London, England, United Kingdom Hybrid / WFH Options
ISx4 Group
concepts, including virtualisation, containers, microservices, and serverless computing. Proficiency in infrastructure-as-code (IaC) tools such as Terraform, Bicep, CloudFormation, or Azure Resource Manager. Experience with automation and configuration management tools like Ansible, Puppet, or Chef is an advantage. Solid understanding of networking principles, including TCP/IP, DNS, load balancing, and firewall configurations. Knowledge of cloud security best … practices, including identity and access management (IAM), encryption, and vulnerability management. Familiarity with monitoring and logging tools such as CloudWatch, Azure Monitor, or Stackdriver. Experience with DevOps methodologies and continuous integration/continuous delivery (CI/CD) pipelines is an advantage. Strong problem-solving skills and ability to troubleshoot complex issues in a distributed cloud environment. Excellent communication … technologies, including data pipelines and ETL processes. Relevant cloud certifications (e.g., Azure Certified Cloud Engineer or AWS Certified Solutions Architect) are a strong plus. Personal Skills Personal Integrity, Stakeholder Management, Project Management, Agile Methodologies, Automation, Solutions Architecture. Ability to be focused, manage your own time and communicate effectively are critical. Experience in the following would be an advantage. More ❯
Key Responsibilities: • Design, implement, and maintain enterprise-level network architectures, ensuring security, scalability, and efficiency. • Develop and enforce network security policies, ensuring compliance with DoD regulations. • Perform risk assessments, vulnerabilitymanagement, and mitigation strategies for classified network environments. • Lead network troubleshooting efforts, identifying root causes and implementing corrective actions to ensure network reliability. • Work with cross-functional teams … to integrate new technologies and optimize existing network infrastructure. • Maintain detailed network documentation, including diagrams, security controls, and change management logs. • Provide mentorship and training to junior network engineers, fostering a culture of technical excellence. • Monitor network performance, proactively identifying and resolving bottlenecks and security risks. • Stay up to date on emerging networking technologies and DoD cybersecurity policies to More ❯
leader to head global security operations at an innovative, fast-paced technology organisation. This role will drive the strategic and operational excellence of our threat detection, incident response, and vulnerabilitymanagement functions across a globally distributed digital estate. Reporting directly to the Chief Information Security Officer (CISO), this high-impact position is responsible for setting and executing the … in Cybersecurity, Computer Science, or a related discipline—or equivalent practical experience. Industry-recognised certifications (e.g., CISSP, GIAC, GCIH, GCFE, GREM) a plus. Familiarity with ITIL and enterprise project management practices. Experience managing third-party vendors and security transformation initiatives in large-scale, digitally complex organisations. More ❯
to ISO standards, PSN and the NHS DSPT. Manage Information Security audit programs for ISO27001 and other compliance regimes including remediation of audit findings. Manage the NHSCFA Cyber Risk Management process, producing comprehensive Risk Documentation in accordance with the National Cyber Security Centre best practice. Assess the effectiveness of Security Controls by conducting reviews, internal audits and spot-checks … of ICT Security Infrastructure elements including, but not limited to: firewall, IDS/IPS, anti-malware, web and email filtering, MDM, SIEM, patch and vulnerability management. Support the ICT Security Incident Management Process, reviewing security incidents, weaknesses and malfunctions relating to the NHSCFA's systems, taking appropriate remedial action. Produce reports for Information security risk and compliance including More ❯
and resilient OT solutions, ensuring alignment with business objectives and industry best practices. Lead the design and execution of secure and resilient OT solutions (e.g. network segmentation, zero trust, vulnerabilitymanagement, endpoint protection, remote access, IAM, IDS) ensuring alignment with business objectives and industry best practices like NIST and ICE 62443 Technical Expertise: Serve as a subject matter … Solution Design: Collaborate with cross-functional teams to design and implement robust OT security solutions, considering the evolving threat landscape and emerging technologies. Risk Assessment: Conduct risk assessments and vulnerability analyses of OT systems, recommending mitigation strategies and proactive security measures. Technical Documentation: Create and maintain detailed architectural documentation, ensuring clarity and compliance with company standards. Collaboration: Work closely More ❯
