Farnborough, Hampshire, United Kingdom Hybrid / WFH Options
Thebusinessyear
expertise and strategic planning to prevent attacks and vulnerabilities. Your responsibilities include planning and implementing security controls to safeguard information. Key functions/outputs: VulnerabilityScanning & Reporting Change Work Participation in Regular Meetings Documentation Main Objectives: VulnerabilityScanning & Reporting Conduct regular vulnerability scans, generate reports … and ensure tools are current to identify system weaknesses. Perform code scans, vulnerability management scans, and assist in reporting to the cyber security team. Update endpoint protection, ensure antivirus and anti-malware are current, and audit network controls and access permissions. Recognize and respond to potential incidents, including containment … SITT and perform security testing and assurance activities during planning phases. Participation in Regular Meetings: Lead or attend meetings such as Security Working Groups, Vulnerability Triage, Security Workshops, PI Planning, and Daily Standups, providing cybersecurity input. Documentation: Create and maintain detailed security documentation including design documents, SOPs, and compliance More ❯
a broad knowledge of Cyber security technologies and have excellent skills in network security, monitoring and incident response. Exposure to EDR technologies, IPS and Vulnerability Management tools would be beneficial. A good understanding of legislation and security frameworks such as the Network and Information Systems Regulations, ISO 27001 and … a Cyber Security incident. As a member of the ICT team at Hywel Dda you will work with the Cyber Security team to undertake vulnerabilityscanning, the monitoring of Cyber Security Systems utilising SIEM technologies and work with third parties to review compliance with best practice. You will … Security. Evidence of Cyber Security or other relevant work outside formal training or employment (voluntary, research, academia, social media etc.) Working with SIEM and Vulnerabilityscanning solutions. Development of training packages. Desirable Experience of ICT service provision in a health care setting Experience of working in fields other More ❯
tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as key management, vulnerabilityscanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the continuous integration … In-depth knowledge of DevSecOps tools such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerabilityscanning, encryption, authentication, and secrets management (Vault, Key Management Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat More ❯
detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerabilityscanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Perform or coordinate internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA … organization. Participates in change management meetings and provides expert input to ensure security is maintained. Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering. Ability to manage and continuously improve upon vulnerability management program. Ability More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job … and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout VulnerabilityScanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic Management Skills IT Technical More ❯
Technical Expertise: Provide guidance on secure architecture, secrets management, and best practices. Threat Management: Lead all aspects of penetration testing, bug bounty programs, and vulnerability reporting to mitigate risks and align with regulations. Vendor Relationships: Manage partnerships with security vendors, ensuring value and support. Cyber Governance Compliance and Risk … senior cyber security role, ideally within a complex, global organisation. Deep expertise in one or more of the following areas: security consultancy, security engineering, vulnerability management or governance. Deep knowledge of modern DevSecOps practices. Experience in leading vulnerability management programs, including expertise in utilising tools and processes for … vulnerabilityscanning, conducting penetration testing, and delivering actionable reporting to support an effective and comprehensive vulnerability management strategy. Excellent communication and stakeholder management skills, with the ability to convey complex technical issues to non-technical audiences. Hands-on experience collaborating with engineering and development teams to integrate More ❯
incident reports. Project Delivery Take part in the team's project delivery initiative, rotating between the following roles on a 1-3 monthly schedule: Vulnerability Management - maintain regular scans, interpret results, identify asset owners, track remediation activities and report on the agreed SLAs. Security Controls Administration - maintain availability and … and standard use cases of technical security products, such as firewalls, anti-virus, web proxies, SIEM, IDS/IPS, DLP, and EDR. Familiarity with vulnerabilityscanning and penetration testing tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but not required): Cyber More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Duel
Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerabilityscanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development process. Assist in … security compliance frameworks such as ISO 27001 or SOC 2, even if not previously responsible for certification processes. Experience working within security risk management, vulnerability tracking, or operational security efforts. Prior experience working with engineering teams on security topics is beneficial, particularly around secure development practices. Ability to clearly … or Vanta. Experience working with pen testing and bug bounties a plus. Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerability management solutions. Experience or knowledge of cloud security (AWS, GCP, or Azure). Awareness of security best practices in application and infrastructure security. Some More ❯
security policies and procedures for all IT systems and devices, taking into account diverse regional regulations and network conditions. Conduct regular security audits and vulnerability assessments, with a focus on remote access and endpoint security. Device Management & MDM (Worldwide Deployment): Manage device procurement, distribution, and lifecycle for a geographically … authentication (MFA). Implement zero trust secure access from any location. Security Tooling & Integration: Evaluate, select, and onboard security solutions (e.g., endpoint protection, SIEM, vulnerability scanners). Integrate security tools with existing systems and workflows, ensuring effective threat detection and response. Automation & Scripting: Develop and maintain scripts and automation … tools to streamline IT operations and enhance security. Automate security tasks, such as patch management, vulnerabilityscanning or secure configuration enforcement. Vendor Management: Manage relationships with IT and security vendors and service providers. Evaluate vendor security practices and ensure compliance with company policies. Incident Response: Participate in security More ❯
