Define, design, implement, and maintain security solutions appropriate to the business' needs. Support the definition, execution and continuous improvement of key cybersecurity processes including vulnerability & patch management, security incident response, security monitoring, endpoint security, identity and access management, network security, and cryptography. Assist with developing and maintaining security policies … knowledge of deploying, maintaining, and configuring a wide range of security technologies within a large and complex environment (anti-malware/EDR, SIEM solutions, vulnerability scanners, patch management, CASB, DLP, penetration testing tools, etc.) Knowledge of TCP/IP and related network protocols: knowledge of standard network protocols like More ❯
for this role, you must be a Sole British with active MOD DV clearance or be eligible to obtain it. Key areas of expertise: Vulnerabilityscanning and reporting Endpoint security management Security incident response and ticket handling System hardening Change management support Active participation in team meetings Clear More ❯
for this role, you must be a Sole British with active MOD DV clearance or be eligible to obtain it. Key areas of expertise: Vulnerabilityscanning and reporting Endpoint security management Security incident response and ticket handling System hardening Change management support Active participation in team meetings Clear More ❯
include: Monitoring server and application performance, identifying bottlenecks, and taking corrective actions to maintain high availability, Implementing and maintaining server security, including patch management, vulnerabilityscanning, and intrusion detection, Collaborating with network administrators, hardware engineers, and researchers to troubleshoot and resolve server and software-related issues, Working closely More ❯
practices especially with implementation in GCP. In-depth understanding of GCP services, security controls, and best practices. Proficiency in using GCP-specific security tools, vulnerability scanners, and penetration testing tools. Strong experience with infrastructure-as-code (IaC) using Terraform for GCP resource provisioning and management. Familiarity with CI/ More ❯
GCP. THIS IS AN ABSOLUTE MUST. In-depth understanding of GCP services, security controls, and best practices. Proficiency in using GCP-specific security tools, vulnerability scanners, and penetration testing tools. Experience with Wiz and its integration for continuous security monitoring in GCP environments. Strong experience with infrastructure-as-code More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Digital Waffle
test, and deployment processes to improve efficiency. Embed security best practices throughout the software development lifecycle. Implement tools for automated security testing, compliance, and vulnerability scanning. Cloud Infrastructure & FinOps Lead the architecture and management of AWS cloud environments to ensure scalability and reliability. Champion the adoption of cloud-native More ❯
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Vulnerability Management : Collaborate with SecOps to develop and implement vulnerability management programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise in cloud … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Vulnerability Management : Collaborate with SecOps to develop and implement vulnerability management programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise in cloud … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Vulnerability Management : Collaborate with SecOps to develop and implement vulnerability management programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise in cloud … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
over 1.5 million heat pump installs happening every month making our proposition leading edge with significant growth potential. Our SaaS platform utilises cutting edge scanning technology that is operating system agnostic, using these methods Heatly is redefining how technology is used to survey and create building digital twins. We … process: Implement security checks and controls at every stage of the pipeline to ensure secure software delivery. Use tools to perform static code analysis, vulnerabilityscanning, and compliance checks. Agile Development: Participate in agile ceremonies: Engage in sprint planning, daily stand-ups, and retrospectives to ensure effective and More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web More ❯
you will need: Windows Server 2003 to 2022 Veeam Backup and Replication Microsoft Active Directory Group Policy Windows Server Update Services Kaseya VSA Qualys Vulnerability Scanner Documentation writing More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
Lorien
least one of the following security domains/tools: SIEM EDR/SOAR/AV CNAPP/CSPM SAST/DAST WAFs/Firewalls Vulnerability Scanners Email & Web Gateways Other Information: This role includes participation in an out-of-hours support rota . Candidates must be eligible for UK More ❯
APIs. Deep understanding of secure coding, SDLC, and engineering integration. Hands-on experience with SAST/DAST in CI/CD. Knowledge of WAFs, vulnerability scanners, and security tools. Understanding of cryptography, authentication, and authorisation. Next Steps: Please note, with this role based in Farringdon, applicants must be UK More ❯
