Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC … Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & Penetration Testing: Review Penetration Testing, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk … cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetration testing, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of More ❯
Employment Type: Contract, Work From Home
Rate: From £500 to £700 per day (direct contract with the client)
MOD, HMG, and NCSC frameworks and accreditations. Engage with national authorities (e.g., NCSC) to support accreditations and assurance. Oversee security testing activities (e.g., ITHC, vulnerability assessments). Maintain security risk records, support audits, and provide regular reporting. Promote a culture of high standards in information assurance and risk management. More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
assurance and the measurement of controls. Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
assurance and the measurement of controls. Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Cyberteam
responsible for our clients entire certification journey from understanding their requirements/vulnerabilities, assessing their compliance against the Cyber Essentials scheme requirements, completing remote vulnerability scans and workstation assessments, all the way through to conducting CE audits and authoring/presenting final reports. Additionally, you will also be involved … the potential to lead/evolve into IT Security, Penetration Testing, and Information Governance specialisations. Key Responsibilities: Conduct Cyber Essentials and Cyber Essentials Plus Assessment: Perform comprehensive assessments of organisations' cybersecurity practices, systems, and controls to ensure compliance to the Cyber Essentials Scheme Conduct in-depth vulnerability assessments … to identify potential security weaknesses. Verify the effectiveness of CE security controls through rigorous testing and analysis. Document CE and CE+ assessment findings, including detailed reports and recommendations. Provide Guidance and Recommendations: Offer advice and guidance to organisations on implementing and enhancing cybersecurity controls to become compliant to CE. More ❯
efficacy of the security features and tools. Provide an interface between client and the National Technical Authority (NCSC). Oversee IT Health Check and Vulnerability Assessments by approving scope of tests and overall testing programme Record and track assessments of information capability and projects supporting reviews and audits as … necessary. Provide technical risk assessment analysis. Develop the professionalism of Information Risk Management within the business. Attend project Security Working Groups and manage when appropriate. Due to the nature and urgency of this post, candidates holding or who have held high level Developed Vetting clearance in the past are More ❯