With Intelligence
AWS Security & Vulnerability Remediation Engineer (DevSecOps / Cloud Security) 3 month initial contract outside IR35 Overview We are looking to hire an AWS-focused security engineer to lead the remediation of cloud and application vulnerabilities across our AWS environment. You will work closely with Developers, Data Engineers, and our AWS Security Lead to validate findings, prioritise risk, implement fixes, and strengthen security controls. AWS security is your primary technical skill; a strong understanding of software development, DevSecOps practices, and vulnerability management is essential. Key Responsibilities Own end-to-end remediation of AWS and workload vulnerabilities: confirm findings, assess impact, prioritise actions, and track through to closure. Partner with Developers and Data Engineers to implement secure fixes in code, infrastructure, and delivery pipelines (IaC, containers, serverless, OS/packages). Work with the AWS Security Lead to ensure remediation aligns with AWS security controls, internal risk policies, and compliance requirements. Improve and automate vulnerability management processes (e.g., scanning coverage, SLAs, exception handling, evidence capture). Embed security into CI/CD and the SDLC: shift-left reviews, secure coding guidance, dependency management, and pipeline guardrails. Configure, tune, and operate AWS security services (e.g., GuardDuty, Security Hub, Inspector, Config, IAM Access Analyzer) to reduce exposure and prevent repeat issues. Produce clear remediation guidance, runbooks, and reporting dashboards for both technical and non-technical stakeholders. Support incident response and post-remediation validation where high-risk findings are exploited or trending. AWS / Cloud Security (Primary) Deep, hands-on AWS security experience across IAM, networking, compute, storage, serverless, and managed data services. Strong knowledge of the AWS Well-Architected Security Pillar and common control frameworks (CIS AWS Foundations, NIST/ISO-aligned controls). Demonstrable experience implementing and validating AWS security controls, including: IAM least privilege, roles, permission boundaries, SCPs, and access reviews VPC segmentation, security group/NACL design, private endpoints, WAF/Shield Encryption in transit and at rest using KMS, TLS, and secrets management Logging and monitoring: CloudTrail, CloudWatch, Config, centralised SIEM patterns Threat detection and posture management using AWS native services Dev / DevSecOps / Vulnerability Management (Primary) Strong understanding of modern SDLC, CI/CD, and DevSecOps approaches. Proven experience managing the full vulnerability lifecycle: triage, prioritisation (CVSS/EPSS/KEV), remediation, verification, and reporting. Comfortable remediating a wide range of findings: OS/package CVEs, container images, third-party libraries, serverless runtimes, and cloud misconfigurations. Able to translate security findings into clear, practical tasks for engineering teams and coach on secure implementation. Engineering & Tooling Infrastructure as Code: Terraform and/or CloudFormation; able to review and fix security weaknesses in IaC. Scripting/automation skills in Python, Bash, or similar to streamline remediation and control validation. Familiarity with container and serverless security (ECR, ECS/EKS, Lambda, image scanning, runtime hardening). Experience with common vulnerability and scanning tools (e.g., AWS Inspector/Security Hub, Snyk, Trivy, Dependabot, Prisma/Qualys/Tenable, etc.). Nice to Have Security certifications such as AWS Security Specialty, AWS Solutions Architect, or equivalent. Experience supporting data platforms on AWS (Glue, EMR, Redshift, Athena, RDS, OpenSearch, Kafka/MSK). Knowledge of secure coding practices in Python/Node/Java or your core development stack. Experience with policy-as-code and automated control enforcement (OPA/Conftest, tfsec, Checkov). Personal Attributes Highly collaborative and pragmatic; you enjoy working directly with engineers to ship secure fixes quickly. Strong risk judgement and the ability to balance urgency with operational impact. Clear communicator who can write concise remediation guidance and present progress to stakeholders. Ownership mindset: you drive remediation through to completion, not just identification. Outside IR35
