with relevant security frameworks and regulations, identifying potential compliance issues and contributing to mitigation strategies. Technology Evaluation, Deployment, and Management: Conducts security architecture reviews and perform security assessments, including vulnerabilityscanning, configuration reviews, and cloud security posture assessments, identifying vulnerabilities and recommending detailed remediation strategies. Contribute to the development of security architecture roadmaps and strategic plans, and support More ❯
Strong interpersonal and presentation skills. Strong analytical skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of More ❯
years of experience in the information security field. Hands-on experience with AWS (or similar cloud platforms) and Cloudflare. Infrastructure as Code: Proficiency with Terraform or similar IaC tools. Vulnerability Knowledge: Solid understanding of common vulnerability classes and the OWASP Top 10. Coding & Scripting: Proficient in reading code (e.g., Python, Scala) and using Git for version control of … code and configuration changes. Familiarity with iOS or Android security. Experience of industry-standard SIEM and vulnerabilityscanning tools. Nice to have: Relevant industry certifications (CISSP, OSCP, etc.). Experience of supporting audits such as ISO27001. Experience of working with security risk management frameworks such as ISO31000. Knowledge of security control frameworks such as CIS, NIST800-53 and More ❯
policies. You will interact with IT representatives to ensure adherence to corporate and information security policies. You will have skills to provide expert level assurance in penetration testing and vulnerability assessments. The ability to manage business and IT expectations, compliance, and Security requirements are critical to success. You should also have the ability to manage a small team/… testers. Ensure smooth delivery and completion of penetration tests. Providing regular updates to Cyber Assurance Program Managers on status of tests you have been allocated to support. Perform Technical Vulnerability and Web Application scans and provide output to security testers/application owners where required. Conduct quality assurance on vendor supplied reports for Cyber Assurance Program Managers at end … lifecycle, OWASP Application vulnerabilities and IT systems. Knowledge of Cybersecurity frameworks (e.g., NIST, ISO 27001) and compliance regulations (e.g., DORA, GDPR, Cyber Essentials). Familiarity with Security tooling and vulnerabilityScanning e.g. Qualys, Nessus, Burpsuite Digital Forensics or Discovery experience Basic understanding of eMail infrastructure/Outlook/Office365 and Microsoft Application Basic understanding of virtual environments Bachelor More ❯
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding … a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Clydebank, Dunbartonshire, United Kingdom Hybrid / WFH Options
Nine Twenty
Maintains awareness of industry best practices and applies them to organisational security policies. Implements and monitors security systems such as firewalls, intrusion detection systems, endpoint protection, log monitoring, and vulnerability scanning. Investigates and documents security breaches and cyber incidents, including assessment of impact and coordination of remediation efforts. Coordinates penetration testing with internal or external parties as appropriate. Drives More ❯
play a key role in shaping the transformation journey of enterprise clients. The role will suit professionals with a strong background in SOC service delivery , incident response coordination , and vulnerability management . Key Responsibilities: Act as the primary liaison between clients and internal operational delivery teams, ensuring seamless communication and service excellence. Serve as the key escalation point for … Prepare and deliver weekly or monthly service review reports for stakeholders. Support the review and optimisation of service delivery processes, ensuring continuous improvement and implementation of best practices. Lead vulnerability management initiatives: Perform risk-based vulnerabilityscanning across systems, applications, and networks. Prioritise vulnerabilities by risk level and asset criticality, coordinating remediation with business stakeholders. Manage and … providing technical support and advisory services within a Security Operations Centre. Deep understanding of security incident management , SOC operations, and cyber threat response. At least 5 years' experience delivering vulnerability management services. Proven expertise in managing IDS and IPS technologies. Strong crisis leadership skills with the ability to manage high-pressure incidents efficiently. Excellent communication skills to effectively engage More ❯
Security measures. Strong documentation and reporting skills. Technical experience and knowledge of Cyber Security (up to date). (Desirable) experience working with Security Information and Event Management (SIEM) and Vulnerability Assessment. (Desirable) Knowledge of attack methodologies and system hardening principles including aspects of vulnerabilityscanning and detection and security testing. (Desirable) experience working with MS Sentinel (SIEM More ❯
