up-to-date with the latest treds, tooling, techniques to continuously improve testing approaches. What will you need to do it? Some demonstrable practical experience in penetration testing and vulnerability assessments Understanding of common vulnerabilities and how to exploit or mitigate them. Basic Knowledge of network security, application security and cloud security principles. A passion for all things hacking More ❯
SQL Toolset/SSMS 18.xxx/Quest Spotlight | Replication Monitor and other industry standard monitoring tools. An understanding of and some exposure to SQL Server auditing/encryption/vulnerability assessments/data classification/Query Store etc. Creation and use of DACPAC and BACPACs. An appreciation of and willingness to learn SQL Azure PAAS and IAAS database solutions. More ❯
to quickly resolve issues affecting hosted environments. Security and Compliance: Implement and maintain robust security protocols for hosted solutions, including firewalls, encryption, and access controls. Conduct regular security audits, vulnerability assessments, and patch management to meet compliance standards. Ensure hosted environments adhere to industry and regulatory security requirements. Utilize System Center Configuration Manager for software deployments, updates, and compliance More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
to quickly resolve issues affecting hosted environments. Security and Compliance: Implement and maintain robust security protocols for hosted solutions, including firewalls, encryption, and access controls. Conduct regular security audits, vulnerability assessments, and patch management to meet compliance standards. Ensure hosted environments adhere to industry and regulatory security requirements. Utilize System Center Configuration Manager for software deployments, updates, and compliance More ❯
London, England, United Kingdom Hybrid / WFH Options
SERVPRO of Limestone and Lawrence Counties
SQL Toolset/SSMS 18.xxx/Quest Spotlight | Replication Monitor and other industry standard monitoring tools. An understanding of and some exposure to SQL Server auditing/encryption/vulnerability assessments/data classification/Query Store etc. Creation and use of DACPAC and BACPACs. An appreciation of and willingness to learn SQL Azure PAAS and IAAS database solutions. More ❯
London, England, United Kingdom Hybrid / WFH Options
Idox plc
to quickly resolve issues affecting hosted environments. Security and Compliance: Implement and maintain robust security protocols for hosted solutions, including firewalls, encryption, and access controls. Conduct regular security audits, vulnerability assessments, and patch management to meet compliance standards. Ensure hosted environments adhere to industry and regulatory security requirements. Utilize System Center Configuration Manager for software deployments, updates, and compliance More ❯
tailor IT and CS security control baselines based on RMF guidelines and categorization of the RMF boundary • Perform Ports, Protocols, and Services Management (PPSM). • Perform IT and CS vulnerability-level risk assessments. • Execute security control testing as required by a risk assessment or annual security review (ASR). • Mitigate and remediate IT and CS system level vulnerabilities … level IT and CS policies and procedures for respective RMF boundaries and/or guidance provided by the command ISSMs • Implement and assess STIG and SRGs. • Perform and develop vulnerability assessments with automated tools such as Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP) Compliance Check (SCC) and Evaluate STIG. • Deploy security updates to Information System … components. • Perform routine audits of IT system hardware and software components. • Maintain inventory of Information System components. • Participate in IT change control and configuration management processes. • Upload vulnerability data in Vulnerability Remediation Asset Manager (VRAM). • Image or re-image assets that are part of the assigned RMF boundary • Install software and troubleshoot software issues as necessary to More ❯
only, no telework. Design, implement, configure, and enforce security controls on network, hardware, and software components and devices. Implement STIGs and manage enterprise-level deployment of Active Directory. Perform vulnerability assessments using Assured Compliance Assessment Solution tools. Configure Cisco networking devices and utilize packet analyzer tools such as Wireshark and tcpdump. Troubleshoot network connectivity issues and implement firewalls … the design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices. o Performing STIG implementation. o Utilizing and configuring Active Directory. o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool. o Configuring Cisco networking devices. o Utilizing packet analyzer tools (examples, Wireshark and tcpdump, etc.); and o Implementing and managing More ❯
Engineer will be responsible for developing and maintaining secure configuration baselines, enforcing patch compliance, and embedding preventative controls into day-to-day operations. You will lead the organization's vulnerabilityassessment process, including the use of scanning tools, interpretation of technical findings, and coordination of remediation activities. Additionally, you will provide expert input on design proposals, technical change … and maintaining secure configuration baselines (e.g. CIS Benchmarks), enforcing patch compliance, and embedding preventative controls into day-to-day operations. You have the opportunity to lead the Elysium's vulnerabilityassessment process - including the use of scanning tools, interpretation of technical findings, and coordination of remediation activities with relevant teams. This will ensure timely resolution of risks and … security responsibilities. Hands-on experience with server hardening, patching regimes, and baseline enforcement. Experience supporting infrastructure change or design assessments from a security perspective. Experience managing or contributing to vulnerabilityassessment and remediation. Experience working within regulated environments (e.g. NHS DSPT, ISO 27001, CE+). Deep understanding of infrastructure security, including system hardening, patching, and baseline configuration. Familiarity More ❯
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerabilityassessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerabilityassessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerabilityassessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerabilityassessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerabilityassessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role More ❯
