portfolio of applications/projects from inception through delivery. Ensure security controls are effectively embedded throughout the SDLC. Maintain up-to-date InfoSec policies and technical security standards. Conduct vulnerability assessments, threat modelling, and architecture reviews. What You’ll Bring Strong ability to translate technical risk into clear, actionable business terms. Hands-on experience with secure DevOps pipelines and … Azure/AWS Security. Working knowledge of GDPR, HIPAA, PCI-DSS. Familiarity with development in .NET, Java, Python, PowerShell, or Bash. Knowledge of tools like SIEM, SOAR, IDS, WAF, vulnerability management platforms. Experience with UI, API, microservices security patterns and cryptographic principles. Threat modelling and dynamic security testing skills. Background in business analysis or requirements engineering. More ❯
portfolio of applications/projects from inception through delivery. Ensure security controls are effectively embedded throughout the SDLC. Maintain up-to-date InfoSec policies and technical security standards. Conduct vulnerability assessments, threat modelling, and architecture reviews. What You’ll Bring Strong ability to translate technical risk into clear, actionable business terms. Hands-on experience with secure DevOps pipelines and … Azure/AWS Security. Working knowledge of GDPR, HIPAA, PCI-DSS. Familiarity with development in .NET, Java, Python, PowerShell, or Bash. Knowledge of tools like SIEM, SOAR, IDS, WAF, vulnerability management platforms. Experience with UI, API, microservices security patterns and cryptographic principles. Threat modelling and dynamic security testing skills. Background in business analysis or requirements engineering. #J-18808-Ljbffr More ❯
with business goals—without compromising operational performance. Duties and Responsibilities Support LivaNova’s cybersecurity tools and platforms. Investigate potential threats and incidents; conduct triage and escalate as needed. Support vulnerability management efforts by scanning, reporting, and tracking remediation. Assist in the implementation of security controls across infrastructure, endpoints, and cloud environments. Respond to phishing, malware, and unauthorized access alerts … Familiarity with security and compliance frameworks (ISO 27001, NIST CSF/800-53/800-171, HIPAA, etc.). Understanding and experience with computer networking fundamentals, operating systems, SIEM, vulnerability scanning, EDR, email and cloud security platforms. Experience with platforms such as CrowdStrike and Splunk is a plus. Experience in penetration testing, threat/vulnerability assessments, and operational More ❯
on proactive defense mechanisms. Develop a comprehensive strategy for data protection (encryption, tokenization, masking) across the data lifecycle. Oversee security tool integration in CI/CD pipelines to automate vulnerability detection and resolution. Conduct vulnerability assessments, network security audits, and code reviews to ensure application and infrastructure security. Guide engineering teams to adopt secure development practices and ensure More ❯
on, focusing on stakeholder engagement. Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat detection and response. Collaborate with More ❯
on, focusing on stakeholder engagement. Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat detection and response. Collaborate with More ❯
on, focusing on stakeholder engagement. Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat detection and response. Collaborate with More ❯
Design and implement secure network architectures, including firewalls, VPNs, and intrusion detection systems. Monitor network traffic and respond to security incidents and breaches in a timely manner. Conduct regular vulnerability assessments and penetration tests to identify and mitigate risks. Develop and maintain security policies and best practices to align with compliance requirements. Collaborate with IT teams to ensure proper More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
KBC Technologies Group
end to end network infrastructure automation capabilities that are aligned to the strategic goals of the business and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusion detection/prevention systems, and encryption technologies. Adhere to enterprise governance & review More ❯
access, and remote gateway protection at the edge. Security Operations & Threat Defence Act as the technical escalation point for complex threat investigations and incident response. Lead red-teaming simulations, vulnerability assessments, and threat hunting activities. Support proactive telemetry monitoring and improvement of detection logic and alert fidelity. Leadership & Mentoring Provide engineering mentorship to junior analysts and engineers; lead by More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
LAGOFIRE SRL
foundation in cybersecurity principles, you have experience designing and implementing security measures that protect sensitive information in complex environments. Your technical expertise spans areas such as encryption, access controls, vulnerability assessments and incident response. You have excellent problem-solving skills and a proactive mindset, enabling you to anticipate potential threats and address them effectively. Communication comes naturally to you More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
LAGOFIRE SRL
foundation in cybersecurity principles, you have experience designing and implementing security measures that protect sensitive information in complex environments. Your technical expertise spans areas such as encryption, access controls, vulnerability assessments, and incident response. You have excellent problem-solving skills and a proactive mindset, enabling you to anticipate potential threats and address them effectively. Communication comes naturally to you More ❯
Derby, England, United Kingdom Hybrid / WFH Options
Cooper Parry
