cause harm. This involves continuous monitoring and analysis of network traffic, system logs, and other data sources to identify unusual patterns or behaviours that may indicate a security threat. Vulnerability Management: Identify and address security weaknesses in our systems. Conduct regular vulnerability assessments, apply patches and updates, and implement security controls to mitigate risks. Defence Management: Oversee and … experience and skills that include: IT Security Operations Experience: Recent experience as a senior member of a multi-disciplinary team managing operational security (firewall, content filtering, DMZ, Pen Testing, Vulnerability Management) and external managed service partners. Security Qualifications: Accredited to a recognised Security qualification (e.g., CISSP, CCP, CCSP). The successful candidate must be willing to work towards obtaining … Demonstrated ability to actively seek out and neutralise potential threats. Experience with threat intelligence tools and techniques, and a deep understanding of the latest cyber threats and attack vectors. Vulnerability Identification: Expertise in identifying and mitigating security vulnerabilities. Experience with vulnerability scanning tools, penetration testing, and risk assessment methodologies. Defence and Firewall Management: Experience in managing defences More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
DMS Computer Recruitment
of the position include: Design and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments Participate More ❯
policies. You will interact with IT representatives to ensure adherence to corporate and information security policies. You will have skills to provide expert level assurance in penetration testing and vulnerability assessments. The ability to manage business and IT expectations, compliance, and Security requirements are critical to success. You should also have the ability to manage a small team/… testers. Ensure smooth delivery and completion of penetration tests. Providing regular updates to Cyber Assurance Program Managers on status of tests you have been allocated to support. Perform Technical Vulnerability and Web Application scans and provide output to security testers/application owners where required. Conduct quality assurance on vendor supplied reports for Cyber Assurance Program Managers at end … lifecycle, OWASP Application vulnerabilities and IT systems. Knowledge of Cybersecurity frameworks (e.g., NIST, ISO 27001) and compliance regulations (e.g., DORA, GDPR, Cyber Essentials). Familiarity with Security tooling and vulnerability Scanning e.g. Qualys, Nessus, Burpsuite Digital Forensics or Discovery experience Basic understanding of eMail infrastructure/Outlook/Office365 and Microsoft Application Basic understanding of virtual environments Bachelor's More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
CET Structures Limited
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Desirable Skills Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL More ❯
Security Operations Securely manage M365 & Azure resources, implementing comprehensive security policies and initiatives. Implement security measures and controls for EUC environments, including endpoint security, access controls, and device management. Vulnerability Management Conduct and oversee regular vulnerability assessments on systems, networks, and applications. Identify, analyse, and prioritise vulnerabilities based on risk and potential impact and utilise threat intelligence analysis … to determine the risk posed by identified vulnerabilities. Collaborate with the IT MSP to develop and implement remediation plans, drive remediation efforts and identify improvements in the vulnerability management program. Monitor and track the status of identified vulnerabilities and ensure timely resolution. Security Monitoring and Incident Response Leverage Microsoft Defender EDR/XDR and other security tools to monitor More ❯
We are recruiting for a Security Consultant to work within our Vulnerability, Detection & Remediation (VDR) practice. Our VDR service is a fully managed solution that delivers continuous vulnerability assessments to proactively identify emerging threats across your environment, including high-risk zero-day vulnerabilities. For assets covered by remediation, the service also provides a rapid protection capability, enabling swift … improving our clients’ security posture and resilience. Day to day, you will: Develop processes and drive improvement to deliver tight SLA’s and KPI’s for our customers leveraging vulnerability and assessment tools such as Qualys and Microsoft’s EDR offering. Analyse vulnerability test reports and provide remediation/mitigation plans to the team. Integrate with our … reports, which will provide standardised and efficient context to all customer engagements. Our ideal candidate: Able to demonstrate proven experience with technical accreditations or demonstrable experience in security and vulnerability remediation technologies: Security Tooling: OWASP ZAP, Nmap, Wireshark Assessment Tooling: Nessus, Qualys, etc Remediation Tooling: Microsoft Endpoint Management/Intune Microsoft Security/Compliance: MFA,?Conditional Access, SSPR More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Robert Walters
working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerability management activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party risks … Assist in managing third party risk processes by evaluating external partners' security postures and ensuring compliance with internal requirements. Work closely with Security Operations and IT teams to oversee vulnerability assessments and coordinate remediation efforts effectively. Conduct thorough reviews of security architecture for new systems and services to ensure robust protection measures are in place from the outset. Evaluate … experience on protecting sensitive data within regulated environments. Your background should include hands-on involvement with risk assessments, policy development aligned with industry standards like ISO 27001 or NIST, vulnerability management activities spanning identification through remediation, and direct participation in incident response processes. Demonstrable experience applying risk assessment methodologies to identify vulnerabilities and recommend effective mitigations is highly More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Robert Walters
