experience in real-world cybersecurity scenarios. Your responsibilities will include assisting in the development of cyber solutions, testing products, troubleshooting, implementing security measures, conducting vulnerability assessments and penetration testing, and participating in cyber assessments while learning about standards such as the NIST Cybersecurity Framework (CSF) 2.0, NIST … as applicable to OT systems. Assist in evaluating new cyber solutions and introducing innovative approaches to existing solutions. Assist in varying stages of cyber assessmentvulnerabilityassessment and penetration testing. Assist in detailed design documents for various cyber solutions. Participate in design discussions with end customers and More ❯
drive initiatives to design and implement security solutions for Azure and M365 environments, ensuring adherence to industry best practices and regulatory standards. Supplier Security Assessment: Evaluate and ensure the security posture of Material IT Suppliers, ensuring compliance with security standards and contractual obligations. Risk Assessment: Conduct risk assessments … analyze vulnerability and penetration testing reports, and develop risk mitigation strategies. Access Management: Help develop and maintain a robust Role-Based Access Control Framework, ensuring efficient management of access rights. Key Skills & Experience: Ideally a Degree in Computer Science, Information Security, or related field (or equivalent experience). Advanced … of security frameworks (e.g., NIST, ISO27000 series). Expertise in network security protocols, Azure security solutions, firewalls, intrusion detection systems, VPNs, etc. Proficient in vulnerabilityassessment tools, incident response frameworks, and risk management methodologies. Ability to collaborate effectively with cross-functional teams. Analytical mindset to interpret security data More ❯
requirements - Conduct periodic internal assessments to evaluate adherence to Information Security Frameworks and compliance standards, driving continuous improvement and implement corrective actions based on assessment findings - Stay updated with industry trends, best practices, regulatory standards and amendments in Information Security Frameworks - Develop strategic plans outlining security objectives and domain … knowledge sharing and cooperation to leverage expertise from external entities - Develop a comprehensive framework for assessing the security posture of Material IT Suppliers, outlining assessment criteria, methodologies, and evaluation metrics - Working with the Head of IT Service, establish mechanisms to verify and validate the compliance of material IT suppliers … potential risks and threats to the organisation's assets and operations - Develop and implement risk mitigation strategies based on the findings from risk assessments, vulnerability testing, and penetration testing reports - Organise and oversee regular vulnerability assessments and penetration testing activities to identify weaknesses and potential entry points for More ❯
requirements - Conduct periodic internal assessments to evaluate adherence to Information Security Frameworks and compliance standards, driving continuous improvement and implement corrective actions based on assessment findings - Stay updated with industry trends, best practices, regulatory standards and amendments in Information Security Frameworks - Develop strategic plans outlining security objectives and domain … knowledge sharing and cooperation to leverage expertise from external entities - Develop a comprehensive framework for assessing the security posture of Material IT Suppliers, outlining assessment criteria, methodologies, and evaluation metrics - Working with the Head of IT Service, establish mechanisms to verify and validate the compliance of material IT suppliers … potential risks and threats to the organisation's assets and operations - Develop and implement risk mitigation strategies based on the findings from risk assessments, vulnerability testing, and penetration testing reports - Organise and oversee regular vulnerability assessments and penetration testing activities to identify weaknesses and potential entry points for More ❯
client facing, to include leadership and executive management Draft root cause analysis reports and recommendations after cybersecurity incidents Identify risk areas that will require vulnerability prevention Stay current with Security technologies and make recommendations for use based on business value Skills & Qualifications Requirements SIEM administration, configuration, and optimization experience … endpoint protection solutions such as Cylance, Carbon Black, or CrowdStrike Understanding of network protocols coupled with experience with web proxies, web application firewalls, and vulnerabilityassessment tools. Experience working in a team-oriented, collaborative environment with a high level of analytical and problem-solving abilities Positive attitude with … strong oral and written communication skills Knowledge of IP networking and network security including Intrusion Detection Familiarity with common network vulnerability/penetration testing tools Familiarity with service management software such as ServiceNow Familiarity with data visualization platforms such as Domo Some experience with system hardening guidance and tools More ❯
We’re looking for a Senior Vulnerability Management Analyst to join us in either Amsterdam, London or Reading In this role you will be working closely with one of our Operating companies, Telenet, which will mean regular visits to their site in Mechelen, Belgium. The Threat and Vulnerability … management of vulnerabilities to reduce the attack surface and improve the overall security posture of Liberty Global and their entities. As such the Threat & Vulnerability Management team are looking for talented and passionate security professionals to join their team. As part of TVM our Vulnerability Management Analysts focus … on delivering the end-to-end vulnerability management process, including proactive monitoring and scanning of threats and vulnerabilities in order to protect and defend Liberty Global's interests. With vulnerabilities impacting network, endpoint, and cloud in a diverse global environment, you will be part of a highly collaborative team More ❯
