What You'll Be Working On: ️ Designing, implementing, and managing security architectures for cloud environments (AWS, Azure, Google Cloud) ️ Conducting risk assessments and vulnerability assessments on cloud infrastructure to identify and mitigate security threats ️ Managing and securing cloud-based services, including identity and access management (IAM), encryption, and data protection ️ Collaborating with DevOps and development teams to integrate security More ❯
Support bioinformaticians in building pipelines that are secure by design, version-controlled, and deployed through automated workflows. Collaborate with engineering teams to embed security throughout the development lifecycle. Automate vulnerability assessments to proactively identify and mitigate risks. Work closely with the security team to integrate best practices into new and existing features. Ensure compliance with security standards and regulations More ❯
testing for embedded systems, IoT devices while ensuring compliance with industry regulations Work alongside client R&D teams to lead on secure code reviews, threat modeling, security risk assessments, vulnerability assessments and validation and verification of controls Monitor emerging cybersecurity threats in the IoT and medical device landscape and write though leadership to showcase PA's point of view More ❯
for a driven technology auditor who wants to play a role in audit execution which focuses on the review of technology processes, the analysis of risks involved, and the assessment of the design and operating effectiveness of the controls implemented to mitigate the risk. Audits may include the assessment of areas such as access management, IT operations, job … scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerabilityassessment and penetration testing, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology consulting or other relevant industry experience Basic understanding of software More ❯
optimise, automate and improve relevant systems. The Role The Principal Security Analyst will support busy pods on more complex issues, lead and coordinate threat hunting activities, perform and lead vulnerabilityassessment activities and perform SIEM-based event analysis, incident triage and coordinate incident response activities. Furthermore, the Principal Security Analyst will actively collaborate with other analysts and enhance … IT Security Operations in large and complex organisations Some coding ability Beneficial Splunk Palo Alto (XDR/XSIAM) Skills in Forensics Experience or interest in Reverse Engineering, Malware Analysis, Vulnerability Research Industry recognised qualifications (eg. SANS, OSCP, ISC2) Security Clearance Eligibility for UK SC will be sought but won’t be required from the start. Remote Working This role More ❯
Monitor organisational changes and support audits of high-risk activities, assets, and third parties. Ensure compliance with statutory, regulatory, and contractual obligations, aligning security activities with business priorities. Streamline assessment and audit processes to reduce operational burden. Collaborate with product and service teams to identify and remediate compliance gaps and manage associated risks. About us The NHS England board … of techniques, roles, and responsibilities in providing technical or business guidance to clients, both internal and external; ability to apply this knowledge appropriately to diverse situations. Extensive knowledge of vulnerabilityassessment tools, techniques, models, and systems; ability to utilise the knowledge to identify vulnerabilities on networks, operating systems, mobile applications, etc Skills and Experience Essential Specialist knowledge of More ❯
a Security Engineer to join their growing team. Title: Security Engineer Salary: Up to £85,000 Location: Remote Job Type: Full-Time, Permanent Key Responsibilities: Conduct penetration testing and vulnerability assessments across AWS environments Implement and manage cloud security best practices for SaaS platforms Support security controls, monitoring, and incident response in multi-cloud environments Collaborate with DevOps and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harrison Holgate
Administer and support Microsoft platforms and enterprise tools. Troubleshoot Windows operating systems and Microsoft applications. Support cloud-based solutions, including SaaS applications and integration technologies. Assist with cybersecurity controls, vulnerability assessments, compliance auditing, and security operations. Provide clear, non-technical explanations of IT concepts to colleagues across the business. Key Requirements 5+ years' IT experience in financial services (insurance More ❯
as Active Directory, DNS, DHCP, and email systems Support employee workstations, software provisioning, and user permissions Document infrastructure configurations, processes, and changes Assist in 3rd party IT audits and vulnerability assessments Provide out-of-hour support as needed and last line technical support for the customer support team Skills and experience 3-5 years of experience in IT infrastructure More ❯
as Active Directory, DNS, DHCP, and email systems Support employee workstations, software provisioning, and user permissions Document infrastructure configurations, processes, and changes Assist in 3rd party IT audits and vulnerability assessments Provide out-of-hour support as needed and last line technical support for the customer support team Skills and experience 3-5 years of experience in IT infrastructure More ❯
CRM's UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
CRM's UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
CRM’s UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
