London, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
Job Description Role Overview We're looking for a pragmatic, risk-focused Information Security Manager to work within Nest and maintain our ISO 27001 certified corporation Information Security Management System (ISMS). We sit in the second line of defence and advise the business on security risks, incidents, audits, assurance, and the implementation and monitoring of security controls that … protect Nest. You'll have a solid background in information security management systems, technology, and love communicating technical concepts to non-technical people. Please note the minimum criteria for this role is: Practical experience of operating certified ISMS using ISO 27001/2, NIST CSF, and other security standards in the design and management of information security controls. … to audit and evidence compliance with security policies, standards, etc. Understanding and experience of various Information Security domains including Security Architecture, Information Security Governance, Network Security, Data Protection, Risk Management, Access Management, VulnerabilityManagement, Anti-Malware, Mobile Device Management, and Cloud Security. We are open to discussing working patterns. We welcome all internal applicants to More ❯
training offered. This is an all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerabilitymanagement (tenable is tool used) and patching Security policy, compliance, and user More ❯
training offered. This is an all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerabilitymanagement (tenable is tool used) and patching Security policy, compliance, and user More ❯
GCS) controls. The role acts as a primary contact for all Cybersecurity matters, requiring a broad understanding of security controls and their effective implementation in corporate environments. Strong relationship management skills across the region/sub-region are essential to facilitate business adoption. As a Director within the Regional Security Office (RSO) service, you will be accountable for service … delivery to the assigned region/sub-region and solution lines. Effective relationships with senior leadership are crucial to support regional business goals and maintain an effective security risk management regime aligned with a security risk mitigation strategy. The role involves presenting to local leaders, regulators, and clients as needed, with prior regulatory management experience required. This highly … colleague security culture programs. Represent the region/sub-region in security incident management. Manage remediation efforts, e.g., internal audit findings. Oversee cybersecurity compliance and conduct management. Cybersecurity Risk Management: Manage a cybersecurity risk committee to support cyber risk management. Track remediation of audit and compliance findings. Review cybersecurity metrics and lead remediation programs. Lead or sponsor cybersecurity initiatives. More ❯
employee at M.C. Dean, you will join forces with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the … systems Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process Conducting ICS/SCADA system inventories following DoD guidance Conducting vulnerability scanning and document system vulnerabilities Supporting ISO standardization and Quality inspections Participating in continuous improvement of organizational cybersecurity posture Provide system security engineering services and/or products to … trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the program life cycle. Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations. Review assessment and accreditation (A&A) documentation, provide feedback on completeness and compliance of its content. Apply system security engineering More ❯
a Department of Defense (DoD) Secret security clearance. Desired Skills & Qualifications: Python/Java programming languages Understanding of DevOps principles: Knowledge of CI/CD pipelines, GitOps, automation, configuration management, and infrastructure as code Familiar with Scaled Agile methodology and its best practice Security knowledge: Familiarity with security best practices, risk, compliance & vulnerabilitymanagement, encryption & PKI, incident … Architect strongly preferred) and its services (including fundamental AWS networking), knowing Azure is a plus Containerization: Knowledge of Docker and Kubernetes Strong understanding of API Design, testing, development and management Collaboration and communication: Ability to communicate and work effectively with development team members, operations, and security teams Problem-solving and analytical skills: Ability to identify issues and develop effective … to accelerate workload Desired Tools: CI/CD tools: Gitlab, Nexus Managed Artifacts, AWS: AWS EKS, EC2, Lambda, S3, EBS/EFS, VPC, DNS, IAM, KMS, CloudWatch, CloudTrail Configuration management: Ansible, Terragrunt, ArgoCD Build/Development: VS Code, Maven Event streaming platform (nice to have): Kafka messaging Container orchestration: Kubernetes, Docker, Security, Monitoring and logging: ACAS/Grype vulns More ❯
