VulnerabilityManagement Team Lead Rate: £700 - £800 per day ( via Umbrella/Inside IR35 ) Duration: 6-Months initially Location: mostly remote based (occasional travel required to either London or Edinburgh). Overview: Leading retail & commercial bank is looking for a Team Lead to play a key part within … their VulnerabilityManagement division. Responsibilities Engineer a robust and proactive approach wit... APCT1_UKTJ more »
and if applicable direct reports Manage and implement projects relevant to specialist area Manages, develops and coaches team of staff and implement s performance management solutions where required Develop and motivate team to help ensure the delivery of function and business targets Acting as a point of escalation on … Liaise with colleagues to ensure best practice and continual improvement in delivery of service to the business Establishes productive relationships and networks at Senior Management level to build and maintain customer relationships Responsible for managing budget/P&L to maintain spend in line with budgetary limitations Responsible for … Orchestration, CI/CD, Testing etc.) An understanding of Agile Delivery (Kanban/SCRUM/XP/Lean/SAFe) An understanding of DevOps Management (JIRA, Confluence) Awareness of CI/CD tooling such as Jenkins, GitLab or similar Experience of Hashicorp Terraform Experience of Hashicorp Vault Awareness of more »
in projects and operations Work with technical teams baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation and identity and access management (IAM) Work with technical teams develops standards and practices for data encryption and tokenization Draft security procedures and standards to be reviewed and approved … by executive management and/or formally authorised by the chief information security officer (CISO) Threat modelling of services and applications that tie to the risk and data associated with the service or application Key Qualifications: Vast experience in leading/mentoring teams in “secure by design” including a … strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services, identity management, as well as securing CI/CD pipelines. Direct, hands-on experience or a solid working knowledge of relevant security patterns, vulnerabilitymanagement tools, securing public cloud applications. Full more »
be responsible for researching, supporting and configuring to analyse security risks and ensure security policies are in place and being followed. The Role: Handling vulnerabilitymanagement tools, creating reports for fixing issues, and prioritising actions. Investigating incidents and trends, as well as identifying threats using SIEM tools like … Splunk and Microsoft Sentinel. Using IT Service Management tools to classify cyber incidents and analyse trends for management reports. The Candidate: Working knowledge of various security technologies such as network and application firewalls, host intrusion prevention and anti-virus Experience of public cloud infrastructure and cloud delivery models more »
and Managed Services. Our suite of services blends together best-in-breed technologies to provide real time 24×7 monitoring, triage, remediation, threat assessment, vulnerabilitymanagement, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our Security Operations Centre (SOC … levels of service. Collaboration with the Customer at both technical and business levels to underpin the activities of sub-contractors or service provisioning teams. Management of small enhancement projects utilising capabilities within the service team. Management of the handling of incidents, problems and change in their area of … of performance, collection of performance data and investigation of problems and trends. Resolution or escalation of problems, implementation of service improvement actions and programmes, management of these to agreed timelines and ownership of communication to both the Customer and internal management teams. Provision of feedback on service portfolio more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerabilitymanagement platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
of the ever-evolving threat landscape. Here's what you'll be doing: Develop and implement a comprehensive information security program: Think risk assessments, vulnerabilitymanagement, incident response, access control, the whole enchilada. Lead and empower a team of security professionals: Guide, mentor, and inspire your team to more »
Cambridge, England, United Kingdom Hybrid / WFH Options
Opus Talent Solutions
Compliance (GRC): Lead the development and implementation of robust information security policies, procedures, and controls to ensure compliance with industry standards and regulations. Risk Management: Identify, assess, and mitigate information security risks across all facets of our business operations, with a focus on safeguarding sensitive data and intellectual property. … Security Operations: Oversee the day-to-day management of security systems and protocols, including incident response, threat detection, and vulnerability management. Security Awareness: Develop and deliver comprehensive training programs to promote a culture of security awareness and best practices among employees. Vendor Management: Collaborate with third-party … compliance readiness. Qualifications: Bachelor’s degree in information security, Computer Science, or related field (Master's degree preferred). Proven experience in information security management, preferably within the pharmaceutical or healthcare industry. In-depth knowledge of relevant regulatory frameworks, such as ISO, GDPR, HIPAA, and FDA regulations. Strong understanding more »
