one scripting language (PowerShell or Python preferred). Experience and understanding of hyperconverged infrastructure preferably with Nutanix, VMWare, Commvault and hybrid cloud infrastructure (Azure or similar). Knowledge of vulnerabilitymanagement, monitoring/alerting, and automation/orchestration platforms. Certifications such as Microsoft SC-200, Certified Ethical Hacker and CBCP or CBCI equivalent DR/resilience credentials. We More ❯
one scripting language (PowerShell or Python preferred). Experience and understanding of hyperconverged infrastructure preferably with Nutanix, VMWare, Commvault and hybrid cloud infrastructure (Azure or similar). Knowledge of vulnerabilitymanagement, monitoring/alerting, and automation/orchestration platforms. Certifications such as Microsoft SC-200, Certified Ethical Hacker and CBCP or CBCI equivalent DR/resilience credentials. We More ❯
london (city of london), south east england, united kingdom
Slaughter and May
one scripting language (PowerShell or Python preferred). Experience and understanding of hyperconverged infrastructure preferably with Nutanix, VMWare, Commvault and hybrid cloud infrastructure (Azure or similar). Knowledge of vulnerabilitymanagement, monitoring/alerting, and automation/orchestration platforms. Certifications such as Microsoft SC-200, Certified Ethical Hacker and CBCP or CBCI equivalent DR/resilience credentials. We More ❯
day work. The ideal candidate will have the following skills: Deep understanding of cyber security principles, secure software development, and threat modeling Experience conducting security assessments, code reviews, and vulnerabilitymanagement across diverse technology stacks Experience in building full-stack products (web applications, APIs, CI tooling or low-level software) Hands-on experience with cloud technologies (AWS, GCP More ❯
applications. • Provide SharePoint design support - use of SharePoint Designer or other third-party HTML editors, user interface and user experience, creation of custom web parts, libraries, InfoPath forms, content management, pages, sub sites, custom workflows and automation, custom form creation and integration of third-party applications in the SharePoint platform. • Provide support for integrated services with existing custom .Net … The use of hardware load balancing platforms, federation solutions and automation tools are in-place to provide access to the service for internal and external customers. • Support compliance rate, vulnerabilitymanagement, and security compliance. • Provide a quarterly vulnerability and security compliance status report based on scans provided by internal sources, currently Tenable Nessus, citing the current vulnerabilityMore ❯
applications. • Provide SharePoint design support - use of SharePoint Designer or other third-party HTML editors, user interface and user experience, creation of custom web parts, libraries, InfoPath forms, content management, pages, sub-sites, custom workflows and automation, custom form creation, and integration of third-party applications in the SharePoint platform. • Provide support for integrated services with existing custom .NET … The use of hardware load balancing platforms, federation solutions, and automation tools are in place to provide access to the service for internal and external customers. • Support compliance rate, vulnerabilitymanagement, and security compliance. • Provide a quarterly vulnerability and security compliance status report based on scans provided by internal sources, currently Tenable Nessus, citing the current vulnerabilityMore ❯
scripts (e.g. Sysmon & Auditd) 5 years of experience with the following threat hunting tools: Microsoft Sentinel for threat hunting within Microsoft Azure; Tenable Nessus and SYN/ACK for vulnerabilitymanagement; NetScout for analyzing network traffic flow; SPUR.us enrichment of addresses Mandiant Threat intel feeds Must be able to work 80% (Monday thru Thursday) onsite at AOUSC office … cloud-based applications such as: Microsoft Azure, Microsoft O365, Microsoft Active Directory, and Cloud Access Security Brokers (i.e., Zscaler). Review and analyze risk-based Security information and event management (SIEM) alerts when developing hunt hypotheses. Review open-source intelligence about threat actors when developing hunt hypotheses. Plan, conduct, and document iterative, hypothesis based, tactics, techniques, and procedures (TTP … hunts utilizing the agile scrum project management methodology. At the conclusion of each hunt, propose, discuss, and document custom searches for automated detection of threat actor activity based on the hunt hypothesis. Configure, deploy, and troubleshoot Endpoint Detection and Response agents (e.g., CrowdStrike and Sysmon). Collect and analyze data from compromised systems using EDR agents and custom scripts More ❯
West London, London, England, United Kingdom Hybrid / WFH Options
Ashdown Group
genuine opportunity for progression A large West London based company is looking for an experienced Cyber Analyst/Engineer to join its IT function. Duties will include: - BAU cyber vulnerabilitymanagement and incident response - Cyber security projects and working with the wider group/external vendors to deliver security requirements - Focus on delivering Cyber Essentials Plus and ISO27001 … Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Support ongoing improvements to internal defence - Oversee policies and procedures - Audits To be considered suitable you will need the following skills and experience: - Experience in either a Cyber Analyst or Cyber Engineer role - SC Cleared/Clearance - Experience in network audits and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ashdown Group
