THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerabilitymanagement programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerabilitymanagement experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
at Camp Roberts in San Miguel, California. Job Responsibilities include: Supports our Army customer by providing a critical cybersecurity role by ensuring continuous monitoring in accordance with DoD Risk Management Framework (RMF), and through system monitoring and analysis support for the detection of cyber incidents and provides recommendations on how to correct findings. This role combines the duties of … Assessment Reports (SARs), Risk Assessment Reports (RARs), and Plan of Action and Milestones (POA&Ms). Conduct security control assessments and facilitate ongoing authorization (ATO/ATC) activities. Lead vulnerability and compliance assessments using automated tools (e.g., ACAS, STIG Viewer) and ensure all findings are remediated or tracked via POA&Ms. Monitoring security logs, analyzing and reporting cyber incidents … experience. Security+, or other DoD 8570/8140 IAT Level II certification. Ability to work on-site daily. eMASS experience. Experience or familiarity with the ATO process. Familiarity with vulnerabilitymanagement tools such as ACAS, STIG Viewer, and SCAP Compliance Checker. Familiarity with (DRAGOS, Corelight, Splunk, Snort). Proficiency in analyzing security events, logs, and alerts from various More ❯
on experience) Summary: Verigent's client is seeking a Cybersecurity Analyst with an active Secret clearance to support critical cybersecurity operations in Portsmouth, VA. This position requires expertise in vulnerabilitymanagement, incident response, risk analysis, and compliance with DoD and DON cybersecurity standards. The analyst will be responsible for monitoring, analyzing, and mitigating cyber risks, supporting contingency planning … and maintaining day-to-day VRAM (Vulnerability Remediation Asset Management) activities. The role also involves working with key security tools such as ACAS, HBSS, MDE, MDI, and Splunk, while ensuring compliance with federal, DoD, and Navy cybersecurity policies and directives. The ideal candidate will hold a bachelor's degree in IT or a related field (or equivalent DoD … 8570.01M certification such as Security+ or higher), and have at least four years of cybersecurity experience in system/network vulnerability analysis, risk mitigation, and security test & evaluation. Strong knowledge of INFOSEC concepts, firewall policy, ports & protocols, and Navy-specific security requirements (e.g., OPNAVINST N9210.3) is essential. Responsibilities: • Perform cybersecurity analysis in support of incident response, threat detection, and More ❯
to protect against evolving threats. What you'll do As part of a team of analysts, you'll be responsible for the overall day-to-day technical and operational management of cyber and information security within the University. This includes operating within a hybrid Security Operations Centre (SOC) model, leading the investigation and resolution of cyber security incidents, and … continuous monitoring across the University. Conduct proactive threat hunting activities to detect advanced threats and anomalous behaviour within the University's network, and provide solutions to support incident response, vulnerabilitymanagement, and strategic security decisions. Collaborate with third-party providers to scope, coordinate, and review network security assessments, and ensure that findings and recommendations are effectively prioritised, communicated … documented and implemented to improve the University's security posture. Support the network vulnerabilitymanagement process by identifying, assessing, and prioritising security vulnerabilities, and working with relevant teams and third parties to ensure timely remediation through patching, configuration changes, or other appropriate fixes. Design, implement, and support technical security controls to defend University network systems against security threats More ❯
Southampton, Hampshire, South East, United Kingdom
University of Southampton
Cisco technologies, to protect against evolving threats. What youll do - As part of a team of analysts, youll be responsible for the overall day-to-day technical and operational management of cyber and information security within the University. This includes operating within a hybrid Security Operations Centre (SOC) model, leading the investigation and resolution of cybersecurity incidents, and co … continuous monitoring across the University. - Conduct proactive threat hunting activities to detect advanced threats and anomalous behaviour within the University's network, and provide solutions to support incident response, vulnerabilitymanagement, and strategic security decisions. - Collaborate with third-party providers to scope, co-ordinate, and review network security assessments, and ensure that findings and recommendations are effectively prioritised … communicated, documented and implemented to improve the Universitys security posture. - Support the network vulnerabilitymanagement process by identifying, assessing, and prioritising security vulnerabilities, and working with relevant teams and third parties to ensure timely remediation through patching, configuration changes, or other appropriate fixes. - Design, implement, and support technical security controls to defend University network systems against security threats More ❯
