City of London, London, United Kingdom Hybrid / WFH Options
Barbara Houghton
and systems. Plan for and execute the local Disaster Recovery drills and/or contingency process. Monitor and manage the IT system vulnerabilities, take remediation actions to solve the relevant risks. Provide support and validation for IT/system changes, Disaster Recovery drills and/or contingency process. Skills More ❯
and systems. • Plan for and execute the local Disaster Recovery drills and/or contingency process. • Monitor and manage the IT system vulnerabilities, take remediation actions to solve the relevant risks. • Provide support and validation for IT/system changes, Disaster Recovery drills and/or contingency process. Skills More ❯
london, south east england, united kingdom Hybrid / WFH Options
Barbara Houghton Associates Limited
and systems. • Plan for and execute the local Disaster Recovery drills and/or contingency process. • Monitor and manage the IT system vulnerabilities, take remediation actions to solve the relevant risks. • Provide support and validation for IT/system changes, Disaster Recovery drills and/or contingency process. Skills More ❯
etc. Collaborate with development teams to integrate security best practices into the secure software development lifecycle (SDLC) and ensure products are built securely Oversee vulnerability management and remediation efforts, including leading responses to pen test findings and security assessments Experience conducting risk assessments and threat modelling for software More ❯
etc. Collaborate with development teams to integrate security best practices into the secure software development lifecycle (SDLC) and ensure products are built securely Oversee vulnerability management and remediation efforts, including leading responses to pen test findings and security assessments Experience conducting risk assessments and threat modelling for software More ❯
Security Engineer, Vulnerability Management and Remediation Operations Amazon Data Services UK Limited London, United Kingdom Posted 6 days ago Responsibilities To ensure the continuous monitoring and remediation of vulnerabilities. Experience Programming in Python, Ruby, Go, Swift, Java , .Net, C++ or similar object-oriented language and SQL. Basic More ❯
to help protect our systems and data while shaping our overall security posture. What You’ll Do: Monitor threats and respond to incidents Run vulnerability scans and support remediation Help with compliance (ISO27001, SOC 2, FCA) Collaborate with DevOps to embed security in our pipeline Raise security awareness More ❯
london, south east england, united kingdom Hybrid / WFH Options
Explore Group
to help protect our systems and data while shaping our overall security posture. What You’ll Do: Monitor threats and respond to incidents Run vulnerability scans and support remediation Help with compliance (ISO27001, SOC 2, FCA) Collaborate with DevOps to embed security in our pipeline Raise security awareness More ❯
environments. You’ll play a key role in strengthening the security posture and ensuring compliance with security policies and industry best practices. Perform regular vulnerability assessments across endpoints, servers, applications, and cloud resources. Analyse scan results, validate findings, and prioritize based on risk, exploitability, and asset criticality. Collaborate with … IT, DevOps, and application teams to remediate or mitigate identified vulnerabilities. Track remediation efforts and verify effectiveness through re-scans and reporting. Support audits, compliance checks, and security assessments as needed. Implement and support endpoint protection, patching, and backup solutions. Skills Required 2 years+ of experience focussing on VulnerabilityMore ❯
london, south east england, united kingdom Hybrid / WFH Options
Totum Partners
environments. You’ll play a key role in strengthening the security posture and ensuring compliance with security policies and industry best practices. Perform regular vulnerability assessments across endpoints, servers, applications, and cloud resources. Analyse scan results, validate findings, and prioritize based on risk, exploitability, and asset criticality. Collaborate with … IT, DevOps, and application teams to remediate or mitigate identified vulnerabilities. Track remediation efforts and verify effectiveness through re-scans and reporting. Support audits, compliance checks, and security assessments as needed. Implement and support endpoint protection, patching, and backup solutions. Skills Required 2 years+ of experience focussing on VulnerabilityMore ❯
kind of cyber threat. Its purpose is to avoid, resist and respond to probable threats. This individual is also responsible for the ensuring successful remediation of technology vulnerabilities which could be exploited by an internal or external actor to gain unauthorized access to computer systems and data. Responsible for … the validation of remediation steps taken to minimise threats, which have been mitigated by the IT Ops Teams. Key Tasks and Responsibilities In this role, you will be: Responsible for owning an area of Europe and the Operating Companies within that to build relationships to identify security issues & risks … investigates possible security exceptions Updating, maintaining and documenting security controls Participating in security operations support - Following up on information security related incidents Performing Patch & Vulnerability Management (Qualys) Identifying and advising on external risk (Bitsight) Participating in projects Consistently implementing security solutions at the business unit level Testing new security More ❯
