hardware refreshes, system migrations, and software deployments. Cyber Security Act as a first responder to security incidents—triaging alerts, containing threats, and escalating to our SOC where appropriate. Support vulnerability management through patching, configuration management, and reporting. Assist with endpoint detection and response (EDR) tools and threat monitoring platforms (e.g., Microsoft Defender for Endpoint). Work alongside internal teams … Azure AD, and Windows Server environments. Solid networking knowledge (TCP/IP, DNS, DHCP, VPNs, VLANs, firewalls). Experience with IT security principles, practices, and tooling (e.g., EDR, MFA, vulnerability scanners). Ability to script or automate tasks using PowerShell or similar tools. Strong troubleshooting and analytical skills with a methodical approach. Ability to work with a hands-on More ❯
management principles. A motivated team player with excellent communication and stakeholder management skills. Nice to haves: Certifications in vendor, product, methodology, or industry standards. Experience with configuration management tools, vulnerability scanners, proxies, WAFs, and artifact management. Experience in secured Azure or other cloud architectures and engineering solutions. What’s in it for you: Employee assistance programme 25 days holiday More ❯
Exeter, Devon, United Kingdom Hybrid / WFH Options
Met Office
The following content displays a map of the jobs location - Exeter We're looking for an exceptional Vulnerability Management Manager to help us make a difference to our planet. As our Vulnerability Management Manager, the job may be suitable for hybrid working, which is where an employee works part of the week in the office and part of … Management Managerwithin the Security Operations team of the Met Office's Cyber Security Department you will be responsible for driving the vision and operational execution of the organisation's vulnerability management program, overseeing the end-to-end process of identifying, assessing, and recommending mitigations to vulnerabilities across digital services, including complex and mission-critical systems at the Met Office. … Leadership and Development:Lead, manage and mentor a team to ensure the team operate effectively. Develop the team utilising the career framework to identify learning needs and career pathways. Vulnerability Management: Manage and coordinate vulnerabilityscanning, risk assessments, and penetration testing to identify security weaknesses across systems, infrastructure, and digital services.Lead efforts to enhance vulnerability management More ❯
access View job & apply Zero Trust Architect Location: Fully Remote Job type: Contract Position Overview: Leading FinTech company seeking a Zero Trust Architect to design and implement Cyber Security Vulnerability Management Analyst Cyber Security Vulnerability Management Analyst required for a market leading financial services firm. It's a great opportunity to get to work with industry-leading tools … your analytical, technical and communication skills, and to really make a difference to our customers and colleagues. This role will contribute to the development, maintenance and overall delivery of Vulnerability Management controls for the Bank, reporting to the Vulnerability Management Lead. The Vulnerability Management Analyst will contribute to the day-to-day running of the team, assisting … Specialists with managing the Bank's Vulnerability Management controls and providing security input for vulnerabilities which threaten the organisation. Experience Understanding of vulnerability lifecycles, standards and ratings Risk assessing findings to determine appropriate response with a proactive approach to recording, management and escalation of risks Increasing the quality of vulnerability reporting automation to reduce manual effort Advanced More ❯
policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with … Expertise in Microsoft O365 Security Solutions including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerabilityscanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location: Leeds (LS18) On-site with More ❯
policies and regulations. User Support & Alerts – Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development – Support compliance with … Expertise in Microsoft O365 Security Solutions – including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerabilityscanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location: Leeds (LS18) – On-site with More ❯
policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with … Expertise in Microsoft O365 Security Solutions including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerabilityscanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location: Leeds (LS18) On-site with More ❯
TCP/IP, DNS, Load Balancers, network firewalls, SSL/TLS/mTLS, along with AWS Shield for DDoS protection, AWS WAF for web security, VPC segmentation, and automated vulnerability scanning. Container Security & Orchestration: Expertise in Docker, ECS, EKS, Kubernetes, implementing security best practices like image vulnerabilityscanning, Kubernetes RBAC, IAM Roles for Service Accounts (IRSA), Pod … such as CloudWatch, Security Hub, SIEM integrations. CI/CD Security & Automation: Proficient in Jenkins, Git, GitHub Actions, ensuring secure CI/CD pipelines with artifact encryption, automated security scanning, and DevSecOps best practices. Cloud-Based Database Security: Experience managing Amazon RDS, DynamoDB, ElastiCache, enforcing database encryption (KMS), automated backups, fine-grained access controls, and data integrity monitoring. Cost More ❯
