security best practices across the board, playing a critical role in our journey towards SOC2 compliance. Implement and manage security controls related to IAM, network security (VPCs, security groups), vulnerabilityscanning, and secrets management. Skills, Knowledge and Expertise Experience: Extensive hands-on experience in a DevOps, SRE, or Platform Engineering role, managing production systems in a cloud environment. More ❯
and 20000 (essential). Experience in implementing and maintaining externally awarded certifications such as ISO27001 is essential. Proficient with MS Office Solid understanding of common security tools (e.g., vulnerability scanners, firewalls, IDS/IPS, AV software) strongly recommended Extensive training and experience in computer disciplines such as application and data security, systems programming, systems design, computer technology or software More ❯
and policy design. •Practical knowledge of HAProxy or equivalent reverse proxies/load balancers, with experience configuring L4/L7 security protections. •Familiarity with CVE triage workflows and integrating vulnerability scanners into CI/CD and registry workflows. •Exposure to runtime security tooling (e.g. Falco, eBPF-based monitoring) and familiarity with basic incident response workflows. •Comfort representing engineering in More ❯
at all levels Security Posture Management: Develop and maintain a comprehensive security posture management program to proactively identify and address vulnerabilities. Continuously assess the organization's security posture through vulnerability assessments, penetration testing, and threat modelling. Collaborate with cross-functional teams to implement security best practices and ensure compliance with industry standards and regulations. Cyber Exposure Risk Management: Identify … identify areas for improvement. What You'll Bring: Experience: A depth of experience in cybersecurity, with at least 3 years in a leadership or management role. Proven experience in vulnerability management, threat modelling, and incident response. Strong understanding of security frameworks, compliance standards, and best practices. Education:Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related … field. Advanced degrees or certifications (e.g., CISSP, CISM, CEH) are highly desirable. Technical Skills: Proficiency in security tools and technologies, such as SIEM, vulnerability scanners, and endpoint protection platforms. Knowledge of cloud security, network security, and secure software development practices. Familiarity with scripting and automation tools to streamline security processes. Working with data centres and native cloud environments AWS More ❯
Market Harborough, Leicestershire, East Midlands, United Kingdom
CDS Global
and networking components The ability to work unsupervised with strong self-motivation Experience with scripting and automation Experience with virtualization platforms Experience using SIEM platforms Experience with EDR and vulnerabilityscanning Knowledge of Windows Servers and Azure Cloud Desirable: Experience with ITIL, PCI and GDPR Driving Licence Programming experience with PowerShell, C# and\or Python In addition to More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
Experience with network equipment (firewalls, switches, GPS clocks) and redundant network designs Proficiency with Microsoft client and server operating systems, Active Directory, and database solutions Experience with scripting, automation, vulnerability scanners, and security systems Knowledge of SCADA projects, HMI development, and international electrical standards is advantageous Basic knowledge of C/C++ is a plus Hitachi Energy is a More ❯
of cyber security regulatory landscape: e.g. CAF, NCSC, NIS. Knowledge of OT network protocols: e.g. modbus, DNP3, LoRaWAN. Tools: Experience with standard penetration testing tools, such as port and vulnerability scanners, BurpSuite, Kali Linux, etc as well as OT/ICS related tools and traffic analysis solutions (e.g. Malcom, Hedgehog Linux). Communication: Strong verbal and written communication skills More ❯
availability of Marex's critical systems Contributing to the organisation's security standards and procedures Assessing and approving requests Assisting ISO and/or lead security projects such as vulnerabilityscanning, DLP and/or privileged access monitoring Participating in 3rd party monitoring activities; Advising IT and business on security matters Building connectors to various 3rd party products … and services Maintenance and development of the in-house security framework Supporting vulnerability assessment scans and collaborating with other teams on remediation approach Collaborating with technology teams for incident handling, patching disciplines, and system hardening frameworks Collaborating with the Information Technology team on deployment, operation, and continual improvements of security solutions Collaborating with software developers to secure proprietary applications More ❯
