and intrusion detection/prevention systems (IDS/IPS) Ensure compliance with industry regulations and best-practices (GDPR, HIPAA, PCI-DSS, CIS) Conduct regular vulnerability assessments and implement security patches and updates Collaboration and Documentation Work closely with other IT teams across the business and across the wider organisation More ❯
and problem-resolution strategies. Performance Monitoring & Optimization: Utilize to proactively enhance system performance. Security & Compliance: Ensure adherence to industry best practices, including patch management, vulnerability assessments, and security hardening (e.g., CIS benchmarks, STIG compliance). Automation & Scripting: Develop automation scripts using Bash, Python, or Ansible to streamline system operations More ❯
and Network Security delivery teams. Clearly articulate and position Bytes' cybersecurity services, including Network Security, Compliance & Assurance (ISO 27001, PCI DSS), penetration testing, and vulnerability assessments. Provide thought leadership, offering expert guidance to customers, ensuring Bytes remains aligned with customer-specific requirements and outcomes. Maintain independence and objectivity in More ❯
Leominster, Herefordshire, United Kingdom Hybrid / WFH Options
Leidos
solutions. Performance Monitoring & Optimization: Utilize tools to monitor and fine-tune system performance. Security & Compliance: Ensure adherence to industry best practices, including patch management, vulnerability assessments, and security. Automation & Scripting: Develop automation scripts using Bash, Python, or Ansible to streamline system operations and deployments. Documentation & Knowledge Sharing: Maintain technical More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. … problem-solving abilities to translate business requirements into technical solutions. Collaboration and Influence: Effective communicator capable of navigating organizational complexities and influencing without authority. Vulnerability Management: Expertise in managing vulnerabilities across diverse assets and implementing application security in cloud environments. Security tooling: experience in any of the following; (Wiz More ❯
manager on standards and policy changes Qualifications Experience or deep knowledge of key activities within software security group such Threat Modeling/Application Risk Assessment, Vulnerability Assessments, Governance and Metrics, Training, etc. Pre-requisites for this position are a Bachelor's Degree with 4 - 6 years' experience in … infrastructure vulnerabilities is required Experience in source code management,build and deployment technologies such as RLM, Ueploy, Jenkins, Artifactory, Maven, GitHub, etc Experience conducting vulnerability assessments and articulating security issues to technical and non-technical audience. Understanding of Snyk, Checkmarx, CDXGen, Dependency Track, Fortify, GitHub Adcance Security, Sonatype or More ❯
technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerabilityassessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and More ❯
technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerabilityassessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and More ❯
technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerabilityassessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and More ❯
technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerabilityassessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and More ❯
control frameworks (e.g. NIST, ISO) * Good technical background (i.e. Network Security, Endpoint Security, Email Security, Cloud Security) * The ability to carry out risk and vulnerability assessments and create solutions/strategies * Confidence engaging with different stakeholders and managing vendors * Understanding around Business Change (how to take a concept and More ❯
control frameworks (e.g. NIST, ISO) * Good technical background (i.e. Network Security, Endpoint Security, Email Security, Cloud Security) * The ability to carry out risk and vulnerability assessments and create solutions/strategies * Confidence engaging with different stakeholders and managing vendors * Understanding around Business Change (how to take a concept and More ❯
and Network Security delivery teams. Clearly articulate and position Bytes' cybersecurity services, including Network Security, Compliance & Assurance (ISO 27001, PCI DSS), penetration testing, and vulnerability assessments. Provide thought leadership, offering expert guidance to customers, ensuring Bytes remains aligned with customer-specific requirements and outcomes. Maintain independence and objectivity in More ❯
secure software development practices in compliance with FDA, IEC 62304, and ISO 27001. Implement identity management, authentication, and data encryption strategies. Conduct threat modeling, vulnerability assessments, and penetration testing. Address cybersecurity challenges in connected medical devices and healthcare IoT. Unit Testing, Quality Assurance & Documentation Implement automated testing frameworks for More ❯
systems Contributing to the organisation's security standards and procedures Assessing and approving requests Assisting ISO and/or lead security projects such as vulnerability scanning, DLP and/or privileged access monitoring Participating in 3rd party monitoring activities; Advising IT and business on security matters Building connectors to … various 3rd party products and services Maintenance and development of the in-house security framework Supporting vulnerabilityassessment scans and collaborating with other teams on remediation approach Collaborating with technology teams for incident handling, patching disciplines, and system hardening frameworks Collaborating with the Information Technology team on deployment More ❯