Platform (e.g., Cloud IAM, Security Command Center, VPC Service Controls) and Azure/M365 (e.g., Azure Security Center, Azure AD, Microsoft Defender for Cloud). Conduct regular security assessments, vulnerabilityscanning, and penetration testing of cloud infrastructure and applications. Monitor cloud environments for security threats, anomalies, and incidents, and lead incident response efforts. Collaborate with development, operations, and More ❯
Platform (e.g., Cloud IAM, Security Command Center, VPC Service Controls) and Azure/M365 (e.g., Azure Security Center, Azure AD, Microsoft Defender for Cloud). Conduct regular security assessments, vulnerabilityscanning, and penetration testing of cloud infrastructure and applications. Monitor cloud environments for security threats, anomalies, and incidents, and lead incident response efforts. Collaborate with development, operations, and More ❯
with a focus on enterprise-level environments. Solid understanding of Cyber Security Best Practices, risk management, and network hardening techniques. Hands-on experience in CVE detection and remediation (including vulnerabilityscanning tools like Nessus, Qualys, etc.). Cisco Certifications (CCIE, CCNA, etc.) with recent experience working on Cisco switches, routers, and other networking devices. Preferred: Certifications such as More ❯
including preparing for and undergoing assessments. Familiarity with information security frameworks (e.g., NIST, CIS). Proficiency in risk management methodologies. Knowledge of common security technologies (e.g., firewalls, EDR, SIEM, vulnerability scanners). Exceptional analytical, problem-solving, and decision-making abilities. Excellent communication (written and verbal), interpersonal, and presentation skills. Ability to operate autonomously and manage multiple priorities in a More ❯
responsible for protecting enterprise systems and data. This role offers hands-on involvement with a wide range of technologies-from endpoint detection and SIEM platforms to firewalls, MFA, and vulnerability management-providing a well-rounded foundation in enterprise security operations. You'll gain exposure to advanced security practices, assist in running and responding to threat detection systems, and contribute … to projects that strengthen security across the organisation. Key Responsibilities Monitor and respond to security alerts and incidents (EDR, SIEM, Identity Protection, SOAR). Assist in vulnerabilityscanning and remediation activities. Help manage systems such as email and web security gateways, VPNs, MFA, SSO, and mobile device security. Support the maintenance of security certificates, PAM systems, and conditional … platforms in a corporate IT environment. Experience with some of the following: EDR platforms (e.g., CrowdStrike) Email or web security gateways (e.g., Mimecast) MFA/SSO (e.g., Duo, Okta) Vulnerability scanners (e.g., Rapid7, Tenable, Nessus) InTune and Conditional Access Exposure to: Imperva WAF KnowBe4 Certificate management tools Kali Linux toolset and penetration testing basics Qualifications: Working towards or holding More ❯
business and technology teams delivery of the security change programme. Provide support to the business and technology teams to understand and address vulnerabilities within SLA, identified through penetration testing, vulnerabilityscanning and red team exercises Foster relationships with internal business units to enhance cyber security communication, including knowledge of threats, vulnerabilities, and mitigation strategies. Provide strategic insights to More ❯
GCP preferred) . Track Record: Demonstrated success in building and scaling cloud security programs from scratch. Tooling: Familiarity with core cloud security components including IAM , WAFs , SIEM , CSPM , and vulnerability scanners. Technical Skills: Proficiency in at least one scripting or programming language (e.g. Python, Go, Bash). Threat Modeling: Practical knowledge of frameworks like STRIDE and PASTA. Education: Bachelor More ❯
Container & Orchestration Security: Partner with Cloud Engineering, DevOps, Platform teams and stakeholders in the deployment of secure containerised environments using platforms like Docker, and ECS. With a focus on vulnerability mitigation, compliance automation, and secure orchestration practices to ensure container workloads are resilient and meet organisational security requirements. Security Policy Development & Enforcement: Develop, document, and enforce comprehensive cloud security … Collaborate with teams to integrate security best practices into the software development lifecycle (SDLC) and CI/CD pipelines. Ensure security is prioritised through automation tools, security testing, and vulnerabilityscanning as part of the continuous delivery process. Security Assessments & Incident Response: Conduct security assessments, vulnerability scans and risk analyses to identify and address potential security weaknesses More ❯
security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity management and federation, firewalls, SIEM, vulnerabilityscanning, and cryptography. Experience overseeing incident response, vulnerability management, and security service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable More ❯
