teams to resolve issues and ensure successful deployment. Maintaining documentation of designs, configurations, and procedures. Planning and executing security testing, including penetration testing and vulnerability scanning. Assisting in designing secure application architectures with authentication, access controls, and encryption. Who we're looking for You should have experience with incident More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Sanderson
incidents relating to internal and customer assets. Designing and developing SIEM security use cases. Designing and implementing security controls and secure configurations. Maintaining proactive vulnerabilityscanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and … stakeholders to discuss security related matters. Skills Required: Proven hands-on experience as a Security Engineer or similar working with tools such as SIEM, vulnerability management, endpoint detection & response (EDR), applications security, identity, and access management, etc. Ability to work in a small high performing team, collaborating with other … utilising different security technologies, including but not limited to private and cloud infrastructure. Technical knowledge and experience with SIEM, SOAR, IDPS, DDoS, Malware Protection, Vulnerability Management, and Application Security tooling, etc. Knowledge of Information Security frameworks (CIS, NIST, NCSC CAF), supporting processes and toolsets. Ability to breakdown and solve More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
incidents relating to internal and customer assets. Designing and developing SIEM security use cases. Designing and implementing security controls and secure configurations. Maintaining proactive vulnerabilityscanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and … stakeholders to discuss security related matters. Skills Required: Proven hands-on experience as a Security Engineer or similar working with tools such as SIEM, vulnerability management, endpoint detection & response (EDR), applications security, identity, and access management, etc. Ability to work in a small high performing team, collaborating with other … utilising different security technologies, including but not limited to private and cloud infrastructure. Technical knowledge and experience with SIEM, SOAR, IDPS, DDoS, Malware Protection, Vulnerability Management, and Application Security tooling, etc. Knowledge of Information Security frameworks (CIS, NIST, NCSC CAF), supporting processes and toolsets. Ability to breakdown and solve More ❯
established playbooks Escalating complex incidents to Tier 2 Incident Response Teams Reviewing and developing security controls in a growing technical environment Triaging and reviewing vulnerabilityscanning reports, providing feedback to technical teams Reviewing secure configurations and feeding back for remediations Generating recurring security reports for stakeholders Providing feedback … a degree in Cyber Security, Computer Science, Networks, etc. Professional qualifications from organizations like CompTIA, ISACA, etc. Technical qualifications such as cloud computing, SIEM, vulnerability management, etc. Experience (Nice to have) Understanding of concepts like cloud computing, incident management, risk management, information security (CIA), phishing, ransomware, IDAM, JML processes … and skilled IT professionals, committed to digital innovation. We excel in areas like Secure-by-Design, cloud computing, network design, rapid application development, cyber vulnerability mitigation, and intelligence systems. We offer independent consultancy and champion open-source technologies. A word on UK Security Clearance Due to the secure nature More ❯
cloud providers (AWS, Microsoft, Google, IBM) The most loved cloud native open-source tools with the world's largest open-source community tool for vulnerabilityscanning, Trivy The world's leading dedicated cloud native threat research team, Aqua Nautilus If you're ready for an exciting opportunity to More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR, DLP, vulnerability scanners, firewalls, email gateways. Degree in Computer Science, Engineering, or a related STEM field. If you think that this could be a good fit More ❯
london, south east england, united kingdom Hybrid / WFH Options
Hunter Bond
Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR, DLP, vulnerability scanners, firewalls, email gateways. Degree in Computer Science, Engineering, or a related STEM field. If you think that this could be a good fit More ❯
range of security technologies, including SIEM solutions, DLP solutions, firewall solutions, cloud security centers, IPS (Intrusion Prevention Systems), CTI (Cyber Threat Intelligence) solutions, and vulnerability scanners. Proxy solutions like Zscaler are essential. At least one professional certification; CISSP, CISM, CCSP. What we offer you 18% Bonus Car allowance (or More ❯
for identifying vulnerabilities, conducting security assessments, and implementing robust security measures to protect our systems and client data. Key Responsibilities: Perform security assessments and vulnerabilityscanning for web applications, APIs, and infrastructure. Collaborate with development teams to implement secure coding practices and address vulnerabilities. Review and advise on … practices. Strong understanding of security vulnerabilities (OWASP Top 10, etc.) and secure coding techniques. Experience with security tools (e.g., static/dynamic analysis tools, vulnerability scanners). Familiarity with common web technologies (e.g., Java, Python, JavaScript, SQL). Knowledge of security frameworks and standards (e.g., NIST, ISO 27001). More ❯
sector exposure What you’ll be doing: Managing incidents, change requests, and service delivery Working closely with executives, offering 2nd/3rd line support Vulnerabilityscanning, remediation (Nessus, Defender 365), and patch management Project support and client site technical improvements Key Technologies you'll work with: Office More ❯
london, south east england, united kingdom Hybrid / WFH Options
Digital Republic Talent
sector exposure What you’ll be doing: Managing incidents, change requests, and service delivery Working closely with executives, offering 2nd/3rd line support Vulnerabilityscanning, remediation (Nessus, Defender 365), and patch management Project support and client site technical improvements Key Technologies you'll work with: Office More ❯
