and governing foundational security controls within a global enterprise environment. You will act as a strategic advisor and technical authority, supporting the development and implementation of endpoint security practices, vulnerabilitymanagement, asset control, and governance-aligned with the organisation's broader 2026 security strategy . This is an ideal opportunity for someone who may not see themselves as … ensuring controls are robust, scalable, and fit for the future. Translate technical and business needs into actionable security architecture guidance. Support governance and process standardisation across shadow IT , asset management , and vulnerabilitymanagement . Drive cross-functional collaboration across architecture, engineering, and operational teams. Ideal Candidate Profile: Strong technical understanding of endpoint security , including hardening, tooling, and More ❯
Hampton, New Hampshire, United States Hybrid / WFH Options
Unitil Service Corporation
OT/IT environment from cyber threats and ensuring the continuous and safe operation of essential industrial processes. Additionally, this position will be responsible for OT asset inventory and vulnerabilitymanagement for the company's network assets including firewalls, switches, IoT devices which includes physical security systems, cameras, UPS devices, HVAC and lighting controls. Key Responsibilities: Cybersecurity Assessment … Conduct security assessments and vulnerability assessments on IT/OT systems to identify potential weaknesses and threats. Incident Response: Develop and implement incident response plans specific to OT environments to detect and mitigate cyber incidents. Network Security: Design, implement, and maintain security measures for OT networks, including firewalls, intrusion detection systems, and access controls. Patch Management: Oversee patch … management processes for OT systems, ensuring timely updates and minimal disruption to critical operations. Security Policies: Develop and enforce security policies and procedures for the OT environment, aligned with industry standards and regulatory requirements. Security Monitoring: Implement real-time monitoring solutions to detect anomalies and unauthorized access in OT networks and systems. Risk Assessment: Perform risk assessments and develop More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
engineering teamsproviding hands-on guidance, resolving concerns, and fostering a security-first mindset. DevSecOps Enablement : Promote and implement secure development practices across CI/CD pipelines, secrets and key management, dependency management, and secure design. VulnerabilityManagement : Lead vulnerability remediation effortstriaging findings, prioritizing risks, and partnering with teams to deliver effective, pragmatic fixes. Tooling & Automation … Hands-on experience with secure CI/CD practices, DevSecOps methodologies, GitHub workflows, and Terraform. Deep understanding of cloud security principles in AWS and Azure, particularly around IAM, secrets management, and networking. Proficient in secure coding practices, threat modeling, and vulnerability remediation. Familiar with a range of security tooling including static and dynamic analysis, software composition analysis, and More ❯
s security architecture, ensuring it aligns with business objectives, regulatory requirements, and industry best practices. Design secure systems, networks, and infrastructure, considering scalability, resiliency, and emerging technologies. Security Operations Management: Lead the security operations team for product and infrastructure, ensuring the implementation of robust security controls, incident response protocols, vulnerabilitymanagement, and security monitoring. Foster a proactive … and efficient security operations center (SOC) to detect, respond to, and recover from security incidents. Team Management: Effectively manage security champions for product responsible for security operations, architecture, and related functions. Establish and maintain strong communication channels, facilitate knowledge sharing, and drive team collaboration to achieve common security goals. Risk Assessment and Compliance: Conduct regular risk assessments and audits … functional teams to promptly detect, investigate, and resolve security incidents. Develop and maintain an incident response plan, ensuring effective communication, documentation, and post-incident analysis. Vendor and Third-Party Management: Assess and manage security risks associated with third-party vendors and partners. Establish and maintain security-related contracts, service-level agreements, and ongoing vendor assessments to ensure adherence to More ❯
