Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerabilitymanagement platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
On-Site About Our Client: Our client is an award-winning provider of Security Services, specializing in market-leading Cyber Security Services such as VulnerabilityManagement, Information Security, PCI-DSS, Penetration Testing, Managed Security Services, and Security Consultancy. With their fully managed Security Operations Centre (SOC), they are more »
Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM, EDR and VulnerabilityManagement tools Direct communication with customers on threats and alerts Providing customers with reports and presenting findings Assistance with active directory administration. Assistance more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
ensure that our cloud infrastructure is secure and compliant with industry standards and regulations. You will also monitor and respond to security incidents, perform vulnerability assessments and penetration testing, and develop and maintain security policies and procedures. Responsibilities: Support the LCST Security Working Groups which require close co-operation … AWS architecture best practices and best-in-class security standards Review relevant Cyber Risk alerts/notifications and MODCERT notices, assess impact on and vulnerability of our solution, define actions to take and work with the technical teams to design, and implement mitigating solutions within required timeframes Duties may … monitoring and operating intrusion detection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and support penetration testing. Develop and maintain security policies and procedures Collaborate with development and operations teams to ensure security best practices are more »
Doncaster, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ?Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ?Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and VulnerabilityManagement tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
currently looking for a Cyber Security Engineer to join their team and hit the ground running - delivering a suite of technical, operational, and risk management services. Collaborating closely with regional teams, you'll ensure compliance with industry standards, policies, and procedures, while actively mitigating evolving threats, thus driving forward … Engage in 'ethical hacking', for example, simulating security breaches Foreseeing future problem areas by monitoring workflows and network traffic patterns Monitor identity and access management, including monitoring for abuse of permissions by authorised system users Acting as an escalation point to analysts Threat hunting Vulnerabilitymanagement Skills more »
automation, IaC and security by design. There's a broad range of responsibilities including handling requests related to system administration, operations governance, threat/vulnerabilitymanagement and incident response, you'll collaborate with engineering teams to evaluate and identify optimal cloud solutions providing subject matter expertise across a … of DevOps and IaC concepts You have a good understanding of cloud based security (e.g. ISO27001, NIST, CIS, OWASP, SOC2) and Identity and Access Management (IAM) within Azure You're familiar with ARM templates and/or Pulumi You have automation and scripting (PowerShell or similar) skills You're more »
of the ever-evolving threat landscape. Here's what you'll be doing: Develop and implement a comprehensive information security program: Think risk assessments, vulnerabilitymanagement, incident response, access control, the whole enchilada. Lead and empower a team of security professionals: Guide, mentor, and inspire your team to more »
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerabilitymanagement the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and … monitor for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular Vulnerability Scanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. more »
identified vulnerabilities and weaknesses. Develop & establish supplier chain security agreements/contracts/questionnaires and manage completion and disengagement. Ensure timely and robust incident management resolution, including major incident response coordination and management. Stay informed about emerging cybersecurity threats and trends, providing recommendations for proactive risk mitigation and threat … CISA, CISM, etc.) are a plus. Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft XDR stack, vulnerabilitymanagement tools, EDR platforms, SIEMs (Splunk/Azure Sentinel), Powershell etc. Strong analytical and problem-solving skills, with the ability to effectively prioritise more »
I'm on the lookout for an Infrastructure Engineer specialist with a strong background in cloud services and modern IT infrastructure management, specifically within the Microsoft ecosystem to join my client based just outside of Cirencester. and easily commutable from Swindon. Their office is in a beautiful location with … desktop infrastructure. Your skill set should encompass the entire Microsoft 365 Suite and MS Azure, along with a good knowledge of email security platforms, vulnerabilitymanagement, and IT networking techniques as they currently work towards their Cyber essentials plus certification. They are in the process of upgrading their more »
with resolutions. Keeping company up to date and compliant with industry best practice, policies, and guidelines. Managing penetration tests. End to end threat and vulnerability management. Rolling out, managing, and configuring a range of network security tools and appliances. Key Skills: SIEM Tenable.io/Nessus IDS/IPS, MFA more »
of business goals in order to constructively engage senior business leaders on information security, identifying key threats and areas for improvement, driving appropriate risk management decisions and collaborating with partners to achieve positive outcomes and business benefits Ensure emerging information and cyber security threats to the business are identified … and with internal and external audit functions. Ensure timely delivery of actionable threat intelligence across the organisation, including key stakeholders; Security Operations, Incident Response, VulnerabilityManagement, Security Leadership, Fraud Prevention and Industry intelligence communities. Continuous Improvement through the delivery of; Provide mentoring and development of Threat Intelligence Analysts … and processes such as run books that help the team achieve outstanding results. Championing and supporting Group Security's wider BCM, Incident and Crisis Management functions. Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited more »
