security partners and working with project management teams on key projects. Supporting the wider Information Security team in building the Internal Control Framework (ICF), vulnerability management, and responding to technical audits. Supporting the wider Information Security team in promoting security awareness and best practice throughout the Group. Required skills …/experience: Excellent knowledge of security technologies and domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. Working knowledge of Privileged Access Management (PAM) best practice, technologies, and procedures. Working knowledge of Microsoft technologies such as Windows Server, Active Directory and SQL Server. more »
Senior Account Executive - £100k Base Salary + OTE 5 days a week in South Manchester office. The Role Selling enterprise web vulnerabilityscanning software to application security teams at some of the largest organizations in the world. Being the primary contact for qualified and non-qualified inbound leads more »
South East London, London, United Kingdom Hybrid / WFH Options
The Fortune Group (Recruitment) Limited
secure environment. Suitable Lead Security Engineers will work remotely or in the London office. Projects that need to be completed Security Awareness OpenSource Software scanning Automated VulnerabilityScanning Kubernetes VulnerabilityScanning Supply Chain monitoring (container images etc.) SIEM and Monitoring/Alerting service AntiVirus/ more »
core services design, deploy and troubleshoot. Familiar with ITIL service management. Security best practices, system and OS level security hardening (CISCAT benchmarking etc) security vulnerabilityscanning tools such as Nessus. GITOPs experience. Experience in Terraform, Ansible and ideally packer in an air gapped environment. Desirable knowledge:k8/ more »
Employment Type: Permanent
Salary: 25 days AL, buy / sell 5 days AL, birthday off, private healthcare
research, code/script analysis, reverse engineering, exploitation, and documentation.- Identifying, testing, and implementing cutting-edge automated tools or enhancing existing ones to optimize vulnerability management efficiency and effectiveness.- Developing and refining code/scripts to bolster vulnerability detection, remediation/mitigation, and operational functions.- Integrating vulnerabilityscanning and configuration hardening in cloud environments (e.g., AWS, Microsoft Azure, Google Cloud Platform).- Conducting vulnerabilityscanning and reporting in alignment with the application development continuous integration and continuous delivery pipeline, streamlining work efforts through efficient use of security tools.- Spearheading security initiatives and projects more »
detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerabilityscanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA … of the organization.Participates in change management meetings and provides expert input to ensure security is maintained.Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering.Ability to manage and continuously improve upon vulnerability management program.Ability to propose more »
About this Role Role Title: Threat & Vulnerability Lead Location: UK- London La Fosse Associates are working with a global Insurance business who are looking to add a Threat & Vulnerability Lead to their strong internal security function. You will report directly into the BISO and be a senior individual … within their existing team. You will be joining the UK entity of their Security team to lead on vulnerabilityscanning and threat intelligence reporting. They are a large organisation with a huge amount of vulnerabilities and need somebody who understands how to approach on this scale. You will … in the business to ensure security is prioritised Work on and lead penetration tests across the global estate Requirements: Hands on experience working with vulnerability management technology- preferably Qualys Direct experience working within a regulated in-house security team Understanding and knowledge of different security frameworks- MITRE ATT&CK more »
Oxfordshire, England, United Kingdom Hybrid / WFH Options
University of Oxford
Security Operations and the rest of the team. OxCERT runs an on-premises Elasticsearch-based SIEM solution, an Intrusion Detection System (IDS), and a vulnerabilityscanning service as well as other open source and commercial tools. We are one of the first UK universities to have the capability more »
Response activities for the Firm’s environment.Enforce security policies and procedures by administering and monitoring appropriate systems, events and answering client queries.Perform threat and vulnerability management functions including vulnerability scans and/or analyze results of scans and assist with remediation as required.Collaborate with the Information Security Team … to consume feeds from a suite of security tools including AV, Advanced Malware Detection, SIEM, IDS, Vulnerability scanners, etc.Ensure MLP enterprise security products are functioning and protecting the environment as expected while providing stability and maintaining policies and procedures.Actively monitor new and emerging security and privacy related technologies, trends … broad spectrum of technologies – including operating system, cloud, Active Directory, Group Policy, DNS, Messaging.High level understanding of internetworking, data transmission and encryption protocols.Experience with vulnerability management scanning platforms.Ability to handle sensitive and/or confidential materials with appropriate discretion.Scripting and development skills (Python, Powershell, VBscript, Rest a plus more »
practices especially with implementation in GCP In-depth understanding of GCP services, security controls, and best practices. Proficiency in using GCP-specific security tools, vulnerability scanners, and penetration testing tools. Strong experience with infrastructure-as-code (IaC) using Terraform for GCP resource provisioning and management. Familiarity with CI/ more »
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
for you. We have a comprehensive training plan that we will tailor around you. About AppCheck: AppCheck is a B2B cyber security software platform (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability scan for security vulnerabilities in more »
You will be joining a developing team as a technical resource where you will have the opportunity to lead on projects around incident response, vulnerability management, EDR scanning and more. You will work with an already wide ranging tech stack for an exciting scaling business with major expansion … Data Protection & GDPR would be highly sought after too. In this role you will: Work on a variety of technical projects across incident response, vulnerability management, triaging and more Work with third parties and vendors to ensure full security coverage Provide support to the governance and data protection teams … Requirements: Hands on experience working in an in-house security environment Direct experience working within a variety of security tools- SIEM, EDR, Vulnerability scanners, etc Understanding and knowledge of different security frameworks- ISO27001, PCI DSS, Cyber Essentials, etc. For more information, please apply or send your CV direct to more »