Act as the operational interface with the other organisation (the shared service provider) Maintain the CMDB and configuration item lifecycle tracking Lead on cyber security risk assessments , patch assurance , vulnerability management , and coordination with SOC/XDR providers Ensure compliance with cyber and data protection standards (e.g. Cyber Essentials) Monitor service level agreements (SLAs), escalate issues, and lead service … house/outsourced environment Deep knowledge of ITIL v4 practices, especially Incident, Problem, Change, and Asset Management Experience with service desk systems and CMDBs Familiarity with cybersecurity operations (e.g., vulnerabilityscanning, patch management, access reviews) Strong stakeholder engagement and supplier management skills Ability to maintain service performance under pressure and manage conflicting priorities A pragmatic, delivery-focused mindset … Level 5 Owns and manages the asset lifecycle (including CMDB) SCTY Information Security Level 5 Applies and oversees operational security practices SURE Security Operations Level 4-5 Coordinates patching, vulnerability management, incident response RLMT Stakeholder Relationship Management Level 5 Acts as customer liaison for IT service experience SUPP Supplier Management Level 5 Manages relationships and performance of service providers More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Talent Locker
for someone who enjoys hands-on engineering, improving SOC effectiveness, and shaping threat detection capabilities at scale. What you'll be doing Deploying and configuring security tools including SIEM, vulnerabilityscanning and endpoint monitoring Developing use cases, alerts, and dashboards to support active threat detection Writing and maintaining SOC playbooks and triage workflows Performing 2nd line security monitoring … have: Familiarity with MOD policy (e.g. JSP 440, JSP 604) and assurance practices Experience with CI/CD tools, Kubernetes and modern DevSecOps approaches Knowledge of Tenable/Nessus, vulnerability management and SOC operations Exposure to working within a defence, security or mission-critical environment Looking for a role where your expertise has real-world impact in a secure More ❯
decisions around authentication, cryptography, and logging. You'll also ensure that tools such as SAST, DAST, and SCA are effective and efficient, and that testing programmes - including pen testing, vulnerabilityscanning, and bug bounty - are delivering value. You'll triage vulnerabilities, support engineering teams with practical mitigations, and contribute to documentation that strengthens our internal standards and processes. More ❯
and manage security controls across AWS environments. Collaborate with architecture and operations teams to deliver secure, scalable solutions. Support IAM processes and integrate tools like Tenable for compliance and vulnerability scanning. Align AWS security with existing Azure frameworks and internal governance. What Were Looking For: Hands-on experience with AWS-native security services (GuardDuty, SecurityHub, Amazon Detective). Solid More ❯
to identify vulnerabilities in code ️ Collaborating with DevOps and development teams to integrate security into the CI/CD pipeline ️ Conducting regular application security assessments, including penetration testing and vulnerabilityscanning ️ Providing guidance and training to development teams on secure coding practices and security tools What We're Looking For: ️ Proven experience as an Application Security Specialist or More ❯
Malvern, Worcestershire, West Midlands, United Kingdom
Experis
IP, DNS, AV services) Security hardening & enterprise-grade monitoring Familiarity with SolarWinds Orion, VMware, and Dell server infrastructure Desirable Extras Unix/Linux administration Cisco networking & multicast streaming understanding Vulnerabilityscanning (Nessus) Agile delivery mindset Confidence working independently and collaboratively in technical scenarios If this is the role for you please submit your CV at your earliest convenience. More ❯
skills, clean coding habits, git workflows, and excellent communication skills. Nice to Have Experience with auto-update flows, code-signed installers, and desktop-browser interoperability. Knowledge of security/vulnerabilityscanning pipelines for desktop agents. Exposure to BDD tooling (Cucumber, SpecFlow). Benefits Competitive salary Flexible, remote-first environment (occasional in-person sessions fully expensed) 25 days annual More ❯
scripts. Experience migrating applications and operators between OpenShift clusters. Hands-on familiarity with the following operators: HashiCorp Vault - secrets management Red Hat Quay - internal container registry Clair - container image vulnerabilityscanning Keycloak - identity and access management OpenShift Service Mesh (Istio) - microservices communications Additional Skills: Infrastructure as Code (Ansible/Terraform) CI/CD and GitOps (e.g. Jenkins, ArgoCD More ❯
Newcastle upon Tyne, Tyne and Wear, Tyne & Wear, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
