self-motivated individuals for our Technical Operator positions to work closely with our Penetration Testers. You should have multiple years conducting targeting in support of cyber operations, specifically conducting vulnerability research on targets and systems to gain network/system access. You should have experience developing technical operation plans and gaining approval to execute them, briefing options and risks … relate alternative solutions and risks. • Develop routine proposals incorporating appropriate technical and operational issues into a plan based on consensus. • Write correspondence and coordinate with participants regarding operational plans, vulnerability assessments, risk evaluations, possible remedies, or execution plans. When appropriate, prepare intelligence reports following guidelines. • Ability to analyze the operational environment to identify appropriate equipment/systems required to More ❯
Management Office) to ensure appropriate security is assessed within projects alongside overseeing supplier compliance to Howdens needs for Cyber Security Lead with incident management investigations and conduct risk and vulnerability assessments where appropriate. Conduct risk and vulnerability assessments to identify and mitigate security risks Engage with IT projects to perform Security Reviews and ensure findings are appropriately communicated More ❯
and support them to achieve Cyber Essentials and Cyber Essentials Plus certification. Key responsibilities include: Delivering Cyber Essentials and Cyber Essentials Plus assessments for new and existing clients Conducting vulnerability assessments, workstation/server security build reviews and MS 365 security reviews. Maintaining a proactive approach to service delivery and effectively managing a busy workload Providing clear communication to … verbal communication skills Good understanding of networking, including how the OSI model works Proficiency with modern Microsoft Windows operating systems In addition, the following would be desirable: Experience conducting vulnerability scanning or using Nessus/Qualys Experience with ISO 27001 or IASME Cyber Assurance Certifications such as OSCP, CEH, Comptia Security+/Network+, CREST, CISM Linux and Windows command More ❯
to support development and testing. Prepare for CyberSafe authorization in parallel with the system authorizations. Establish Cybersecurity policies IAW security control implementations. Implement a Cybersecurity Plan. Perform asset and vulnerability management via VRAM reporting. Perform vulnerability assessments and system authorization activities through collaboration with SMEs (System Administrators, Network Admins, Lab Managers, Program Managers, and ISSMs). Perform system More ❯
London, England, United Kingdom Hybrid / WFH Options
RSM UK
Security Consultant to join our team. Working alongside our experienced team of specialists, you’ll be delivering offensive security services including digital footprint reconnaissance, social engineering, penetration testing and vulnerability assessments and more to high profile clients across all industries. The purpose of this role is to deliver our offensive security services including digital footprint reconnaissance, social engineering, vulnerabilityMore ❯
to detect and respond to potential threats. Utilise advanced tools and techniques to analyse security data and identify patterns or anomalies that may indicate a security breach. Review regular vulnerability assessments and penetration testing to ensure the robustness of security measures. Ensure rapid response to common incidents: Contribute to incident response plans to address security breaches promptly and effectively. More ❯
and maintain network security measures to protect organization's data and systems - Monitor network traffic for potential security breaches and respond appropriately to incidents - Conduct regular security audits and vulnerability assessments to identify and address security risks - Collaborate with cross-functional teams to implement security policies and procedures - Provide technical support and guidance to IT staff on network security More ❯
and maintain network security measures to protect organization's data and systems - Monitor network traffic for potential security breaches and respond appropriately to incidents - Conduct regular security audits and vulnerability assessments to identify and address security risks - Collaborate with cross-functional teams to implement security policies and procedures - Provide technical support and guidance to IT staff on network security More ❯
to monitor systems and investigate anomalies. Lead the response to security incidents, including root cause analysis and remediation. Produce incident reports and support regular testing of response protocols. Conduct vulnerability assessments and penetration testing, and follow through on remediation. Evaluate, implement, and support key security tools (e.g., IDS/IPS, endpoint protection, patch management). Audit and optimise the More ❯
compliance Owning the TSP Providing consultation on technical security roadmap, including anti-malware, DLP, SIEM, as well as intruder protection and detection systems (IPS/DPS/XDR) Managing vulnerability assessments including regular penetration testing and making recommendations for risk mitigation and implementation of approved changes Providing full support for security incidents You will be the technical security Subject More ❯
mission data correctly into the Mission Assurance Decision Support System (MADSS) Necessary Skills and Knowledge: Must have extensive knowledge of Mission Assurance disciplines to include risk management, mission mapping, vulnerability assessments, and cyber protection strategies (CPT) Must have a detailed understanding of mission analysis techniques, FMA-C methodologies, and mission cyber dependencies Must have the ability to solve complex More ❯
telephony/contact center platforms, and cloud data services. • Define correlation rules and alerts for proactive incident detection and response. Application Security: • Conduct secure code reviews, threat modelling, and vulnerability assessments. • Work with development and operations teams to integrate security into the SDLC and CI/CD pipelines. More ❯
