Sunderland, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Reed Technology
a community focus with a commitment to supporting people in their professional and personal progression. The role: You will collaborate with a group of security-focused professionals, each contributing unique skills. As part of the broader Information Security Team, which includes operational and offensive security teams as … you'll play a crucial role. Your primary responsibilities will involve: Establish an effective technical compliance framework. Ensure that the business maintains a robust securityposture while remaining agile and competitive. Work closely with compliance experts, technology teams, and the wider business to manage and mitigate security and technology risks. Maintaining and enhancing the Information Security Management System (ISMS), policies, standards, and processes Lead in audits, partnering with external test houses and Group compliance teams. Ensure that all platforms meet all technical compliance requirements set by local and international regulators. Key skills required for this more »
OT Security Consultant Hybrid roles - offices across the UK £55,000-90,000 Are you: An experienced Operational Technology professional, with a background in an industry such as Utilities, Aerospace, Renewable Energy, Automotive, Manufacturing, Engineering, etc.? Able to demonstrate your experience in the Cyber Security of such Operational … Technology? Familiar with ISA/IEC 62443, both from an audit and implementation perspective? Knowledgeable of other Security Standard frameworks, such as NIST, CAF, ISO 27001, etc.? Able to show your experience or ability to work well with internal stakeholders and/or external customers? If the above looks … to speak with you about a number of opportunities I am currently working on! I am currently working with an organisation that provides OT Security consultancy to it's clients across the sectors I've mentioned above. They are seeing more and more demand from their customer base to more »
We are looking for an experienced SSPM Consultant to support the strategic design, implementation, and continuous enhancement of Security Monitoring Project initiatives. This role is ideal for security professionals aiming to make a significant impact within the financial sector. Key Responsibilities Design, build, and protect enterprise systems, applications … and personnel. Safeguard information, infrastructures, applications, and business operations against cyber threats. Develop telemetry solutions for observing malicious traffic. Investigate strategic XDR solutions. Enhance securityposture management for 3rd Party SaaS configurations. Collaborate with global teams for consistent processes and solutions. Lead technical and strategic discussions on SSPM … services. Proficiency in SSPM or CSPM policies and configurations. Knowledge of API integration for SaaS 3rd Party applications. Familiarity with Salesforce, ServiceNow, and O365 security aspects. Experience with SSPM tools like Microsoft Defender for Cloud or AppOmni. Understanding of industry security frameworks like NIST and CIS. Experience with more »
Freelance Third Party IT Security Manager contractor needed Belgium based or UK based. long term contract Rate per day ASAP start Key responsibilities: Third-Party Assurance Lifecycle & Support the transformation of the activity Execute Third Party Due Diligence, risk profiling, onboarding, re-certification; Make an opinion on Third Party … SecurityPosture ; Define Remediation where applicable Support Contract Management - ensure that the security expectations included in the contract are proportionate to the risk profiling Contribute to the DORA regulation implementation – translate DORA requirements into actionable processes & materials (contract, assessment templates, …) to be used by the team. Core … Skills Previous experience in Third Party Security Management (i.e. Due Diligence, etc.) Knowledge of control frameworks, e.g., ISO 27000, NIST, CIS-20, COBIT-5 Knowledge of relevant regulations, i.e. DORA, Outsourcing, ESMA, etc. Previous experience in supporting or delivering of large scare regulatory change initiative Experience with contract review more »
a vibrant, inclusive, and innovative place with great ambition working together within the community. This role will help with ensuring compliance with industry-standard security practices and regulations, while continuously evaluating and enhancing the organisation's security posture. Playing a pivotal role in minimising risks & protecting assets. You … offer a great benefits package and development opportunities. Responsibilities of the role: Collaborating with senior management to develop and refine the organisation's information security strategy, aligning it with business objectives and regulatory requirements. Developing, implementing, and maintaining information & data security policies, standards, guidelines, and procedures to ensure … and industry standards such as Cyber Essentials+, ISO 27001 & NIST guidelines. Managing the relationship(s) with 3rd party suppliers responsible for implementing and managing security monitoring tools and technologies, ensuring we detect and respond to security threats in a timely manner. Develop and deliver a security awareness more »
Somerset, England, United Kingdom Hybrid / WFH Options
Yolk Recruitment Ltd