focused, and motivated candidate who can adapt to a constantly changing environment. What you will do - Manage and maintain a complex server-based enclave. Performing and mitigating system scans, vulnerabilitymanagement activities, and active directory configuration. - Plan and implement IT enhancements needed for system optimization. - Identify and remediate hardware and/or software issues. - Create and update clear … concise, and accurate incident resolution documentation. - Support overlapping projects and maintain good inter-departmental relations. - Communicate and publish statuses of system outages, as needed. - Manage information assurance vulnerability alerts (IAVAs) and system security scanning of equipment suites in accordance with System Security Plans. - Actively identify and initiate IAVA responses and system security scans for remediation, deploy IAVA patches and … Experience documenting and providing information for security accreditation and certification. - Experience using Splunk tools in infrastructure planning, data collection and comprehension, development, integration, configuring data inputs and forwarders, data management, and/or monitoring. - Experience with Network Security Technologies such as Multiple Domain, PKI, SSP, and/or Vulnerability Assessment. - Experience with High Assurance Internet Protocol Encryptor (HAIPE More ❯
moments. The ideal candidate has hand-on experience with advanced threat detection, incident response, and collaborative security assessments to protect critical government customer systems and infrastructure. Key Responsibilities: Perform vulnerability assessments, incident response, and threat hunting operations Support Purple Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies Able to execute strategic security plans aligned with … Teams to enhance overall security posture Work closely with Senir Analysts across technical domains to ensure comprehensive assessments and planning Tools and Techniques Use approved tools and techniques for vulnerability assessments and threat detection Stay connected with on-going evaluation of new tools and technologies to enhance team capabilities Required Qualifications: Bachelor's or Master's degree in Cybersecurity … Computer Science, Information Technology, or related field 3-5 years of experience in Cybersecurity operations Proven experience in incident response, threat hunting, and vulnerabilitymanagement Understanding of threat intelligence, risk assessment methodologies, and adversary tactics (MITRE ATT&CK, etc.) Knowledge of SIEMs, EDRs, forensic tools, and scripting languages (e.g., Python, PowerShell) Excellent communication and collaboration skills Preferred Qualifications More ❯
moments. The ideal candidate has hand-on experience with advanced threat detection, incident response, and collaborative security assessments to protect critical government customer systems and infrastructure. Key Responsibilities: Perform vulnerability assessments, incident response, and threat hunting operations Support Purple Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies Able to execute strategic security plans aligned with … Teams to enhance overall security posture Work closely with Senir Analysts across technical domains to ensure comprehensive assessments and planning Tools and Techniques Use approved tools and techniques for vulnerability assessments and threat detection Stay connected with on-going evaluation of new tools and technologies to enhance team capabilities Required Qualifications: Bachelor's or Master's degree in Cybersecurity … Computer Science, Information Technology, or related field 3-5 years of experience in Cybersecurity operations Proven experience in incident response, threat hunting, and vulnerabilitymanagement Understanding of threat intelligence, risk assessment methodologies, and adversary tactics (MITRE ATT&CK, etc.) Knowledge of SIEMs, EDRs, forensic tools, and scripting languages (e.g., Python, PowerShell) Excellent communication and collaboration skills Preferred Qualifications More ❯
security posture of our commercial business units in alignment with the ISO-27001 security framework. The ideal candidate will have practical experience in various information security responsibilities, such as vulnerabilitymanagement, infrastructure hardening, security investigation, and security governance. This role requires an inquisitive personality with problem-solving capabilities to guide and support our commercial business unit's security … posture in enabling our customer's needs. Responsibilities Review and analyse outputs from Qualys, or equivalent, vulnerability and compliance scans. Actively monitor and respond to alerts from our SIEM (Security Information and Event Management) platform. Monitor and react to activity from Antivirus and EDR (Endpoint Detection and Response) tools. Define and document security requirements for new development efforts. More ❯
training offered. This is an all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerabilitymanagement (tenable is tool used) and patching Security policy, compliance, and user More ❯
