Security Experience of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerabilitymanagement, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent more »
with resolutions. Keeping company up to date and compliant with industry best practice, policies, and guidelines. Managing penetration tests. End to end threat and vulnerability management. Rolling out, managing, and configuring a range of network security tools and appliances. Key Skills: SIEM Tenable.io/Nessus IDS/IPS, MFA more »
of business goals in order to constructively engage senior business leaders on information security, identifying key threats and areas for improvement, driving appropriate risk management decisions and collaborating with partners to achieve positive outcomes and business benefits Ensure emerging information and cyber security threats to the business are identified … and with internal and external audit functions. Ensure timely delivery of actionable threat intelligence across the organisation, including key stakeholders; Security Operations, Incident Response, VulnerabilityManagement, Security Leadership, Fraud Prevention and Industry intelligence communities. Continuous Improvement through the delivery of; Provide mentoring and development of Threat Intelligence Analysts … and processes such as run books that help the team achieve outstanding results. Championing and supporting Group Security's wider BCM, Incident and Crisis Management functions. Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
ensure that our cloud infrastructure is secure and compliant with industry standards and regulations. You will also monitor and respond to security incidents, perform vulnerability assessments and penetration testing, and develop and maintain security policies and procedures. Responsibilities: Support the LCST Security Working Groups which require close co-operation … AWS architecture best practices and best-in-class security standards Review relevant Cyber Risk alerts/notifications and MODCERT notices, assess impact on and vulnerability of our solution, define actions to take and work with the technical teams to design, and implement mitigating solutions within required timeframes Duties may … monitoring and operating intrusion detection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and support penetration testing. Develop and maintain security policies and procedures Collaborate with development and operations teams to ensure security best practices are more »
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
real-world experience. Worked on a Managed Security Service previously. Previous experience of working as a Cyber Security Consultant across multiple customers. Microsoft stack, vulnerabilitymanagement tools (Nessus and Rapid 7), EDR platforms, SIEMs. Previous experience of delivering security projects, including implementation and post- implementation support, providing guidance … and support to customers throughout. Experience of overseeing and leading remediation of security assessments, technical testing, and vulnerability analysis including Cyber Essentials, Cyber Essentials Plus, and NIST CSF. Responsibilities: Deliver the technical and advisory aspects of our Managed Security Service across the customer base. Join security incident response calls more »
Salford, England, United Kingdom Hybrid / WFH Options
Talent
incidents. What will your day look like? Work closely with stakeholders both internally and externally Implementation of security measures and advise on best practices Vulnerabilitymanagement Oversee the design and deployment of security controls Your background? Confident in IT Security Management with a strong focus on development more »
ISO 27001, 27002, as well as regulations such as the Data Protection Act and GDPR Proficiency in Microsoft O365 Security solutions, networking, security operations, vulnerabilitymanagement, and security auditing Solid grasp of security testing principles, including hands-on experience with vulnerability scanning, risk identification, resolution, and reporting more »
About this Role Role Title: Threat & Vulnerability Lead Location: UK- London La Fosse Associates are working with a global Insurance business who are looking to add a Threat & Vulnerability Lead to their strong internal security function. You will report directly into the BISO and be a senior individual … within their existing team. You will be joining the UK entity of their Security team to lead on vulnerability scanning and threat intelligence reporting. They are a large organisation with a huge amount of vulnerabilities and need somebody who understands how to approach on this scale. You will be … in the business to ensure security is prioritised Work on and lead penetration tests across the global estate Requirements: Hands on experience working with vulnerabilitymanagement technology- preferably Qualys Direct experience working within a regulated in-house security team Understanding and knowledge of different security frameworks- MITRE ATT more »
as part of a collaborative and innovative team where you will be hands-on with various Security & Infrastructure products including Azure, WAF, Internet protection, Vulnerabilitymanagement, SIEM, Firewalls, CASB and EDR. Within this role, you will work with the team to engage and technically support in driving performance more »
solving, and root-cause analytical (RCA) skills. Good working knowledge of Cisco Meraki and associated technologies. Practical knowledge of Continual Service Improvement (CSI) methodologies. Vulnerabilitymanagement and assessment. Intrusion detection and prevention analysis/frameworks. Solid exposure to cloud based applications security and provisioning. Experience in writing policy more »
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Ocado Technology
activities.Ensure that operational processes are defined, documented and maintained.Ensure that the security systems used by the security operations team are supported and maintained.Run the vulnerabilitymanagement and penetration test programs.Develop and implement a roadmap to further extend the scope and capability of the SecOps function.Develop KPIs for the more »
cyber security architecture. - Deliver subject matter expertise to key stakeholders to drive the implementation of security controls to meet the target architecture. - Accountable for vulnerability scanning, including the prioritisation of unpatched vulnerabilities and reporting against agreed KPIs and KRIs. - Support the annual penetration testing schedule by arranging penetration testing … improvement work to automate and improve critical cyber security processes such as monitoring, patching, and hardening. - Develop and maintain process documentation for security architecture, vulnerabilitymanagement, cyber incident response, and playbooks. - Provide security representation across multiple geographies, business units and teams to achieve objectives, including engagement with the … Problem solving skills, and the ability to come up with new solutions to existing challenges. - Strengths in key ‘soft skill’ areas such as relationship management, communication, and presentation of technical security information to a variety of audiences. - Technical skills to investigate potential breaches through existing tools, packet capture and more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
