About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The … into CI/CD pipelines. Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerability scanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers, DevOps, and compliance teams to align More ❯
with others and have a hands-on role in the completion of security projects. Ensure platform security by design and provide technical guidance aligned with the product roadmap. Conduct vulnerability assessments, manage security risks, and respond to threat intelligence feeds. Monitor systems and networks for suspicious activity and engage in response procedures as necessary. Manage and document all stages … experience with security technologies such as SIEM, IDS/IPS, firewalls, and endpoint protection Strong understanding of cloud security (AWS, Azure, Google Cloud) and network security architecture Experience conducting vulnerability assessments, incident response, and forensics using tools such as Nessus Proficiency in threat hunting, malware analysis, and intrusion detection techniques Familiarity with compliance frameworks (e.g., NIST, ISO, PCI-DSS More ❯
network. Work closely with other teams to establish and enforce network access policies, ensuring that only authorized individuals and devices have the correct access privileges. Proactive Security Testing and Vulnerability Management Conduct vulnerability assessments and penetration testing to identify and address security weaknesses in mobile network architectures. Develop and enforce security policies and procedures to ensure compliance with … industry standards and regulations. Work together with system administrators and application owners to resolve discovered vulnerabilities by applying necessary patches or making configuration adjustments. Create and sustain a thorough vulnerability management program that includes tracking vulnerabilities, assessing risks, and planning remediation strategies. Engage in network security incident response efforts by providing technical expertise and supporting investigations when needed. Stay … RAN architectures and security requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR, HIPAA, ISO 27001). In-depth understanding of routers, switches, firewalls, and switching/routing protocols – such as VLAN, VTP More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
Office (WFO) role. This role will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC) using Terraform. Their ideal candidate … Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & Penetration Testing: Review Penetration Testing, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk assessments, and ensure regulatory compliance. … Required Strong expertise in Azure cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetration testing, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of DevOps pipelines (CI/CD More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure system architecture and application development. Maintain and enhance incident response procedures and disaster recovery … Proven experience in a cyber security or information security engineering role. Strong knowledge of network and system security, encryption, and authentication protocols. Experience with security tools such as SIEM, vulnerability scanners, firewalls, antivirus, and endpoint protection platforms. Familiarity with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks and standards (ISO 27001, NIST, PCI More ❯
breakfast toast Responsibilities Security Monitoring & Incident Response: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. Vulnerability Management Tools: Conduct regular vulnerability assessments, prioritize and remediate issues, and stay updated on emerging threats. Policy & Compliance Support: Help develop and enforce security policies and procedures to More ❯
to: • Provide expertise and recommendations in applying security requirements to complex combatant command projects, identifying gaps, and while integrating new technologies. • Develop secure system architectures and hardening solutions. • Conduct vulnerability assessments, security testing, and continuous monitoring. • Implement security controls per RMF and NIST guidelines. • Support risk assessments and incident response efforts. • Ensure security policies and best practices are integrated … staff. • Apply security controls and all technical mechanisms required by DoD RMF/Joint Special Access Program Implementation Guide (JSIG)/and Intelligence Community (IC) Directives and building security assessment procedures and evidence for assessment by Authorizing Officials of body of evidence. • Engineering, administration, and configuration of Nessus scans and policies, Trellix/McAfee back end and policies … technical certification) is required o Cloud Service Provider Associate Certification (AWS, Azure, Oracle, or Google) • Excellent oral, written, and interpersonal communication skills. • Expertise in building bodies of evidence and assessment and authorization packages/activities within DoD and IC environments, specifically Special Access Programs. • The ability to work under pressure and meet deadlines in a rapidly changing and demanding More ❯
logging, cloud infrastructure security and policy-as-code.What You’ll Do:· Assess Acadian’s cloud IAAS environments for Indicators of Misconfiguration (IOMs) utilizing AWS built-in and third-party assessment tools. Utilizing tools like AWS Config, Security Hub, Inspector, Guardduty, and Crowdstrike Falcon, assess monitor and prioritize remediation of Cloud security vulnerabilities.· Develop and maintain tools to detect and … desired. Additional certifications such as CCNA/CCNP, AWS Security etc. desired.· 10+ years of IT experience, ideally with some project management.· Familiarity with AWS, infrastructure-as-code, firewalls, vulnerabilityassessment tools, DLP, TCP/IP, web content filtering, VPN, endpoint protection, password management/Vaults, log management and correlation, and device/application hardening.· Understanding of API More ❯
London, England, United Kingdom Hybrid / WFH Options
Thomas Miller