Salford, England, United Kingdom Hybrid / WFH Options
Talent
incidents. What will your day look like? Work closely with stakeholders both internally and externally Implementation of security measures and advise on best practices Vulnerabilitymanagement Oversee the design and deployment of security controls Your background? Confident in IT Security Management with a strong focus on development more »
ISO 27001, 27002, as well as regulations such as the Data Protection Act and GDPR Proficiency in Microsoft O365 Security solutions, networking, security operations, vulnerabilitymanagement, and security auditing Solid grasp of security testing principles, including hands-on experience with vulnerability scanning, risk identification, resolution, and reporting more »
to upskill your abilities to ensure you excel in your career. Skills: Hands on experience as a Cyber Security Analyst/Engineer Experience with VulnerabilityManagement (Tenable) Experience in Application Security Exposure to Threat intelligence (Rapid7) Must have Stakeholder engagement experience Strong communication skills Adaptable mentality Understanding of more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
one or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identity and access management , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and negotiating technical outcomes … with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group – Carbon positive tech recruitment more »
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
undocumented network protocol or the grammar of a new programming language. Other responsibilities includes as below Scope and execute in-depth security assessments and vulnerability research across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic … achieving long term goals (for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances … analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerabilitymanagement, risk assessments, bug bounty hunting, malware analysis, forensics OSCP, OSWE certification, or interest in achieving certification Experience navigating and working with extremely more »
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Interact Consulting Limited
pipelines and integrating security tooling. Scripting Responsibilities will include Lead efforts to assess the current security posture of Azure infrastructure, encompassing Azure resources, processes, vulnerabilitymanagement tools, and techniques. Collaborate with the wider Infosec team and any third-party consultants engaged by MWI to provide recommendations based on … into CI/CD pipelines. Maintain an active risk registry and devise a plan to address identified issues in order of priority, ensuring proactive management of security risks. Please apply now more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Ada Meher
software and infrastructure security best practices and implementations. You'll also be pivotal in helping gear toward another successful ISO27001 audit and automating security vulnerability management. You'll need demonstrable experience in a similar DevSecOps role; with experience in AWS, Docker/Kubernetes, and Security implementation. Responsibilities Develop DevSecOps … AWS (Accreditations a huge bonus) Demonstrable level of experience with Cyber Security experience (security concepts, practices, and technologies, such as access control, encryption, and vulnerabilitymanagement) Experience with software security and development practices and implementations Python, Bash, or PowerShell Security certification such as CISSP, CEH, OSCP We understand more »
Birmingham, West Midlands (County), United Kingdom Hybrid / WFH Options
Avanti Recruitment
considered Kubernetes – proven production experience, autoscaling, overprovisioning etc. Serverless - Lambda Scripting for automation Good knowledge of Cloud Security – Security hub, guard rails, RBAC, IAM, vulnerabilitymanagement, Patch Management. A Security first mentality to ensure Security is built into all elements of their platforms. Linux Server Administration – Command Line more »
Birmingham, England, United Kingdom Hybrid / WFH Options
Recruit with Purpose
security principles are applied during project design to reduce risk. Education, Qualifications & Experience Required: proficiency in security technologies such as Microsoft XDR stack and vulnerabilitymanagement tools. in SIEMS (Azure Sentinel) and Powershell Automation. exposure to enterprise networking and infrastructure technologies. one of more relevant Cyber Security qualification more »
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help engineering teams identify security-related weaknesses … IT security in one or more of the following areas: software/product security assessments, penetration testing, red teaming, web application assessments Interest in vulnerability research and exploit development Demonstrable experience in designing and evaluating complex systems for security Aptitude for self-study, setting and achieving long term goals … for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances are not required, and more »
Leeds, England, United Kingdom Hybrid / WFH Options
Ada Meher
aligned deployment pipelines, as well as further securing their platform. You'll be working hevilty with the AWS ecosystem and help in automating security vulnerability management. You can expect a salary of up to £90,000, 25 days holiday plus bank holidays, Shares, flexible working hours, remote working and more »
Engineer would have strong Wintel experience and strong experience with VMWare and Active Directory. The infrastructure Engineer would have capabilities of BAU work and vulnerability and change management. This role in predominantly BAU focussed and will require someone to backup their troubleshooting techniques. Primary day to day responsibilities for … Apply online only)) Virtualisation (VMware) – configuration, migration, support Active Directory (AD) – Implement, support and configuration. Citrix XenApp and Desktop, AppSense User and Application Manager. Vulnerabilitymanagement – Patching and fixing vulnerabilities on servers Powershell scripting Change management – minimizing disruptions to IT services while making changes to critical systems. more »