Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
pipelines for integration, development, and deployment. Implement and maintain monitoring systems. Maintain and enhance the team's cloud infrastructure. Promote and implement automation processes. Enhance security protocols by conducting vulnerability assessments and risk management to deploy cybersecurity measures. Technical Proficient in Terraform and AWS. Solid experience with CI/CD, ideally with GitLab CI and Jenkins. Extensive experience using More ❯
pipelines for integration, development, and deployment. Implement and maintain monitoring systems. Maintain and enhance the team's cloud infrastructure. Promote and implement automation processes. Enhance security protocols by conducting vulnerability assessments and risk management to deploy cybersecurity measures. Technical Proficient in Terraform and AWS. Solid experience with CI/CD, ideally with GitLab CI and Jenkins. Extensive experience using More ❯
pipelines for integration, development, and deployment. Implement and maintain monitoring systems. Maintain and enhance the team's cloud infrastructure. Promote and implement automation processes. Enhance security protocols by conducting vulnerability assessments and risk management to deploy cybersecurity measures. Technical Proficient in Terraform and AWS. Solid experience with CI/CD, ideally with GitLab CI and Jenkins. Extensive experience using More ❯
Automate deployment, configuration, and infrastructure provisioning (Infrastructure as Code) Work with virtualisation (VMware/vSphere, etc.) Configure/manage SAN/storage, Fibre Channel, zoning, LUN provisioning Participate in vulnerability assessments, patches, security hardening, and incident response Required Skills & Experience NPPV3 clearance, either current or active within the last 12 months (non-negotiable) Strong track record with Windows More ❯
Design and implement secure-by-default controls as they relate to our software supply chain, AI model training systems, and deployment environments. Perform security architecture reviews, threat modeling, and vulnerability assessments to identify and remediate risks. Support Anthropic's responsible disclosure and bug bounty programs and participate in the Security Engineering team's on-call rotation. Accelerate the development More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Revoco
a Senior Cyber Security Engineer, you’ll play a key role in strengthening our security posture and driving continuous improvement across systems and networks. You will: Lead and implement vulnerability management programmes across multiple environments. Oversee incident response processes, from detection to resolution and post-incident review. Manage and optimise security tools , ensuring effective monitoring, detection, and prevention. Design … and maintain network security controls — including firewalls, intrusion detection/prevention, and segmentation. Conduct and oversee offensive security testing and vulnerability assessments. Ensure secure-by-design principles are embedded across development and infrastructure. Collaborate closely with engineering and product teams to identify and mitigate risks early. Contribute to a multidisciplinary cybersecurity taskforce , responding rapidly to emerging threats. 🧠 What We … re Looking For Strong understanding of OWASP Top 10 , MITRE ATT&CK , and evolving threat landscapes. Proven experience across vulnerability management, incident response, and network security . Ideally skilled in at least one programming language (e.g. Go, Python, Rust ). Experience managing or integrating security tooling (SIEM, endpoint protection, scanning tools, etc.). Hands-on experience with firewalls , network More ❯
newport, wales, united kingdom Hybrid / WFH Options
Revoco
a Senior Cyber Security Engineer, you’ll play a key role in strengthening our security posture and driving continuous improvement across systems and networks. You will: Lead and implement vulnerability management programmes across multiple environments. Oversee incident response processes, from detection to resolution and post-incident review. Manage and optimise security tools , ensuring effective monitoring, detection, and prevention. Design … and maintain network security controls — including firewalls, intrusion detection/prevention, and segmentation. Conduct and oversee offensive security testing and vulnerability assessments. Ensure secure-by-design principles are embedded across development and infrastructure. Collaborate closely with engineering and product teams to identify and mitigate risks early. Contribute to a multidisciplinary cybersecurity taskforce , responding rapidly to emerging threats. 🧠 What We … re Looking For Strong understanding of OWASP Top 10 , MITRE ATT&CK , and evolving threat landscapes. Proven experience across vulnerability management, incident response, and network security . Ideally skilled in at least one programming language (e.g. Go, Python, Rust ). Experience managing or integrating security tooling (SIEM, endpoint protection, scanning tools, etc.). Hands-on experience with firewalls , network More ❯
bath, south west england, united kingdom Hybrid / WFH Options
Revoco
