london (city of london), south east england, united kingdom Hybrid / WFH Options
Stack Recruitment
ll Do π΅οΈ βοΈ Monitor & Detect: Continuously monitor network traffic, system logs, and alerts for suspicious activity. π¨ Incident Response: Act as first responder to security incidents, investigate breaches, and contain threats. π VulnerabilityManagement: Conduct regular assessments and penetration tests to identify and resolve weaknesses. π Security Implementation: Improve and implement security measures across systems and infrastructure. π Compliance: Ensure alignment with GDPR More β―
slough, south east england, united kingdom Hybrid / WFH Options
Stack Recruitment
ll Do π΅οΈ βοΈ Monitor & Detect: Continuously monitor network traffic, system logs, and alerts for suspicious activity. π¨ Incident Response: Act as first responder to security incidents, investigate breaches, and contain threats. π VulnerabilityManagement: Conduct regular assessments and penetration tests to identify and resolve weaknesses. π Security Implementation: Improve and implement security measures across systems and infrastructure. π Compliance: Ensure alignment with GDPR More β―
in a SOC or NOC environment. Strong hands-on experience with SIEM tools, specifically QRadar Solid understanding of incident response methodologies and DFIR principles. Knowledge of network traffic analysis, vulnerabilitymanagement, penetration testing, and malware reverse engineering. Familiarity with ITIL processes (Incident, Problem, Change). Strong written and verbal communication, with the ability to produce clear technical documentation More β―
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Aberdeen
positive difference to the lives of our clients, customers, colleagues, shareholders and society. We are focused on growing our direct and advised wealth platforms and repositioning our specialist asset management business to meet client demand. We are committed to providing excellent client service, supported by leading technology and talent. Aberdeen comprises three businesses, interactive investor (ii), Investments and Adviser β¦ others. Proactive strategic leadership, demonstrable skills in the design, communication and delivery of end user technologies. Ability to engage and communicate at all levels from technical SMEs to Executive Management Experience working in partnership with a Tier 1 Systems Integrator, in a blended model. Ability to quickly learn, implement and utilize new technologies. Technical Skills The candidate is expected β¦ Enterprise Applications Solid understanding of Identity Governance & Administration within the context of a highly regulated environment. Azure Virtual Desktop Administration (inc Azure Networking) Experiencing working with Endpoint Configuration/Management & Application Delivery technologies such as Intune & MEM. Experience implementing IaC/DSC via Terraform to manage M365 & EntraID. Azure Virtual Desktop (inc Networking) Defender for Endpoint experience with vulnerabilityMore β―
focused, and motivated candidate who can adapt to a constantly changing environment. What you will do - Manage and maintain a complex server-based enclave. Performing and mitigating system scans, vulnerabilitymanagement activities, and active directory configuration. - Plan and implement IT enhancements needed for system optimization. - Identify and remediate hardware and/or software issues. - Create and update clear β¦ concise, and accurate incident resolution documentation. - Support overlapping projects and maintain good inter-departmental relations. - Communicate and publish statuses of system outages, as needed. - Manage information assurance vulnerability alerts (IAVAs) and system security scanning of equipment suites in accordance with System Security Plans. - Actively identify and initiate IAVA responses and system security scans for remediation, deploy IAVA patches and β¦ Experience documenting and providing information for security accreditation and certification. - Experience using Splunk tools in infrastructure planning, data collection and comprehension, development, integration, configuring data inputs and forwarders, data management, and/or monitoring. - Experience with Network Security Technologies such as Multiple Domain, PKI, SSP, and/or Vulnerability Assessment. - Experience with High Assurance Internet Protocol Encryptor (HAIPE More β―
