Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
its adherence and updating or creating new processes for improvement and minimizing the wastage Encouraging and building automated processes wherever possible Identifying and deploying security measures by continuously performing vulnerabilityassessment and risk management Incident management and root cause analysis Coordination and communication with team and with customers both external and internal Selecting and deploying appropriate CI/ More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage and respond to security breaches More ❯
Windows) hardening procedures and impact on operation Experience with requirements management tools (e.g. DOORS, Codebeamer) Working knowledge of Networking Security technologies and solutions (Firewalls, IDS, Routing, Switching) Experience with vulnerabilityassessment, penetration testing, risk assessments and associated tools Knowledge of domain standards (e.g. ISO 27001, ICAO 9985) and how to apply them to product development and the support More ❯
to maintain service uptime. Plan and provision workloads for service enhancements, projects and client service requests to efficiently support the dynamic business needs. Enforce security policies by conducting regular vulnerability assessments. Ensuring the team patches and hardens systems as required whilst adhering to corporate Information Security Policies, Azure Security Benchmark and CIS controls. Collaboration with cross-functional teams (Development … is respected and valued Application and Interview Process To apply for this role, you will need to submit a CV and answer some pre-screening questions. The interview and assessment process for this role will involve a telephone interview with our Talent Team, followed by a first stage and a final stage interview. Interviews will be conducted either remotely More ❯
skills, with the ability to lead cross-functional teams and work independently. Technical Expertise Required Network Security Technologies: Expertise in Network Access Control (NAC), IPS, Firewalls (FW), Endpoint Protection, VulnerabilityAssessment tools, Mobile Device Management (MDM), and other similar cybersecurity solutions for both IT and OT environments. Networking Protocols & Infrastructure: Deep understanding of networking technologies such as routing More ❯
What You’ll Be Working On: ️ Monitoring network traffic and system activity to detect potential security threats ️ Analyzing security incidents and performing root cause analysis ️ Conducting vulnerability assessments and risk evaluations to identify weaknesses ️ Implementing security measures and controls to protect against data breaches and cyberattacks ️ Assisting in the development and implementation of security policies and procedures What We … or in a similar cybersecurity role ️ Strong knowledge of network security, firewalls, IDS/IPS, and endpoint security ️ Familiarity with security monitoring tools (e.g., SIEM, Splunk, Qualys) ️ Experience with vulnerability management, penetration testing, and incident response ️ Certifications such as CISSP, CISM, CompTIA Security+ or equivalent are highly desirable #J-18808-Ljbffr More ❯
Farnborough, England, United Kingdom Hybrid / WFH Options
Copello Global
infrastructure within the programme, applying appropriate security frameworks and implementing the right controls to ensure the security and integrity of relevant information. Your role will cover several core areas, vulnerability assessments (scanning and reporting), system hardening, endpoint security and incident management. You will ensure relevant documentation around these activities is maintained while working effectively with the wider team. The … Skills This role requires a Security Engineer possessing a blend of Information Security and Cyber Security skills with knowledge of: Cloud Security (AWS) Experience in Vulnerability Assessments and Incident Management, Implementation of security controls, UK Information Security standards (eg. MoD, NCSC, NIST), Excellent communication skills, Clearance UK Security Clearance is essential to start. Apply To apply, follow the instructions More ❯
of safeguarding Industrial Control Systems and SCADA networks from evolving cyber threats.Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threat analysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerability management initiatives and penetration testing exercises. Contribute to policy development More ❯
Cyber Artifacts Management: Manage and assess cyber artifacts to ensure proper documentation and readiness for cyber assessments. • Cyber Testing: Develop, execute, and analyze cyber testing efforts including penetration tests, vulnerability assessments, and cybersecurity audits. • Risk Management Framework (RMF) Implementation: Guide and support the implementation of the RMF process, including categorizing information systems, selecting security controls, and managing security control … Security Technical Implementation Guides (STIGs) and maintain up-to-date security configurations. • Obtain ATO: Coordinate efforts across teams to prepare systems for ATO through proper documentation, risk assessments, and vulnerability remediation. • Collaboration: Work closely with program managers, engineers, and clients to ensure alignment with project goals and compliance with cybersecurity best practices. • Documentation & Reporting: Assist in the creation of … field. • Experience: 5+ years of experience in cybersecurity engineering, cyber risk management, or cyber testing. • Technical Expertise: Demonstrated experience with RMF, STIGs, and ATO processes. Hands-on experience with vulnerability management tools, penetration testing, and cyber defense technologies. • Communication: Strong ability to produce clear, concise technical reports, and provide briefings to clients and leadership. • Security: Experience working on classified More ❯
month contract. The successful candidate will support a Public Sector client of ours within their Application Security Team and will be responsible for the following: * Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. * Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc), and make necessary recommendations. * Collaborate … line with set guidelines. * SC Clearance is an essential requirement for this role, as a minimum you must be willing & eligible to undergo checks. * Penetration testing, ethical hacking, or vulnerability assessments. * Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). * DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security, IaC scanning, etc.). * Secure More ❯
focused, and motivated candidate who can adapt to a constantly changing environment. What you will do - Manage and maintain a complex server-based enclave. Performing and mitigating system scans, vulnerability management activities, and active directory configuration. - Plan and implement IT enhancements needed for system optimization. - Identify and remediate hardware and/or software issues. - Create and update clear, concise … and accurate incident resolution documentation. - Support overlapping projects and maintain good inter-departmental relations. - Communicate and publish statuses of system outages, as needed. - Manage information assurance vulnerability alerts (IAVAs) and system security scanning of equipment suites in accordance with System Security Plans. - Actively identify and initiate IAVA responses and system security scans for remediation, deploy IAVA patches and/… and comprehension, development, integration, configuring data inputs and forwarders, data management, and/or monitoring. - Experience with Network Security Technologies such as Multiple Domain, PKI, SSP, and/or Vulnerability Assessment. - Experience with High Assurance Internet Protocol Encryptor (HAIPE) devices for in-line Network Encryption. - Experience with Puppet, Docker/Rancher, SALT. All are welcome At August Schell, we More ❯
