Cardiff, Wales, United Kingdom Hybrid / WFH Options
Creditsafe
credentials. • Proven experience in managing security operations teams in a similar industry. • Familiarity with SOC2, PCI-DSS, ISO22301 and ISO27001 standards. Desirable Qualifications: • Bachelor’s or masters degree in CyberSecurity, Computer Science, Information Technology, or a related field • Cloud security qualifications such as ISC2 CCSP, CSA CCSK and AWS Security Speciality • ISO27001 Lead Implementor • Strong knowledge of cloud and on More ❯
The CyberSecurity Architect will work closely with the solution architects and enterprise architects to improve and maintain the cybersecurity of NAVBLUE'S products, services and infrastructure. The ideal candidate will play a critical role in designing and implementing cybersecurity frameworks to align with the business objectives and mitigate potential threats. Main Responsibilities: Perform Security Risk and Threat analysis … regulations Ensure NAVBLUE Security strategy deployment within technical operations Ensure effective synchronization and alignment with Airbus Security Organization Education: Bachelor's degree in technical discipline Training and education in cybersecurity principles Experience: 5+ years of Security Architecture/Engineering, and/or Network architecture, and/or Security Operations and/or Experience in software development; software architecture an More ❯
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Ventula Consulting
Supporting audits, compliance reviews, and risk assessments Collaborating with internal teams and third-party partners to drive secure operations Ideal Candidate Profile: 5+ years in IT and/or cybersecurity roles Hands-on experience with Microsoft Sentinel and Defender Knowledge of Microsoft 365 and Azure security services (ideal but not essential) A recognised security qualification (e.g., CISMP, GSEC, Level 4+ More ❯
Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Reed Technology
on IT governance, compliance, and risk mitigation strategies. Required Skills & Qualifications * Proven experience in IT risk management, security governance, and compliance. * Strong knowledge of ISO27001, GDPR, PCI-DSS, and cybersecurity frameworks. * Experience in IT audit coordination and risk assessment methodologies. * Excellent communication and stakeholder management skills. * Desirable - Certifications such as CRISC, CISA, CISM, or CISSP Benefits * 10% discretionary performance related More ❯
their offices in Bridgend. In this diverse role, you will support the development and deployment of IT provisions within the company, including end-users support, hardware, network, software and cybersecurity ; and also support the delivery of IT projects. What you'll be doing: Support all internal users with any IT related queries/issues in a professional and timely … to supporting/creating user documentation. Carry out monthly IT maintenance and audits. Monitor and maintain patch management. Monitor and maintain anti-virus standards. Assist in obtaining and maintaining cybersecurity certifications. Assist and contribute towards key IT projects. What we're looking for: Qualified to HND or preferably degree level in IT/Computer Science. Competent user of Microsoft More ❯
platforms (e.g., Google Workspace, Microsoft Teams), and knowledge base tools. Device & Server Management: In-depth knowledge of Synology NAS solutions and managing both on-premises and cloud storage systems. Cybersecurity Awareness: Strong understanding of cybersecurity principles; capable of implementing policies, managing endpoint security, and ensuring data protection compliance. Cross-Platform Troubleshooting: Proficient in troubleshooting macOS, iOS, and Windows OS issues … other identity management platforms. Manage network settings and troubleshoot connectivity issues (Wi-Fi, VPN, LAN/WAN). Support file servers (e.g., Synology), NAS, or cloud file systems. Implement cybersecurity measures including encryption, antivirus, and firewalls. Conduct regular audits of security compliance. Manage user access controls and permissions. Install, configure, and manage business applications (e.g., Adobe Creative Cloud, Final Cut More ❯
Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Reed Technology
on IT governance, compliance, and risk mitigation strategies. Required Skills & Qualifications * Proven experience in IT risk management, security governance, and compliance. * Strong knowledge of ISO27001, GDPR, PCI-DSS, and cybersecurity frameworks. * Experience in IT audit coordination and risk assessment methodologies. * Excellent communication and stakeholder management skills. * Desirable - Certifications such as CRISC, CISA, CISM, or CISSP Benefits * Hybrid working * Generous annual More ❯
Rogerstone, Gwent, United Kingdom Hybrid / WFH Options
Reed Technology
on IT governance, compliance, and risk mitigation strategies. Required Skills & Qualifications Proven experience in IT risk management, security governance, and compliance. Strong knowledge of ISO27001, GDPR, PCI-DSS, and cybersecurity frameworks. Experience in IT audit coordination and risk assessment methodologies. Excellent communication and stakeholder management skills. Desirable - Certifications such as CRISC, CISA, CISM, or CISSP Benefits Hybrid working Generous annual More ❯