reports and post-incident documentation. Collaborate with other teams to improve overall security posture. Implement and follow standard operating procedures (SOPs) for threat management and incident response. Perform regular vulnerability assessments and recommend remediation. Stay updated with emerging security trends, vulnerabilities, and exploits. Participate in red and blue team exercises to simulate attack and defence scenarios. Collate and distribute … monthly Threat Vulnerability Management (TVM) reports to senior stakeholder Person Specification: 1-3 years of experience working in a SOC or similar role. Experience with SIEM tools and performing security investigations. Strong understanding of networking concepts, protocols, and security principles. Knowledge of security incident handling, malware analysis, and threat intelligence. Excellent problem-solving skills and attention to detail. Experience … non-technical stakeholders. Technical Skills: Experience with SOC tools such as: SIEM (e.g., Splunk, IBM QRadar, ArcSight, Rapid7) Endpoint Detection and Response (EDR) (e.g., CrowdStrike, Carbon Black, SentinelOne, Rapid7) Vulnerability Management tools (e.g., Nessus, Qualys, Rapid7) Threat Intelligence Platforms (e.g., Recorded Future, ThreatConnect) Firewalls and Network Monitoring tools (e.g., Palo Alto, Cisco ASA, Checkpoint) Security Orchestration Automation and Response More ❯
with internal and external audits relating to information security. Conducting security awareness training and education for staff and users on best practices and emerging trends in cyber security. Use vulnerability management to improve Infinigate’s security landscape. Performing risk assessments and vulnerability scans to identify and mitigate potential threats to the network, devices, applications, and data. Complete security … Understanding of Incident Response, Cyber Kill Chain, ATT&CK · Knowledge & experience of common program language e.g., Python, C++, PowerShell, JavaScript Being able to perform Root Cause Analysis Experience with vulnerability assessments Ability to discover, design and document security implementations. Strong networking skills. Good understanding of securing Cloud technologies through native and multi-cloud technologies. Performed Ethic Hacking, Intrusion Prevention More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Infinigate UK & Ireland
with internal and external audits relating to information security. Conducting security awareness training and education for staff and users on best practices and emerging trends in cyber security. Use vulnerability management to improve Infinigate’s security landscape. Performing risk assessments and vulnerability scans to identify and mitigate potential threats to the network, devices, applications, and data. Complete security … Understanding of Incident Response, Cyber Kill Chain, ATT&CK · Knowledge & experience of common program language e.g., Python, C++, PowerShell, JavaScript Being able to perform Root Cause Analysis Experience with vulnerability assessments Ability to discover, design and document security implementations. Strong networking skills. Good understanding of securing Cloud technologies through native and multi-cloud technologies. Performed Ethic Hacking, Intrusion Prevention More ❯
is a critical thinker with a strong technical background and a passion for safeguarding systems and data. Key Responsibilities: • Monitor, detect, and respond to security threats and incidents. • Conduct vulnerability assessments and risk mitigation. • Ensuring security updates are current across all systems • Implement and manage security tools (e.g., SIEM , endpoint protection). • Monitor for compliance with security standards such More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
play a critical role in protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
Mission Aviation Fellowship
play a critical role in protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security More ❯
play a critical role in protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security More ❯
Clearance Status: Must be Current JOB DESCRIPTION: Inferno Systems is currently looking for Penetration Tester positions with a minimum of 7+ years experience conducting technical security and/or vulnerability assessments. Please note the security clearance requirement above: candidates MUST have a current/active TS/SCI with Full Scope Poly to be considered. JOB SUMMARY: We are … law enforcement agencies. You should be able to use sophisticated techniques to identify vulnerabilities, exploit them, and gain and maintain access to targets. You will be performing offensive-like vulnerability assessments against network systems and IT infrastructure. You will identify weaknesses and recommend mitigation steps. You will draft assessment reports for review by senior management to implement your … computing environment and cloud security. • Demonstrated real world experience performing gray and black box penetration testing. • Strong familiarity with some of the following: OWASP top 10, DoD and NSA Vulnerability and Penetration Testing Standards. • Understanding of basic IP fundamentals and how protocols work • Ability to inspect and analyze new applications and traffic flows with the capability of breaking down More ❯
Disk Encryption for data protection. • Automation & Security Tools Utilize automation tools (e.g. ArgoCD) and DevSecOps principles to implement security into the CI/CD pipeline, ensuring that security testing, vulnerability scanning, and security checks are integrated into the entire software development lifecycle. Leverage Infrastructure as Code (IaC) tools such as Terraform, Bicep, or Azure Resource Manager (ARM) templates to … automate secure resource provisioning and configuration. • Security Monitoring & Incident Response Automate security tasks including vulnerability scanning, compliance checks, threat detection, and security monitoring using tools like Azure Sentinel, Azure Monitor, and Azure Defender. Develop and execute incident response plans for handling security breaches, including data exfiltration, DDoS attacks, or insider threats. • Disaster Recovery & Business Continuity Design and implement secure … recoverable in case of incidents. • Cost Management & Optimization Monitor cloud usage and costs, recommend optimization strategies, and help implement cost-effective cloud solutions while ensuring security and performance. • Risk Assessment & Management Conduct security risk assessments, vulnerability assessments, and penetration testing to identify weaknesses in Azure-based applications and infrastructure. Provide remediation strategies to address identified risks. • Collaboration & Leadership More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role … ability to work collaboratively with clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits and risk assessments to identify … alignment with industry standards and regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages (e.g., Python, Bash, PowerShell) for security More ❯
