Crawley, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
be required as part of specific projects or the wider role of a Senior Technical Consultant. ESSENTIAL KNOWLEDGE, SKILLS & EXPERIENCE Deep technical understanding across skills like Microsoft Sentinel, Tenable VulnerabilityManagement, Azure update Manager, and related technologies. Qualifications include Microsoft Security Certifications (e.g., SC200), Pen Testing/Related Certifications. DESIRED KNOWLEDGE, SKILLS & EXPERIENCE Knowledge in Microsoft Intune (Security … focused), Privileged Access Management (PAM), and Cloud Email Security Solutions is advantageous. Training can be provided if needed. KEY COMPETENCIES Demonstrate autonomy, responsibility, planning, and organization. Show passion through problem-solving, achievement focus, and self-motivation. Uphold integrity with quality focus, decision-making, and risk management. Exhibit respect via clear communication and relationship building. Additional qualities include adaptability, analytical More ❯
London, England, United Kingdom Hybrid / WFH Options
Salt
and mitigation of any non-compliance. Oversee IT Health Checks (ITHC) and lead remediation efforts. Deliver and implement Security Information Assurance work packages. Operate and maintain an Information Security Management System (ISMS) aligned to ISO27001. Manage vulnerabilities, security incidents, and operational risks. Maintain and improve security documentation and controls. Mentor and review work from junior colleagues and contribute to … team knowledge-sharing. About You You’ll Definitely Have: Demonstrated experience in Security Information Assurance roles. Hands-on knowledge of ISMS frameworks and ISO27001 compliance. Strong experience in vulnerabilitymanagement, risk mitigation, and incident response. Excellent communication and stakeholder engagement skills, including at senior levels. The ability to lead on complex, multi-threaded deliveries. Comfortable working in agile More ❯
in collaboration with developers, DevSecOps engineers, ensuring that security is seamlessly integrated into our CI/CD pipelines and all layers of infrastructure. Additionally, you will supervise security tool management and ensure cyber resiliency for consumer applications. A deep understanding of Google Cloud Security, Application Security, API security, and customer security systems is crucial. Key Responsibilities: Design and Implement … engaged and actively adopting industry-standard security designs Enforce Security Best Practices: Build and enforce security best practices across Google Cloud Platform (GCP) environments, ensuring robust identity and access management (IAM), network security, and encryption, in compliance with industry standards. Integrate Application Security: Drive the integration of application security practices, including secure coding and vulnerabilitymanagement, throughout … tools and processes to secure application development. Deep understanding of application security, including secure coding practices, OWASP Top 10, and API security standards. Knowledge of Customer Identity and Access Management (CIAM) solutions and API security frameworks. Knowledge of one or more programming languages with the ability to review and implement secure code. Strong understanding of security automation, orchestration, and More ❯
scripts (e.g. Sysmon & Auditd) 5 years of experience with the following threat hunting tools: Microsoft Sentinel for threat hunting within Microsoft Azure; Tenable Nessus and SYN/ACK for vulnerabilitymanagement; NetScout for analyzing network traffic flow; SPUR.us enrichment of addresses Mandiant Threat intel feeds Must be able to work 80% (Monday thru Thursday) onsite at AOUSC office … cloud-based applications such as: Microsoft Azure, Microsoft O365, Microsoft Active Directory, and Cloud Access Security Brokers (i.e., Zscaler). Review and analyze risk-based Security information and event management (SIEM) alerts when developing hunt hypotheses. Review open-source intelligence about threat actors when developing hunt hypotheses. Plan, conduct, and document iterative, hypothesis based, tactics, techniques, and procedures (TTP … hunts utilizing the agile scrum project management methodology. At the conclusion of each hunt, propose, discuss, and document custom searches for automated detection of threat actor activity based on the hunt hypothesis. Configure, deploy, and troubleshoot Endpoint Detection and Response agents (e.g., CrowdStrike and Sysmon). Collect and analyze data from compromised systems using EDR agents and custom scripts More ❯
London, England, United Kingdom Hybrid / WFH Options
Salt Digital Recruitment
