Watford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
in depth technical understanding. You will be expected to cover the initiation through to the design and implementation, across several of the skills and technologies below: Microsoft Sentinel Tenable VulnerabilityManagement (Or similar technology) Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/Related Certifications DESIRED KNOWLEDGE, SKILLS & EXPERIENCE The ability … significant value to your application. Training and development in these technologies/solutions may be provided if required. Microsoft Intune (Focused on Security, not the full suite) Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee must be able to demonstrate the following qualities: Autonomy … Quality Focus – Concern for quality, being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in written and verbal communication. The More ❯
Oxford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
in depth technical understanding. You will be expected to cover the initiation through to the design and implementation, across several of the skills and technologies below: Microsoft Sentinel Tenable VulnerabilityManagement (Or similar technology) Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/Related Certifications DESIRED KNOWLEDGE, SKILLS & EXPERIENCE The ability … significant value to your application. Training and development in these technologies/solutions may be provided if required. Microsoft Intune (Focused on Security, not the full suite) Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee must be able to demonstrate the following qualities: Autonomy … Quality Focus – Concern for quality, being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in written and verbal communication. The More ❯
Hull, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
in depth technical understanding. You will be expected to cover the initiation through to the design and implementation, across several of the skills and technologies below: Microsoft Sentinel Tenable VulnerabilityManagement (Or similar technology) Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/Related Certifications DESIRED KNOWLEDGE, SKILLS & EXPERIENCE The ability … significant value to your application. Training and development in these technologies/solutions may be provided if required. Microsoft Intune (Focused on Security, not the full suite) Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee must be able to demonstrate the following qualities: Autonomy … Quality Focus – Concern for quality, being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in written and verbal communication. The More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
CyberNorth
Strong understanding of information and IT security challenges and standards. Solid working knowledge of security technologies (e.g. Endpoint Protection, Data Protection, Cloud Security) and cyber capabilities (e.g. SIEM, SOC, VulnerabilityManagement). Familiarity with recognised frameworks such as ISO 27001, ISO 22301, NIST, COBIT, or ISF. Experience supporting security strategy within cloud-based environments. Demonstrated ability to manage More ❯
London, England, United Kingdom Hybrid / WFH Options
Wanstor
and endpoint environments - including advice on best practices, policy development, and technical control implementation • Act as an escalation point and mentor for other consultants and engineers • Own and deliver vulnerability assessments, including reporting, debriefs, and remediation planning • Continuously evolve Wanstor's cyber security product offerings, including templates, processes, automation and toolsets • Maintain up-to-date knowledge of compliance standards … audits, including hands-on remediation guidance (Cyber Essentials Plus Assessor certified or holding related certifications with the intention of becoming CE Plus Assessor certified is highly desirable) • Hands-on vulnerability assessment experience across infrastructure, networks, and applications • Familiarity with threat and vulnerabilitymanagement tools (e.g.Qualys) • Excellent report writing and communication skills, able to present technical findings to More ❯
Review and implement policy improvements aligned to GDPR, ISO27001, NIST and other key standards. Deliver impactful security awareness and training programmes across the business. Support audits, penetration tests, and vulnerabilitymanagement – driving remediation and improvements. Work closely with teams across Legal, Finance, Marketing, Global Tech, and Internal Audit. Key experience: Minimum 3+ years' experience in a cyber security … or analyst role within a complex organisation. Broad expertise across identity & access management, security operations, network and data security. Strong working knowledge of ISO/IEC 27001, Cyber Essentials, or NIST frameworks. Experience influencing cross-functional stakeholders – both technical and non-technical. Excellent communicator – able to translate technical risks into business language. Ideally holds or is working towards certifications More ❯
London, England, United Kingdom Hybrid / WFH Options
ISx4 Group
