current landscape with regards to lateral movement and areas where risks can be reduced. Monitor and analyse network traffic to identify potential security threats and lateral movement activities. Conduct vulnerability assessments and penetration testing to identify weaknesses in the network. Assist in the development and implementation of security controls to mitigate risks associated with lateral movement protocols. Collaborate with … with a focus on network security and analysis. Strong knowledge of malicious lateral movement techniques and mitigation strategies. Experience with security tools and technologies (e.g., SIEM, IDS/IPS, vulnerability scanners, host-based firewalls). Excellent analytical and problem-solving skills. Relevant certifications such as CEH, CompTIA Security+, or GIAC are highly desirable. Previous job roles that may indicate More ❯
Loughton, England, United Kingdom Hybrid / WFH Options
Talkspirit
service and responsible lending. Role Summary This is an initial 6-month contract for an experienced DevSecOps Engineer focused on securing Azure infrastructure, integrating security automation, PCI DSS compliance, vulnerability testing, and incident response. The role involves developing and maintaining secure Azure DevOps pipelines and Infrastructure as Code (IaC) using Terraform, mentoring an internal engineer, and managing Sentinel, Defender … Leverage Azure Security Centre, Microsoft Defender, and Sentinel for security monitoring. Oversee SOAR solutions including SOC Prime. Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Conduct vulnerability assessments and penetration testing. Ensure PCI DSS compliance through audits and risk assessments. Implement DNS security solutions. Develop incident response processes with third-party support. Develop SIEM solutions, logging … with external security partners. Ensure comprehensive documentation for post-contract continuity. Minimum Requirements Strong expertise in Azure security, Microsoft Defender, and Sentinel. Experience with SOAR technologies, penetration testing, and vulnerability assessments. Proficiency with Terraform and IaC security automation. Knowledge of DevOps pipelines, PCI DSS, SIEM, and security frameworks. Scripting skills (Python, Bash, PowerShell). Excellent interpersonal skills and ability More ❯
Security Position Overview: Squarepoint is seeking an Information Security Analyst to join the Security Operations team. The Information security Analyst provides first line of support for security inquires, manages vulnerability assessments, assesses third-party vendors and software requests, and investigates and responds to security alerts. The ideal candidate has a strong technical foundation, problem-solving skills and a passion … tasks and analysis. Nice to have : 1-2 years of exposure to security operations or a relevant IT role. Experience with security tools such as EDR, SIEM, firewalls, and vulnerability scanning tools. Knowledge of cloud security concepts and practices. Solid understanding of Windows and Linux systems security. Exposure to penetration testing techniques, tools, and methodologies. Relevant security certifications (e.g. More ❯
networks * Resolves highly complex malware and intrusion issues * Evaluate/Implement new cyber security tools as well as policies to enhance Draper's security posture * Conducts network or software vulnerability assessments and penetration testing utilizing reverse engineering techniques. * Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks More ❯
and work closely with third-party cyber security service providers. Manage and optimize security tools, including endpoint protection, Microsoft Intune, Entra, Azure, and external detection and response tools. Conduct vulnerability assessments and coordinate patch management cycles. Collaborate with infrastructure and support teams to ensure secure configurations of networks, endpoints, applications, and services. Collaborate with non-technical end-users on More ❯
and work closely with third-party cyber security service providers. Manage and optimize security tools, including endpoint protection, Microsoft Intune, Entra, Azure, and external detection and response tools. Conduct vulnerability assessments and coordinate patch management cycles. Collaborate with infrastructure and support teams to ensure secure configurations of networks, endpoints, applications, and services. Collaborate with non-technical end-users on More ❯
vulnerabilities or breaches. Collaborate with teams to resolve performance issues and ensure business continuity. Monitor and maintain security infrastructure, including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and remediation. Perform root cause analysis More ❯
policies, standards, and procedures to ensure compliance with regulatory requirements. Collaborate with clients to understand their security needs and provide tailored solutions. Lead security assurance activities, including risk assessments, vulnerability assessments, penetration testing, and threat modelling techniques such as MITRE ATT&CK, STRIDE, DREAD, and PASTA. Provide expert guidance on security controls and measures to protect cloud infrastructure and More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active customers in over 700 business locations. Due to business requirements … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely …/Dashboard reports for the relevant stakeholders and alleviate the workload of the IT Service desk function when required. The primary responsibilities of the role is to perform daily assessment of vulnerabilities identified by internal and external scans. Evaluate, risk assess and rate the results of the scan, prioritise all vulnerabilities discovered and remediate/patch within the established More ❯
