Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerability management platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be rewarded More ❯
Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerability management platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be rewarded More ❯
Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerability management platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be rewarded More ❯
Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerability management platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be rewarded More ❯
Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerability management platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be rewarded More ❯
Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerability management platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be rewarded More ❯
Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerability management platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be rewarded More ❯
Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerability management platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be rewarded More ❯
Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerability management platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be rewarded More ❯
Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerability management platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be rewarded More ❯
Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerability management platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be rewarded More ❯
to clients. Configuring and integrating DevOps tools and developing automation scripts. Implementing CI/CD pipelines. Managing infrastructure with automation tools and monitoring system performance. Applying security practices like vulnerability scanning. Collaborating with development teams to align DevOps processes. Monitoring systems and leading incident responses. Documenting configurations and procedures. Minimum Requirements: Experience with AWS and Azure cloud platforms. Knowledge More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Forward Role
Cyber Vulnerability Engineer – eDV cleared Package - £55,000 - £95,000 (depending in experience level) Benefits – DV Bonus plus excellent benefits Relocation assistance for UK based candidates to Manchester, Cheltenham or London. Join a trusted leader in National Security technology solutions. Are you passionate about using cutting-edge cyber technology to protect the UK? Do you enjoy solving technical cyber … they work, but to identify weaknesses, assess risks, and develop mitigation strategies. What You'll Be Doing Researching, designing, and building resilient systems to support National Security objectives. Conducting vulnerability assessments and threat modelling on software and hardware components. Reverse engineering a wide range of technologies to uncover vulnerabilities and improve security. Writing secure, high-performance code that integrates … Proficiency in one or more of C, C++, or C#. Familiarity with scripting and automation using Python. Experience working with Linux or Windows-based systems. Hands-on experience with vulnerabilityscanning tools (e.g., Nessus, OpenVAS, Burp Suite, or similar). Familiarity with CVSS scoring, vulnerability databases (e.g., NVD, MITRE ATT&CK), and risk prioritization frameworks. Understanding of More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
col-narrow-right Job Views: 5 Posted: 16.06.2025 Expiry Date: 31.07.2025 col-wide Job Description: Who we are looking for An Information Security Analyst, who will work within our vulnerability management team, which focuses on the technical side, ensuring IT systems are operated in a secure manner. The Information Security department monitor our live operation, creating and reacting to … alerts and other anomalies identified through automated tools or manual analysis. The vulnerability management (VM) function covers two high-level areas, including owning the processes and schedules relating to the vulnerabilityscanning of all endpoints in the Business. You will review the results in terms of risk and impact assessment, additionally you will own the scheduling of … and planning for specialist third-party vulnerability and penetration testing, in addition to the collation of reports. Liaising with parts of the Business, will aid your understanding of the risk profile then advice on options to resolve any issues identified. You will work closely with colleagues in the governance and compliance functions to ensure the Company meets its requirements More ❯
Stafford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
col-narrow-right Job Views: 5 Posted: 16.06.2025 Expiry Date: 31.07.2025 col-wide Job Description: Who we are looking for An Information Security Analyst, who will work within our vulnerability management team, which focuses on the technical side, ensuring IT systems are operated in a secure manner. The Information Security department monitor our live operation, creating and reacting to … alerts and other anomalies identified through automated tools or manual analysis. The vulnerability management (VM) function covers two high-level areas, including owning the processes and schedules relating to the vulnerabilityscanning of all endpoints in the Business. You will review the results in terms of risk and impact assessment, additionally you will own the scheduling of … and planning for specialist third-party vulnerability and penetration testing, in addition to the collation of reports. Liaising with parts of the Business, will aid your understanding of the risk profile then advice on options to resolve any issues identified. You will work closely with colleagues in the governance and compliance functions to ensure the Company meets its requirements More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
col-narrow-right Job Views: 5 Posted: 16.06.2025 Expiry Date: 31.07.2025 col-wide Job Description: Who we are looking for An Information Security Analyst, who will work within our vulnerability management team, which focuses on the technical side, ensuring IT systems are operated in a secure manner. The Information Security department monitor our live operation, creating and reacting to … alerts and other anomalies identified through automated tools or manual analysis. The vulnerability management (VM) function covers two high-level areas, including owning the processes and schedules relating to the vulnerabilityscanning of all endpoints in the Business. You will review the results in terms of risk and impact assessment, additionally you will own the scheduling of … and planning for specialist third-party vulnerability and penetration testing, in addition to the collation of reports. Liaising with parts of the Business, will aid your understanding of the risk profile then advice on options to resolve any issues identified. You will work closely with colleagues in the governance and compliance functions to ensure the Company meets its requirements More ❯
Bolton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
