London, South East, England, United Kingdom Hybrid / WFH Options
Holland & Barrett International Limited
experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python, JavaScript … GoLang, Terraform, CloudFormation (AWS), and AWS CDK. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Desired: Ability to work independently, take initiative, and maintain a keen attention to detail, ensuring high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. Why More ❯
Information System Security Officer for a multitude of information systems. Performs technical audits of assigned information systems as well as periodic monitoring of compliance with established standards. Uses SIEM, vulnerabilitymanagement, and other tools to actively correlate data and hunt threats. Ensures system is configured in accordance with required standards. Evaluates and creates artifacts which demonstrate system configuration … substitute additional experience for education). • Has or able to obtain required DODM 8570.01-M baseline certification (e.g. CISSP) within 6 months of hire. Preferred Qualifications: • Experience using common vulnerability scanning and SIEM tools. • Previous experience as an ISSO or ISSE in a classified environment. • Previous experience implementing the requirements of the DCSA Assessment and Authorization Process Manual. Security More ❯
Epsom, Surrey, United Kingdom Hybrid / WFH Options
Lloyd Recruitment - Epsom
the business. Key Responsibilities: Log, prioritise, and resolve technical issues and requests Deliver excellent customer service across multiple channels Escalate and manage major incidents appropriately Support change and problem management processes Assist with projects and improve internal tools like Power Apps Maintain accurate documentation and asset records Participate in shift patterns, including some weekend/on-call work What … focus Ability to manage competing priorities in a fast-paced environment ITIL knowledge and experience working to SLAs Nice to Have: Experience in the financial services sector Familiarity with vulnerabilitymanagement tools (e.g., Qualys) Knowledge of remote support tools and collaboration platforms Experience with Power Apps and automating service processes Refer a friend and earn a retail voucher More ❯
on Windows Administrator technology and market capabilities/trends. Manage objects stored in Active Directory as delegated by Active Directory administrators. Perform Active Directory user account, and member server management tasks in assigned OUs. Provide daily administration of the Windows based Virtual Machines and AECC services. Harden the Windows based services per commercial best practices and the required government … skills. Strong troubleshooting skills across the entire technology stack - network, storage, server, and applications. Desired Skills: Working knowledge of DoD Security Technical Implementation Guides (STIG) and the Information Assurance VulnerabilityManagement (IAVM) process. Required Certifications: Security+ or equivalent DoD 8570.01-M IA Tech Level II certification Must have (or obtain within 6 months of hire) Windows administrator related More ❯
DSS and secure practices Scripting and automation skills (Bash, Python, Ansible) Strong troubleshooting and documentation abilities Preferred Skills RHCSA or higher certification CCNA certification Experience with monitoring and config management tools Familiarity with Git and CI/CD pipelines Knowledge of virtualization (VMware, KVM) Exposure to security hardening and vulnerabilitymanagement Interested? Apply today or contact Chelsea More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Group Policy, M365; Azure/Entra/Intune exposure VMware vSphere experience (VxRail a plus) Hands-on networking and security: LAN/WAN/Wi-Fi, VPN/firewalls, vulnerabilitymanagement and patching Comfortable with incident/change processes, writing clear docs and pitching in for occasional out-of-hours cover Nice to have: Juniper Mist or similar More ❯
Columbus, Ohio, United States Hybrid / WFH Options
Caelum Research Corporation
SCYBER) • Must possess written and verbal skills to appropriately document and brief Cybersecurity Incidents • Working knowledge of at least two cybersecurity areas: Firewall IDS/IPS Host based antivirus VulnerabilityManagement Forensics Malware Analysis Device Hardening • Understanding of Defense-in-Depth • Ability to build and read scripts in languages such as Perl, Bash, Powershell, Ruby, Python More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
role where youll play a key part in strengthening the organisations cyber defence posture by collecting, analysing, and disseminating actionable intelligence. Youll work closely with incident response, security operations, vulnerabilitymanagement, and leadership teams to anticipate threats, mitigate risks, and improve resilience. Key Responsibilities: Collect and analyse intelligence to address high-priority security requirements. Produce and share actionable More ❯
Kingston Upon Hull, East Riding of Yorkshire, United Kingdom
Principal IT
on the system as and when required Create tickets to record technical issues and solutions, escalating issues to senior team members when necessary Responsible for the ongoing patch and vulnerabilitymanagement of many of the company devices Continually adding to the knowledge database to ensure all technical documentation is fully up to date and relevant Requirements: Proven work More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Stackstudio Digital Ltd
to): Microsoft Defender for Endpoint Microsoft Defender for O365 Microsoft Defender for Identity Microsoft 365 Defender Microsoft Cloud App Security Good knowledge around Endpoint Detection and Response (EDR), Threat & VulnerabilityManagement (TVM), Attack Surface Reduction (ASR), and Auto Investigation and Remediation (AIR). Experience with Symantec Endpoint Protection (SEPM). Experience in McAfee/Windows Defender Antivirus Policy More ❯