City of London, London, United Kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active customers in over 700 business locations. Due to business requirements … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely …/Dashboard reports for the relevant stakeholders and alleviate the workload of the IT Service desk function when required. The primary responsibilities of the role is to perform daily assessment of vulnerabilities identified by internal and external scans. Evaluate, risk assess and rate the results of the scan, prioritise all vulnerabilities discovered and remediate/patch within the established More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) - 18 months Our client is a globally recognized, successful bank providing retail and corporate financial services/products. With over 10 million active customers across more than 700 locations, we are seeking an experienced Senior Compliance Officer, Monitoring & Assurance. Please note: This is a hybrid role with 3 days in … Security principles, standards, and regulations (ISO 27001, NIST, CIS, PCI DSS, GDPR). Experience with Patch Management Applications, EDR/XDR systems, Antivirus, NAC (e.g., Forescout). Knowledge of Vulnerability Scanning Tools (e.g., Tenable One, Qualys). Familiarity with vulnerability scoring systems (CVSS/CMSS). Incident Response & Forensic Management skills. Support experience with Azure, Oracle Cloud Infrastructure. More ❯
London, England, United Kingdom Hybrid / WFH Options
Techwaka
Title: Security Analyst Location: Remote Job Summary: We are seeking a skilled and experienced Security Analyst to join our team. The ideal candidate will have a strong background in vulnerability management and experience working with Security Information and Event Management (SIEM) tools such as Microsoft Sentinel. You will play a critical role in ensuring the security of our cloud … environments, infrastructure, and business units by identifying, analyzing, and addressing vulnerabilities and threats. Key Responsibilities: Vulnerability Management: Develop, implement, and operate vulnerability management capabilities using tools like Tenable One. Deploy, configure, and manage vulnerabilityassessment tools (e.g., Tenable, NCSC's Active Cyber Defence Toolkit) and Attack Surface Management tools. Deliver a seamless vulnerability management service … alignment on security initiatives. Translate complex security issues into clear, actionable items for both technical and non-technical stakeholders. Security Operations: Lead and deliver core security operations focused on vulnerability management. Verify the effectiveness of security measures across the entire estate, ensuring compliance with security policies and standards. Qualifications: Proven experience in vulnerability management and the use of More ❯
are ready for the challenges of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security weaknesses in web, mobile, and … play a hands-on role in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & VulnerabilityAssessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including demonstrating the business impact of … system administrators. Keep up to date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerability management program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work with stakeholders to develop mitigation strategies. Conduct regular security risk assessments and develop action More ❯
network solutions, develop robust security strategies, and ensure that their systems remain resilient against attacks. You will work closely with cross-functional teams to enforce security best practices, conduct vulnerability assessments, and respond to potential security incidents. Your expertise will be instrumental in safeguarding their infrastructure and ensuring compliance with industry standards. Key Responsibilities: Design, implement, and maintain secure … mitigate cybersecurity risks. Develop security strategies, policies, and frameworks to enhance organisational security. Install, configure, and manage firewalls, intrusion detection systems (IDS), and other security technologies. Conduct penetration testing, vulnerability assessments, and security audits to identify and remediate risks. Monitor networks and systems for security breaches, investigate incidents, and coordinate response efforts. Stay updated with the latest security standards … frameworks, risk management, and compliance standards (ISO 27001, NIST, GDPR). Hands-on experience with firewalls, IDS/IPS, endpoint protection, and other security tools. Expertise in penetration testing, vulnerabilityassessment, and security monitoring. Knowledge of encryption protocols, authentication mechanisms, and network security principles. Relevant certifications such as CISSP, CISM, CEH, or OSCP are a plus. Strong analytical More ❯
London, England, United Kingdom Hybrid / WFH Options
watchTowr
cloud infrastructures, ensuring robust protection against potential threats. Endpoint Management and Administration : Overseeing the deployment, configuration, and maintenance of endpoint security solutions to safeguard all devices within the organisation. VulnerabilityAssessment and Management : Conducting regular vulnerability assessments, analysing findings, and coordinating remediation efforts to enhance our security posture. Implementation of Security Controls : Deploying security measures that not … cloud platforms (AWS), including the design and implementation of security architectures and controls. Endpoint Security : Hands-on experience with endpoint protection solutions, ensuring devices are safeguarded against potential threats. Vulnerability Management : Proficiency in conducting vulnerability assessments using industry-standard tools and methodologies, and managing remediation processes. Compliance and Security Controls : Familiarity with implementing security controls aligned with frameworks More ❯
goals and industry standards. Take ownership of security project execution, prioritizing tasks and aligning initiatives with team and company objectives. Use and optimize advanced security tools, including SIEMs and vulnerability scanners, to enhance detection, logging, and analysis capabilities. Conduct regular and detailed vulnerability assessments, identifying gaps in security controls and implementing mitigation strategies. Support compliance efforts, ensuring documentation … of operating system, networking, and application hardening for Windows, macOS, and Linux, including virtualization security. Experience deploying, maintaining, and administering security technologies like IDS, DLP, FIM, firewalls, SIEM, MFA, vulnerabilityassessment tools, web proxies, and WAFs. Experience with cloud providers and Infrastructure as Code (IaC) tools, such as Terraform, Ansible, or CloudFormation. Proficiency in AWS security best practices. More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
