model, aligning it to the Global Application Cybersecurity team, ensuring standards and best practices are fully integrated into the Software Development Lifecycle. Within this role, you'll lead on vulnerability management, promoting the adoption and execution of the global vulnerability management processes and controls. This includes: Inventorying of logical components and dependencies of business solutions Proactively discovering vulnerabilities … Coordinating the execution of scanning, pen testing, or in general the activities and services of vulnerability identification Vulnerability assessment Remediation and mitigation of vulnerabilities Solution verification Reporting Contributing to the evolution of the process for vulnerability management. Lead security assessments of commercial packages You'll look to continually evolve the implementation of cybersecurity, implementing new measures … S-SDLC) Knowledge and understanding of cybersecurity threats and associated attack techniques. Design knowledge: modelling of components, data, interfaces, etc. Threat analysis and modelling Knowledge of web application security Vulnerability discovery techniques and vulnerability lifecycle scanning and management. Knowledge of application security architecture: segmentation, API Gateway, Encryption, Privileged Account Management, WAF, publishing, event collection tools and alert management. More ❯
team, IT System Administrators and various business stakeholders to implement policies, procedures, and tools to enhance cybersecurity posture Track and report on security-related project progress, compliance status, and vulnerabilityremediation efforts Coordinate with IT teams, internal developers, vendors, and business stakeholders to ensure alignment on technical solutions Evaluate and recommend third-party software tools and platforms that More ❯
one of the most ambitious Tech Transformations for one of the most renowned Investment Management firms in the UK. Responsibilities Perform hands-on security threat modelling, risk assessment and vulnerability remediation. Evaluate, architect, implement and support security focused tools and services. Work closely with Development teams to ensure security and privacy are built in by design, automating tasks wherever More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Lawrence Harvey
one of the most ambitious Tech Transformations for one of the most renowned Investment Management firms in the UK. Responsibilities Perform hands-on security threat modelling, risk assessment and vulnerability remediation. Evaluate, architect, implement and support security focused tools and services. Work closely with Development teams to ensure security and privacy are built in by design, automating tasks wherever More ❯
security access and manage IDS/IPS configurations Establishing and implementing security 'best-practice' standards as well as departmental policies and procedures Responsible for Security scanning and the efficient remediation of vulnerabilities Responsible for analysing all security incidents to determine root cause Determine, recommend, and implement upgrade security measures and controls Delivery security responses for customer and client compliance More ❯
platforms. A good understanding of network security and protocols like TCP/IP. Experience with technical concepts such as tunneling traffic and IP configuration. Experience delivering penetration tests and vulnerability assessments for networks, applications, and cloud services. Excellent communication skills, both verbal and written, with the ability to present to clients. Ability to manage time effectively and work to More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
MealSuite
Management Establish and maintain internal IT security policies and access controls. Oversee endpoint security and identity & access management (IAM). Implement and maintain security team tools, such as SIEM, vulnerability scanning, and endpoint detection solutions. Training & Awareness Develop and run organization-wide security training programs to foster a strong security culture company-wide. Educate employees on phishing, data protection More ❯
Information Security Specialist Overview Ref: (phone number removed) Information Security Specialist/ISO 27001/GDPR Exciting opportunity to join a global business that is still growing, the environment is fast paced and interesting and they really look after their More ❯
Information Security Specialist Overview Ref: (phone number removed) Information Security Specialist/ISO 27001/GDPR Exciting opportunity to join a global business that is still growing, the environment is fast paced and interesting and they really look after their More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating More ❯
security posture. This role is ideal for someone who understands the intersection of engineering, operations, and cybersecurity and wants to make a meaningful impact in complex, real-world environments. Vulnerability Management Security Assessment Policy Development Compliance and Regulations: Ensuring compliance and providing SME support to programmes of work delivering transformation in line industry standards such as IEC62443 and Industry … regulations (NIS, CAF, OG86 and HSE). Network Security Key Responsibilities Support the development and implementation of OT cyber security practices Contribute to the identification and remediation of vulnerabilities in OT systems Work with engineering, operations, and IT teams to embed cyber resilience across environments Help monitor and improve security controls, networks, and access policies Assist in the response More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating More ❯
