Reading, Berkshire, United Kingdom Hybrid / WFH Options
In Technology Group
expertise. What You'll Do Serve as the Cyber Security Subject Matter Expert , advising on secure systems design, change control, and implementation of robust security controls. Lead the technical vulnerabilitymanagement programme , with a strong focus on application security, web application firewalls, and secure DevOps pipelines. Provide security leadership and mentoring , supporting colleagues and enhancing security awareness across … strategy using frameworks such as OWASP, SASE, and Zero Trust. What We're Looking For Essential: Right to work in the UK. Proven experience in cyber security engineering, including vulnerabilitymanagement, SIEM, WAFs, and secure infrastructure design. Strong knowledge of TCP/IP, firewalls, routing, access controls, and threat-based security approaches. Excellent communication skills with the ability More ❯
Leatherhead, Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
the company's network infrastructure. Key Responsibilities: Network & Security Monitoring: Perform daily monitoring of network infrastructure and cyber security systems to prevent unplanned downtime, security breaches, or vulnerabilities. Network Management: Develop, maintain, and support the organization's network, including managing Layer 2/3 devices, LAN/WAN, B2B connections, remote access, load balancing, Wi-Fi, and network performance … tools. IT Security Management: Manage IT security systems, including next-generation firewalls, IPS, SIEM tools, endpoint security, and other devices/services. Respond to and analyze security incidents, deploying patches and mitigating vulnerabilities promptly. Security Incident Response: Identify and respond to external and internal threats, investigate security incidents, and implement necessary fixes. Project Collaboration: Work on cyber security projects … particularly those requiring security input, including the rollout of new security measures across the organization. Tool & Software Management: Install and manage firewall and data encryption software to protect sensitive business information. Risk Assessment: Continuously assess risks and report to management to support informed decision-making on cyber security matters. Incident & Service Management: Manage and resolve incidents or More ❯
and availability by aligning security strategies with business objectives and complying with laws and industry standards. We act as the incident response team, and focus on threat intelligence, incident management, vulnerability assessments, access control, and security awareness training. We use advanced technologies like firewalls and System Information Event Monitoring systems to counter security threats and work closely with … support. Contribute to the ongoing information security program, addressing all aspects of security from on-premises to cloud (Azure) and web application security. Participate in the system hardening and vulnerabilitymanagement programs, providing direction to key business areas on their focus points. Participate in evidence gathering for the SOC audit process when required. Stay abreast of industry trends More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
Castle Trust Group
etc Comprehensive understanding of M365 and InTune Strong understanding of Private/Public clouds, such as Hyper-V, Azure, AWS and GCP Comfortable with PowerShell scripting Knowledge & experience of vulnerabilitymanagement tooling such as Qualys Knowledge of networking, TCP/IP, LAN/WAN, VPN, Routers, Switches and Firewalls Desirable Packaging and deploying applications What is also important More ❯
SOC ANALYST/VULNERABILITYMANAGEMENT Up to £70,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a major … driving forces behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a VulnerabilityManagement/SOCAnalyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's VulnerabilityManagement Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes … Schedules related to Vulnerability Scanning of All Endpoints of the business. As a VulnerabilityManagement/SOC Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of SOC/VulnerabilityManagementMore ❯
various components. While having experience with implementing the Tenable solution key, this job also requires full-time hands-on administration of the Tenable system as well as managing the vulnerabilitymanagement aspect of the tool. Installing and Configuring Nessus, Nessus Manager, Nessus Agents, Log Correlation Engine, Nessus Network Monitor, and Security Center on both Linux/Unix and … Responsible for the Analysis and validation of the scan results. Responsible the Monitoring the dashboards. Responsible for defining and configuring dashboards Technical Skills & Competencies: 5+ years of experience in Vulnerabilitymanagement domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues Experience in the design and implementation of enterprise-wide security … controls to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. Demonstrated understanding of TCP/IP networking concepts and DNS. 3+ years of related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with More ❯
Darlington, County Durham, United Kingdom Hybrid / WFH Options
Sellick Partnership
