Xpertise are working with a client in the Insurance industry who are searching for a talented Threat and Vulnerability Lead to join their team. Job Title: Threat and Vulnerability Lead Salary: £75,000 - £90,000 Location: 3 days a week in the Central London office About the role … Security teams to assess the vulnerabilities and reduce the Cyber related risks. My client is looking for people with the following skillset: - Familiarity with vulnerability scanning and detection technologies. - Familiarity with MITRE ATT&CK framework - Excellent ability to present information and results to the business - Pen testing experience Key … responsibilities in this role will include: - This role will involve working closely with the Enterprise Security team - Great understanding of Threat and vulnerabilitymanagement practices. - Working closely with, and reporting into the BISO If keen please apply more »
and departments to align infrastructure initiatives with business goals and priorities. Monitor infrastructure performance and capacity, and proactively address any issues or bottlenecks. Manage vulnerabilitymanagement What we’re looking for: Proven experience leading Infrastructure Teams Strong technical skills across a broad range of IT disciplines, including network … administration, system architecture, cybersecurity, and cloud computing. Experience delivering on a migration to Azure cloud Experience with ITIL or other IT service management frameworks is highly desirable. Knowledge of Microsoft Windows server and desktop operating systems PowerShell scripting, process automation using terraform. A good understanding of networking principles as more »
on Operational Technology. This will range from complex gas terminals to simpler Above Ground Installations. Cyber data checks and updates to the Cyber Asset Management system. Ensure we have the correct asset management data is key to cyber risk management. This shall include network drawing assurance. Support the … across the Operational Technology. This reduces the risk from unauthorised access to our assets. Upgrade configurable devices as directed by security in line with vulnerabilitymanagement requirements. An example could be upgrading an operating system on an industrial PC to an approved version. Where assets have been approved more »
record in high level delivery. Required Skills/Experience; - A broad range of technology experience including Cloud Security (Azure, 365 E5 suite), Internet Protection, VulnerabilityManagement, SIEM, Firewalls, CASB, WAF and EDR products. - Experience in managing, supporting, and improving enterprise security solutions with a strong understanding of the more »
record in high level delivery. Required Skills/Experience; - A broad range of technology experience including Cloud Security (Azure, 365 E5 suite), Internet Protection, VulnerabilityManagement, SIEM, Firewalls, CASB, WAF and EDR products. - Experience in managing, supporting, and improving enterprise security solutions with a strong understanding of the more »
security risk for the whole project life cycle Perform security activities, including but not limited to, security design reviews, risk assessments, threat modelling, and vulnerabilitymanagement and risk mitigation on internally & externally developed software Embedding security within DevOps (eg CI/CD pipelines), developing security requirements On-demand more »
security principles are applied during project design to reduce risk. Education, Qualifications & Experience Required: proficiency in security technologies such as Microsoft XDR stack and vulnerabilitymanagement tools. in SIEMS (Azure Sentinel) and Powershell Automation. exposure to enterprise networking and infrastructure technologies. one of more relevant Cyber Security qualification more »
Bournemouth, Dorset, South West, United Kingdom Hybrid / WFH Options
Interact Consulting Limited
pipelines and integrating security tooling. Scripting Responsibilities will include Lead efforts to assess the current security posture of Azure infrastructure, encompassing Azure resources, processes, vulnerabilitymanagement tools, and techniques. Collaborate with the wider Infosec team and any third-party consultants engaged by the client to provide recommendations based … into CI/CD pipelines. Maintain an active risk registry and devise a plan to address identified issues in order of priority, ensuring proactive management of security risks. Please apply now. more »
different data sources and tools for analysis. · Previous experience of mentoring or leading SOC analysts is desirable but not essential. · Experience of risk-based vulnerabilitymanagement is desirable. What do we offer? 25 days PTO + bank holidays Your birthday off Private Medical Insurance Electric Vehicle (EV) scheme more »
