Loughton, Essex, England, United Kingdom Hybrid / WFH Options
Profile 29
role. This role will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetrationtesting and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC) using Terraform. Their ideal candidate will … Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & PenetrationTesting: Review PenetrationTesting, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk assessments, and ensure regulatory … contract continuity. Required Strong expertise in Azure cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetrationtesting, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of DevOps pipelines More ❯
Work for an award-winning provider of Security Services, specialising in Cyber Security Services such as Vulnerability Management, Information Security, PenetrationTesting, and Managed Security Services. We boast a fully managed Security Operations Centre (SOC) staffed by dedicated professionals. We're seeking a skilled Cyber Security Engineer to join our clients eam. The ideal candidate will have expertise … maintain KQL scripts for querying and analysing data within Azure Sentinel. Collaborate with cross-functional teams to identify security vulnerabilities and develop appropriate solutions. Conduct regular security assessments and penetrationtesting to identify and mitigate potential risks. Stay updated on emerging cyber security threats and best practices, implementing necessary adjustments to security protocols. Provide guidance and support to More ❯
Woking, England, United Kingdom Hybrid / WFH Options
McLaren Applied
containers and PaaS services, aligning to best practice for certifications (i.e., ISO27001) Data classification and data loss prevention Log collection and SIEM/SOAR monitoring and automated response Security testing, including automated testing and assessing formal penetration tests Contribute to the development of our security architecture and associated roadmap Act as point of contact for Managed Detection … maintaining certification programmes (ISO27001) and aligned with standards in the automotive and rail industry Any of the following certifications would be an advantage: EC-Council Certified Ethical Hacker, Certified PenetrationTesting Professional, Certified Cloud Security Engineer ISC2 Systems Security Certified Practitioner, Certified Cloud Security Professional, Certified Secure Software Lifecycle Professional Any Microsoft SC-coded certification AWS Security Specialty More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
ISO27001, NIST 800-30/37/53, JSP 440, 604, and Defence Standards. Develop and maintain security documentation (e.g., RMADS, Security Assurance Documents, Security Management Plans). Conduct penetrationtesting, vulnerability assessments, and remediation activities. Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005/31000, NIST 800-30, NIST … . Experience with defence and government security standards (JSPs, Def Stan 05-138/139). Proficiency in security testing tools, technologies, and techniques. Ability to analyze and mitigate security vulnerabilities effectively. Strong problem-solving, decision-making, and communication skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Industry certifications such as More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
ISO27001, NIST 800-30/37/53, JSP 440, 604, and Defence Standards. Develop and maintain security documentation (e.g., RMADS, Security Assurance Documents, Security Management Plans). Conduct penetrationtesting, vulnerability assessments, and remediation activities. Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005/31000, NIST 800-30, NIST … . Experience with defence and government security standards (JSPs, Def Stan 05-138/139). Proficiency in security testing tools, technologies, and techniques. Ability to analyze and mitigate security vulnerabilities effectively. Strong problem-solving, decision-making, and communication skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Industry certifications such as More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
the cloud to ensure design implementation, safeguarding Experian's assets. You'll assess control design, performance, and compliance with standards and regulations, reporting to the Information Security Control Assurance Testing Manager. Identifying gaps, documenting findings, and recommending improvements to mitigate risks are important responsibilities. Using data-driven testing techniques and a defined methodology, you'll collaborate to ensure … Develop test plans, test cases, and procedures, applying data from security tools to capture evidence. Use queries and dashboards to identify potential control failures as part of the control testing process. Ensure the accuracy and timely completion of control testing, providing peer review. Document findings, including root cause analysis and applicable recommendations for remediation. Be the primary liaison … with partners, delivering clear progress updates and results. Contribute lessons learned by integrating partner feedback to improve the control testing program. About Experian About us, but we'll be brief Experian is the world's leading global information services company, unlocking the power of data to create more opportunities for consumers, businesses, and society. Experian is a global data More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
KBC Technologies Group