and infrastructure design. Technical Toolkit: Strong command of Azure Log Analytics, KQL, and Azure-based security tools. Scripting: Python, PowerShell, Shell. Experience with IDS/IPS, firewalls, SIEMs, and vulnerabilitymanagement tools. Strong grasp of Active Directory, Azure AD, and identity access governance. Familiarity with secure infrastructure platforms: SQL Server, Oracle, HA clustering. More ❯
and infrastructure design. Technical Toolkit: Strong command of Azure Log Analytics, KQL, and Azure-based security tools. Scripting: Python, PowerShell, Shell. Experience with IDS/IPS, firewalls, SIEMs, and vulnerabilitymanagement tools. Strong grasp of Active Directory, Azure AD, and identity access governance. Familiarity with secure infrastructure platforms: SQL Server, Oracle, HA clustering. More ❯
London, England, United Kingdom Hybrid / WFH Options
ProtonMail
of thousands of assets, necessary to the fulfillment of Proton’s privacy mission. Since 2018, the team has been providing services to other business units, including security monitoring, risk management, internal advisory, product security auditing, vulnerabilitymanagement and identity & access management. Our mandate includes the protection of people, devices, applications, infrastructure, data and software within the company. … that must run reliably 24/7 Debug and resolve infrastructure issues efficiently, applying your problem-solving skills to maintain system stability and performance Automate routine tasks using configuration management tools and scripting languages (e.g. Puppet, Ansible, Terraform, Python, Bash) Be proactive in identifying areas of improvement and implementing effective solutions Monitor system performance, ensure system availability, and reliability More ❯
and fostering customer trust. Your day to day: Lead the application and API security initiatives, ensuring robust protection mechanisms are in place. Own and drive the Application Security Posture Management (ASPM) function. Integrate security within the plan/design phase through threat modelling, code and architecture reviews, and by defining secure coding standards, libraries, and best practices. Configure and … DevSecOps and SDLC tooling, including SAST, DAST, SCA, ASPM and CSPM. Hands-on experience with IAM solutions such as Auth0, or AWS Cognito Strong background in threat modelling and vulnerability management. Strong background in AWS, cloud computing concepts, and cloud security best practices. Bonus points if: Previous experience as a software engineer Experience running a security champion program. Knowledge … of security incident management and response. Relevant certifications such as OSCP, OSWP, CISSP, AWS Security Specialty, or similar. Interview Process: 15 minute Chat with someone from our Internal Talent Team 90 minute Technical Interview with our Lead DevSecOps Engineer 60 minute Culture fit interview with Tech Principal of Platform Engineering and non-technical person Benefits: This role will be More ❯
leader to head global security operations at an innovative, fast-paced technology organisation. This role will drive the strategic and operational excellence of our threat detection, incident response, and vulnerabilitymanagement functions across a globally distributed digital estate. Reporting directly to the Chief Information Security Officer (CISO), this high-impact position is responsible for setting and executing the … in Cybersecurity, Computer Science, or a related discipline—or equivalent practical experience. Industry-recognised certifications (e.g., CISSP, GIAC, GCIH, GCFE, GREM) a plus. Familiarity with ITIL and enterprise project management practices. Experience managing third-party vendors and security transformation initiatives in large-scale, digitally complex organisations. #J-18808-Ljbffr More ❯
Security allowing you to grow and develop your career. We offer full 360-degree services to our clients from initial consulting on a range of areas including Risk Assessments, VulnerabilityManagement, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, Penetration Testing and much more. We More ❯
Security allowing you to grow and develop your career. We offer full 360-degree services to our clients from initial consulting on a range of areas including Risk Assessments, VulnerabilityManagement, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, Penetration Testing and much more. We More ❯
Incident Response team, coordinating with other Cyber Operations teams to identify, report, and remediate security incidents, including triaging events, analyzing networks and endpoints, reverse engineering malware, threat hunting, and vulnerability management. You will develop and implement SOPs, playbooks, and processes to streamline monitoring and investigations, supporting GCS's cybersecurity operations and incident response programs. The ideal candidate should demonstrate … incident response plans Conduct trend analysis and develop defense signatures Desired Skills: Certifications such as GIAC, GCIH, GCIA, ITIL Familiarity with NIST frameworks, Cyber Kill Chain Experience with case management, SOAR, SIEM, EDR tools Experience with multinational organizations and automation scripting (Python) Qualifications: Bachelor's degree or equivalent in Computer Science, Cybersecurity, or related fields Additional Information: At McDonald More ❯
London, England, United Kingdom Hybrid / WFH Options
Barclay Simpson