to implement security controls across infrastructure (e.g., access control, encryption, logging). Lead the incident response process and manage third-party pen testing and vulnerability management. Customer & Vendor Security: Support security questionnaires, RFPs, and due diligence for customer deals. Review third-party vendors and tools for security posture and … and SSO. Clear understanding of data privacy laws (especially GDPR). Familiarity with security tools (e.g., endpoint protection, SSO/IAM, monitoring/logging, vulnerabilityscanning). Experience with risk assessments, incident response planning, and writing security policies. Strong communication skills, with the ability to explain security concepts More ❯
security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusion detection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
SOC team to enhance Sentinel SIEM, runbooks, and threat detection. Lead investigations into security incidents and conduct proactive threat hunting. Manage endpoint security, patching, vulnerabilityscanning, and system hardening. Support audits and compliance with Cyber Essentials Plus , ISO 27001 , and other frameworks. Partner with DevOps, InfoSec, and platform … Participate in a 1-in-6 on-call rota after completing probation. Key Requirements: Hands-on knowledge of SIEM platforms (preferably Sentinel), EDR, and vulnerability management. Familiarity with frameworks like Cyber Essentials Plus and ISO 27001. Experience in securing hybrid cloud environments (Microsoft Azure desirable). Experience in DevOps More ❯
real-world operations. You’ll be responsible for overseeing the delivery and integration of key security services — including penetration testing, threat modelling, logging, and vulnerabilityscanning — into enterprise platforms and workflows. You’ll work cross-functionally to align technical services with business and risk priorities, helping to unblock … least 3 years of experience in a similar service delivery or cyber consultancy role Deep understanding of enterprise security services: Pen testing, threat modelling, vulnerability management, logging & monitoring, incident response Strong communication and stakeholder engagement skills Excellent documentation and governance capability CISM or CISSP certification Degree in Computer Science More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
BAE Systems (New)
and affected business units. Maintain compliance with frameworks such as Secure by Design, NIST-800-53, STRAP. Security Testing - Scope and oversee penetration testing, vulnerabilityscanning, and other security validation activities to ensure effectiveness of security controls. Design and Architecture Review - Assess the Information Security of IT architecture More ❯
business units. Maintain accreditation and compliance with frameworks such as Secure by Design, NIST-800-53, STRAP; Security Testing - Scope and oversee penetration testing, vulnerabilityscanning, and other security validation activities, to ensure effectiveness of security controls; Design and Architecture Review - Assess the Information Security of IT architecture More ❯
methodology and/or industry certifications. Experience in working in a regulated environment. Experience of; configuration management tools, Jenkins, host virtualisation, containerisation, ELK, Splunk, vulnerability scanners, proxies, WAFs, artefact management, serverless deployments, data streaming and transformation. Experience in secured AWS, or other, Cloud architectures and engineering solutions. What You More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
incidents relating to internal and customer assets. Designing and developing SIEM security use cases. Designing and implementing security controls and secure configurations. Maintaining proactive vulnerabilityscanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and … stakeholders to discuss security related matters. Skills Required: Proven hands-on experience as a Security Engineer or similar working with tools such as SIEM, vulnerability management, endpoint detection & response (EDR), applications security, identity, and access management, etc. Ability to work in a small high performing team, collaborating with other … utilising different security technologies, including but not limited to private and cloud infrastructure. Technical knowledge and experience with SIEM, SOAR, IDPS, DDoS, Malware Protection, Vulnerability Management, and Application Security tooling, etc. Knowledge of Information Security frameworks (CIS, NIST, NCSC CAF), supporting processes and toolsets. Ability to breakdown and solve More ❯
range of security technologies, including SIEM solutions, DLP solutions, firewall solutions, cloud security centers, IPS (Intrusion Prevention Systems), CTI (Cyber Threat Intelligence) solutions, and vulnerability scanners. Proxy solutions like Zscaler are essential. At least one professional certification; CISSP, CISM, CCSP. What we offer you 18% Bonus Car allowance (or More ❯
Kubernetes, Prometheus, Grafana). Exposure to cloud platforms (AWS, Azure, GCP) in a QA/testing capacity. Knowledge of static code analysis tools and vulnerability scanners (e.g., SonarQube, Snyk). ISTQB certification or equivalent is a plus. Due to the timescales of the project and organisation it sits within More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
Corriculo Ltd
other security products Experience with Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don More ❯
West Midlands, United Kingdom Hybrid / WFH Options
Arthur J. Gallagher & Co
about cybersecurity, excellent communication skills, and a willingness to learn and develop. Certifications like CPSA, Sec+, CEH, Pentest+, PPNT. Industry cybersecurity experience. Experience with vulnerabilityscanning technologies. Compensation and benefits On top of a competitive salary, great teams and exciting career opportunities, we also offer a wide range More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
project to ensure the efficient operation of end user devices, including Laptops, phones, handheld devices etc. The primary responsibility with the role will be vulnerability Management, including conducting regular assessments, implementing security measures and liaising with various depts. The successful candidate will implement and manage software patches promptly and … configure MS Teams, Intune and Endpoint Config Manager accordingly. Skills required: - Relevant experience in vulnerability management and endpoint security Strong knowledge of MS Teams, Intune and Endpoint Configuration manager Familiar with identity and access management principles Responsibilities: Respond to incidents related to EUC reported through the Service Desk or … Implement and manage software patches for end user computing devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with organisational More ❯