our Army customer in San Antonio, Texas Job Responsibilities include: Supports our Army customer by providing a critical cybersecurity role by ensuring continuous monitoring in accordance with DoD Risk Management Framework (RMF), and through system monitoring and analysis support for the detection of cyber incidents and provides recommendations on how to correct findings. This role combines the duties of … Assessment Reports (SARs), Risk Assessment Reports (RARs), and Plan of Action and Milestones (POA&Ms). Conduct security control assessments and facilitate ongoing authorization (ATO/ATC) activities. Lead vulnerability and compliance assessments using automated tools (e.g., ACAS, STIG Viewer) and ensure all findings are remediated or tracked via POA&Ms. Monitoring security logs, analyzing and reporting cyber incidents … experience. Security+, or other DoD 8570/8140 IAT Level II certification. Ability to work on-site daily. eMASS experience. Experience or familiarity with the ATO process. Familiarity with vulnerabilitymanagement tools such as ACAS, STIG Viewer, and SCAP Compliance Checker. Familiarity with (DRAGOS, Corelight, Splunk, Snort). Proficiency in analyzing security events, logs, and alerts from various More ❯
with users. Escalate issues appropriately and manage major incidents in line with agreed processes. Provide outstanding customer service, maintaining accurate records and regular updates. Support problem, change, and project management activities, representing the Service Desk where required. Manage and document IT assets, processes, and knowledge bases. Contribute to vulnerabilitymanagement, regulatory compliance, and audit requirements. Assist in … written and verbal communication skills, with the ability to explain technical issues to non-technical audiences. Desirable Skills: Experience in financial services or multi-site support environments. Exposure to vulnerabilitymanagement tools (e.g., Qualys) and remote access administration. Experience with Microsoft Power Apps and automation of Service Desk processes. ITIL 4 Foundation and/or Service Desk Analyst More ❯
stakeholders and providing clear, actionable reporting. Skills & experience sought: Strong background in IT Security, Cyber Assurance, or IT Audit. Hands-on knowledge across areas such as governance, IAM, threat management, vulnerabilitymanagement, and incident response. Good understanding of security frameworks (e.g. ISO27001, NIST, PCI-DSS, SOX). Experience engaging with senior stakeholders within complex environments. Relevant certifications More ❯
stakeholders and providing clear, actionable reporting. Skills & experience sought: Strong background in IT Security, Cyber Assurance, or IT Audit. Hands-on knowledge across areas such as governance, IAM, threat management, vulnerabilitymanagement, and incident response. Good understanding of security frameworks (e.g. ISO27001, NIST, PCI-DSS, SOX). Experience engaging with senior stakeholders within complex environments. Relevant certifications More ❯
requires a thorough understanding of the technology underpinning the Trust digital systems, as well as a broad, up-to-date knowledge of information security frameworks, pertinent regulation and legislation, vulnerabilitymanagement, incident management and response, secure development techniques and approaches, Cyber Security engineering and operations, and management and governance of Cyber risk and Cyber Security. Please … using a range of IT applications Significant evidence of continued professional development Desirable ITIL Qualification COBIT Knowledge and Experience Essential Proven and significant leadership experience and/or formal management qualification Demonstrated expertise in an IT Security environment Direct experience of strategic and budgetary planning and financial management and controls Previously worked within the NHS A good practical … knowledge of security technologies and wider business solutions including Firewalls, IDS/IPS, Identity and access management, SIEM, remote working and cloud technologies Proven experience of working at a senior level leading and delivering IT Security in a sensitive and complex environment which is undergoing significant change Experience of delivering presentations to large groups of stakeholders Demonstrable commitment to More ❯
