Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Certes IT Service Solutions
Sentinel) * Cloud security monitoring and compliance. (AWS, Azure, and Google) * IPS/WAF experience * Firewalls * Reverse Proxy * Forward Proxy * End Point Security products * Network Security * Enterprise Architecture * Application Security * VulnerabilityManagement * Secure File Transfer * Remote Access Security If your qualification aligns with this position, please apply by submitting your CV below. To apply today, contact Neha Cherian at More ❯
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics … and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerabilitymanagement, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented with the ability to multi-task and prioritize efforts - Ability to express More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Familiarity with security frameworks such as NIST, IEC62443, NIS Regulations, CAF, or SoGP. Understanding of threat intelligence, attack surfaces, and cyber kill chains relevant to OT. Proven experience in vulnerabilitymanagement and incident response in OT contexts. Ability to manage stakeholder relationships and communicate technical risks effectively. A proactive approach to problem-solving and strong attention to detail. More ❯
Selby, North Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Drax
vulnerabilities, assess their impact, and prioritize responses accordingly. Incident Response: Developing and implementing incident response plans for handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. VulnerabilityManagement: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate penetration testing of OT systems … level of attention to detail, be self-motivated and have the ability to think outside the box when working on complex problems. This role requires strong communication and stakeholder management skills, with the ability to influence beyond your sphere of control. The successful candidate must be willing and able to obtain SC Clearance. Rewards and benefits As you help More ❯
vulnerabilities, assess their impact, and prioritize responses accordingly. Incident Response: Developing and implementing incident response plans for handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. VulnerabilityManagement: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate penetration testing of OT systems … level of attention to detail, be self-motivated and have the ability to think outside the box when working on complex problems. This role requires strong communication and stakeholder management skills, with the ability to influence beyond your sphere of control. The successful candidate must be willing and able to obtain SC Clearance. Rewards and benefits As you help More ❯
deployments. Provide technical support with risk assessments on PHI, and steering improvements to our environment in line with common standards such as NIST. Support External Penetration Testing and application vulnerability efforts, delivering assessments and prioritizing remediation activities across the organization. Be across Threat Intelligence relevant to our industry and geographic regions, and translating that to real world defenses for … Suite, Kali, Metasploit and such Scripting including the use of python, Powershell, bash or Javascript Securing networks, hosts, web applications and cloud native deployments Working with toolsets such as: vulnerabilitymanagement, firewalls, SIEM, PAM, IDS/IPS, EDR/XDR, WAF Working with code security controls such as SAST/DAST/IAST/RASP You should also More ❯
SOC and Vulnerability Analyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload, but … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and Vulnerability Analyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality and More ❯
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK Head of Security and consulting … Skills & Experience Required: 4+ years of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK Head of Security and consulting … Skills & Experience Required: 4+ years of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom
The Bridge (IT Recruitment) Limited
teaming, and security assessments. Driving the integration of secure development practices and automation within CI/CD workflows. Supporting compliance and audit activities through structured documentation and reporting. Coordinating vulnerabilitymanagement and helping teams meet security SLAs. Collaborating with cross-functional stakeholders to embed security into engineering culture and processes. Owning and improving security tooling roadmaps and BAU … delivery capacity. What we're looking for: Demonstrable experience of effective and efficient cyber security delivery, project management or security engineering. Strong understanding of vulnerabilitymanagement, secure software development, and compliance frameworks (NIST CSF 2.0, GDPR, ISO 27001). Strong examples of cross-functional stakeholder management, being a knowledgeable bridge between technical cyber security teams and … red teaming and security tool implementations. Strong knowledge and experience of integrating security into agile development environments and workflows. Experience with tools like Jira, Confluence, SharePoint or similar project management tools. Preferred certifications: CISA, CISM, Security+, PMP, Prince 2. More ❯
Havant, Hampshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