and mitigation of any non-compliance. Oversee IT Health Checks (ITHC) and lead remediation efforts. Deliver and implement Security Information Assurance work packages. Operate and maintain an Information Security Management System (ISMS) aligned to ISO27001. Manage vulnerabilities, security incidents, and operational risks. Maintain and improve security documentation and controls. Mentor and review work from junior colleagues and contribute to … team knowledge-sharing. About You You’ll Definitely Have: Demonstrated experience in Security Information Assurance roles. Hands-on knowledge of ISMS frameworks and ISO27001 compliance. Strong experience in vulnerabilitymanagement, risk mitigation, and incident response. Excellent communication and stakeholder engagement skills, including at senior levels. The ability to lead on complex, multi-threaded deliveries. Comfortable working in agile More ❯
London, England, United Kingdom Hybrid / WFH Options
Cencora
their goals through: Wholesale Services - Fast access to veterinary pharmaceuticals and supplies through temperature controlled fleet of vehicles, warehouses and an ordering experience through the MWI online store. Practice Management Technology (Merlin) - Web/mobile solutions that support the core workflows of your veterinary business from warehousing to patient management, appointments and communication. Job Details : We're looking … engineering and technical support teams to proactively improve our offerings to our clients from a scalability, reliability, security and speed to market perspective. The role may have some line management duties but no direct reports. Our teams are distributed around the UK with offices based in Camberley and Castle Cary. There are twenty people in the UK today across … SQL Server, App Services, Blob Storage, Load Balancer, WAF) and best-practices for working with technology. An understanding of technologies that underpin a DevOps approach to cloud transformation and management, including but not exclusive to, IaaS, PaaS, SaaS, Containerisation and Orchestration, CI/CD. Experience with infrastructure as code (IaC) tools such as Terraform or ARM templates. Proficiency in More ❯
London, England, United Kingdom Hybrid / WFH Options
Enfuce
SaaS applications and tools like JumpCloud. Delivering responsive end-user support and driving automation to improve IT efficiency. In addition you'll support key security functions including incident response, vulnerabilitymanagement and security awareness initiatives. Working closely with both the Internal IT and Security teams you’ll help ensure compliance is being met and contribute to developing a … ISO27001 and PCI DSS compliance through documentation and process adherence. Help monitor and respond to basic security alerts under guidance from the Lead Security Operations engineer. Assist in regular vulnerability scan reviews and coordinate follow-ups for remediation. Participate in security awareness efforts, including training sessions and phishing simulations. Collect data for monthly reporting and incident summaries for stakeholders. … based applications, SSO, Jumpcloud, Google Workspace Familiarity with cybersecurity basics and an interest in growing in this area (ISO27001, PCI DSS is a plus). Experience with Jira Service Management and troubleshooting technical issues. Detail oriented with good documentation skills A collaborative, proactive attitude and willingness to learn. Clear communication skills with the ability to explain tech concepts to More ❯
lifecycle (SDLC), mitigate risks and ensure compliance with security standards. Skills Strong knowledge of application security vulnerabilities (OWASP Top 10, CWE, SANS 25). Hands-on remediation support and vulnerabilitymanagement expertise. Hands-on experience with threat modelling and secure code reviews. Experience with Mobile Application Security and API Security. Familiarity with security tools (Burp Suite, Fortify, Checkmarx More ❯
WiFi deployments (802.1X/Certificate-based) as well as guest and BYOD access requirements Familiar with firewall configuration fundamentals and advanced threat hunting Experience with security tools and general vulnerabilitymanagement, both at the perimeter and client Experience of backup methodologies and management Produce documentation for end users and the support desk IT Helpdesk Experience Bonus Skills More ❯
East and Africa, Asia and Oceania, and East Asia. The group has over 150,000 employees, offering services including commercial banking, trust banking, securities, credit cards, consumer finance, asset management, and leasing. As one of the top financial groups globally with a vison to be the world's most trusted, we want to attract, nurture and retain the most … Bank’s third Line of Defence, and in accordance with the Global Institute of Internal Auditors (IIA) International Standards (IIA Standards), provides independent assurance to the Board and Executive Management on the quality and effectiveness of governance, risk management and internal controls to monitor manage and mitigate key risks to achieving the Bank’s objectives. NUMBER OF DIRECT … members. Support the implementation of good practice throughout the team by maintaining a strong understanding of the audit methodology. Display strong appreciation of risk and control in banking. Coordinate Management Action Plans directly with stakeholders. This may involve the testing of remediated controls and closure of issue. Assist the Head of Audit in preparing third party submissions for the More ❯
