skillset What You'll Be Doing Leading incident response and managing containment, analysis, and resolution Monitoring security systems (SIEM, EDR, threat intel) to identify and respond to threats Conducting vulnerability assessments and supporting remediation for financial systems Ensuring compliance with GLBA, PCI, FFIEC, and other regulatory frameworks Supporting risk reviews, vendor assessments, and internal audits Participating in security exercises … What You'll Need to be Considered 3-5+ years of relevant experience Prior experience in financial services, banking, or fintech cybersecurity Expertise with SIEM, EDR, NGFW, and vulnerabilitymanagement tools Familiarity with scripting (Python, PowerShell) for automation and threat detection Experience conducting third-party risk reviews and regulatory reporting ITAC Solutions firstName lastName Email Address Phone More ❯
of Implementation About the Role As an Implementation Engineer - Apprentice , you are instrumental in delivering Nucleus products in the post sales cycle. This technical role is responsible for deploying vulnerabilitymanagement solutions to our rapidly growing customer base. The Nucleus Implementation team is staffed with security architects with software development experience who can manage customer stakeholders to drive … to enhance our post-sales motion Understand how integrations work end to end to be able to clearly articulate complex problems and solutions to less technical stakeholders Design vuln management solution architecture for different asset classes and environment sizes Manage containerization and modern cloud infrastructure What We're Looking For Required: Resident in Northern Ireland Right to work in … with PHP and Python is a plus. Experience of cybersecurity concepts (attack vectors, kill chain) Experience of compliance understanding (NIST, ISO, custom policies) Customer/stakeholder engagement (technical project management, consulting) Why Join Us? Nucleus is a fast-growing startup where we recognize and reward performance and encourage sustainable working hours. Nucleus believes "work is people", and when our More ❯
manage multiple engagements effectively. Current CREST CRT certification or higher is required. Eligibility for SC Clearance is required. Desirable Skills: Experience with Breach Attack Simulation tools and threat-informed vulnerability management. Knowledge of Risk Management frameworks and their integration with threat intelligence. Hands-on experience with cloud security reviews (AWS, Azure, GCP) considering cloud-specific threats. Familiarity with More ❯
solutions Support ongoing improvements to internal security defenses Oversee security policies and procedures Assist with data protection initiatives Participate in security projects Develop disaster recovery plans Establish and improve vulnerabilitymanagement processes Requirements Experience in a Cyber Analyst or Cyber Engineer role Knowledge of SIEM and EDR tools Experience with network audits and penetration testing Infrastructure support experience More ❯
Oxford, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Robert Half
considered throughout the product and software development lifecycle Provide security best practice, build security design patterns, complete security architecture reviews Support on-going BAU software development processes and champion vulnerabilitymanagement Provide internal security consultancy and lead on audit engagements, risk activities Skills & Experience Understanding of securing micro-service architectures Working knowledge of modern secure SDLC practices - embedding More ❯
banbury, south east england, united kingdom Hybrid / WFH Options
Robert Half
considered throughout the product and software development lifecycle Provide security best practice, build security design patterns, complete security architecture reviews Support on-going BAU software development processes and champion vulnerabilitymanagement Provide internal security consultancy and lead on audit engagements, risk activities Skills & Experience Understanding of securing micro-service architectures Working knowledge of modern secure SDLC practices - embedding More ❯
retention, classification and labelling through Microsoft Purview. · Help document security incidents, lessons learned, and recovery actions. · Participate in access reviews, identity lifecycle audits, and conditional access enforcement. · Shadow patching, vulnerabilitymanagement and secure configuration reviews across endpoints and services. · Draft and update procedural documentation, such as acceptable use guidance, email security, and phishing response runbooks. · Engage in security More ❯
Required Experience: Active or recent SC Clearance (must-have) Strong background with Cisco ASA, Firepower, NSX-T Bonus experience in: SD-WAN, Juniper Mist, Cisco ISE, Fortinet, Palo Alto, vulnerabilitymanagement Confident communicator with a customer-first mindset Self-motivated, solution-focused, and eager to learn Benefits: Be part of a highly trusted, hands-on team solving mission More ❯
Cambridge, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
The One Group