implement, and maintain information security policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards ISO 27001 & Cyber Essentials.- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage … risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information Security, Computer Science, or a related field. … Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor.- Proven experience in information security management and conducting security audits.- Strong knowledge of information security frameworks and standards.- Excellent analytical and problem-solving skills.- Strong communication and interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX.- Familiarity with security tools and technologies More ❯
implement, and maintain information security policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001).- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage … risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information Security, Computer Science, or a related field. … Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor.- Proven experience in information security management and conducting security audits.- Strong knowledge of information security frameworks and standards.- Excellent analytical and problem-solving skills.- Strong communication and interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX.- Familiarity with security tools and technologies More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
Public Sectors. The Roles Involve: Incident Response : Enhance coordination, assess impact, inform guidance, and develop playbooks. Threat Intelligence : Deliver tailored intelligence, monitorTTPs, and manage tooling (OpenCTI, MISP, sandboxes). VulnerabilityManagement : Identify and triage vulnerabilities, support remediation, and improve disclosure schemes. Requirements : Proven experience in SOC environments and incident response. Deep understanding of threat actors and intelligence platforms. … Expertise in vulnerability scanning and remediation. Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome applications from people of all backgrounds and perspectives. Our success is driven by our people, united by the spirit of partnership to deliver the best resourcing solutions for More ❯
Success organization that supports customer onboarding and implementation projects. Implementation Engineers are instrumental in delivering Nucleus products in the post sales cycle. This technical role is responsible for deploying vulnerabilitymanagement solutions to our rapidly growing customer base. The Nucleus Implementation team is staffed with security architects with software development experience who can manage customer stakeholders to drive … to enhance our post-sales motion Understand how integrations work end to end to be able to clearly articulate complex problems and solutions to less technical stakeholders Design vuln management solution architecture for different asset classes and environment sizes Manage containerization and modern cloud infrastructure Required Qualifications: Cybersecurity concepts (attack vectors, kill chain) Compliance understanding (NIST, ISO, custom policies … Customer/stakeholder engagement (technical project management, consulting) Programming (we use Python, any oop is fine) Configuring & deploying software integrations High capacity to learn quickly Creative problem-solving skills Preferred Qualifications: Security tools or other VM platforms (SIEM, SOAR, IDS) Data ingest pipelines (ETL, automation) Cloud concepts (containerization, PaaS) ServiceNow (configuration, end user experience) Enterprise customer tech integration exposure More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Holland & Barrett International Limited
Requirements: Essential: 5+ years of experience in application security, with at least 3+ years in software development. Strong understanding of application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, and API Security (including authentication and authorization). Proficiency in programming languages such as Python, Java, JavaScript … GoLang, and Rust. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to oversee multiple security projects simultaneously. Desired: Independent, proactive, and detail-oriented, with a commitment to maintaining high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. We support flexibility and productivity of our employees by More ❯
Qualifications Requires Bachelors degree 12+ years of technical experience Preferred Qualifications Minimum of 3 years in the following security functional areas application security authentication and authorization identity and access management dynamic application security testing static application security testing data security security monitoring or SSO2FA security vulnerabilitymanagement Advanced knowledge of security capabilities and constraints related to deploying More ❯
the how and why we did it this way- • Develop and publish team vetted storage standards and policies as needed • Follow ITIL (Information Technology Infrastructure Library) practices for Change Management Interpersonal Traits: • A team mindset • Strong communication skills, written and oral • Solid desire to learn the ALTESS storage environment Required Technical Skills: • Five or more years of Storage Administration …/or meet and greet with teams and leadership Desired Tech Skills: • Working knowledge of DoD Security Technical Implementation Guides (STIGs), Security Readiness Review (SRR) scripts, and Information Assurance VulnerabilityManagement (IAVM) • Experience with FC storage • Experience with network attached storage • Experience with FC, CIFS, NFS and iSCSI storage protocols • Experience with block-based replication More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Charles Simon Associates Ltd
applying patches, and maintaining the infrastructure to ensure reliability and performance Leading service improvement initiatives and upholding high standards of security across all platforms Securing and hardening infrastructure using vulnerabilitymanagement tools and best practices Supporting and implementing Azure-based infrastructure solutions for scalable, resilient deployments Using service management tools to track, resolve, and improve IT operations More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