and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
london (city of london), south east england, united kingdom
Damia Group
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
Hertfordshire, England, United Kingdom Hybrid / WFH Options
ALTERED RESOURCING LTD
Security Analyst role would suit someone with: Good knowledge of frameworks like ISO 27001, NIS2 etc SOC process Incident response ISO27001 auditing experience - internal & external GDPR knowledge Gap analysis & vulnerabilityscanning experience In this role you will be maintaining their ISO27001 certification. Any cyber certs you have would be beneficial. In this role you will also have the More ❯
greener future. The Role As an IT Infrastructure Engineer, you’ll be responsible for: Managing servers, networks, backups, storage, telephony, and client hardware Ensuring security compliance, including patch management, vulnerabilityscanning, and system hardening Maintaining and updating configuration and documentation for smooth IT operations Providing technical support and troubleshooting to assist business users Collaborating with colleagues to plan More ❯
Experience with SolarWinds or similar Experience with URL filtering (Censornet or similar) Any experience with SOC solutions is desirable but not essential. Artic Wolf of Rapid7 Experience with Internal vulnerabilityscanning and reporting. Ideally with Nessus by Tenable. Experience with Aruba SD-WAN (Silverpeak) or similar. Experience with Check point Harmony or similar. Experience with Extreme Networks for More ❯
Experience with SolarWinds or similar Experience with url filtering (Censornet or similar) Any experience with SOC solutions is desirable but not essential. Artic Wolf of Rapid7 Experience with Internal vulnerabilityscanning and reporting. Ideally with Nessus by Tenable. Experience with Aruba SD-WAN (Silverpeak) or similar. Experience with Check point Harmony or similar. Experience with Extreme Networks for More ❯
Programming skills including analyzing information, software design, requirements, testing, documentation, problem solving, and debugging • Proficiency developing moderately complex software • Experience with software engineering tools: configuration management systems, change management, vulnerabilityscanning, and debuggers • Fluency with JavaScript, VB, C++, and/or Python • Experience participating in systems engineering teams with software engineering and program development responsibilities • Ability to work More ❯
CI/CD pipelines, container workflows, infra-as-code, and deployment tooling Define and enforce access controls, auditing, and logging for internal services Evaluate and manage security tools (EDR, vulnerability scanners, SCA, etc.) Own and manage internal authentication (SSO, MFA, identity lifecycle) Secure endpoints, laptops, and internal systems Lead security awareness and employee training programs Drive SOC 1/ More ❯
Hull, North Humberside, England, United Kingdom Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerability management: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. Deliver … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerability management, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non-technical … staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey to More ❯
North Ferriby, North Humberside, North East, United Kingdom Hybrid / WFH Options
Heron Foods
cyber and information security matters within Heron Foods. Monitor and respond to alerts from our Managed Security Operations Centre (SOC). Coordinate incident response, containment, and recovery activities. Oversee vulnerability management: assessing risks, tracking remediation, and validating fixes. Support forensic investigations and evidence handling when needed. Contribute to compliance activities including PCI DSS evidence gathering and audit readiness. Deliver … who combines technical knowledge with an investigative mindset and strong stakeholder communication skills. Essential skills & experience: Experience working in security operations, SOC, or incident response. Knowledge of SIEM tools, vulnerability management, and log analysis. Understanding of security frameworks such as ISO 27001, NIST, or PCI DSS. Strong communication skills to engage with IT teams, business stakeholders, and non-technical … staff. Ability to work independently at Heron Foods while remaining aligned to Group Information Security. Desirable: Hands-on exposure to security tooling (e.g., EDR, SIEM, vulnerability scanners). Experience supporting audits and compliance activities. Scripting/automation skills (e.g., PowerShell, Python) to streamline tasks. Why Join Us? At B&M and Heron Foods, we are on a journey to More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modelling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modelling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modelling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
contract, ensuring compliance with Homeland Security policies and directives. Develop and implement cybersecurity strategies, frameworks, and policies to enhance the security posture of critical systems. Oversee security risk assessments, vulnerability management, incident response, and threat intelligence activities. Provide guidance and mentorship to cybersecurity engineers and analysts. Lead security architecture reviews and technical assessments to identify and mitigate risks. Collaborate … e.g., NIST, RMF, FISMA) and best practices. Experience leading cybersecurity teams and managing large-scale security initiatives. Hands-on experience with security tools such as SIEM, IDS/IPS, vulnerability scanners, and endpoint security solutions. Strong communication and leadership skills, with the ability to work across technical and executive teams. Preferred Skills and Qualifications: CISSP certification strongly preferred (Additional More ❯
contract, ensuring compliance with Homeland Security policies and directives. Develop and implement cybersecurity strategies, frameworks, and policies to enhance the security posture of critical systems. Oversee security risk assessments, vulnerability management, incident response, and threat intelligence activities. Provide guidance and mentorship to cybersecurity engineers and analysts. Lead security architecture reviews and technical assessments to identify and mitigate risks. Collaborate … e.g., NIST, RMF, FISMA) and best practices. Experience leading cybersecurity teams and managing large-scale security initiatives. Hands-on experience with security tools such as SIEM, IDS/IPS, vulnerability scanners, and endpoint security solutions. Strong communication and leadership skills, with the ability to work across technical and executive teams. Preferred Skills and Qualifications: CISSP certification strongly preferred (Additional More ❯