ll do: Develop and implement security policies, procedures, and standards to ensure compliance with regulatory requirements and industry best practices. Coordinate regular security assessments, vulnerability scans, and penetration tests to identify and remediate security vulnerabilities and weaknesses. Monitor and analyze security events, investigate incidents, and provide response and remediationMore ❯
strategy, roadmap and security improvement plan Assess the Cyber Security landscape for LCC and existing threats, vulnerabilities, and defences Drive a programme for the remediation of security vulnerabilities and improvements through LCC and partner delivery teams Develop policies, procedures and standards Take the lead for regular security health checks … be advantageous Experience of working through matrix management of multi-disciplinary teams in complex infrastructure environments A strong technical background across Networks, Security, Firewall, Vulnerability Management, SIEM and EDR technologies Experience with cyber security concepts, such as Threat Modelling, Incident Response, Penetration Testing (external/internal) Advanced knowledge of More ❯
to ensure they meet our rigorous security standards. Perform regular security and risk reviews of their Service Provider environment to identify vulnerabilities and recommend remediation activities. Advise the senior leadership team on the latest security best practices, and stay ahead of emerging security threats, always keeping our organization one … security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusion detection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform More ❯
new clients, supporting engagements across multiple sectors and technical environments. This hands-on, client-facing position focuses on control implementation, infrastructure security hardening, technical remediation, and cyber risk reduction. You will be expected to work independently while maintaining alignment with industry standards and client requirements. Responsibilities Deliver and support … activities, including configuration reviews, security baseline application, and policy enforcement across cloud, on-premises, and hybrid environments. Conduct technical control assessments, gap analysis, and remediation planning to address vulnerabilities, misconfigurations, and non-compliance issues. Support the deployment of technical controls such as endpoint protection, access management, network segmentation, logging … reviews and technical workshops, offering practical insights to improve client security posture and delivery assurance. Provide clear and concise technical documentation, including implementation guides, remediation reports, and configuration artefacts to support assurance and audit requirements. Stay current with emerging cybersecurity threats, vulnerabilities, tools, and mitigation techniques to ensure that More ❯
of the things you'll be doing: Design and implement security measures to protect applications and infrastructure from vulnerabilities, attacks, and other risks. Perform vulnerability assessments, threat analysis, and incident response. Plan, scope and conduct Penetration Testing campaigns. Develop and integrate security requirements into the CI/CD pipelines. … or equivalent certification. Proficiency in programming or scripting languages, especially Python, and a solid understanding of the web stack and its components. Experience with vulnerability management tools, security scanners (e.g. Snyk, Qualys, Trivy, Dependabot, etc.), and secure systems configuration (e.g., firewalls, VPNs, IDS/IPS, WAF). DevSecOps mindset More ❯
improvement. Translate relevant directives, guidance, and rules into actionable data for consumption by the CISO and wider security teams. Operational Communicate vulnerabilities, risks and remediation methods to business owners, developers and technical teams. Perform security testing on data controls using dynamic and static analysis tools. Integrate the defined relevant … consumption by CLS Security, CISO, Executive Management Committee, and the CLS Board of Directors. Assure compliance with security controls to identify control gaps, develop remediation plans and determine residual risk. Improve security metrics program to report key performance and risk indicators, trend statistical data and publish management reports for … Risk Committee and Board reporting. Perform risk assessments of third-party vendors according to vendor criticality and vendor type to identify control gaps, develop remediation plans and determine residual risk. Perform risk assessments of applications according to application criticality and application type to identify control gaps, develop remediationMore ❯
Aberdeen, Aberdeenshire, United Kingdom Hybrid / WFH Options
Cammach Bryant
requirements. RESPONSIBILITIES The role involves continuously monitoring the organisation's network and systems for potential security breaches while conducting threat analysis, risk assessments, and vulnerability assessments. By identifying security risks, the position requires providing recommendations and implementing measures to remediate vulnerabilities and strengthen cyber defences. In the event of … and data. The position also entails developing and maintaining security policies, procedures, and standards while preparing and delivering reports on security threats, vulnerabilities, and remediation efforts to management and stakeholders. Other duties include; Maintain data confidentiality on sensitive cases. Maintain a deeper organisational understanding. Can facilitate cross functional collaboration. More ❯
Aberdeen, City of Aberdeen, United Kingdom Hybrid / WFH Options
Cammach Bryant
