and manage risks within our OT environments. We are seeking an experienced and dynamic OT Cyber Security Senior Manager to lead our risk and vulnerability management processes. In this role, you will be responsible for designing and implementing robust risk and vulnerability management processes, ensuring alignment with key … Cyber Hub and business units when vulnerabilities and policy compliance violations are identified. Establish plans to identify OT vulnerabilities and policy compliance violations through vulnerabilityscanning, patch reporting, management, and penetration testing. Categorize and prioritize OT vulnerabilities. Assess the effectiveness of vulnerability dispositions. Maintain relationships with business … unit stakeholders to assist with the remediation of critical-level alerts. Communicate vulnerability data to system and business owners. Establish and implement an OT vulnerability management communication and training plan. Determine necessary protective measures to address vulnerabilities on OT assets. Support patch management and vulnerability management product More ❯
InTune Knowledge of administering and supporting Entra (Azure AD), Azure IaaS/PaaS Management of backup/recovery solutions Experience with operating system hardening, vulnerability assessments, security audits, penetration testing, intrusion prevention systems and other security control systems for example PAM, SIEM etc. Experience with endpoint security, content filtering … vulnerabilityscanning and anti-malware Knowledge of at least one scripting language (e.g. PowerShell) MS InTune device management (mobile and Windows 10/11 OS) Demonstrable knowledge of common vulnerabilities and exploitation techniques would be beneficial Familiarity with Cyber Essentials/Plus or ISO 27001 and ITIL best More ❯
Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess … Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
incident reports. Project Delivery Take part in the team's project delivery initiative, rotating between the following roles on a 1-3 monthly schedule: Vulnerability Management - maintain regular scans, interpret results, identify asset owners, track remediation activities and report on the agreed SLAs. Security Controls Administration - maintain availability and … and standard use cases of technical security products, such as firewalls, anti-virus, web proxies, SIEM, IDS/IPS, DLP, and EDR. Familiarity with vulnerabilityscanning and penetration testing tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but not required): Cyber More ❯
flow, system administration, OSI model, defense-in-depth, and security elements Experience analyzing logs, network data, and attack artifacts for incident investigations Experience with vulnerabilityscanning solutions Knowledge of enterprise SIEM platforms (e.g., Sentinel, Nitro, ArcSight, QRadar, Splunk) Understanding of mobile technology, OS (Android, iOS, Windows), and Cloud More ❯
reviews, threat modeling, and risk assessments; strong understanding of information security principles, including confidentiality, integrity, and availability. Experience with security tools and technologies, including vulnerability scanners, intrusion detection systems, and security information and event management (SIEM) systems. Excellent communication and interpersonal skills, with the ability to collaborate effectively with More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Duel
Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerabilityscanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development process. Assist in … security compliance frameworks such as ISO 27001 or SOC 2, even if not previously responsible for certification processes. Experience working within security risk management, vulnerability tracking, or operational security efforts. Prior experience working with engineering teams on security topics is beneficial, particularly around secure development practices. Ability to clearly … or Vanta. Experience working with pen testing and bug bounties a plus. Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerability management solutions. Experience or knowledge of cloud security (AWS, GCP, or Azure). Awareness of security best practices in application and infrastructure security. Some More ❯
Hands-on experience analysing high volumes of logs, network data (e.g. Netflow, FPC), and other attack artifacts in support of incident investigations Experience with vulnerabilityscanning solutions In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. Sentinel, Nitro/McAfee Enterprise More ❯
security policies and procedures for all IT systems and devices, taking into account diverse regional regulations and network conditions. Conduct regular security audits and vulnerability assessments, with a focus on remote access and endpoint security. Device Management & MDM (Worldwide Deployment): Manage device procurement, distribution, and lifecycle for a geographically … authentication (MFA). Implement zero trust secure access from any location. Security Tooling & Integration: Evaluate, select, and onboard security solutions (e.g., endpoint protection, SIEM, vulnerability scanners). Integrate security tools with existing systems and workflows, ensuring effective threat detection and response. Automation & Scripting: Develop and maintain scripts and automation … tools to streamline IT operations and enhance security. Automate security tasks, such as patch management, vulnerabilityscanning or secure configuration enforcement. Vendor Management: Manage relationships with IT and security vendors and service providers. Evaluate vendor security practices and ensure compliance with company policies. Incident Response: Participate in security More ❯
to implement security controls across infrastructure (e.g., access control, encryption, logging). Lead the incident response process and manage third-party pen testing and vulnerability management. Customer & Vendor Security: Support security questionnaires, RFPs, and due diligence for customer deals. Review third-party vendors and tools for security posture and … and SSO. Clear understanding of data privacy laws (especially GDPR). Familiarity with security tools (e.g., endpoint protection, SSO/IAM, monitoring/logging, vulnerabilityscanning). Experience with risk assessments, incident response planning, and writing security policies. Strong communication skills, with the ability to explain security concepts More ❯
Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess More ❯
Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess More ❯
