Stoke-On-Trent, Staffordshire, West Midlands, United Kingdom
Oscar Associates (UK) Limited
network security. Oversee and maintain VMware ESXi hosts, vCenter, and Horizon environments. Administer and maintain Active Directory to ensure proper access and permissions. Use vulnerabilityscanning tools (Nessus) to identify and remediate system vulnerabilities. Manage Azure cloud resources and services for cloud infrastructure needs. Work Schedule: Initially, this More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
Lorien
proficiency in cyber security tools, including at least one of the following: SIEM, EDR, SOAR, AV, CNAPP/CSPM, SAST/DASTs, WAFs, Firewalls, Vulnerability scanners, email gateways, web gateways. So, if you believe your skills and experience match the requirements for this role. Then please reach out and More ❯
test, and deployment processes to improve efficiency. Embed security best practices throughout the software development lifecycle. Implement tools for automated security testing, compliance, and vulnerability scanning. Cloud Infrastructure & FinOps Lead the architecture and management of AWS cloud environments to ensure scalability and reliability. Champion the adoption of cloud-native More ❯
Create AI-powered CI/CD automation to improve deployment efficiency and software quality. Work on the Integration of AI-driven security tools for vulnerabilityscanning, anomaly detection, and compliance automation. Collaborate with engineering teams to implement automated testing, monitoring, and security best practices. Optimisation of Kubernetes, containerisation …/CD pipelines, Infrastructure-as-Code (IaC), and cloud automation. Hands-on experience with AI-driven DevOps tools (GitLab AI, AIOps, AI-powered security scanning). Deep knowledge of AWS services (EKS, EC2, Lambda, ECS, S3, IAM, etc.). Proficiency in scripting and automation (Python or Golang preferred). More ❯
for this role, you must be a Sole British with active MOD DV clearance or be eligible to obtain it. Key areas of expertise: Vulnerabilityscanning and reporting Endpoint security management Security incident response and ticket handling System hardening Change management support Active participation in team meetings Clear More ❯
mitigate potential vulnerabilities. The Information Security Manager will perform fundamental security and data protection tasks. You will conduct security and data protection assessments, supporting vulnerability management, reviewing security configurations, and contributing to the development of security and data protection policies. The ideal candidate is eager to learn and grow … and managing risks effectively Security system management, administration and reporting; Provide advice and guidance to teams on how to mitigate any identified risks 3. Vulnerability Management: Coordinate security assurance testing and vulnerability management Provide advice and guidance to teams on how to mitigate vulnerabilities, and following up on … etc.) or a degree in a related field are preferred, but not essential Strong understanding of security concepts, tools, and technologies (e.g., SIEM, firewalls, vulnerability scanners) Strong understanding of network security and operating systems Commitment to continuous professional development, with a willingness to learn and grow in the cybersecurity More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
Lorien
least one of the following security domains/tools: SIEM EDR/SOAR/AV CNAPP/CSPM SAST/DAST WAFs/Firewalls Vulnerability Scanners Email & Web Gateways Other Information: This role includes participation in an out-of-hours support rota . Candidates must be eligible for UK More ❯