designing preventative measures where you can make a genuine impact on customers' data security and business continuity, then keep reading. The role What you'll do here Azure Infrastructure Management Design, deploy, and manage scalable Azure-based infrastructure services, including IaaS, PaaS, networking and security components. Virtualisation VMware & Hyper-V Management of environments. Disaster Recovery Architect and maintain … for mission-critical systems. Security & Compliance Implement and maintain infrastructure security policies and controls aligned with industry standards (e.g., ISO 27001, NIST, CIS). Collaborate with InfoSec teams on vulnerabilitymanagement and risk mitigation. Infrastructure Automation & Optimisation Automate infrastructure deployment and configuration using tools such as PowerShell, ARM templates, or Terraform. Drive continuous improvement and cost optimisation efforts More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
CyberNorth
Strong understanding of information and IT security challenges and standards. Solid working knowledge of security technologies (e.g. Endpoint Protection, Data Protection, Cloud Security) and cyber capabilities (e.g. SIEM, SOC, VulnerabilityManagement). Familiarity with recognised frameworks such as ISO 27001, ISO 22301, NIST, COBIT, or ISF. Experience supporting security strategy within cloud-based environments. Demonstrated ability to manage More ❯
Bath, Somerset, South West, United Kingdom Hybrid / WFH Options
London & Country Mortgages
ensure these systems are fit for purpose and operational. Ideally youll have knowledge and experience with the following: 1. MS Azure knowledge, with experience of the following; Entra ID Management Azure storage accounts Azure Virtual Desktop (AVD) Azure Virtual machine management 2. MS 365 administration of; Teams Sharepoint Intune 3. On prem infrastructure experience i ncluding; Building and … when business needs change. Furthermore, whilst not essential, in addition to the Essential skills it would be desirable to have knowledge and experience of the following technologies; SSL certificate managementVulnerabilitymanagement SIEM experience (Ideally MS Sentinel) Infrastructure As Code (Ideally Terraform and Ansible) Powershell SQL Cisco Umbrella Nutanix Hyperconverged Infrastructure support Netapp Support Knowledge of and More ❯
Security allowing you to grow and develop your career. We offer full 360-degree services to our clients from initial consulting on a range of areas including Risk Assessments, VulnerabilityManagement, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, Penetration Testing and much more. We More ❯
Security allowing you to grow and develop your career. We offer full 360-degree services to our clients from initial consulting on a range of areas including Risk Assessments, VulnerabilityManagement, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, Penetration Testing and much more. We More ❯
Incident Response team, coordinating with other Cyber Operations teams to identify, report, and remediate security incidents, including triaging events, analyzing networks and endpoints, reverse engineering malware, threat hunting, and vulnerability management. You will develop and implement SOPs, playbooks, and processes to streamline monitoring and investigations, supporting GCS's cybersecurity operations and incident response programs. The ideal candidate should demonstrate … incident response plans Conduct trend analysis and develop defense signatures Desired Skills: Certifications such as GIAC, GCIH, GCIA, ITIL Familiarity with NIST frameworks, Cyber Kill Chain Experience with case management, SOAR, SIEM, EDR tools Experience with multinational organizations and automation scripting (Python) Qualifications: Bachelor's degree or equivalent in Computer Science, Cybersecurity, or related fields Additional Information: At McDonald More ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced VulnerabilityManagement Engineer to join our Cyber Security team. As a VulnerabilityManagement Engineer, your primary responsibility will be to manage existing vulnerabilitymanagement-specific … tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerabilitymanagement tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerabilitymanagement activities Process vulnerability data to … provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerabilityMore ❯
Trust in digital transactions and financial technologies is crucial for the smooth functioning of modern society. Neelam Kadbane, our next pathbreaker, Senior Vulnerability Analyst at Mastercard, identifies and addresses security vulnerabilities within Mastercard's environment & products by conducting network penetration tests. Neelam talks to Shyam Krishnamurthy fromThe Interview Portal about the innumerable challenges and the satisfacation of her work … . It was a significant achievement for me, especially since it's rare for companies to hire freshers directly into the InfoSec domain. At Qualys, I worked with the VulnerabilityManagement team, where we researched new CVEs and zero-day vulnerabilities, and developed signatures for vulnerability scanners. A zero-day vulnerability is a security flaw in … software or hardware that is unknown to the vendor or developer. Since the vendor is unaware of the vulnerability, no patch or fix is available, making it highly dangerous. The term "zero-day" comes from the fact that once the vulnerability is discovered by malicious actors, the vendor has zero days to fix it before it can be More ❯
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerability scanning and remediation activities via Tenable VulnerabilityManagement Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerabilitymanagement tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Next Ventures