standards. • Collaborate daily with System Administrators, DevSecOps, Cybersecurity, Software Engineers, and Integration Engineers on a highly technical team delivering reliable solutions. • Assist the Information Assurance (IA) Team with system vulnerabilitymanagement, software patching, account management, and license compliance. Is This You? • 7+ years of database administration or engineering experience in secure environments • Bachelor's degree in STEM … MySQL, Microsoft SQL Server (Advanced experience required) • High-Availability Architecture, Clustering, Automated Failover • Backup Methodologies & Disaster Recovery Planning Systems & Security: • RHEL Linux Administration • Security Technical Implementation Guidelines (STIGs) • System VulnerabilityManagement & Patch Compliance Virtualization & Platforms: • KVM, VMware, RedHat OpenShift • Satellite Ground Systems & OPIR Program Exposure (Highly Preferred) DevOps & Automation: • Automated Scripting (Python or similar languages) • Infrastructure as Code … IaC) • Agile, Lean, and Continuous Process Improvement Frameworks • Configuration & Change Management Processes Collaboration & Communication: • Strong team player with excellent verbal and written communication • Ability to develop CONOPS, procedural documentation, and operational support materials If this sounds like you, we'd love to talk. Apply today and help us build mission-critical solutions that safeguard national security. More ❯
lead on: Driving the use of Azure Cloud based security tools such as Defender and Sentinel Configure and manage alerts through Defender First and second line security operations, including vulnerabilitymanagement Investigating and responding to security incidents Ensuring policies and procedures remain aligned to industry best practice Promoting security awareness and education throughout the organisation particularly in relation … Azure Cyber Security Analyst: Azure environment - Essential Defender and Sentinel commercial experience - Essential Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerabilitymanagement, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid understanding of risk assessment frameworks More ❯
lead on: Driving the use of Azure Cloud based security tools such as Defender and Sentinel Configure and manage alerts through Defender First and second line security operations, including vulnerabilitymanagement Investigating and responding to security incidents Ensuring policies and procedures remain aligned to industry best practice Promoting security awareness and education throughout the organisation particularly in relation … Azure Cyber Security Analyst: Azure environment - Essential Defender and Sentinel commercial experience - Essential Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerabilitymanagement, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid understanding of risk assessment frameworks More ❯
Trellix/Microsoft Defender Administrator in Fort Belvoir, VA to join the I3TS team supporting DTRA. The I3TS program provides enterprise-wide IT support to enable DTRA's Information Management & Technology Directorate (ITD) to consolidate, modernize, and continuously innovate the delivery of IT services and mission capabilities to DTRA's internal and external mission partners operating in CONUS and … by running their Endpoint Security with experience in Trellix and Microsoft Defender. Administrator will also be responsible in applying Security Technical Implementation Guides (STIGs), managing system patches, and overseeing vulnerabilitymanagement processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate will be responsible for identifying … points of vulnerability, non-compliance with established Information Assurance (IA) guidelines and regulations and recommend mitigation strategies, along with assisting users as needed in a classified computing environment. The selected candidate must be able to work independently as well as with a team of IT analysts, administrators, and engineers. The position requires excellent communications skills, both verbal and written. More ❯
HBSS/MDE Administrator SME in Fort Belvoir, VA to join the I3TS team supporting DTRA. The I3TS program provides enterprise-wide IT support to enable DTRA's Information Management & Technology Directorate (ITD) to consolidate, modernize, and continuously innovate the delivery of IT services and mission capabilities to DTRA's internal and external mission partners operating in CONUS and … by running their Endpoint Security with experience in Trellix and Microsoft Defender. Administrator will also be responsible in applying Security Technical Implementation Guides (STIGs), managing system patches, and overseeing vulnerabilitymanagement processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate will be responsible for identifying … points of vulnerability, non-compliance with established Information Assurance (IA) guidelines and regulations and recommend mitigation strategies, along with assisting users as needed in a classified computing environment. The selected candidate must be able to work independently as well as with a team of IT analysts, administrators, and engineers. The position requires excellent communications skills, both verbal and written. More ❯