through developing the operational systems Maintain, support and develop their security procedures and tooling Assist and support the wider security teams including Architecture, Audits, Vulnerability Management, Project Management and 3rd parties Be available for out of hours support in case of critical issues - uncommon Skills Required: Security Technologies & Tooling … endpoint protection tools, vulnerability scanners, network security, cloud security Access Management & Authentication: IAM, PAM, PIM, SSO, MFA etc Microsoft: Active Directory, Windows Server & SQL Server Linux: Ubuntu, RedHat, Rocky Cloud: 365, Azure, AWS DevOps/DevSecOps: Infrastructure as Code - IaC Scripting: PowerShell, Python, Bash In line with the Conduct more »
experienced Engineers to work as part of a security transformation project with one of our financial services clients, and looking for a skilled Tenable Scanning Engineer responsible for maintaining the Tenable product suite and ensuing scanning coverage across the organisation. Job Description We are looking for an highly … Tenable product suite (Security Centre, Nessus scan engines, Tenable.io) and peripherals with Engineering. Local and network credentials Tenable Security Centre and provisions access to vulnerabilityscanning systems. Integration of Nessus/Security Centre with other security and IT systems management tools (i.e. Splunk, ServiceNow) Developing and maintaining standard … processes and operating procedures, creating technical architecture diagrams and system build documentation. Operating the scanning tools and maintaining coverage along with supporting the vulnerability management and remediation teams in understating how to remediate vulnerabilities (i.e. laptops, VMs, wireless devices) Experience of vulnerability management team to build asset more »
identifying vulnerabilities, enhancing security measures, and ensuring the safety of our clients’ digital environments. Your responsibilities will span a wide range of tasks, from vulnerabilityscanning to technical content creation. Responsibilities: Vulnerability Detection and Automation: Collaborate with our security team to scan customer systems for critical vulnerabilities. … Develop new vulnerability checks using tools like Nuclei. Curate crowd-sourced checks for inclusion in our Intruder platform. Automate penetration testing processes to scale across multiple clients simultaneously. Rapid Response and Custom Scanning: Conduct custom scans on customer targets to identify emerging critical weaknesses. Provide rapid response solutions … Occasionally participate in industry events and conferences. Qualifications and Experience: Industry Experience: Minimum of 2 years in offensive security roles. Proven track record in vulnerability assessment and penetration testing. Educational Background: Technical academic background in software engineering or cyber security. Certifications (One or More): OSCP OSWE OSEP CRT CCT more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
team engagements to tune and validate detection tooling. Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetration testing, and vulnerability scanning. Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams. Manage the delivery of daily more »
Warrington, England, United Kingdom Hybrid / WFH Options
Tata Consultancy Services
Configure and manage Microsoft security solutions for optimal protection. Perform data profiling and analysis to identify patterns, trends, and insights. Conduct security assessments and vulnerability scanning. Respond to security incidents and participate in incident response activities. Stay updated on evolving security threats and Microsoft security solutions. Act as a more »
and a pioneering mindset. Responsibilities Deploy, maintain, and enhance highly scalable multi-cloud infrastructure for blockchain nodes Contribute to hardening, logging and monitoring, and vulnerabilityscanning for infrastructure Identify where automation can enhance infrastructure scalability Qualifications 5+ years of experience as a DevOps Engineer Experience with AWS and more »
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and monitor … for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular VulnerabilityScanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. … Asses the urgency and severity of incidents. Determine whether an incident requires immediate action or further investigation. Escalate incidents to higher tiers when necessary. VulnerabilityScanning: scan systems for vulnerabilities. and manage vulnerabilities discovered during scans. Security Tool Management: Configure and manage security tools (e.g., SIEM, IDS/ more »
Tesco Technology are looking for a Senior Security Analyst reporting into the Vulnerability Management team. This is an exciting opportunity for a highly motivated security focused individual to join our expanding organisation. The scale and complexity of Tesco creates a huge opportunity for someone to apply their existing skills … public cloud environments. Following our Business Code of Conduct and always acting with integrity and due diligence and have these specific risk responsibilities: Maintaining vulnerabilityscanning platforms to identify and analyse vulnerabilities. Taking a risk-based approach to prioritise remediation efforts. Working with engineering teams to remediate issues. … security incidents and reporting about relevant security threats to contribute to our internal detection engineering programme. Work alongside our analysts to upskill them in Vulnerability Management and look for patterns and issues that can be fixed centrally. POC assessments from our active Bug Bounty Program. You will need: 5+ more »
As a Senior Network Security Engineer, you will be instrumental in safeguarding our client's network infrastructure, focusing on perimeter networks, DMZs, firewalls, proxies, vulnerabilityscanning, and Network Access Control (NAC). You will lead the implementation of key security controls, conduct audits, and provide consultancy to the more »
able to effectively communicate security vulnerabilities to application developers and/or senior managers who may have little to no experience with application security vulnerability specifics.The Team:Understanding the requirements of the applications and how to use themTesting applications using a variety of tools to identify vulnerabilities that could … expose the Bank to riskMonitoring existing and proposed security standard setting groupsConducting meetings to communicate the findings and implications to stakeholdersPerforming vulnerability fix verification testing in support of the remediationProviding technical support to clients, management and staff throughout risk assessments and the implementation of appropriate data security procedures and … GPEN)SANS GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)SANS GIAC Web Application Penetration Tester (GWAPT)Certified Ethical Hacker (CEH)Experience in conducting vulnerability assessments, code reviews and penetration tests against web/mobile application technologies, services, platforms and languages to find flaws and exploits (e.g. SQL Injection more »
Basingstoke, England, United Kingdom Hybrid / WFH Options
Matrix
of network protocols, firewalls (Network Virtual Appliances) and routing Experience of hardening IT infrastructure based on security audits, standards and industry best practice (e.g. vulnerabilityscanning, Penetration testing and ISO27001/17/18). more »