risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team More ❯
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response, as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team More ❯
newcastle-upon-tyne, tyne and wear, north east england, United Kingdom
NRG
Occasional UK travel for site support. Requirements: Strong technical skills in Microsoft technologies, endpoint protection, networking, and Intune. Good understanding of IT security and vulnerability management. Proactive troubleshooting and customer service focus. Independent work ethic and strong relationship-building skills. Full UK driving licence. Bonus: Microsoft/Azure certifications. More ❯
london (city of london), south east england, United Kingdom
Barclay Simpson
This growing investment management firm is seeking to hire an IT Security Engineer to report directly to the Head of InfoSec. Working as part of a small team, this role will see you implementing and managing security tooling for the firm. This includes vulnerabilitymanagement tooling (Tenable More ❯
are dedicated to building a complete suite of industry-leading products which provide a cohesive platform for our customers. Our range of solutions spans vulnerabilitymanagement, detection, automation, cloud security, and penetration testing; in order to build these products our teams work with an array of technologies including … our Engineers are first class stakeholders in all parts of the development process When required, partner with internal teams such as UX and Product Management who work deeply with our product to ensure we are understanding our customers needs Work towards developing a deep understanding of our products in More ❯
skills/experience: Strong IT infrastructure background with a security focus Security certifications (CISMP, GSEC, or equivalent) Proven experience with firewalls, encryption, AV, and vulnerabilitymanagement Familiarity with ISMS, NIS Regulations, GDPR (desirable) Salary is mainly dependent on experience but can stretch up to £50,000pa. This role More ❯
skills/experience: Strong IT infrastructure background with a security focus Security certifications (CISMP, GSEC, or equivalent) Proven experience with firewalls, encryption, AV, and vulnerabilitymanagement Familiarity with ISMS, NIS Regulations, GDPR (desirable) Salary is mainly dependent on experience but can stretch up to £50,000pa. This role More ❯
skills/experience: Strong IT infrastructure background with a security focus Security certifications (CISMP, GSEC, or equivalent) Proven experience with firewalls, encryption, AV, and vulnerabilitymanagement Familiarity with ISMS, NIS Regulations, GDPR (desirable) Salary is mainly dependent on experience but can stretch up to £50,000pa. This role More ❯
skills/experience: Strong IT infrastructure background with a security focus Security certifications (CISMP, GSEC, or equivalent) Proven experience with firewalls, encryption, AV, and vulnerabilitymanagement Familiarity with ISMS, NIS Regulations, GDPR (desirable) Salary is mainly dependent on experience but can stretch up to £50,000pa. This role More ❯
skills/experience: Strong IT infrastructure background with a security focus Security certifications (CISMP, GSEC, or equivalent) Proven experience with firewalls, encryption, AV, and vulnerabilitymanagement Familiarity with ISMS, NIS Regulations, GDPR (desirable) Salary is mainly dependent on experience but can stretch up to £50,000pa. This role More ❯
kingston upon hull, east yorkshire, yorkshire and the humber, United Kingdom
Ventula Consulting
skills/experience: Strong IT infrastructure background with a security focus Security certifications (CISMP, GSEC, or equivalent) Proven experience with firewalls, encryption, AV, and vulnerabilitymanagement Familiarity with ISMS, NIS Regulations, GDPR (desirable) Salary is mainly dependent on experience but can stretch up to £50,000pa. This role More ❯
Stockport, Cheshire, United Kingdom Hybrid / WFH Options
zyncgroup.io
C/C++ Knowledge of cyber security Strong communication skills and a solution-oriented mindset C1 German and fluent English Desirable: Technical knowledge of vulnerabilitymanagement and automotive security. Benefits: Regular company events Strong career progression Company benefits e.g. JobRad, Gym, discounts at 100s of vendors etc Junior More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Sellick Partnership
You will be managing a team ensuring all security protocols and procedures are followed meticulously. You will provide strategic recommendation reports to senior management. VulnerabilityManagement: Manage and update a list of vulnerabilities across the estate, with a critical focus to safeguard data integrity and mitigate risks. Experience More ❯
Vulnerability Analyst - OT £55,000 - £64,000 Hybrid - 2 days per week in either Horley/Portsmouth/Edinburgh office depending on location We are looking for a brilliant Vulnerability Analyst to join a constantly growing UK utilities company as they embark on a 5 year long transformation … years’ cyber security experience within an OT environment with strong OT/ICS knowledge about products, architectures and workflows. Experience or knowledge of vulnerabilitymanagement tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for OT More ❯
big and small but most importantly, opened up new avenues of data intelligence for businesses with machine learning, AI and connected data. From risk management through to opportunity identification, our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger … day activities of the Security Operations Centre (SOC) and Security Engineering teams. • Produce reports on key security metrics across Security Operations, Application Security and Vulnerability Management. • Conduct regular 1-2-1s, Performance Reviews, and Personal Development Plans of team members. • Develop and implement security policies, processes, and procedures … to comply with SOC2 and ISO27001 standards. • Participate in Steering groups for Identity and Access Management and Data Protection • Setting and aligning team objectives and tasks to help achieve the overall Information Security and Compliance function’s strategy and goals • Participate in Quarterly Business Reviews with our security tooling More ❯
