Thorough understanding of data security principles and best practices, ideally in a regulated environment. Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. Preferred Qualifications: Experience in private and public cloud data centre management. Level 3 Service Management Framework qualification and knowledge of ITIL. Relevant technical More ❯
and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS More ❯
Omagh, Northern Ireland, United Kingdom Hybrid / WFH Options
Digital Waffle
and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Digital Waffle
and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS More ❯
Londonderry, Northern Ireland, United Kingdom Hybrid / WFH Options
Digital Waffle
and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
detection/prevention systems (IDS/IPS). Ensure compliance with industry regulations and best-practices (GDPR, HIPAA, PCI-DSS, CIS). Conduct regular vulnerability assessments and implement security patches and updates. Collaboration and Documentation Work closely with other IT teams across the business and across the wider organisation More ❯
and intrusion detection/prevention systems (IDS/IPS) Ensure compliance with industry regulations and best-practices (GDPR, HIPAA, PCI-DSS, CIS) Conduct regular vulnerability assessments and implement security patches and updates Collaboration and Documentation Work closely with other IT teams across the business and across the wider organisation More ❯
Arlington, Virginia, United States Hybrid / WFH Options
ICF
various clients in order to explain and elaborate on technical details Practical experience with different scripting languages (e.g., Python, JavaScript, etc.) Experience with system vulnerability assessments Knowledge of Linux/Unix and Windows operating systems security Knowledge of computer programming and scripting languages Excellent written and verbal communication skills More ❯
Arlington, Virginia, United States Hybrid / WFH Options
ICF
communicate effectively with various clients to explain and elaborate on technical details Practical experience with scripting languages (e.g., Python, JavaScript, etc.) Experience with system vulnerability assessments Knowledge of Linux/Unix and Windows operating systems security Knowledge of computer programming and scripting languages Excellent written and verbal communication skills More ❯
proactive, diligent, comprehensive engineering, completer-finisher. Project management experience across multiple clients with concurrent requirements. Strong Security and administration tools knowledge: patching, antivirus, backup, vulnerabilityassessment: monitoring, reporting and remediation. Extensive knowledge of Microsoft's technology products, including Azure, Microsoft/Office 365, Windows Server, Active Directory and More ❯
Requirements: Experience securing cloud environments (AWS preferred). Prior role as a Cyber Security Officer or similar in a large organization. Strong knowledge of vulnerability assessments, networking, and OS hardening. Awareness of cyber threats and security best practices. Preferred Qualifications: Security certifications (CompTIA Security+, CISSP, AWS/Cloud certs More ❯
london, south east england, united kingdom Hybrid / WFH Options
Gazelle Global
Requirements: Experience securing cloud environments (AWS preferred). Prior role as a Cyber Security Officer or similar in a large organization. Strong knowledge of vulnerability assessments, networking, and OS hardening. Awareness of cyber threats and security best practices. Preferred Qualifications: Security certifications (CompTIA Security+, CISSP, AWS/Cloud certs More ❯
Carlisle, Pennsylvania, United States Hybrid / WFH Options
Caelum Research Corporation
using Terraform or AWS CloudFormation. Security & Compliance: Enforce security best practices using AWS IAM policies, security groups, and encryption. Conduct regular security audits and vulnerability assessments. Implement compliance frameworks (e.g., NIST, CIS, FedRAMP) as required. Monitor AWS environments for security threats and respond to incidents (Trellis, Splunk). Automation More ❯
Cyber Ops 7-10 years of related Information Security experience required Demonstrated work experience with network or systems engineering, cryptography, security engineering and architecture, vulnerability assessments, application security, and/or incident response Proven experience in performing administration functions of Linux/UNIX & Windows systems, network, firewall, and DNS More ❯
Cyber Ops 7-10 years of related Information Security experience required Demonstrated work experience with network or systems engineering, cryptography, security engineering and architecture, vulnerability assessments, application security, and/or incident response Proven experience in performing administration functions of Linux/UNIX & Windows systems, network, firewall, and DNS More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
GTSC Talent Solutions
degree. Must have strong familiarity with DISA STIGs, Tenable Audit files, and/or CIS Benchmarks. Must have hands-on operational experience with enterprise vulnerability management and scanning solutions, such as Tenable. Must have knowledge of system and application security threats and vulnerabilities;Working knowledge of networking, Linux/ More ❯
environments using SIEM and EDR tools. Incident Investigation: Investigate security incidents and support the full incident response lifecycle, including documentation and root cause analysis. Vulnerability Assessments: Conduct regular vulnerability assessments and collaborate with IT teams to ensure timely remediation. Regulatory Compliance: Support compliance with regulatory requirements (FCA, PRA … trends, and regulatory changes affecting the financial sector.About you: - Security Tools Expertise: Strong understanding of security tools (SIEM, EDR, firewalls, IDS/IPS) and vulnerability management processes. Technical Knowledge: Solid grasp of networking, system administration, and secure configurations. Standards Familiarity: Familiarity with standards and frameworks such as ISO More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
The Nottingham
environments using SIEM and EDR tools. Incident Investigation: Investigate security incidents and support the full incident response lifecycle, including documentation and root cause analysis. Vulnerability Assessments: Conduct regular vulnerability assessments and collaborate with IT teams to ensure timely remediation. Regulatory Compliance: Support compliance with regulatory requirements (FCA, PRA … and regulatory changes affecting the financial sector. About you: Security Tools Expertise: Strong understanding of security tools (SIEM, EDR, firewalls, IDS/IPS) and vulnerability management processes. Technical Knowledge: Solid grasp of networking, system administration, and secure configurations. Standards Familiarity: Familiarity with standards and frameworks such as ISO More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Dark Wolf Solutions
CO. Key responsibilities include, but are not limited to: Duties/Responsibilities: Conducting comprehensive penetration testing on hardware, software, and network components. Performing advanced vulnerability scanning and assessments on all components. Performing a Cybersecurity evaluation of the product under test to identify vulnerabilities that would negatively impact the Confidentiality … and testing. Reporting detailed findings and providing actionable recommendations for remediation to enhance product security. Required Qualifications: 10+ years' experience in penetration testing and vulnerabilityassessment (for Senior level). 3 + years for junior to mid-.level. Proficiency in firmware analysis, reverse engineering, and binary exploitation. Experience More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC … Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & Penetration Testing: Review Penetration Testing, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk … cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetration testing, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of More ❯
Employment Type: Contract, Work From Home
Rate: From £500 to £700 per day (direct contract with the client)
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
security measures throughout the life cycle, from data ingestion to model deployment. Skills and Qualifications: Security Expertise: Strong understanding of cybersecurity principles, threat modelling, vulnerabilityassessment, and penetration testing. Cloud Computing: Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Data Privacy and Compliance: Knowledge of More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Dark Wolf Solutions
networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions. Conducting risk and vulnerabilityassessment at the network, system and application level. Conducting threat modeling exercises. Developing and implementing security controls and formulating operational risk mitigations along More ❯