and compliance teams to ensure that secure design principles and automated security controls are Embedded throughout the software development lifecycle (SDLC). You will take ownership of threat modeling, vulnerabilitymanagement, and security automation efforts with a specific focus on cloud platforms, primarily Google Cloud Platform (GCP). You will be instrumental in building scalable, resilient security architectures More ❯
Network and Infra Endpoint Security Architect - London London, England, United Kingdom 2 weeks ago IT Security Solution Architect - Director London, England, United Kingdom 2 weeks ago Senior Security Analyst - VulnerabilityManagement Welwyn Garden City, England, United Kingdom 13 hours ago London, England, United Kingdom 4 weeks ago London, England, United Kingdom 6 hours ago Principle Security Architect - Digital More ❯
London, England, United Kingdom Hybrid / WFH Options
Jaja Finance
threats and implement controls. Review application code for security flaws and provide remediation guidance. Plan and execute security testing activities, including SAST/DAST/IAST, penetration testing, and vulnerability scanning. Ensure applications comply with security standards such as OWASP Top 10, OWASP ASVS, MAVS, PCI DSS, and GDPR. Assist in designing secure application architectures, including authentication, access controls … with secure software development methodologies, such as Secure SDLC and DevSecOps. Understanding of IDEs, code repositories, and CI/CD solutions. Proven experience in security assessment, penetration testing, and vulnerability management. Strong knowledge of web application security concepts, including secure coding practices and common vulnerabilities. Proficiency with security testing tools like Burp Suite, SonarQube, Checkmarx, Veracode. Excellent analytical, problem More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Harvey Nash
Senior VulnerabilityManagement consultant sought by leading investment bank based in London. **Inside IR35** - Hybrid working Daily responsibilities: Provide vulnerabilitymanagement expertise involving infrastructure, cloud and enterprise applications. Primary contact for the companies vulnerabilitymanagement involving processes, reporting, enhancements, compliance and interacting with business stakeholders. Operationalize weekly vulnerability status reports for senior leadership … including UK CISO on company vulnerabilitymanagement KPIs/KRIs Preparation of vulnerabilitymanagement process and procedure documentation Provide consulting services to the vulnerabilitymanagement team to assist in their security design to identify potential risks Review the security issues and recommend the appropriate controls to mitigate these risks Provide security awareness to clients … Provide support to other consultants through mentoring and peer reviews of work products as required Provide ad hoc consulting services to the general user community Essential: Experience working with vulnerabilitymanagement tools and data such as Tenable, Qualys, Rapid 7, Microsoft Defender, Aqua, Palo Alto Xpanse. Jira to manage project work, timelines and operational tickets. 5+years of relevant More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harvey Nash
Senior VulnerabilityManagement consultant sought by leading investment bank based in London. **Inside IR35** - Hybrid working Daily responsibilities: Provide vulnerabilitymanagement expertise involving infrastructure, cloud and enterprise applications. Primary contact for the companies vulnerabilitymanagement involving processes, reporting, enhancements, compliance and interacting with business stakeholders. Operationalize weekly vulnerability status reports for senior leadership … including UK CISO on company vulnerabilitymanagement KPIs/KRIs Preparation of vulnerabilitymanagement process and procedure documentation Provide consulting services to the vulnerabilitymanagement team to assist in their security design to identify potential risks Review the security issues and recommend the appropriate controls to mitigate these risks Provide security awareness to clients … Provide support to other consultants through mentoring and peer reviews of work products as required Provide ad hoc consulting services to the general user community Essential: Experience working with vulnerabilitymanagement tools and data such as Tenable, Qualys, Rapid 7, Microsoft Defender, Aqua, Palo Alto Xpanse. Jira to manage project work, timelines and operational tickets. 5+years of relevant More ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced VulnerabilityManagement Engineer to join our Cyber Security team. As a VulnerabilityManagement Engineer, your primary responsibility will be to manage existing vulnerabilitymanagement-specific … tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerabilitymanagement tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerabilitymanagement activities Process vulnerability data to … provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerabilityMore ❯