concepts, including virtualisation, containers, microservices, and serverless computing. Proficiency in infrastructure-as-code (IaC) tools such as Terraform, Bicep, CloudFormation, or Azure Resource Manager. Experience with automation and configuration management tools like Ansible, Puppet, or Chef is an advantage. Solid understanding of networking principles, including TCP/IP, DNS, load balancing, and firewall configurations. Knowledge of cloud security best … practices, including identity and access management (IAM), encryption, and vulnerability management. Familiarity with monitoring and logging tools such as CloudWatch, Azure Monitor, or Stackdriver. Experience with DevOps methodologies and continuous integration/continuous delivery (CI/CD) pipelines is an advantage. Strong problem-solving skills and ability to troubleshoot complex issues in a distributed cloud environment. Excellent communication … technologies, including data pipelines and ETL processes. Relevant cloud certifications (e.g., Azure Certified Cloud Engineer or AWS Certified Solutions Architect) are a strong plus. Personal Skills Personal Integrity, Stakeholder Management, Project Management, Agile Methodologies, Automation, Solutions Architecture. Ability to be focused, manage your own time and communicate effectively are critical. Experience in the following would be an advantage. More ❯
leader to head global security operations at an innovative, fast-paced technology organisation. This role will drive the strategic and operational excellence of our threat detection, incident response, and vulnerabilitymanagement functions across a globally distributed digital estate. Reporting directly to the Chief Information Security Officer (CISO), this high-impact position is responsible for setting and executing the … in Cybersecurity, Computer Science, or a related discipline—or equivalent practical experience. Industry-recognised certifications (e.g., CISSP, GIAC, GCIH, GCFE, GREM) a plus. Familiarity with ITIL and enterprise project management practices. Experience managing third-party vendors and security transformation initiatives in large-scale, digitally complex organisations. More ❯
Bath, Somerset, South West, United Kingdom Hybrid / WFH Options
London & Country Mortgages
ensure these systems are fit for purpose and operational. Ideally youll have knowledge and experience with the following: 1. MS Azure knowledge, with experience of the following; Entra ID Management Azure storage accounts Azure Virtual Desktop (AVD) Azure Virtual machine management 2. MS 365 administration of; Teams Sharepoint Intune 3. On prem infrastructure experience i ncluding; Building and … when business needs change. Furthermore, whilst not essential, in addition to the Essential skills it would be desirable to have knowledge and experience of the following technologies; SSL certificate managementVulnerabilitymanagement SIEM experience (Ideally MS Sentinel) Infrastructure As Code (Ideally Terraform and Ansible) Powershell SQL Cisco Umbrella Nutanix Hyperconverged Infrastructure support Netapp Support Knowledge of and More ❯
London, England, United Kingdom Hybrid / WFH Options
Guillaume Masson
and mitigation of any non-compliance. Oversee IT Health Checks (ITHC) and lead remediation efforts. Deliver and implement Security Information Assurance work packages. Operate and maintain an Information Security Management System (ISMS) aligned to ISO27001. Manage vulnerabilities, security incidents, and operational risks. Maintain and improve security documentation and controls. Mentor and review work from junior colleagues and contribute to … team knowledge-sharing. About You You'll Definitely Have: Demonstrated experience in Security Information Assurance roles. Hands-on knowledge of ISMS frameworks and ISO27001 compliance. Strong experience in vulnerabilitymanagement, risk mitigation, and incident response. Excellent communication and stakeholder engagement skills, including at senior levels. The ability to lead on complex, multi-threaded deliveries. Comfortable working in agile More ❯
London, England, United Kingdom Hybrid / WFH Options
Shaw Trust
assessments to design effective controls. They will support the Group's Cyber Security operations function, by designing and day-to-day delivery of threat intelligence, threat detection, incident response, vulnerabilitymanagement and ethical hacking capabilities. They will play a key role in the Technology Directorate, to improve cyber resilience, reporting and effectiveness. As a Cloud Security Engineer, you … months Life Assurance at 3 times your annual salary rate Access to a suite of learning and development opportunities including paid for apprenticeship and masters' levels qualifications, and management development programmes Opportunities to connect with our employee diversity networks (LGBTQ+ Support Network, Racial Equality Network, Disability Equality Network, Neurodiversity Peer Support Network, Women's Network, MANaging Network, Menopause Network More ❯