will have the experience to determine strategies and lead efforts to advance cyber defense capability. Key Responsibilities: A member of Leadership and Strategic Planning group Lead and coordinate advanced vulnerability assessments, incident response, and threat hunting operations Support Purple Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies Help develop and execute strategic security plans aligned … security posture Work closely with SMEs across technical domains to ensure comprehensive assessments and planning Tools and Techniques: Help teams in the use of approved tools and techniques for vulnerability assessments and threat detection Assist with the evaluation of new tools and technologies to enhance team capabilities Required Qualifications: Bachelor's or Master's degree in Cybersecurity, Computer Science … Technology, or related field 5-8 years of experience in Cybersecurity operations, including Blue Team, Red Team, or Purple Team roles Proven leadership in incident response, threat hunting, and vulnerabilitymanagement Strong understanding of threat intelligence, risk assessment methodologies, and adversary tactics (MITRE ATT&CK, etc.) Experience with SIEMs, EDRs, forensic tools, and scripting languages (e.g., Python, PowerShell More ❯
Risk and Compliance in London, United Kingdom Minimum Qualifications: Bachelor's degree or equivalent practical experience. 5 years of experience in program management. 5 years of experience with risk management or compliance in regulated industries (i.e., financial services, public sector, healthcare). 5 years of experience in program definition and management with a focus on audit compliance or … cross-functional or cross-team projects. Experience in one or more of the following: data protection, threat modeling, incident/emergency response, security risk mitigation or evaluation, OS hardening, vulnerabilitymanagement, pen testing, access management, or cryptographic concepts. Experience with ISO 27k family, SOC reports, PCI DSS, FedRAMP, or equivalent information security and privacy compliance certifications. Experience More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Woodside Staffing Solutions & Consulting
years' experience supporting DoD or Federal Cyber/IT initiatives. Current and active SECRET clearance Five (5) years IA (Information Assurance) experience Three (3) years of experience with DOD VulnerabilityManagement System Bachelor's degree preferred DoD 8570.01-M Certification: DFARS Information Assurance Contractor DISA FSO certified CCRI Team Lead and certification in penetration testing, such as: o … Penetration Tester (LPT) o Certified Expert Penetration Tester (CEPT) o Certified Ethical Hacker (CEH) o Global Information Assurance Certification Penetration Tester (GPEN) Additional Qualifications: • Proven proficiency performing CCRI/vulnerability assessment/penetration testing on networks, databases, computer applications and IT frameworks. • Strong analytical and problem-solving skills for resolving security issues. • Strong skills implementing and configuring networks and … of DOD security regulations, DISA STIGs. • Strong knowledge of SCAP • Strong knowledge of RMF • Excellent knowledge of and proficiency with: o VULNERATOR o USCYBERCOM CTO Compliance Program o Wireless vulnerability assessment o Web Services (IIS, Apache, Proxy) o Database (SQL Server, Oracle) o Email Services (Exchange) o Vulnerability Scans (NESSUS, SCCM) o Knowledge of Phishing exercises o USB More ❯
prioritise tasks as part of the IT team Previous 1st and 2nd Line support experience Problem solver with the ability to generate new ideas and bring them to the management team Essential Skills/Knowledge Good understanding of IT & network security best practices Able to identify and escalate potential security threats in line with department procedures Working knowledge of … patch and vulnerabilitymanagement Excellent support experience with Windows 10 and above Windows Server (2016 and above) administration and maintenance Active Directory and group policy experience Experience supporting IT hardware including Servers, Desktops, Laptops, etc. Knowledge of network communication protocols such as TCP/IP, DNS & DHCP Experience working with WAN, LAN, and wireless environments Strong technical and … V & Failover Cluster environments Endpoint protection tools, firewalls, antivirus/SIEM/EDR solutions Knowledge of SAN technologies SQL Server & T-SQL understanding Linux server administration Experience with resort management tools Knowledge of Google Workspace environment Day-to-day duties Lead a team of on-site support technicians, serve as an escalation point for technical support, and work closely More ❯
Maidstone, England, United Kingdom Hybrid / WFH Options
Payter B.V
security requirements and oversight for software, cloud infrastructure, and internal IT projects Harden cloud environments and internal IT systems against attacks and vulnerabilities Implement and manage security assessment tools (vulnerabilitymanagement, SIEM) across all environments Lead comprehensive penetration testing program for payment applications, infrastructure, and internal systems Risk Management & Compliance Perform regular internal security audits and policy … international scale-up, shaping the future in a booming market where you can have impact and growth opportunities. Technical skills: Security Technologies & Tools ● Experience with SIEM solutions ● Proficiency with vulnerabilitymanagement platforms ● Knowledge of container security solutions ● Experience with secret management solutions Cloud & Infrastructure Security ● Expertise in GCP IAM, security controls, and compliance frameworks ● Experience with infrastructure … services ● Understanding of zero trust network architecture principles Application Security ● Understanding of secure coding practices and code review techniques ● Knowledge of secure CI/CD pipeline implementation Compliance & Risk Management ● Experience implementing security controls for multiple compliance frameworks simultaneously ● Knowledge of payment technologies and standards ● Experience with security risk quantification methodologies ● Understanding of data privacy regulations beyond PCI (e.g. More ❯