genuine opportunity for progression A large West London based company is looking for an experienced Cyber Analyst/Engineer to join its IT function. Duties will include: - BAU cyber vulnerabilitymanagement and incident response - Cyber security projects and working with the wider group/external vendors to deliver security requirements - Focus on delivering Cyber Essentials Plus and ISO27001 … Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Support ongoing improvements to internal defence - Oversee policies and procedures - Audits To be considered suitable you will need the following skills and experience: - Experience in either a Cyber Analyst or Cyber Engineer role - SC Cleared/Clearance - Experience in network audits and More ❯
Newport, Gwent, United Kingdom Hybrid / WFH Options
Yolk Recruitment Ltd
into asset security while managing a small team of technical analysts and overseeing supplier relationships to drive successful outcomes. What You'll Bring: Proven experience in IT asset and vulnerabilitymanagement In-depth knowledge of asset discovery tools, vulnerability scanning and remediation techniques Solid understanding of the differences between IT and operational technology environments Awareness of attacker More ❯
the IA team • Evaluate information systems for compliance with DISA STIGs and CVE repository • Navigate systems through the authorization process • Prepare packages for government review • Maintain compliance through change management • Translate security requirements into technical tasks and • Work with the engineering teams to bring systems and laboratories into compliance • Ensure all systems are patched and report any problems in … experience • 2+ years of directly applicable ACAS experience • Knowledge of cybersecurity policies and guidelines o (NIST SP 800-53, DoD Instruction 8510.01), a strong understanding of o Security controls, vulnerabilitymanagement, and risk assessment methodologies • Hands-on experience utilizing DoD-approved scanning/testing tools o Nessus, STIG Checker, SCAP, etc. • Experience with DoD cybersecurity applications o ACAS More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Exertis
our security policies, procedures and controls. As part of the team, youll: Oversee the implementation and enforcement of security policies, standards and tools including endpoint protection, SIEM, SOC and vulnerabilitymanagement systems. Conduct risk assessments and threat modelling, maintaining the IT risk register and supporting the deployment of security controls, aligned with regulatory and business requirements. Lead incident … such as SIEM, IDS/IPS, endpoint protection and encryption is desirable. Experience with auditing A natural ability to build rapport with clients and colleagues. Strong communication and relationship management skills. Your Rewards and Benefits: We recognise and celebrate hard work at Exertis. When you join us, youll enjoy: 25 days of annual leave, with the option to purchase More ❯
for malicious cyber activity. MicroSys is supporting a customer by delivering intelligence support to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer's vulnerabilitymanagement (VM) efforts. In support of the customer's strategic direction, MicroSys is looking for motivated individuals who can support the development of new and innovative Cyber Threat … and physical locations • Must have experience using multiple Intelligence Community database search tools and familiarity with intelligence monitoring, collection, targeting and reporting • Must have working familiarity with Intelligence Community management of information, classification, dissemination and information and records system • Must have working familiarity with Open-Source Intelligence sources including the use of scraping tools and darkweb browsers • Must have More ❯
translate them into technical controls, policies and run books. Audit & pen test lead - Coordinate external auditors, manage evidence collection, track remediation tickets and present technical posture to stakeholders. Threat & vulnerabilitymanagement - Run container image scanning (Snyk), dependency SBOM generation and orchestrate patch cycles across clusters. Incident readiness - Own on call playbooks, drill tabletop exercises, ensure logs/metrics … deep dive of existing CI/CD, Terraform and security policies. Shadow DPO on open compliance items to build context. Within three months, you will Lead the next quarterly vulnerability scan and deliver remediation plan. Introduce SBOM + container image scanning gates to GitHub Actions. Publish updated incident response runbook and run a tabletop drill. Within six months, you More ❯
translate them into technical controls, policies and run books. Audit & pen test lead - Coordinate external auditors, manage evidence collection, track remediation tickets and present technical posture to stakeholders. Threat & vulnerabilitymanagement - Run container image scanning (Snyk), dependency SBOM generation and orchestrate patch cycles across clusters. Incident readiness - Own on call playbooks, drill tabletop exercises, ensure logs/metrics … deep dive of existing CI/CD, Terraform and security policies. Shadow DPO on open compliance items to build context. Within three months, you will Lead the next quarterly vulnerability scan and deliver remediation plan. Introduce SBOM + container image scanning gates to GitHub Actions. Publish updated incident response runbook and run a tabletop drill. Within six months, you More ❯
Splunk, CrowdStrike Falcon, and Tenable Nessus/Tenable.sc. Strong understanding of CUI protection requirements and compliance frameworks (NIST, FISMA, IRS Pub 1075, CMS, SSA). Experience with incident response, vulnerabilitymanagement, and risk assessments. Strong analytical, documentation, and communication skills. Thanks/Regards More ❯
performing root cause analysis of cybersecurity events and incidents. • Working knowledge of at least two types of security tools: Firewall, IDS/IPS, Host based antivirus, Data loss prevention, VulnerabilityManagement, Forensics, Malware Analysis, Device Hardening, Understanding of Defense-in-Depth, Ability to build scripts and tools to enhance threat detection and incident response capabilities (Preferably in SPL More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
