/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints for …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerabilityassessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend More ❯
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints for …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerabilityassessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend More ❯
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints for …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerabilityassessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend More ❯
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints for …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerabilityassessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role More ❯
operationalizing a configuration baselines program spanning physical and virtual systems, serverless workloads, container security, and other platforms. This engineer will assist in the minimization of potential attack surfaces through vulnerability management, managing a baselines program, cloud configuration assessments, incorporating threat intelligence from public and private sources, and work internally to build and enhance policies, standards, and processes. They will … in Wellington's vendor ecosystem to understand when third and fourth parties may be exposed to critical vulnerabilities. Contribute to team documentation for updates to existing processes, new processes, assessment tool infrastructure details and workflows. Contribute to firmwide documentation by being an SME contributor to policies and standards. NON-TECHNICAL QUALIFICATIONS A Passion for cyber-security is a must. … team members and share discoveries about your work. TECHNICAL QUALIFICATIONS Experience working with best practices frameworks such as CIS Critical Security Controls to drive an internal discovery and risk assessment program for a system baselines/hardening program. Knowledge of common cyber-attack types such as DDoS, SQLi, XSS, and others. This experience relied upon to make rational decisions More ❯
relevant regulatory frameworks (eg, ISO 27001, NIST, FCA ). Collaborate with key stakeholders to gather and analyze technical security data for accurate risk evaluation and remediation. Work closely with VulnerabilityAssessment & Penetration Testing (VAPT) , Threat Intelligence , and Incident Response teams to understand technical risks and validate that appropriate controls are in place. Contribute to the ongoing improvement of More ❯
Security, preferably in a senior or advanced analyst role. Proven experience in managing and auditing Information Security Management Systems (ISMS) aligned with ISO 27001 standards. Strong skills in risk assessment, vulnerability identification, and development of practical security solutions for complex IT environments. Experience with penetration testing and vulnerability assessments; certifications such as CEH (Certified Ethical Hacker) are More ❯
and incident response. Support security risk management and compliance with standards like PCI, GDPR, ISO. Perform other duties as assigned. Qualifications 10+ years of experience in information security, including vulnerabilityassessment, incident response, and audits. 5+ years working with business leadership and managing projects in a complex environment. Knowledge of security technologies and concepts such as firewalls, intrusion More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Agoda
Know our Team: The Security Department oversees security, governance, risk management, and compliance, and security operations for all Agoda. We are vigilant in ensuring there is no breach or vulnerability threatening our company or endangering our employees to keep Agoda safe and protected. Given that the security ecosystem is moving forward at tremendous speed, we like to be early … advanced environment. The Opportunity: As a Security Analyst, you will focus on identifying, analyzing, and remediating vulnerabilities across our environment. You will be hands-on with penetration testing and vulnerability management, ensuring our systems remain secure and resilient. In this Role, you’ll get to: Develop Security Automation Tools to implement solutions at scale Triage security findings from multiple … tools and work with hundreds of teams to get them remediated within the right SLA Conduct security assessments through code reviews, vulnerability assessments, penetration testing and risk analysis Research on the negative effects of a vulnerability, from minimizing the impact to altering security controls for future prevention Identify potential threats so that the organization can protect itself from More ❯
Role : Security Architect Location : London Contract Role Job Description: Strong experience in building secure web and mobile apps Experience with Security architecture, Application Security assessments, penetration testing, vulnerabilityassessment, Secure SDLC, and Static code reviews Certified Secure Software Lifecycle Professional (CSSLP) (desirable) Responsibilities: - Design, develop, and implement security frameworks and solutions to safeguard company's assets and infrastructure. More ❯
quickly to security incidents. Assist in developing risk management programs and methodologies. Perform other related duties as needed. Qualifications and Education Over 10 years of technical security experience, including vulnerabilityassessment, incident response, forensics, audits, etc. At least 5 years working with senior leadership and managing complex projects. Deep understanding of security technologies and concepts such as firewalls More ❯
senior stakeholders, both internal and client facing and be responsible for defining the vision, principles and strategy for security operations. Improve SOC processes, including incident response, threat hunting, and vulnerability management. Demonstrate expert understanding of security concepts and apply them to a technical level, at the highest levels of risk and customer complexity. Influence and challenge clients to define … meet customer needs and pain points. Provide mentorship across delivery team members, operating as an escalation expert for both internal and client facing issues. Designing, developing, and continuously improving vulnerabilityassessment, security testing, and risk analysis methods. Designing, developing, and continuously improving the security posture, effectiveness and efficiency of the company's products and services Providing developers with More ❯
