align with strategic needs, negotiating as necessary. Develop and implement security awareness training programs for employees to promote best practices and cultivate a vigilant workforce. Oversee penetration testing and vulnerability scanning to identify and remediate security vulnerabilities promptly. Data Privacy: Establish and maintain programs to ensure data handling, storage, and access comply with relevant privacy laws and regulations, including More ❯
OSes Windows 10 & 11 Desktop MS 365 Apps The ideal candidate will possess a solid understanding of CIS & NCSC security best practices, along with expertise in Pen Testing and Vulnerability remediation. Requirements Strong technical skills in VMware, Veeam, HPE, SCCM, and more. Confidence in on-site client support in the financial industry. Effective communication skills. Ability to self-teach More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Fruition Group
Job Title: Platform Engineer Location: Hybrid - 2 days onsite in Leeds, West Yorkshire Salary: £60k-70k DOE + generous benefits Why Apply? This is an exciting opportunity for an experienced Platform Engineer to play a critical role in the delivery More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Fruition Group
Job Title: Infrastructure Engineer Location: Hybrid - 2 days onsite in Leeds, West Yorkshire Salary: £60k-70k DOE Why Apply? This is an exciting opportunity for an experienced Infrastructure Engineer to play a critical role in the delivery, support, and evolution More ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability management-specific tooling, and have … an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process vulnerability data to provide reports, insights and metrics … that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerabilityremediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerability management, security standards, and More ❯
Bath, Somerset, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Infrastructure Security Analyst, SCCM, Vulnerability, Patch management, Qualys/Nessus Our client, a leading private sector business based in Bath, is looking to hire contractor with a background in infrastructure and related security. The successful candidate will be responsible for ensuring security and integrity for our clients IT infrastructure, taking responsibility for patching and vulnerabilityremediation for … patch management systems to ensure all systems are up to date and protected from security threats. Server hardening to Windows systems, both physical and virtual. Maintain accurate documentation of remediation activities Assist in incident response by applying emergency patches and remediations Contribute to disaster recovery and business continuity plans Skills and experience required: - Windows server including patching processes Server …/security hardening. Vulnerability management tools e.g. Nessus, Qualys, for conducting vulnerability assessments Hands-on experience in patch management systems - SCCM, WSUS, or Azure Update Management - for deploying patches in both on-premises and cloud Proficiency in cloud security Experience with security frameworks and best practices for ensuring compliance in patching and vulnerability management. Reasonable Adjustments: Respect More ❯
our organisation's data and IT infrastructure. This role focusses on the operational aspects of data protection - from technical risk assessments and secure system configuration reviews to incident response, vulnerabilityremediation tracking, and regulatory compliance audits. You will work closely with engineering, DevOps, and IT teams to embed privacy and information security controls into our technology stack. This … is a full-time position. Occasional after-hours work may be required to support incident response, high-priority vulnerability fixes, or audit activities. Develop and implement data protection governance: Design, implement, and enforce data protection and information security policies and procedures aligned with business objectives and regulatory requirements Support the development of strategies to mitigate and monitor data protection … data protection risks across systems and processes Support administration of data protection systems and risk reporting. Provide advice and guidance to teams on how to mitigate any identified risks Vulnerability management: Coordinate data protection assurance testing and vulnerability management Provide advice and guidance to teams on how to mitigate vulnerabilities, and following up on remediation progress Collaborate More ❯
issues Driving capacity planning and performance tuning to stay ahead of demand Automating routine tasks to streamline operations and reduce manual overhead Supporting compliance efforts, including security audits and vulnerabilityremediation Maintaining clear, up-to-date documentation for operational continuity What We’re Looking For: 3+ years’ hands-on experience with Solace PubSub+ in a production environment Strong More ❯
issues Driving capacity planning and performance tuning to stay ahead of demand Automating routine tasks to streamline operations and reduce manual overhead Supporting compliance efforts, including security audits and vulnerabilityremediation Maintaining clear, up-to-date documentation for operational continuity What We’re Looking For: 3+ years’ hands-on experience with Solace PubSub+ in a production environment Strong More ❯
