solid understanding of the Microsoft stack Entra, Defender & Azure Sentinel and hands on experience with a wide range of security technologies, including firewalls, intrusion detection/prevention, SIEM and vulnerability scanners. Experience with cloud security environments is required for this role (AWS or Azure) As part of the role, you will support the sales engagements with a deep understanding More ❯
London, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
testing, and automated security validation. Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR, DLP, vulnerability scanners, firewalls, email gateways. Degree in Computer Science, Engineering, or a related STEM field. If you think that this could be a good fit for you, then please apply More ❯
maintaining, and configuring a wide range of security technologies, including SIEM solutions, DLP solutions, firewall solutions, cloud security centers, IPS (Intrusion Prevention Systems), CTI (Cyber Threat Intelligence) solutions, and vulnerability scanners. Proxy solutions like Zscaler are essential. At least one professional certification; CISSP, CISM, CCSP. What we offer you 18% Bonus Car allowance (or cash alternative) Hybrid Working More ❯
Xcede Greater London, England, United Kingdom Lead Vulnerability Management Engineer A leading financial technology and data science firm requires a Lead Vulnerability Management Engineer who will be responsible for delivering a "greenfield" global vulnerability management programme. The role entails delivering the technical aspects of vulnerability management; identification and prioritisation, as well as the non-technical side … management. The position reports directly to the Head of Security. Please note: the role requires at least 3 days in the office. Responsibilities 5 -10 years of experience in vulnerability management or a similar security role in globally distributed financial (or complex) technology environment Strong technical knowledge with hands-on experience using vulnerabilityscanning/assessment tools More ❯
Threat and Vulnerability Engineer The successful candidate for this position will be a subject matter expert in Information Security, possessing a wide range of experience in various technologies, tools, and methodologies. The primary responsibilities of this role include identifying, analyzing, and prioritizing vulnerabilities within the organization. The candidate will be expected to provide proactive security recommendations and engage in … a best-in-class program to partner with the business to protect the Firm’s information and computer systems. Principal Responsibilities Perform periodic and on-demand system audits and vulnerability assessments of systems, internal applications, and Cloud services to identify security vulnerabilities. Document, prioritize, and formally report on asset and vulnerability status as remediation activities progress. Analyze cyber … and improve security posture. Perform threat hunting and look-backs on IOC’s. Partner with Infrastructure teams in Networking, Desktop Engineering, Compute, and others to track and report on vulnerability remediation activities. Perform data analysis using scripting, databases, and Excel. Maintain and create metrics reporting for governance purposes. Qualifications Bachelor’s degree in Cyber Security, Computer Science, or Engineering More ❯
Trust in digital transactions and financial technologies is crucial for the smooth functioning of modern society. Neelam Kadbane, our next pathbreaker, Senior Vulnerability Analyst at Mastercard, identifies and addresses security vulnerabilities within Mastercard's environment & products by conducting network penetration tests. Neelam talks to Shyam Krishnamurthy fromThe Interview Portal about the innumerable challenges and the satisfacation of her work … . It was a significant achievement for me, especially since it's rare for companies to hire freshers directly into the InfoSec domain. At Qualys, I worked with the Vulnerability Management team, where we researched new CVEs and zero-day vulnerabilities, and developed signatures for vulnerability scanners. A zero-day vulnerability is a security flaw in software … or hardware that is unknown to the vendor or developer. Since the vendor is unaware of the vulnerability, no patch or fix is available, making it highly dangerous. The term "zero-day" comes from the fact that once the vulnerability is discovered by malicious actors, the vendor has zero days to fix it before it can be exploited. More ❯
applications. You will be responsible for identifying vulnerabilities, conducting security assessments, and implementing robust security measures to protect our systems and client data. Key Responsibilities: Perform security assessments and vulnerabilityscanning for web applications, APIs, and infrastructure. Collaborate with development teams to implement secure coding practices and address vulnerabilities. Review and advise on secure architecture and design for … testing, and secure software development practices. Strong understanding of security vulnerabilities (OWASP Top 10, etc.) and secure coding techniques. Experience with security tools (e.g., static/dynamic analysis tools, vulnerability scanners). Familiarity with common web technologies (e.g., Java, Python, JavaScript, SQL). Knowledge of security frameworks and standards (e.g., NIST, ISO 27001). Strong problem-solving skills and More ❯
infrastructure Familiarity with industry security standards and compliance frameworks Strong documentation, communication, and leadership skills Desirable qualifications and experience: Industry certifications or working toward one Experience with Microsoft Defender, vulnerabilityscanning, and disaster recovery planning Understanding of ITIL and service management methodologies Why consider this role? Join a forward-thinking, values-led organisation with a strong public service More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Adria Solutions
infrastructure Familiarity with industry security standards and compliance frameworks Strong documentation, communication, and leadership skills Desirable qualifications and experience: Industry certifications or working toward one Experience with Microsoft Defender, vulnerabilityscanning, and disaster recovery planning Understanding of ITIL and service management methodologies Why consider this role? Join a forward-thinking, values-led organisation with a strong public service More ❯
Brighton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
per week in their Brighton office. What You’ll Be Doing: Collaborate with engineering and DevOps teams to embed secure-by-design principles across platforms and services Perform regular vulnerabilityscanning, threat assessments , and maintain security tooling Monitor systems for potential risks and produce incident and compliance reports Support the definition and upkeep of security policies, standards, and More ❯
Eastbourne, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