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerability scanning and remediation activities via Tenable VulnerabilityManagement Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerabilitymanagement tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Next Ventures
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerability scanning and remediation activities via Tenable VulnerabilityManagement Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerabilitymanagement tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯
I am recruiting on behalf of a very prestigious hedge fund in London, looking to hire a Security Engineer with experience across IAM, device security, vulnerabilitymanagement and cloud platforms (Azure/AWS). Although IAM plays a big of the role, wider experience across the above security areas is required. The makeup of my client’s organisation … history of academic excellence, typically from a leading university or institution known for rigorous standards. Responsibilities will include: Architect and deploy IAM solutions (Entra ID, Conditional Access, PAM) Drive vulnerabilitymanagement strategy and tooling Apply Zero Trust and Secure by Default principles Monitor systems, respond to threats, and support incident response Communicate findings to both technical and non More ❯
I am recruiting on behalf of a very prestigious hedge fund in London, looking to hire a Security Engineer with experience across IAM, device security, vulnerabilitymanagement and cloud platforms (Azure/AWS). Although IAM plays a big of the role, wider experience across the above security areas is required. The makeup of my client’s organisation … history of academic excellence, typically from a leading university or institution known for rigorous standards. Responsibilities will include: Architect and deploy IAM solutions (Entra ID, Conditional Access, PAM) Drive vulnerabilitymanagement strategy and tooling Apply Zero Trust and Secure by Default principles Monitor systems, respond to threats, and support incident response Communicate findings to both technical and non More ❯
I am recruiting on behalf of a very prestigious hedge fund in London, looking to hire a Security Engineer with experience across IAM, device security, vulnerabilitymanagement and cloud platforms (Azure/AWS). Although IAM plays a big of the role, wider experience across the above security areas is required. The makeup of my client’s organisation … history of academic excellence, typically from a leading university or institution known for rigorous standards. Responsibilities will include: Architect and deploy IAM solutions (Entra ID, Conditional Access, PAM) Drive vulnerabilitymanagement strategy and tooling Apply Zero Trust and Secure by Default principles Monitor systems, respond to threats, and support incident response Communicate findings to both technical and non More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Hays Specialist Recruitment
help manage security operations Maintain the confidentiality, integrity and availability of systems and data Experience deploying security tools in local and cloud environments Respond to security requests and events Vulnerabilitymanagement Utilising security tools to enhance organisational security (SIEM, EDR, Vulnerabilitymanagement tools) Following agreed protocols of incident response Incident response, investigation and recovery Utilising Crowdstrike … Firewalls (responding to vulnerabilities, patching, upgrading) Experience utilising Active Directory along with enacting and enhancing Group Policy controls Experience utilising the Microsoft Defender Suite would be useful Experience of vulnerability scanning, management and documentation What you'll get in return The opportunity to join a growing team and organisation, working on multiple exciting projects in a role that More ❯
Newcastle upon Tyne, Tyne and Wear, Tyne & Wear, United Kingdom
Hays Technology
help manage security operations Maintain the confidentiality, integrity and availability of systems and data Experience deploying security tools in local and cloud environments Respond to security requests and events Vulnerabilitymanagement Utilising security tools to enhance organisational security (SIEM, EDR, Vulnerabilitymanagement tools) Following agreed protocols of incident response Incident response, investigation and recovery Utilising Crowdstrike … firewalls (responding to vulnerabilities, patching, upgrading) Experience utilising Active Directory along with enacting and enhancing Group Policy controls Experience utilising the Microsoft Defender Suite would be useful Experience of vulnerability scanning, management and documentation What you'll get in return The opportunity to join a growing team and organisation, working on multiple exciting projects in a role that More ❯
Employment Type: Permanent
Salary: £50000 - £65000/annum Up to £65,000 + bonus
Job overview: This is an opportunity to lead global Security Operations focused on safeguarding Arm's digital environment through exemplary threat detection, incident response, and vulnerabilitymanagement capabilities. This senior role, reporting directly into the CISO, is accountable for driving the strategic direction of Arm's Detect & Response function, delivering outstanding performance and ensuring we are resilient against … an evolving threat landscape! In addition to operations, you will lead cyber crisis management, C-Suite level stress testing, team development, and top-level cybersecurity thought leadership. Responsibilities: Own and deliver the strategic roadmap for cyber incident and vulnerability detection & response in line with Arm's threat profile and business objectives. You will guide and develop a high … of enterprise security domains and how they can be used as a force multiplier for a technology business strategy, with the ability to influence at all levels. Extensive people management experience, fostering a culture focused on mentoring, wellbeing, and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant security-related subject. Certifications such More ❯