London, England, United Kingdom Hybrid / WFH Options
Stripe Olt
player who wants to be part of a truly team driven environment. As a First Responder, you must display excellent outside-the-box thinking and communication skills. DESIRABLE EXPERIENCE. VulnerabilityAssessment experience. Knowledge of Penetration testing tools and techniques. Network and firewall alert management. Active Directory and group policy management experience. Experience in deploying, managing, and supporting of More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Stripe Olt
player who wants to be part of a truly team driven environment. As a First Responder, you must display excellent outside-the-box thinking and communication skills. DESIRABLE EXPERIENCE. VulnerabilityAssessment experience. Knowledge of Penetration testing tools and techniques. Network and firewall alert management. Active Directory and group policy management experience. Experience in deploying, managing, and supporting of More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Stripe Olt
player who wants to be part of a truly team driven environment. As a First Responder, you must display excellent outside-the-box thinking and communication skills. DESIRABLE EXPERIENCE. VulnerabilityAssessment experience. Knowledge of Penetration testing tools and techniques. Network and firewall alert management. Active Directory and group policy management experience. Experience in deploying, managing, and supporting of More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage and respond to security breaches More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Pepper Mill
a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage and respond to security breaches More ❯
skills, with the ability to lead cross-functional teams and work independently. Technical Expertise Required Network Security Technologies: Expertise in Network Access Control (NAC), IPS, Firewalls (FW), Endpoint Protection, VulnerabilityAssessment tools, Mobile Device Management (MDM), and other similar cybersecurity solutions for both IT and OT environments. Networking Protocols & Infrastructure: Deep understanding of networking technologies such as routing More ❯
What You’ll Be Working On: ️ Monitoring network traffic and system activity to detect potential security threats ️ Analyzing security incidents and performing root cause analysis ️ Conducting vulnerability assessments and risk evaluations to identify weaknesses ️ Implementing security measures and controls to protect against data breaches and cyberattacks ️ Assisting in the development and implementation of security policies and procedures What We … or in a similar cybersecurity role ️ Strong knowledge of network security, firewalls, IDS/IPS, and endpoint security ️ Familiarity with security monitoring tools (e.g., SIEM, Splunk, Qualys) ️ Experience with vulnerability management, penetration testing, and incident response ️ Certifications such as CISSP, CISM, CompTIA Security+ or equivalent are highly desirable #J-18808-Ljbffr More ❯
Farnborough, England, United Kingdom Hybrid / WFH Options
Copello Global
infrastructure within the programme, applying appropriate security frameworks and implementing the right controls to ensure the security and integrity of relevant information. Your role will cover several core areas, vulnerability assessments (scanning and reporting), system hardening, endpoint security and incident management. You will ensure relevant documentation around these activities is maintained while working effectively with the wider team. The … Skills This role requires a Security Engineer possessing a blend of Information Security and Cyber Security skills with knowledge of: Cloud Security (AWS) Experience in Vulnerability Assessments and Incident Management, Implementation of security controls, UK Information Security standards (eg. MoD, NCSC, NIST), Excellent communication skills, Clearance UK Security Clearance is essential to start. Apply To apply, follow the instructions More ❯
of safeguarding Industrial Control Systems and SCADA networks from evolving cyber threats.Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threat analysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerability management initiatives and penetration testing exercises. Contribute to policy development More ❯
You will be joining an AppSec team focused on building security automation into delivery pipelines and conducting security focused tests against digital services. Key Responsibilities Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc), and make necessary recommendations. Collaborate … AWS, Azure, or GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with MoJ and NCSC guidelines. Essential Criteria Penetration testing, ethical hacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security, IaC scanning, etc.). Secure More ❯
Farnborough, England, United Kingdom Hybrid / WFH Options
Copello Global
infrastructure within the programme, applying appropriate security frameworks and implementing the right controls to ensure the security and integrity of relevant information. Your role will cover several core areas, vulnerability assessments (scanning and reporting), system hardening, endpoint security and incident management. You will ensure relevant documentation around these activities is maintained while working effectively with the wider team. The … Skills This role requires a Security Engineer possessing a blend of Information Security and Cyber Security skills with knowledge of: Cloud Security (AWS) Experience in Vulnerability Assessments and Incident Management, Implementation of security controls, UK Information Security standards (eg. MoD, NCSC, NIST), Clearance UK Security Clearance is essential to start. Apply To apply, follow the instructions on this page More ❯
and logs to detect unusual activities or threats. Incident Response: Assist in the investigation and response to security incidents, such as malware infections, unauthorized access attempts, and data breaches. Vulnerability Management: Assist in conducting vulnerability assessments and penetration testing to identify potential system and network weaknesses. Work with senior team members to apply patches and updates to mitigate More ❯