security posture. This role is ideal for someone who understands the intersection of engineering, operations, and cybersecurity and wants to make a meaningful impact in complex, real-world environments. Vulnerability Management Security Assessment Policy Development Compliance and Regulations: Ensuring compliance and providing SME support to programmes of work delivering transformation in line industry standards such as IEC62443 and Industry … regulations (NIS, CAF, OG86 and HSE). Network Security Key Responsibilities Support the development and implementation of OT cyber security practices Contribute to the identification and remediation of vulnerabilities in OT systems Work with engineering, operations, and IT teams to embed cyber resilience across environments Help monitor and improve security controls, networks, and access policies Assist in the response More ❯
management of virtual infrastructure utilizing PowerCLI and Infrastructure as Code (IaC) tools such as Packer, Terraform, and Ansible Secure the virtual environment by implementing best practices, including patch management, vulnerabilityremediation, and access control Develop and implement disaster recovery and business continuity plans using tools such as Zerto and VMware Live Recovery What's required Bachelor's degree More ❯
Security isn't just about locking things down-it's about enabling innovation without compromise. If you're fluent in Terraform, experienced in vulnerability management, and thrive in mobile and cloud security, this contract role offers the chance to make an immediate impact on a fast-growing global platform. Joining as a Product Security Engineer, you'll take charge More ❯
tools such as: Metaspoit, Kali Linux, Cobalt Strike, Mimikatz, Burpsuite or similar tools Good knowledge of creating scripts in preferred scripting language Technical expertise in system security vulnerabilities and remediation techniques, network and web-related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, etc.) Technical expertise in security engineering, system and network security, authentication and security protocols Highest level More ❯
tools such as: Metaspoit, Kali Linux, Cobalt Strike, Mimikatz, Burpsuite or similar tools Good knowledge of creating scripts in preferred scripting language Technical expertise in system security vulnerabilities and remediation techniques, network and web-related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, etc.) Technical expertise in security engineering, system and network security, authentication and security protocols Highest level More ❯
security access and manage IDS/IPS configurations Establishing and implementing security 'best-practice' standards as well as departmental policies and procedures Responsible for Security scanning and the efficient remediation of vulnerabilities Responsible for analysing all security incidents to determine root cause Determine, recommend, and implement upgrade security measures and controls Delivery security responses for customer and client compliance More ❯
and traffic flows. Solid understanding of networking concepts and traffic flows. Understanding of how technology choices impact Cyber Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical skills, with the ability to More ❯
Newbury, England, United Kingdom Hybrid / WFH Options
Hays
and traffic flows. Solid understanding of networking concepts and traffic flows. Understanding of how technology choices impact Cyber Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical skills, with the ability to More ❯
consultative selling experience Externally recognised as an expert in one or more of the following v ulnerability management, cyber tolerant backup, DORA, NIST, Modern XOAR SOC Services, Risk-Based vulnerabilityremediation, digital operational resiliency solutions Preferred Skills and Experience Bachelor's degree or Master's degree 5 years of experience (minimum) selling technical services for multi-industry customers More ❯
and wants to make a meaningful impact in complex, real-world environments. Key Responsibilities Support the development and implementation of OT cyber security practices Contribute to the identification and remediation of vulnerabilities in OT systems Work with engineering, operations, and IT teams to embed cyber resilience across environments Help monitor and improve security controls, networks, and access policies Assist More ❯
and wants to drive meaningful impact across engineering, operations, and security functions. Key Responsibilities: Develop and implement OT/ICS cybersecurity practices across critical infrastructure Identify, assess, and support remediation of vulnerabilities within OT environments Collaborate with engineering, operations, and IT teams to embed cyber resilience Support compliance with relevant frameworks and standards (IEC 62443, NIS, OG86, CAF, etc. More ❯
and wants to drive meaningful impact across engineering, operations, and security functions. Key Responsibilities: Develop and implement OT/ICS cybersecurity practices across critical infrastructure Identify, assess, and support remediation of vulnerabilities within OT environments Collaborate with engineering, operations, and IT teams to embed cyber resilience Support compliance with relevant frameworks and standards (IEC 62443, NIS, OG86, CAF, etc. More ❯
and wants to drive meaningful impact across engineering, operations, and security functions. Key Responsibilities: Develop and implement OT/ICS cybersecurity practices across critical infrastructure Identify, assess, and support remediation of vulnerabilities within OT environments Collaborate with engineering, operations, and IT teams to embed cyber resilience Support compliance with relevant frameworks and standards (IEC 62443, NIS, OG86, CAF, etc. More ❯