Engineer Are you looking for more in life than just building another web app? Does upending cyber security resonate with you? We're a rapidly expanding cybersecurity startup revolutionizing vulnerability management for organizations of all sizes. For our customers, vulnerability management has always been a game of catch-up, with limited asset coverage and manual processes. Nucleus Security … s primary mission is to create a fast, scalable platform that not only addresses these challenges but also makes vulnerability management simple, fun, and effortless. Currently, we're looking for a passionate Senior Python Software Engineer to join our growing team of engineers. About Nucleus Security Nucleus Security is transforming how security and development teams manage vulnerabilities at scale. … Our platform unifies vulnerability data across scanners and environments, enabling organizations to prioritize and remediate vulnerabilities efficiently. We work with some of the most security-forward enterprises, empowering them with tools that accelerate secure software delivery and infrastructure hardening. Role Overview As a Senior Software Engineer in our Engineering team, you'll operate at the frontier of innovation, taking More ❯
for the MSP's own security posture ensuring tools, processes, and teams meet the same standards we deliver to clients. They monitor measurable posture metrics (e.g., Microsoft Secure Score, Vulnerability etc.), ensure continuous improvement, and keep the MSP's security practice relevant through ongoing training, certifications, and emerging threat awareness. While day-to-day execution is delegated to Security … the Security Lead owns security end-to-end: identifying risks, embedding controls, and ensuring compliance is demonstrable. Key Responsibilities Client-Facing Lead Quarterly Security Reviews (QSRs), presenting patch/vulnerability posture, incidents, compliance status, and risk register updates. Translate technical security risks into clear business impact and outcomes. Own the client exception process, ensuring risks are documented, communicated, and … escalation point for clients when risks require senior involvement. Internal MSP Security Own the MSP's internal security frameworks and certifications (e.g., CE+, ISO, SOC 2). Oversee patching, vulnerability, and risk management of MSP-owned infrastructure and tools. Ensure MSP's technology stack (RMM, XDR, PSA, backup, etc.) is securely deployed and monitored. Drive staff security awareness, training More ❯
Expertise: Strong knowledge of cloud (Azure, O365, Amazon) and server infrastructure, networks, firewalls, and endpoint systems. Security Tools & Technologies: Proficiency with security tools such as SIEM, IDS/IPS, vulnerability scanners, firewalls, endpoint protection, alert and remediation, and encryption technologies. Certifications: Relevant certifications such as CISSP, CISM, CCSP, CEH, or AWS/Azure security certifications are highly desirable. Scripting More ❯
role supports the monitoring, detection, and initial response to cybersecurity incidents, while ensuring compliance with Navy and Department of Defense (DoD) security standards. The position involves assisting with system vulnerability assessments, applying Security Technical Implementation Guides (STIGs), supporting Risk Management Framework (RMF) activities, and providing frontline defense against cyber risks. The ideal candidate will be motivated, detail-oriented, and … unauthorized access, or security violations Assist in applying DoD STIGs, security patches, and configuration changes to maintain compliance Support Risk Management Framework (RMF) documentation, assessments, and reporting requirements Conduct vulnerability scans, review security logs, and analyze alerts from tools such as ACAS, HBSS, and Splunk Document incidents and escalate issues to senior cyber analysts or supervisors as required Assist … equivalent baseline DoD 8570 certification Familiarity with Navy or DoD IT systems, RMF processes, or cybersecurity compliance frameworks (e.g., NIST 800-53, NIST 800-171) Hands-on experience with vulnerabilityscanning, incident response, or STIG application Exposure to cloud security (AWS, Azure, or DoD cloud environments) Prior experience supporting Navy, DoD, or defense-related cybersecurity operations Company Summary More ❯
new technologies to enhance performance and resilience. Linux and Windows Administration Install, configure, and maintain Linux servers (Debian, Ubuntu, CentOS, Red Hat) across physical and virtual environments. Manage patching, vulnerabilityscanning, and system hardening. Troubleshoot hardware, software, and network issues with engineering and security teams. Support and manage Windows Server environments (), including Active Directory, DNS, DHCP, and Group More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Synergetic
new technologies to enhance performance and resilience. Linux and Windows Administration Install, configure, and maintain Linux servers (Debian, Ubuntu, CentOS, Red Hat) across physical and virtual environments. Manage patching, vulnerabilityscanning, and system hardening. Troubleshoot hardware, software, and network issues with engineering and security teams. Support and manage Windows Server environments (2012–2022), including Active Directory, DNS, DHCP More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Synergetic Recruitment Group Limited
new technologies to enhance performance and resilience. Linux and Windows Administration Install, configure, and maintain Linux servers (Debian, Ubuntu, CentOS, Red Hat) across physical and virtual environments. Manage patching, vulnerabilityscanning, and system hardening. Troubleshoot hardware, software, and network issues with engineering and security teams. Support and manage Windows Server environments (20122022), including Active Directory, DNS, DHCP, and More ❯
cambridge, east anglia, united kingdom Hybrid / WFH Options
Synergetic
new technologies to enhance performance and resilience. Linux and Windows Administration Install, configure, and maintain Linux servers (Debian, Ubuntu, CentOS, Red Hat) across physical and virtual environments. Manage patching, vulnerabilityscanning, and system hardening. Troubleshoot hardware, software, and network issues with engineering and security teams. Support and manage Windows Server environments (2012–2022), including Active Directory, DNS, DHCP More ❯