a Senior Cyber Security Engineer, you’ll play a key role in strengthening our security posture and driving continuous improvement across systems and networks. You will: Lead and implement vulnerability management programmes across multiple environments. Oversee incident response processes, from detection to resolution and post-incident review. Manage and optimise security tools , ensuring effective monitoring, detection, and prevention. Design … and maintain network security controls — including firewalls, intrusion detection/prevention, and segmentation. Conduct and oversee offensive security testing and vulnerability assessments. Ensure secure-by-design principles are embedded across development and infrastructure. Collaborate closely with engineering and product teams to identify and mitigate risks early. Contribute to a multidisciplinary cybersecurity taskforce , responding rapidly to emerging threats. 🧠 What We … re Looking For Strong understanding of OWASP Top 10 , MITRE ATT&CK , and evolving threat landscapes. Proven experience across vulnerability management, incident response, and network security . Ideally skilled in at least one programming language (e.g. Go, Python, Rust ). Experience managing or integrating security tooling (SIEM, endpoint protection, scanning tools, etc.). Hands-on experience with firewalls , network More ❯
bradley stoke, south west england, united kingdom Hybrid / WFH Options
Revoco
a Senior Cyber Security Engineer, you’ll play a key role in strengthening our security posture and driving continuous improvement across systems and networks. You will: Lead and implement vulnerability management programmes across multiple environments. Oversee incident response processes, from detection to resolution and post-incident review. Manage and optimise security tools , ensuring effective monitoring, detection, and prevention. Design … and maintain network security controls — including firewalls, intrusion detection/prevention, and segmentation. Conduct and oversee offensive security testing and vulnerability assessments. Ensure secure-by-design principles are embedded across development and infrastructure. Collaborate closely with engineering and product teams to identify and mitigate risks early. Contribute to a multidisciplinary cybersecurity taskforce , responding rapidly to emerging threats. 🧠 What We … re Looking For Strong understanding of OWASP Top 10 , MITRE ATT&CK , and evolving threat landscapes. Proven experience across vulnerability management, incident response, and network security . Ideally skilled in at least one programming language (e.g. Go, Python, Rust ). Experience managing or integrating security tooling (SIEM, endpoint protection, scanning tools, etc.). Hands-on experience with firewalls , network More ❯
Tampa, Florida, United States Hybrid / WFH Options
Apetan Consulting
browser compatibility issues. Proficient in technical unit testing. Proficient in functional unit testing. Experience creating pull requests which include quality gates such as documentation, screenshots, gated builds, code coverage, vulnerability assessments, best practice comments, and peer comments. Will also be called upon to review other's pull requests. Good understanding of asynchronous request handling and partial page updates. Experience More ❯
Grand Prairie, Texas, United States Hybrid / WFH Options
Lockheed Martin
capture for Contract Research and Development (CRAD). • Demonstrated experience of advanced cyber research and development projects areas such as: embedded cyber resilient systems, software assurance, weapon system cyber vulnerability assessments, and other technologies. • Current knowledge of the DoD S&T (Science & Technologies) environment and acquisition process. Knowledge of technologies and products similar to or related to Lockheed Martin More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modeling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modeling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modeling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modeling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
warrington, cheshire, north west england, united kingdom
RED Global
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modeling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
Oracle Cloud Infrastructure The Oracle Threat and Vulnerability Management (TVM) team proactively identifies, assesses, prioritizes, and relentlessly drives the remediation of security weaknesses and vulnerabilities at scale across the total enterprise. The TVM team performs security assessments, vulnerability research, guides and advises mitigation strategies, and coordinates the response to zero-day and other urgent vulnerabilities. We ensure the … as that of their team, and has previous experience working in the cloud or hardware industry. This role is for a hands-on leader to drive day-to-day vulnerability assessments, deviation reviews, and remediation activities across cloud and non-cloud environments. Responsibilities Leading a diverse set of personalities and talent Understanding the importance of a healthy and supportive … from the most technical operator to senior leadership Maintain awareness of known vulnerabilities and work towards applying appropriate mitigations Guide and mentor security analysts and engineers as they perform vulnerability assessments Provide direction and advice on emerging threats, weaknesses, and security practices that may impact the security posture of Oracle Manage and lead the performance of vulnerability assessments More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Ipsotek, an Eviden business