one or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identity and access management , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and negotiating technical outcomes … with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group – Carbon positive tech recruitment more »
I'm on the lookout for an Infrastructure Engineer specialist with a strong background in cloud services and modern IT infrastructure management, specifically within the Microsoft ecosystem to join my client based in Cirencester. The company is well-established and financially very secure The ideal person will be comfortable … desktop infrastructure. Your skill set should encompass the entire Microsoft 365 Suite and MS Azure, along with a deep knowledge of email security platforms, vulnerabilitymanagement, and IT networking techniques. They are currently transitioning from a hybrid to a cloud-centric infrastructure , They are in the process of … of a whole host of legacy infrastructure and the adoption of new private cloud solutions. Part of your responsibilities will include the creation and management of detailed documentation covering infrastructure setups, operational processes, and guidelines. Additionally, you should possess the ability to demystify technical concepts for a non-technical more »
Title: Security Engineer Salary: £80,000 to £100,000 We are seeking a Security Engineer, for a fast-growing FinTech firm, specialising in Wealth Management and Financial Advisory. As the first dedicated cybersecurity professional you'll play a pivotal role in establishing and fortifying the firm's cybersecurity infrastructure. … development processes. Conduct thorough reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerabilitymanagement, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Develop and … Familiarity with distributed event stores such as Apache Kafka. Proficiency with operating systems (e.g., Linux) and command-line interfaces. Experience with network security, incident management, and penetration testing. Familiarity with automated cloud-based CI/CD pipelines and secure software design principles. In addition to your technical prowess, we more »
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Interact Consulting Limited
pipelines and integrating security tooling. Scripting Responsibilities will include Lead efforts to assess the current security posture of Azure infrastructure, encompassing Azure resources, processes, vulnerabilitymanagement tools, and techniques. Collaborate with the wider Infosec team and any third-party consultants engaged by MWI to provide recommendations based on … into CI/CD pipelines. Maintain an active risk registry and devise a plan to address identified issues in order of priority, ensuring proactive management of security risks. Please apply now more »
software and infrastructure security best practices and implementations. You'll also be pivotal in helping gear toward another successful ISO27001 audit and automating security vulnerability management. You'll need demonstrable experience in a similar DevSecOps role; with experience in AWS, Docker/Kubernetes, and Security implementation. Responsibilities Develop DevSecOps … AWS (Accreditations a huge bonus) Demonstrable level of experience with Cyber Security experience (security concepts, practices, and technologies, such as access control, encryption, and vulnerabilitymanagement) Experience with software security and development practices and implementations Python, Bash, or PowerShell Security certification such as CISSP, CEH, OSCP We understand more »
I'm on the lookout for an Infrastructure Engineer specialist with a strong background in cloud services and modern IT infrastructure management, specifically within the Microsoft ecosystem to join my client based just outside of Cirencester. and easily commutable from Swindon. Their office is in a beautiful location with … desktop infrastructure. Your skill set should encompass the entire Microsoft 365 Suite and MS Azure, along with a good knowledge of email security platforms, vulnerabilitymanagement, and IT networking techniques as they currently work towards their Cyber essentials plus certification. They are in the process of upgrading their more »
the team on a full time, permanent basis. You will be leading and delivering crucial projects for their clients including Risk Assessments, Security Controls, VulnerabilityManagement, acting as their Security Subject Matter Expert. Key requirements: 🟢 Previous background working within the Public/Defence sector 🟢 Strong understanding of Network more »
Birmingham, West Midlands (County), United Kingdom Hybrid / WFH Options
Avanti Recruitment
considered Kubernetes – proven production experience, autoscaling, overprovisioning etc. Serverless - Lambda Scripting for automation Good knowledge of Cloud Security – Security hub, guard rails, RBAC, IAM, vulnerabilitymanagement, Patch Management. A Security first mentality to ensure Security is built into all elements of their platforms. Linux Server Administration – Command Line more »
Birmingham, England, United Kingdom Hybrid / WFH Options
Recruit with Purpose
security principles are applied during project design to reduce risk. Education, Qualifications & Experience Required: proficiency in security technologies such as Microsoft XDR stack and vulnerabilitymanagement tools. in SIEMS (Azure Sentinel) and Powershell Automation. exposure to enterprise networking and infrastructure technologies. one of more relevant Cyber Security qualification more »
CISSM, CISSP. CEH (Desirable) CCNA or equivalent certified. Expired certifications are acceptable. Microsoft Server Experience particularly with SCCM and Intune. Experience in using Tenable VulnerabilityManagement System. Experience with Coding/Scripting at a basic level. Strong knowledge of Information Security and related processes. Experience in getting previous more »
CISSM, CISSP. CEH (Desirable) CCNA or equivalent certified. Expired certifications are acceptable. Microsoft Server Experience particularly with SCCM and Intune. Experience in using Tenable VulnerabilityManagement System. Experience with Coding/Scripting at a basic level. Strong knowledge of Information Security and related processes. Experience in getting previous more »
Windows 7/10/11 and Office 365 suite ***Active Directory, Group Policy and SharePoint ***Skills in OS builds, SSCM, packaging, configuration and vulnerability management. ***Exchange, SQL, Cisco Call manager Desirable skills: ***Knowledge of finance applications such as Bloomberg & Eikon ***Microsoft Intune or other MDM tools PowerShell or more »
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help engineering teams identify security-related weaknesses … IT security in one or more of the following areas: software/product security assessments, penetration testing, red teaming, web application assessments Interest in vulnerability research and exploit development Demonstrable experience in designing and evaluating complex systems for security Aptitude for self-study, setting and achieving long term goals … for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances are not required, and more »