working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerability management activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party risks … Assist in managing third party risk processes by evaluating external partners' security postures and ensuring compliance with internal requirements. Work closely with Security Operations and IT teams to oversee vulnerability assessments and coordinate remediation efforts effectively. Conduct thorough reviews of security architecture for new systems and services to ensure robust protection measures are in place from the outset. Evaluate … experience on protecting sensitive data within regulated environments. Your background should include hands-on involvement with risk assessments, policy development aligned with industry standards like ISO 27001 or NIST, vulnerability management activities spanning identification through remediation, and direct participation in incident response processes. Demonstrable experience applying risk assessment methodologies to identify vulnerabilities and recommend effective mitigations is highly More ❯
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: Lead the development and delivery of threat intelligence and … vulnerability products. Select and profile key threat actors posing the greatest risk to the client's estate. Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. Provide in-depth contextual threat analysis, including actor capability and intent. Maintain and improve internal documentation and … reporting processes. Lead, mentor, and support a multidisciplinary team of cyber analysts. Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: 5+ years of experience in Threat Intelligence, Vulnerability Management, or cyber research. Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. Experience in More ❯
bradford, yorkshire and the humber, united kingdom
Anson Mccade
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: Lead the development and delivery of threat intelligence and … vulnerability products. Select and profile key threat actors posing the greatest risk to the client's estate. Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. Provide in-depth contextual threat analysis, including actor capability and intent. Maintain and improve internal documentation and … reporting processes. Lead, mentor, and support a multidisciplinary team of cyber analysts. Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: 5+ years of experience in Threat Intelligence, Vulnerability Management, or cyber research. Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. Experience in More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
83zero Ltd
and incidents in line with ITIL processes Monitor and enhance network security controls including web security gateways, NAC, endpoint security, and perimeter defense Contribute to internal reviews, security audits, vulnerability assessments, and penetration testing Support firewall rule changes, VPN access, network segmentation, and performance improvements Participate in on-call rotation for high-priority issues and assist during major incidents … secure environments with a focus on proactive security posture Knowledge of network security tools such as Cisco Secure Access, Cisco ISE, Microsoft Defender XDR, Sentinel, and SentinelOne Comfortable with vulnerability management frameworks and tools Familiarity with network monitoring and performance management Previous experience working within an ITIL-based support framework Hands-on experience with Check Point, Cisco, or Palo More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
GoDefend Limited
GoDefend is a growing UK-based cyber security company based in Newcastle upon Tyne, offering a wide-spectrum of cyber solutions whilst specialising in continuous vulnerability scanning and penetration testing. We are seeking a Penetration Tester with over three years of hands-on experience in offensive security. Youll join a growing, fast-paced cyber security team where your technical … with clients and translating complex risks into clear business language. What Youll Be Doing: Conduct penetration testing across web applications, mobile apps, cloud platforms, and internal networks. Perform detailed vulnerability assessments and provide actionable remediation guidance. Create professional, jargon-free reports suitable for both technical and non-technical audiences. Lead or support scoping calls with clients to define the More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Razorblue Group Ltd
accept, your responsibilities will encompass: Be the first line of defence: detect, analyse, and respond to real-time security incidents across razorblue and client networks Take the lead in vulnerability management - from scanning and risk analysis to remediation coordination Run proactive security audits and phishing simulations to strengthen awareness and resilience Collaborate with infrastructure and network teams to escalate … we would love you to apply. Full UK Driving License Entry-level security certifications (CompTIA Security+, CySA+, etc.) or working toward one Hands-on experience in security incident response, vulnerability assessments, and root cause analysis Skilled in producing incident reports, security metrics, and supporting training Comfortable with internal security audits and refining SOPs and playbooks Knowledge of key security More ❯
Key Responsibilities Operate within a Security Operations Centre (SOC) or equivalent environment Monitor and respond to incidents using SIEM platforms Conduct system log analysis and threat detection Assist in vulnerability assessments and management Support incident resolution and reporting ?? Required Skills & Experience At least 2 years' experience in a dedicated Security Analyst role Hands-on experience with: SOC operations SIEM … tools Vulnerability management Incident response and investigation Log and event analysis ?? Preferred Qualifications Industry certifications such as CompTIA Security+ or equivalent (desirable) Practical experience preferred over formal education ?? Security Clearance Requirements UK Nationals only Current SC clearance required DV preferred - or must be DV-eligible (as DV clearance will be needed) DV Bonus: 10% of base salary upon clearance More ❯