Role Overview Ipsotek is seeking a strategic and hands-on Security Lead to own and evolve our security posture across the business. This pivotal role will oversee security strategy , vulnerability management , and security operations (SecOps) , acting as the primary point of contact for all security-related matters within Ipsotek and externally with the Eviden Centre of Excellence . You … s security strategy aligned with business and regulatory requirements. Liaise with the Eviden COO and Eviden Centre of Excellence to ensure alignment with group-wide security standards and initiatives. Vulnerability Management, Penetration Testing & PSIRT Lead vulnerability assessments and coordinate penetration testing activities with external vendors and internal teams. Track and manage remediation efforts across infrastructure, applications, and cloud … Provide regular updates to leadership on risk posture and mitigation plans. Requirements Proven experience in a senior security role, ideally within a technology or SaaS environment. Strong understanding of vulnerability management, penetration testing, SecOps, and cloud security. Experience establishing or contributing to PSIRT processes. Experience working with cross-functional teams including engineering, operations, and client services. Excellent communication and More ❯
Role Overview Ipsotek is seeking a strategic and hands-on Security Lead to own and evolve our security posture across the business. This pivotal role will oversee security strategy , vulnerability management , and security operations (SecOps) , acting as the primary point of contact for all security-related matters within Ipsotek and externally with the Eviden Centre of Excellence . You … s security strategy aligned with business and regulatory requirements. Liaise with the Eviden COO and Eviden Centre of Excellence to ensure alignment with group-wide security standards and initiatives. Vulnerability Management, Penetration Testing & PSIRT Lead vulnerability assessments and coordinate penetration testing activities with external vendors and internal teams. Track and manage remediation efforts across infrastructure, applications, and cloud … Provide regular updates to leadership on risk posture and mitigation plans. Requirements Proven experience in a senior security role, ideally within a technology or SaaS environment. Strong understanding of vulnerability management, penetration testing, SecOps, and cloud security. Experience establishing or contributing to PSIRT processes. Experience working with cross-functional teams including engineering, operations, and client services. Excellent communication and More ❯
and capability to drive innovation are absolute mustDirect engagement with customer to provide support and understand customer needsAssist in responses to internal and external compliance audits, penetration tests and vulnerability assessments. More ❯
and capability to drive innovation are absolute mustDirect engagement with customer to provide support and understand customer needsAssist in responses to internal and external compliance audits, penetration tests and vulnerability assessments. More ❯
e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. Formulate HMG Information Assurance Risk Assessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST, CSF, and CSA … development of patterns and principles Working within environments utilising DevOps, DevSecOps, SRE, CI/CD, Infrastructure & Security as Code (Docker, Git, Terraform) Managing technical assessments of security related technologies, vulnerability assessments and penetration tools and techniques Enabling & informing risk-based decisions: Working with higher impact or more complex risks, advising on the impact and whether this is within risk More ❯
Poole, Dorset, England, United Kingdom Hybrid / WFH Options
Mexa Solutions LTD
week in the office) Scope : Work across IT, application, cloud, and physical security, no siloed remits here Responsibility : Be the go-to person for penetration testing, compliance audits, and vulnerability management Environment : Modern SaaS product environment, working alongside DevOps, engineering, and IT Growth : Get stuck into a wide variety of work, with support from leadership and autonomy to make … a real impact What you’ll be doing: Leading vulnerability assessments and coordinating regular penetration testing across systems and products Owning risk remediation actions, from security audits to PCI scans and compliance reporting Working across cloud (AWS), infrastructure, and software environments to ensure security best practices are embedded throughout Supporting the secure design of products and infrastructure, providing input More ❯
rapid incident response. 🌳 Cloud Security Enablement: Implement security tooling for Azure and hybrid environments, embedding security into DevOps workflows and CI/CD pipelines using GitHub Advanced Security . 🌳 Vulnerability Management: Lead enterprise-wide vulnerability assessments, remediation programmes, and Breach and Attack Simulation (BAS) exercises for proactive threat mitigation. 🌳 Compliance & Third-Party Security: Ensure adherence to PCI DSS … platforms such as Microsoft Defender for Cloud , Azure Security , or AWS Security . 🌳 Proficiency with security tools like Snyk , Datadog , CrowdStrike , or similar. 🌳 Knowledge of authentication, authorization, encryption , and vulnerability management . 🌳 Familiarity with secure coding practices and CI/CD pipeline security . 🌳 Certifications such as CEH , SSCP , or Elastic Security for SIEM are highly desirable. What We More ❯