and enforce cybersecurity policies, standards, and procedures in compliance with RMF, DoD, and IC guidelines -Evaluate and manage security configurations for systems, software, and hardware, including patching, scanning, and vulnerability remediation -Monitor, respond to, and document cyber threats, IAVAs, and security incidents across enterprise environments -Administer access controls and authentication mechanisms while ensuring continuous improvement in information assurance practices β¦ security experience -Bachelor's degree in Computer Science, Cybersecurity, or related field -Demonstrated technical proficiency in RMF processes, A&A toolsets and secure system operations -Proficiency in threat and vulnerabilitymanagement PREFERRED QUALIFICATIONS: -Certifications such as CISSP, CISM or IAM II -Experience managing accreditation packages for cross domain solutions, cloud environments, or tactical systems -Excellent communication skills for More β―
San Antonio, Texas, United States Hybrid / WFH Options
Novacoast Federal
strong foundation in cloud security. Proficiency in Python Scripting is highly preferred. Minimum of 3 years experience in spearheading security solutions in large-scale environments. A comprehensive grasp of vulnerabilitymanagement and various compliance standards. Adeptness with API-based security and compliance standards is highly valued. Knowledgeable in cloud networking, network security, virtualization, and cloud computing basics. Skillful β¦ presenting solutions to leadership and customers. Preferred Experience: Hands-on experience with Palo Alto Prisma Cloud: 2+ years (Highly preferred) Strong Python scripting skills (Highly preferred) API configuration and management: 3+ years (Highly preferred) Cloud Security expertise: 3+ years Experience with Kubernetes: 3+ years Experience with other Cloud Security Posture Management (CSPM) tools: (Significant plus) Code Security knowledge More β―
must have strong demonstrated experience in large enterprise IT environment including 8 years of OT security experience and application of asset visibility solutions towards OT hardware and software asset management security efforts supporting both OT operations and security efforts including network access control, USB attached device control, vulnerabilitymanagement, and security event investigation support. Candidates must also More β―
enforce SOC policies, playbooks, and runbooks for threat detection, escalation, and response. Oversee implementation and sustainment of secure cyber infrastructures supporting government contracts. Provide expert guidance in risk assessments, vulnerabilitymanagement, and remediation strategies. Direct application of security engineering principles across system architecture, development, and deployment. Ensure compliance with the NICE Work Role Framework, specifically: Incident Response (PD β¦ Analyst Associate Microsoft Certified Security Architect Expert or GIAC Security Expert (GSE) Education & Experience: Minimum 7+ years of experience in SOC operations, incident response, and cybersecurity engineering, including SOC management and IR commander responsibilities. Proven experience leading enterprise-scale cybersecurity operations for government or defense programs. Security Clearance: Active TS clearance required at time of hire, with ability to More β―
and engineering principles Advanced knowledge of networking concepts, protocols, and architecture (TCP/IP, LAN, WAN) Proficiency with VMWare environments, including vCenter and ESXi deployment and administration Experience in vulnerabilitymanagement: scanning, assessment, remediation, and reporting Expertise with cloud platforms such as AWS, Azure, or Google Cloud Familiarity with Elastic Stack components (Logstash, Kibana) and containerization (Docker, Kubernetes β¦ able to remain in a stationary position 50% of the time. Occasionally moves about inside the office to access file cabinets, office equipment, etc. Frequently communicates with co-workers, management, and customers and must be able to exchange accurate information. More β―
a disciplined, first-principles approach to everything we do. This approach is embedded in our core services, from institutional liquidity provision, trading solutions, OTC execution to our comprehensive treasury management offerings. This is how we cut through the noise and build robust and scalable systems across all our business lines. Therefore, we seek individuals who are driven by this β¦ all stakeholders, translating risks into business terms and offering actionable guidance on best practices. Contribute to a wide range of cybersecurity initiatives beyond traditional SecOps, assisting with projects in vulnerabilitymanagement, cloud security, data protection, and governance, risk & compliance to strengthen our overall security posture. Deep understanding of the incident response lifecycle (preparation, identification, containment, eradication, recovery, lessons More β―