Employment Benefits + Bonuses Lead cross-functional post-incident process reviews to identify and implement continuous improvement initiatives. Partner with Legal, 2LoD, Major Incident Management, Threat Management, VulnerabilityManagement, Attack Surface Reduction, Software Engineering, Security Architecture, Platform Support both locally and globally. You will have experience … in: Leading the response to complex incidents in a large-scale environments. Years of relevant experience in cyber security operations, incident management or risk management within an enterprise environment. Self-motivated interest in the latest cyber security threats and vulnerabilities and is able to integrate threat intelligence into more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Ada Meher
software and infrastructure security best practices and implementations. You'll also be pivotal in helping gear toward another successful ISO27001 audit and automating security vulnerability management. You'll need demonstrable experience in a similar DevSecOps role; with experience in AWS, Docker/Kubernetes, and Security implementation. Responsibilities Develop DevSecOps … AWS (Accreditations a huge bonus) Demonstrable level of experience with Cyber Security experience (security concepts, practices, and technologies, such as access control, encryption, and vulnerabilitymanagement) Experience with software security and development practices and implementations Python, Bash, or PowerShell Security certification such as CISSP, CEH, OSCP We understand more »
engineer with deep knowledge of security principles in line with the CISSP CBK domains such as security monitoring, intrusion prevention & detection, network security, endpoint management & protection, identity management, threat detection, vulnerability management. Whilst the position entails significant exposure to vendor products and tooling, the incoming engineer should more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
the confidentiality, integrity and availability of information systems are maintained to protect customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Experience 🌳Minimum 5+ years commercial experience more »
customer trust in a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Experience with information security management frameworks (NIST, PCI, GDPR, ISO, OWASP, ITIL, ISF SoGP, COBIT) is essential. The role will involve supporting project managers in risk and issue management … templates is vital. Expertise and experience in technical domains ie hybrid security, infrastructure and data centre security, network security, application security, identity and access management, and vulnerabilitymanagement are important. Experience of influencing and negotiating technical outcomes with third parties, including conflict resolution due to changing priorities. … the clients they are supporting or projects they are deliverable in the UK. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture/ more »
Swindon, England, United Kingdom Hybrid / WFH Options
WHSmith
awareness to mitigate cyber risks and safeguard critical information. What you will be doing Overseeing day-to-day security operations, including monitoring, incident response, vulnerabilitymanagement, and threat intelligence, to maintain a strong security posture and promptly address any security incidents or vulnerabilities Establishing and maintaining cyber security … policies, standards, and procedures, ensuring compliance with industry regulations and best practices, and creating a framework for security governance Working closely with senior management, IT teams, legal and compliance departments, and other stakeholders to align cyber security initiatives with business objectives Providing strategic guidance to senior management, ensuring … in Information Security across IT and business within areas such as PCI-DSS, GDPR, ISO/IEC 27000+, etc. Experience in an Information Security management function and/or related functions (such as IT audit and IT Risk Management) Experience of IT Architecture including the development (and ensuring more »
robust controls. Requirements: Deep understanding of security engineering and implementing security controls Hands on experience of SecOps and security systems Understanding of threat detection, Vulnerabilitymanagement Cloud & network security Scripting experience - Preferably Python Ability to lead projects and resolve complex issues Please note you will need to travel more »
VulnerabilityManagement & Risk Specialist – London hybrid - £70,000 - £80,000 + Benefits Locke & McCloud are looking for an experienced VulnerabilityManagement Risk Specialist to join our clients growing Cyber Security function. In this role you will work with our clients various vendors and 3rd party suppliers … to manage security risks internally and externally, in addition to participating in incident response and vulnerabilitymanagement activities. We are looking for people who have a strong background in managing risks with vendors, incident response, vulnerabilitymanagement, and stakeholder management. Main Responsibilities: Collaborate across various teams … to establish and maintain an effective vulnerabilitymanagement program. Identify, prioritise, and assess vulnerabilities across our clients infrastructure, systems, and applications. Develop and implement strategies to mitigate risks associated with identified vulnerabilities. Coordinate with vendors to assess and manage risks associated with third-party products and services. Lead more »
members of the team and fulfil this opportunity? Responsibilities: Provide support and consultation across all elements of Cyber Security including Threat intelligence, cyber risk management, security operations, data loss and fraud preventions, IDAM, vulnerabilitymanagement and more. Arrange materials for the Cyber Risk and Information Security committee … and manage the Security operations - KPIs/KRIs, threat analysis, ensuring quality of security control operations, develop security tooling etc. Responsible for the risk management and Governance Develop the NIST-based Cyber Security framework to recognise key risks, mitigations, and improvements to the security posture. Conduct risk assessments Required more »