security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity management and federation, firewalls, SIEM, vulnerabilityscanning, and cryptography. Experience overseeing incident response, vulnerability management, and security service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable More ❯
Security Stack (including Microsoft Defender for Cloud, Microsoft Sentinel, Azure AD etc). Solid understanding of security frameworks (e.g., ISO 27001, Cyber Essentials, NIST, GDPR etc). Experience with vulnerabilityscanning, risk assessment, and remediation planning. Strong communication skills with the ability to work with both technical and non-technical teams. A proactive approach to identifying and addressing More ❯
Employment Type: Permanent
Salary: £50000 - £60000/annum Depending on Experience
Security Stack (including Microsoft Defender for Cloud, Microsoft Sentinel, Azure AD etc). Solid understanding of security frameworks (e.g., ISO 27001, Cyber Essentials, NIST, GDPR etc). Experience with vulnerabilityscanning, risk assessment, and remediation planning. Strong communication skills with the ability to work with both technical and non-technical teams. A proactive approach to identifying and addressing More ❯
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerability management programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national security … standards Experience required Extensive hands-on CTI and vulnerability management experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerabilityscanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry-leading More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Anson McCade
a strategic and hands-on role where you'll be the key bridge between clients and operational teams, ensuring smooth delivery of security services, incident response coordination, and ongoing vulnerability management. If you’ve got a deep background in cybersecurity operations, excel under pressure, and know how to guide both clients and internal teams, this could be your next … remediation activities Managing client-facing service reviews (weekly/monthly), presenting clear reports and insights Supporting internal delivery teams to ensure SLAs are met and quality standards maintained Overseeing vulnerabilityscanning and prioritisation , and guiding clients on remediation Supporting and managing IDS/IPS configuration and updates Driving continuous improvement across service delivery processes What We’re Looking … For 10+ years in Security Operations or SOC-related service delivery Strong technical understanding of incident response, vulnerability management, IDS/IPS Proven experience handling client relationships, stakeholder management , and crisis situations Excellent communication skills — both technical and non-technical Experience leading cross-functional teams in fast-paced environments Relevant certifications (e.g. CISSP, GCIH, CICM) UK SC clearance or More ❯
you can expect to: Lead incident response for breaches, malware attacks, root cause analysis, and recovery Monitor threat feeds and correlate intelligence with tooling to identify emerging risks Oversee vulnerability management and assess remediation effectiveness Collaborate with IT, DevOps, and GRC to align security efforts with business goals Manage and refine configurations for our security tools, and recommend new … threats, ensuring zero-day vulnerabilities are discovered and actioned quickly Own the planning and execution of our annual penetration testing activity To be successful, you'll have: Experience using vulnerabilityscanning tools and remediating software/hardware issues A solid understanding of both automated and manual penetration testing Hands-on experience identifying, testing, and mitigating system vulnerabilities A More ❯
Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Yolk Recruitment
into asset security while managing a small team of technical analysts and overseeing supplier relationships to drive successful outcomes. What You'll Bring: Proven experience in IT asset and vulnerability management In-depth knowledge of asset discovery tools, vulnerabilityscanning and remediation techniques Solid understanding of the differences between IT and operational technology environments Awareness of attacker More ❯
The Infrastructure Engineer (Vulnerability Management) is a hands-on technical role aimed at enhancing this banks security posture. Positioned within the IT Security team, this role is responsible for addressing open vulnerabilities and assurance findings. The Infrastructure Engineer will remediate vulnerabilities using change and release management methodologies and automate security updates using a suit of patch management tools. Client … managing Group Policy Objects (GPOs) and Azure Policies. Hands-on experience deploying and configuring various patching solutions (e.g., SCCM, Intune, Ninja One). Experience configuring and interpreting reports from vulnerabilityscanning tools. Experience working with third-party vendors to deliver changes or perform impact assessments. Proficiency in scripting languages (preferred). Degree in Computer Science or a related More ❯