of the things you'll be doing: Design and implement security measures to protect applications and infrastructure from vulnerabilities, attacks, and other risks. Perform vulnerability assessments, threat analysis, and incident response. Plan, scope and conduct Penetration Testing campaigns. Develop and integrate security requirements into the CI/CD pipelines. … or equivalent certification. Proficiency in programming or scripting languages, especially Python, and a solid understanding of the web stack and its components. Experience with vulnerability management tools, security scanners (e.g. Snyk, Qualys, Trivy, Dependabot, etc.), and secure systems configuration (e.g., firewalls, VPNs, IDS/IPS, WAF). DevSecOps mindset More ❯
Aberdeen, Aberdeenshire, United Kingdom Hybrid / WFH Options
Cammach Bryant
requirements. RESPONSIBILITIES The role involves continuously monitoring the organisation's network and systems for potential security breaches while conducting threat analysis, risk assessments, and vulnerability assessments. By identifying security risks, the position requires providing recommendations and implementing measures to remediate vulnerabilities and strengthen cyber defences. In the event of … and data. The position also entails developing and maintaining security policies, procedures, and standards while preparing and delivering reports on security threats, vulnerabilities, and remediation efforts to management and stakeholders. Other duties include; Maintain data confidentiality on sensitive cases. Maintain a deeper organisational understanding. Can facilitate cross functional collaboration. More ❯
Aberdeen, City of Aberdeen, United Kingdom Hybrid / WFH Options
Cammach Bryant
requirements. RESPONSIBILITIES The role involves continuously monitoring the organisation's network and systems for potential security breaches while conducting threat analysis, risk assessments, and vulnerability assessments. By identifying security risks, the position requires providing recommendations and implementing measures to remediate vulnerabilities and strengthen cyber defences. In the event of … and data. The position also entails developing and maintaining security policies, procedures, and standards while preparing and delivering reports on security threats, vulnerabilities, and remediation efforts to management and stakeholders. Other duties include; Maintain data confidentiality on sensitive cases. Maintain a deeper organisational understanding. Can facilitate cross functional collaboration. More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Kudu Dynamics, LLC
a cloud native application that runs on AWS as well as self-managed clouds for on-prem and offline deployments. Our solutions for automating vulnerability discovery and remediation leverages best-of-art techniques built on modern open source software and numerous KUDU proprietary technologies. We are looking for … focuses on backend services, familiarity with frontend development is beneficial. You will collaborate with various teams, including R&D specialists in reverse engineering and vulnerability research, to ensure the platform effectively integrates novel analysis techniques. Responsibilities: Software Development: Design, implement, and maintain scalable backend microservices, primarily in Python Develop … and containerization (Docker, Kubernetes) Excellent problem-solving and communication skills; able to work independently and in teams Preferred Qualifications Exposure to automated program analysis, vulnerability research, or reverse engineering concepts Cloud deployment and/or Kubernetes experience Some familiarity with frontend technologies for occasional full-stack contributions particularly using More ❯
San Antonio, Texas, United States Hybrid / WFH Options
Kudu Dynamics, LLC
a cloud native application that runs on AWS as well as self-managed clouds for on-prem and offline deployments. Our solutions for automating vulnerability discovery and remediation leverages best-of-art techniques built on modern open source software and numerous KUDU proprietary technologies. We are looking for … focuses on backend services, familiarity with frontend development is beneficial. You will collaborate with various teams, including R&D specialists in reverse engineering and vulnerability research, to ensure the platform effectively integrates novel analysis techniques. Responsibilities: Software Development: Design, implement, and maintain scalable backend microservices, primarily in Python Develop … and containerization (Docker, Kubernetes) Excellent problem-solving and communication skills; able to work independently and in teams Preferred Qualifications Exposure to automated program analysis, vulnerability research, or reverse engineering concepts Cloud deployment and/or Kubernetes experience Some familiarity with frontend technologies for occasional full-stack contributions particularly using More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Lockheed Martin
will assist users with resolving technical issues with applications, connectivity and other IT related issues, as well as assist with Information Assurance, performing environmental vulnerability scans, remediation of vulnerabilities and system hardening. The selected candidate will ensure that all Lockheed Martin assets and software are properly accounted for … administration (Windows, 7, 10, 2008, 2012 and 2016) • Knowledge of Virtualization (VMware, Horizon, vSphere, vCenter, vCloud, vRealize, NSX, vSAN or VXRail) • Knowledge of implementing vulnerability compliance solutions (WSUS, SCCM, Splunk, ACAS, SCAP, HBSS, NESSUS) Security Clearance Statement: This position requires a government security clearance, you must be a US More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Aerospace Corporation