You will be responsible for documentation, take an analytical approach and be able to translate complex technical risks into clear and actionable insights for the organisation. Responsibilities: Development and management of the security operational roadmap, ensuring vulnerabilitymanagement, threat detection and effective incident management. Be the primary point of escalation for security events and incidents in the … organisation. Leading on, developing and implementing the cyber security strategy across the organisation. Responsible for process improvements, policy and security architecture. Management of the cyber security budget and allocation of resources to ensure priorities are met. Resonsible for building, leading and management of a newly formed, high performing cyber security team. Ensure compliance standards across the organisation such … certifications in security such as CISM, CISSP, CISA. Proven experience as a cyber security leader, responsible for security strategy with a strong technical understanding. Strong knowledge of cyber risk management, vulnerabilitymanagement and threat intelligence. Knowledge of compliance and regulatory frameworks such as Cyber Essentials, GDPR and ISO 27001. Certifications in Microsoft security such as AZ More ❯
of safeguarding Industrial Control Systems and SCADA networks from evolving cyber threats.Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threat analysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerabilitymanagement initiatives and penetration testing exercises. Contribute to policy … communicator with proven ability to influence and collaborate across functions. Comfortable working autonomously and leading small projects. Desirable: Background in cyber investigations or law enforcement protocols. Familiarity with project management principles. Ability to deliver awareness campaigns and contribute to continuous improvement. This is a unique opportunity to make a tangible impact on the UK’s energy resilience. If you More ❯
housing of our MSP-managed infrastructure in-house, resetting and rebuilding our Azure environment, embedding cyber security practices, and supporting business-as-usual (BAU) operations. Key Responsibilities: Leadership & People Management Lead and mentor the Helpdesk and Infrastructure teams through their respective leads. Ensure effective resource planning, performance management, and development across the teams. Foster a culture of accountability … collaboration, and continuous improvement. Operational Management Oversee daily IT operations, ensuring high availability, performance, and user satisfaction. Manage escalations and prioritisation of support issues. Monitor and report on key operational metrics (e.g. SLAs, uptime, incident response). Project Delivery Lead the transition of managed services infrastructure and service desk from MSP to in-house. Oversee the reset and rebuild … Embed cyber security practices into operational and project workflows. Collaborate with relevant stakeholders to ensure compliance with policies, standards, and regulations (e.g. ISO27001, Cyber Essentials). Manage risk assessments, vulnerabilitymanagement, and incident response processes. Stakeholder Engagement Act as a senior point of contact for internal stakeholders regarding IT operations and service delivery. Work closely with other business More ❯
Aldershot, Hampshire, South East, United Kingdom Hybrid / WFH Options
JLA Resourcing Ltd
Your role will be pivotal in ensuring the secure delivery of new systems into live service, as well as ongoing protection, compliance, and incident response. You will: Own the vulnerabilitymanagement strategy across platforms, leading scanning, remediation, and reporting activities Design and enforce endpoint security policies, access controls, and malware protections Lead incident identification and response efforts, ensuring … skills & experience: Extensive hands-on experience in cyber security engineering roles, ideally in defence, government, or secure sectors Advanced knowledge of AWS security services, network security, endpoint protection, and vulnerabilitymanagement Strong working knowledge of compliance frameworks and standards (CIS, STIG, NIST, Government Functional Standard 007) Proven ability to lead security planning, risk assessments, and incident response activities More ❯
EMEA regions. Skills & Experience Minimum 4 years of experience in Cyber Security within an AWS cloud environment Experience with CrowdStrike is a plus Proven experience with PCI DSS compliance Vulnerabilitymanagement and compliance expertise Leadership in audit processes Knowledge of security standards including GDPR, ISO, PCI, NIST Excellent stakeholder communication and training skills Relevant cybersecurity certifications are desirable … office is a vibrant space with forward-thinking professionals. Key Responsibilities Develop and analyze security requirements and manage vulnerabilities in PCI DSS projects Maintain consistency in IT security risk management activities Advise engineers on vulnerabilities, threats, and remediation strategies Provide security training and support internally and to clients Compensation & Application The starting salary is up to £65,000, depending More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
ll Be Doing As a key player in the security team, you'll: Provide expert technical guidance on securing IT assets, systems design, and change control. Lead the technical vulnerabilitymanagement programme, with a focus on application security, WAFs, and secure development pipelines. Mentor junior team members and offer strategic security leadership. Investigate security incidents and support recovery … assessments. ?? What You Bring Strong knowledge of security tools and infrastructure: WAFs, SIEM, AV, firewalls, TCP/IP, and more. Familiarity with OWASP, zero-trust, SASE, and risk-based vulnerability management. A background in infrastructure or networks. Working towards or holding certifications like CISSP, GCIA, Security+, CCNA/CCNP. Understanding of ISO27001, Cyber Essentials, and AAF frameworks. Excellent communication More ❯