to embed security into cloud environments (AWS, Azure, Google Cloud) and application development lifecycles. Implantation and management of SOC and EDR functions. Conduct regular vulnerability assessments, penetration testing, and red-team exercises, working closely with external partners to continuously test and improve security defences. Develop a comprehensive risk register More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
UNAVAILABLE
protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID More ❯
knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions More ❯
local IT Security Officers Experience in sourcing and managing vendor relationships , staff and service providers across multiple countries, with expertise in information risk analysis, vulnerabilityassessment, incident response, and root cause resolution. Specific Technical skills - Excellent knowledge of NIST CSF (1.1 and 2.0), ISO2700x, ISO22301 and NIS 2. … with Training and Awareness platforms, Cyber Security Testing, Threat Detection and Response, Security Information and Event Management (SIEM) platforms. As a plus : Expertise in Vulnerability management tools, forensic analysis tools and methods, GRC Tools Identity, Access & Network Security: Proficiency in Identity and Access Management (IAM), Secure Access Service Edge More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient … Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerability scanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers, DevOps More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and … clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits … regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages (e.g. More ❯
Security Engineer and play a vital role in protecting our IT infrastructure and endpoints from cyber threats. You will focus on developing and managing vulnerability management and security testing tools, collaborating with technical teams and service providers to improve processes, and guiding the implementation of improvement strategies with IT … and project teams. Stay up to date with standard methodologies in cybersecurity to contribute to security transformation initiatives. Day to day Regularly perform thorough vulnerability assessments using automated tools and manual techniques to identify potential security weaknesses across systems, applications, and networks. Complete penetration tests to simulate cyber-attacks … and remediation efforts, providing regular reports and updates to management and stakeholders. Contribute to the investigation and response of security incidents, demonstrating expertise in vulnerability management to determine underlying causes and suggest preventive actions. Develop, manage and maintain vulnerabilityassessment and penetration testing tools and solutions. Keep More ❯
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
City, Edinburgh, United Kingdom Hybrid / WFH Options
Deloitte LLP
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
Support & Troubleshooting : Resolve escalated IT issues, troubleshoot complex security-related hardware, software, and network issues. Cyber Security Management : Monitor and maintain security infrastructure, conduct vulnerability assessments, and apply security patches. Incident Response & Remediation : Lead cyber attack response efforts, conduct root cause analysis, and collaborate on incident handling. Security Policy More ❯
to mitigate risks based on threat intelligence. Stay up to date on the latest cybersecurity trends and regulatory requirements. System and Network Security: Perform vulnerability assessments and penetration testing on systems and networks. Implement and maintain security tools such as firewalls, endpoint protection, and email security systems. Collaborate with More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Motability Operations
have experience designing and implementing security measures that protect sensitive information in complex environments. Your technical expertise spans areas such as encryption, access controls, vulnerability assessments and incident response. You have excellent problem-solving skills and a proactive mindset, enabling you to anticipate potential threats and address them effectively. More ❯
Employment Type: Permanent, Part Time, Work From Home
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
have experience designing and implementing security measures that protect sensitive information in complex environments. Your technical expertise spans areas such as encryption, access controls, vulnerability assessments and incident response. You have excellent problem-solving skills and a proactive mindset, enabling you to anticipate potential threats and address them effectively. More ❯
Employment Type: Permanent, Part Time, Work From Home
comprehensive penetration testing on web applications, APIs, and mobile applications (both Android and iOS) to identify potential security vulnerabilities. Perform threat modeling and risk assessment to provide actionable recommendations for remediation. Collaborate with development and operations teams to enhance security measures across cloud environments and containerized applications. Develop and … penetration testing or a related cybersecurity role. Offensive Security Certified Professional (OSCP) or equivalent certification is required. Strong experience in web application testing and vulnerabilityassessment tools (e.g., Burp Suite, OWASP ZAP). Familiarity with API security testing methodologies and tools. Experience in mobile application security testing for More ❯
Provide security accreditation advice for MOD systems, End User Devices, and secure disposal of classified materials. Deliver security awareness training and briefings . Manage vulnerability assessments, penetration testing, and remediation activities . Monitor and report on emerging security threats. SOC: Assure Live Service Security (LSS) delivery . Provide security More ❯