AWS Security & Vulnerability Remediation Engineer (DevSecOps / Cloud Security) 3 month initial contract outside IR35 Overview We are looking to hire an AWS-focused security engineer to lead the remediation of cloud and application vulnerabilities across our AWS environment. You will work closely with Developers, Data Engineers, and our AWS Security Lead to validate findings, prioritise risk, implement fixes, and strengthen security controls. AWS security is your primary technical skill; a strong understanding of software development, DevSecOps practices, and vulnerability management is essential. Key Responsibilities Own end-to-end remediation of AWS and workload vulnerabilities: confirm findings, assess impact, prioritise actions, and track through to closure. Partner with Developers and Data Engineers to implement secure fixes in code, infrastructure, and delivery pipelines (IaC, containers, serverless, OS/packages). Work with the AWS Security Lead to ensure remediation aligns with AWS security controls, internal risk policies, and compliance requirements. Improve and automate vulnerability management processes (e.g., scanning coverage, SLAs, exception handling, evidence capture). Embed security into CI/CD and the SDLC: shift-left reviews, secure coding guidance, dependency management, and pipeline guardrails. Configure, tune, and operate AWS security services (e.g., GuardDuty, Security Hub, Inspector, Config, IAM Access Analyzer) to reduce exposure and prevent repeat issues. Produce clear remediation guidance, runbooks, and reporting dashboards for both technical and non-technical stakeholders. Support incident response and post-remediation validation where high-risk findings are exploited or trending. AWS / Cloud Security (Primary) Deep, hands-on AWS security experience across IAM, networking, compute, storage, serverless, and managed data services. Strong knowledge of the AWS Well-Architected Security Pillar and common control frameworks (CIS AWS Foundations, NIST/ISO-aligned controls). Demonstrable experience implementing and validating AWS security controls, including: IAM least privilege, roles, permission boundaries, SCPs, and access reviews VPC segmentation, security group/NACL design, private endpoints, WAF/Shield Encryption in transit and at rest using KMS, TLS, and secrets management Logging and monitoring: CloudTrail, CloudWatch, Config, centralised SIEM patterns Threat detection and posture management using AWS native services Dev / DevSecOps / Vulnerability Management (Primary) Strong understanding of modern SDLC, CI/CD, and DevSecOps approaches. Proven experience managing the full vulnerability lifecycle: triage, prioritisation (CVSS/EPSS/KEV), remediation, verification, and reporting. Comfortable remediating a wide range of findings: OS/package CVEs, container images, third-party libraries, serverless runtimes, and cloud misconfigurations. Able to translate security findings into clear, practical tasks for engineering teams and coach on secure implementation. Engineering & Tooling Infrastructure as Code: Terraform and/or CloudFormation; able to review and fix security weaknesses in IaC. Scripting/automation skills in Python, Bash, or similar to streamline remediation and control validation. Familiarity with container and serverless security (ECR, ECS/EKS, Lambda, image scanning, runtime hardening). Experience with common vulnerability and scanning tools (e.g., AWS Inspector/Security Hub, Snyk, Trivy, Dependabot, Prisma/Qualys/Tenable, etc.). Nice to Have Security certifications such as AWS Security Specialty, AWS Solutions Architect, or equivalent. Experience supporting data platforms on AWS (Glue, EMR, Redshift, Athena, RDS, OpenSearch, Kafka/MSK). Knowledge of secure coding practices in Python/Node/Java or your core development stack. Experience with policy-as-code and automated control enforcement (OPA/Conftest, tfsec, Checkov). Personal Attributes Highly collaborative and pragmatic; you enjoy working directly with engineers to ship secure fixes quickly. Strong risk judgement and the ability to balance urgency with operational impact. Clear communicator who can write concise remediation guidance and present progress to stakeholders. Ownership mindset: you drive remediation through to completion, not just identification. Outside IR35
With Intelligence
Azure Security Engineer - UK (Hybrid) 3 month initial contract outside IR35 Focus: Vulnerability Remediation, Defender Suite, Purview Compliance We are hiring an Azure Security Engineer to strengthen our Microsoft security posture with a hands-on focus on improving Defender for Cloud findings, remediating vulnerabilities across Azure and endpoint estates, and uplift of compliance and data protection controls. This is a role for someone who enjoys fixin g things, not just recommending. You'll be embedded with engineering and infrastructure teams, working through remediation tasks, tightening configuration, and improving real-world risk reduction week by week. Core Responsibilities Microsoft Defender Suite (Primary Requirement) Monitor and remediate vulnerabilities surfaced by Defender for Cloud Manage and optimise Defender for Endpoint, attack surface reduction and device hardening Operate and tune External Attack Surface Management (EASM) findings and asset exposure Improve Secure Score and continuously reduce risk through technical remediation Collaborate with SOC to triage, respond, and close findings Data Protection & Compliance (Purview-Led) Implement and manage Purview (DLP, sensitivity labels, insider risk, records) Assist with compliance uplift against ISO 27001, SOC2, GDPR, NIS2 Maintain audit