London, South East, England, United Kingdom Hybrid / WFH Options
DMS Computer Recruitment
of the position include: Design and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments Participate More ❯
information governance and IT risk management strategy and plan.Provide expert cyber security advice to senior stakeholders and technical teams across the organisation.Work directly with key stakeholders to facilitate risk assessment and risk management processes. Collaborate with all departments within the Trust (and ICS) where necessary to identify and disseminate high-quality information that facilitates effective cyber and information security … management and improvement.Use advanced analytic tools (artificial intelligence) to determine emerging threat patterns and vulnerabilities. Scoping and delivery of penetration tests and ensure actions from vulnerability assessments are resolvedLead on audit and audit preparation relating to IT securityMaintaining compliance with various standards in place e.g. Data Security and Protection Toolkit, CareCERT, Cyber Essentials+, Network and Information Systems Regulations etc. More ❯
is looking to take their career to the next level by having more input into organisations as you help them strengthen their security posture, conduct vital areas such as vulnerability analysis and security audits that meet recommended industry standards. You will be working closely with stakeholders in order to implement Cybersecurity strategies, manage client information and provide expertise across … Conduct detailed risk assessments and gap analysis for client environments Deliver control reviews and maturity assessments aligned to relevant frameworks (ISO 27001, NIST, CIS, Cyber Essentials/Plus) Perform vulnerability assessments and develop mitigation strategies Support the deployment of Managed Detection and Response (MDR), Penetration Testing, and Data Loss Prevention (DLP) solutions Advise clients on governance, incident response, and … Experience Proven experience in a Cybersecurity consultancy role Professional certifications such as CISSP or CISM Strong working knowledge of ISO 27001, NIST and Cyber Essentials/Plus Proficiency with vulnerability management, endpoint protection and SIEM tools The role is genuinely exciting with a forward thinking business who have their employees careers at the forefront of their minds and due More ❯
systems against ever evolving cyber threats, while ensuring compliance with Security standards. What will you be doing? Manage security controls across on prem and AWS environments. Lead incident response, vulnerability assessments and pentest co-ordination. Manage IAM systems and support Engineering teams with threat modelling and secure development practices. Own ISO27001, Cyber Essentials+, PCI-DSS and GDPR compliance. Manage … physical security (access control etc) What experience do you need? 2+ years experience within Cyber Security – hands on experience with SIEM, Vulnerability scanners and endpoint protection a plus! Cloud security knowledge Scripting skills (e.g. python, Powershell or Bash What to do next? If interested please click apply now to forward me an up to date copy of your CV. More ❯
IIoT solutions? Then this role is for you! Main Responsibilities Develop & enforce IIoT security policies Define standards for device hardening, authentication, encryption, patching, and secure connectivity. Perform risk and vulnerability assessments Identify threats in IIoT environments, assess system weaknesses, and propose mitigation measures. Ensure regulatory compliance Align all IIoT products and systems with the Cyber Resilience Act (CRA) , IEC … IEC 62443 , ISO/IEC 27001 , NIST SP 800-82 , or ENISA guidelines Secure software development lifecycle (SSDLC) and patch/update management Proven track record in risk and vulnerability assessments Certifications (advantage): CISSP, CISM, CEH, GICSP, or similar. Excellent teamwork, communication , and cross-functional coordination skills What You'll Gain : Work in an agile international environment with emphasis More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the criteria More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
RSM UK
enthusiastic Cyber Security Consultant to join our team. Working alongside our experienced team of specialists, you'll deliver offensive security services including digital footprint reconnaissance, social engineering, penetration testing, vulnerability assessments, and more to high-profile clients across all industries. The purpose of this role is to deliver offensive security services such as digital footprint reconnaissance, social engineering, vulnerabilityMore ❯