processes, controls, and reporting to enable informed, risk-based decisions. What you'll bring: Strong knowledge of networking, cloud security (AWS/Azure), and modern security concepts. Familiarity with vulnerabilitymanagement, penetration testing, and security frameworks. Experience with security standards (ISO 27001/27002/27017/27018). Minimum 5 years in cybersecurity, with certifications like CISSP More β―
payments security. Your Day-to-Day Alert Triage: Analyze SIEM and threat-intelligence feeds to spot anomalies. Threat Hunting: Use forensic tools to track indicators of compromise across networks. VulnerabilityManagement: Run scans, prioritize remediation tasks, and validate fixes. Incident Response Support: Coordinate with SRE and DevOps teams to contain breaches. Report & Recommend: Draft concise, actionable incident summaries More β―
Employment Type: Full-Time
Salary: £36,000 - £43,000 per annum, Negotiable, OTE
risk. Ensure we are deploying solutions into a secure environment . Ensure we build solutions in alignment with our control requirements. Support on-going business-as-usual and champion vulnerability management. Provide internal security consultancy and lead on audit engagements, risk activities and project initiatives. Work closely with colleagues to ensure effective technology risk management. Work together . Collaborate More β―
vendors and government engineering staff for installation, upgrade, configuration, administration, automation and optimization of the Storage and Backup infrastructure β’ Develop and maintains storage, backup, and capacity event, performance, and management monitoring plan and provides documentation and training for Technical Assistance Center troubleshooting and event/incident response β’ Ensure system security in compliance with DOD/USMC/HCS policy β¦ including patching and auditing. β’ Automate the environment including routine management checks, reporting, event notifications and actions, software updates and service packs. β’ Plan for capacity including monitoring anticipating expansion or contraction requirements and submitting recommended solutions via customer processes β’ Support 24x7x365 operations including on-call duties and occasional night and weekend patching or implementation requirements. Qualifications Basic Qualifications: β’ Bachelors degree β¦ cloud datacenter: o Cohesity hybrid-cloud backup solutions o QStar Archiving solutions o Dell Unity Storage o NetApp SAN and NAS o Cisco MDS and Brocade Fibre Channel Switch management and zoning o VMWare NSX-T vSAN & virtualization o vRealize Operations Monitoring β’ Experience designing, engineering, operating backup and storage solutions in an enterprise datacenter environment including troubleshooting and DOD More β―
8+ years of experience, or a Master's degree plus 6 years of experience. Python/Java programming Understanding of DevOps principles: CI/CD pipelines, GitOps, automation, configuration management, and IaC Familiar with Scaled Agile methodology Familiarity with security best practices, risk, compliance & vulnerabilitymanagement, encryption & PKI, incident response, auditing and monitoring Proficiency in languages such β¦ Solutions Architect preferred) and its services (including fundamental AWS networking), knowing Azure is a plus Containerization knowledge of Docker and Kubernetes Strong understanding of API Design, testing, development and management Tools: CI/CD tools: Gitlab, Nexus Managed Artifacts, AWS: AWS EKS, EC2, Lambda, S3, EBS/EFS, VPC, DNS, IAM, KMS, CloudWatch, CloudTrail Configuration management: Ansible, Terragrunt More β―
and assess specific emergency or priority vulnerabilities, guided by input from other elements of the team such as cyber intelligence, engineering, or operations and suggest specific remediation approaches. Analyze vulnerability data and assist with the prioritization and remediation of the identified vulnerabilities commensurate to risk and vulnerabilitymanagement standards Understand vulnerabilities, their impacts, mitigation techniques, and document β¦ and templates as required to meet new regulatory/audit/etc. requirements and guidance Improve the efficacy and efficiency of specific VM practices across the enterprise, to include vulnerability identification/assessment/remediation. Leverage and enhance existing VM frameworks/policies/standards to ensure VM maintains a minimum of industry best practices. Coordinate collection of data More β―