scripts. Experience migrating applications and operators between OpenShift clusters. Hands-on familiarity with the following operators: HashiCorp Vault - secrets management Red Hat Quay - internal container registry Clair - container image vulnerabilityscanning Keycloak - identity and access management OpenShift Service Mesh (Istio) - microservices communications Additional Skills: Infrastructure as Code (Ansible/Terraform) CI/CD and GitOps (e.g. Jenkins, ArgoCD More ❯
Experience with Web, Mobile, API & Network Pentesting Education and awareness of current vulnerabilities, tools, and exploitationtechniques Designing proof of concepts, demonstrating vulnerabilities to the wider business Utilising automation and vulnerabilityscanning where available Producing reports in a timely manner, to agreed standards Ensuring that penetration tests performed by the whole team are effective and scoped correctly Line managing More ❯
by design, resilient to threats, and aligned with best-in-class standards (including ISO 27001 and SOC 2). You'll play a key role in monitoring, incident response, vulnerability management, and secure DevOps practices-helping us maintain customer trust and regulatory compliance as we scale. What You'll Do Monitor systems and infrastructure for potential vulnerabilities, threats, and … breaches Own and improve incident detection, response, and recovery processes Implement and manage SIEM, intrusion detection, vulnerability scanners, and other security tooling Collaborate with DevOps and Engineering to embed security into CI/CD pipelines and cloud infrastructure (Azure) Manage processes for regular vulnerability assessments and penetration testing (internal or third-party) Support internal audits, ISO 27001 compliance … best practices What We're Looking For Extensive experience in security operations roles, preferably in SaaS or cloud-native environments Proficiency in security monitoring tools such as SIEM, EDR, vulnerability management tools, and log aggregation platforms Strong knowledge of security frameworks, standards, and best practices (ISO 27001, SOC 2, GDPR) Proven incident response, threat detection, and investigation experience Experience More ❯
you'll be doing from day one Design and implement robust, forward-thinking security strategies, policies, and procedures to safeguard our systems, networks, and data. Lead regular security assessments, vulnerability scans, and penetration tests to identify risks and deploy effective remediation measures. Monitor systems, networks, and logs then Investigate security breaches, incidents, and other cybersecurity events. Oversight of compliance … and GCP environments (Azure experience is a plus), especially in multi-region and data-rich setups Security-minded problem solver - You have hands-on experience with firewalls, SIEM tools, vulnerability scanners, and other security technologies that protect systems Risk assessment pro - You enjoy identifying vulnerabilities, evaluating threats, and making informed security decisions backed by solid data Technical communicator - You More ❯
offensive security testing . You will lead manual and automated penetration testing, manage AppSec tooling (SAST, DAST, SCA), and build developer enablement programs. You'll also be responsible for vulnerability management, incident response for application-layer events, and ensuring compliance alignment for SOC 2, ISO 27001, and privacy requirements. This role blends offensive and defensive expertise with strategic influence … Simulate adversary attack scenarios to validate controls and identify gaps. Secure SDLC Integration Embed security into every stage of development; implement automated security tooling in CI/CD pipelines. Vulnerability Management Triage and prioritize application-layer vulnerabilities and guide engineering teams through remediation. Developer Enablemen t Deliver secure development and coding training; create resources to reduce recurring vulnerabilities. Bug … security. Deep expertise securing multi-tenant SaaS platforms and features. Strong communication and ability to influence software engineers and product managers. Advanced experience conducting penetration tests, code reviews, and vulnerability assessments. Expert knowledge of OWASP Top 10, web application and API security, and common vulnerability classes with practical remediation strategies. Hands-on experience with AppSec tooling (SAST, DAST More ❯
on in architecture, engineering, and compliance, while leading the charge on modern, cloud-first security strategy. Responsibilties: Designing and implementing robust security policies, controls, and infrastructure protection strategies. Leading vulnerability management efforts, penetration testing, and remediation plans. Monitoring and investigating security events, managing incident response processes end-to-end. Ensuring compliance with security standards such as ISO 27001 and … or high-trust industries). Hands-on expertise in cloud security (preferably AWS), including securing hybrid and multi-region architectures. Practical knowledge of security tooling: IDS/IPS, SIEM, vulnerability scanners, encryption, SAST/DAST tools, OWASP ZAP, etc. Strong understanding of network security protocols and best practices. Scripting and automation experience (e.g. Python). Proven experience with incident More ❯