CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
security frameworks (e.g., ISO 27001, NIST, GDPR) ️ Performing audits and security assessments to identify vulnerabilities and recommending appropriate mitigations ️ Collaborating with other teams to implement and maintain secure information management systems ️ Providing expert guidance on data classification, encryption, and access controls to maintain the integrity and confidentiality of sensitive data What We're Looking For: ️ Proven experience as an … a similar role focused on data protection and compliance ️ Strong understanding of information assurance frameworks (e.g., ISO 27001, NIST SP 800-53, COBIT) ️ Experience with security assessments, audits, and vulnerabilitymanagement ️ Knowledge of regulatory standards such as GDPR, HIPAA, and PCI-DSS ️ Certifications such as CISSP, CISM, or ISO 27001 Lead Implementer are highly desirable More ❯
team. Improve SOC services, including security monitoring, incident detection, analysis, and response. Establish and document processes and workflows. Oversee the development of security tools and technologies like NDR, EDR, VulnerabilityManagement, SIEM, and SOAR. Collaborate with business owners to identify and reduce cyber threats and vulnerabilities. We're looking for someone who is: Experienced in information security, especially … cyber security concepts, technologies, and best practices. Effective in managing and communicating with diverse stakeholders, including executives. Experienced with security tools such as SIEM, IDS/IPS, EDR, and vulnerability management. Familiar with working in cloud environments. Exposure to threat modeling. (You don't need to match all the bullet points to be considered for this role.) Ready to More ❯
you can expect to: Lead incident response for breaches, malware attacks, root cause analysis, and recovery Monitor threat feeds and correlate intelligence with tooling to identify emerging risks Oversee vulnerabilitymanagement and assess remediation effectiveness Collaborate with IT, DevOps, and GRC to align security efforts with business goals Manage and refine configurations for our security tools, and recommend … threats, ensuring zero-day vulnerabilities are discovered and actioned quickly Own the planning and execution of our annual penetration testing activity To be successful, you'll have: Experience using vulnerability scanning tools and remediating software/hardware issues A solid understanding of both automated and manual penetration testing Hands-on experience identifying, testing, and mitigating system vulnerabilities A strong More ❯
Birmingham, West Midlands, England, United Kingdom
DCS Recruitment
builder to streamline and strengthen how security gets done. Respond to incidents with confidence, contribute to security audits, and answer client queries like a pro. Harden our systems: lead vulnerabilitymanagement, champion new security policies, and help us stay two steps ahead of threats. Always be learning-dive into the latest security tools and trends, and shape our More ❯
to escalate and resolve operational issues Manage and maintain company endpoints, configurations, and application deployments Oversee cloud-hosted virtual endpoints and assets Perform OS, firmware, and application patching and vulnerabilitymanagement Support onboarding/offboarding processes, including access setup and asset allocation. Administer licenses, accounts, and user groups in Microsoft 365. Monitor and maintain health of live systems More ❯
West London, London, England, United Kingdom Hybrid / WFH Options
Ashdown Group
Duties will include: - Working with the wider business on ISO27001 and Cyber Essentials - Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Deploy SIEM - Support ongoing improvements to internal defence - Oversee policies and procedures - Support data protection initiatives - Security projects - Develop disaster recovery plans - Establish and improve vulnerabilitymanagementMore ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ashdown Group
Duties will include: - Working with the wider business on ISO27001 and Cyber Essentials - Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Deploy SIEM - Support ongoing improvements to internal defence - Oversee policies and procedures - Support data protection initiatives - Security projects - Develop disaster recovery plans - Establish and improve vulnerabilitymanagementMore ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ashdown Group
Duties will include: - Working with the wider business on ISO27001 and Cyber Essentials - Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Deploy SIEM - Support ongoing improvements to internal defence - Oversee policies and procedures - Support data protection initiatives - Security projects - Develop disaster recovery plans - Establish and improve vulnerabilitymanagementMore ❯
s ecurity controls mapping and c ompliance checking automation MoD Cyber Operations: SOC tool evaluation support, SIEM use case development, Metrics and reporting frameworks, and Technology integration assessment. Cyber Vulnerability Investigations Identity & Access: IAM architecture reviews, p rivileged access solutions, authentication technology assessment, and Zero Trust implementation planning OT Security OT Risk Assessment/Assurance and OT VulnerabilityManagement Key Strengths Detail-oriented with a strong focus on quality Well-organised and committed to developing customer service skills Enthusiastic about working in a team environment while developing individual capabilities 25 days of Annual leave + an option to purchase more through our Flexible Benefits Flex benefits system - exciting opportunity to choose your own benefits Pension - matching More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Xcede
