone More ❯
into a market leading function •Customer engagement, through the scoping process, tool selection and overall delivery •Run and take ownership of services such as Vulnerability Assessments, Code Review and Penetration Testing •Potential to work overseas to provide training services or working with clients to develop their own security posture More ❯
Ely, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
IT Governance Limited, a GRC Solutions Company
Conduct Cyber Essentials assessments to ensure compliance with IASME scheme guidelines. Assist clients in aligning with Cyber Essentials requirements and implementing effective solutions. Support vulnerability assessments and PCI DSS scanning services. Identify process improvements and contribute to automation opportunities with our Head of Cyber Essentials. We're seeking a More ❯
to join our dynamic team based in Belfast. As a Pen Tester, you will be part of the delivery team, conducting penetration tests and vulnerability assessments across a range of technologies and a wide range of customers including software, fintech, manufacturing, engineering, legal, and public sector. Your insights will More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Yolk Recruitment
IT security awareness, implement best practices, and improve security capabilities. Manage security operations, guiding the team to resolve alerts and incidents. Conduct risk and vulnerability assessments and ensure the achievement of required certifications. Oversee incident response plans and ensure timely resolutions. Quality Assurance & Change Management: Manage the process, tools More ❯
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Yolk Recruitment Ltd
IT security awareness, implement best practices, and improve security capabilities. Manage security operations, guiding the team to resolve alerts and incidents. Conduct risk and vulnerability assessments and ensure the achievement of required certifications. Oversee incident response plans and ensure timely resolutions. Quality Assurance & Change Management: Manage the process, tools More ❯
infrastructure architect to deploy infrastructure solutions aligned with business needs and technological advancements. Implementing security measures such as firewalls, encryption, access controls, and conducting vulnerability assessments. Automating infrastructure setup and management through scripting and coding for efficiency and consistency. Monitoring system performance, resource utilization, and setting up logging to More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Pertemps
meet regulatory and industry standards. The Role Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. … JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
meet regulatory and industry standards. The Role Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. … JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem More ❯
and regulatory requirements, establishing and enforcing cybersecurity policies, standards, and guidelines to protect the University's assets and data. Conduct regular risk assessments and vulnerability analyses to identify potential threats and weaknesses in the University's infrastructure, implementing and overseeing risk management processes, ensuring that appropriate controls and countermeasures … higher education or similarly complex organisation, including management of staff and resources. Experience of gathering operational evidence on the performance of cyber security using vulnerabilityassessment tools. An awareness and understanding of networking and communication related concepts and cloud virtualisation techniques. Benefits Package Below is just a short More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
assurance and the measurement of controls. Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
SUMMER-BROWNING ASSOCIATES LIMITED
assurance and the measurement of controls. Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO More ❯