teams to establish and enforce network access policies, ensuring that only authorized individuals and devices have the correct access privileges. Proactive Security Testing and Vulnerability Management Conduct vulnerability assessments and penetration testing to identify and address security weaknesses in mobile network architectures. Develop and enforce security policies and … together with system administrators and application owners to resolve discovered vulnerabilities by applying necessary patches or making configuration adjustments. Create and sustain a thorough vulnerability management program that includes tracking vulnerabilities, assessing risks, and planning remediation strategies. Engage in network security incident response efforts by providing technical expertise and … Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR, HIPAA, ISO 27001). In-depth understanding of routers, switches, firewalls, and switching/routing More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
Corriculo Ltd
other security products Experience with Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don More ❯
Engineering needs (system administration, help desk support). Monitor security tools and respond to alerts and incidents. COMPLIANCE ACTIVITIES: Change Management Incident Management Maintenance Vulnerabilityscanning Implement NIST SP 800-171 for internal systems. Establish a System Security Plan (SSP) . The SSP needs to go through each More ❯
Stoke-On-Trent, Staffordshire, West Midlands, United Kingdom
Oscar Associates (UK) Limited
network security. Oversee and maintain VMware ESXi hosts, vCenter, and Horizon environments. Administer and maintain Active Directory to ensure proper access and permissions. Use vulnerabilityscanning tools (Nessus) to identify and remediate system vulnerabilities. Manage Azure cloud resources and services for cloud infrastructure needs. Work Schedule: Initially, this More ❯
West Midlands, United Kingdom Hybrid / WFH Options
Arthur J. Gallagher & Co
about cybersecurity, excellent communication skills, and a willingness to learn and develop. Certifications like CPSA, Sec+, CEH, Pentest+, PPNT. Industry cybersecurity experience. Experience with vulnerabilityscanning technologies. Compensation and benefits On top of a competitive salary, great teams and exciting career opportunities, we also offer a wide range More ❯
Kubernetes, Prometheus, Grafana). Exposure to cloud platforms (AWS, Azure, GCP) in a QA/testing capacity. Knowledge of static code analysis tools and vulnerability scanners (e.g., SonarQube, Snyk). ISTQB certification or equivalent is a plus. Due to the timescales of the project and organisation it sits within More ❯
Dundee, Angus, United Kingdom Hybrid / WFH Options
DC Thomson
solutions Adhere to relevant security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR) Work with our SecOps team to develop and implement vulnerability management programs, including regular security assessments, penetration testing, and remediation planning Maintain expertise in cloud security best practices including secure configuration, access management, and … principles, methodologies, and best practices Hands-on experience with a wide range of security technologies, including firewalls, intrusion detection/prevention systems, SIEM, and vulnerability scanners Experience with cloud security in AWS and Azure environments Knowledge of security standards and compliance frameworks (e.g., ISO 27001, NIST Cybersecurity Framework) Excellent More ❯
of a team responsible for protecting IT infrastructure through technical expertise and strategic planning, ensuring security controls are properly implemented and maintained. Responsibilities include: VulnerabilityScanning & Reporting Endpoint Security Incident Management & Tickets System Hardening Change Work Participation in Regular Meetings Documentation Qualifications and skills required include experience with … security frameworks such as Government Functional Standard 007, vulnerability management, endpoint protection, incident response, system hardening, and compliance auditing. Clearance Requirements: Security Clearance to Start SC Security Clearance for Role DV What we offer: Contributory Pension Scheme Private Medical Insurance 33 days Annual Leave Flexible benefits including health schemes More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
project to ensure the efficient operation of end user devices, including Laptops, phones, handheld devices etc. The primary responsibility with the role will be vulnerability Management, including conducting regular assessments, implementing security measures and liaising with various depts. The successful candidate will implement and manage software patches promptly and … configure MS Teams, Intune and Endpoint Config Manager accordingly. Skills required: - Relevant experience in vulnerability management and endpoint security Strong knowledge of MS Teams, Intune and Endpoint Configuration manager Familiar with identity and access management principles Responsibilities: Respond to incidents related to EUC reported through the Service Desk or … Implement and manage software patches for end user computing devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with organisational More ❯
autoscaling and multitenancy within a cluster A strong understanding of cloud security and identity and access management, such as principal of least privilege and vulnerabilityscanning A good understanding of platform engineering paradigms, such as self-service infrastructure and GitOps A good understanding of cloud providers, such as More ❯
Prioritise security by integrating security practices into the development and deployment pipelines. • Ensure that security controls are implemented throughout the software development lifecycle, including vulnerabilityscanning, access management and compliance with relevant regulations and standards. Required qualifications to be successful in this role • Proficiency in automating software deployment More ❯
Terraform , and Cloud environments (AWS or GCP, ideally both). Have experience with Terraform or another IaC tool. Solid understanding of DevSecOps practices, including vulnerabilityscanning, threat modelling, or compliance frameworks (GDPR, PCI DSS, ISO 27001). Thrive in a fast-moving, sometimes ambiguous environment where you can More ❯
coventry, midlands, United Kingdom Hybrid / WFH Options
Lorien
proficiency in cyber security tools, including at least one of the following: SIEM, EDR, SOAR, AV, CNAPP/CSPM, SAST/DASTs, WAFs, Firewalls, Vulnerability scanners, email gateways, web gateways. So, if you believe your skills and experience match the requirements for this role. Then please reach out and More ❯