secure cloud environments that allow the best companies to move faster. SUMMARY Wiz is looking for a Security Engineer for Product & Production Infrastructure who has experience performing security reviews, vulnerabilitymanagement, and detection and response operations in cloud-native environments. You'll get to collaborate with our software development and DevOps teams to secure Wiz's products, CI … modeling and security review exercises across Wiz's production and CI/CD environments - identifying and mitigating risks in our products and the cloud services that support them Drive vulnerabilitymanagement and remediation efforts - prioritizing issues, implementing mitigations, and designing strategic preventative controls Extend our detection and response capabilities - building scalable solutions to identify malicious activity, triage alerts … Azure and GCP) Kubernetes (AWS EKS) and container infrastructure IAM and managing cloud identities at-scale Secure development and application of IAC solutions (Terraform, Helm) Cloud-native observability and management tools Development experience in Go, Python and Rust PREFERRED QUALIFICATIONS Bachelor's degree in computer science or a related field and/or candidates with equivalent job experience in More ❯
Atlanta, Georgia, United States Hybrid / WFH Options
Burgeon IT Services
Cybersecurity Specialist 3 to lead the development, delivery, and optimization of IT security standards, best practices, and system architecture. This role focuses on advanced threat hunting, complex incident response, vulnerabilitymanagement, and security design to protect critical state systems and sensitive data. Key Responsibilities: Proactively hunt for advanced threats that bypass automated detection tools. Investigate, triage, and respond … to complex security incidents; conduct root cause analysis. Perform vulnerability assessments and analyze asset discovery data for security gaps. Design and implement security architecture and recommend improvements. Monitor networks and systems for unauthorized activities and respond to incidents. Optimize cybersecurity tools (SIEM, EDR, IDS) and integrate new technologies. Incorporate threat intelligence feeds into platforms to enhance detection. Required Skills … years of proven success in technology leadership with focus on information security and data governance. Hands-on expertise with SIEM, EDR, IDS, and network monitoring tools. Strong knowledge of vulnerabilitymanagement tools and practices. Advanced understanding of threat intelligence, incident response, and proactive defense. Excellent analytical, problem-solving, and documentation skills. Working Conditions: Hybrid work model (onsite in More ❯
day infrastructure and security operations across our hybrid environment. In addition, you'll also take ownership for the delivery of key governance activities including risk assessments, audits, compliance checks, vulnerabilitymanagement and cyber incident response. Working closely with the Head of IT, you'll support the development of long-term plans while taking full ownership of technical delivery. … Azure (IaaS, PaaS, networking, storage, compute, security and monitoring) Networking technologies (firewalls, VPNs, LAN/WAN, DNS/DHCP, TCP/IP, virtualisation) Enterprise security tools (SIEM, endpoint protection, vulnerabilitymanagement, XDR, MDM, IDPS) Backup, replication and disaster recovery solutions Microsoft services such as Windows Server, Intune, Autopilot, Entra ID, Defender, Exchange and SharePoint You'll have proven More ❯
Configure and administer Defender policies (AV, EDR, ASR, AIR), dashboards, exclusions, and reporting to ensure secure and compliant endpoint protection. Monitor, investigate, and remediate threats using Defender EDR, Threat & VulnerabilityManagement, and automated remediation to resolve high-priority security issues. Collaborate with cross-functional teams and stakeholders to provide end-to-end Defender support, documentation, and continuous security … Strong background in Legacy AV solutions (Symantec, McAfee) with the ability to plan and execute smooth migrations to Microsoft Defender. Deep knowledge of endpoint security operations, including EDR, Threat & VulnerabilityManagement, attack surface reduction, and incident investigation/remediation. Collaborative and problem-solving mindset, with the ability to work across infrastructure, application, and client teams while providing clear More ❯
802.1x, AAA, DHCP, DNS, ICMP, LDAPS, NetFlow, Polling, SCP, SMTP, SNMP, Syslog, TCP/IP, VLANs, WinRM, WMI • Exposure to SCCM/WSUS/MECM patch/software endpoint management technologies • Knowledge about virtualized environments such as VMware vSphere's vCenter Server Appliance (vCSA), ESXi hosts, virtual machines (VMs), VMTools and VMware hardware version • Familiarity with networking security, desktops … the flexibility to cope with a changing environment and short deadlines Secondary Skills - Nice to Haves Job Description • Conduct administration of Microsoft Windows workstations and servers to include configuration management, security updates, patching, software upgrades and mitigation of vulnerabilities • Effective and timely communication with users both in and outside 26NOS is required, including analyzing issues, understanding needs and operational … practices, or vendor hardening guidance • Ability or experience in evaluating scan report data from ACAS Tenable.SC or Tenable Nessus Scanners; participate in the review and response phases of the VulnerabilityManagement (VM) life cycle • Aptitude to support provisional installation, configuration, operation and maintenance of server systems hardware (Dell PowerEdge, HPe ProLiant, etc.), and utilize related infrastructure devices such More ❯