of experience in application security or secure software development. Strong knowledge of OWASP Top 10, secure coding principles, and threat modelling. Hands-on experience with SAST, DAST, SCA, and vulnerabilitymanagement tools. Familiarity with cloud platforms (Azure or AWS), CI/CD pipelines, and DevOps processes. Strong communication skills and the ability to collaborate effectively across teams. Understanding More ❯
or similar). Understanding of Cyber Essentials and broader security standards. Knowledge of incident response, intrusion detection, and threat analysis. Familiarity with endpoint security, IDS/IPS, firewalls, and vulnerability management. Strong problem-solving skills and a proactive, analytical mindset. Comfortable working onsite, 5 days a week in Manchester . What’s on Offer Salary More ❯
warrington, cheshire, north west england, united kingdom
Explore Group
or similar). Understanding of Cyber Essentials and broader security standards. Knowledge of incident response, intrusion detection, and threat analysis. Familiarity with endpoint security, IDS/IPS, firewalls, and vulnerability management. Strong problem-solving skills and a proactive, analytical mindset. Comfortable working onsite, 5 days a week in Manchester . What’s on Offer Salary More ❯
bolton, greater manchester, north west england, united kingdom
Explore Group
or similar). Understanding of Cyber Essentials and broader security standards. Knowledge of incident response, intrusion detection, and threat analysis. Familiarity with endpoint security, IDS/IPS, firewalls, and vulnerability management. Strong problem-solving skills and a proactive, analytical mindset. Comfortable working onsite, 5 days a week in Manchester . What’s on Offer Salary More ❯
Job Description • A successful Patch Management Administrator - Entry Level candidate will have: o A basic understanding of vulnerabilitymanagement processes o Basic knowledge about computer vulnerabilities o Ability to learn on the job with the support of more experienced administrators o Excellent customer service skills • The ideal candidate will have: o The ability to read and understand … compliance status. • Utilize BMC Remedy or ServiceNow to troubleshoot and resolve customer tickets associated with software deployment and agent health. • Document procedures, configurations, and security events related to Patch Management for knowledge sharing and training purposes. Education & Experience • Requires a bachelor's degree or its equivalent Certifications • Required o Security+, or other qualifying IAT II certification • Desired o Microsoft More ❯
include: Defining and delivering a comprehensive cyber security strategy aligned with business goals and regulations Leading and developing the cyber security operations team Overseeing threat monitoring, incident response, and vulnerabilitymanagement Managing compliance with frameworks such as Cyber Essentials, NIST, ISO27001, GDPR, and GovAssure Acting as the primary point of contact for cyber matters internally and externally, including … regulators and industry forums Representing Cyber Security at board committees and senior management meetings Supporting bid and tender processes, providing risk-based advice and competitive responses About You Were looking for an experienced cyber security leader with a blend of strategic vision and operational expertise. You should bring: Proven experience defining and executing cyber security strategy at a senior … level Strong knowledge of governance, risk, compliance, and regulatory frameworks Leadership experience managing cyber security operations teams Excellent stakeholder management skills, including board-level engagement The ability to represent the organisation externally with authority and credibility Benefits Competitive salary and benefits package Hybrid/flexible working arrangements Generous annual leave and pension Inclusive, collaborative culture with senior-level visibility More ❯
include: Defining and delivering a comprehensive cyber security strategy aligned with business goals and regulations Leading and developing the cyber security operations team Overseeing threat monitoring, incident response, and vulnerabilitymanagement Managing compliance with frameworks such as Cyber Essentials, NIST, ISO27001, GDPR, and GovAssure Acting as the primary point of contact for cyber matters internally and externally, including … regulators and industry forums Representing Cyber Security at board committees and senior management meetings Supporting bid and tender processes, providing risk-based advice and competitive responses About You We’re looking for an experienced cyber security leader with a blend of strategic vision and operational expertise. You should bring: Proven experience defining and executing cyber security strategy at a … senior level Strong knowledge of governance, risk, compliance, and regulatory frameworks Leadership experience managing cyber security operations teams Excellent stakeholder management skills, including board-level engagement The ability to represent the organisation externally with authority and credibility Benefits Competitive salary and benefits package Hybrid/flexible working arrangements Generous annual leave and pension Inclusive, collaborative culture with senior-level More ❯
s overall cybersecurity posture and ensuring resilience against evolving threats. We are actively speaking with applicants that have a minimum of: 2-5 years of experience in cybersecurity operations, vulnerabilitymanagement, or SOC analyst roles. Ability to monitor enterprise networks and systems, analyze SIEM/EDR alerts, perform triage, and support containment/recovery during incidents. (Core day … to-day responsibility of the role.) Skilled at analyzing vulnerability scans (Tenable, Nessus, Qualys, OpenVAS), prioritizing remediation efforts with IT teams, and aligning with compliance frameworks (NIST 800-171, CMMC, ISO 27001). Strong understanding of MITRE ATT&CK, NIST frameworks, and cyber threat landscapes, enabling the candidate to detect, assess, and mitigate risks proactively. Bachelor's degree in More ❯