Join to apply for the Senior System Engineer - Wellington Management Company, LLP role at Jobs via eFinancialCareers 4 days ago Be among the first 25 applicants Join to apply for the Senior System Engineer - Wellington Management Company, LLP role at Jobs via eFinancialCareers Get AI-powered advice on this job and more exclusive features. About Us About Us … Wellington Management offers comprehensive investment management capabilities that span nearly all segments of the global capital markets. Our investment solutions, tailored to the unique return and risk objectives of institutional clients in more than 60 countries, draw on a robust body of proprietary research and a collaborative culture that encourages independent thought and healthy debate. As a private … partnership, we believe our ownership structure fosters a long-term view that aligns our perspectives with those of our clients. About The Role THE POSITION The Attack Surface Management team is seeking a Senior Security Engineer to be a key member of our team. There will be a heavy focus on building, maturing, and operationalizing a configuration baselines program More ❯
Trust in digital transactions and financial technologies is crucial for the smooth functioning of modern society. Neelam Kadbane, our next pathbreaker, Senior Vulnerability Analyst at Mastercard, identifies and addresses security vulnerabilities within Mastercard's environment & products by conducting network penetration tests. Neelam talks to Shyam Krishnamurthy fromThe Interview Portal about the innumerable challenges and the satisfacation of her work … . It was a significant achievement for me, especially since it's rare for companies to hire freshers directly into the InfoSec domain. At Qualys, I worked with the VulnerabilityManagement team, where we researched new CVEs and zero-day vulnerabilities, and developed signatures for vulnerability scanners. A zero-day vulnerability is a security flaw in … software or hardware that is unknown to the vendor or developer. Since the vendor is unaware of the vulnerability, no patch or fix is available, making it highly dangerous. The term "zero-day" comes from the fact that once the vulnerability is discovered by malicious actors, the vendor has zero days to fix it before it can be More ❯
Job Description Remediation Engineer – Security & VulnerabilityManagement Location: Middlesex, UK (4 days from office weekly) We are seeking a technically proficient Remediation Engineer in Security & VulnerabilityManagement to support our vulnerabilitymanagement and threat remediation efforts. The successful candidate will analyze security vulnerabilities, coordinate with cross-functional teams, and implement timely, effective remediation to … reduce the organization’s risk exposure. This includes managing vulnerabilities across on-premise environments, AWS, and Azure, through effective vulnerability lifecycle management, stakeholder engagement, and comprehensive tracking and reporting. Technical Skills: Strong knowledge of vulnerabilitymanagement tools (e.g., AWS Inspector, Azure Security Center, Qualys, or similar) Solid understanding of operating systems (Windows, Linux) Hands-on experience … with AWS and Azure cloud security practices Familiarity with patch management, endpoint protection, and configuration management tools In-Depth Knowledge Of: Windows Server, Linux distributions (Ubuntu, RHEL/CentOS) Network and endpoint security principles Patch management and vulnerability lifecycle Vulnerability scanning and management tools (e.g., Tenable, Qualys, Rapid7) Scripting and automation (PowerShell, Bash, Python More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Next Ventures
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerability scanning and remediation activities via Tenable VulnerabilityManagement Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerabilitymanagement tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerability scanning and remediation activities via Tenable VulnerabilityManagement Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerabilitymanagement tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯
industry. We have an exciting opportunity to support the Air Force Enterprise IT as a Service (EITaaS) Wave 1, specifically advancing the solution for bringing the EITaaS IT Service Management offerings to SIPR. We are currently seeking a Nessus Administrator for an onsite position in Chantilly, VA. We are seeking a skilled Nessus Administrator to manage, configure, and optimize … our Nessus vulnerability scanning and assessment platform. The Nessus Administrator will be responsible for ensuring that Nessus is effectively integrated into the organization's vulnerabilitymanagement processes, running regular scans, troubleshooting issues, and providing detailed reports. This role is pivotal in helping maintain the security posture of our network infrastructure by identifying, assessing, and remediating vulnerabilities. Minimum … of 10+ years' experience managing vulnerability scanning tools, with a focus on Nessus. DoD 8140 compliance, CompTIA Security + or higher Must have Active Secret Clearance Proven experience administering and configuring Nessus servers, scanners, and plugins Experience working with large-scale environments, conducting network vulnerability assessments, and remediating findings. Strong understanding of vulnerabilitymanagement, risk assessment More ❯