London, England, United Kingdom Hybrid / WFH Options
PAYTER
security requirements and oversight for software, cloud infrastructure, and internal IT projects Harden cloud environments and internal IT systems against attacks and vulnerabilities Implement and manage security assessment tools (vulnerabilitymanagement, SIEM) across all environments Lead comprehensive penetration testing program for payment applications, infrastructure, and internal systems Risk Management & Compliance Perform regular internal security audits and policy … international scale-up, shaping the future in a booming market where you can have impact and growth opportunities. Technical skills: Security Technologies & Tools • Experience with SIEM solutions • Proficiency with vulnerabilitymanagement platforms • Knowledge of container security solutions • Experience with secret management solutions Cloud & Infrastructure Security • Expertise in GCP IAM, security controls, and compliance frameworks • Experience with infrastructure … services • Understanding of zero trust network architecture principles Application Security • Understanding of secure coding practices and code review techniques • Knowledge of secure CI/CD pipeline implementation Compliance & Risk Management • Experience implementing security controls for multiple compliance frameworks simultaneously • Knowledge of payment technologies and standards • Experience with security risk quantification methodologies • Understanding of data privacy regulations beyond PCI (e.g. More ❯
security posture of our commercial business units in alignment with the ISO-27001 security framework. The ideal candidate will have practical experience in various information security responsibilities, such as vulnerabilitymanagement, infrastructure hardening, security investigation, and security governance. This role requires an inquisitive personality with problem-solving capabilities to guide and support our commercial business unit's security … posture in enabling our customer's needs. Responsibilities Review and analyse outputs from Qualys, or equivalent, vulnerability and compliance scans. Actively monitor and respond to alerts from our SIEM (Security Information and Event Management) platform. Monitor and react to activity from Antivirus and EDR (Endpoint Detection and Response) tools. Define and document security requirements for new development efforts. More ❯
powered advice on this job and more exclusive features. Bachelor's degree or equivalent practical experience. 5 years of experience in program management. 5 years of experience with risk management or compliance in regulated industries (i.e., financial services, public sector, healthcare). 5 years of experience in program definition and management with a focus on audit compliance or … cloud compliance. Minimum qualifications: Bachelor's degree or equivalent practical experience. 5 years of experience in program management. 5 years of experience with risk management or compliance in regulated industries (i.e., financial services, public sector, healthcare). 5 years of experience in program definition and management with a focus on audit compliance or cloud compliance. Preferred qualifications … cross-functional or cross-team projects. Experience in one or more of the following: data protection, threat modeling, incident/emergency response, security risk mitigation or evaluation, OS hardening, vulnerabilitymanagement, pen testing, access management, or cryptographic concepts. Experience with ISO 27k family, SOC reports, PCI DSS, FedRAMP, or equivalent information security and privacy compliance certifications. Experience More ❯
including security monitoring, incident detection, analysis, and response establishing and documenting robust processes and workflows oversee the continuous improvement and development of security tools and technologies e.g. NDR, EDR,Vulnerability and Exposure Management, SIEM and SOAR work closely with business owners, to proactively identify and reduce cyber security threats and vulnerabilities We’re looking for someone who is … a security operations environment able to showcase a strong understanding of cyber security concepts, technologies, and best practices proven to manage and communicate effectively with diverse stakeholders, including executive management experienced overseeing security tools and technologies (SIEM, IDS/IPS, EDR, vulnerabilitymanagement) able to work with cloud environments exposure to threat modelling (We know it’s More ❯
security posture of our commercial business units in alignment with the ISO-27001 security framework. The ideal candidate will have practical experience in various information security responsibilities, such as vulnerabilitymanagement, infrastructure hardening, security investigation, and security governance. This role requires an inquisitive personality with problem-solving capabilities to guide and support our commercial business unit's security … posture in enabling our customer's needs. Responsibilities Review and analyse outputs from Qualys, or equivalent, vulnerability and compliance scans. Actively monitor and respond to alerts from our SIEM (Security Information and Event Management) platform. Monitor and react to activity from Antivirus and EDR (Endpoint Detection and Response) tools. Define and document security requirements for new development efforts. More ❯