3rd Line IT Support Engineer (CyberSecurity) Swansea £35,000 to £45,000 + Company Benefits, Company Bonus & Training Are you an 3rd Line IT Support Engineer looking to join a proactive company engaged in cybersecurity, partnered with the best-in-class vendors, providing industry leading solutions, all while using cutting edge technology at the forefront of the industry … Do you want to join a close-knit, fast growing company, that provides advanced cybersecurity solutions that is dedicated to the growth and personal development of all of its members, wherever they are in the world? On offer is the chance to join a company who invests in you. With professional development time every week, experienced tech experts to More ❯
Employment Type: Permanent
Salary: £35000 - £45000/annum Company Bonus, Company Benefits, Tra
3rd Line IT Support Engineer (CyberSecurity) Swansea £35,000 to £45,000 + Company Benefits, Company Bonus & Training Are you an 3rd Line IT Support Engineer looking to join a proactive company engaged in cybersecurity, partnered with the best-in-class vendors, providing industry leading solutions, all while using cutting edge technology at the forefront of the industry … Do you want to join a close-knit, fast growing company, that provides advanced cybersecurity solutions that is dedicated to the growth and personal development of all of its members, wherever they are in the world? On offer is the chance to join a company who invests in you. With professional development time every week, experienced tech experts to More ❯
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
CyberNorth
Benefits Annual leave Company pension Employee discount Paid volunteer time Tech scheme Full job description Job Title:Operational Risk Manager (IT and CyberSecurity - 6 months FTC) Working Pattern:Monday to Friday, 36.25 hours per week Salary:up to £60,000 FTE and benefits Location:Flexible, we support fully remote or hybrid working from any of our UK offices in … oversight, specifically IT and cyber risk oversight, in a financial services regulated environment or similar, and be able to advise senior stakeholders on the effective management of IT and CyberSecurity risks. Key responsibilities & accountabilities: Developing and implementing an independent oversight model for cyber and technology risks across Tandem Bank. Collaborating with colleagues across all three lines of defence to More ❯
Oversee incident management, business continuity, and data protection processes as part of ISMS requirements. Stay current on changes to ISO 27001 and Cyber Essentials PLUS frameworks, regulatory expectations, and cybersecurity threats. Develop and deliver security and compliance awareness training across the organisation. Collaborate with IT, Legal, HR, and other departments to implement and maintain technical and procedural controls. Ensure timely More ❯
technology landscape. This role is critical in driving improvements in risk mitigation, security controls, governance, incident response, and regulatory compliance. What you'll need to succeed - Proven experience managing cybersecurity or IT risk-related projects in complex or regulated environments. - Strong understanding of cybersecurity frameworks, risk management, and compliance requirements. - Experience working with or aligning to ISO27001, NIS Regulations, or More ❯
technology landscape. This role is critical in driving improvements in risk mitigation, security controls, governance, incident response, and regulatory compliance. What you'll need to succeed - Proven experience managing cybersecurity or IT risk-related projects in complex or regulated environments. - Strong understanding of cybersecurity frameworks, risk management, and compliance requirements. - Experience working with or aligning to ISO27001, NIS Regulations, or More ❯
be implementing IAM strategies, ensuring compliance with policies and managing access to resources effectively, this role significantly Key Responsibilities: Develop and implement a comprehensive IAM strategy aligned with the CyberSecurity Strategy. Design IAM architectures that support secure and efficient access controls across the business. Establish and enforce access governance policies and procedures. Conduct periodic access reviews and certifications to … In-depth knowledge of IAM principles, technologies, and best practices. Familiarity with IAM frameworks and standards. Strong analytical and problem-solving skills. Bachelor's or Master's degree in CyberSecurity, Information Technology or related field. (desired) Benefits: 25 days annual leave plus bank holidays which can be tailored to celebrations that reflect your beliefs Pension - 5% employee contribution, doubling More ❯
be implementing IAM strategies, ensuring compliance with policies and managing access to resources effectively, this role significantly Key Responsibilities: Develop and implement a comprehensive IAM strategy aligned with the CyberSecurity Strategy. Design IAM architectures that support secure and efficient access controls across the business. Establish and enforce access governance policies and procedures. Conduct periodic access reviews and certifications to … In-depth knowledge of IAM principles, technologies, and best practices. Familiarity with IAM frameworks and standards. Strong analytical and problem-solving skills. Bachelor's or Master's degree in CyberSecurity, Information Technology or related field. (desired) Benefits: 25 days annual leave plus bank holidays which can be tailored to celebrations that reflect your beliefs Pension - 5% employee contribution, doubling More ❯