McLaughlin & Harvey
alerts generated within security monitoring tools. Stay informed on cybersecurity trends, issues, and emerging threats, and help promote a culture of security awareness and compliance across the group. Conduct vulnerability assessments to identify potential gaps and weaknesses and propose suitable improvements. Contributing to the maintenance and continuous improvement of our ISMS to make sure systems are as secure as … improve Business Continuity and Disaster Recovery plans. Contribute to the IT risk register and mitigation plans. Ensure Endpoint security compliance, including Mobile Device Management. Organise audits, external and internal vulnerability scans, web, infrastructure and application penetration tests and ensure remediation of any issues. Assisting with ISO27001 & Cyber Essentials Plus certifications and GDPR compliance. Provide ad-hoc assistance in monitoring … with technical and non-technical colleagues at all levels in the organisation. Essential Previous experience within a cyber/information security role. Strong knowledge and understanding of security risk assessment, including security testing principles and tools. Network, operating system, application and organisational security concepts. An investigative and analytical nature with a focus on ensuring the organisation is as secure More ❯
solid foundation in hands-on cyber defence Proficiency with tools such as SIEM, PAM, web/email filtering (e.g. Mimecast), IDS/IPS, antivirus, endpoint protection, Microsoft Sentinel, and vulnerabilityassessment tools (e.g. Tenable) Strong analytical mindset and attention to detail, with a passion for detecting and mitigating threats Excellent problem-solving skills and the ability to respond More ❯
e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. Formulate HMG Information Assurance Risk Assessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST, CSF, and CSA … development of patterns and principles Working within environments utilising DevOps, DevSecOps, SRE, CI/CD, Infrastructure & Security as Code (Docker, Git, Terraform) Managing technical assessments of security related technologies, vulnerability assessments and penetration tools and techniques Enabling & informing risk-based decisions: Working with higher impact or more complex risks, advising on the impact and whether this is within risk More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Crown Commercial Service
easy to consume articles such as blogs, policies and presentations. Experience of day-to-day management of multi-disciplinary teams of cyber security professionals. Experience deploying, configuring and using vulnerabilityassessment (such as Tenable and the NCSC’s Active Cyber Defence Toolkit) and Attack Surface Management tools Experience using cloud provider monitoring tools such as AWS CloudWatch, CloudTrail More ❯
portfolio of applications/projects from inception through delivery. Ensure security controls are effectively embedded throughout the SDLC. Maintain up-to-date InfoSec policies and technical security standards. Conduct vulnerability assessments, threat modelling, and architecture reviews. What You’ll Bring Strong ability to translate technical risk into clear, actionable business terms. Hands-on experience with secure DevOps pipelines and … Azure/AWS Security. Working knowledge of GDPR, HIPAA, PCI-DSS. Familiarity with development in .NET, Java, Python, PowerShell, or Bash. Knowledge of tools like SIEM, SOAR, IDS, WAF, vulnerability management platforms. Experience with UI, API, microservices security patterns and cryptographic principles. Threat modelling and dynamic security testing skills. Background in business analysis or requirements engineering. #J-18808-Ljbffr More ❯
with business goals—without compromising operational performance. Duties and Responsibilities Support LivaNova’s cybersecurity tools and platforms. Investigate potential threats and incidents; conduct triage and escalate as needed. Support vulnerability management efforts by scanning, reporting, and tracking remediation. Assist in the implementation of security controls across infrastructure, endpoints, and cloud environments. Respond to phishing, malware, and unauthorized access alerts … Familiarity with security and compliance frameworks (ISO 27001, NIST CSF/800-53/800-171, HIPAA, etc.). Understanding and experience with computer networking fundamentals, operating systems, SIEM, vulnerability scanning, EDR, email and cloud security platforms. Experience with platforms such as CrowdStrike and Splunk is a plus. Experience in penetration testing, threat/vulnerability assessments, and operational More ❯
for Assessing security risks, developing robust security policies, and implementing effective solutions to protect sensitive information. You will work closely with clients to understand their unique security needs, conduct vulnerability assessments, and provide recommendations for improving their security posture. Your expertise will be crucial in ensuring compliance with industry standards and regulations, as well as in responding to security … incident response plans. If you are passionate about information security and enjoy solving complex problems, we encourage you to apply for this exciting opportunity Responsibilities: Conduct security assessments and vulnerability analyses. Develop and implement information security policies and procedures. Advise clients on best practices for data protection and risk management. Monitor networks and systems for security breaches and incidents. More ❯
on proactive defense mechanisms. Develop a comprehensive strategy for data protection (encryption, tokenization, masking) across the data lifecycle. Oversee security tool integration in CI/CD pipelines to automate vulnerability detection and resolution. Conduct vulnerability assessments, network security audits, and code reviews to ensure application and infrastructure security. Guide engineering teams to adopt secure development practices and ensure More ❯
on, focusing on stakeholder engagement. Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat detection and response. Collaborate with More ❯