Note that this is a hybrid role that combines traditional IT support with implementation of cybersecurity measures. Qualified candidates should have an understanding of system and cybersecurity, DoD Risk Management Framework, Information Assurance and NIST Cybersecurity Framework processes. Qualified candidates should also have an understanding of IT infrastructure operations, LAN/WAN networking, virtualization, containerization, patch management, and … hands-on experience with networking and security appliances. Successful applicants should have the ability to work effectively and cooperatively with all management levels, the personality to support team goals, and the ability to work independently without close supervision. Applicants should exhibit strong interpersonal and oral/written communications skills. Primary Duties and Responsibilities: Knowledge, implementation and management of … Firewalls; Endpoint Protection, Detection and Response; Data Loss Prevention; Encryption; SIEM and similar security management tools and appliances Promoting user security training and awareness Assists in the development, maintenance and documentation of security operations procedures, processes, and standards Ensures that system security configurations are properly implemented, monitored and reported Knowledge of security risk management, tools, methodologies and implementation More ❯
at TP ICAP. The Senior Cyber Security Engineer has the remit of proactively driving development of the cyber security capability in line with the evolving threat landscape. This includes; vulnerabilitymanagement, access control, security platform engineering, detection and response activities. Coordinate with offensive security personnel to improve security posture based on Red/Purple team campaign findings. The … of the group. Fundamental to this is the ability to exercise an offensive security mindset. Role Responsibilities Maintain knowledge of current ATP TTPs Maintain knowledge of security tool landscape Vulnerability identification and remediation Penetration test report remediation Privileged access management Red/Purple offensive security activities Incident response and forensics Proactively identify opportunities for control improvements Develop strong … architecture best practices and emerging technologies Support the development and implementation of secure-by-design principles across projects Security platform engineering and projects Experience/Competences Essential Experience implementing vulnerabilitymanagement, SIEM, PAM, IDS/IPS, EDR, DLP, CNAPP and AV platforms Intermediate level knowledge of incident response processes for OS and network level events Comfortable with Windows More ❯
Senior HBSS/MDE Administrator in Fort Belvoir, VA to join the I3TS team supporting DTRA. The I3TS program provides enterprise-wide IT support to enable DTRA's Information Management & Technology Directorate (ITD) to consolidate, modernize, and continuously innovate the delivery of IT services and mission capabilities to DTRA's internal and external mission partners operating in CONUS and … by running their Endpoint Security with experience in Trellix and Microsoft Defender. Administrator will also be responsible in applying Security Technical Implementation Guides (STIGs), managing system patches, and overseeing vulnerabilitymanagement processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate will be responsible for identifying … points of vulnerability, non-compliance with established Information Assurance (IA) guidelines and regulations and recommend mitigation strategies, along with assisting users as needed in a classified computing environment. The selected candidate must be able to work independently as well as with a team of IT analysts, administrators, and engineers. The position requires excellent communications skills, both verbal and written. More ❯
Cambridge, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
REDTECH RECRUIT
Defender XDR suite Knowledge of cloud and on-premise environments, ideally Azure, including networking and firewalls Familiarity with incident response processes, playbooks, and tools Understanding of threat intelligence and vulnerabilitymanagement Experience with ISO27001 and compliance frameworks Scripting and coding skills (e.g., Python, PowerShell, Bash) Exposure to CI/CD, Infrastructure as Code (IaC), and Azure DevOps pipelines … Microsoft Defender/Endpoint Security/PowerShell/Python/Bash/Azure DevOps/Infrastructure as Code/CI/CD/Network Security/Penetration Testing/VulnerabilityManagement/ISO27001/Information Assurance/Computer Science/Cyber Security/Information Security/Security Compliance More ❯
crucial in maintaining and developing our Information Security (IS) program and ensuring compliance with established security policies and procedures. The ISSO will be responsible for overseeing operational security implementation, vulnerabilitymanagement, system assessments, and recovery processes. The ideal candidate will play a key role in safeguarding critical information systems and contribute to a comprehensive security posture. Essential Duties … validate adherence to security standards. • Promote awareness of security issues across the organization. • Provide ongoing training to ensure all staff understand their security responsibilities. • Prepare technical documents, incident reports, vulnerability assessments, and other situational awareness information for key stakeholders. • Assist in ensuring systems and configurations comply with security guidelines and regulatory requirements. • Monitor and validate compliance through continuous security … assessments and audits. • Conduct system vulnerability scanning, configuration assessment, and remediation to maintain system integrity and security. Qualifications: • Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or a related field is required. • Proven experience in cybersecurity, risk management, or information security roles, particularly in relation to system security, vulnerabilitymanagement, and compliance activities. • Strong knowledge More ❯