tooling is optimised Provide advice and support to business units on security best practice and control implementation What We’re Looking For Hands-on experience with security tooling (EDR, vulnerabilityscanning, access control) Familiarity with Security frameworks such as NIST, PCI-DSS, and GDPR Experience working with Microsoft environments (O365, Azure) Clear communicator, able to engage with both … role, and wants to take on broader responsibilities Has been the security point-person in an IT team, leading on patching or endpoint protection Has hands-on experience with vulnerability management tools like Tenable, and is ready to play a bigger role in shaping how security tools are implemented and optimised across the business. This is a chance to More ❯
tooling is optimised Provide advice and support to business units on security best practice and control implementation What We’re Looking For Hands-on experience with security tooling (EDR, vulnerabilityscanning, access control) Familiarity with Security frameworks such as NIST, PCI-DSS, and GDPR Experience working with Microsoft environments (O365, Azure) Clear communicator, able to engage with both … role, and wants to take on broader responsibilities Has been the security point-person in an IT team, leading on patching or endpoint protection Has hands-on experience with vulnerability management tools like Tenable, and is ready to play a bigger role in shaping how security tools are implemented and optimised across the business. This is a chance to More ❯
Trust principles. Develop and enforce security policies and procedures for all IT systems and devices, taking into account diverse regional regulations and network conditions. Conduct regular security audits and vulnerability assessments, with a focus on remote access and endpoint security. Device Management & MDM (Worldwide Deployment): Manage device procurement, distribution, and lifecycle for a geographically diverse team. Implement and manage … On (SSO) and multi-factor authentication (MFA). Implement zero trust secure access from any location. Security Tooling & Integration: Evaluate, select, and onboard security solutions (e.g., endpoint protection, SIEM, vulnerability scanners). Integrate security tools with existing systems and workflows, ensuring effective threat detection and response. Automation & Scripting: Develop and maintain scripts and automation tools to streamline IT operations … and enhance security. Automate security tasks, such as patch management, vulnerabilityscanning or secure configuration enforcement. Vendor Management: Manage relationships with IT and security vendors and service providers. Evaluate vendor security practices and ensure compliance with company policies. Incident Response: Participate in security incident response and investigations, coordinating with remote team members and external partners. User Support & Training More ❯
years of experience in the information security field. Hands-on experience with AWS (or similar cloud platforms) and Cloudflare. Infrastructure as Code: Proficiency with Terraform or similar IaC tools. Vulnerability Knowledge: Solid understanding of common vulnerability classes and the OWASP Top 10. Coding & Scripting: Proficient in reading code (e.g., Python, Scala) and using Git for version control of … code and configuration changes. Familiarity with iOS or Android security. Experience of industry-standard SIEM and vulnerabilityscanning tools. Nice to have: Relevant industry certifications (CISSP, OSCP, etc.). Experience of supporting audits such as ISO27001. Experience of working with security risk management frameworks such as ISO31000. Knowledge of security control frameworks such as CIS, NIST800-53 and More ❯
organisation’s security posture. This role has ownership of key initiatives such as ensuring compliance with security frameworks like ISO 27001, NIST, and COBIT, implementing new security tools, supporting vulnerabilityscanning and facilitating penetration testing to identify and address weaknesses in the tech estate. Additionally, this role will collaborate closely with third-party vendors and stakeholders across various More ❯
ll be a central figure in driving security excellence. Acting as the first point of contact for all internal ECS security queries, advice, and guidance, you’ll also lead vulnerability assessments across ECS products, ensuring risks are identified, communicated, and addressed effectively. You’ll play a hands-on role in shaping ECS security policies, supporting penetration testing, and guiding … Experience working with cloud technologies, particularly AWS and Azure. • Proven background in security governance, compliance, and audit practices. • Familiarity with ISO 27001, Risk Management, and GDPR frameworks. • Proficient in vulnerabilityscanning tools such as, but not limited to: Microsoft Defender for Cloud. Tenable.sc. AWS Security Hub. • Strong stakeholder management skills, with experience working across diverse teams. Desirable Criteria More ❯
London, England, United Kingdom Hybrid / WFH Options
HowNow
