bradford, yorkshire and the humber, united kingdom Hybrid / WFH Options
AppCheck Ltd
the role you’ll master the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
the role you’ll master the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
the role you’ll master the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security More ❯
bradford, yorkshire and the humber, united kingdom Hybrid / WFH Options
AppCheck Ltd
the role you’ll master the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security More ❯
certifications (Required no exceptions)57 years of experience with:Layer 2/3 routing & troubleshootingRouters, switches, and network infrastructureAWS, Azure, or hybrid cloud environmentsUnix (RedHat), Windows, VMware23 years with vulnerabilityscanning tools (Rapid7 Nexpose preferred)Nice to Have:CCDA or CCIEState government experienceOnly local candidates to Ocoee, FL will be considered.No relocation. No remote. No exceptions without required More ❯
to business operations and detrimental service to MUFG clients leading to a deterioration client trust. Own and oversee the cyber risk management framework, including implementation and continuous improvement of vulnerabilityscanning, penetration testing, and crisis response protocols, ensuring alignment with regulatory expectations and internal risk appetite. Accountable for managing, maintaining and improve the necessary controls, processes and facilities More ❯
zero-touch deployments. Driving an Infrastructure as Code first approach (Terraform, Bicep you know the drill). Building shared platform services that make developers' lives easier observability, secure pipelines, vulnerabilityscanning, and more. Embedding a FinOps mindset to keep things efficient and cost-effective. Acting as the go-to Azure expert, sharing best practices and shaping architectural decisions. More ❯
zero-touch deployments. Driving an Infrastructure as Code first approach (Terraform, Bicep... you know the drill). Building shared platform services that make developers’ lives easier observability, secure pipelines, vulnerabilityscanning, and more. Embedding a FinOps mindset to keep things efficient and cost-effective. Acting as the go-to Azure expert, sharing best practices and shaping architectural decisions. More ❯
of technologies across backbone, edge, and cloud environments, while supporting the delivery and integration of managed security solutions for customers. The role plays a key part in incident response, vulnerability management, and maintaining robust security standards. By collaborating across engineering, operations, and product teams, it helps embed security into every layer of the network and service lifecycle, ensuring resilience … to secure IP/MPLS transport, SDN platforms, automation tools, and cloud workloads. Monitor and analyse security events and alerts, responding to incidents and escalating as appropriate. Assist with vulnerability assessments, patch management validation, and configuration hardening. Document and maintain infrastructure security standards, configurations, and runbooks. Support & Collaboration: Participate in security incident response, root cause analysis, and remediation efforts. … IP, routing, firewalls, VPN, and network segmentation principles. Hands-on experience with security tools such as firewalls (Fortinet, Palo Alto, etc.), SIEM/SOAR, IDS/IPS, EDR, or vulnerability scanners. Familiarity with Linux, scripting (Python, Bash), and infrastructure-as-code concepts. Knowledge of secure configuration standards (e.g., CIS benchmarks) and common protocols (e.g., BGP, DNS, SNMP). Experience More ❯
of technologies across backbone, edge, and cloud environments, while supporting the delivery and integration of managed security solutions for customers. The role plays a key part in incident response, vulnerability management, and maintaining robust security standards. By collaborating across engineering, operations, and product teams, it helps embed security into every layer of the network and service lifecycle, ensuring resilience … to secure IP/MPLS transport, SDN platforms, automation tools, and cloud workloads. Monitor and analyse security events and alerts, responding to incidents and escalating as appropriate. Assist with vulnerability assessments, patch management validation, and configuration hardening. Document and maintain infrastructure security standards, configurations, and runbooks. Support & Collaboration: Participate in security incident response, root cause analysis, and remediation efforts. … IP, routing, firewalls, VPN, and network segmentation principles. Hands-on experience with security tools such as firewalls (Fortinet, Palo Alto, etc.), SIEM/SOAR, IDS/IPS, EDR, or vulnerability scanners. Familiarity with Linux, scripting (Python, Bash), and infrastructure-as-code concepts. Knowledge of secure configuration standards (e.g., CIS benchmarks) and common protocols (e.g., BGP, DNS, SNMP). Experience More ❯
you'll be doing from day one Design and implement robust, forward-thinking security strategies, policies, and procedures to safeguard our systems, networks, and data. Lead regular security assessments, vulnerability scans, and penetration tests to identify risks and deploy effective remediation measures. Monitor systems, networks, and logs then Investigate security breaches, incidents, and other cybersecurity events. Oversight of compliance … and GCP environments (Azure experience is a plus), especially in multi-region and data-rich setups Security-minded problem solver - You have hands-on experience with firewalls, SIEM tools, vulnerability scanners, and other security technologies that protect systems Risk assessment pro - You enjoy identifying vulnerabilities, evaluating threats, and making informed security decisions backed by solid data Technical communicator - You More ❯
systems proactively for suspicious activity. Maintain and update cyber security procedures and documentation. Provide IT support when required, including first, second, and third line assistance. Attend monthly cyber/vulnerability meetings and contribute expertise as needed. Essential Skills & Experience: Minimum 2 years' experience in an IT security-related role ???. Experience with vulnerability management and reporting tools. Strong … verbal communication skills to explain risks to both technical and non-technical stakeholders. CompTIA Security+ or equivalent qualification ??. Desirable: Experience with SIEM systems, EDR, IDS/IPS, and vulnerability scanners. Previous experience in a law firm or professional services environment. Familiarity with Practice Management Systems (PMS) and Document Management Systems (DMS). Personal Attributes: Methodical, thorough, and detail More ❯