design and implement end to end network infrastructure automation capabilities that are aligned to the strategic goals of the business and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetrationtesting and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusion detection/prevention systems, and encryption technologies. Adhere … Professional (e.g., CISSP, CompTIA Security+ Seniority level Seniority level Mid-Senior level Employment type Employment type Contract Job function Job function Analyst, Design, and Business Development Industries IT System Testing and Evaluation and IT System Data Services Referrals increase your chances of interviewing at KBC Technologies Group by 2x Get notified about new Network Security Engineer jobs in Macclesfield More ❯
Welwyn Garden City, England, United Kingdom Hybrid / WFH Options
PayPoint plc
You'll also work on automating routine tasks to speed up our response times. From start to finish, you’ll oversee cybersecurity incidents, document findings, and suggest improvements. Security Testing & Business Support: You’ll take part in cyber-attack simulations, penetrationtesting, and security drills to ensure our defenses are strong. You'll also help identify critical More ❯
Newcastle upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
value. Assist in managing security incidents, vulnerabilities, and malfunctions, ensuring efficient resolution. Conduct forensically sound acquisitions of computer systems and media for evidence collection. Provide advice and guidance in penetrationtesting and improving service offerings. Carry out reviews, internal audits, and spot-checks to ensure effective operation of security measures. Provide expertise in the design and implementation of … science. This will require occasional periods of intense concentration to ensure any evidence collected can be used in a court of law. 16. Provide appropriate advice and guidance in penetrationtesting and improving the service offering. 17. Carry out reviews, internal audits and spot-checks to ensure the effective operation of (but not limited to): IDS/IPS More ❯
You'll also work on automating routine tasks to speed up our response times. From start to finish, you’ll oversee cybersecurity incidents, document findings, and suggest improvements. Security Testing & Business Support: You’ll take part in cyber attack simulations, penetrationtesting, and security drills to make sure our defenses are strong. You'll also help identify More ❯
Bradford, England, United Kingdom Hybrid / WFH Options
Techwaka
functional teams to ensure compliance with security policies and procedures. Key Responsibilities: Monitor network and system activities for suspicious behavior and potential security breaches Conduct regular vulnerability assessments and penetrationtesting to identify security weaknesses Respond to security incidents and provide detailed analysis and reporting on findings Collaborate with IT and other departments to implement effective security controls More ❯
management etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security controls, identify risks and propose treatment plans. Conduct regular vulnerability scans and penetration tests. Liaise with global IT and Cloud teams to maintain company systems and their security. Liaise with global Security Operations Centre colleagues to resolve any issues. Ensure compliance with … Bachelor's degree in Computer Science, IT or Information Security. Compliance exposure with relevant security frameworks and standards (PCI, ISO, NIST, CIS). Experience with audits and compliance enforcement. Penetrationtesting experience. Strong understanding of networking protocols and systems architecture. Creating PCI digital keys or security access modules. Threat intelligence exposure. Proficient in programming or scripting languages. IaC More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Murnen Design
mitigation techniques. Experience with a wide range of security technologies and practices, including: Intrusion detection and prevention systems (IDPS) Security information and event management (SIEM) system Vulnerability scanning and penetrationtesting Cloud security Identity and access management (IAM) Data loss prevention (DLP) Endpoint protection Security operations and incident response Experience in developing and implementing security policies, procedures, and More ❯
log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (PenetrationTesting) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Education Requirements & Experience Minimum of 2 to More ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
Due to the service of the role, it will now be based on an Umbrella solution. Essential skills/experience required: Certifications: OSCP or CREST/TIGER Scheme. Experience penetrationtesting, ethical hacking, or completing vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube … Leader) - desirable Knowledge of UK public sector security and data protection standards (e.g., NCSC, Cyber Essentials Plus) - desirable Threat modelling and secure design practices - desirable Role/Responsibilities: Perform penetrationtesting and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc), and … Cleared, Dv Clearance, Dv Check, Developed Vetted, Developed Vetting, Dv Strap, Active DV, Security, Cyber, Cybersecurity, Infosec, Cloud, AWS, Amazon Web Services, Azure, Python, Bash, Script, Scripting, Automate, Automation, Penetration, Pentest, Pentesting, Pen-Test, Pen-Testing, Hacking, Vulnerability, Threat, Engineer #vacancy #jobadvert #recruit #hiring #jobsearch #careers #talent #recruitment #job Circle Recruitment is acting as an Employment Agency in More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Agoda
