we make it easy to get things sorted, stay compliant, and move forward with confidence. Responsibilities: Manage client relationships Perform system audits to assess compliance and security posture Conduct vulnerability assessments and identify risks Carry out technical remediations in client environments Audit results and produce clear, professional reports Training to keep up to date with industry trends Communicate technical More ❯
Dundee, Angus, Scotland, United Kingdom Hybrid / WFH Options
Reed
assets within ATM infrastructure. Stay current with emerging security trends and integrate advanced technologies and strategies to prevent card fraud, system vulnerabilities and operational liabilities. Conduct comprehensive risk and vulnerability assessments of ATM systems and deliver data-driven solutions to senior management. Effectively prioritise the level of risk/vulnerabilities, define strategies and roadmaps to implement reactive and preventive More ❯
staff to support infrastructure needs and maintain comprehensive documentation of systems and procedures Security Management: implement and maintain security best practices for infrastructure, including patch management, antivirus solutions, and vulnerability assessments (Support) The automation of recurrent activities Propose harmonisation of existing automation developments. Participate in the Day-to-Day service support (incident, alerts, changes. Provide on-call support during More ❯
e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. Formulate HMG Information Assurance Risk Assessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST, CSF, and CSA … development of patterns and principles Working within environments utilising DevOps, DevSecOps, SRE, CI/CD, Infrastructure & Security as Code (Docker, Git, Terraform) Managing technical assessments of security related technologies, vulnerability assessments and penetration tools and techniques Enabling & informing risk-based decisions: Working with higher impact or more complex risks, advising on the impact and whether this is within risk More ❯
throughout the solution lifecycle, from initial design through development, testing, and into operational deployment. Demonstrate a strong understanding of leading operational security functions, including SOC operations, threat intelligence, and vulnerability management. Experience of managing the incident response lifecycle, including triage, containment, investigation, remediation, and conducting post-incident reviews. Ability to establish and improve incident response playbooks and escalation processes … risk owners to advise on exposure and inform proportionate, evidence-based decisions. Demonstrate capability in planning, scoping, and reviewing security assurance activities, including penetration tests, IT health checks, and vulnerability assessments. Ability to interpret technical findings and ensure remediation actions are appropriately prioritised and managed through to resolution. Experience of maintaining a technical risk register and developing appropriate compensating More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
DMS Computer Recruitment
of the position include: Design and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments Participate More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
robust and secure technology framework. Job Description Work with managed service provider for cyber security incident management Proactively conduct threats detection and improve threats detection and management process Conduct vulnerability assessments, ensure the remediation and recommend improvements to mitigate risks. Develop security playbooks Work with engineering team to implement security tools and controls Scope penetration testing and review related … newly acquired businesses Provide guidance and training to staff on cybersecurity best practices. The Successful Applicant Proven experience in cyber security operations including threats hunting, detection and response, vulnerabilities assessment remediation Familiarity with data protection regulations and compliance requirements such as ISO27001, GDPR Solid experience in SIEM tools, preferably Microsoft Sentinel Relevant certifications are desirable. Excellent stakeholder management skill More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Michael Page Technology
a robust and secure technology framework. Description Work with managed service provider for cyber security incident management Proactively conduct threats detection and improve threats detection and management process Conduct vulnerability assessments, ensure the remediation and recommend improvements to mitigate risks. Develop security playbooks Work with engineering team to implement security tools and controls Scope penetration testing and review related … posture to newly acquired businesses Provide guidance and training to staff on cybersecurity best practices. Profile Proven experience in cyber security operations including threats hunting, detection and response, vulnerabilities assessment remediation Familiarity with data protection regulations and compliance requirements such as ISO27001, GDPR Solid experience in SIEM tools, preferably Microsoft Sentinel Relevant certifications are desirable. Excellent stakeholder management skill More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions
advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethical hacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce executive reporting on cyber threats, risks, and remediation progress Collaborate … scale. This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Lead Red Team Operator, Red Team Lead, Ethical Hacker, Security Tester, Vulnerability Analyst, Offensive Security Specialist, Threat Intelligence Analyst. Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
RSM UK
enthusiastic Cyber Security Consultant to join our team. Working alongside our experienced team of specialists, you'll deliver offensive security services including digital footprint reconnaissance, social engineering, penetration testing, vulnerability assessments, and more to high-profile clients across all industries. The purpose of this role is to deliver offensive security services such as digital footprint reconnaissance, social engineering, vulnerabilityMore ❯