Omagh, Northern Ireland, United Kingdom Hybrid / WFH Options
Digital Waffle
security incidents. Conduct capacity planning and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS, Azure, Google Cloud) including VPCs More ❯
security measures, respond to incidents, and maintain compliance with industry standards. Responsibilities Design and implement security protocols to protect sensitive information across IT infrastructure. Monitor network security and conduct vulnerability assessments to identify potential threats. Manage incident response activities, including investigation and remediation of security breaches. Develop and maintain disaster recovery plans to ensure business continuity. Collaborate with cross More ❯
Job Description: We are seeking an experienced and versatile Business Analyst to join our team, focusing on Asset and Vulnerability Management within the utilities sector. The successful candidate will play a pivotal role in bridging business needs with technical solutions, ensuring robust processes and systems to safeguard critical infrastructure. We are after an all-rounder, someone with dynamism and … a strong communicator. Key Responsibilities: Collaborate with stakeholders to gather, analyse, and document requirements related to asset and vulnerability management. Define and optimize processes for identifying, assessing, and mitigating vulnerabilities across utility assets. Develop detailed business cases, user stories, process flows, and functional specifications. Act as a liaison between business, IT, and cybersecurity teams to ensure alignment of objectives. … Support the design and implementation of asset management tools, vulnerabilityassessment platforms, and reporting dashboards. Ensure compliance with industry standards, regulations, and best practices in asset and vulnerability management. Facilitate workshops, stakeholder meetings, and presentations to drive decision-making and adoption of solutions. Conduct data analysis to identify trends, risks, and opportunities for improvement in asset and More ❯
Farnborough, England, United Kingdom Hybrid / WFH Options
GardPass Consulting
attacks and vulnerabilities. You will be responsible for planning and implementing appropriate security controls to ensure that the information within the client is kept secure. Key functions/outputs: Vulnerability Scanning & Reporting Endpoint Security Incident Management & Tickets System Hardening Change Work Participation in Regular Meetings Documentation Main Objectives: Vulnerability Scanning & Reporting Perform regular vulnerability scans and generate … similar. The process should be focused on ensuring that the below tool sets are kept up to date and ensure that scans are performed regularly to help assist the Vulnerability and Patch Manager with identifying weaknesses in the system. Code Scans: perform regular code scans to audit code quality metrics, potential bugs, and security vulnerabilities. Vulnerability Management Tooling … perform regular Vulnerability Management Scans and ensure that the warehouse and plugins are kept up to date to capture new vulnerabilities. Reporting: assist the Vulnerability and Patch Manager with generating regular vulnerability management reports, which are to be provided to the cyber security and IA lead. Endpoint Security: Endpoint Protection: perform regular updates to Endpoints to ensure More ❯
we utilise the best digital capabilities of the ServiceNow ITSM tooling product to provide the very best Experience to our Customers. We are seeking an experienced and results-driven Vulnerability & Security Compliance Lead who plays a critical role in ensuring the security and reliability of our customers IT infrastructure. This role is responsible for leading efforts to identify, assess … applications. Coordinate and implement regular patching cycles while minimizing downtime and disruption to business operations. Coordinate the testing of patches prior to deployment to validate functionality and compatibility. Utilize vulnerability scanning tools to identify weaknesses in the IT environment. Analyze and prioritize vulnerabilities based on risk impact and business-criticality. Oversee and enforce best practice for security hygiene; Ensure … compliance with regulatory requirements, internal policies, and industry standards related to patching and vulnerability management Generate reports on vulnerability status, patching progress, and key metrics for senior leadership and audit purposes. Work closely with cross-functional teams, including IT Operations, Security, and Application teams, to align patching and remediation activities with business objectives. Identify inefficiencies in processes and More ❯
Friday) Key Responsibilities: Monitor, manage, and respond to security incidents in a timely manner. Liaise with relevant departments in keeping all systems compliant and report on their status. Conduct vulnerability assessments and implement remediation plans across Windows, Red Hat, Debian Linux, and other platforms. Collaborate with IT and OT teams to secure legacy manufacturing equipment and industrial control systems. … and respond to threats. Desirable: Certifications such as CompTIA Security+, CISSP, CEH, or GIAC. Experience with SIEM tools, network monitoring, or threat intelligence platforms. Knowledge of NIST(2), Cyber Assessment Framework, Cyber essentials(+), ISO 27001, or IEC 62443 standards. Scripting skills and data manipulation The Package: If successful our client is offering a salary between More ❯
Scunthorpe, South Humberside, England, United Kingdom
Principal IT
Friday) Key Responsibilities: Monitor, manage, and respond to security incidents in a timely manner. Liaise with relevant departments in keeping all systems compliant and report on their status. Conduct vulnerability assessments and implement remediation plans across Windows, Red Hat, Debian Linux, and other platforms. Collaborate with IT and OT teams to secure legacy manufacturing equipment and industrial control systems. … and respond to threats. Desirable: Certifications such as CompTIA Security+, CISSP, CEH, or GIAC. Experience with SIEM tools, network monitoring, or threat intelligence platforms. Knowledge of NIST(2), Cyber Assessment Framework, Cyber essentials(+), ISO 27001, or IEC 62443 standards. Scripting skills and data manipulation The Package: If successful our client is offering a salary between More ❯