British or EU passport Requirement: You must hold an active SC clearance Hybrid | Permanent | Wokingham, UK (3 days on-site) Key Responsibilities: Monitor workflow management tools to track and resolve incidents, tasks, and requests efficiently. Perform Linux/Windows system administration, including patching, vulnerabilitymanagement, and security … in this role, you must have: Strong knowledge of Linux system administration and Windows OS operations. Hands-on experience with security tools, patching, and vulnerability management. Familiarity with networking protocols (eg, NFS, DNS, SMTP, Apache). Proven experience in an IT service role with customer-facing responsibilities. Some security More ❯
Technical Skills: Solid grasp on Linux OS fundamentals, solve problems and performance tuning Good understanding of HPC infrastructure and applications Exposure to HPC workload management tools like IBM Spectrum LSF Strong scripting skills (Bash, Shell, Python, Perl, etc.) Experience with cloud technologies in AWS and/or Google Cloud … understanding and experience in infrastructure and application monitoring and alerting tools Good understanding about remote display and interactive technologies like ETX Solid skills with VulnerabilityManagement and security patching of constantly evolving environment Skills and attitude on automating common repetitive tasks Relevant experience in a distributed team Working More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Hawksworth
Hyper-v, VMWare and Storage) for a London based Investment Bank. If successful you would work in a team that provides platform and infrastructure management to all of the divisions front office electronic trading systems. London – Liverpool St area Hybrid working- 3 days in the office per week Inside … 4. There are there is also a shift pattern, x3 shifts during the hours of 7am – 6pm. Required: Strong skills in production installation and management of Microsoft Windows Server, Clusters, Hyper-V, Active Directory, VMWare, HP Proliant, HP Storage (Alletra, Primera), Dell PowerScale, Microsoft Security Patching and Security VulnerabilityManagement Proficient scripter – PowerShell and Python a particular advantage (E.g. Writing of scripts for administration and automation tasks.) ITIL Lean Experience and insight into eTrading infrastructure. Ability to drive the delivery of work within the structured framework of a project. If you have the required skills and experience More ❯
be the same. Experience in SIEM, SOAR, or Managed Security Services is essential. Additional hands-on experience with DDoS, WAF, IDAM, EDR, MDM , or VulnerabilityManagement is highly desirable. They are also open to candidates from operational security backgrounds who wish to transition into a client-facing, strategic More ❯
Services , you're exactly the kind of person they want to speak with. Any hands-on background in DDoS, WAF, IDAM, EDR, MDM , or VulnerabilityManagement ? Even better. They're also super open to people who are coming from an operational security background and want to pivot into More ❯
Services , you're exactly the kind of person they want to speak with. Any hands-on background in DDoS, WAF, IDAM, EDR, MDM , or VulnerabilityManagement ? Even better. They're also super open to people who are coming from an operational security background and want to pivot into More ❯
warrington, cheshire, north west england, united kingdom
IO Associates
Services , you're exactly the kind of person they want to speak with. Any hands-on background in DDoS, WAF, IDAM, EDR, MDM , or VulnerabilityManagement ? Even better. They're also super open to people who are coming from an operational security background and want to pivot into More ❯
bolton, greater manchester, north west england, united kingdom
IO Associates
Services , you're exactly the kind of person they want to speak with. Any hands-on background in DDoS, WAF, IDAM, EDR, MDM , or VulnerabilityManagement ? Even better. They're also super open to people who are coming from an operational security background and want to pivot into More ❯
that matters, through challenging projects which demand ambitious innovation and thought leadership. The Role As a CNI Infrastructure Support Administrator, you will monitor workflow management tools and react to logged tasks, incidents and requests. Key responsibilities: Monitor workflow management tools and react to logged tasks/incidents and … most Linux system administration tools and processes. Knowledge of Windows OS and its operations. Hands on experience on Patching, YUM commands/configs and vulnerabilitymanagement security tools. Need to have good knowledge on security tools configuration and endpoint deployment. Knowledge and understanding of Networking protocols - TCP, NFS More ❯
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
comply with Baseline Security Requirements and security policy. Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & Access Management, SIEM and Vulnerability Management. Ensure internal customers, external suppliers and delivery partners are aware of security standards and future … of IT and telecommunications solutions. Competent in applying security policies and principles defined in security architecture to real world scenarios. Understands and applies risk management principles. Effective communication skills to influence stakeholders and explain complex security requirements in simple terms. Stakeholder Management - established as the go-to person More ❯