We are looking for an Information Security Analyst working as part of a central team supporting a mixture of security operations ensuring compliance with business needs. This will involve vulnerabilitymanagement, making sure security controls are functioning, mentorship of more junior members and working as part of a 24 x 7 remote support rota. If you have experience More ❯
Sentinel) Cloud security monitoring and compliance. (AWS, Azure and Google) IPS/WAF experience Firewalls Reverse Proxy Forward Proxy End Point Security products Network Security Enterprise Architecture Application Security VulnerabilityManagement Secure File Transfer Remote Access Security Successful candidates must have: Knowledge of what you would expect to be contained within a security strategy and road map. Knowledge … successful team whilst maintaining the highest standards of service. You should demonstrate strong inter-personal skills, knowledge of ITIL best practice and experience of working to a formal Project Management methodology are also essential. For immediate consideration please apply online. More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
CyberNorth
Strong understanding of information and IT security challenges and standards. Solid working knowledge of security technologies (e.g. Endpoint Protection, Data Protection, Cloud Security) and cyber capabilities (e.g. SIEM, SOC, VulnerabilityManagement). Familiarity with recognised frameworks such as ISO 27001, ISO 22301, NIST, COBIT, or ISF. Experience supporting security strategy within cloud-based environments. Demonstrated ability to manage More ❯
Server, Active Directory, networking, and cloud services . Support day-to-day operations of Azure IaaS/PaaS , Microsoft 365 , Exchange Online , and related platforms. Administer and improve endpoint management via Intune , SCCM , and Autopilot. Ensure security compliance through MFA , Microsoft Defender , and proactive vulnerability management. Collaborate with internal support teams and third-party vendors to drive service … Azure AD) , and Microsoft 365 services . Experience managing Windows Server environments , Active Directory , GPOs , Hyper-V , and networking (DNS, DHCP, VPN, firewalls) . Skilled in endpoint and device management tools such as Intune , SCCM , and Jamf (for macOS) . Scripting and automation ability (e.g., PowerShell ). Understanding of ITIL principles and familiarity with ITSM platforms like ServiceNow or More ❯
Watford, Hertfordshire, South East, United Kingdom
ECS
Server, Active Directory, networking, and cloud services . Support day-to-day operations of Azure IaaS/PaaS , Microsoft 365 , Exchange Online , and related platforms. Administer and improve endpoint management via Intune , SCCM , and Autopilot. Ensure security compliance through MFA , Microsoft Defender , and proactive vulnerability management. Collaborate with internal support teams and third-party vendors to drive service … Azure AD) , and Microsoft 365 services . Experience managing Windows Server environments , Active Directory , GPOs , Hyper-V , and networking (DNS, DHCP, VPN, firewalls) . Skilled in endpoint and device management tools such as Intune , SCCM , and Jamf (for macOS) . Scripting and automation ability (e.g., PowerShell ). Understanding of ITIL principles and familiarity with ITSM platforms like ServiceNow or More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
OpenSourced Ltd
growing UK-based cybersecurity consultancy to recruit an Incident Response Analyst . This is an exciting opportunity to join a forward-thinking organisation that provides penetration testing and continuous vulnerabilitymanagement services to a wide range of clients across sectors. As part of the expanding Incident Response team, the successful candidate will play a critical role in detecting … source IR tools (e.g., Velociraptor, Eric Zimmerman Tools, Chainsaw, Volatility, SOF-ELK, DFIR IRIS). Scripting or programming experience (Python, Bash, or Go). About You: Experienced in stakeholder management during high-pressure incidents. Strong communication skills and composure under pressure. Able to align incident response practices with industry standards and client expectations. Background in threat intelligence and proactive More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harvey Nash
Senior VulnerabilityManagement consultant sought by leading investment bank based in London. **Inside IR35** - Hybrid working Daily responsibilities: Provide vulnerabilitymanagement expertise involving infrastructure, cloud and enterprise applications. Primary contact for the companies vulnerabilitymanagement involving processes, reporting, enhancements, compliance and interacting with business stakeholders. Operationalize weekly vulnerability status reports for senior leadership … including UK CISO on company vulnerabilitymanagement KPIs/KRIs Preparation of vulnerabilitymanagement process and procedure documentation Provide consulting services to the vulnerabilitymanagement team to assist in their security design to identify potential risks Review the security issues and recommend the appropriate controls to mitigate these risks Provide security awareness to clients … Provide support to other consultants through mentoring and peer reviews of work products as required Provide ad hoc consulting services to the general user community Essential: Experience working with vulnerabilitymanagement tools and data such as Tenable, Qualys, Rapid 7, Microsoft Defender, Aqua, Palo Alto Xpanse. Jira to manage project work, timelines and operational tickets. 5+years of relevant More ❯