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: • Lead the development and delivery of threat intelligence and … vulnerability products. • Select and profile key threat actors posing the greatest risk to the client’s estate. • Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. • Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. • Provide in-depth contextual threat analysis, including actor capability and intent. • Maintain and improve internal documentation and … reporting processes. • Lead, mentor, and support a multidisciplinary team of cyber analysts. • Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: • 5+ years of experience in Threat Intelligence, Vulnerability Management, or cyber research. • Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. • Experience in More ❯
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
Role Overview: We are seeking a driven and technically proficient Penetration Tester. The ideal candidate will have solid experience in performing end-to-end Vulnerability Assessments and Penetration Testing (VAPT) across various environments, possess strong reporting and scripting skills, and demonstrate the ability to engage with clients during both pre-sales and project delivery phases. This is an excellent More ❯
Enfield, Middlesex, England, United Kingdom Hybrid / WFH Options
Eden Brown Synergy
systems to identify, mitigate, and respond to risks and potential threats. * Utilise Microsoft Sentinel and related tools to analyse security data, detect anomalies, and respond effectively to incidents. * Oversee vulnerability assessments and penetration testing to ensure robust security measures are maintained. * Contribute to the development and execution of incident response plans, ensuring prompt action to contain and remediate security More ❯
scaling. Drive an evolution of services to support cloud-native managed services, including an evolution of Kubernetes. Drive efforts to enhance cloud infrastructure security, including access controls, encryption, and vulnerability assessments, focusing on engineering security solutions. Collaborate on CI/CD (TeamCity) pipelines to automate software deployment, including the build platform (Java, Gradle Enterprise) and QA/Testing tooling More ❯
continuous improvement purposes. Analyse trends in security threats and vulnerabilities , staying ahead of emerging risks and continuously refining response strategies to mitigate future incidents. Participate in threat hunting and vulnerability assessments, working with cross-functional teams to identify and close gaps in security while ensuring business operations run smoothly. Support internal and external stakeholders to ensure security configurations, operational More ❯
including the Microsoft E3 license. Ensure compliance with security policies, regulatory requirements and privacy To proactively implement and develop security best practices to protect IT infrastructure. Performing audits and vulnerability assessments to ensure compliance with industry standards and company policies. Maintain system logs and documentation for compliance reporting. Supporting the groups PCI-DSS and GDPR compliance. Leading on the More ❯
Engineer will be responsible for developing and maintaining secure configuration baselines, enforcing patch compliance, and embedding preventative controls into day-to-day operations. You will lead the organization's vulnerabilityassessment process, including the use of scanning tools, interpretation of technical findings, and coordination of remediation activities. Additionally, you will provide expert input on design proposals, technical change … and maintaining secure configuration baselines (e.g. CIS Benchmarks), enforcing patch compliance, and embedding preventative controls into day-to-day operations. You have the opportunity to lead the Elysium's vulnerabilityassessment process - including the use of scanning tools, interpretation of technical findings, and coordination of remediation activities with relevant teams. This will ensure timely resolution of risks and … security responsibilities. Hands-on experience with server hardening, patching regimes, and baseline enforcement. Experience supporting infrastructure change or design assessments from a security perspective. Experience managing or contributing to vulnerabilityassessment and remediation. Experience working within regulated environments (e.g. NHS DSPT, ISO 27001, CE+). Deep understanding of infrastructure security, including system hardening, patching, and baseline configuration. Familiarity More ❯
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerabilityassessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯
Aberdeen, Scotland, United Kingdom Hybrid / WFH Options
Cyber UK
continuous improvement of margin, customer satisfaction, schedule, working capital and safety performance.As a Senior Cyber Engineer, you will assist in the provision of cyber security, networking, secure architectures, solutions, vulnerability and risk assessments, technologies and procedures to support Wood assignments/project teams and clients.This is an ideal opportunity for an individual with previous project experience who has the … capability to discover vulnerabilities and risks in networks, software systems and data centers through ongoing vulnerability scans, monitoring network data, and ensuring hardware and software applications are updated.Our Clients and ProjectsDesigning the future. Transforming the world.Wood’s Consulting business unit is a global, end-to-end, multi-sector specialist consultancy, trusted by clients to provide the innovative solutions and … that meet client requirements and implement the appropriate measures to mitigate security risks (e.g., Antivirus software, patch management programs, insider threat protection, incident response plans, and regulation compliance) Conduct vulnerability assessments and audits on client systems and network devices considering the sensitivity of Operational Technology testing Provide expertise in Network Design, implementation, and testing for networks to support Integrated More ❯
Aberdeen, Scotland, United Kingdom Hybrid / WFH Options
Alaska Northstar Resources LLC
project. The SharePoint Developer plans, designs, develops, and supports sites using SharePoint development platforms/technologies. They will provide support for systems programming, web server (IIS) administration, web server vulnerabilityassessment and mitigation, custom application support, Active Directory account and group policy management. Duties are to support the Defense Centers For Public Health - Aberdeen (DCPH-A) customer located … SharePoint Designer, and Visual Studio. Develop and deploy custom, internet-facing websites using the SharePoint Web Content Management platform. Offer support across multiple areas including systems programming, IIS administration, vulnerability remediation, custom application support, and Active Directory (accounts and group policies). Use the GSC ticketing system to manage and resolve assigned support tickets efficiently. Collaborate with the Information More ❯