Work with engineering and DevOps to implement security controls across infrastructure (e.g., access control, encryption, logging). Lead the incident response process and manage third-party pen testing and vulnerability management. Support security questionnaires, RFPs, and due diligence for customer deals. Review third-party vendors and tools for security posture and risks. The key qualities we’re looking for … endpoint protection, SIEMs, DLP, IAM, and SSO. Clear understanding of data privacy laws (especially GDPR). Familiarity with security tools (e.g., endpoint protection, SSO/IAM, monitoring/logging, vulnerabilityscanning). Experience with risk assessments, incident response planning, and writing security policies. Strong communication skills, with the ability to explain security concepts to both technical and non More ❯
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding More ❯
London, England, United Kingdom Hybrid / WFH Options
Flo Health Inc
years of experience in the information security field. Hands-on experience with AWS (or similar cloud platforms) and Cloudflare. Infrastructure as Code: Proficiency with Terraform or similar IaC tools. Vulnerability Knowledge: Solid understanding of common vulnerability classes and the OWASP Top 10. Coding & Scripting: Proficient in reading code (e.g., Python, Scala) and using Git for version control of … code and configuration changes. Familiarity with iOS or Android security. Experience of industry-standard SIEM and vulnerabilityscanning tools. Nice to have: Experience of supporting audits such as ISO27001. Experience of working with security risk management frameworks such as ISO31000. Knowledge of security control frameworks such as CIS, NIST800-53 and ISO27001. How we work We’re a More ❯
London, England, United Kingdom Hybrid / WFH Options
AJ Bell
threats targeting AJ Bell and ensuring our defenses provide an effective response. Key responsibilities: Reviewing and assessing Security Operations Centre alerts to ensure an appropriate response is taken. Overseeing vulnerabilityscanning to confirm the effectiveness of patching. Monitoring systems for compliance with policy and supporting remediation where required. Tracking and managing penetration testing programs. Investigating and responding to More ❯
Sentinel or similar SIEM tools. Strong verbal and written English communication skills. Interpersonal and presentation skills. Strong analytical skills. Understanding network traffic flows, normal vs. suspicious activities. Knowledge of VulnerabilityScanning, Management, and Ethical Hacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines (Incident, Problem, Change Management). Ability More ❯
London, England, United Kingdom Hybrid / WFH Options
Applicable Limited
Design and Implementation: Design and implement security architectures that align with industry standards, regulations (JSPs, DEFSTAN), and client requirements. Conduct security architecture reviews, perform hands-on security assessments, including vulnerabilityscanning, configuration reviews, and security control validation, identifying vulnerabilities and implementing remediation strategies. Develop and present security architecture roadmaps and strategic plans and then put those plans into More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
AJ Bell
the threats targeting AJ Bell and ensuring our defences provide and effective response. Key responsibilities: Reviewing and assessing Security Operations Centre alerts to ensure an appropriate response taken. Overseeing vulnerabilityscanning to confirm the effectiveness of patching Monitoring systems for compliance with policy and supporting remediation where required. Track and manage penetration testing programs. Investigate and respond to More ❯
goals and industry standards. Take ownership of security project execution, prioritizing tasks and aligning initiatives with team and company objectives. Use and optimize advanced security tools, including SIEMs and vulnerability scanners, to enhance detection, logging, and analysis capabilities. Conduct regular and detailed vulnerability assessments, identifying gaps in security controls and implementing mitigation strategies. Support compliance efforts, ensuring documentation … of operating system, networking, and application hardening for Windows, macOS, and Linux, including virtualization security. Experience deploying, maintaining, and administering security technologies like IDS, DLP, FIM, firewalls, SIEM, MFA, vulnerability assessment tools, web proxies, and WAFs. Experience with cloud providers and Infrastructure as Code (IaC) tools, such as Terraform, Ansible, or CloudFormation. Proficiency in AWS security best practices. Skills More ❯
Cyber Security Engineer will deliver high-quality security guidance and support across the organization. Key Responsibilities Configuring, monitoring, and responding to alerts from endpoint systems, networks, IDS/IPS, vulnerability scanners, and SIEM tools. Investigating server logs, firewall logs, traffic logs, and host system logs to identify potential issues. Identifying, tracking, and resolving cybersecurity threats and alerts effectively. Developing More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Cyber Talent Limited
and standards. Proficiency with DevOps and DevSecOps tools (e.g. GitLab CI/CD, Ansible, Terraform). Experience with security tools like SIEM/SOAR (preferably Rapid7), IDS/IPS, vulnerability scanners, and code analysis tools (SonarCloud, Snyk, Chekov) Strong knowledge of network security, encryption, identity and access management, and application security. Certifications (Preferred): CISSP, CISM, or equivalent for security More ❯