You will be joining an AppSec team focused on building security automation into delivery pipelines and conducting security focused tests against digital services. Key Responsibilities Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc), and make necessary recommendations. Collaborate … AWS, Azure, or GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with MoJ and NCSC guidelines. Essential Criteria Penetration testing, ethical hacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security, IaC scanning, etc.). Secure More ❯
and logs to detect unusual activities or threats. Incident Response: Assist in the investigation and response to security incidents, such as malware infections, unauthorized access attempts, and data breaches. Vulnerability Management: Assist in conducting vulnerability assessments and penetration testing to identify potential system and network weaknesses. Work with senior team members to apply patches and updates to mitigate More ❯
o Reverse Engineering: • Analyze, decompile, and reverse-engineer software binaries to understand vulnerabilities and potential exploits. • Develop proof-of-concept exploits to demonstrate potential vulnerabilities in targeted systems. o Vulnerability Research • Identify, analyze, and document software vulnerabilities. • Collaborate with team members to develop mitigations and workarounds for discovered vulnerabilities. o System and Network Analysis: • Conduct network traffic analysis to … Participate in design and code reviews to ensure adherence to best practices and standards. o Documentation: • Prepare detailed technical documentation and reports, including user guides, system design documents, and vulnerability assessments. • Ensure all documentation is clear, concise, and accessible to team members and stakeholders. Required Qualifications: o Clearance: Active TS/SCI with Full Scope Polygraph is mandatory. o More ❯
London, England, United Kingdom Hybrid / WFH Options
Jobgether
in secure practices Respond to escalated incidents as part of a 24/7 on-call rotation Develop and enforce security best practices, aligned with industry standards Conduct regular vulnerability assessments and implement mitigation strategies Support audit and compliance initiatives to maintain certifications Collaborate with cross-functional teams to embed security in infrastructure and code Stay current on evolving … security engineering, including operations, blue team, DevOps, and architecture Strong knowledge of incident response, threat patterns, and mitigation strategies Hands-on experience with security tools: SIEM, IDS, DLP, MFA, vulnerability scanners, WAFs Proficient in AWS security best practices and Infrastructure as Code (e.g., Terraform, Ansible) Deep understanding of securing Windows, macOS, Linux, and virtualized environments Experience in automation/ More ❯
London, England, United Kingdom Hybrid / WFH Options
Air IT Limited
management system Conduct investigations and security audits on a variety of software and cloud systems Carry out security assessments for clients once qualified such as Cyber Essentials assessments and vulnerability assessments. Analyse data from multiple sources to identify anomaly and security threats Manage the creation, maintenance and delivery of cyber security awareness training and phishing campaigns Support customers and … related certifications in Cyber Security. Knowledge and experience of Cyber Essentials Accreditation, or other information security standards. Experience in offensive security such as CTF or bug bounty Experience with vulnerability scanners Experience in conducting security training or phishing simulation We will invest significantly in your training, with the requirement that you will commit a portion of your own time More ❯
securing and maintaining ISO 27001 and MOD accreditation. Understanding of GDPR compliance requirements. Ability to produce security risk assessments and recommend mitigations. Experience with CPNI requirements and Threat and Vulnerability Assessments. UK National Security clearance capability. Certifications such as CISSP, CISM, CEH, or equivalent are desirable. Desirable Skills Expertise in security for IT networks, cloud services, and OS hardening. More ❯
operating systems, networks, security monitoring, and tuning. • Responsible for the management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions, conducting risk and vulnerability assessments, and developing and implementing security controls. • Research, evaluate, and recommend new security tools, techniques, and technologies in alignment with program security strategy. • Configure and utilize the ELK Stack More ❯
Configure and maintain Linux and Windows systems. Manage virtualized environments (e.g., VMware, VirtualBox). Troubleshoot networking issues, including IP address configuration and virtual NICs. 5. Security and Compliance: Conduct vulnerability assessments and remediation. Apply cybersecurity principles to ensure secure software and system design. Qualifications: Education: BS in Computer Science or equivalent technical field. Advanced degree preferred. Experience: 5+ years More ❯
into operational systems and federated architectures Support systems maintenance, upgrades, and lifecycle sustainment Cybersecurity & Risk Management Implement security controls and support Authority to Operate (ATO) Conduct cyber analytics and vulnerability assessments Manage cybersecurity risk across networks, tools, and data environments Engineer security into AI models and supporting systems Project Management Responsibilities Serve as the primary point of contact for More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
JR United Kingdom
security incidents. Conduct capacity planning and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS, Azure, Google Cloud) including VPCs More ❯
Londonderry, Northern Ireland, United Kingdom Hybrid / WFH Options
Digital Waffle
security incidents. Conduct capacity planning and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS, Azure, Google Cloud) including VPCs More ❯
London, England, United Kingdom Hybrid / WFH Options
Moore Kingston Smith
A client-focused mindset with strong problem-solving skills Industry certifications (e.g. ISO 27001 Lead Auditor, CISSP, CISA, CISM) are a bonus If you have exposure to penetration testing, vulnerability assessments, cloud security (e.g. AWS, Azure, GCP) or Operational Technology (OT) - that's a real plus! What's in it for you? A client-facing role in a supportive More ❯
Omagh, Northern Ireland, United Kingdom Hybrid / WFH Options
Digital Waffle
security incidents. Conduct capacity planning and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS, Azure, Google Cloud) including VPCs More ❯