to implement, maintain and sustain all unclassified and classified information security support services. • Setup, configure, modify, test, maintain, operate, and support information security tools. • Operate ACAS for Information Assurance Vulnerability Alert (IAVA) management and scanning, McAfee HBSS, Corelight, and Cortex. • IOT discovery, monitoring, SOAR orchestration, and SIEM event correlation and analysis. • Cloud security systems for DLP, and Email … Secure Configuration Compliance Validation Initiative, and Secure Configuration Remediation Initiative tools. • Virtual Private network management, penetration testing, forensics research and analysis, web content filter management, security incident reporting, and vulnerability scanning. • Knowledge of cybersecurity principles, cyber threats and vulnerabilities. • Analyze network alerts from enterprise sources determining causes of alerts. • Security reviews, gap analysis and risk mitigation in security architecture. More ❯
in Cyber Security , ideally within an international asset management or similar large organisations. Passion for security and self-development to keep up to date with the evolving threat and vulnerability landscape, new technologies and service improvements Able to work in an international matrix organisation with complex and dynamic drivers and constraints Comfortable with a fast paced multi-threaded working … hunting queries (KQL), developing automation playbooks, and integrating with other security controls and solutions. Experience with security tools outside of the Microsoft eco-system , such as IDS/IPS, vulnerability scanners, web and email filtering, webapp firewalls and DDoS protections, proxies, host-based protections and malware analysis engines Good understanding of Cyber Detection and Response Concepts such as the More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
systems and ensuring compliance with Department of Defense (DoD) security policies. Key Responsibilities: Monitor and analyze system security logs and alerts to identify suspicious activities and potential threats. Support vulnerability assessments and risk analysis activities. Implement security controls in accordance with DoD cybersecurity regulations and RMF (Risk Management Framework). Assist with security incident response, containment, investigation, and remediation … years of hands-on experience in information security or cybersecurity analysis. Familiarity with DoD cybersecurity policies, RMF, STIGs, and NIST frameworks. Experience using security tools such as SIEMs, vulnerability scanners, and endpoint protection platforms. Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Preferred Qualifications: Bachelor's degree in Cybersecurity, Information Technology, or a related field. Experience More ❯
systems and ensuring compliance with Department of Defense (DoD) security policies. Key Responsibilities • Monitor and analyze system security logs and alerts to identify suspicious activities and potential threats • Support vulnerability assessments and risk analysis activities • Implement security controls in accordance with DoD cybersecurity regulations and RMF (Risk Management Framework) • Assist with security incident response, containment, investigation, and remediation efforts … years of hands-on experience in information security or cybersecurity analysis • Familiarity with DoD cybersecurity policies, RMF, STIGs, and NIST frameworks • Experience using security tools such as SIEMs, vulnerability scanners, and endpoint protection platforms • Strong analytical and problem-solving skills • Excellent communication and documentation abilities Preferred Qualifications • Bachelor's degree in Cybersecurity, Information Technology, or a related field • Experience More ❯
Authorize documentation required to achieve an Authority to Operate (ATO). Prepare and maintain information systems ATO record on the Navy's Enterprise Mission Assurance Support Service (eMASS) • Run vulnerability assessment tools; ACAS vulnerability scanner, Security Content Automation Protocol (SCAP), STIG Viewe • Manage system/network vulnerabilities using the Vulnerability Remediation and Assets Manager (VRAM) Qualifications/ More ❯
mission objectives. Monitor and enhance the cybersecurity posture of assigned programs by tracking evolving cyber threats, adopting emerging technologies, and applying industry best practices. Perform continuous risk assessments, conduct vulnerability scans, and support penetration testing activities to proactively identify and mitigate potential threats. Provide expert technical guidance to multi-disciplinary teams and stakeholders on cybersecurity solutions, compliance strategies, and … In-depth understanding of RMF processes, NIST 800-53 controls, and DoD A&A (Assessment and Authorization) procedures. Strong working knowledge of cybersecurity tools and platforms, including SIEM solutions, vulnerability scanners (e.g., Nessus), endpoint protection, encryption methods, and network monitoring tools. Experience preparing and managing System Security Plans (SSPs), POA&Ms, Security Assessment Reports (SARs), and other key cybersecurity More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Moonpig
working with microservices, APIs and secure coding principles Hands-on experience with SAST/DAST tools in CI/CD environments Awareness of security tooling such as WAFs and vulnerability scanners Solid understanding of cryptography, authentication and authorisation A great communicator with a collaborative, pragmatic mindset Ideally have experience measuring and improving security via tooling metrics Ideally have exposure … and solid understanding of product security then we'd encourage you to apply Our Tech Environment Languages: Python, Go or similar Infrastructure: AWS, Azure, GCP Tools: Terraform, CloudFormation, WAFs, vulnerability scanners DevOps: CI/CD pipelines, IaC, security automation Security focus: SAST, DAST, secure coding, threat modelling How We Get There We build with security in mind from day More ❯