Birmingham, West Midlands, England, United Kingdom
TXP
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid/Remote Options
TXP
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
performance, scalability, resiliency, and upgradeability across environments. Champion DevOps practices (branching strategies, CI/CD pipelines, ATF automation) and oversee release quality. Security, Risk, and Compliance Implement robust access controls (ACLs, roles), data protection, auditability, and compliance with enterprise policies (e.g., ITIL/ISO/SoX/GDPR as applicable). Stakeholder Engagement Translate business objectives into target … set technical direction within cross-functional teams. Proficiency with integration patterns (event-driven, batch, near-real-time), MID Server, scripted APIs, and platform security. Excellent communication, leadership, and stakeholder management skills; able to work independently in a distributed, remote environment. Preferred Qualifications ServiceNow certifications: CSA , CAD , and one or more CIS (e.g., CIS ITSM , CIS ITOM , CIS CSM … latest ServiceNow family releases. Hands-on with CI/CD (GitHub/GitLab/Azure DevOps), ATF , automated quality gates, and environment strategy. Familiarity with identityandaccessmanagement (SSO/SAML/OIDC, SCIM), and enterprise integration tooling (e.g., MuleSoft , Kafka/Event Bus). ITIL v4 certification or equivalent practical experience. Self More ❯
Birmingham, West Midlands, United Kingdom Hybrid/Remote Options
Context
and hands-on, maintaining and enhancing existing tools and controls, monitoring vulnerabilities and ensuring systems are patched and secure. Responsibilities: * Managing and optimising security tools and platforms (SIEM, XDR, IDAM policies etc.) * Monitoring vulnerabilities, investigating incidents and implementing corrective actions * Supporting patching compliance and vulnerability remediation * Ensuring security best practices are applied across networks, applications and systems * Participating in change … Cyber Essentials Plus and CAF Requirements: * A solid background in IT infrastructure and/or network engineering * Some exposure to, or a growing focus on, cybersecurity and vulnerability management * Understanding of network devices, configurations and security principles * Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) * Confidence to identify issues, suggest More ❯
and hands-on, maintaining and enhancing existing tools and controls, monitoring vulnerabilities and ensuring systems are patched and secure. Responsibilities: Managing and optimising security tools and platforms (SIEM, XDR, IDAM policies etc.) Monitoring vulnerabilities, investigating incidents and implementing corrective actions Supporting patching compliance and vulnerability remediation Ensuring security best practices are applied across networks, applications and systems Participating in change … ISO27001, Cyber Essentials+ and CAF Requirements: A solid background in IT infrastructure and/or network engineering Some exposure to, or a growing focus on, cybersecurity and vulnerability management Understanding of network devices, configurations and security principles Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) Confidence to identify issues, suggest More ❯