legacy CRMs UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
legacy CRMs UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
Office, Security Operation Centre of Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and in line with local regulations.The ideal candidate will be responsible for managing information security systems, ensuring compliance with … respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on … MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Experience with security tools and technologies such as intrusion detection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for More ❯
availability of Marex's critical systems Contributing to the organisation's security standards and procedures Assessing and approving requests Assisting ISO and/or lead security projects such as vulnerability scanning, DLP and/or privileged access monitoring Participating in 3rd party monitoring activities; Advising IT and business on security matters Building connectors to various 3rd party products and … services Maintenance and development of the in-house security framework Supporting vulnerabilityassessment scans and collaborating with other teams on remediation approach Collaborating with technology teams for incident handling, patching disciplines, and system hardening frameworks Collaborating with the Information Technology team on deployment, operation, and continual improvements of security solutions Collaborating with software developers to secure proprietary applications More ❯
security measures throughout the lifecycle, from data ingestion to model deployment. Required Skills/Experience The ideal candidate will have the following: Strong understanding of cybersecurity principles, threat modeling, vulnerabilityassessment, and penetration testing. Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Knowledge of data privacy regulations (GDPR, CCPA) and industry standards. Ability to identify More ❯
Croydon, London, United Kingdom Hybrid / WFH Options
Gold Group
following : * In-depth knowledge of cybersecurity frameworks, tools, and technologies * Strong understanding of networking protocols, cloud security, and secure software development principles * Experience with incident response, risk management, and vulnerabilityassessment * Familiarity with regulatory compliance and standards (e.g. GDPR, ISO 27001) * Experience in an organisation running or being part of an ISO27001 adoption project * Incident management & change Management More ❯
South Croydon, Surrey, England, United Kingdom Hybrid / WFH Options
Gold Group Ltd
following : * In-depth knowledge of cybersecurity frameworks, tools, and technologies* Strong understanding of networking protocols, cloud security, and secure software development principles* Experience with incident response, risk management, and vulnerabilityassessment* Familiarity with regulatory compliance and standards (e.g. GDPR, ISO 27001)* Experience in an organisation running or being part of an ISO27001 adoption project* Incident management & change Management More ❯
shared across the team. Partner with security operations, SOC analysts, and developers to ensure WAF is aligned with application updates and new releases. Support threat modelling, security testing, and vulnerability assessments with a WAF focus. Required Skills & Experience Strong expertise with Web Application Firewalls (eg, F5 ASM/Advanced WAF, Imperva, Akamai Kona, Cloudflare, AWS WAF, Azure WAF). More ❯
Mid/Senior Penetration Tester to join our dynamic team based in Belfast. As a Pen Tester, you will be part of the delivery team, conducting penetration tests and vulnerability assessments across a range of technologies and a wide range of customers including software, fintech, manufacturing, engineering, legal, and public sector. Your insights will be crucial in identifying security More ❯
looking for a Penetration Tester to join our dynamic team based in Belfast. As a Pen Tester, you will be part of the delivery team, conducting penetration tests and vulnerability assessments across a range of technologies and a wide range of customers including software, fintech, manufacturing, engineering, legal, and public sector. Your insights will be crucial in identifying security More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
InfinityQuest Ltd,
Requirements: Understand and analyse vulnerability data before they becomes overdue Organize and create work packages for teams for resolution Ensure fixes begin within SLA to prevent delays Help prioritize overdue and upcoming vulnerabilities effectively. Collaborate across teams to streamline technical remediation efforts." Understanding of vulnerabilityassessment and remediation processes Ability to triage and create meaningful work packages More ❯
maintain virtualised environments (e.g., VMware, Hyper-V) to facilitate scalable and secure development processes. This includes configuring virtual machines, monitoring system health, and automating deployment workflows for seamless operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate … advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits, and patch management for both IT and OT systems. Collaborate with cybersecurity and product teams to address vulnerabilities, apply security patches … security settings. Virtualisation: Expertise in virtualisation technologies such as VMware and Hyper-V, with a demonstrated ability to set up, maintain, and optimise virtual environments for industrial applications. Cybersecurity & Vulnerability Management: Strong understanding of cybersecurity practices and vulnerability management for both IT and OT systems. Experience implementing vulnerability assessments reports, securing systems, and applying necessary patches or More ❯