security & cloud security(SaaS,IaaS,PaaS) • Experience in advising on or developing security architectures and designs for one or more security technology domains • Security technologies (firewalls, WAFs, DLP, cryptography, vulnerabilityscanning, identity and access management, etc.) • Delivering security changes to meet the CISO business needs. • Appreciation of different cyber threats such as malicious cyber-attacks, phishing, data theft More ❯
security & cloud security(SaaS,IaaS,PaaS) • Experience in advising on or developing security architectures and designs for one or more security technology domains • Security technologies (firewalls, WAFs, DLP, cryptography, vulnerabilityscanning, identity and access management, etc.) • Delivering security changes to meet the CISO business needs. • Appreciation of different cyber threats such as malicious cyber-attacks, phishing, data theft More ❯
security & cloud security(SaaS,IaaS,PaaS) • Experience in advising on or developing security architectures and designs for one or more security technology domains • Security technologies (firewalls, WAFs, DLP, cryptography, vulnerabilityscanning, identity and access management, etc.) • Delivering security changes to meet the CISO business needs. • Appreciation of different cyber threats such as malicious cyber-attacks, phishing, data theft More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
technical implementations and transitioning to support teams IT Operations/Service Management, ITIL knowledge Azure-based infrastructure deployments Project delivery within Agile, Prince2, or Waterfall frameworks Desirable: Microsoft Certifications Vulnerabilityscanning, Open Source security methodologies Teams telephony, Cisco/Meraki networking, Veeam Backup POS systems, SAN storage, Defender stack, Cloudflare, Cisco ASA/Firepower/ISE, FortiGate Key More ❯
technical implementations and transitioning to support teams IT Operations/Service Management, ITIL knowledge Azure-based infrastructure deployments Project delivery within Agile, Prince2, or Waterfall frameworks Desirable: Microsoft Certifications Vulnerabilityscanning, Open Source security methodologies Teams telephony, Cisco/Meraki networking, Veeam Backup POS systems, SAN storage, Defender stack, Cloudflare, Cisco ASA/Firepower/ISE, FortiGate Key More ❯
london (west end), south east england, united kingdom
Henderson Scott
technical implementations and transitioning to support teams IT Operations/Service Management, ITIL knowledge Azure-based infrastructure deployments Project delivery within Agile, Prince2, or Waterfall frameworks Desirable: Microsoft Certifications Vulnerabilityscanning, Open Source security methodologies Teams telephony, Cisco/Meraki networking, Veeam Backup POS systems, SAN storage, Defender stack, Cloudflare, Cisco ASA/Firepower/ISE, FortiGate Key More ❯
security investigations You will need to have a good working knowledge of: Cyber security risks and mitigations IT security standards and frameworks IT security tools and their implementation including vulnerabilityscanning and server patching. IT infrastructure including Microsoft Active Directory, Azure and Office 365. SIEM implementation, monitoring and incident response. What we can offer Our staff are at More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Oxfordshire, England, United Kingdom Hybrid / WFH Options
F5 Consultants
as designing and overseeing phishing simulations. Required Skills 2+ years' experience in an information security role Strong understanding of information security and cyber threat defence Hands-on experience with vulnerabilityscanning Ability to explain threats, vulnerabilities, and risks in a business context Experience delivering security training and running phishing simulations Experience with Microsoft Defender and/or third More ❯
oxford district, south east england, united kingdom Hybrid / WFH Options
F5 Consultants
as designing and overseeing phishing simulations. Required Skills 2+ years' experience in an information security role Strong understanding of information security and cyber threat defence Hands-on experience with vulnerabilityscanning Ability to explain threats, vulnerabilities, and risks in a business context Experience delivering security training and running phishing simulations Experience with Microsoft Defender and/or third More ❯
virtualisation environments (Hyper-V, VMWare) Strong knowledge of core Microsoft technologies including Active Directory, SCCM, Intune, and Microsoft 365 Proven experience with security tools: antivirus solutions (SOPHOS, Microsoft Defender), vulnerabilityscanning (Tenable Nessus), mail/web filtering (Clearswift, Fortinet) Proficiency with monitoring platforms such as SolarWinds and Azure Monitor Excellent analytical skills and ability to create comprehensive design More ❯