be implementing IAM strategies, ensuring compliance with policies and managing access to resources effectively, this role significantly Key Responsibilities: Develop and implement a comprehensive IAM strategy aligned with the CyberSecurity Strategy. Design IAM architectures that support secure and efficient access controls across the business. Establish and enforce access governance policies and procedures. Conduct periodic access reviews and certifications to … In-depth knowledge of IAM principles, technologies, and best practices. Familiarity with IAM frameworks and standards. Strong analytical and problem-solving skills. Bachelor's or Master's degree in CyberSecurity, Information Technology or related field. (desired) Benefits: 25 days annual leave plus bank holidays which can be tailored to celebrations that reflect your beliefs Pension - 5% employee contribution, doubling More ❯
solution architecture roadmaps across cloud and on-prem environments Lead the integration of enterprise applications, AI tools, and OT systems in a secure, scalable way Work closely with digital, cybersecurity, platform, and business teams to translate strategic goals into practical technical designs Champion security-by-design and compliance with frameworks like NIS2 and ISO27001 Guide architectural decisions across Azure, Power … scale digital transformation environments Deep understanding of Azure, enterprise networking, cloud-native development, and OT integration Expertise in Microsoft 365, API management, and AI-enabled tools Strong knowledge of cybersecurity, compliance, and regulated environments Leadership experience in guiding architectural teams and delivering strategic technical change Excellent communication and stakeholder engagement skills Preferred: experience in utilities, water, or energy sectors; familiarity More ❯
solution architecture roadmaps across cloud and on-prem environments Lead the integration of enterprise applications, AI tools, and OT systems in a secure, scalable way Work closely with digital, cybersecurity, platform, and business teams to translate strategic goals into practical technical designs Champion security-by-design and compliance with frameworks like NIS2 and ISO27001 Guide architectural decisions across Azure, Power … scale digital transformation environments Deep understanding of Azure, enterprise networking, cloud-native development, and OT integration Expertise in Microsoft 365, API management, and AI-enabled tools Strong knowledge of cybersecurity, compliance, and regulated environments Leadership experience in guiding architectural teams and delivering strategic technical change Excellent communication and stakeholder engagement skills Preferred: experience in utilities, water, or energy sectors; familiarity More ❯
Swansea, Morriston, West Glamorgan, United Kingdom Hybrid / WFH Options
Moxie People
Intune, phones and networks. Troubleshoot issues in partnership with our MSP to minimise downtime. Support colleagues with day-to-day tech challenges and onboard new systems smoothly. Lead on cyber-security protocols, backup regimes and disaster recovery planning. Manage secure access to email, files, and cloud services. Monitor MSP performance to ensure alignment with agreed standards. Provide hands-on training More ❯
Newport, Gwent, United Kingdom Hybrid / WFH Options
Reed Technology
technologies, hardware, and software solutions to support the organisation's strategic objectives. Conduct network performance analysis, identifying areas for optimisation and implementing improvements to enhance overall efficiency. Collaborate with cybersecurity teams to integrate network security measures, ensuring the protection of data and systems from cyber threats. Provide technical guidance and support to IT teams, troubleshooting complex network issues and ensuring More ❯
Rogerstone, Gwent, United Kingdom Hybrid / WFH Options
Reed Technology
technologies, hardware, and software solutions to support the organisation's strategic objectives. Conduct network performance analysis, identifying areas for optimisation and implementing improvements to enhance overall efficiency. Collaborate with cybersecurity teams to integrate network security measures, ensuring the protection of data and systems from cyber threats. Provide technical guidance and support to IT teams, troubleshooting complex network issues and ensuring More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
IMT Resourcing Solutions
business scales, they’re investing in people who can shape solutions, support consultative sales, and grow with the team. Join an established MSP delivering technical solutions across cloud, infrastructure, cybersecurity, and digital transformation. With a strong pipeline and demand from new and existing clients, they’re building out pre-sales capability to support continued growth. Why join? Brand new role … IT consultancy Strong technical understanding across: Microsoft 365, Teams, SharePoint, Intune Azure IaaS/PaaS, Azure Virtual Desktop, hybrid cloud Virtualisation – VMware, Hyper-V Networking – Cisco, Meraki, Fortinet, WatchGuard Cybersecurity – EDR/XDR, firewalling, MFA, secure email gateways Backup & DR – Veeam, Datto, cloud-to-cloud Excellent communication skills – able to distil technical concepts into business impact Comfortable supporting sales, producing More ❯