ready to join our mission in creating a #CyberFit future! Our Cybersecurity Product Team is seeking an energetic, growth-oriented Senior Product Manager for Acronis RMM (Remote Monitoring and Management), a solution encompassing endpoint management, network monitoring, M365 security posture, SaaS security posture, and Center for Internet Security (CIS) compliance. As a key member of the product management … understanding of international regulatory compliance for MSPs is highly desirable. WHAT YOU'LL DO Shape Product Strategy : Assist in defining the vision and strategy for Acronis RMM, including endpoint management, network monitoring, M365 security posture, SaaS security posture, and compliance management, aligning with business goals and market trends. Engage Stakeholders : Collaborate with MSPs, customers, and internal teams to … performance and guide product iterations. Present insights and updates to stakeholders. Be a Product Advocate : Promote product features and benefits to clients and internal teams. WHAT YOU BRING Product Management Experience : 3+ years in product management, focusing on security, compliance, or IT governance tools, with a proven ability to identify opportunities and deliver impactful products. Expertise in Development More ❯
Ace Hardware corporate IT environment. What you'll do Build, test, support and improve the IT security infrastructure by: Reviewing security events for threats and risks Identifying and remediating vulnerability risks within the IT infrastructure Performing compliance analysis to maintain a secure architecture Providing hands on support, update and implementation activities for infrastructure components as necessary Interacting with business … security architecture and technologies typically implemented that protect networks from threats and vulnerabilities Skills & Competency Requirements 1 to 2 years of Microsoft Sentinel experience, including deployment, configuration and component management (Log Analytics workspace, Data Connectors, Analytics rules, Playbooks, etc.) Proficiency in Kusto Query Language (KQL) for creating custom queries and detection rules Fundamental engineering technical skills with Microsoft Active … Directory and authentication technologies Familiarization with engineering and administration concepts relating to access management, Network firewall administration, vulnerabilitymanagement and end point security technologies Fundamental understanding of network infrastructure concepts, technologies, protocols, and solutions Experience in implementing and supporting engineering projects from inception to implementation Ability to identify, develop and document processes and procedures Demonstrated personal skills More ❯
Role Overview As a Senior Network Engineer, you will be responsible for the design, implementation, management, and optimization of customer network environments, with a strong focus on network security and high availability. You will work closely with international teams to support operations across Europe, with regular travel to our European headquarters in Vienna, Austria. The ideal candidate will bring … manage firewalls (Palo Alto, Cisco), routers and switches (HPE, Cisco). Support and maintain Retail WAN networks using MPLS technology. Work closely with Security Operations (SecOps) team to ensure vulnerabilitymanagement is maintained. Provide technical leadership in network-related projects, including capacity planning, upgrades, and security enhancements. Monitor network performance, troubleshoot issues, and implement proactive solutions to minimize More ❯
to fostering a culture of security awareness and operational excellence, directly impacting the company's ability to achieve its ambitious goals. Spearhead the development of Duffel's Information Security Management System (ISMS) and guide the organisation through SOC 2 certifications. Implement and continuously improve security policies and technical controls, ensuring alignment with industry best practices and operational excellence. Monitor … de-identification, and data lifecycle management. Develop and execute internal audit programs, and effectively respond to external audits and due diligence requests. Leverage your technical knowledge to define risk management plans, secure vendor solutions and meet third party requirements. Actively contribute to Duffel's security awareness program, fostering a strong security culture throughout the organisation. Manage Vendor Security Assessment … operations and drive continuous improvement of these processes. Support the implementation and enhancement of Incident Management and VulnerabilityManagement policies. Partner with our Legal team to ensure security practices align with legal and regulatory requirements, particularly concerning data privacy and protection. What we're looking for in you: Strong software and cybersecurity technical background, including experiences with More ❯