improving how they work. Your mission: Develop scalable automation workflows that improve how we detect, respond to, and recover from threats. Streamline processes across threat intel, incident response, and vulnerabilitymanagement by eliminating repetitive manual tasks. Design and fine-tune SIEM detections that surface real signals and support both proactive and reactive actions. Collaborate across multiple cyber disciplines More ❯
Employment Type: Full-Time
Salary: £70,000 - £80,000 per annum, Negotiable, OTE
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Talent Locker
or HP networking tech (CLI preferred), plus Check Point or similar firewalls Familiarity with tools such as Microsoft Defender XDR, Sentinel, iBoss, Cisco ISE or Secure Access Awareness of vulnerabilitymanagement, threat prevention, and SOC tooling Ability to investigate and troubleshoot under pressure with a methodical, root-cause approach Previous experience in an ITIL-aligned environment Why this More ❯
support tickets using tools like Jira Service Desk - and jump on Zoom calls when needed to troubleshoot live issues. Learn how our platform works, including data flows, APIs, and vulnerabilitymanagement processes, and help explain these concepts clearly to customers. Take initiative to improve how we do support - from updating documentation to suggesting better ways to track issues More ❯
Bristol, Somerset, United Kingdom Hybrid / WFH Options
Bangura Solutions
Architecture in line with SbD. Ensuring that security architectures align with the client's overall business strategy and technology goals. Translate business needs into security requirements. Owning threat and vulnerability Management. Identifying, addressing current and emerging security threats and vulnerabilities. Researching, evaluating, and recommending security technologies, tools (eg, Firewalls, VPNs, IDS/IPS, EDR, SIEM, SOAR), and solutions to More ❯
Key Requirements: 5+ years of experience in application security, with at least 3+ years in software development. Strong understanding of application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, and API Security (including authentication and authorization). Familiarity with Agile methodologies like SCRUM, along with proven … project management skills to oversee multiple security projects simultaneously. Independent, proactive, and detail-oriented, with a commitment to maintaining high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. What we offer: Pension company contribution = 3% Incentive scheme up to 10% of annual salary , based on company performance. Your wellbeing is More ❯
maintain the Cyber Security roadmap for the company and their clients. Investigate priority threats and potential Cyber incidents. Coordination of security audits. Review and recommendation of security assessment tools Management of security with regards to new systems acquisition. Deliver in person Cyber Security training programmes. Requirements: Networking experience Cyber Security Active Directory and Virtualisation experience. SIEM experience Email Security … VulnerabilityManagement The Package: If successful our client is offering a salary between £40,000 - £42,000 per annum, favourable holiday allowance. How to Apply : If you are interested in hearing more about this vacancy or interested in applying for the role please email me at or contact Principal IT Directly on LinkedIn. INDGH More ❯
Success organization that supports customer onboarding and implementation projects. Implementation Engineers are instrumental in delivering Nucleus products in the post sales cycle. This technical role is responsible for deploying vulnerabilitymanagement solutions to our rapidly growing customer base. The Nucleus Implementation team is staffed with security architects with software development experience who can manage customer stakeholders to drive … to enhance our post-sales motion Understand how integrations work end to end to be able to clearly articulate complex problems and solutions to less technical stakeholders Design vuln management solution architecture for different asset classes and environment sizes Manage containerization and modern cloud infrastructure Required Qualifications: Cybersecurity concepts (attack vectors, kill chain) Compliance understanding (NIST, ISO, custom policies … Customer/stakeholder engagement (technical project management, consulting) Programming (we use Python, any oop is fine) Configuring & deploying software integrations High capacity to learn quickly Creative problem-solving skills Preferred Qualifications: Security tools or other VM platforms (SIEM, SOAR, IDS) Data ingest pipelines (ETL, automation) Cloud concepts (containerization, PaaS) ServiceNow (configuration, end user experience) Enterprise customer tech integration exposure More ❯
Requirements: Essential: 5+ years of experience in application security, with at least 3+ years in software development. Strong understanding of application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, and API Security (including authentication and authorization). Proficiency in programming languages such as Python, Java, JavaScript … GoLang, and Rust. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to oversee multiple security projects simultaneously. Desired: Independent, proactive, and detail-oriented, with a commitment to maintaining high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. What we offer: Pension company contribution = 3% Incentive scheme More ❯