and server infrastructure. This role demands expertise in cybersecurity protocols, threat detection, and proactive security measures, ensuring the safety and integrity of our clients’ digital assets. Key Responsibilities: Conduct vulnerability assessments and security audits, identifying and addressing potential vulnerabilities in clients’ WordPress websites and server setups. Implement robust security protocols, including firewall configurations, intrusion detection systems, and encryption tools … or similar role, with a focus on web security and WordPress platforms. In-depth knowledge of cybersecurity protocols, threat detection, intrusion detection systems, and encryption technologies. Experience with security assessment tools and methodologies. Strong understanding of web vulnerabilities, including SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF). Excellent communication skills and ability to convey More ❯
system architecture Assisting external customers with development and troubleshooting of IT and software systems Encouraging and building automated processes wherever possible Identifying and deploying cybersecurity measures by continuously performing vulnerabilityassessment and risk management Monitoring and measuring customer experience and KPIs Qualifications: Experience working on Linux based infrastructure Linux system administrator experience with AWS building and managing highly More ❯
maintenance of a secure software development lifecycle (SDLC) with a focus on secure coding practices in languages like Python, C++, Rust, Go and Kotlin/Java. Conduct threat modeling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle. Provide mentorship, guidance, and training on security best practices and … systems. Extensive experience with one or more cloud platforms such as AWS, Microsoft Azure and Alibaba Cloud used in a hybrid environment. In-depth knowledge of threat modeling, risk assessment and development of mitigation strategies for large-scale, complex systems in a fast-paced environment. Experience integrating security scanning tools into CI/CD pipelines and runtime environments. Experience More ❯
London, England, United Kingdom Hybrid / WFH Options
Littlefish
or similar technical positions. Understanding of security threats and methods of compromise. Proficiency in server, client, and network technologies. Knowledge of malware, network reconnaissance, and emerging threats. Competence in vulnerabilityassessment and remediation procedures. Strong analytical, logical thinking, and judgment skills. Proficiency in KQL and familiarity with the Microsoft Defender Suite. Education/Qualifications: CompTIA Security+ or equivalent More ❯
London, England, United Kingdom Hybrid / WFH Options
Little Fish (UK) Ltd
or similar technical positions. Fundamental understanding of security threats and compromise methods. Proficiency in server, client, and network technologies. Knowledge of malware, network reconnaissance, and emerging threats. Competence in vulnerabilityassessment and remediation procedures. Strong analytical skills, logical thinking, and sound judgment. Proficiency in KQL. Familiarity with the Microsoft Defender Suite. Education/Qualifications: CompTIA Security+ or equivalent More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
or similar technical positions. Fundamental understanding of security threats and compromise methods. Proficiency in server, client, and network technologies. Knowledge of malware, network reconnaissance, and emerging threats. Competence in vulnerabilityassessment and remediation procedures. Strong analytical skills, logical thinking, and sound judgment. Proficiency in KQL. Familiarity with the Microsoft Defender Suite. Education/Qualifications: CompTIA Security+ or equivalent More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Goodman Masson
and information. You’ll work closely with the IT Security Manager to monitor networks, respond to incidents, and enhance cyber resilience across the organisation. The role also includes conducting vulnerability assessments, supporting audits, and helping to strengthen third-party security compliance. Key Responsibilities: Monitor security systems and investigate incidents Operate firewalls, EDR, SIEM tools, and encryption software Support vulnerabilityMore ❯
About Apexanalytix At Apexanalytix, we help some of the world’s largest companies stay ahead of risk. Our Cyber Threat & Vulnerability team provides cutting-edge analysis, monitoring, and intelligence on third-party and supplier cyber threats — helping procurement and risk leaders understand and act on the hidden risks in their extended supply chains. The Opportunity We’re looking for … a rare chance to be part of a tight-knit team tackling real-world threats at scale. What You'll Be Doing Supporting the delivery of threat intelligence and vulnerability assessments for global clients in the form of reports, briefings and alerts. Monitoring threat actor activity, emerging vulnerabilities and cyber trends relevant to third-party risk. Contributing to the … and verbal communication skills and can present findings clearly to non-technical audiences. You thrive in a team but can work independently and take initiative. You’re familiar with vulnerability management concepts, including CVEs, patching, and risk prioritisation. Nice-to-Haves Familiarity with supplier or third-party risk management. Knowledge of cyber threat intelligence frameworks and concepts. Experience or More ❯
and make well-considered and informed recommendations to IT Security Manager. Examine security systems and web applications. Monitor security access across the organisation. Assist with conducting security assessments through vulnerability testing and risk analysis within good time and to a high standard. Assist with performing both internal and external security audits. Analyse security logs from various systems for breaches … and collaborating with them to fulfill security requirements. Review daily security logs for abnormal events and escalate them to the IT Security teams in a timely manner. Conduct technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation. Knowledge, skills and experience Essential skills: BSc in Cyber More ❯
with engineering, maintenance and central teams, you'll ensure robust protection of our electrical, automation, and industrial network systems. You'll also drive key initiatives like cyber hygiene programmes, vulnerability assessments, and network monitoring – keeping us ahead of threats and ready to respond. KEY RESPONSIBILITIES Ensure OT assets and industrial control systems are protected against cyber threats. Implement and … support cyber security tools and practices defined in our global OT Cyber Strategy. Lead cyber hygiene and vulnerability management programmes, coordinating remediation where needed. Monitor OT network activity, detect insecure configurations or malicious activity, and take appropriate action. Own the site–level cyber incident response plan – coordinating with stakeholders and ensuring timely resolution. Support compliance efforts related to OT … and SCADA, and have strong knowledge of industrial networks. You have solid grounding in cyber security principles – TCP/IP, common protocols, OSI model, and cyber tooling such as vulnerability scanning, antivirus and endpoint protection. You can lead, influence and guide others – from site technicians to external contractors. You're confident working independently and as part of a broader More ❯