virtualisation environments (Hyper-V, VMWare) Strong knowledge of core Microsoft technologies including Active Directory, SCCM, Intune, and Microsoft 365 Proven experience with security tools: antivirus solutions (SOPHOS, Microsoft Defender), vulnerabilityscanning (Tenable Nessus), mail/web filtering (Clearswift, Fortinet) Proficiency with monitoring platforms such as SolarWinds and Azure Monitor Excellent analytical skills and ability to create comprehensive design More ❯
the day-to-day operation of security systems and tools, including firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus, anti-malware, SIEM (Security Information and Event Management), vulnerability scanners, and data encryption solutions. Manage vulnerability management programs, including regular scanning, penetration testing, and remediation of identified weaknesses. Lead and manage security incident response, including detection … Strong understanding of information security principles, frameworks (e.g., ISO 27001, NIST, Cyber Essentials), and best practices. Hands-on experience with security technologies such as firewalls, SIEM, IDS/IPS, vulnerability scanners, endpoint detection and response (EDR), and identity management solutions. Experience with cloud security (e.g., Azure Security). Proven experience in managing security incidents and conducting incident response. Familiarity More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Last Mile Infrastructure Limited
a team of security professionals, oversee the delivery and ongoing management of our security infrastructure, and act as the go-to technical expert in threat detection, incident response, and vulnerability management. Were looking for someone with strong leadership skills, a deep knowledge of the cyber security landscape, and a real passion for safeguarding digital assets. Whats in it for … cyber security role, with a proven track record of leading and mentoring a team. Extensive experience with security technologies such as SIEM, firewalls, intrusion detection/prevention systems, and vulnerabilityscanning tools. In-depth knowledge of incident response procedures, threat hunting, and forensic investigation techniques. Strong understanding of networking protocols, operating systems, and cloud security principles. Qualifications Bachelor More ❯
West Bridgford, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
loves to automate mundane tasks, make software and systems that are scalable, highly available, and robust, and making sure whatever you’re working on is secure, through things like vulnerabilityscanning, threat analysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with More ❯
analytics to enhance integrations and documentation. Key skills for this role Security & Compliance:o Implement and enforce security best practices across the platform, includingsecure coding, dependency management, and vulnerability scanning.o Ensure API security and access control using OAuth, API keys, JWT, and othermechanisms.o Monitor and remediate security vulnerabilities in third-party packages andlibraries.o Collaborate with security teams to More ❯
teams and shaping best practice. Essential Skills & Experience 5+ years in IT security or MSP environments . Strong understanding of Cyber Essentials, ISO27001, or NIST frameworks. Experience managing patching, vulnerability, and risk governance . Skilled communicator with the ability to explain risks to non-technical audiences. Proven experience leading client-facing security reviews . Desirable CISSP, CISM , or equivalent … certifications. Experience auditing or delivering compliance frameworks. Familiarity with RMM/XDR/EDR , SIEM, and vulnerabilityscanning platforms. Background in mentoring or managing small teams. Exposure to incident response and tabletop exercises. Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome More ❯
issues.* Collaboration: Work closely with software developers, network engineers, and product managers to troubleshoot issues and optimize performance* Security: Integrate security best practices (DevSecOps) into the development lifecycle, including vulnerabilityscanning, static code analysis, and compliance checks. The Requirements* Hands-on experience in a DevOps, SRE, or similar role.* Strong proficiency with at least one major cloud provider More ❯
issues.* Collaboration: Work closely with software developers, network engineers, and product managers to troubleshoot issues and optimize performance* Security: Integrate security best practices (DevSecOps) into the development lifecycle, including vulnerabilityscanning, static code analysis, and compliance checks. The Requirements* Hands-on experience in a DevOps, SRE, or similar role.* Strong proficiency with at least one major cloud provider More ❯
Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom
Akkodis
issues.* Collaboration: Work closely with software developers, network engineers, and product managers to troubleshoot issues and optimize performance* Security: Integrate security best practices (DevSecOps) into the development lifecycle, including vulnerabilityscanning, static code analysis, and compliance checks. The Requirements* Hands-on experience in a DevOps, SRE, or similar role.* Strong proficiency with at least one major cloud provider More ❯