and if applicable direct reports Manage and implement projects relevant to specialist area Manages, develops and coaches team of staff and implement s performance management solutions where required Develop and motivate team to help ensure the delivery of function and business targets Acting as a point of escalation on … Liaise with colleagues to ensure best practice and continual improvement in delivery of service to the business Establishes productive relationships and networks at Senior Management level to build and maintain customer relationships Responsible for managing budget/P&L to maintain spend in line with budgetary limitations Responsible for … Orchestration, CI/CD, Testing etc.) An understanding of Agile Delivery (Kanban/SCRUM/XP/Lean/SAFe) An understanding of DevOps Management (JIRA, Confluence) Awareness of CI/CD tooling such as Jenkins, GitLab or similar Experience of Hashicorp Terraform Experience of Hashicorp Vault Awareness of more »
Brighton, England, United Kingdom Hybrid / WFH Options
Hays
infrastructure for the organisation. The role responsibilities: You will be supporting the Head of IT and Cyber Security with the day-to-day operational management of the cyber security function. You will work with the Senior Cyber Security Manager to define and evolve the cyber strategy across the organisation. … and analyse security incidents and breaches, and lead incident response efforts to contain and mitigate the impact in a timely manner. Reporting to senior management on Cyber related metrics and improvement needs. Foster a culture of security awareness and compliance amongst team members and stakeholders through training, education, and … initiatives. Leading any major cyber incidents should they arise. Escalating security concerns that are not being adequately addressed through the established risk/issue management framework. You will need: You will need to be able to influence and collaborate with other teams in the organisation, and the ability to more »
big and small but most importantly, opened up new avenues of data intelligence for businesses with machine learning, AI and connected data. From risk management through to opportunity identification, our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger … day activities of the Security Operations Centre (SOC) and Security Engineering teams. • Produce reports on key security metrics across Security Operations, Application Security and Vulnerability Management. • Conduct regular 1-2-1s, Performance Reviews, and Personal Development Plans of team members. • Develop and implement security policies, processes, and procedures … to comply with SOC2 and ISO27001 standards. • Participate in Steering groups for Identity and Access Management and Data Protection • Setting and aligning team objectives and tasks to help achieve the overall Information Security and Compliance function’s strategy and goals • Participate in Quarterly Business Reviews with our security tooling more »
Farnborough, England, United Kingdom Hybrid / WFH Options
Shaw Daniels Solutions
with stakeholders, to uncover emerging risks and opportunities for malicious actors. Produce written reports, status updates, actions, minutes to support decision making within the management systems governance programme. Conduct annual Business Impact Assessments with relevant teams Ensure and track that staff get the infosec training required Annual infosec and … the document review period. Compile a list of actions to address any lapses and track to conclusion. Assist with the monitoring of our platform vulnerabilitymanagement systems and logging of identified vulnerabilities In the event of any security event, be part of the response team, by providing infosec more »
responsible for Web Application Penetration testing from end-to-end. The Penetration Tester/Security Analyst will provide consultancy to support and improve their VulnerabilityManagement and Application Security Testing program. The Penetration Tester/Security Analyst will be responsible for: Perform Web Application Penetration Testing. Penetration testing more »
Manchester Area, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
Excellent understanding of cybersecurity trends Ability to interpret customer landscape and challenges Strong presentation and client-facing skills Desired Skills: Knowledge across EDR, SIEM, VulnerabilityManagement Operational experience with security technologies Existing relationships in Manchester area Self-motivation and ability to work autonomously Job Specifics: This is a more »
Manchester Area, United Kingdom Hybrid / WFH Options
GS Solutions
have worked within a Networking/Security setting recently. Experience solutioning Cisco, Fortinet, Juniper, Palo Alto, Netskope, Zscaler, CrowdStrike (At-least two or more) VulnerabilityManagement/EDR/DDoS/WAF/PAM – Beneficial MUST have an excellent understanding of current cyber security trends. more »