process: Implement security checks and controls at every stage of the pipeline to ensure secure software delivery. Use tools to perform static code analysis, vulnerabilityscanning, and compliance checks. Agile Development: Participate in agile ceremonies: Engage in sprint planning, daily stand- ups, and retrospectives to ensure effective and More ❯
applying security measures to IaC tools such as Terraform and Ansible. Container Security: Ensure that containers (Docker, Kubernetes) are secured by configuring appropriate policies, scanning for vulnerabilities, and managing runtime security. Cloud Security: Design, implement, and manage security across Azure, focusing on identity management, data protection, and network security. … Vulnerability Management: Identify and prioritize vulnerabilities across infrastructure and applications, and collaborate with teams to remediate them in a timely manner. Threat Modelling and Risk Assessment: Perform threat modelling to identify security risks and provide recommendations for mitigation. Monitoring and Incident Response: Develop and maintain monitoring systems and respond … of Azure DevOps, CI/CD practices Familiarity with Azure services, including Azure Defender, Azure Monitor, and Azure Policy. Experience with security and compliance scanning tools such as vulnerability scanners, intrusion detection systems, & security information & event management (SIEM) solutions. Knowledge of container management with Azure Container Registry. Experience More ❯
years' experience working in a corporate, structured environment in a security analyst or security operations role. You'll focus on daily log analysis, vulnerability management support, antivirus monitoring, and helping to close security-related incidents. Key Responsibilities: 🔍 Security Monitoring & Analysis Review, monitor, and analyze daily security logs using SIEM … positives, escalate true positives, and assist in incident investigations. Support service desk and IT teams with closing out security-related calls and incidents. 🛠️ Threat & Vulnerability Management Assist with running and analyzing vulnerability scans; help track remediation. Monitor and manage endpoint protection and antivirus alerts. Collaborate with infrastructure and … or regulated environment. Strong understanding of security incident handling, log analysis, and common attack vectors. Hands-on experience with SIEM tools, antivirus platforms, and vulnerability scanners. Good understanding of basic networking, firewalls, and endpoint security principles. Strong written and verbal communication skills. Ability to prioritize and manage multiple operational More ❯
years' experience working in a corporate, structured environment in a security analyst or security operations role. You'll focus on daily log analysis, vulnerability management support, antivirus monitoring, and helping to close security-related incidents. Key Responsibilities: 🔍 Security Monitoring & Analysis Review, monitor, and analyze daily security logs using SIEM … positives, escalate true positives, and assist in incident investigations. Support service desk and IT teams with closing out security-related calls and incidents. 🛠️ Threat & Vulnerability Management Assist with running and analyzing vulnerability scans; help track remediation. Monitor and manage endpoint protection and antivirus alerts. Collaborate with infrastructure and … or regulated environment. Strong understanding of security incident handling, log analysis, and common attack vectors. Hands-on experience with SIEM tools, antivirus platforms, and vulnerability scanners. Good understanding of basic networking, firewalls, and endpoint security principles. Strong written and verbal communication skills. Ability to prioritize and manage multiple operational More ❯
external influences, weak adherence to security protocols and human error Proactively (and as a team) protect customer environments from vulnerabilities utilising tools such as vulnerabilityscanning Change control Complete understanding of the reasons underpinning change control, adhering to all required processes Support the team by creating CRQs, adhering More ❯
Portsmouth, Hampshire, Portchester, United Kingdom
ARM
external influences, weak adherence to security protocols and human error Proactively (and as a team) protect customer environments from vulnerabilities utilising tools such as vulnerabilityscanning Change control Complete understanding of the reasons underpinning change control, adhering to all required processes Support the team by creating CRQs, adhering More ❯
automation opportunities, build out custom workflows, and develop utility tools to enhance productivity and efficiency across the organization. Building secure SDLC pipelines which perform vulnerabilityscanning, ensuring an immutable artifact signed and testing evidence is validated. Working towards the long term aim of developing an Internal Developer Platform More ❯
automation opportunities, build out custom workflows, and develop utility tools to enhance productivity and efficiency across the organization. Building secure SDLC pipelines which perform vulnerabilityscanning, ensuring an immutable artifact signed and testing evidence is validated. Working towards the long term aim of developing an Internal Developer Platform More ❯