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics … and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerabilitymanagement, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented with the ability to multi-task and prioritize efforts - Ability to express More ❯
write automations in Python, Java, or Typescript Ability to write secure-by-default Terraform for cloud deployments Solid understanding of cloud and application security principles Knowledge of network protocols, vulnerabilitymanagement, and creation of Incident Response programs Willingness to learn and adapt to new security challenges and technologies Relevant certifications such as AWS Certified Security, GIAC GC*, ISC2 More ❯
write automations in Python, Java, or Typescript Ability to write secure-by-default Terraform for cloud deployments Solid understanding of cloud and application security principles Knowledge of network protocols, vulnerabilitymanagement, and creation of Incident Response programs Willingness to learn and adapt to new security challenges and technologies Relevant certifications such as AWS Certified Security, GIAC GC*, ISC2 More ❯
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics … and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerabilitymanagement, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented with the ability to multi-task and prioritize efforts - Ability to express More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Familiarity with security frameworks such as NIST, IEC62443, NIS Regulations, CAF, or SoGP. Understanding of threat intelligence, attack surfaces, and cyber kill chains relevant to OT. Proven experience in vulnerabilitymanagement and incident response in OT contexts. Ability to manage stakeholder relationships and communicate technical risks effectively. A proactive approach to problem-solving and strong attention to detail. More ❯
lead investigator on complex security incidents across cloud and on-prem environments and perform root cause analysis, forensic investigation, and coordinate response actions. Enhance threat detection, incident response, and vulnerabilitymanagement in AWS and Azure Key Requirements – Senior Security Operations Engineer: 4+ years of hands-on experience in security operations or incident response, with a proven track record More ❯
multiple enclaves with varying classification levels Create, review, and maintain security authorization documentation in alignment with DoD and federal cybersecurity policies Implement and guide the team through the Risk Management Framework (RMF) accreditation lifecycle; prior DIACAP experience is acceptable Perform in-depth assessments of open-source, GOTS, and COTS software for security risks and integration viability Utilize and interpret … results from vulnerabilitymanagement platforms and automated security scanning tools Recommend and validate system-level mitigations to meet required security postures and accreditation criteria Collaborate with development and infrastructure teams to ensure secure design and implementation practices across cloud-based big data systems Support government efforts in securing trust boundaries and interconnection agreements with external systems Contribute to More ❯
Selby, North Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Drax
vulnerabilities, assess their impact, and prioritize responses accordingly. Incident Response: Developing and implementing incident response plans for handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. VulnerabilityManagement: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate penetration testing of OT systems … level of attention to detail, be self-motivated and have the ability to think outside the box when working on complex problems. This role requires strong communication and stakeholder management skills, with the ability to influence beyond your sphere of control. The successful candidate must be willing and able to obtain SC Clearance. Rewards and benefits As you help More ❯
vulnerabilities, assess their impact, and prioritize responses accordingly. Incident Response: Developing and implementing incident response plans for handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. VulnerabilityManagement: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate penetration testing of OT systems … level of attention to detail, be self-motivated and have the ability to think outside the box when working on complex problems. This role requires strong communication and stakeholder management skills, with the ability to influence beyond your sphere of control. The successful candidate must be willing and able to obtain SC Clearance. Rewards and benefits As you help More ❯