and fostering customer trust. Your day to day: Lead the application and API security initiatives, ensuring robust protection mechanisms are in place. Own and drive the Application Security Posture Management (ASPM) function. Integrate security within the plan/design phase through threat modelling, code and architecture reviews, and by defining secure coding standards, libraries, and best practices. Configure and … DevSecOps and SDLC tooling, including SAST, DAST, SCA, ASPM and CSPM. Hands-on experience with IAM solutions such as Auth0, or AWS Cognito. Strong background in threat modelling and vulnerability management. Strong background in AWS, cloud computing concepts, and cloud security best practices. Bonus points if: Previous experience as a software engineer. Experience running a security champion program. Knowledge … of security incident management and response. Relevant certifications such as OSCP, OSWP, CISSP, AWS Security Specialty, or similar. Interview Process: 15 minute Chat with someone from our Internal Talent Team 90 minute Technical Interview with our Lead DevSecOps Engineer 60 minute Culture fit interview with Tech Principal of Platform Engineering and a non-technical person Benefits: This role will More ❯
information, as laid out in the job overview below. We offer full 360-degree services to our clients from initial consulting on a range of areas including Risk Assessments, VulnerabilityManagement, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, Penetration Testing and much more. We More ❯
you have the necessary skills before sending an application. We offer full 360-degree services to our clients from initial consulting on a range of areas including Risk Assessments, VulnerabilityManagement, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, Penetration Testing and much more. We More ❯
Incident Response team, coordinating with other Cyber Operations teams to identify, report, and remediate security incidents, including triaging events, analyzing networks and endpoints, reverse engineering malware, threat hunting, and vulnerability management. You will develop and implement SOPs, playbooks, and processes to streamline monitoring and investigations, supporting GCS's cybersecurity operations and incident response programs. The ideal candidate should demonstrate … incident response plans Conduct trend analysis and develop defense signatures Desired Skills: Certifications such as GIAC, GCIH, GCIA, ITIL Familiarity with NIST frameworks, Cyber Kill Chain Experience with case management, SOAR, SIEM, EDR tools Experience with multinational organizations and automation scripting (Python) Qualifications: Bachelor's degree or equivalent in Computer Science, Cybersecurity, or related fields Additional Information: At McDonald More ❯
London, England, United Kingdom Hybrid / WFH Options
Barclay Simpson
and compliance teams to ensure that secure design principles and automated security controls are Embedded throughout the software development lifecycle (SDLC). You will take ownership of threat modeling, vulnerabilitymanagement, and security automation efforts with a specific focus on cloud platforms, primarily Google Cloud Platform (GCP). You will be instrumental in building scalable, resilient security architectures More ❯
by the team Maintain a strong customer focus at all times Hold the responsibility for: Patching The Cyber Security Risk Register Firewall Rules Microsoft End Point Protection Microsoft Defender VulnerabilityManagement Microsoft secure score Phishing simulation and staff training with both Cyber Security and information governance Data Loss Protection Testing and identifying network and system vulnerabilities Security features More ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced VulnerabilityManagement Engineer to join our Cyber Security team. As a VulnerabilityManagement Engineer, your primary responsibility will be to manage existing vulnerabilitymanagement-specific … tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerabilitymanagement tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerabilitymanagement activities Process vulnerability data to … provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerabilityMore ❯
Join to apply for the Senior System Engineer - Wellington Management Company, LLP role at Jobs via eFinancialCareers 4 days ago Be among the first 25 applicants Join to apply for the Senior System Engineer - Wellington Management Company, LLP role at Jobs via eFinancialCareers Get AI-powered advice on this job and more exclusive features. About Us About Us … Wellington Management offers comprehensive investment management capabilities that span nearly all segments of the global capital markets. Our investment solutions, tailored to the unique return and risk objectives of institutional clients in more than 60 countries, draw on a robust body of proprietary research and a collaborative culture that encourages independent thought and healthy debate. As a private … partnership, we believe our ownership structure fosters a long-term view that aligns our perspectives with those of our clients. About The Role THE POSITION The Attack Surface Management team is seeking a Senior Security Engineer to be a key member of our team. There will be a heavy focus on building, maturing, and operationalizing a configuration baselines program More ❯
