its adherence and updating or creating new processes for improvement and minimizing the wastage • Encouraging and building automated processes wherever possible • Identifying and deploying security measures by continuously performing vulnerabilityassessment and risk management • Incident management and root cause analysis • Coordination and communication with team and with customers both external and internal • Selecting and deploying appropriate CI/ More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Monitoring and defending against security threats across the organization's network, systems, and applications ️ Implementing and managing security technologies such as firewalls, IDS/IPS, and encryption solutions ️ Conducting vulnerability assessments and penetration tests to identify and mitigate security risks ️ Collaborating with IT teams to implement secure configurations and ensure best practices are followed ️ Developing and enforcing cybersecurity policies … or in a similar role within IT security ️ Strong knowledge of cybersecurity principles, threat intelligence, and security controls ️ Experience with security tools (e.g., SIEM, firewalls, EDR, VPN, DLP) and vulnerability management ️ Solid understanding of regulatory frameworks and industry standards (e.g., GDPR, NIST, ISO 27001) ️ Certifications such as CISSP, CISM, CompTIA Security+, or CEH are highly desirable Ready to defend More ❯
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: • Lead the development and delivery of threat intelligence and … vulnerability products. • Select and profile key threat actors posing the greatest risk to the client’s estate. • Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. • Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. • Provide in-depth contextual threat analysis, including actor capability and intent. • Maintain and improve internal documentation and … reporting processes. • Lead, mentor, and support a multidisciplinary team of cyber analysts. • Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: • 5+ years of experience in Threat Intelligence, Vulnerability Management, or cyber research. • Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. • Experience in More ❯
with engineering, maintenance and central teams, you’ll ensure robust protection of our electrical, automation, and industrial network systems. You’ll also drive key initiatives like cyber hygiene programmes, vulnerability assessments, and network monitoring – keeping us ahead of threats and ready to respond. Key Responsibilities Ensure OT assets and industrial control systems are protected against cyber threats. Implement and … support cyber security tools and practices defined in our global OT Cyber Strategy. Lead cyber hygiene and vulnerability management programmes, coordinating remediation where needed. Monitor OT network activity, detect insecure configurations or malicious activity, and take appropriate action. Own the site-level cyber incident response plan – coordinating with stakeholders and ensuring timely resolution. Support compliance efforts related to OT … and SCADA, and have strong knowledge of industrial networks. You have solid grounding in cyber security principles – TCP/IP, common protocols, OSI model, and cyber tooling such as vulnerability scanning, antivirus and endpoint protection. You can lead, influence and guide others – from site technicians to external contractors. You’re confident working independently and as part of a broader More ❯
What You'll Be Working On: ️ Designing, implementing, and managing security architectures for cloud environments (AWS, Azure, Google Cloud) ️ Conducting risk assessments and vulnerability assessments on cloud infrastructure to identify and mitigate security threats ️ Managing and securing cloud-based services, including identity and access management (IAM), encryption, and data protection ️ Collaborating with DevOps and development teams to integrate security More ❯
security (AWS, Azure, or GCP) and DevSecOps tooling Ensure security compliance across the development lifecycle, aligned with NCSC and industry standards Required Experience: Proven track record in pen testing, vulnerability assessments, and ethical hacking Hands-on with tools such as Burp Suite, ZAP, Nmap, Metasploit Deep understanding of secure cloud infrastructure (AWS/Azure) and scripting (Python, Bash) Familiarity More ❯
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
SIEM systems and firewalls to foster innovation and meet the evolving needs of the certification market and consultancy services. Serving as a key liaison with our technology partners. Supporting vulnerability assessments and security audits to ensure seamless security integration aligned with market demands and industry standards. Providing strategic insights on risk mitigation, UI security, and compliance, based on monitoring More ❯
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
consistency across environments. Collaborate with cross-functional teams to understand application requirements and translate them into network solutions. Ensure network security by implementing industry-best practices and conducting regular vulnerability assessments. Troubleshoot and resolve network-related issues in a timely and efficient manner. Stay abreast of the latest networking technologies and trends, recommending upgrades and improvements to keep our More ❯
Enfield, Middlesex, England, United Kingdom Hybrid / WFH Options
Eden Brown Synergy
systems to identify, mitigate, and respond to risks and potential threats. * Utilise Microsoft Sentinel and related tools to analyse security data, detect anomalies, and respond effectively to incidents. * Oversee vulnerability assessments and penetration testing to ensure robust security measures are maintained. * Contribute to the development and execution of incident response plans, ensuring prompt action to contain and remediate security More ❯
on-premise. Key Responsibilities: Lead the design, documentation, and maintenance of Argenta’s Infrastructure and Security architecture, ensuring performance, scalability, and sustainability. Manage the organisation’s cybersecurity posture, including vulnerability assessments, incident response planning, and coordination with security MSPs for SIEM and threat detection. Assess current systems and infrastructure, identifying opportunities for optimisation, automation, and integration of new technologies More ❯
scaling. Drive an evolution of services to support cloud-native managed services, including an evolution of Kubernetes. Drive efforts to enhance cloud infrastructure security, including access controls, encryption, and vulnerability assessments, focusing on engineering security solutions. Collaborate on CI/CD (TeamCity) pipelines to automate software deployment, including the build platform (Java, Gradle Enterprise) and QA/Testing tooling More ❯