reliable operation of the organisations Azure-based infrastructure, with a key application hosted in AWS. This role blends hands-on technical delivery with strategic oversight, covering endpoint security, identity management, patching, vulnerability remediation, and threat response. Key activities include: Managing and supporting a small infrastructure and security team. Overseeing Azure and AWS environments, contributing to architecture decisions. Driving … endpoint and identity security via Microsoft Intune, Defender, and Entra ID. Leading patch management, endpoint hardening, and vulnerability resolution. Acting as escalation point for incidents from a third-party SOC and coordinating internal response. Supporting Cyber Essentials Plus and ISO 27001 compliance activities. Administering operational security tools including Microsoft Sentinel and Defender XDR. Maintaining technical documentation and clear … operational procedures. About You Strong hands-on experience with cloud infrastructure management (Azure essential). Proven track record in endpoint protection, IAM, patching, and vulnerability management. Skilled in Microsoft Intune, Defender suite, and Sentinel SIEM. Experience supporting security compliance programmes. Excellent coordination skills, especially during incident response. Able to balance operational delivery with strategic infrastructure and security improvements. More ❯
experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python, JavaScript … GoLang, Terraform, CloudFormation (AWS), and AWS CDK. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Desired: Ability to work independently, take initiative, and maintain a keen attention to detail, ensuring high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. Why More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Maxwell Bond
Security Consultant – Threat & VulnerabilityManagement Location: Manchester (Hybrid) Salary: £40,000 – £50,000 Exclusive to our agency We’re working exclusively with a UK-based IT services provider that specialises in secure cloud, infrastructure, and digital transformation solutions for public and private sector organisations. They combine deep technical expertise with a commitment to security and compliance, offering tailored … managed services to help clients stay resilient in a rapidly evolving threat landscape. This position is part of their growing security function, focused on delivering proactive threat exposure management and support across customer environments. The team plays a key role in identifying weaknesses, guiding remediation, and improving cyber hygiene through continuous monitoring and expert advice. About the Role As … based reports to both technical and non-technical audiences. Develop repeatable, insight-driven reporting to support consistency across client engagements. What We’re Looking For Strong technical background in vulnerability and security operations. Experience using scanning tools (e.g. Qualys, Nessus) and open-source analysis tools (e.g. Nmap, Wireshark, OWASP ZAP). Familiarity with Microsoft security products (Intune, Conditional Access More ❯
skillset What You'll Be Doing Leading incident response and managing containment, analysis, and resolution Monitoring security systems (SIEM, EDR, threat intel) to identify and respond to threats Conducting vulnerability assessments and supporting remediation for financial systems Ensuring compliance with GLBA, PCI, FFIEC, and other regulatory frameworks Supporting risk reviews, vendor assessments, and internal audits Participating in security exercises … What You'll Need to be Considered 3-5+ years of relevant experience Prior experience in financial services, banking, or fintech cybersecurity Expertise with SIEM, EDR, NGFW, and vulnerabilitymanagement tools Familiarity with scripting (Python, PowerShell) for automation and threat detection Experience conducting third-party risk reviews and regulatory reporting ITAC Solutions firstName lastName Email Address Phone More ❯
of Implementation About the Role As an Implementation Engineer - Apprentice , you are instrumental in delivering Nucleus products in the post sales cycle. This technical role is responsible for deploying vulnerabilitymanagement solutions to our rapidly growing customer base. The Nucleus Implementation team is staffed with security architects with software development experience who can manage customer stakeholders to drive … to enhance our post-sales motion Understand how integrations work end to end to be able to clearly articulate complex problems and solutions to less technical stakeholders Design vuln management solution architecture for different asset classes and environment sizes Manage containerization and modern cloud infrastructure What We're Looking For Required: Resident in Northern Ireland Right to work in … with PHP and Python is a plus. Experience of cybersecurity concepts (attack vectors, kill chain) Experience of compliance understanding (NIST, ISO, custom policies) Customer/stakeholder engagement (technical project management, consulting) Why Join Us? Nucleus is a fast-growing startup where we recognize and reward performance and encourage sustainable working hours. Nucleus believes "work is people", and when our More ❯
manage multiple engagements effectively. Current CREST CRT certification or higher is required. Eligibility for SC Clearance is required. Desirable Skills: Experience with Breach Attack Simulation tools and threat-informed vulnerability management. Knowledge of Risk Management frameworks and their integration with threat intelligence. Hands-on experience with cloud security reviews (AWS, Azure, GCP) considering cloud-specific threats. Familiarity with More ❯