month FTC (with likely extension to permanent) Salary: 50 - 53K plus benefits We are seeking a Cyber Security Specialist to lead the implementation of a new Information Security Management System (ISMS) and ensure compliance with security standards. This role is crucial in driving security improvements, managing risks, and maintaining regulatory compliance within a dynamic IT environment of circa … IT users. Key Accountabilities: * Lead the implementation of a new ISMS, ensuring alignment with industry security standards. * Develop and maintain cyber security policies, procedures, and risk management frameworks. * Manage compliance with cyber security regulations, standards, and frameworks (ISO27001, CAF/eCAF, Cyber Essentials Plus). * Implement and manage security monitoring tools to detect and respond to security events. * Identify … with hands-on involvement in ensuring compliance to security frameworks (ISO27001, NIST, eCAF). * Proven experience in implementing security systems and/or monitoring tools. * Strong knowledge of SIEM, VulnerabilityManagement, Threat Intelligence, and IAM systems. * Experience contributing to enterprise-level security initiatives and aligning with industry standards. * Strong collaboration skills, including experience working with IT Operations teams More ❯
Brighton 2 days per week + WFH) Salary: 60K - 62.5K + exceptional Employee Benefits including 28% Employer Pension, (+ on-call payment), great work/life balance Key Skills: VulnerabilityManagement tools, Azure Security Centre, Defender, Sentinel and a broad Infrastructure Engineer background Summary: This role joins a high performing, dedicated, hands-on Cyber Security Team responsible for … and Microsoft cloud infrastructure, including: Cisco firewalls and ISE, Forcepoint or similar secure web gateway/CASB solution, Mimecast, IDS/IPS solutions, Network Detection and Response (NDR), Qualys vulnerability detection and management platform or similar Highly practical with a can-do attitude, able to demonstrate a proactive approach to identifying and mitigating potential security risks. Strong communications More ❯
Brighton, East Sussex, Preston Park, United Kingdom Hybrid / WFH Options
Data Careers Ltd
Brighton 2 days per week + WFH) Salary: £60K - £62.5K + exceptional Employee Benefits including 28% Employer Pension, (+ on-call payment), great work/life balance Key Skills: VulnerabilityManagement tools, Azure Security Centre, Defender, Sentinel and a broad Infrastructure Engineer background Summary: This role joins a high performing, dedicated, hands-on Cyber Security Team responsible for … and Microsoft cloud infrastructure, including: Cisco firewalls and ISE, Forcepoint or similar secure web gateway/CASB solution, Mimecast, IDS/IPS solutions, Network Detection and Response (NDR), Qualys vulnerability detection and management platform or similar Highly practical with a can-do attitude, able to demonstrate a proactive approach to identifying and mitigating potential security risks. Strong communications More ❯
systems, subsystems, products and external interfaces, and may include a mixture of operational cybersecurity functions and governance, risk and compliance (GRC) activities. Key responsibilities include: Perform systems security risk management activities, including identifying security threats, analysing the risk exposure and presenting treatment options to mitigate security risk. Conduct asset management including maintaining accurate inventories of all hardware and … software configuration items. Maintain change management, through evaluation of system changes for cybersecurity impact and updating any affected security authorisation artefacts. Perform vulnerabilitymanagement, including conducting automated vulnerability scans, using the provided toolset, to identify any open vulnerabilities and ensure they are appropriately documented, tracked and remediated in the given timeframes. Present cybersecurity solutions to non More ❯
safeguard national interests What We're Looking For 1-3 years of practical experience in Cyber Security Good understanding of core security principles and tools Exposure to network security, vulnerabilitymanagement, or risk assessments (preferred) Familiarity with security frameworks such as ISO 27001, NIST, or PCI DSS (preferred) Professional certifications like Security+, CEH, or CISSP are desirable Analytical … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Employment Type: Permanent
Salary: £45000 - £55000/annum Excellent Training and Benefits
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
safeguard national interests What We're Looking For 1-3 years of practical experience in Cyber Security Good understanding of core security principles and tools Exposure to network security, vulnerabilitymanagement, or risk assessments (preferred) Familiarity with security frameworks such as ISO 27001, NIST, or PCI DSS (preferred) Professional certifications like Security+, CEH, or CISSP are desirable Analytical … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Burton Latimer, Northamptonshire, United Kingdom Hybrid / WFH Options
Weetabix
to security events and incidents, as well as spearheading engaging user awareness campaigns and training sessions. In addition, you'll play a vital role in supporting the implementation and management of identity, access, and threat management controls throughout our IT environment. Identify, analyse, and respond to security events and incidents, escalating as per the incident response plan. Develop … and deliver IT Security Education and Awareness materials for the entire organisation. Support IT Security Penetration Tests, Assessments, and audits, resolving findings promptly. Analyse vulnerability scans and provide recommendations to prioritise corrective actions. Continuously identify and implement security measures and improvements. Collaborate with Service Line Leads to review and update IT security guidelines and policies. Assist in executing projects … Strong understanding of Active Directory (AD) and Entra ID (Azure AD), MFA, SSO, conditional access, Azure RBAC, PIM Experience with the following products and technologies: Microsoft Defender, Exchange Online, vulnerabilitymanagement tools, phishing simulation tools Experience creating policies, procedures and response plans Excellent communicator with the ability to reduce complex issues and ideas to simple terms and express More ❯