deployments. Provide technical support with risk assessments on PHI, and steering improvements to our environment in line with common standards such as NIST. Support External Penetration Testing and application vulnerability efforts, delivering assessments and prioritizing remediation activities across the organization. Be across Threat Intelligence relevant to our industry and geographic regions, and translating that to real world defenses for … Suite, Kali, Metasploit and such Scripting including the use of python, Powershell, bash or Javascript Securing networks, hosts, web applications and cloud native deployments Working with toolsets such as: vulnerabilitymanagement, firewalls, SIEM, PAM, IDS/IPS, EDR/XDR, WAF Working with code security controls such as SAST/DAST/IAST/RASP You should also More ❯
London, England, United Kingdom Hybrid / WFH Options
Fitch Group, Inc., Fitch Ratings, Inc., Fitch Solutions Group
department where innovation meets impact. Our team includes the Chief Data Office, Chief Software Office, Chief Technology Office, Emerging Technology, Shared Technology Services, Technology, Risk and the Executive Program Management Office (EPMO).Driven by our investment in cutting-edge technologies like AI and cloud solutions, we’re home to a diverse range of roles and backgrounds united by a … risk, financial crimes, or technology risk in enterprise environments. Ability to introduce AI/ML solutions to enhance productivity and compliance monitoring within employee engagement systems. History of leading vulnerabilitymanagement, issue remediation, and exception handling within a governance framework. Strong documentation and policy development skills, capable of aligning business unit security practices with corporate standards. Passion for More ❯
policies and frameworks. Subject matter expertise to support the AWS Security leadership and other security teams, with a focus on physical security. Physical/Protective Security Risk, Threat, and Vulnerability Management. Management and implement Physical security risk, threat, and vulnerability deliverables - e.g. internal and external audit items, security deliverables annual PSPF Self-assessment and ASD Cyber Survey. More ❯
Eastbourne, England, United Kingdom Hybrid / WFH Options
AxisOps
backup strategy Write markdown-based SOPs, runbooks, and infra playbooks that are used, tested, and evolved Work in regulated environments , including audit trail design, SBOM production, and CI-driven vulnerability/pentest workflows Collaborate closely with software engineers to make infrastructure serve delivery, not slow it down Note: this role requires you to work from our Eastbourne (UK) office … infra-as-code tooling Real-world experience operating hybrid environments (on-prem, AWS, Azure) Strong networking fundamentals: routing, firewalls, VPNs, switching A security-first mindset, with practical exposure to vulnerabilitymanagement and secure provisioning Clear written communication – your runbooks don’t need walkthroughs Familiarity with datacentre hardware: racking, patching, switch config, server diagnostics Proactive problem-solving skills and More ❯
London, England, United Kingdom Hybrid / WFH Options
Fitch Ratings
department where innovation meets impact. Our team includes the Chief Data Office, Chief Software Office, Chief Technology Office, Emerging Technology, Shared Technology Services, Technology, Risk and the Executive Program Management Office (EPMO). Driven by our investment in cutting-edge technologies like AI and cloud solutions, we’re home to a diverse range of roles and backgrounds united by … risk, financial crimes, or technology risk in enterprise environments. Ability to introduce AI/ML solutions to enhance productivity and compliance monitoring within employee engagement systems. History of leading vulnerabilitymanagement, issue remediation, and exception handling within a governance framework. Strong documentation and policy development skills, capable of aligning business unit security practices with corporate standards. Passion for More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Smart DCC
design and implement all security controls. In-depth understanding of the cyber threat landscape and advanced adversary tactics. Expert knowledge and experience of Linux, Windows, Azure, AWS, Elastic Search, Vulnerabilitymanagement, and Mitre ATT&CK. Excellent experience with NW configuration, Routing, Transit Gateways, Private endpoints, and log collection specifically Cloud watch, Cloudtrail, and S3 buckets. About the DCC More ❯