a dynamic and advanced environment. The Opportunity: As a Security Analyst, you will focus on identifying, analyzing, and remediating vulnerabilities across our environment. You will be hands-on with penetrationtesting and vulnerability management, ensuring our systems remain secure and resilient. In this Role, you’ll get to: Develop Security Automation Tools to implement solutions at scale Triage … security findings from multiple tools and work with hundreds of teams to get them remediated within the right SLA Conduct security assessments through code reviews, vulnerability assessments, penetrationtesting and risk analysis Research on the negative effects of a vulnerability, from minimizing the impact to altering security controls for future prevention Identify potential threats so that the organization … can protect itself from malicious hackers. This includes Vulnerability Management, Bug Bounty Program, PenetrationTesting Be responsible for developing Security Trainings for developers Work with DevSecOps team in integration of tools into CI/CD, as well as fine-tune the rules and precision What you’ll Need to Succeed: 5+ years in the information security field 5+ More ❯
Loughton, England, United Kingdom Hybrid / WFH Options
Talkspirit
and responsible lending. Role Summary This is an initial 6-month contract for an experienced DevSecOps Engineer focused on securing Azure infrastructure, integrating security automation, PCI DSS compliance, vulnerability testing, and incident response. The role involves developing and maintaining secure Azure DevOps pipelines and Infrastructure as Code (IaC) using Terraform, mentoring an internal engineer, and managing Sentinel, Defender, and … Centre, Microsoft Defender, and Sentinel for security monitoring. Oversee SOAR solutions including SOC Prime. Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Conduct vulnerability assessments and penetration testing. Ensure PCI DSS compliance through audits and risk assessments. Implement DNS security solutions. Develop incident response processes with third-party support. Develop SIEM solutions, logging, and threat intelligence … engineers and coordinate with external security partners. Ensure comprehensive documentation for post-contract continuity. Minimum Requirements Strong expertise in Azure security, Microsoft Defender, and Sentinel. Experience with SOAR technologies, penetrationtesting, and vulnerability assessments. Proficiency with Terraform and IaC security automation. Knowledge of DevOps pipelines, PCI DSS, SIEM, and security frameworks. Scripting skills (Python, Bash, PowerShell). Excellent More ❯
Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analyzing vulnerabilities from penetrationtesting reports, working with vendors to remediate vulnerabilities, patch management experience, and working on Windows, Linux, and Azure cloud systems. Also, ability to analyze and remediate SOC/NOC alerts. Our client is a globally recognized bank … days in the office and 2 days remote. Key Responsibilities: Support the IT & Cyber Security Manager in planning and executing business strategy. Manage remediation of vulnerabilities, including patch testing and implementation within SLA. Collaborate with third-party vendors involved in remediation. Prepare MI/Dashboard reports for stakeholders and support the IT Service desk when needed. Perform daily vulnerability More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
NearTech Search
compliance responsibilities. Role Highlights Monitor, detect, and respond to security incidents and vulnerabilities Own and manage key elements of the security stack, including SIEM and DLP tools Lead audits, penetrationtesting, and remediation actions to uphold ISO27001 & SOC2 compliance Collaborate with product teams to embed security into the development lifecycle Produce detailed KPI-driven security reports and dashboards … Manchester, England, United Kingdom 3 weeks ago Manchester, England, United Kingdom 2 weeks ago Manchester, England, United Kingdom 21 hours ago Manchester, England, United Kingdom 1 week ago OSCP Penetration Tester 6 months+ to £45k Manchester, England, United Kingdom 1 week ago Greater Manchester, England, United Kingdom 2 weeks ago Greater Manchester, England, United Kingdom 1 week ago Senior More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
possible rate. Additional details will be provided later. Job Responsibilities: Design and implement end-to-end network infrastructure automation aligned with business and IT strategic goals. Conduct security assessments, penetrationtesting, and vulnerability assessments to identify and mitigate risks. Design secure network architectures, including firewalls, IDS/IPS, and encryption technologies. Ensure compliance with enterprise governance, review processes More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
KBC Technologies Group
design and implement end to end network infrastructure automation capabilities that are aligned to the strategic goals of the business and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetrationtesting and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusion detection/prevention systems, and encryption technologies. Adhere More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
Plan, lead the response to security incidents and breaches, providing expertise in root cause analysis, containment, and remediation. Vulnerability Management: Conduct regular security assessments, including vulnerability scanning and writing penetrationtesting Statement of Works, and manage the remediation of identified vulnerabilities. Security Tools & Technologies Advice: Provide guidance on the selection, implementation, and optimization of security tools such as … IA Technical Risk Assessments and the management of these Assessments Good understanding and appreciation of the Engineering development lifecycles and how the Product Security specialism aligns Ability to interpret Penetration Test Reports and write Remediation Action Plans An appreciation of the wider UK Government Assurance Processes (such as the legacy JSP 604 Assurance or the CAF GovAssure processes). More ❯