per week in their Brighton office. What You’ll Be Doing: Collaborate with engineering and DevOps teams to embed secure-by-design principles across platforms and services Perform regular vulnerabilityscanning, threat assessments , and maintain security tooling Monitor systems for potential risks and produce incident and compliance reports Support the definition and upkeep of security policies, standards, and More ❯
Manage day-to-day IT & Engineering needs (system administration, help desk support). Monitor security tools and respond to alerts and incidents. COMPLIANCE ACTIVITIES: Change Management Incident Management Maintenance Vulnerabilityscanning Implement NIST SP 800-171 for internal systems. Establish a System Security Plan (SSP) . The SSP needs to go through each NIST SP 800-171 control More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
MealSuite
Management Establish and maintain internal IT security policies and access controls. Oversee endpoint security and identity & access management (IAM). Implement and maintain security team tools, such as SIEM, vulnerabilityscanning, and endpoint detection solutions. Training & Awareness Develop and run organization-wide security training programs to foster a strong security culture company-wide. Educate employees on phishing, data More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
SyOps, DPIAs, threat models, and continuous threat assessments. Ensuring compliance with assurance frameworks like Government Security Classifications (GSC), NCSC guidance, Cabinet Office requirements, GDPR, and ISO27001. Conducting threat and vulnerability assessments for macOS devices, MDM platforms, developer tooling, remote access, and cloud-native infrastructure. Promoting secure-by-design practices in collaboration with security architects, engineering, DevOps, and testing teams. … Security principles, GDS Service Standards, and government accreditation processes. Hands-on experience producing RMADS, SyOps, DPIAs, and similar artifacts. Experience with security tooling for risk assessments, threat modeling, and vulnerability scanning. Active Security Clearance. Additional preferred skills include experience in DevSecOps or agile environments, knowledge of Zero Trust architecture, IAM, and cloud-native security practices. #J-18808-Ljbffr More ❯
London, England, United Kingdom Hybrid / WFH Options
VE3
monitoring using tools like Ansible, Chef, or Puppet. Monitor system performance and troubleshoot issues across infrastructure and applications. Implement and enforce security best practices, including IAM policies, encryption, and vulnerability scanning. Collaborate with development teams to support deployment, testing, and release management. Create and maintain documentation related to infrastructure, policies, and procedures. Provide on-call support and participate in … monitoring using tools like Ansible, Chef, or Puppet. • Monitor system performance and troubleshoot issues across infrastructure and applications. • Implement and enforce security best practices, including IAM policies, encryption, and vulnerability scanning. • Collaborate with development teams to support deployment, testing, and release management. • Create and maintain documentation related to infrastructure, policies, and procedures. • Provide on-call support and participate in More ❯
and frameworks (HMG SPF and ISO27001). Experience with public sector programmes. Desirable: PCiIAA, SABSA, TOGAF, and enterprise architecture expertise. Knowledge of identity management, PKI, SIEM, cryptography, firewalls, and vulnerability scanning. A security-based master's or STEM degree preferred. Eligibility and willingness to gain UK Security Clearance. Additional Information Seniority level: Mid-Senior level Employment type: Full-time More ❯
in conducting OT security audits or assessments in manufacturing or infrastructure settings. Strong understanding of cybersecurity frameworks (NIST CSF, IEC 62443, NERC CIP). Familiarity with network security tools (vulnerability scanners, packet analyzers, IDS/IPS). Excellent interpersonal and communication skills across technical and non-technical teams. Bachelor’s degree in Engineering, Cybersecurity, IT, or a related field More ❯
in conducting OT security audits or assessments in manufacturing or infrastructure settings. Strong understanding of cybersecurity frameworks (NIST CSF, IEC 62443, NERC CIP). Familiarity with network security tools (vulnerability scanners, packet analyzers, IDS/IPS). Excellent interpersonal and communication skills across technical and non-technical teams. Bachelor’s degree in Engineering, Cybersecurity, IT, or a related field More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
testing, and automated security validation. Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR, DLP, vulnerability scanners, firewalls, email gateways. Degree in Computer Science, Engineering, or a related STEM field. If you think that this could be a good fit for you, then please apply More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
testing, and automated security validation. Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR, DLP, vulnerability scanners, firewalls, email gateways. Degree in Computer Science, Engineering, or a related STEM field. If you think that this could be a good fit for you, then please apply More ❯
Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
remote working platforms. Lead compliance efforts for PCI-DSS, Public Services Network (PSN), and data protection standards. Administer security tools such as antivirus, firewalls, email/web filtering, and vulnerability scanning. Maintain the disaster recovery strategy and conduct regular DR testing. Act as a senior technical resource for incident response, threat monitoring, and 3rd line infrastructure support. What We More ❯
Reading, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
remote working platforms. Lead compliance efforts for PCI-DSS, Public Services Network (PSN), and data protection standards. Administer security tools such as antivirus, firewalls, email/web filtering, and vulnerability scanning. Maintain the disaster recovery strategy and conduct regular DR testing. Act as a senior technical resource for incident response, threat monitoring, and 3rd line infrastructure support. What We More ❯
Brighton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
remote working platforms. Lead compliance efforts for PCI-DSS, Public Services Network (PSN), and data protection standards. Administer security tools such as antivirus, firewalls, email/web filtering, and vulnerability scanning. Maintain the disaster recovery strategy and conduct regular DR testing. Act as a senior technical resource for incident response, threat monitoring, and 3rd line infrastructure support. What We More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
remote working platforms. Lead compliance efforts for PCI-DSS, Public Services Network (PSN), and data protection standards. Administer security tools such as antivirus, firewalls, email/web filtering, and vulnerability scanning. Maintain the disaster recovery strategy and conduct regular DR testing. Act as a senior technical resource for incident response, threat monitoring, and 3rd line infrastructure support. What We More ❯