real-world operations. You’ll be responsible for overseeing the delivery and integration of key security services — including penetration testing, threat modelling, logging, and vulnerabilityscanning — into enterprise platforms and workflows. You’ll work cross-functionally to align technical services with business and risk priorities, helping to unblock … least 3 years of experience in a similar service delivery or cyber consultancy role Deep understanding of enterprise security services: Pen testing, threat modelling, vulnerability management, logging & monitoring, incident response Strong communication and stakeholder engagement skills Excellent documentation and governance capability CISM or CISSP certification Degree in Computer Science More ❯
Self-motivated, very detail-oriented and organized. Comprehensive understanding of customer/server technologies. Understanding of cyber security concepts (e.g. phishing tests, penetration testing, vulnerabilityscanning, SIEM, email security, endpoint Protection, MDM, etc.). Some technical proficiency in the following areas are required: Understanding public vs hybrid infrastructure More ❯
Concepts - Knowledge in TCP/IP, DNS, VPN, load balancing, and firewalls Security Best Practices - Implementing security in DevOps (e.g., IAM policies, network security, vulnerabilityscanning, encryption) Security Protocols - Experience with modern security protocols and practices - e.g. Zero Trust, OAuth, OpenID, TLS/SSL Agile Methodologies - Experience with More ❯
security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusion detection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform More ❯
methodology and/or industry certifications. Experience in working in a regulated environment. Experience of; configuration management tools, Jenkins, host virtualisation, containerisation, ELK, Splunk, vulnerability scanners, proxies, WAFs, artefact management, serverless deployments, data streaming and transformation. Experience in secured AWS, or other, Cloud architectures and engineering solutions. What You More ❯
standards including Cyber Essentials, ISO 27001, 27002 etc. Data Protection Act and the General Data Protection Regulation Microsoft O365 Security solutions; Networking; Security operations; Vulnerability Management Security Auditing Good understanding of security testing principles, including experience of vulnerabilityscanning, identifying, resolving, and reporting risks Experience of formal More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
SOC team to enhance Sentinel SIEM, runbooks, and threat detection. Lead investigations into security incidents and conduct proactive threat hunting. Manage endpoint security, patching, vulnerabilityscanning, and system hardening. Support audits and compliance with Cyber Essentials Plus , ISO 27001 , and other frameworks. Partner with DevOps, InfoSec, and platform … Participate in a 1-in-6 on-call rota after completing probation. Key Requirements: Hands-on knowledge of SIEM platforms (preferably Sentinel), EDR, and vulnerability management. Familiarity with frameworks like Cyber Essentials Plus and ISO 27001. Experience in securing hybrid cloud environments (Microsoft Azure desirable). Experience in DevOps More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
BAE Systems (New)
and affected business units. Maintain compliance with frameworks such as Secure by Design, NIST-800-53, STRAP. Security Testing - Scope and oversee penetration testing, vulnerabilityscanning, and other security validation activities to ensure effectiveness of security controls. Design and Architecture Review - Assess the Information Security of IT architecture More ❯
business units. Maintain accreditation and compliance with frameworks such as Secure by Design, NIST-800-53, STRAP; Security Testing - Scope and oversee penetration testing, vulnerabilityscanning, and other security validation activities, to ensure effectiveness of security controls; Design and Architecture Review - Assess the Information Security of IT architecture More ❯
development. Collaborate closely with security teams to enforce security best practices such as policy-as-code (OPA/Gatekeeper), zero-trust architecture, and automated vulnerabilityscanning throughout the entire DevOps lifecycle, and actively contributing to security audits and improvements. Lead incident management efforts, owning root cause analysis and More ❯
Concepts: Knowledge in TCP/IP, DNS, VPN, load balancing, and firewalls. Security Best Practices: Implementing security in DevOps (e.g., IAM policies, network security, vulnerabilityscanning, encryption). Zero Trust, OAuth, OpenID, TLS/SSL: Experience with modern security protocols and practices. Agile Methodologies Experience with Agile, Scrum More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Sanderson
incidents relating to internal and customer assets. Designing and developing SIEM security use cases. Designing and implementing security controls and secure configurations. Maintaining proactive vulnerabilityscanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and … stakeholders to discuss security related matters. Skills Required: Proven hands-on experience as a Security Engineer or similar working with tools such as SIEM, vulnerability management, endpoint detection & response (EDR), applications security, identity, and access management, etc. Ability to work in a small high performing team, collaborating with other … utilising different security technologies, including but not limited to private and cloud infrastructure. Technical knowledge and experience with SIEM, SOAR, IDPS, DDoS, Malware Protection, Vulnerability Management, and Application Security tooling, etc. Knowledge of Information Security frameworks (CIS, NIST, NCSC CAF), supporting processes and toolsets. Ability to breakdown and solve More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
incidents relating to internal and customer assets. Designing and developing SIEM security use cases. Designing and implementing security controls and secure configurations. Maintaining proactive vulnerabilityscanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and … stakeholders to discuss security related matters. Skills Required: Proven hands-on experience as a Security Engineer or similar working with tools such as SIEM, vulnerability management, endpoint detection & response (EDR), applications security, identity, and access management, etc. Ability to work in a small high performing team, collaborating with other … utilising different security technologies, including but not limited to private and cloud infrastructure. Technical knowledge and experience with SIEM, SOAR, IDPS, DDoS, Malware Protection, Vulnerability Management, and Application Security tooling, etc. Knowledge of Information Security frameworks (CIS, NIST, NCSC CAF), supporting processes and toolsets. Ability to breakdown and solve More ❯