is considered throughout the entire SDLC. Creates and maintains documentation around the use of cyber security technology in the organisation. Carries out threat detection and incident response. Carries out vulnerability management and remediation. Collaborates as needed with third-party security vendors for expert advice and issue resolution. Carries out threat intel research and recommends security improvements. Qualifications Extensive knowledge More ❯
security breaches or events. Lead the maintenance, development , and enhancement of the ISMS to ensure continued ISO/IEC 27001 Conduct regular internal audits and risk assessments , ensuring timely remediation of any identified vulnerabilities or non-conformities. Establish and enforce information security policies , standards, and controls across the organisation. Act as the central authority and subject matter expert on More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Xcede
of the organisations Azure-based infrastructure, with a key application hosted in AWS. This role blends hands-on technical delivery with strategic oversight, covering endpoint security, identity management, patching, vulnerabilityremediation, and threat response. Key activities include: Managing and supporting a small infrastructure and security team. Overseeing Azure and AWS environments, contributing to architecture decisions. Driving endpoint and … identity security via Microsoft Intune, Defender, and Entra ID. Leading patch management, endpoint hardening, and vulnerability resolution. Acting as escalation point for incidents from a third-party SOC and coordinating internal response. Supporting Cyber Essentials Plus and ISO 27001 compliance activities. Administering operational security tools including Microsoft Sentinel and Defender XDR. Maintaining technical documentation and clear operational procedures. About … You Strong hands-on experience with cloud infrastructure management (Azure essential). Proven track record in endpoint protection, IAM, patching, and vulnerability management. Skilled in Microsoft Intune, Defender suite, and Sentinel SIEM. Experience supporting security compliance programmes. Excellent coordination skills, especially during incident response. Able to balance operational delivery with strategic infrastructure and security improvements. Contract Details Duration: Initial More ❯
Crewe, Cheshire, England, United Kingdom Hybrid / WFH Options
DCS Recruitment
be doing Drive improvements to cyber security posture across internal and customer-facing platforms Design and secure cloud-based infrastructure and customer applications Perform threat detection, incident response , and vulnerabilityremediation Maintain security architecture documentation and collaborate with third-party vendors Conduct threat intelligence research and recommend ongoing improvements What you'll need Strong technical background and extensive More ❯
OSes Windows 10 & 11 Desktop MS 365 Apps The ideal candidate will possess a solid understanding of CIS & NCSC security best practices, along with expertise in Pen Testing and Vulnerability remediation. Requirements Strong technical skills in VMware, Veeam, HPE, SCCM, and more. Confidence in on-site client support in the financial industry. Effective communication skills. Ability to self-teach More ❯
Corsham, Wiltshire, South West, United Kingdom Hybrid / WFH Options
Robert Half
debt, and integration complexity. Documents infrastructure assets, licensing models, support agreements, and architectural decisions for transition. Identifies and prioritises compliance gaps between acquired environments and corporate IT standards. Leads remediation of inherited infrastructure vulnerabilities and misconfigurations. Acts as the point of coordination between IT, business stakeholders, vendors, and third-party providers. Supports the Project Manager by contributing to roadmaps … Server (2012/2016/2019/2022) administration and migration Virtualisation platforms (VMware, Hyper-V, Nutanix ) Networking - TCP/IP, DNS, DHCP, VPN, VLAN, firewalls Cybersecurity - endpoint protection, vulnerabilityremediation, access controls, secure configuration Clinical systems - understanding of healthcare IT environments and electronic health record (EHR) systems Experience working with hybrid environments and cloud integration (e.g., Azure … preferably with exposure to M&A or complex integration scenarios. Strong architectural and hands-on knowledge of enterprise systems and infrastructure technologies. Background in infrastructure risk analysis, documentation, and remediation planning. Ability to manage complex integration projects across diverse environments. Excellent stakeholder communication and coordination across business and technical teams. Familiarity with IT governance, service management, and regulatory requirements More ❯
Work closely with Security Monitoring teams to provide insight and recommendations for operational use cases Provide support and guidance through secure by design competencies (Attack mapping, threat modelling) Conduct vulnerability assessments and coordinate remediation efforts. Collaborate with DevOps and IT teams to integrate security into infrastructure and application design and development lifecycles. Support compliance efforts (e.g., SOC … of security domains: network security, endpoint protection, Secure development lifecycle, identity and access management, cloud security (AWS/Azure), incident response, and governance. Hands-on experience with SIEM, EDR, vulnerability management tools, and cloud-native security services. Familiarity with regulatory frameworks and industry standards (e.g., NIST, CIS, etc.). Strong analytical and problem-solving skills. Excellent communication and collaboration More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson McCade