Previous experience of working with Operational Technology, or a background in Infrastructure (telecoms) Knowledge of Cyber Security tooling particularly CrowdStrike Experience of Asset and VulnerabilityManagement Interviews will take place later this week, with a view to start the role week commencing either 17th/24th June. If more »
knowledge and the capability to manage your own projects Day to day , you will: Suggest Security Improvements Implement new systems Provide an overview of vulnerabilitymanagement Azure and 365 security uplifts 3rd line technical support Assist in the set up, configuration and maintenance of network infrastructure Support the more »
to the design and architecture of the front-office application. Understand CI/CD pipelines and deploy the UI into production. Familiarize yourself with vulnerability management. Qualifications and Skills: Strong experience in React development. Proficiency in TypeScript, JavaScript, and possibly Java. Familiarity with low-latency systems and financial markets more »
infrastructure. Develop and enforce security policies, standards, and guidelines to ensure compliance with ISO27001, NIST, PCI-DSS, Cyber Essentials, and GDPR. Conduct security assessments, vulnerability scans, and penetration tests to identify and mitigate risks. Monitor and respond to security incidents, including conducting forensic investigations and root cause analyses. Collaborate … cloud environments such as AWS, Azure, or GCP. Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management. Experience with IaC tools like Terraform, CloudFormation, or ARM templates. Deep understanding of IAM, encryption, network security, and data protection strategies in the more »
infrastructure. Develop and enforce security policies, standards, and guidelines to ensure compliance with ISO27001, NIST, PCI-DSS, Cyber Essentials, and GDPR. Conduct security assessments, vulnerability scans, and penetration tests to identify and mitigate risks. Monitor and respond to security incidents, including conducting forensic investigations and root cause analyses. Collaborate … cloud environments such as AWS, Azure, or GCP. Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management. Experience with IaC tools like Terraform, CloudFormation, or ARM templates. Deep understanding of IAM, encryption, network security, and data protection strategies in the more »
ecosystem experience e.g. Openshift and Kubernetes An understanding of Agile Delivery (Kanban/SCRUM/XP/Lean/SAFe) An understanding of DevOps Management (JIRA, Confluence) Awareness of CI/CD tooling such as Jenkins, GitLab or similar. Knowledge of Hashicorp Terraform and Hashicorp Vault Awareness of SAST … Security Testing - GitLab, Checkmarx, Veracode Awareness of DAST Security Testing - GitLab, Veracode Awareness of SCA/IAST Security Testing - Checkmarx, GitLab, Veracode Awareness of VulnerabilityManagement - PA Prisma Awareness of QA Testing - Selenium Certifications in Gitlab, Terraform and Vault would be preferable more »
Operations. The Team The three Egress security teams report to the Chief Information Security Officer (CISO), these are: Security Operations – the day-to-day management of operational processes and incidents Cyber Security – defining security best practice of technologies and internal pentesting Compliance & Risk – managing accreditations, auditing, and risk management … and manage all group security incidents. Whilst there are process aspects to the role there are two main areas of focus for the team: Vulnerability management. The team manage issues identified through internal and external vulnerability testing. Internally we use tools like Snyk (one of several tools available … vetting, Business Continuity Planning (BCP) and supplier onboarding. The wider security team work closely together with opportunities for cross-training and career development. The management team actively support personal development, with access to training tools such as Percipio, O’Reilly and Microsoft’s ESI. We are looking for a more »
client, a leading equity trading firm are looking to bring on an experienced Application Security Tester to join their team. They are running a VulnerabilityManagement and Application Security Testing program in which they are looking to identify, and prioritise for remediation, security vulnerabilities in their IT infrastructure more »
Portsmouth, England, United Kingdom Hybrid / WFH Options
TalentHawk
for a contract position. The ideal candidate will have experience in software, hardware, network, and Operational Technology (OT) . Key Projects: OT Asset Discovery & VulnerabilityManagement OT AD Audit Tool Both projects are currently at the high-level design stage. The successful candidate will be responsible for advancing more »