issues Driving capacity planning and performance tuning to stay ahead of demand Automating routine tasks to streamline operations and reduce manual overhead Supporting compliance efforts, including security audits and vulnerabilityremediation Maintaining clear, up-to-date documentation for operational continuity What Were Looking For: 3+ years hands-on experience with Solace PubSub+ in a production environment Strong knowledge More ❯
issues Driving capacity planning and performance tuning to stay ahead of demand Automating routine tasks to streamline operations and reduce manual overhead Supporting compliance efforts, including security audits and vulnerabilityremediation Maintaining clear, up-to-date documentation for operational continuity What We’re Looking For: 3+ years’ hands-on experience with Solace PubSub+ in a production environment Strong More ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability management-specific tooling, and have … an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerability management tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerability management activities Process vulnerability data to provide reports, insights and metrics … that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerabilityremediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerability management, security standards, and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Next Ventures
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerability scanning and remediation activities via Tenable Vulnerability Management Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerability management tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerability scanning and remediation activities via Tenable Vulnerability Management Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerability management tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Next Ventures
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerability scanning and remediation activities via Tenable Vulnerability Management Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerability management tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯
Incident Response Manager to lead their incident response function and manage complex, high-impact security events. They're looking for a hands-on, proactive leader who can drive incident remediation, improve response playbooks, and coordinate CIRT teams during major incidents. Perfect for someone who enjoys being in sole contributor and operating strategically and tactically. We're looking for candidates … with experience in: Managing global security incidents at scale Vulnerability management and remediation programs Frameworks like NIST and MITRE ATT&CK Cloud security (Azure preferred) Reporting and communicating with both technical teams and senior stakeholders Comfortable working closely with senior stakeholders and C suite leadership Details: Location: South East (3x a week) Salary: 85,000 Bonus: Very strong More ❯
and firm policies. What you’ll be doing: Supporting, monitoring, and maintaining infrastructure technologies including Azure, VMWare, Windows Server, NetApp, Cato, Mist, and more. Proactively managing patching, backups, and vulnerabilityremediation using tools like Rapid7, Rubrik, and Commvault. Collaborating with IT Security and Service Delivery teams to ensure a secure and robust environment. Troubleshooting issues, documenting configurations, and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
LR Legal Recruitment
and firm policies. What you’ll be doing: Supporting, monitoring, and maintaining infrastructure technologies including Azure, VMWare, Windows Server, NetApp, Cato, Mist, and more. Proactively managing patching, backups, and vulnerabilityremediation using tools like Rapid7, Rubrik, and Commvault. Collaborating with IT Security and Service Delivery teams to ensure a secure and robust environment. Troubleshooting issues, documenting configurations, and More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
or similar technical positions. Fundamental understanding of security threats and compromise methods. Proficiency in server, client, and network technologies. Knowledge of malware, network reconnaissance, and emerging threats. Competence in vulnerability assessment and remediation procedures. Strong analytical skills, logical thinking, and sound judgment. Proficiency in KQL. Familiarity with the Microsoft Defender Suite. Education/Qualifications: CompTIA Security+ or equivalent More ❯
Your role and responsibilities As a Cybersecurity Architect, you will specialize in DevSecOps, integrating security into the software development lifecycle, automating security practices, and ensuring robust threat modeling and vulnerability management. Your primary focus will be on cloud-native and on-premises environments, with a strong emphasis on application security, infrastructure as code (IaC) security, and cloud security posture More ❯