proactive IT, Security & Compliance Manager to join their team as the first in-house IT hire. In this pivotal role, you will take ownership of the day-to-day management of IT services, systems security, and incident response. You will ensure the security, integrity, and availability of the company’s systems and infrastructure, and play a key part in … Oversee user accounts, device security, and application access control Provide first and second-line Helpdesk support to internal users Maintain and test business continuity and disaster recovery plans Cybersecurity Management Implement and maintain security policies (access control, password management, vulnerabilitymanagement) Monitor threats and respond to security incidents Ensure effective implementation of technical controls Compliance Support … such as Commercial, Finance, and Engineering to support compliance initiatives You be a good fit if you align to the following: Proven experience in IT operations, cybersecurity, and compliance management Strong technical knowledge of relevant systems and security frameworks Excellent communication and stakeholder management skills Ability to work proactively and collaboratively in a fast-paced environment More ❯
proactive IT, Security & Compliance Manager to join their team as the first in-house IT hire. In this pivotal role, you will take ownership of the day-to-day management of IT services, systems security, and incident response. You will ensure the security, integrity, and availability of the company’s systems and infrastructure, and play a key part in … Oversee user accounts, device security, and application access control Provide first and second-line Helpdesk support to internal users Maintain and test business continuity and disaster recovery plans Cybersecurity Management Implement and maintain security policies (access control, password management, vulnerabilitymanagement) Monitor threats and respond to security incidents Ensure effective implementation of technical controls Compliance Support … such as Commercial, Finance, and Engineering to support compliance initiatives You be a good fit if you align to the following: Proven experience in IT operations, cybersecurity, and compliance management Strong technical knowledge of relevant systems and security frameworks Excellent communication and stakeholder management skills Ability to work proactively and collaboratively in a fast-paced environment More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Acumin
role, you will gather, analyze, and enrich data to produce governance scorecards and reports spanning key cybersecurity areas such as Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM), and Threat and VulnerabilityManagement (TVM). Your insights will inform senior leadership, regulatory More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Red Snapper Recruitment Limited
role, you will gather, analyze, and enrich data to produce governance scorecards and reports spanning key cybersecurity areas such as Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM), and Threat and VulnerabilityManagement (TVM). Your insights will inform senior leadership, regulatory More ❯
Edinburgh, City of Edinburgh, United Kingdom Hybrid / WFH Options
Red Snapper Recruitment Limited
role, you will gather, analyze, and enrich data to produce governance scorecards and reports spanning key cybersecurity areas such as Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM), and Threat and VulnerabilityManagement (TVM). Your insights will inform senior leadership, regulatory More ❯
of the organisation's technology infrastructure, interfacing closely with the business to understand and support their needs, you'll drive efficiencies and assist in the design and life cycle management of the infrastructure across the organisation encompassing physical, virtual and with a continued focus on cloud platforms and associated stack technologies. About you You'll have strong technical knowledge … Server/Client OSes, Exchange Hybrid, M365, Intune) Microsoft Security stack tools(Defender, Security and Compliance, Purview) Virtualisation Technologies (VMWare) Networking Technologies (LAN/WLAN, WAN/MPLS) Storage Management (physical SAN and software-defined) Monitoring and management tools (PRTG, SCCM, intune) Backup, restore and business recovery processes Security Technologies (Firewalls/VPN/Malware Protection/Email … Web Filtering) With practical experience of securing and hardening above platforms and use of vulnerabilitymanagement systems, you'll also have exposure to SIEM/XDR/MDR systems and knowledge and practical experience of Service Management tools. You'll have significant experience of implementing and supporting Infrastructure technology solutions, as well as practical experience of Security More ❯
training offered. This is an all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerabilitymanagement (tenable is tool used) and patching Security policy, compliance, and user More ❯
training offered. This is an all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerabilitymanagement (tenable is tool used) and patching Security policy, compliance, and user More ❯