Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
McLaughlin & Harvey
alerts generated within security monitoring tools. Stay informed on cybersecurity trends, issues, and emerging threats, and help promote a culture of security awareness and compliance across the group. Conduct vulnerability assessments to identify potential gaps and weaknesses and propose suitable improvements. Contributing to the maintenance and continuous improvement of our ISMS to make sure systems are as secure as … improve Business Continuity and Disaster Recovery plans. Contribute to the IT risk register and mitigation plans. Ensure Endpoint security compliance, including Mobile Device Management. Organise audits, external and internal vulnerability scans, web, infrastructure and application penetration tests and ensure remediation of any issues. Assisting with ISO27001 & Cyber Essentials Plus certifications and GDPR compliance. Provide ad-hoc assistance in monitoring … with technical and non-technical colleagues at all levels in the organisation. Essential Previous experience within a cyber/information security role. Strong knowledge and understanding of security risk assessment, including security testing principles and tools. Network, operating system, application and organisational security concepts. An investigative and analytical nature with a focus on ensuring the organisation is as secure More ❯
solid foundation in hands-on cyber defence Proficiency with tools such as SIEM, PAM, web/email filtering (e.g. Mimecast), IDS/IPS, antivirus, endpoint protection, Microsoft Sentinel, and vulnerabilityassessment tools (e.g. Tenable) Strong analytical mindset and attention to detail, with a passion for detecting and mitigating threats Excellent problem-solving skills and the ability to respond More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Crown Commercial Service
easy to consume articles such as blogs, policies and presentations. Experience of day-to-day management of multi-disciplinary teams of cyber security professionals. Experience deploying, configuring and using vulnerabilityassessment (such as Tenable and the NCSC’s Active Cyber Defence Toolkit) and Attack Surface Management tools Experience using cloud provider monitoring tools such as AWS CloudWatch, CloudTrail More ❯
on, focusing on stakeholder engagement. Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat detection and response. Collaborate with More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
KBC Technologies Group
end to end network infrastructure automation capabilities that are aligned to the strategic goals of the business and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusion detection/prevention systems, and encryption technologies. Adhere to enterprise governance & review More ❯
access, and remote gateway protection at the edge. Security Operations & Threat Defence Act as the technical escalation point for complex threat investigations and incident response. Lead red-teaming simulations, vulnerability assessments, and threat hunting activities. Support proactive telemetry monitoring and improvement of detection logic and alert fidelity. Leadership & Mentoring Provide engineering mentorship to junior analysts and engineers; lead by More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
LAGOFIRE SRL
foundation in cybersecurity principles, you have experience designing and implementing security measures that protect sensitive information in complex environments. Your technical expertise spans areas such as encryption, access controls, vulnerability assessments, and incident response. You have excellent problem-solving skills and a proactive mindset, enabling you to anticipate potential threats and address them effectively. Communication comes naturally to you More ❯
Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: VulnerabilityAssessment Analyst, Slough Client: The Curve Group Location: Slough, United Kingdom Job Category: Other EU work permit required: Yes Job Views: 4 Posted: 26.06.2025 Expiry Date: 10.08.2025 Job Description: Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Our client is a globally recognised, successful … remediation process and prepare MI/Dashboard reports for stakeholders. You will also help alleviate the workload of the IT Service desk when needed. Your primary responsibilities include daily assessment of vulnerabilities from scans, evaluating and prioritizing risks, and remediating within SLA. You will collaborate with SMEs/vendors of relevant systems and possess understanding of cloud technologies such … of IT security principles, standards, and regulations (ISO 27001, NIST, CIS, PCI DSS, GDPR) Certifications: CISM, CISSP Experience with Patch Management, EDR/XDR, Antivirus, NAC (Forescout) Familiarity with Vulnerability Scanning Tools (Tenable One, Qualys) Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident Response & Forensic Management skills Experience with Azure, OCI Cloud, Windows, Linux administration Knowledge of More ❯
Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analyzing vulnerabilities from penetration testing reports, working with vendors to remediate vulnerabilities, patch management experience, and working on Windows, Linux, and Azure cloud systems. Also, ability to analyze and remediate SOC/NOC alerts. Our client is a globally recognized bank providing … and implementation within SLA. Collaborate with third-party vendors involved in remediation. Prepare MI/Dashboard reports for stakeholders and support the IT Service desk when needed. Perform daily vulnerability assessments, evaluate, risk assess, and prioritize vulnerabilities, remediating within SLA. Work closely with SMEs and vendors, especially on cloud technologies like Azure, AWS, and Oracle Cloud Infrastructure. Key Skills … related certifications. Desirable: Knowledge of IT security standards (ISO 27001, NIST, CIS, PCI DSS, GDPR). Certifications: CISM, CISSP. Experience with Patch Management, EDR/XDR, Antivirus, NAC (Forescout), Vulnerability Scanning tools (Tenable One, Qualys). Understanding of vulnerability scoring (CVSS/CMSS). Incident Response & Forensic Skills. Support experience with Azure, Oracle Cloud, Windows, Linux, and Mac. More ❯
Peterborough, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
certification support. Responsibilities: Monitor, analyse, and respond to security events and incidents within the SOC, ensuring timely detection and resolution in line with SLAs. Conduct thorough threat analysis and vulnerability assessments to identify potential security risks and implement mitigation strategies. Develop and refine incident response plans and playbooks to enhance SOC effectiveness. Perform root cause analysis (RCA) for high … years’ experience with leadership or advanced incident response experience. Strong understanding of network security, firewalls, VPNs, IDS/IPS, and endpoint security. Proficiency in incident response, threat analysis, and vulnerability management. Experience with security monitoring, root cause analysis, and risk assessments. Excellent analytical and problem-solving skills with attention to detail. Strong communication skills, including report writing and client More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
details will be provided later. Job Responsibilities: Design and implement end-to-end network infrastructure automation aligned with business and IT strategic goals. Conduct security assessments, penetration testing, and vulnerability assessments to identify and mitigate risks. Design secure network architectures, including firewalls, IDS/IPS, and encryption technologies. Ensure compliance with enterprise governance, review processes, ITSM, and CMDB standards. More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
KBC Technologies Group
end to end network infrastructure automation capabilities that are aligned to the strategic goals of the business and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusion detection/prevention systems, and encryption technologies. Adhere to enterprise governance & review More ❯
Derby, England, United Kingdom Hybrid / WFH Options
Cooper Parry
to develop, refine, and optimize detection rules and custom alerts, ensuring alerting mechanisms are aligned with evolving threat landscapes while reducing false positives and enhancing actionable insights Conduct regular vulnerability assessments, interpret scan results, and coordinate remediation efforts Investigate suspicious files and behaviors for malware; collaborate with vendors/internal teams to mitigate and prevent future infections Respond swiftly More ❯
Position: Cyber Security Lead Location: Liverpool (90% remote) Salary: Up to £75,000 + Bonus Key Skills: Penetration testing Vulnerability management Threat detection Cyber defence Security best practices CISSP, CISM or similar certification About the Role Are you a cybersecurity professional looking to lead the charge against evolving digital threats? We are seeking an experienced Cyber Security Lead to … implement a comprehensive cybersecurity strategy to protect our IT environment. Establish, enforce, and regularly update security policies, protocols, and standards. Manage real-time threat detection, incident response, and conduct vulnerability assessments to safeguard our infrastructure. Oversee the deployment of security solutions, working closely with internal teams to strengthen our defences. Collaborate with external security partners to ensure high-quality … re Looking For: Professional certification such as CISSP, CISM, or similar. Significant experience in cybersecurity management, ideally within a medium-to-large organisation. Extensive knowledge of security technologies, risk assessment, and vulnerability management. Hands-on experience with security monitoring tools and incident response. Familiarity with compliance standards such as ISO 27001, GDPR, and NIST frameworks. Strong analytical skills More ❯
Position: Cyber Security Lead Location: Nottingham (90% remote) Salary: Up to £75,000 + Bonus Key Skills: Penetration testing Vulnerability management Threat detection Cyber defence Security best practices CISSP, CISM or similar certification About the Role Are you a cybersecurity professional looking to lead the charge against evolving digital threats? We are seeking an experienced Cyber Security Lead to … implement a comprehensive cybersecurity strategy to protect our IT environment. Establish, enforce, and regularly update security policies, protocols, and standards. Manage real-time threat detection, incident response, and conduct vulnerability assessments to safeguard our infrastructure. Oversee the deployment of security solutions, working closely with internal teams to strengthen our defences. Collaborate with external security partners to ensure high-quality … Key qualifications include: Professional certification such as CISSP, CISM, or similar. Significant experience in cybersecurity management, ideally within a medium-to-large organisation. Extensive knowledge of security technologies, risk assessment, and vulnerability management. Hands-on experience with security monitoring tools and incident response. Familiarity with compliance standards such as ISO 27001, GDPR, and NIST frameworks. Strong analytical skills More ❯