Role: Unix Infrastructure Specialist Inside IR35 Contract (6+ Months) Canary Wharf, UK Hybrid (2 days a week) Job purpose This role is responsible for the remediation of security vulnerabilities and configuration compliance of our global Unix estate. The role will work closely with Unix Infrastructure, Unix Engineering and Cloud Engineering teams to remediate security vulnerabilities through the environments. The … successful candidate will have a solid background working with Linux Red Hat command line in a Production enterprise environment and security vulnerability management. Operational • Responsible for the security and configuration compliance of the Unix estate. • Maintain, develop, and improve the vulnerability management remediation process. Develop solutions and automated methods to reduce manual and repetitive tasks. • Work closely … with key stakeholder groups including IT Security to ensure appropriate levels of engagement and focus are maintained around remediation deployments. • Implement technical changes throughout the environments without unexpected disruption to the service. • Plan, support and participate in scheduled quarterly patching events. • Weekend work where required to deliver the required service goals. Experience/essential and desired for successful job More ❯
Role: Unix Infrastructure Specialist Inside IR35 Contract (6+ Months) Canary Wharf, UK Hybrid (2 days a week) Job purpose This role is responsible for the remediation of security vulnerabilities and configuration compliance of our global Unix estate. The role will work closely with Unix Infrastructure, Unix Engineering and Cloud Engineering teams to remediate security vulnerabilities through the environments. The … successful candidate will have a solid background working with Linux Red Hat command line in a Production enterprise environment and security vulnerability management. Operational • Responsible for the security and configuration compliance of the Unix estate. • Maintain, develop, and improve the vulnerability management remediation process. Develop solutions and automated methods to reduce manual and repetitive tasks. • Work closely … with key stakeholder groups including IT Security to ensure appropriate levels of engagement and focus are maintained around remediation deployments. • Implement technical changes throughout the environments without unexpected disruption to the service. • Plan, support and participate in scheduled quarterly patching events. • Weekend work where required to deliver the required service goals. Experience/essential and desired for successful job More ❯
Role: Unix Infrastructure Specialist Inside IR35 Contract (6+ Months) Canary Wharf, UK Hybrid (2 days a week) Job purpose This role is responsible for the remediation of security vulnerabilities and configuration compliance of our global Unix estate. The role will work closely with Unix Infrastructure, Unix Engineering and Cloud Engineering teams to remediate security vulnerabilities through the environments. The … successful candidate will have a solid background working with Linux Red Hat command line in a Production enterprise environment and security vulnerability management. Operational • Responsible for the security and configuration compliance of the Unix estate. • Maintain, develop, and improve the vulnerability management remediation process. Develop solutions and automated methods to reduce manual and repetitive tasks. • Work closely … with key stakeholder groups including IT Security to ensure appropriate levels of engagement and focus are maintained around remediation deployments. • Implement technical changes throughout the environments without unexpected disruption to the service. • Plan, support and participate in scheduled quarterly patching events. • Weekend work where required to deliver the required service goals. Experience/essential and desired for successful job More ❯
model, aligning it to the Global Application Cybersecurity team, ensuring standards and best practices are fully integrated into the Software Development Lifecycle. Within this role, you'll lead on vulnerability management, promoting the adoption and execution of the global vulnerability management processes and controls. This includes: Inventorying of logical components and dependencies of business solutions Proactively discovering vulnerabilities … Coordinating the execution of scanning, pen testing, or in general the activities and services of vulnerability identification Vulnerability assessment Remediation and mitigation of vulnerabilities Solution verification Reporting Contributing to the evolution of the process for vulnerability management. Lead security assessments of commercial packages You'll look to continually evolve the implementation of cybersecurity, implementing new measures … S-SDLC) Knowledge and understanding of cybersecurity threats and associated attack techniques. Design knowledge: modelling of components, data, interfaces, etc. Threat analysis and modelling Knowledge of web application security Vulnerability discovery techniques and vulnerability lifecycle scanning and management. Knowledge of application security architecture: segmentation, API Gateway, Encryption, Privileged Account Management, WAF, publishing, event collection tools and alert management. More ❯
team, IT System Administrators and various business stakeholders to implement policies, procedures, and tools to enhance cybersecurity posture Track and report on security-related project progress, compliance status, and vulnerabilityremediation efforts Coordinate with IT teams, internal developers, vendors, and business stakeholders to ensure alignment on technical solutions Evaluate and recommend third-party software tools and platforms that More ❯