with a cloud background (AWS, Azure or GCP) is required to join our client's UK cybersecurity team. This in house role is predominantly advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. So you should have good knowledge of security tooling and processes, compliance … and security management (endpoint protection, cloud, SIEM etc). There is an opportunity to build out a cyber security team in the future with this role Skills & Experience Required: 3+ years of experience working in Cyber Security within an cloud environment (AWS, Azure of GCP) Any experience with CrowdStrike/Endpoint Protection would be a bonus Good experience with … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
with a cloud background (AWS, Azure or GCP) is required to join our client's UK cybersecurity team. This in house role is predominantly advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. So you should have good knowledge of security tooling and processes, compliance … and security management (endpoint protection, cloud, SIEM etc). There is an opportunity to build out a cyber security team in the future with this role Skills & Experience Required: 3+ years of experience working in Cyber Security within an cloud environment (AWS, Azure of GCP) Any experience with CrowdStrike/Endpoint Protection would be a bonus Good experience with … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Frontier Resourcing
encompassing software, hardware, and services-by embedding robust security controls throughout the development lifecycle, identifying and mitigating risks, and ensuring compliance with defence-grade standards. Key Responsibilities Risk Assessments & VulnerabilityManagement Conduct comprehensive security risk assessments at each product phase (design, implementation, deployment). Identify vulnerabilities in architectures, codebases, and configurations; drive remediation with development and operations teams. …/27005, NIST 800-30/53, JSP 440/604, Def Stan 05-series). Lead the creation and maintenance of security documentation (RMADS, Security Assurance Documents, Security Management Plans). Testing & Assurance Design and execute penetration tests and automated vulnerability scans; validate fixes. Oversee third-party security assessments as required. Continuous Improvement Drive security tooling and … security technologies; evangelise best practices across teams. Qualifications & Experience Proven experience (5+ years) in product or application security within defence, government, or security-cleared environments. Deep knowledge of risk management frameworks (ISO 27001/2/5/31000, NIST 800-series) and Defence Standards (JSPs, Def Stan 05-138/139). Hands-on experience with security testing More ❯
risk and control expertise, specialist technical knowledge and a deep understanding of the businesses and functions we serve. Key activities include implementation and oversight of the Group's Risk Management Framework, ongoing and targeted controls assessments, implementing and maintaining robust risk governance, and championing a proactive risk culture. GCIO CCO works closely with partners across all lines of defence … team to partner with the CISO CCO to oversee the risk and control portfolio related to the services Cybersecurity Assessment and Testing (CSAT) provides to the Group. CSAT oversees VulnerabilityManagement, Application Security, Penetration Testing and Red Teaming, Threat Modelling and other related services You will be a leader within the GCIO Chief Control Office (GCIO CCO) Function … members across multiple regions, as well as manage their portfolio in maintaining an acceptable risk profile In this role, duties will include: Acting as a trusted advisor for senior management by partnering to manage their operational risk i.e., risk assessments, control environment, issues management. Promoting accountable risk and control decision-making based on quality data and analysis, actively challenging More ❯
Job overview: This is an opportunity to lead global Security Operations focused on safeguarding Arm's digital environment through exemplary threat detection, incident response, and vulnerabilitymanagement capabilities. This senior role, reporting directly into the CISO, is accountable for driving the strategic direction of Arm's Detect & Response function, delivering outstanding performance and ensuring we are resilient against … an evolving threat landscape! In addition to operations, you will lead cyber crisis management, C-Suite level stress testing, team development, and top-level cybersecurity thought leadership. Responsibilities: Own and deliver the strategic roadmap for cyber incident and vulnerability detection & response in line with Arm's threat profile and business objectives. You will guide and develop a high … of enterprise security domains and how they can be used as a force multiplier for a technology business strategy, with the ability to influence at all levels. Extensive people management experience, fostering a culture focused on mentoring, wellbeing, and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant security-related subject. Certifications such More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Acumin
role, you will gather, analyze, and enrich data to produce governance scorecards and reports spanning key cybersecurity areas such as Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM), and Threat and VulnerabilityManagement (TVM). Your insights will inform senior leadership, regulatory More ❯