City, Edinburgh, United Kingdom Hybrid / WFH Options
Deloitte LLP
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
You will: The role involves continuously monitoring the organisation's network and systems for potential security breaches while conducting threat analysis, risk assessments, and vulnerability assessments. By identifying security risks, the position requires providing recommendations and implementing measures to remediate vulnerabilities and strengthen cyber defences. In the event of More ❯
You will: The role involves continuously monitoring the organisation's network and systems for potential security breaches while conducting threat analysis, risk assessments, and vulnerability assessments. By identifying security risks, the position requires providing recommendations and implementing measures to remediate vulnerabilities and strengthen cyber defences. In the event of More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Motability Operations
have experience designing and implementing security measures that protect sensitive information in complex environments. Your technical expertise spans areas such as encryption, access controls, vulnerability assessments and incident response. You have excellent problem-solving skills and a proactive mindset, enabling you to anticipate potential threats and address them effectively. More ❯
Employment Type: Permanent, Part Time, Work From Home
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
have experience designing and implementing security measures that protect sensitive information in complex environments. Your technical expertise spans areas such as encryption, access controls, vulnerability assessments and incident response. You have excellent problem-solving skills and a proactive mindset, enabling you to anticipate potential threats and address them effectively. More ❯
Employment Type: Permanent, Part Time, Work From Home
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
required, as well as overseeing and maintaining an outsourced SOC team and additional cyber security partners. Additionally, facilitating and overseeing audits, penetration tests and vulnerability assessments and driving remedial actions and improvements will form a large part of the role. Other accountabilities will include: Review, recommend and or update More ❯
ensure secure access and enforce the principle of least privilege. Implement AWS security services (WAF, Shield, GuardDuty, Inspector) to safeguard cloud resources. Perform regular vulnerability assessments and implement proactive measures to mitigate security risks. Lead security incident response, conduct root cause analysis, and deploy corrective actions. Automate security tasks More ❯
to security events across a complex, multi-departmental IT environment. You'll maintain and use key security tools such as SIEM, IDS, EDR, and vulnerability management platforms. You will work closely with system owners and users to assess configurations, analyse logs, and improve security controls and procedures. In addition … career experience in a relative field Hands-on experience with security monitoring and incident response technologies such as SIEM, IDS and EDR. Experience with vulnerabilityassessment including practical assessments for risk analysis. A strong working knowledge of at least one major operating system (Windows, Linux, or MacOS). More ❯
teams to establish and enforce network access policies, ensuring that only authorized individuals and devices have the correct access privileges. Proactive Security Testing and Vulnerability Management Conduct vulnerability assessments and penetration testing to identify and address security weaknesses in mobile network architectures. Develop and enforce security policies and … together with system administrators and application owners to resolve discovered vulnerabilities by applying necessary patches or making configuration adjustments. Create and sustain a thorough vulnerability management program that includes tracking vulnerabilities, assessing risks, and planning remediation strategies. Engage in network security incident response efforts by providing technical expertise and … Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR, HIPAA, ISO 27001). In-depth understanding of routers, switches, firewalls, and switching/routing More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Broadstone
external vendors to maintain robust cybersecurity measures. This is a hands-on, fast-paced role where you'll be involved in monitoring security, conducting vulnerability assessments, responding to incidents, and performing security audits. Plus, you'll have the opportunity to shape and improve our cybersecurity strategy, tools, and practices More ❯
stack. What Excites You Develop world-class security practices and controls within a high-growth financial technology business shaping the future of payments. Conduct vulnerability assessments, penetration testing, and risk analysis to identify and mitigate security weaknesses. Embed security by design and threat modelling principles into product development. Lead More ❯
ensure their accurate functioning. Review the configuration of different systems to evaluate security controls. Handle daily requests through the corporate IT ticketing system. Conduct vulnerability assessments and security evaluations of complex systems. Develop and maintain comprehensive security testing plans. Automate security testing processes for networks, systems, and applications where More ❯
Roles and Responsibilities Internal Cybersecurity Program: Develop, implement, and oversee the organization's comprehensive cybersecurity strategy, policies, and procedures. Conduct regular risk assessments and vulnerability assessments to identify potential threats. Manage cybersecurity incident response and recovery plans. Ensure compliance with relevant industry regulations and standards. Build and maintain a More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Michael Page (UK)
IT infrastructure, including networks, servers, and cloud environments. Implement, monitor, and manage security solutions such as firewalls, IDS/IPS, and endpoint protection. Conduct vulnerability assessments on the infrastructure. Ensure compliance with regulatory requirements (e.g., GDPR, ISO 27001) and industry best practices. Investigate security incidents, perform root cause analysis More ❯
and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS More ❯
Omagh, Northern Ireland, United Kingdom Hybrid / WFH Options
Digital Waffle
and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS More ❯
Londonderry, Northern Ireland, United Kingdom Hybrid / WFH Options
Digital Waffle
and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Digital Waffle
and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
detection/prevention systems (IDS/IPS). Ensure compliance with industry regulations and best-practices (GDPR, HIPAA, PCI-DSS, CIS). Conduct regular vulnerability assessments and implement security patches and updates. Collaboration and Documentation Work closely with other IT teams across the business and across the wider organisation More ❯