secure architecture and coding standards Lead DevSecOps integration with automated security testing in CI/CD Drive continuous process improvements and automation adoption Monitor and report on KPIs like vulnerabilityremediation, tool adoption, and training uptake Collaborate cross-functionally with architects, engineers, and product owners What We’re Looking For Technical Expertise: 10+ years in secure software development More ❯
secure architecture and coding standards Lead DevSecOps integration with automated security testing in CI/CD Drive continuous process improvements and automation adoption Monitor and report on KPIs like vulnerabilityremediation, tool adoption, and training uptake Collaborate cross-functionally with architects, engineers, and product owners What We’re Looking For Technical Expertise: 10+ years in secure software development More ❯
In-depth knowledge and hands-on experience with SAST, DAST and API security testing Solid understanding of AWS and security configurations. Experience in securing Containerised environments Strong knowledge of vulnerability management tools and methodologies. Experience implementing automated deployments DevSecOps Engineer More ❯
including details of common vulnerabilities and emerging threats. Experience with authentication and authorization standards, including OAuth and SAML, and their weaknesses. Detailed knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits. Experience with Cloud Computing providers like AWS, GCP, Azure. Problem solving skills to resolve problems effectively and creatively while maintaining a More ❯
Paddington, Greater London, England Hybrid / WFH Options
Nexus Jobs Limited
security access and manage IDS/IPS configurations Establishing and implementing security 'best-practice' standards as well as departmental policies and procedures Responsible for Security scanning and the efficient remediation of vulnerabilities Responsible for analysing all security incidents to determine root cause Determine, recommend, and implement upgrade security measures and controls Delivery security responses for customer and client compliance More ❯
and enforce security policies. o Ensure compliance with internal data governance standards. o Manage identity and access controls, MFA, and device compliance. o Collaborate with support partners on the remediation of security vulnerabilities, across datacentre, EUC, IaaS space and data network. o Design, implementation and administration of security features, including but not limited to: End Points, PKI, SCEP, NDES More ❯
Security Architect Work Mode: Hybrid Work Location : London Job Description: We are seeking a highly skilled and experienced Lead Security Architect to join our team for the Protocol Analysis & Remediation project. The successful candidate will be responsible for designing and implementing security architectures related to lateral movement between workloads and endpoints and understanding and controlling the protocols they utilize … Collaborate with IT and security teams to ensure the integration of security best practices into network and system designs. Conduct security assessments and audits to identify vulnerabilities and recommend remediation actions. Provide technical leadership and guidance to the security team and other stakeholders. Stay updated with the latest security trends, threats, and technologies to ensure the organization's security … techniques. Experience with Azure Log Analytics, KQL, and Azure Alerts. Python, Shell, and PowerShell scripting. Experience with security tools and technologies (e.g., SIEM, IDS/IPS, NG Firewall capabilities, vulnerability scanners). Knowledge of Active Directory and Azure AD. Knowledge of application delivery and the infrastructures that enable it. Familiarity with SQL Server, Oracle, clustering/High Availability technologies More ❯
Indicators of Misconfiguration (IOMs) utilizing AWS built-in and third-party assessment tools. Utilizing tools like AWS Config, Security Hub, Inspector, Guardduty, and Crowdstrike Falcon, assess monitor and prioritize remediation of Cloud security vulnerabilities. Develop and maintain tools to detect and remove secrets from code check-ins. Establish development best practices for working with code libraries such as docker … desired. Additional certifications such as CCNA/CCNP, AWS Security etc. desired. 10+ years of IT experience, ideally with some project management. Familiarity with AWS, infrastructure-as-code, firewalls, vulnerability assessment tools, DLP, TCP/IP, web content filtering, VPN, endpoint protection, password management/Vaults, log management and correlation, and device/application hardening. Understanding of API programming. More ❯
Birmingham, West Midlands (County), United Kingdom
VIQU IT
document lifecycle processes in line with operational best practices Act as a trusted point of contact for business users, ensuring application needs are met effectively Support system compliance and vulnerabilityremediation activities aligned with security standards Key Requirements of the iManage Application Specialist: Strong hands-on experience with iManage, including Work 10, Control Center, and third-party integration More ❯