Monitor a range of security systems to detect, assess, and respond to potential threats. Use Microsoft Sentinel to analyse logs and events, identifying patterns and anomalies. Conduct and review vulnerability assessments and penetration tests to maintain a robust defence posture. Incident Response & Management: Contribute to and execute incident response plans, ensuring swift containment and resolution. Collaborate with internal teams More ❯
Enfield, London, United Kingdom Hybrid / WFH Options
Global Technology Solutions Ltd
Monitor a range of security systems to detect, assess, and respond to potential threats. Use Microsoft Sentinel to analyse logs and events, identifying patterns and anomalies. Conduct and review vulnerability assessments and penetration tests to maintain a robust defence posture. Incident Response & Management: Contribute to and execute incident response plans, ensuring swift containment and resolution. Collaborate with internal teams More ❯
Enfield, Middlesex, England, United Kingdom Hybrid / WFH Options
Global Technology Solutions Ltd
Monitor a range of security systems to detect, assess, and respond to potential threats. Use Microsoft Sentinel to analyse logs and events, identifying patterns and anomalies. Conduct and review vulnerability assessments and penetration tests to maintain a robust defence posture. Incident Response & Management: Contribute to and execute incident response plans, ensuring swift containment and resolution. Collaborate with internal teams More ❯
Microsoft 365 services Identity and Access Management: - Manage user identities and access controls in Azure AD and Microsoft 365 - Implement and enforce security policies - Conduct regular security audits and vulnerability assessments Troubleshooting: - Diagnose and resolve technical issues related to Azure and M365 - Provide technical support to end-users Documentation: - Create and maintain documentation for Azure and M365 environments Additional More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
encryption. * Ensure the security and integrity of the organisation's network infrastructure. * Collaborate with various departments to develop and enforce network security policies and procedures. * Conduct security assessments and vulnerability assessments to identify and mitigate potential risks. * Development of OT security solutions * Stay up to date with the latest industry trends and emerging technologies in network security. * Provide support More ❯
encryption. Ensure the security and integrity of the organisation’s network infrastructure. Collaborate with various departments to develop and enforce network security policies and procedures. Conduct security assessments and vulnerability assessments to identify and mitigate potential risks. Development of OT security solutions Stay up to date with the latest industry trends and emerging technologies in network security. Provide support More ❯
and analyse security alerts and logs from various sources (e.g., SIEM and Defender). •Investigate and respond to security incidents, including malware infections, phishing attempts, and unauthorized access. •Conduct vulnerability assessments and assist in patch management and remediation efforts. •Support the implementation and enforcement of security policies, standards, and procedures. •Collaborate with wider IT colleagues and business units to More ❯
security controls and supporting documentation as required for risk management framework (RMF). • Fault finding, analysis and of logging information for reporting of performance exceptions. • Support security incident reporting, vulnerability assessments, and information assurance compliance scans. • Maintain system evaluations and certifications. • Facilitate the creation and maintenance of Identity and Device Management • Provide platform administration for Linux based applications. • Provide More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Marlin Selection
threats. Key Responsibilities Manage and optimise enterprise-grade security tools: WAF, DDoS, email and web security gateways, SIEM, SOAR, EDR, MFA, SSO, IDS/IPS, PAM and more. Perform vulnerability assessments and penetration test remediation. Deliver Cyber Security Awareness Training across the business. Lead ad-hoc security initiatives and projects. Mentor junior security staff and collaborate across IT and More ❯
Institute of Science and Technology Austria (ISTA)
and consultants Profil Bachelor's degree in Cyber Security, Computer Science, Information Systems, or a related field Several years of professional experience in cyber security Proven experience in conducting vulnerability assessments and penetration testing In-depth understanding of security principles, practices, and frameworks, including ISO 27000 series, NIST, and legal obligations like GDPR and NIS2 Experience with security tools More ❯
Institute of Science and Technology Austria (ISTA)
and consultants Profil Bachelor's degree in Cyber Security, Computer Science, Information Systems, or a related field Several years of professional experience in cyber security Proven experience in conducting vulnerability assessments and penetration testing In-depth understanding of security principles, practices, and frameworks, including ISO 27000 series, NIST, and legal obligations like GDPR and NIS2 Experience with security tools More ❯
security configurations • Monitor server performance and troubleshoot issues as they arise • Develop and implement security best practices for Active Directory and Windows Server environments • Conduct regular security audits and vulnerability assessments • Work with the firm's Cybersecurity team to respond to security incidents • Ensure compliance with relevant regulations and standards (e.g., GDPR, HIPAA) • Implement and manage backup and recovery More ❯
security controls and supporting documentation as required for risk management framework (RMF). Fault finding, analysis and of logging information for reporting of performance exceptions. Support security incident reporting, vulnerability assessments, and information assurance compliance scans. Maintain system evaluations and certifications. Facilitate the creation and maintenance of Identity and Device Management Provide platform administration for Linux based applications. Provide More ❯