IT, factory managers, and equipment vendors to ensure systems meet operational requirements Operational Performance Ensure effective operation of the infrastructure estate, including but not limited to: Server OS Patch Management Virtualisation (VMWare) Group Policy M365 (including Exchange Online) Active Directory/Entra ID Server VulnerabilityManagement Provide on-site support for network-related incidents at manufacturing sites More ❯
strategies ️ Collaborating with internal teams to enhance incident response and improve threat detection capabilities ️ Producing detailed threat reports, including indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs) ️ Supporting vulnerabilitymanagement and assisting with the development of security posture recommendations What We're Looking For: ️ Proven experience as a Threat Intelligence Analyst or in a similar role within More ❯
Gloucestershire, England, United Kingdom Hybrid / WFH Options
Maxwell Bond
in network and application-layer testing. Skilled with industry-standard tools (e.g. Burp Suite, Nmap, Metasploit, Cobalt Strike). Strong knowledge of OWASP Top 10, MITRE ATT&CK, and vulnerabilitymanagement principles. Excellent communication and technical reporting skills. 🎯 Offer: £60,000 salary. Predominantly remote working. Occasional client site visits in the Gloucestershire area. Opportunity to work on sensitive More ❯
Are you looking for an exciting new opportunity? Join a trusted security and compliance partner offering comprehensive services including GRC consulting, CREST-accredited penetration testing, and an industry-leading vulnerabilitymanagement service. As the number one Global Service Partner of Vanta, the company has a proven track record of helping hundreds of businesses from tech startups to global More ❯
team members Ensure accurate documentation and incident records Participate in team meetings and contribute to service improvements Use monitoring tools to track and resolve incidents Support compliance, patching, and vulnerabilitymanagement Liaise with 3rd Line teams to drive service enhancements Deliver small project work to customer timelines What you'll need We're looking for a team player More ❯
advisor and advocate for security across the development lifecycle, influencing architecture, design and implementation decisions. Embed secure development practices into day-to-day workflows across engineering teams. Own the vulnerabilitymanagement lifecycle: from discovery and triage to remediation tracking and coordinated disclosure. Build Secure Products by Design Conduct threat models, security architecture reviews and risk assessments for new More ❯
and mentoring. Improve and optimize processes, managing information collection and creating recommendations. Develop and implement secure cloud service solutions, leveraging cloud computing, data analytics, and enterprise architecture. Utilize delivery management, agile methodologies, and Azure DevOps to ensure project success. Maintain awareness of security standards, principles, tools, and emerging technologies. Automate security baselines and configuration management using IaC tools … testing (Practitioner) Research and innovation in security (Working) Systems design and integration (Practitioner) Understanding security implications of transformation (Working) Experience: Integrating security practices into DevOps, including automated testing and vulnerability management. Experience with CI/CD, IaC, and security automation tools. Implementing Zero Trust models, identity verification, MFA, and adaptive access controls. Knowledge of standards and regulations like GDPR … Experience as a DevOps professional. Working towards or obtaining certifications like CISSP, CISM, or CRISC within a year. Eligibility for SC Security Clearance. Current knowledge of ISO 27001, Risk Management, GDPR, and security issues related to AI/Gen AI. More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
controls , including host firewalls , SELinux , and intrusion detection. Knowledge of networking fundamentals , especially from a security perspective. Experience working in highly governed environments with tight SLAs. Skilled in patch management and system update procedures. It would be great if you had: Experience with secure environments and familiarity with JSP 440 and SCIDA requirements. Proficiency in scripting (e.g., Bash , Python … for secure automation. Familiarity with vulnerabilitymanagement tools such as OpenSCAP and Nessus . Exposure to Red Hat deployment tools and secure system state management. If you are interested in this role but not sure if your skills and experience are exactly what were looking for, please do apply, wed love to hear from you! Employment Type: Full More ❯
and corporate policies Collaborating with group IT, factory managers, and equipment vendors to meet operational requirements Operational Performance Ensuring effective operation of the infrastructure estate, including: Server OS Patch Management Virtualisation (VMWare) Group Policy M365 (including Exchange Online) Active Directory/Entra ID Server VulnerabilityManagementMore ❯