Vulnerability Analyst – 3-month contract My Customer is seeking a proactive and skilled Vulnerability Analyst to join their team in a highly regulated, mission-critical 24/7 environment. Their infrastructure includes over 450 servers operating across both Windows and Linux platforms — making secure access and timely response essential. Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools is needed for this role. Key Skills from the Vulnerability Analyst: Demonstrated experience in vulnerabilitymanagement within large-scale enterprise or corporate environments . Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools. Strong working knowledge of Windows and Linux operating systems , including their associated technology … stacks. Able to operate effectively in a secure, complex, and highly regulated setting with restricted access considerations. Key responsibilities for the Vulnerability Analyst: Daily monitoring and analysis of security events and vulnerabilities. Proactively reviewing Qualys reports to identify missing patches, misconfigurations, and other potential threats. Collaborating closely with infrastructure and operations teams to coordinate and apply remediation actions. Ensuring More ❯
Sunderland, Tyne and Wear, England, United Kingdom
Nigel Wright Group
challenging and interesting products and technologies. Key Responsibilities: - Prioritising and assess the impact of new incidents via phone, email, Microsoft Teams and our help desk system- Incident and Queue Management- Implementing first time fixes and resolving technical issues at a 3rd line support level- Providing first point contact support to our users and maintaining excellent customer service via phone … Directory/Microsoft Entra ID- Microsoft Office 365 Administration Desirable Skills & Experience - Microsoft Office 365 Administration- Windows Server 2016-2022 Administration- Microsoft SQL Server Administration (Database support, maintenance plan management)- Management and maintenance of our Anti-Virus, MDR/EDR and Cloud Optix platform- VulnerabilityManagement and resolution More ❯
cybersecurity operations for TRADOC G2 at Fort Eustis, VA, ensuring the protection and compliance of mission-critical IT systems. The selected candidate will assist in security assessments, risk mitigation, vulnerabilitymanagement, and RMF accreditation while supporting incident response, system hardening, and compliance with DoD cybersecurity policies in both classified and unclassified environments. Responsibilities Conduct security assessments and audits … of IT systems. Assist in preparing accreditation packages for system authorization. Implement vulnerabilitymanagement strategies, including patching and updates. Support incident response and mitigation efforts. Maintain security documentation in compliance with DoD standards. Qualifications: Active DoD Top Secret/SCI clearance required. Bachelor's degree in IT or cybersecurity preferred. 3-8 years' experience. Security+ or equivalent certification More ❯
Endpoint Engineer Responsibilities: Lead the administration and engineering of a Microsoft endpoint management solution (e.g., Intune), including policy creation and management, application deployment, device compliance, and conditional access configurations. Design and implement hybrid identity solutions leveraging cloud-based directory services (e.g., Azure AD) and on-premises Active Directory for seamless identity management. Utilize cloud automation tools (e.g., Azure … Automation) and endpoint management platforms to manage and secure cloud-based and on-premises workstations and servers, ensuring they are patched to correct levels. Develop and maintain cloud-based system templates and images for rapid deployment. Manage and maintain Windows Server and PC images in both cloud and on-premises environments. Identify, analyze, and resolve system problems with both … advanced scripts (e.g., PowerShell) and leverage cloud scripting services (e.g., Azure Functions) to automate systems administration tasks across cloud and on-premises environments. Implement and manage a comprehensive endpoint management solution (e.g., Microsoft Endpoint Manager, combining Intune and SCCM). Design and implement cloud-based security solutions, including cloud security monitoring and management tools (e.g., Azure Security