requirements. RESPONSIBILITIES The role involves continuously monitoring the organisation's network and systems for potential security breaches while conducting threat analysis, risk assessments, and vulnerability assessments. By identifying security risks, the position requires providing recommendations and implementing measures to remediate vulnerabilities and strengthen cyber defences. In the event of … and data. The position also entails developing and maintaining security policies, procedures, and standards while preparing and delivering reports on security threats, vulnerabilities, and remediation efforts to management and stakeholders. Other duties include; Maintain data confidentiality on sensitive cases. Maintain a deeper organisational understanding. Can facilitate cross functional collaboration. More ❯
You will: The role involves continuously monitoring the organisation's network and systems for potential security breaches while conducting threat analysis, risk assessments, and vulnerability assessments. By identifying security risks, the position requires providing recommendations and implementing measures to remediate vulnerabilities and strengthen cyber defences. In the event of … and data. The position also entails developing and maintaining security policies, procedures, and standards while preparing and delivering reports on security threats, vulnerabilities, and remediation efforts to management and stakeholders. Other duties include: Maintaining data confidentiality on sensitive cases. Maintaining a deeper organisational understanding. Facilitating cross-functional collaboration. Maintaining More ❯
You will: The role involves continuously monitoring the organisation's network and systems for potential security breaches while conducting threat analysis, risk assessments, and vulnerability assessments. By identifying security risks, the position requires providing recommendations and implementing measures to remediate vulnerabilities and strengthen cyber defences. In the event of … and data. The position also entails developing and maintaining security policies, procedures, and standards while preparing and delivering reports on security threats, vulnerabilities, and remediation efforts to management and stakeholders. Other duties include: Maintaining data confidentiality on sensitive cases. Maintaining a deeper organisational understanding. Facilitating cross-functional collaboration. Maintaining More ❯
of cloud security, particularly within AWS platforms. You will conduct independent security reviews, oversee penetration tests as necessary, and provide guidance to stakeholders on remediation strategies and best practices for integrating security into their application platforms. Your role will be pivotal in ensuring the protection of customer data and … Java, C++ - Experience with AWS products and services - Experience with service-oriented architecture and web services security - Detailed knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits - Knowledge of network and web related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS More ❯
cybersecurity risk management framework, including procedures and tools for identifying, assessing, monitoring, and reporting cybersecurity risks and vulnerabilities. Support the execution of risk assessments, vulnerability assessments, and penetration testing to identify potential cybersecurity risks and their impact on the organization. Provide dedicated security functions in accordance with the needs … 6+ years information security experience in a large and complex business environment 3+ years experience identifying and remediating application security risks as part of vulnerability assessments and remediation programs Strong knowledge of the development of application security assessment and code review methodologies. Strong knowledge of application security vulnerabilities … remediation and mitigation techniques, and secure coding practices Working knowledge of automated application security scanning tools such as Qualys, Prisma Cloud or other similar commercial solutions. Working knowledge of manual assessment tools, automation scripts and other commercial and open source tools is preferred. Strong analytical skills to troubleshoot technical More ❯
Operational Technology Vulnerability Analyst - Hyrbid - Permanent We're working with a market leader in the UK's energy transition who is on a mission to deliver a zero-emission future—and they need a Vulnerability Analyst like you to help protect it. As a Vulnerability Analyst, you … in a regulated critical infrastructure environment where your insights will directly impact the company — from cloud infrastructure to industrial control systems. Key Responsibilities: Conduct vulnerability assessments across OT systems, networks, and assets. Evaluate and prioritise risks specific to industrial control systems (ICS), SCADA, and other OT environments. Collaborate with … and cybersecurity teams to mitigate vulnerabilities and drive remediation. Maintain awareness of emerging OT threats, vulnerabilities, and attack vectors. Assist in developing and enhancing vulnerability management processes and tooling tailored for OT environments. Qualifications: Experience performing vulnerability assessments in Operational Technology or industrial environments. Familiarity with OT/ More ❯
aligned with industry best practice and regulatory standards. Take the lead on third-party risk assessments and security audits. Collaborate with technical teams on vulnerability management and remediation planning. Provide input on secure design and architecture of new systems and solutions. Monitor and enhance security tooling and incident More ❯