Position: Cyber Security Lead Location: Leicester (90% remote) Salary: Up to £75,000 + Bonus Key Skills: Penetration testing Vulnerability management Threat detection Cyber defence Security best practices CISSP, CISM or similar certification About the Role Are you a cybersecurity professional looking to lead the charge against evolving digital threats? We are seeking an experienced Cyber Security Lead to … implement a comprehensive cybersecurity strategy to protect our IT environment. Establish, enforce, and regularly update security policies, protocols, and standards. Manage real-time threat detection, incident response, and conduct vulnerability assessments to safeguard our infrastructure. Oversee the deployment of security solutions, working closely with internal teams to strengthen our defences. Collaborate with external security partners to ensure high-quality … Key qualifications include: Professional certification such as CISSP, CISM, or similar. Significant experience in cybersecurity management, ideally within a medium-to-large organisation. Extensive knowledge of security technologies, risk assessment, and vulnerability management. Hands-on experience with security monitoring tools and incident response. Familiarity with compliance standards such as ISO 27001, GDPR, and NIST frameworks. Strong analytical skills More ❯
Position: Cyber Security Lead Location: Manchester (90% remote) Salary: Up to £75,000 + Bonus Key Skills: Penetration testing Vulnerability management Threat detection Cyber defence Security best practices CISSP, CISM or similar certification About the Role Are you a cybersecurity professional looking to lead the charge against evolving digital threats? We are seeking an experienced Cyber Security Lead to … implement a comprehensive cybersecurity strategy to protect our IT environment. Establish, enforce, and regularly update security policies, protocols, and standards. Manage real-time threat detection, incident response, and conduct vulnerability assessments to safeguard our infrastructure. Oversee the deployment of security solutions, working closely with internal teams to strengthen our defences. Collaborate with external security partners to ensure high-quality … Key qualifications include: Professional certification such as CISSP, CISM, or similar. Significant experience in cybersecurity management, ideally within a medium-to-large organisation. Extensive knowledge of security technologies, risk assessment, and vulnerability management. Hands-on experience with security monitoring tools and incident response. Familiarity with compliance standards such as ISO 27001, GDPR, and NIST frameworks. Strong analytical skills More ❯
enhance the security of IT systems both on-prem and cloud. Creation of reports, dashboards, metrics for SOC operations and presentation to senior management. Oversight, planning and execution of vulnerability assessments, penetration tests, audits or related security assessment exercises (eg Red Team) to improve the security posture of the infrastructure, applications and services. Manage the remediation of identified … networks and operating systems including firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, networks and cloud services Comprehensive knowledge or experience of information security principles, including risk assessment, intrusion detection, Security Incident and Event Management (SIEM) tools, threat and vulnerability management Detailed knowledge or experience of application or network based penetration testing tools and methodologies Experience More ❯
Stafford, England, United Kingdom Hybrid / WFH Options
GE Vernova
trends, ICS/OT threat landscapes, and emerging technologies, recommending tools and methods to enhance product security posture. Partner with PSL, incident response and product security teams to support vulnerability remediation, post-incident analysis, and contribute to the creation of security documentation, including architecture specs, procedures, and training materials. Represent the company in industry forums, standards bodies, and technical … C++, RTOS), as well as Linux/Windows platforms. Strong hands-on background in PKI, identity management, network security appliances, and security monitoring. Proficient in threat modeling, risk/vulnerabilityassessment, and using forensic/security analysis tools.. Excellent communication and stakeholder engagement skills, able to translate technical content for non-technical audiences. Exposure to quality improvement methodologies … vision, and prescription drug coverage; access to a Health Coach, a 24/7 nurse-based resource; and access to the Employee Assistance Program, providing 24/7 confidential assessment, counseling and referral services. Retirement benefits include the GE Retirement Savings Plan, a tax-advantaged 401(k) savings opportunity with company matching contributions and company retirement contributions, as well More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
CET Structures Limited
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Desirable Skills Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Desirable Skills Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL More ❯
Walsall, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL servers – database More ❯
Preston, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL servers – database More ❯