Center More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Experience designing and securing AI/ML and MLOps environments , including awareness of risks such as adversarial attacks, model poisoning, and data privacy issues. Deep knowledge of: Identity & Access Management (IAM) Network and Application Security Data Protection & Encryption Kubernetes, Containers, and DevSecOps/MLOps practices SIEM, logging, and monitoring Zero Trust architectures Skilled in applying frameworks such as NIST … CSF, ISO 27001, PCI DSS, CSA CCM, NIST AI RMF . Hands-on with tools for vulnerabilitymanagement, secrets management, CSPM, and CWPP . Relevant certifications strongly preferred (CISSP, CCSP, TOGAF, AWS/Azure/GCP security certifications). Excellent communication and leadership skills, with the ability to influence at all levels. Esther Urtecho Senior Delivery Consultant More ❯
Senior Vulnerability Analyst £50,000 - £57,000 + bonus and extensive benefits Full Time/Permanent West Midlands/Hybrid - 1-2 days a month in the office on average The Role and Company: I am looking for a driven Senior Vulnerability Analyst to join a large nationally recognised brand head quartered in the West Midlands. As a … Senior Vulnerability Analyst you will be joining a highly skilled Cyber Defence team. As a key part if this team you will manage threats to the organisation and safeguard systems that enable the business to function safely and effectively. We are ideally looking for someone Midlands based who can be on site in Warwickshire 1-2 days a month … on average. Responsibilities: Conducting regular vulnerability assessments using automated scanning tools, manual testing techniques, and security best practices to identify vulnerabilities in systems, networks, and applications Managing the lifecycle of vulnerabilities from discovery to remediation, including vulnerability triage, prioritisation, tracking, and reporting Analysing the impact and severity of identified vulnerabilities based on factors such as the likelihood of More ❯
RANGE : 92.00-96.00 PER HOUR JOB NUMBER: REQUIRED EXPERIENCE: Qualifications You Must Have: Experience with performing assessments of various operating systems with DISA STIGs and SRGs Experience with IA vulnerability testing and related network and system test tools, e.g., ACAS and Security Content Automation Protocol (SCAP) An active and transferable DoD Secret security clearance is required on Day … clearance. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance Experience with network and system security administration, including operating system security configuration and account management best practices for LINUX, Microsoft, and CISCO Systems (Previous experience with RHEL 6 and 7 is highly desired) Understand DoD RMF Certification and Accreditation Processes, assessing and validating compliance … M IAT-III or DoD 8140 (CISSP or equivalent) Compliant Certification Qualifications We Prefer: An advanced degree in STEM with 5+ years of engineering experience Familiar with NIST Risk Management Framework as described in NIST Special Publication 800-37 Experience with information security toolsets such as LogRhythm and/or SPLUNK or other related Intrusion Detection Tools Self-Starter More ❯
maintain security controls and monitoring throughout the software development lifecycle (SDLC). Automation: Develop automated security processes and tools to detect and prevent vulnerabilities in CI/CD pipelines. VulnerabilityManagement: Conduct regular vulnerability assessments, penetration testing, and ensure timely remediation of findings. Protect all company data, especially sensitive information, from internal and external threats by creating … for detail and an ability to multitask in a fast-paced environment Strong abilities in critical thinking, problem-solving, logic, and forensics Knowledge of security tools like SAST, DAST, vulnerability scanners, and SIEM solutions. Familiarity with scripting languages (Python, Bash, etc.) and automation frameworks. In depth knowledge of application security principles, OWASP Top 10, and threat modeling. Proficiency in More ❯
through business development, recruitment, and thought leadership Coaching and mentoring consultants to develop the next generation of cyber leaders Ideal Background Proven experience in cyber strategy, transformation, and risk management within complex organisations Strong knowledge of regulatory and security frameworks (e.g. NIST CSF, ISO27001, GDPR, NIS2, NCSC CAF) Experience across areas such as GRC, security architecture, threat management, or vulnerabilitymanagement Outstanding communication and stakeholder engagement skills, with the ability to influence at C-suite and board level Track record of leading large-scale client engagements and delivery teams in consulting environments Relevant certifications (CISSP, CISM, CISA, MSc Cyber Security) advantageous What You’ll Receive Salary: £86,000–£107,000 + benefits 25 days annual More ❯