to develop, refine, and optimize detection rules and custom alerts, ensuring alerting mechanisms are aligned with evolving threat landscapes while reducing false positives and enhancing actionable insights Conduct regular vulnerability assessments, interpret scan results, and coordinate remediation efforts Investigate suspicious files and behaviors for malware; collaborate with vendors/internal teams to mitigate and prevent future infections Respond swiftly More ❯
collaborate closely with our cyber threat intelligence, advisory, and response teams to expand our digital risk business. Your responsibility will include representing our global penetration testing team, overseeing the assessment of cybersecurity programs, ensuring alignment with industry standards and regulatory requirements, and guiding clients through complex third-party audits. Key Responsibilities Cybersecurity Program Evaluation Lead cyber assurance engagements, assessing … industry standards such as NIST, ISO 27001, and other relevant frameworks. Act as a trusted advisor, ensuring client cybersecurity postures are resilient, compliant, and in line with regulatory requirements. VulnerabilityAssessment and Penetration Testing Management Represent our vulnerabilityassessment and penetration testing team Partner with the penetration testing team to incorporate findings into broader cyber assurance … across audit lifecycles. In-depth understanding of regulatory frameworks, with hands-on experience delivering compliance audits for both commercial and government sectors. In-depth understanding of penetration testing and vulnerability assessments and their integration into broader cyber assurance projects. Education & Certifications: Bachelor’s or master’s degree in information security, Computer Science, Engineering, or a related field. Relevant certifications More ❯
London, England, United Kingdom Hybrid / WFH Options
Control Risks
collaborate closely with our cyber threat intelligence, advisory, and response teams to expand our digital risk business. Your responsibility will include representing our global penetration testing team, overseeing the assessment of cybersecurity programs, ensuring alignment with industry standards and regulatory requirements, and guiding clients through complex third-party audits. Key Responsibilities Cybersecurity Program Evaluation Lead cyber assurance engagements, assessing … industry standards such as NIST, ISO 27001, and other relevant frameworks. Act as a trusted advisor, ensuring client cybersecurity postures are resilient, compliant, and in line with regulatory requirements. VulnerabilityAssessment and Penetration Testing Management Represent our vulnerabilityassessment and penetration testing team Partner with the penetration testing team to incorporate findings into broader cyber assurance … across audit lifecycles. In-depth understanding of regulatory frameworks, with hands-on experience delivering compliance audits for both commercial and government sectors. In-depth understanding of penetration testing and vulnerability assessments and their integration into broader cyber assurance projects. Education & Certifications: Bachelor’s or master’s degree in information security, Computer Science, Engineering, or a related field. Relevant certifications More ❯
London, England, United Kingdom Hybrid / WFH Options
Control Risks
collaborate closely with our cyber threat intelligence, advisory, and response teams to expand our digital risk business. Your responsibility will include representing our global penetration testing team, overseeing the assessment of cybersecurity programs, ensuring alignment with industry standards and regulatory requirements, and guiding clients through complex third-party audits. Key Responsibilities Cybersecurity Program Evaluation Lead cyber assurance engagements, assessing … industry standards such as NIST, ISO 27001, and other relevant frameworks. Act as a trusted advisor, ensuring client cybersecurity postures are resilient, compliant, and in line with regulatory requirements. VulnerabilityAssessment and Penetration Testing Management Represent our vulnerabilityassessment and penetration testing team Partner with the penetration testing team to incorporate findings into broader cyber assurance … across audit lifecycles. In-depth understanding of regulatory frameworks, with hands-on experience delivering compliance audits for both commercial and government sectors. In-depth understanding of penetration testing and vulnerability assessments and their integration into broader cyber assurance projects. Education & Certifications: Bachelor's or master's degree in information security, Computer Science, Engineering, or a related field. Relevant certifications More ❯
collaborate closely with our cyber threat intelligence, advisory, and response teams to expand our digital risk business. Your responsibility will include representing our global penetration testing team, overseeing the assessment of cybersecurity programs, ensuring alignment with industry standards and regulatory requirements, and guiding clients through complex third-party audits. Key Responsibilities Cybersecurity Program Evaluation Lead cyber assurance engagements, assessing … industry standards such as NIST, ISO 27001, and other relevant frameworks. Act as a trusted advisor, ensuring client cybersecurity postures are resilient, compliant, and in line with regulatory requirements. VulnerabilityAssessment and Penetration Testing Management Represent our vulnerabilityassessment and penetration testing team Partner with the penetration testing team to incorporate findings into broader cyber assurance … across audit lifecycles. In-depth understanding of regulatory frameworks, with hands-on experience delivering compliance audits for both commercial and government sectors. In-depth understanding of penetration testing and vulnerability assessments and their integration into broader cyber assurance projects. Education & Certifications: Bachelor's or master's degree in information security, Computer Science, Engineering, or a related field. Relevant certifications More ❯
London, England, United Kingdom Hybrid / WFH Options
Nomios Netherlands