skillset What You'll Be Doing Leading incident response and managing containment, analysis, and resolution Monitoring security systems (SIEM, EDR, threat intel) to identify and respond to threats Conducting vulnerability assessments and supporting remediation for financial systems Ensuring compliance with GLBA, PCI, FFIEC, and other regulatory frameworks Supporting risk reviews, vendor assessments, and internal audits Participating in security exercises … What You'll Need to be Considered 3-5+ years of relevant experience Prior experience in financial services, banking, or fintech cybersecurity Expertise with SIEM, EDR, NGFW, and vulnerability management tools Familiarity with scripting (Python, PowerShell) for automation and threat detection Experience conducting third-party risk reviews and regulatory reporting ITAC Solutions firstName lastName Email Address Phone Number More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
OpenSourced Ltd
an experienced Penetration Tester specialising in Infrastructure Testing on behalf of a leading UK-based security consultancy. This company is renowned for its innovative approach to security, providing ongoing vulnerability assurance and continuous threat management through its advanced portal solution, beyond traditional point-in-time assessments. The Role: As an Infrastructure Penetration Tester , you will be responsible for conducting … Responsibilities: Conduct Comprehensive Testing: Perform formal, in-depth penetration tests focused on infrastructure and occasionally other areas. Reporting: Deliver detailed, well-structured technical and non-technical reports in English. Vulnerability Assessments: Identify vulnerabilities and provide actionable remediation recommendations. Pre-Engagement Support: Assist in scoping client projects and drafting proposals to ensure clear and accurate planning. Project Management: Manage penetration More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the criteria More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the criteria More ❯
in ensuring the security and integrity of the infrastructure, which includes the data centers, cloud environments, networks, and office/branch assets. This is an exciting opportunity to lead vulnerability assessments, drive remediation efforts, and enforce secure builds and configurations across our estate. Key Responsibilities: Lead the implementation of Infrastructure & Cloud security strategies, policies, controls, services, metrics, and compliance. … Oversee and support vulnerability management efforts across both on-premise and cloud environments. Contribute to the strategy, policy, controls, services, and metrics related to network security, including WAF, DDoS protection, and firewalls. Experience & Skills: Primary Expertise: Vulnerability management within infrastructure environments, with proven experience leading teams. Secondary Expertise: Knowledge and experience in network security, including firewalls, micro-segmentation More ❯
guidance in relation to cyber risk appetite and define and manage policy exceptions and significant risks through appropriate risk management, exception and governance processes. Develop SSE's cyber risk assessment maturity to enable commercially informed decision-making, ensuring that risk management and the implementation of controls are guided by a clear understanding of return on investment and business value. … You have Excellent cyber security experience with exposure to IT and OT environments and in-depth knowledge of cyber risk assessment methods and technologies, and proficiency in performing risk, business impact, control and vulnerability assessments and assurance. Excellent knowledge of risks and threats to UK energy sector and security issues, techniques and implications across digital platforms, control systems More ❯
guidance in relation to cyber risk appetite and define and manage policy exceptions and significant risks through appropriate risk management, exception and governance processes. Develop SSE's cyber risk assessment maturity to enable commercially informed decision-making, ensuring that risk management and the implementation of controls are guided by a clear understanding of return on investment and business value. … You have Excellent cyber security experience with exposure to IT and OT environments and in-depth knowledge of cyber risk assessment methods and technologies, and proficiency in performing risk, business impact, control and vulnerability assessments and assurance. Excellent knowledge of risks and threats to UK energy sector and security issues, techniques and implications across digital platforms, control systems More ❯
guidance in relation to cyber risk appetite and define and manage policy exceptions and significant risks through appropriate risk management, exception and governance processes. Develop SSE's cyber risk assessment maturity to enable commercially informed decision-making, ensuring that risk management and the implementation of controls are guided by a clear understanding of return on investment and business value. … You have Excellent cyber security experience with exposure to IT and OT environments and in-depth knowledge of cyber risk assessment methods and technologies, and proficiency in performing risk, business impact, control and vulnerability assessments and assurance. Excellent knowledge of risks and threats to UK energy sector and security issues, techniques and implications across digital platforms, control systems More ❯
guidance in relation to cyber risk appetite and define and manage policy exceptions and significant risks through appropriate risk management, exception and governance processes. Develop SSE's cyber risk assessment maturity to enable commercially informed decision-making, ensuring that risk management and the implementation of controls are guided by a clear understanding of return on investment and business value. … You have Excellent cyber security experience with exposure to IT and OT environments and in-depth knowledge of cyber risk assessment methods and technologies, and proficiency in performing risk, business impact, control and vulnerability assessments and assurance. Excellent knowledge of risks and threats to UK energy sector and security issues, techniques and implications across digital platforms, control systems More ❯