security access and manage IDS/IPS configurations Establishing and implementing security 'best-practice' standards as well as departmental policies and procedures Responsible for Security scanning and the efficient remediation of vulnerabilities Responsible for analysing all security incidents to determine root cause Determine, recommend, and implement upgrade security measures and controls Delivery security responses for customer and client compliance More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
end client s, ensuring work is performed to the highest professional standards. Key Responsibilities Conduct thorough penetration tests on infrastructure, web applications, APIs, mobile applications, and cloud environments. Perform vulnerability and cloud assessments using a variety of tools and techniques. Document testing procedures, findings, and recommendations in detailed reports for both technical and non-technical audiences. Serve as the More ❯
Nuneaton, Warwickshire, United Kingdom Hybrid / WFH Options
IntaForensics
and private sectors, ensuring work is performed to the highest professional standards. Key Responsibilities Conduct thorough penetration tests on infrastructure, web applications, APIs, mobile applications, and cloud environments. Perform vulnerability and cloud assessments using a variety of tools and techniques. Document testing procedures, findings, and recommendations in detailed reports for both technical and non-technical audiences. Serve as the More ❯
South West London, London, England, United Kingdom
Tenth Revolution Group
Role Overview: We are seeking a highly skilled Networking Consultant with expertise in cybersecurity, Microsoft 365, and Azure to join our dynamic team. The ideal candidate will design, implement, and optimize secure network architectures, leveraging Microsoft cloud technologies to protect More ❯
Role Overview: We are seeking a highly skilled Networking Consultant with expertise in cybersecurity, Microsoft 365, and Azure to join our dynamic team. The ideal candidate will design, implement, and optimize secure network architectures, leveraging Microsoft cloud technologies to protect More ❯
The Vulnerability Management Manager is a global role within ION's central services division, supporting the Group Security strategy through the identification, mitigation, and remediation of information security vulnerabilities, misconfigurations, and risks. This role reports to the Global Head of IT Security, who reports to the Group CISO. As a member of the ION Security team, you will … build and lead a team of Security professionals specializing in Vulnerability Management, managing partners and vendor deliverables, and developing a strategy for a world-class Vulnerability Management program. Your team will perform discovery scanning, risk assessments, mitigation activities, continuous validation, and lessons learned workshops to improve processes across Group Security and Verticals. We seek a diligent, dedicated, creative … capable of building relationships with teams of varying technical abilities. The ideal candidate will have extensive cybersecurity experience, at least 10+ years in security roles, with a focus on Vulnerability Management. Key Responsibilities: This role may require out-of-hours work for 24x7 global operations. Ensure team objectives and development plans align with company OKRs. Act as escalation point More ❯
implement scalable SaaS solutions (requirements gathering, architecting, configuring, and team training). Create and maintain technical documentation of systems and processes. Manage tickets of incidents, troubleshooting escalations, and security vulnerability remediations tasks. Handle tickets of incidents and Service Desk escalations. Keep informed and updated on feature updates/changes within areas of ownership Participate in the on-call incident More ❯
with relevant security frameworks and regulations, identifying potential compliance issues and contributing to mitigation strategies. Technology Evaluation, Deployment, and Management: Conducts security architecture reviews and perform security assessments, including vulnerability scanning, configuration reviews, and cloud security posture assessments, identifying vulnerabilities and recommending detailed remediation strategies. Contribute to the development of security architecture roadmaps and strategic plans, and support More ❯
a strong focus on automation, detection and secure by design principles. Additionally, as part of the role you will be leading and participating in threat detection, incident response and vulnerability management remediation. You will be serving as both a technical leader and operational responder, working closely with Product, infrastructure and Security Operations teams. We are looking for a hard … system visibility by expanding logging coverage and implementing additional monitoring capabilities. Maintain, update, and regularly test incident response runbooks, containment strategies, and escalation protocols. Lead the end-to-end vulnerability management process for ION Markets systems, from identification to remediation. Provide support for security architecture reviews of developed systems to ensure alignment with best practices. Stay up to date … or operating security technologies is preferred, such as endpoint security (e.g. AV/EPP/EDR), SIEM, DLP, SWG, CASB, UEBA, IDS, IPS, firewalls, IAM/PIM/PAM, vulnerability management, MDM, etc. About us We're a diverse group of visionary innovators who provide trading and workflow automation software, high-value analytics, and strategic consulting to corporations, central More ❯