environments using SIEM and EDR tools. Incident Investigation: Investigate security incidents and support the full incident response lifecycle, including documentation and root cause analysis. Vulnerability Assessments: Conduct regular vulnerability assessments and collaborate with IT teams to ensure timely remediation. Regulatory Compliance: Support compliance with regulatory requirements (FCA, PRA … trends, and regulatory changes affecting the financial sector.About you: - Security Tools Expertise: Strong understanding of security tools (SIEM, EDR, firewalls, IDS/IPS) and vulnerability management processes. Technical Knowledge: Solid grasp of networking, system administration, and secure configurations. Standards Familiarity: Familiarity with standards and frameworks such as ISO More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
The Nottingham
environments using SIEM and EDR tools. Incident Investigation: Investigate security incidents and support the full incident response lifecycle, including documentation and root cause analysis. Vulnerability Assessments: Conduct regular vulnerability assessments and collaborate with IT teams to ensure timely remediation. Regulatory Compliance: Support compliance with regulatory requirements (FCA, PRA … and regulatory changes affecting the financial sector. About you: Security Tools Expertise: Strong understanding of security tools (SIEM, EDR, firewalls, IDS/IPS) and vulnerability management processes. Technical Knowledge: Solid grasp of networking, system administration, and secure configurations. Standards Familiarity: Familiarity with standards and frameworks such as ISO More ❯
with business objectives and regulatory requirements, establishing and enforcing cybersecurity policies, standards, and guidelines to protect assets and data. Conduct regular risk assessments and vulnerability analyses to identify potential threats and weaknesses in the infrastructure, implementing and overseeing risk management processes, ensuring that appropriate controls and countermeasures are in … higher education or similarly complex organisation, including management of staff and resources Experience of gathering operational evidence on the performance of cyber security using vulnerabilityassessment tools An awareness and understanding of networking and communication related concepts and cloud virtualisation techniques Qualifications Educated to degree level in Cybersecurity More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC … Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & Penetration Testing: Review Penetration Testing, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk … cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetration testing, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of More ❯
Employment Type: Contract, Work From Home
Rate: From £500 to £700 per day (direct contract with the client)
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
security measures throughout the life cycle, from data ingestion to model deployment. Skills and Qualifications: Security Expertise: Strong understanding of cybersecurity principles, threat modelling, vulnerabilityassessment, and penetration testing. Cloud Computing: Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Data Privacy and Compliance: Knowledge of More ❯
Governance, Risk, and Compliance) SECOPS (Security Operations) Digital Identity You'll gain experience with industry-leading security technologies and practices, including firewalls, SIEM tools, vulnerabilityassessment, and more. As you apply your skills, you'll be mentored by industry experts and work in a high-performing team. Why More ❯
exposure to parallel processing environments used for large-scale analytics. An appreciation of security best practice in areas such as network security, threat modelling, vulnerabilityassessment, IAM, SIEM and incident response. Skills in system monitoring, performance tuning, and troubleshooting infrastructure and micro-service-based architectures. Understanding of compliance More ❯
hosted environments. Security and Compliance: Implement and maintain robust security protocols for hosted solutions, including firewalls, encryption, and access controls. Conduct regular security audits, vulnerability assessments, and patch management to meet compliance standards. Ensure hosted environments adhere to industry and regulatory security requirements. Utilize System Center Configuration Manager for More ❯
hosted environments. Security and Compliance: Implement and maintain robust security protocols for hosted solutions, including firewalls, encryption, and access controls. Conduct regular security audits, vulnerability assessments, and patch management to meet compliance standards. Ensure hosted environments adhere to industry and regulatory security requirements. Utilize System Center Configuration Manager for More ❯
Employment Type: Permanent
Salary: £40000 - £45000/annum Full benefits package
Albany Beck are seeking a Vulnerability Analyst with a strong background in Security Operations to join our growing consultancy team and work on a critical programme of work for a leading global investment bank. This role is pivotal in ensuring the security and resilience of the bank’s systems … by identifying, assessing, and mitigating vulnerabilities across a complex and dynamic IT landscape. As a Vulnerability Analyst, you’ll be responsible for proactively analysing security threats and system vulnerabilities across the bank’s infrastructure. You’ll work alongside security engineers, architects, and SOC teams to ensure threats are swiftly … identified and effectively mitigated. This role demands a keen analytical mindset, excellent communication skills, and deep knowledge of vulnerability scanning tools and remediation workflows in large-scale financial institutions. Key Responsibilities: Conduct regular vulnerability assessments and penetration tests across applications, infrastructure, and cloud environments. Analyse security threats and More ❯