London, England, United Kingdom Hybrid / WFH Options
Bondsmith
is for you. What you will do: Develop and implement proactive security strategies, policies, and procedures to protect our systems, networks, and data assets. Lead regular security assessments, including vulnerability scans and penetration tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents … the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerabilityassessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong … capability in risk assessment, vulnerability management, and data informed decision-making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in scripting and programming (i.e. More ❯
managing Vendor Strategy and roadmap for Information Security Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction within mandate Assessment of the organisation's technology risk exposure and measurement of the various parameters that make up technology risks. Support the Design for your area of responsibility Work closely with … intrusion detection and prevention, situational awareness of: network intrusions. security events. data spillage; and. Incident response actions. Identify and resolve vulnerabilities in networks, servers, systems, and applications by performing vulnerability scans Investigate improper access to ensure proper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements including but not limited to privilege account management. Provide … consistency of services Audit vendor services and report on non-performance or execution deficiencies to the Information Security Officer. Risk & Quality Management within one’s area of responsibility Drives vulnerability testing, risk analyses and security assessments providing findings to the Information Security Officer Maintain compliance with core risk management concepts, such as vulnerability management and threat intelligence. Guide More ❯
is for you. What you will do: Develop and implement proactive security strategies, policies, and procedures to protect our systems, networks, and data assets. Lead regular security assessments, including vulnerability scans and penetration tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents … the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerabilityassessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong … capability in risk assessment, vulnerability management, and data informed decision-making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in scripting and programming (i.e. More ❯
London, England, United Kingdom Hybrid / WFH Options
V7 Labs
is for you. What you will do: Design and implement robust, forward-thinking security strategies, policies, and procedures to safeguard our systems, networks, and data Lead regular security assessments, vulnerability scans, and penetration tests to identify risks and deploy effective remediation measures Monitor systems, networks, and logs for any signs of security incidents or unauthorized access and respond promptly … landscape relevant to SaaS products, preferably in a data-heavy environment Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems, SIEM, antivirus, encryption, and vulnerabilityassessment tools You own relevant certifications (Security+, IAT II/III level or similar) You excel in risk assessments, vulnerability management, and data-driven decision making Strong More ❯
AD policy. Compile and develop cybersecurity policies and procedures, conduct regular reviews. Application Security: Ensure the security of applications by implementing secure coding practices, conducting code reviews, and performing vulnerability assessments. Information Security: Protect sensitive information by developing and enforcing security policies and procedures. Maintain the SIEM tools, make sure security logs generated from security systems and devices are … properly. Incident Response: Investigate security breaches, conduct forensic investigations, and mount incident responses. System Audits: Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and in line with local regulation. Perform routine audits of systems and software to ensure compliance with established security … MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional; CCNA/CCNP Experience with security tools and technologies such as intrusion detection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. If you're interested in this role, click 'apply now' to forward an up-to-date More ❯
London, England, United Kingdom Hybrid / WFH Options
V7 Labs
is for you. What you will do: Design and implement robust, forward-thinking security strategies, policies, and procedures to safeguard our systems, networks, and data Lead regular security assessments, vulnerability scans, and penetration tests to identify risks and deploy effective remediation measures Monitor systems, networks, and logs for any signs of security incidents or unauthorised access and respond promptly … landscape relevant to SaaS products, preferably in a data-heavy environment Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems, SIEM, antivirus, encryption, and vulnerabilityassessment tools You own relevant certifications (Security+, IAT II/III level or similar) You excel in risk assessments, vulnerability management, and data-driven decision making Strong More ❯
assessing, and mitigating security risks across various platforms. The consultant will play a critical role in evaluating and strengthening our clients’ cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with industry best practices. Provide expert … reports on penetration testing findings, including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerability management, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit, Burp Suite, Nessus, and Wireshark. Strong … understanding of network protocols, firewall configurations, and secure network design. Proficiency in scripting languages (e.g., Python, Bash, PowerShell) to automate tasks and streamline processes. Hands-on experience of vulnerability assessments, Incident response, penetration testing, threat hunting and compromise assessment. Experience collaborating with Sales teams as a pre-sale's cyber security consultant. Experience working in Energy or Construction industry More ❯