security & cloud security(SaaS,IaaS,PaaS) • Experience in advising on or developing security architectures and designs for one or more security technology domains • Security technologies (firewalls, WAFs, DLP, cryptography, vulnerabilityscanning, identity and access management, etc.) • Delivering security changes to meet the CISO business needs. • Appreciation of different cyber threats such as malicious cyber-attacks, phishing, data theft More ❯
security & cloud security(SaaS,IaaS,PaaS) • Experience in advising on or developing security architectures and designs for one or more security technology domains • Security technologies (firewalls, WAFs, DLP, cryptography, vulnerabilityscanning, identity and access management, etc.) • Delivering security changes to meet the CISO business needs. • Appreciation of different cyber threats such as malicious cyber-attacks, phishing, data theft More ❯
security & cloud security(SaaS,IaaS,PaaS) • Experience in advising on or developing security architectures and designs for one or more security technology domains • Security technologies (firewalls, WAFs, DLP, cryptography, vulnerabilityscanning, identity and access management, etc.) • Delivering security changes to meet the CISO business needs. • Appreciation of different cyber threats such as malicious cyber-attacks, phishing, data theft More ❯
security & cloud security(SaaS,IaaS,PaaS) • Experience in advising on or developing security architectures and designs for one or more security technology domains • Security technologies (firewalls, WAFs, DLP, cryptography, vulnerabilityscanning, identity and access management, etc.) • Delivering security changes to meet the CISO business needs. • Appreciation of different cyber threats such as malicious cyber-attacks, phishing, data theft More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
standards. Responsibilities: • Security Implementation: Design, implement, and manage security solutions for Kubernetes (OpenShift) and DoD cloud environments, including firewalls, intrusion detection/prevention systems, endpoint protection, and encryption mechanisms. • Vulnerability Assessment: Conduct regular security assessments to identify vulnerabilities and weaknesses in systems, networks, and applications. • Incident Response: Develop and implement incident response plans for Kubernetes (OpenShift) and DoD cloud … in Risk Management Framework (RMF), Joint SAP Implementation Guide, or ICD 503 processes. • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, Engineering, or a related field • Familiarity with vulnerabilityscanning tools, STIG compliance, Security Content Automation Protocol (SCAP), and security event information management (SIEM). • Knowledge in Infrastructure-as-Code and scripting technologies such as Ansible, Terraform More ❯
technical implementations and transitioning to support teams IT Operations/Service Management, ITIL knowledge Azure-based infrastructure deployments Project delivery within Agile, Prince2, or Waterfall frameworks Desirable: Microsoft Certifications Vulnerabilityscanning, Open Source security methodologies Teams telephony, Cisco/Meraki networking, Veeam Backup POS systems, SAN storage, Defender stack, Cloudflare, Cisco ASA/Firepower/ISE, FortiGate Key More ❯
technical implementations and transitioning to support teams IT Operations/Service Management, ITIL knowledge Azure-based infrastructure deployments Project delivery within Agile, Prince2, or Waterfall frameworks Desirable: Microsoft Certifications Vulnerabilityscanning, Open Source security methodologies Teams telephony, Cisco/Meraki networking, Veeam Backup POS systems, SAN storage, Defender stack, Cloudflare, Cisco ASA/Firepower/ISE, FortiGate Key More ❯
technical implementations and transitioning to support teams IT Operations/Service Management, ITIL knowledge Azure-based infrastructure deployments Project delivery within Agile, Prince2, or Waterfall frameworks Desirable: Microsoft Certifications Vulnerabilityscanning, Open Source security methodologies Teams telephony, Cisco/Meraki networking, Veeam Backup POS systems, SAN storage, Defender stack, Cloudflare, Cisco ASA/Firepower/ISE, FortiGate Key More ❯
technical implementations and transitioning to support teams IT Operations/Service Management, ITIL knowledge Azure-based infrastructure deployments Project delivery within Agile, Prince2, or Waterfall frameworks Desirable: Microsoft Certifications Vulnerabilityscanning, Open Source security methodologies Teams telephony, Cisco/Meraki networking, Veeam Backup POS systems, SAN storage, Defender stack, Cloudflare, Cisco ASA/Firepower/ISE, FortiGate Key More ❯
technical implementations and transitioning to support teams IT Operations/Service Management, ITIL knowledge Azure-based infrastructure deployments Project delivery within Agile, Prince2, or Waterfall frameworks Desirable: Microsoft Certifications Vulnerabilityscanning, Open Source security methodologies Teams telephony, Cisco/Meraki networking, Veeam Backup POS systems, SAN storage, Defender stack, Cloudflare, Cisco ASA/Firepower/ISE, FortiGate Key More ❯
london (west end), south east england, united kingdom
Henderson Scott
technical implementations and transitioning to support teams IT Operations/Service Management, ITIL knowledge Azure-based infrastructure deployments Project delivery within Agile, Prince2, or Waterfall frameworks Desirable: Microsoft Certifications Vulnerabilityscanning, Open Source security methodologies Teams telephony, Cisco/Meraki networking, Veeam Backup POS systems, SAN storage, Defender stack, Cloudflare, Cisco ASA/Firepower/ISE, FortiGate Key More ❯
security investigations You will need to have a good working knowledge of: Cyber security risks and mitigations IT security standards and frameworks IT security tools and their implementation including vulnerabilityscanning and server patching. IT infrastructure including Microsoft Active Directory, Azure and Office 365. SIEM implementation, monitoring and incident response. What we can offer Our staff are at More ❯
and troubleshoot issues to optimize uptime and efficiency. Data Backup and Recovery: Perform regular data backups and implement disaster recovery plans to protect against data loss. Security Audits and Vulnerability Management: Conduct regular security audits, vulnerabilityscanning, and implement secure configurations to identify and mitigate risks. Documentation: Create and maintain detailed documentation of systems, procedures, and IT More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