driving the success of our people and the organisation. Our managers give clear communication, lead by example and feed back to foster growth and development of their team members. Management excellence is essential to the company's success, and effective leadership requires a combination of interpersonal skills, strategic thinking, and a commitment to providing a positive and productive work β¦ VMware, Hyper-V, and Azure-hosted environments. Own and enhance Active Directory, Entra ID (Azure AD), Group Policy, Conditional Access, and role-based access control (RBAC). Lead patching, vulnerabilitymanagement, and disaster recovery initiatives across global environments. Drive infrastructure automation with PowerShell, Intune, and Azure Automation. Administer and optimise Microsoft 365, including Exchange Online, SharePoint Online, Teams β¦ OneDrive for Business, and Viva. Implement and manage Intune Autopilot for secure device provisioning, lifecycle management, and compliance enforcement across Windows and macOS endpoints. Enhance collaboration through Teams governance, voice integration, security policies, and adoption programmes. Act as the technical authority for SharePoint Online architecture, migration projects, site governance, and workflow automation (Power Platform). Ensure data loss prevention More β―
PRIMARY OBJECTIVE OF POSITION: The Senior Cybersecurity Analyst serves as a subject-matter expert in Cybersecurity Policy, Planning, and Risk Management Framework (RMF) implementation. This role is responsible for tracking the status of Authority To Operate (ATOs) and other Risk Management Framework (RMF) functions, reviewing, analyzing, and interpreting cybersecurity policies, while also guiding and tracking the integration of β¦ polices Advise program leadership on emerging cybersecurity directives, regulatory and statutory changes, and policy impacts to mission systems Monitor and track system authorization (ATO) efforts under the NAVSEA Risk Management Framework and provide early warnings of issues or when progress may be off track Monitor and track various data calls for compliance in accordance with specific directives (OPORD, TASKORD β¦ working groups, interagency forums, and technical exchanges Partner with program managers, system engineers, and contractors to ensure cybersecurity is integrated throughout acquisition and development phases Participate in the change management process, including conducting security impact analyses and making recommendations to program management for approvals MINIMUM QUALIFICATIONS: SECRET Clearance is required to start the position Bachelor's degree or More β―
are seeking a highly motivated Cyber-Security Engineer to safeguard our critical data and infrastructure from cyber threats by implementing and maintaining robust security solutions. Key Responsibilities Security Assessments & VulnerabilityManagement: Identifying weaknesses in systems and networks through vulnerability assessments and penetration testing. Implementing Security Solutions: Putting in place firewalls, intrusion detection systems (IDS), and other tools β¦ to actively block and monitor for threats. Patch Management: Ensuring all systems are up-to-date with the latest security patches to fix known vulnerabilities. Security Monitoring & Incident Response: Keeping watch for suspicious activity and responding to security incidents effectively, including analysing logs, investigating alerts, and containing breaches. Disaster Recovery & Business Continuity: Helping develop plans to restore systems and More β―
operational security posture of assigned information systems while collaborating closely with the Information System Security Manager ISSM. Ensure that cyber security requirements are effectively integrated into information systems' operations, management, and documentation. Provide critical systems, application and infrastructure support to the customer and work with a team across multiple technical areas to include security and systems administration. Responsibilities include β¦ supporting ICD 503 Assessments and Authorizations of industry partners' systems β’ Support the Assessment and Authorization process by performing risk assessments, preparing and reviewing documentation in accordance with the Risk Management Framework (RMF), identify deficiencies an provide recommendations for solutions, track Plan of Action and Milestones (POA&M) through mitigation and risk acceptance, and conduct weekly, monthly, and annual Continuous β¦ Monitoring (CONMON) activities β’ Implement vulnerabilitymanagement programs, including tracking and addressing IAVAs and security patches, accessing applicability to existing systems, and ensuring closure β’ Perform data transfers between air-gapped systems at varying classification levels using tools for virus and dirty word scanning in accordance with media control and data transfer policies β’ Assess and respond to security-related incidents More β―