ll work to meet your needs. Job requirements What You'll Do Deliver cyber security assurance services to identify vulnerabilities in different areas on a variety of technologies, including vulnerability assessments on external networks, internal networks, applications, and enterprise security systems. Delivering presentations to technical and non-technical stakeholders. Main role will be as a Junior Cyber Security Consultant … needed. What We're Looking For Qualifications: Relevant degree or one full year’s minimum experience in penetration testing or cyber security assurance. Experience: Some experience of cyber security assessment, vulnerability assessments, or penetration testing. Certifications: such as CPSA or CEH would be advantageous. Tools: Experience of penetration testing tools, Linux, Windows, and Active Directory. Communication: Strong verbal … oriented approach. Excellent verbal and written communication skills. Ability to work effectively under pressure. Commitment to maintaining the highest ethical and professional standards. Are you experienced in cyber security assessment, vulnerability assessments, or penetration testing and looking to further improve your skills and take on more responsibilities? If so, this opportunity is perfect for you! Seniority level Seniority More ❯
enhance the security of IT systems both on-prem and cloud. Creation of reports, dashboards, metrics for SOC operations and presentation to senior management. Oversight, planning and execution of vulnerability assessments, penetration tests, audits or related security assessment exercises (eg Red Team) to improve the security posture of the infrastructure, applications and services. Manage the remediation of identified … networks and operating systems including firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, networks and cloud services Comprehensive knowledge or experience of information security principles, including risk assessment, intrusion detection, Security Incident and Event Management (SIEM) tools, threat and vulnerability management Detailed knowledge or experience of application or network based penetration testing tools and methodologies Experience More ❯
enhance the security of IT systems both on-prem and cloud. Creation of reports, dashboards, metrics for SOC operations and presentation to senior management. Oversight, planning and execution of vulnerability assessments, penetration tests, audits or related security assessment exercises (eg Red Team) to improve the security posture of the infrastructure, applications and services. Manage the remediation of identified … networks and operating systems including firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, networks and cloud services Comprehensive knowledge or experience of information security principles, including risk assessment, intrusion detection, Security Incident and Event Management (SIEM) tools, threat and vulnerability management Detailed knowledge or experience of application or network based penetration testing tools and methodologies Experience More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sarafin Partners
security administration on designated technology platforms in accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident … maintained To succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of network infrastructure, including routers, switches More ❯
security administration on designated technology platforms in accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident … maintained To succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of network infrastructure, including routers, switches More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Sarafin Partners
security administration on designated technology platforms in accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident … maintained To succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of network infrastructure, including routers, switches More ❯
Stafford, England, United Kingdom Hybrid / WFH Options
GE Vernova
trends, ICS/OT threat landscapes, and emerging technologies, recommending tools and methods to enhance product security posture. Partner with PSL, incident response and product security teams to support vulnerability remediation, post-incident analysis, and contribute to the creation of security documentation, including architecture specs, procedures, and training materials. Represent the company in industry forums, standards bodies, and technical … C++, RTOS), as well as Linux/Windows platforms. Strong hands-on background in PKI, identity management, network security appliances, and security monitoring. Proficient in threat modeling, risk/vulnerabilityassessment, and using forensic/security analysis tools.. Excellent communication and stakeholder engagement skills, able to translate technical content for non-technical audiences. Exposure to quality improvement methodologies … vision, and prescription drug coverage; access to a Health Coach, a 24/7 nurse-based resource; and access to the Employee Assistance Program, providing 24/7 confidential assessment, counseling and referral services. Retirement benefits include the GE Retirement Savings Plan, a tax-advantaged 401(k) savings opportunity with company matching contributions and company retirement contributions, as well More ❯
identifying potential vulnerabilities, and mitigating security risks ️ Configuring and maintaining firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and other security devices ️ Conducting regular security audits and vulnerability assessments on network infrastructure ️ Collaborating with IT and security teams to develop and enforce security policies and procedures ️ Responding to and investigating network security incidents, including identifying root causes … tools (e.g., Wireshark, SolarWinds, Nagios) and security incident management tools ️ Proficiency in network administration (e.g., TCP/IP, routing, switching, VLANs, DNS, DHCP) ️ Understanding of security best practices, risk assessment, and threat mitigation techniques ️ Relevant certifications such as CISSP, CISM, CCNP Security, or CompTIA Security+ ️ Strong analytical, troubleshooting, and problem-solving skills ️ Ability to work independently and as part More ❯