capability to work autonomously with minimal supervision. Experience with the following tools/platforms: Cloud Security: Wiz, Azure Defender for Cloud, AWS Security Hub, related cloud native security tools VulnerabilityManagement: Tenable SIEM & Monitoring: Splunk, Microsoft Sentinel, Amazon CloudWatch, AWS CloudTrail EDR & Threat Protection: Microsoft Defender for Cloud, Microsoft Defender for Endpoint, Cisco AMP Identity & Access: Microsoft Defender … network protocols, and common attack vectors. Ability to interpret and analyze log data from various sources. Understanding of incident response methodologies and frameworks (e.g., NIST, SANS). Knowledge of vulnerabilitymanagement processes and remediation. Experience with scripting (Python) for automation and investigation is a plus. Excellent written and verbal communication skills. Ability to work in a fast-paced More ❯
Clearance: Active Top Secret/SCI clearance required Schedule: Monday to Friday, 8am to 5pm Overview: We are seeking a talented and motivated ACAS System Remediation Administrator to support vulnerabilitymanagement and cybersecurity compliance for networks. The successful candidate will manage and optimize ACAS tools such as Tenable Nessus and Security Center, perform vulnerability scans, and collaborate … with RMF and engineering teams to remediate risks and ensure system compliance. Responsibilities: Build and execute vulnerability remediation plans in coordination with Systems Engineering and RMF teams Configure, schedule, execute, and troubleshoot ACAS/Nessus scans Maintain and update Security Center with successful syncs and scan results Conduct analysis of scan results and provide mitigation strategies or author POA … Ms as needed Administer and support both Windows and Linux systems with a security-focused lens Implement and analyze STIGs, IAVAs, and vulnerability compliance frameworks Create and maintain documentation on vulnerabilities, remediation efforts, and RMF/eMASS artifacts Support automation of ACAS operations and contribute to scripting for system efficiencies Maintain compliance with DISA OPORDs, FRAGOs, and other cybersecurity More ❯
Hull, North Humberside, England, United Kingdom Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerabilitymanagement: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerabilitymanagement, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non … technical staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey More ❯
North Ferriby, North Humberside, North East, United Kingdom Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerabilitymanagement: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerabilitymanagement, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non … technical staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey More ❯
efficiency. Proactively hunt for potential threats within the environment, leveraging threat intelligence and advanced analytics to identify and mitigate risks. Work closely with other cyber defence teams, including Intelligence, VulnerabilityManagement, Threat Hunting, and Purple Teams. Effectively communicate findings and recommendations to various stakeholders. Utilise your technical expertise to analyse telemetry related to incidents and identify appropriate investigation … in scripting or programming languages. Preferred experience dealing with incidents in various environments, including OT and ICS technologies. Preferred experience working with wider Cyber Defence teams, such as Intelligence, VulnerabilityManagement, Threat Hunting, and Purple Teams. Understanding of cyber security legislation and experience with information risk and security-related best practices, policies, standards, and regulations. What's in More ❯
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerabilitymanagement programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerabilitymanagement experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerabilitymanagement programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerabilitymanagement experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerabilitymanagement programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerabilitymanagement experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerabilitymanagement programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerabilitymanagement experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerabilitymanagement programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerabilitymanagement experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerabilitymanagement programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerabilitymanagement experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