incidents. Perfect for someone who enjoys being in sole contributor and operating strategically and tactically. We're looking for candidates with experience in: Managing global security incidents at scale Vulnerabilitymanagement and remediation programs Frameworks like NIST and MITRE ATT&CK Cloud security (Azure preferred) Reporting and communicating with both technical teams and senior stakeholders Comfortable working closely More ❯
enhance the SOC's scalability, efficiency, and incident response readiness. Designed and fine-tune proactive and reactive detections in Sentinel - working closely with Threat Intelligence, IR, and Attack Surface Management teams. Partnered with SOC analysts to identify repetitive tasks and implement automation to boost day-to-day operational efficiency in areas like threat hunting and vulnerability management. Continuously More ❯
implementing changes accordingly. Establish and develop solution architecture for IT security and end-user service domains, ensuring security is integrated into all aspects of the organisation's IT. Oversee vulnerabilitymanagement and secure the design of IT services. Involvement in Monitoring, identification, resolution activities, and reporting of IT security KPI's and Incidents. Liaise with Data Protection Officer … in on-call and shift rotas. Attend training courses as identified and follow up with exams/qualifications if available. Implement IT Changes in line with the IT Change Management Procedure. Maintain high level of awareness in IT, Information, and Cyber Security and provide information and advice to others as necessary. Work with elevated account privileges and permissions in More ❯
You'll be at the heart of their SecOps function, helping to shape and improve their cyber capabilities. What they are looking for : Someone comfortable with SIEM, EDR, and vulnerabilitymanagement tooling (Rapid7, CrowdStrike, Qualys etc.) Scripting and automation Strong foundational IT and networking knowledge Familiarity with patching solutions and email security tools A proactive mindset and good More ❯
major incidents to determine the affected/vulnerable systems, affected/vulnerable users Identify any business areas impacted and coordinate communications with all relevant stakeholders as per Major Incident Management process. Coordinate the remediation and containment activities as advised by either the NTT DATA SOC or Incident Response Team. Oversee, support, and manage through to completion the investigative and … Manager in review of any service delivery processes and workflows, identifying areas for optimization and implementing best practices. Co-ordinate the running and reporting of a risk-based vulnerabilities management including: Scanning systems, networks, and applications to detect potential security weaknesses. Prioritize vulnerabilities based on their risk level, potential impact, and the criticality of the affected assets, ensuring that … challenging projects and a work environment that supports the creation of tangible solutions that make an impact. You will need to have a broad experience of security service delivery management and have evidence of experience in a number of the following fields of expertise: At least 10 years of experience in providing technical support and advice for a Security More ❯
major incidents to determine the affected/vulnerable systems, affected/vulnerable users Identify any business areas impacted and coordinate communications with all relevant stakeholders as per Major Incident Management process. Coordinate the remediation and containment activities as advised by either the NTT DATA SOC or Incident Response Team. Oversee, support, and manage through to completion the investigative and … Manager in review of any service delivery processes and workflows, identifying areas for optimization and implementing best practices. Co-ordinate the running and reporting of a risk-based vulnerabilities management including: Scanning systems, networks, and applications to detect potential security weaknesses. Prioritize vulnerabilities based on their risk level, potential impact, and the criticality of the affected assets, ensuring that … challenging projects and a work environment that supports the creation of tangible solutions that make an impact. You will need to have a broad experience of security service delivery management and have evidence of experience in a number of the following fields of expertise: At least 10 years of experience in providing technical support and advice for a Security More ❯
experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python, JavaScript … GoLang, Terraform, CloudFormation (AWS), and AWS CDK. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Desired: Ability to work independently, take initiative, and maintain a keen attention to detail, ensuring high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. Why More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Capital One (Europe) plc
order to support strategic decision-making for Cyber and Technology leadership Take the lead in evaluating and recommending standardized risk sloping & scoring methods across Tech and Cyber domains, including VulnerabilityManagement, Data Security, and Network Security across the enterprise Serve as a point of contact for ISO Assurance Team service offerings and assist with onboarding junior team members. … Standardize the review of mitigating factors and controls in support of risk management activities so that technology and business teams can prioritize risk reduction activities in order to allow teams to focus on the areas of the greatest impact Work cross-functionally with Advisory, Assessment, and Risk Operations functions within the Information Security Office to measure cybersecurity and technology More ❯