Trust in digital transactions and financial technologies is crucial for the smooth functioning of modern society. Neelam Kadbane, our next pathbreaker, Senior Vulnerability Analyst at Mastercard, identifies and addresses security vulnerabilities within Mastercard's environment & products by conducting network penetration tests. Neelam talks to Shyam Krishnamurthy fromThe Interview Portal about the innumerable challenges and the satisfacation of her work … . It was a significant achievement for me, especially since it's rare for companies to hire freshers directly into the InfoSec domain. At Qualys, I worked with the VulnerabilityManagement team, where we researched new CVEs and zero-day vulnerabilities, and developed signatures for vulnerability scanners. A zero-day vulnerability is a security flaw in … software or hardware that is unknown to the vendor or developer. Since the vendor is unaware of the vulnerability, no patch or fix is available, making it highly dangerous. The term "zero-day" comes from the fact that once the vulnerability is discovered by malicious actors, the vendor has zero days to fix it before it can be More ❯
Job Description: Role - Remediation Engineer – Security & VulnerabilityManagement Location - Middlesex, UK (4 days from office weekly) Type - Contract We are seeking a technically proficient Engineer – Security & VulnerabilityManagement to support our vulnerabilitymanagement and threat remediation efforts. The successful candidate will play a pivotal role in analysing security vulnerabilities, coordinating with cross-functional teams … and implementing timely, effective remediation to reduce the organization’s risk exposure—including on-premise environments, AWS, and Azure—through effective vulnerability lifecycle managemen Responsibilities Lead the identification, assessment, and remediation of vulnerabilities across all operating systems (Windows, Linux, macOS) and platforms (on-premise and cloud). Analyze vulnerability scan results from tools such as Qualys, Nessus and … to prioritize and remediate vulnerabilities across on-premise and cloud environments. Prioritize vulnerabilities based on risk, asset criticality, and threat intelligence, ensuring timely resolution. Technical Skills: Good experience in vulnerabilitymanagement tools (e.g., AWS , Azure Security Center, Qualys, or similar). Solid understanding of operating systems (Windows, Linux) Hands-on experience with AWS and Azure cloud security practices. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Next Ventures
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerability scanning and remediation activities via Tenable VulnerabilityManagement Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerabilitymanagement tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerability scanning and remediation activities via Tenable VulnerabilityManagement Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerabilitymanagement tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯
Farnborough, England, United Kingdom Hybrid / WFH Options
GardPass Consulting
attacks and vulnerabilities. You will be responsible for planning and implementing appropriate security controls to ensure that the information within the client is kept secure. Key functions/outputs: Vulnerability Scanning & Reporting Endpoint Security Incident Management & Tickets System Hardening Change Work Participation in Regular Meetings Documentation Main Objectives: Vulnerability Scanning & Reporting Perform regular vulnerability scans and … similar. The process should be focused on ensuring that the below tool sets are kept up to date and ensure that scans are performed regularly to help assist the Vulnerability and Patch Manager with identifying weaknesses in the system. Code Scans: perform regular code scans to audit code quality metrics, potential bugs, and security vulnerabilities. VulnerabilityManagement Tooling: perform regular VulnerabilityManagement Scans and ensure that the warehouse and plugins are kept up to date to capture new vulnerabilities. Reporting: assist the Vulnerability and Patch Manager with generating regular vulnerabilitymanagement reports, which are to be provided to the cyber security and IA lead. Endpoint Security: Endpoint Protection: perform regular updates More ❯
help manage security operations Maintain the confidentiality, integrity and availability of systems and data Experience deploying security tools in local and cloud environments Respond to security requests and events Vulnerabilitymanagement Utilising security tools to enhance organisational security (SIEM, EDR, Vulnerabilitymanagement tools) Following agreed protocols of incident response Incident response, investigation and recovery Utilising Crowdstrike … firewalls (responding to vulnerabilities, patching, upgrading) Experience utilising Active Directory along with enacting and enhancing Group Policy controls Experience utilising the Microsoft Defender Suite would be useful Experience of vulnerability scanning, management and documentation What you'll get in return The opportunity to join a growing team and organisation, working on multiple exciting projects in a role that More ❯