trails, evidence, runbooks, and security documentation Vulnerability & Configuration Hardening Hands-on remediation - patching, configuration fixes, policy deployments Work with product teams to close findings rather than just escalate Improve posture for identity, endpoints, networking, and cloud workloads Implement conditional access, PIM, key vault, and encryption standards Detection, Monitoring & Response Tune Sentinel analytics, automation rules, alert noise reduction Support incident investigation, triage, threat hunting as needed Generate security metrics, reporting, and measurable improvement trends Collaboration & Delivery Work with DevOps, Infra, Desktop, and Cloud teams on real-world fixes Translate risk into understandable action for stakeholders Create repeatable processes to shorten future remediation cycles Experience & Skills Needed Must-Have Strong hands-on experience with Defender for Cloud, Defender for Endpoint, EASM Working knowledge of Purview, DLP, sensitivity labels, insider risk Demonstrable history of closing vulnerabilities and improving posture Azure identity & access security (Entra ID, Conditional Access, PIM) PowerShell/MS Graph for automation or scripted remediation Nice to Have Sentinel exposure (analytic rules, workbooks, automation) Understanding of Zero Trust principles and Microsoft Compliance Manager Experience working in regulated or audited environments Certifications Required AZ-500 - Azure Security Engineer Associate SC-100 (or commitment to completion within 12 months) Plus one of MS-500 or SC-400 or SC-900 Desirable CCSP Additional Defender/M365 security modules What This Role Offers Real ownership in improving cyber posture Hands-on security engineering where the work is measurable Hybrid UK working Modern cloud-security-driven environment 3 month initial contract outside IR35
Azure Security Engineer - UK (Hybrid) 3 month initial contract outside IR35 Focus: Vulnerability Remediation, Defender Suite, Purview Compliance We are hiring an Azure Security Engineer to strengthen our Microsoft security posture with a hands-on focus on improving Defender for Cloud findings, remediating vulnerabilities across Azure and endpoint estates, and uplift of compliance and data protection controls. This is a role for someone who enjoys fixin g things, not just recommending. You'll be embedded with engineering and infrastructure teams, working through remediation tasks, tightening configuration, and improving real-world risk reduction week by week. Core Responsibilities Microsoft Defender Suite (Primary Requirement) Monitor and remediate vulnerabilities surfaced by Defender for Cloud Manage and optimise Defender for Endpoint, attack surface reduction and device hardening Operate and tune External Attack Surface Management (EASM) findings and asset exposure Improve Secure Score and continuously reduce risk through technical remediation Collaborate with SOC to triage, respond, and close findings Data Protection & Compliance (Purview-Led) Implement and manage Purview (DLP, sensitivity labels, insider risk, records) Assist with compliance uplift against ISO 27001, SOC2, GDPR, NIS2 Maintain audit trails, evidence, runbooks, and security documentation Vulnerability & Configuration Hardening Hands-on remediation - patching, configuration fixes, policy deployments Work with product teams to close findings rather than just escalate Improve posture for identity, endpoints, networking, and cloud workloads Implement conditional access, PIM, key vault, and encryption standards Detection, Monitoring & Response Tune Sentinel analytics, automation rules, alert noise reduction Support incident investigation, triage, threat hunting as needed Generate security metrics, reporting, and measurable improvement trends Collaboration & Delivery Work with DevOps, Infra, Desktop, and Cloud teams on real-world fixes Translate risk into understandable action for stakeholders Create repeatable processes to shorten future remediation cycles Experience & Skills Needed Must-Have Strong hands-on experience with Defender for Cloud, Defender for Endpoint, EASM Working knowledge of Purview, DLP, sensitivity labels, insider risk Demonstrable history of closing vulnerabilities and improving posture Azure identity & access security (Entra ID, Conditional Access, PIM) PowerShell/MS Graph for automation or scripted remediation Nice to Have Sentinel exposure (analytic rules, workbooks, automation) Understanding of Zero Trust principles and Microsoft Compliance Manager Experience working in regulated or audited environments Certifications Required AZ-500 - Azure Security Engineer Associate SC-100 (or commitment to completion within 12 months) Plus one of MS-500 or SC-400 or SC-900 Desirable CCSP Additional Defender/M365 security modules What This Role Offers Real ownership in improving cyber posture Hands-on security engineering where the work is measurable Hybrid UK working Modern cloud-security-driven environment 3 month initial contract outside IR35