Birmingham, England, United Kingdom Hybrid / WFH Options
Recruit with Purpose
security principles are applied during project design to reduce risk. Education, Qualifications & Experience Required: proficiency in security technologies such as Microsoft XDR stack and vulnerabilitymanagement tools. in SIEMS (Azure Sentinel) and Powershell Automation. exposure to enterprise networking and infrastructure technologies. one of more relevant Cyber Security qualification more »
Windows 7/10/11 and Office 365 suite ***Active Directory, Group Policy and SharePoint ***Skills in OS builds, SSCM, packaging, configuration and vulnerability management. ***Exchange, SQL, Cisco Call manager Desirable skills: ***Knowledge of finance applications such as Bloomberg & Eikon ***Microsoft Intune or other MDM tools PowerShell or more »
to agreed service levels, compliance requirements in line with business needs. Supports shift left initiative – providing supporting documentation for L1 services Provides proactive problem management and engages in continuous improvement. Manages 3rd party warranty contracts and relationships for all end user IT equipment ensuring all incidents be logged with … OKTA, Multi-Factor Authentication Active Directory Services, Group Policy Manager, Enterprise printing and Enterprise Telephony Corporate Security Administration Obligations including AV, VPN, Rapid 7 Vulnerability Mgmt. Mobile device Technologies, Management and encryption, Mobile Iron DESIRABLE ITIL SCRUM RELEVANT CAREER HISTORY/EXPERIENCE NECESSARY TO FULFILL THE JOB ROLE … Demonstrable experience with enterprise class software solutions. DESIRABLE Relevant and most recent professional IT certification is desirable, though not critical. COMPETENCIES (RELATING TO PERFORMANCE MANAGEMENT SCHEME COMPETENCY MODEL) Customer Obsession : With an intense focus on our customers, we will do what is in our power to establish and maintain more »
different data sources and tools for analysis. · Previous experience of mentoring or leading SOC analysts is desirable but not essential. · Experience of risk-based vulnerabilitymanagement is desirable. What do we offer? 25 days PTO + bank holidays Your birthday off Private Medical Insurance Electric Vehicle (EV) scheme more »
Vulnerability Analyst £55,000 Leeds Are you passionate about cybersecurity and ready to make an impact? Join my clients team in Leeds as a Vulnerability Analyst and play a crucial role in fortifying their defences against evolving threats. You will bride the communication gap between technical teams and … senior leadership, ensuring that security protocols remain effective and aligned with business objectives. To succeed in this role, you'll need strong experience in vulnerability analysis or a related role. You must be able to show proficiency in vulnerability scanning tools and technologies, as well as a solid … excellent communication skills to convey technical information to non-technical audiences. Offensive security certifications are a definite plus. This is your chance to expand vulnerabilitymanagement across new horizons within their business, ensuring that security is not just integrated but ingrained in every facet. Don't miss out more »
and security assurance testing, as well as configuring and fine tuning cyber security tools and solutions including preventative and detective measures for example firewalls, vulnerabilitymanagement tools, and EDR. Skills You will have worked as a Cyber Security Engineer or in a similar position. You will have experience … in a broad variety of technology including AWS, Microsoft 365, internet protections, vulnerabilitymanagement, SIEM, EDR. Experience securing on premises infrastructure and cloud services. Experience working with Systems Engineering teams, DevSecOps, CI/CD Senior Security Engineer - Onsite - £100K more »
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Idox plc
best practice, quality assurance and governance, as appropriate for each project. The SecOps Engineer will take a proactive approach to security matters and risk management, leading investigations, root cause analysis and vulnerabilities under the guidance of the cloud architecture team. There may be an opportunity to develop a management … Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. VulnerabilityManagement: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage … automated scanning tools to ensure continuous security monitoring. Secure Configuration Management: Establish and enforce secure configuration standards for EC2 instances, Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Automate configuration management processes using infrastructure-as-code tools (Terraform). Security Compliance: Ensure AWS infrastructure and applications comply more »
VulnerabilityManagement Team Lead Rate: £700 - £800 per day ( via Umbrella/Inside IR35 ) Duration: 6-Months initially Location: mostly remote based (occasional travel required to either London or Edinburgh). Overview: Leading retail & commercial bank is looking for a Team Lead to play a key part within … their VulnerabilityManagement division. Responsibilities Engineer a robust and proactive approach within the VulnerabilityManagement division of our client's Information Security team. Identify strategic risks and devise controls to mitigate external threats. Provide vital oversight to identify and manage critical risks. Step in to enhance … our client's existing VulnerabilityManagement processes, a large part of which will involve vulnerability patching. Revolutionise their reporting processes by bringing your PowerBI skills to the fore. Primarily focus on the physical infrastructure, with future opportunities targeting cloud environment advancements. Develop and implement measures ensuring application more »