the business needs allow. What You'll Be Doing Spearheading teams and projects in the areas of: cybersecurity audits and audit oversight, compliance review, vulnerability identification and remediation, cybersecurity administration Contributing to and compiling threat briefings and risk assessments based on current events Providing expertise for cyber policy More ❯
Windsor, Berkshire, South East, United Kingdom Hybrid / WFH Options
Centrica
?? Join Centrica's IT Security Team as a Cyber Security Incident Response Manager! ?? Are you ready to drive the UK's energy transformation? Centrica is looking for a skilled Cyber Security Incident Response Manager to join our IT Security team. More ❯
We are Centrica! We’re so much more than an energy company. We’re a family of brands revolutionising a cleaner, greener future. Working here is #MoreThanACareer - we’re powered by purpose. Together we can make an impact that will More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Fruition Group
Job Title: Platform Engineer Location: Hybrid - 2 days onsite in Leeds, West Yorkshire Salary: £60k-70k DOE + generous benefits Why Apply? This is an exciting opportunity for an experienced Platform Engineer to play a critical role in the delivery More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Fruition Group
Job Title: Infrastructure Engineer Location: Hybrid - 2 days onsite in Leeds, West Yorkshire Salary: £60k-70k DOE Why Apply? This is an exciting opportunity for an experienced Infrastructure Engineer to play a critical role in the delivery, support, and evolution More ❯
Kansas City, Missouri, United States Hybrid / WFH Options
Epsilon Inc
environments. In this position you will: Provide 24x7/365 remote support services response as needed. Support automating tasks using client automation tools Review vulnerability reports and make necessary changes to client/customer environments to remediate per client policy Monitor Incident and Service Request queue and perform work … migration strategies from on-prem to cloud, including lift-and-shift, re-platforming, or hybrid coexistence. Secure OCI environments per customer compliance standards; review vulnerability reports and apply remediations. Monitor and support OCI-native services such as Identity and Access Management (IAM), Vault, and Resource Manager. Automate OCI infrastructure More ❯
technical and advisory expertise to help clients securely craft and deploy Industrial Control Systems (ICS) and operation technology. Main responsibilities: Provide OT/ITS Vulnerability Assessment and Remediation Services to help clients identify, assess, prioritise and mitigate potentially exposed network components Work collaboratively with various cyber teams to More ❯
london, south east england, united kingdom Hybrid / WFH Options
Lorien
technical and advisory expertise to help clients securely craft and deploy Industrial Control Systems (ICS) and operation technology. Main responsibilities: Provide OT/ITS Vulnerability Assessment and Remediation Services to help clients identify, assess, prioritise and mitigate potentially exposed network components Work collaboratively with various cyber teams to More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
project to ensure the efficient operation of end user devices, including Laptops, phones, handheld devices etc. The primary responsibility with the role will be vulnerability Management, including conducting regular assessments, implementing security measures and liaising with various depts. The successful candidate will implement and manage software patches promptly and … configure MS Teams, Intune and Endpoint Config Manager accordingly. Skills required: - Relevant experience in vulnerability management and endpoint security Strong knowledge of MS Teams, Intune and Endpoint Configuration manager Familiar with identity and access management principles Responsibilities: Respond to incidents related to EUC reported through the Service Desk or … Implement and manage software patches for end user computing devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with organisational More ❯
understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: Vulnerability Analyst Location: London - We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular … role. Grade: GG11 What You'll Be Doing Manage the identification and analysis of security vulnerabilities and support required remediation across National Highways infrastructure (IT and OT). Co-ordinate with various digital teams across NH to ensure all vulnerabilities are addressed in a timely manner. Continually improve vulnerability … tooling and process while supporting the improvement of the security capability of National Highways through dashboard monitoring and retrospective assessments. Plan, execute and manage vulnerability assessment and scanning activities across the National Highway's networks, systems, and applications. Ensure vulnerability scans and assessments are run periodically in line More ❯
Lloyds Banking Group Role title: Associate Director/Senior Manager, Data Resilience Location: London - hybrid working two days per week in the office & rest from home Salary & Benefits: £104,686pa to £123,160pa (experience dependent), plus annual personal bonus, 15 More ❯
We are excited to offer a new career opportunity for a Network Security Engineer to join our team and contribute to ongoing projects. We are looking for experienced Network Security engineers with a strong background in Checkpoint, Cisco and VPN More ❯