cyber security strategies and roadmaps Technical proficiency in a wide range of cyber risk management services, including cyber threat, risk and control assessments, secure software development practices, penetration testing, vulnerability assessments, among others Sound knowledge of applicable laws, compliance regulations, and industry standards as it relates to privacy, security, and compliance Sound knowledge of applicable frameworks, including MITRE ATT More ❯
cyber security strategies and roadmaps Technical proficiency in a wide range of cyber risk management services, including cyber threat, risk and control assessments, secure software development practices, penetration testing, vulnerability assessments, among others Sound knowledge of applicable laws, compliance regulations, and industry standards as it relates to privacy, security, and compliance Sound knowledge of applicable frameworks, including MITRE ATT More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Altitude-Recruitment Limited
assessments for new features and system changes Evaluate and recommend security technologies and tools Operational (40%) Manage security environments across Azure and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerabilityassessment and penetration testing programs Maintain identity and access management controls Compliance & Assurance (30%) Maintain ISO27001 certification More ❯
assessments for new features and system changes Evaluate and recommend security technologies and tools Operational (40%) Manage security environments across Azure and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerabilityassessment and penetration testing programs Maintain identity and access management controls Compliance & Assurance (30%) Maintain ISO27001 certification More ❯
Location: Belfast Workplace: Hybrid The opportunity: The Security Vulnerability and Penetration Testing Engineer will oversee and serve as a technical resource for all assessment activities related to the security posture of existing and proposed firm systems, platforms, and processes to protect and continually improve the confidentiality, integrity, and availability of information systems per the firm's business objectives … systems, platforms, and applications Serve as a Subject Matter Expert (SME) for the VAPT function Serve as the system owner for common VAPT toolsets, platforms, and processes Provide technical assessment reports that are easily understandable by the target audience and include practical and reasonable recommendations based upon sound risk management principles Skills and experience: A Computer Science bachelor's … preferred Offensive Security OSCP is required Commanding knowledge of VAPT concepts and best practices, including the requirements for WhiteHat/ethical hacking Expert understanding of the difference between a vulnerabilityassessment and a penetration test in the context of assessment scope, objectives, and deliverables Extensive experience with common automated VAPT tools such as Nessus, Appscan, Burp Suite More ❯
london (city of london), south east england, united kingdom
WillHire
and incident response workflows in a fast-growing tech environment . Key Responsibilities Assist in monitoring and analyzing network traffic, logs, and system alerts to identify potential threats Perform vulnerability assessments and help implement remediation strategies Participate in penetration testing and report exploitable weakens Assist with hardening of systems, identity & access management, and secure configuration of cloud assets Research … in CTFs, bug bounty, or cybersecurity clubs/communities What You'll Get Real-time exposure to cybersecurity operations within a tech-driven product environment Hands-on training in vulnerabilityassessment, threat hunting & compliance 1:1 mentorship from seasoned cyber professionals & exclusive learning resources Internship Certificate & Letter of Recommendation upon successful completion Opportunity for a Pre-Placement Offer … PPO) at WillHire or with our client organizations Hiring Process Online Application Resume + short write-up on your cybersecurity interests/projects Security Aptitude TestMCQ + scenario-based assessment on networking & cyber fundamentals Technical Interview Live discussion around vulnerabilities, tools, and problem-solving Managerial Interview Assess motivation, culture fit, communication skills Offer Formal internships offer with stipend details More ❯
system architectures, applications, cloud services (IaaS, PaaS, SaaS), and network security. Assess IAM/PAM implementations and M365/Azure/Active Directory configurations. Conduct or oversee penetration testing, vulnerability assessments, and threat modelling. Review and approve technical designs and solution architectures from a security standpoint. Assurance, Compliance, and Audit Develop and maintain an IT Security Assurance Framework. Lead More ❯
AI tools for predictive analytics, customer insights, and operational automation. Cybersecurity • Implement and maintain security controls to protect customer data, payment systems, and business operations. • Conduct regular security audits, vulnerability assessments, and compliance checks (e.g., PCI-DSS). • Respond to incidents and ensure business continuity through disaster recovery planning. • Integrate AI-driven threat detection and response tools to enhance More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
respond to Cyber Security Incidents Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others. Run VulnerabilityAssessment tools to measure compliance with security updates and security patches. Member of a Team who are responsible for making multiple daily CSOC checks to detect and respond … XDR and Microsoft Defender variants, and Elastic Security, or displays aptitude to learn how to work with a SIEM. Experience and knowledge of SIEM tools, Cyber Security Incident Response, Vulnerability Management and Cyber Threat Intelligence. Experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at it. More ❯
carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerabilityassessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations More ❯
carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerabilityassessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations More ❯
london (city of london), south east england, united kingdom
dnevo Partners
carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerabilityassessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations More ❯
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Michael Page
Ensure security controls are in-place based on ISO27001 and NIST As the regional security representative in the global Security/Technology project Lead/execute phishing campaign Conduct vulnerability assessments and implement measures to mitigate potential risks. Involve in global security operations process, analysis and escalate security alerts/tickets from global SOC team Maintain and update security More ❯
Cheshire, England, United Kingdom Hybrid / WFH Options
Morgan Law
IT Security Manager, wider IT team, and third-party partners to ensure security best practices are maintained across their cloud and on-premise environments. Key Responsibilities Conduct threat and vulnerability assessments and recommend remediation steps Support the investigation of security incidents and policy violations Assist with risk assessments and security audits Implement and maintain security standards, and guidelines Work More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Tate Milton Keynes
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
Employment Type: Full-Time
Salary: £50,000 - £60,000 per annum, Negotiable, Inc benefits, OTE
Network architecture, including firewalls, VPNs, and segmentation. Identity and Access Management (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. Review and approve technical designs and solution architectures from a security standpoint. Assurance, Compliance, and Audit Develop and maintain the IT Security Assurance More ❯
Network architecture, including firewalls, VPNs, and segmentation. Identity and Access Management (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. Review and approve technical designs and solution architectures from a security standpoint. Assurance, Compliance, and Audit Develop and maintain the IT Security Assurance More ❯
Knutsford, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
environments Manage secure configurations, access controls, and CI/CD workflows in GitLab Integrate and protect telemetry tools such as Cribl, Elastic, Splunk, Fluentd, and Syslog Perform threat modelling, vulnerability assessments, and risk analysis for the pipeline Partner with DevOps to embed security into infrastructure-as-code and deployment processes Monitor and respond to security events, maintaining clear documentation More ❯
Cyber Security Engineer to join their Service and Support team. The role involves designing and securing OT networks across various critical industries, conducting advanced threat analysis, penetration testing, and vulnerability assessments. The engineer will develop and implement cybersecurity solutions, lead risk mitigation efforts, mentor junior team members, and support project management and business development activities. The position requires travel More ❯
Configure and maintain routers, switches, wireless systems, and firewalls. Deploy scalable, high-performance network solutions with minimal downtime. Conduct regular network maintenance, updates, and upgrades. Perform security audits and vulnerability assessments. Respond to and mitigate network security incidents. Automate network tasks and processes using scripting tools. Maintain comprehensive network documentation and diagrams. Collaborate with IT teams and third-party More ❯
Configure and maintain routers, switches, wireless systems, and firewalls. Deploy scalable, high-performance network solutions with minimal downtime. Conduct regular network maintenance, updates, and upgrades. Perform security audits and vulnerability assessments. Respond to and mitigate network security incidents. Automate network tasks and processes using scripting tools. Maintain comprehensive network documentation and diagrams. Collaborate with IT teams and third-party More ❯