col-narrow-right Job Views: 5 Posted: 16.06.2025 Expiry Date: 31.07.2025 col-wide Job Description: Who we are looking for An Information Security Analyst, who will work within our vulnerability management team, which focuses on the technical side, ensuring IT systems are operated in a secure manner. The Information Security department monitor our live operation, creating and reacting to … alerts and other anomalies identified through automated tools or manual analysis. The vulnerability management (VM) function covers two high-level areas, including owning the processes and schedules relating to the vulnerabilityscanning of all endpoints in the Business. You will review the results in terms of risk and impact assessment, additionally you will own the scheduling of … and planning for specialist third-party vulnerability and penetration testing, in addition to the collation of reports. Liaising with parts of the Business, will aid your understanding of the risk profile then advice on options to resolve any issues identified. You will work closely with colleagues in the governance and compliance functions to ensure the Company meets its requirements More ❯
Stoke-on-Trent, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
col-narrow-right Job Views: 5 Posted: 16.06.2025 Expiry Date: 31.07.2025 col-wide Job Description: Who we are looking for An Information Security Analyst, who will work within our vulnerability management team, which focuses on the technical side, ensuring IT systems are operated in a secure manner. The Information Security department monitor our live operation, creating and reacting to … alerts and other anomalies identified through automated tools or manual analysis. The vulnerability management (VM) function covers two high-level areas, including owning the processes and schedules relating to the vulnerabilityscanning of all endpoints in the Business. You will review the results in terms of risk and impact assessment, additionally you will own the scheduling of … and planning for specialist third-party vulnerability and penetration testing, in addition to the collation of reports. Liaising with parts of the Business, will aid your understanding of the risk profile then advice on options to resolve any issues identified. You will work closely with colleagues in the governance and compliance functions to ensure the Company meets its requirements More ❯
Join the frontline of digital defense with our Cybersecurity Internship, perfect for students passionate about ethical hacking and protecting data. Learn vulnerabilityscanning and penetration testing Conduct security audits and analysis Assist in identifying and mitigating threats Hands-on with firewalls, antivirus & encryption Understand security protocols and compliance Support internal cybersecurity awareness Work on real case studies and More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Venesky Brown
apply theory to practice. - Be aware of the current cyber threat landscape and industry best practices and standards. - Lead on improvement to coverage and depth of security monitoring and vulnerabilityscanning - Design vulnerability data gathering and prioritisation procedures - Act as technical escalation point for analysts on significant incidents, investigations, including hands on experience - Establish procedures for intelligence … reporting, and the gathering of data in support of them - Own completion and accuracy of all SecOps-related product delivery evidence Essential Skills: - Security monitoring service delivery and improvement - Vulnerability detection service improvement, finding prioritisation and reporting. - Ability to communicate on technical issues with users and senior managers - Recent experience in incident response - Ability to work well in small More ❯
London, England, United Kingdom Hybrid / WFH Options
Hack The Box
opportunities for us and our teams! About the this position: We are looking for a Security Engineer to help scan our customers for the latest critical vulnerabilities, write new vulnerability checks, and automate the penetration testing process at scale. This role is varied and includes: Writing new vulnerability detections with Nuclei, and curating crowd-sourced checks for inclusion … into the Intruder platform Custom scanning of customer targets for emerging critical weaknesses: Rapid Response Writing technical content for our website about the latest vulnerabilities Automate the pentesting methodology to carry out checks at scale against multiple customers simultaneously Work on projects to research and provide evidence for novel improvements to the Intruder platform Providing technical assistance on client … or modifying detection and fingerprinting code Developing, extending, or modifying exploits, shellcode or exploit tools Strong knowledge of tools used for web application, and network security testing including commercial vulnerabilityscanning engines Cloud services, including how to interact with, and assess them for weaknesses Comfortability with client-facing calls in a consultancy setting Excellent technical writeup skills Hiring More ❯
Team! As we expand, we are looking for a Pentester/Red Teamer who is enthusiastic about undertaking a range of security assessments, including penetration testing, red team exercises, vulnerabilityscanning, and physical access evaluations for our clients. Key Responsibilities: Client Engagement Management: Lead client projects, ensuring clear communication, timely delivery, and exceeding expectations. Act as the primary … liaison, providing updates and guidance. Security Assessment Execution: Conduct detailed security assessments, including penetration testing and vulnerability analysis. Systematically identify and document vulnerabilities across network, application, and physical layers. Prepare concise reports for both technical and non-technical stakeholders. Red Team Challenges: Participate in red team simulations, encompassing social engineering attacks and advanced penetration tactics. Post-initial access, perform … its various features for intercepting traffic, conducting automated scans, manipulating requests and responses, and identifying vulnerabilities in web applications. Nmap and Enumeration Tools: Skilled in using Nmap for network scanning and enumeration. This involves not just running scans but interpreting results to identify open ports, services, and potential vulnerabilities. Familiarity with other enumeration tools that help in discovering and More ❯
of holiday, a discretionary bonus, and a training budget to fuel your professional growth. Apply here if you’re interested! Be the escalation point for security incidents Threat analysis Vulnerabilityscanning Maintenance and deployment of security tools #J-18808-Ljbffr More ❯
Skills & Experience: Proven DevOps background with a strong focus on collaboration and culture-building. Strong working knowledge of Microsoft Azure, covering IaaS and PaaS solutions. Real-time monitoring, including vulnerabilityscanning to ensure system security. Experience configuring SQL Server, Azure SQL, implementing back-ups and clustering for data integrity. Designing and maintaining highly available systems with disaster recovery More ❯
Skills & Experience: Proven DevOps background with a strong focus on collaboration and culture-building. Strong working knowledge of Microsoft Azure, covering IaaS and PaaS solutions. Real-time monitoring, including vulnerabilityscanning to ensure system security. Experience configuring SQL Server, Azure SQL, implementing back-ups and clustering for data integrity. Designing and maintaining highly available systems with disaster recovery More ❯