systems against ever evolving cyber threats, while ensuring compliance with Security standards. What will you be doing? Manage security controls across on prem and AWS environments. Lead incident response, vulnerability assessments and pentest co-ordination. Manage IAM systems and support Engineering teams with threat modelling and secure development practices. Own ISO27001, Cyber Essentials+, PCI-DSS and GDPR compliance. Manage … physical security (access control etc) What experience do you need? 2+ years experience within Cyber Security - hands on experience with SIEM, Vulnerability scanners and endpoint protection a plus! Cloud security knowledge Scripting skills (e.g. python, Powershell or Bash What to do next? If interested please click apply now to forward me an up to date copy of your CV. More ❯
systems against ever evolving cyber threats, while ensuring compliance with Security standards. What will you be doing? Manage security controls across on prem and AWS environments. Lead incident response, vulnerability assessments and pentest co-ordination. Manage IAM systems and support Engineering teams with threat modelling and secure development practices. Own ISO27001, Cyber Essentials+, PCI-DSS and GDPR compliance. Manage … physical security (access control etc) What experience do you need? 2+ years experience within Cyber Security – hands on experience with SIEM, Vulnerability scanners and endpoint protection a plus! Cloud security knowledge Scripting skills (e.g. python, Powershell or Bash What to do next? If interested please click apply now to forward me an up to date copy of your CV. More ❯
and member firms with regards to lessons learnt from incidents Align CSIRT processes with enterprise risk management, legal, compliance, and business continuity functions. Drive integration of threat intelligence and vulnerability data into incident response workflows. Engagement with GISG teams, RSD to ensure that lessons learnt from incidents are captured and followed up on by teams responsible. Provide input into … inspire, develop, and motivate high-performing teams. Experience building and implementing effective cybersecurity strategies at scale. Technical Expertise in Cybersecurity & Incident Response Deep understanding of security operations, threat intelligence, vulnerability management, and incident response. Strong knowledge of enterprise security tools and platforms (e.g. Security Information and Event Management (SIEM), Security orchestration, automation, and response (SOAR), Endpoint Detection and Response … EDR), vulnerability scanners). Proven ability to manage and respond to complex security incidents and data breaches. Strong troubleshooting and problem-solving skills, with the ability to remain calm and effective under pressure. Risk, Governance & Regulatory Knowledge Strong understanding of cyber and data risk factors impacting information security. In-depth knowledge of cybersecurity regulations, standards, and best practices. High More ❯
secure Apigee or similar API Management platforms, ensuring API governance, performance optimization, and compliance. Ensure security and compliance best practices across the platform, including secure coding, dependency management, and vulnerability scanning. Implement and enforce API security and access controls using OAuth, API keys, JWT, and other authentication mechanisms. Monitor and remediate security vulnerabilities in third-party packages and libraries. … Collaborate with security teams to align architecture with compliance standards. Prepare and maintain detailed documentation for builds, deployments, and updates. Required Skills Expertise in implementing secure coding and vulnerability management practices. Strong knowledge of API security, OAuth, JWT, and API Gateway policies. Experience in security audits, monitoring, and incident remediation. Familiarity with compliance frameworks (e.g., ISO, SOC 2, GDPR More ❯
secure Apigee or similar API Management platforms, ensuring API governance, performance optimization, and compliance. Ensure security and compliance best practices across the platform, including secure coding, dependency management, and vulnerability scanning. Implement and enforce API security and access controls using OAuth, API keys, JWT, and other authentication mechanisms. Monitor and remediate security vulnerabilities in third-party packages and libraries. … Collaborate with security teams to align architecture with compliance standards. Prepare and maintain detailed documentation for builds, deployments, and updates. Required Skills Expertise in implementing secure coding and vulnerability management practices. Strong knowledge of API security, OAuth, JWT, and API Gateway policies. Experience in security audits, monitoring, and incident remediation. Familiarity with compliance frameworks (e.g., ISO, SOC 2, GDPR More ❯
secure Apigee or similar API Management platforms, ensuring API governance, performance optimization, and compliance. Ensure security and compliance best practices across the platform, including secure coding, dependency management, and vulnerability scanning. Implement and enforce API security and access controls using OAuth, API keys, JWT, and other authentication mechanisms. Monitor and remediate security vulnerabilities in third-party packages and libraries. … Collaborate with security teams to align architecture with compliance standards. Prepare and maintain detailed documentation for builds, deployments, and updates. Required Skills Expertise in implementing secure coding and vulnerability management practices. Strong knowledge of API security, OAuth, JWT, and API Gateway policies. Experience in security audits, monitoring, and incident remediation. Familiarity with compliance frameworks (e.g., ISO, SOC 2, GDPR More ❯
expert in their source area and an experienced software developer. They have a strong security engineering and software development background that has a track record of developing high quality vulnerability and security posture management/analysis tooling and content for network, endpoint, and cloud. They look at new and emerging threats to identify the investments we should be making … and other departments Troubleshoot, educate, and share information with non-technical people Contribute to the growth and mentorship of other team members Detailed knowledge in the inner workings of vulnerability scanners such as Qualys, Rapid7, Tenable, etc. Experience with identifying product and market changes and needed analysis/detection coverage changes in your existing sources History of identifying product More ❯