Cyber Security Engineer - £60 - 70 per hour - ir35 TBD – 6 months (extensions highly likely) – Somerset – hybrid working – SC cleared - Sector: Energy Yolk recruitment a recruiting for a Cyber Security Engineer to work with a world class engineering client in the energy sector. This is an exciting opportunity that … involves delivering cutting-edge OT cyber security solutions across sectors like industrial automation and control systems (IACS). Due to the security nature of the project, the candidate must hold a live SC security clearance. Responsibilities: Cyber Security Management Systems (CSMS) aligned with ISA … standard. compliance with regulatory standards such as NIS Regulations and industry guidelines. security assessments and gap analysis to enhance clients' security posture. and implement OT Security Policies, Procedures, and Guidelines. risk assessments and support clients in creating OT Security Charters and Target Operating Models. as the more »
Somerset, Bridgwater, United Kingdom Hybrid / WFH Options
yolk recruitment
Cyber Security Engineer - £60 - 70 per hour - ir35 TBD - 6 months (extensions highly likely) - Somerset - hybrid working - SC cleared - Sector: Energy Yolk recruitment a recruiting for a Cyber Security Engineer to work with a world class engineering client in the energy sector. This is an exciting opportunity that … involves delivering cutting-edge OT cyber security solutions across sectors like industrial automation and control systems (IACS). Due to the security nature of the project, the candidate must hold a live SC security clearance. Responsibilities: Oversee Cyber Security Management Systems (CSMS) aligned with ISA (phone … number removed)-1 standard. Ensure compliance with regulatory standards such as NIS Regulations and industry guidelines. Perform security assessments and gap analysis to enhance clients' security posture. Develop and implement OT Security Policies, Procedures, and Guidelines. Facilitate risk assessments and support clients in creating OT Securitymore »
create and run optimized Cloud Native solutions on AWS and Azure. This person will work to balance developer velocity and the overall stability and security of FactSet services running in the cloud. The leader will directly contribute to the growth of the business by partnering Cloud Architects with Strategic … engineering teams.Increase velocity of cloud migration and digital transformation by helping engineering teams adopt DevOps, Infrastructure as Code, and automated release processes.Work with FactSet security organization to ensure a strong securityposture of services and data in the cloud.Identify and implement cost optimization strategies for cloud services.Minimum more »
We’re looking for an experienced Cyber Essentials Sales Consultant to join our growing Cybersecurity Company. CyberLab is a fast-growing cyber security consultancy business delivering Cyber Security as a Service (CSaaS) to our clients, as well as offering a range of consultancy services such as compliance and … work, a great place to be a customer” The Role: Our CSaaS portal delivers an innovative web app for organisations to manage their cyber securityposture and understand their cyber risks giving them a competitive advantage. You will have the opportunity to sell a truly unique technology within … as part of a small team, you will have current experience in sales, in either a direct or channel capacity. Additionally, experience of cyber security would prove useful, but is by no means a prerequisite. This is a great opportunity for someone wanting to further their sales career in more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
We are hiring for Lead Security Analyst for London, UK location with remote working flexibility. Job Title: Lead Security Analyst Job Type: Permanent Location: London, UK(Remote) Job details: Purpose of the Job Leading the Response: Acting swiftly and decisively during security incidents to mitigate risks. Incident … post-incident to understand the root cause and to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against … them. Strategic Defense Implementation: Putting in place robust security measures to protect the organization's information assets. Cross-Team Coordination: Collaborating with various teams and entities to ensure a unified security strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the more »
remote working Location: United Kingdom (London – London) Type: PermanentCyber Risk Senior Consultant Up to 65,000UK Wide - Remote-First A dynamic and innovative cyber security consultancy is seeking a Senior Consultant specializing in cyber risk. This small, young consultancy thrives on challenges and values diverse perspectives. Known for their … Their projects are diverse, encompassing risk identification, frequency analysis of risk events, and quantification of operational impacts. Services also include Cyber Scorecards, in-depth securityposture assessments, and cyber exercises (war games) for leadership teams.Key ResponsibilitiesAssess security postures and conduct quantified cyber risk assessments at the intersection … of cyber security and business operations.Collaborate with clients using internally developed and open-source tools.Lead engagements with senior business leaders, IT, security teams, and board members.Identify and prioritize protection needs, understand risk consequences, and develop recommendations.Problem-solve by breaking down challenges, documenting assumptions, and delegating tasks as needed.Communicate more »
Umbrella Company for this role. Key Requirements: - As an experienced SSPM Consultant, you will assist in the strategic design, implementation, and ongoing optimisation of Security Monitoring Project initiatives. - Apply security skills to design, build and protect enterprise systems, applications, data, assets and people. - Provide services to safeguard information … business against Cyber Threats. - Develop telemetry solution to give full observability of malicious traffic. - Investigate strategic XDR solution. - Secure 3rd Party SaaS configuration - Uplift securityposture management controls to reflect greater business dependency and increased targeting of third and fourth-party providers to FIS. - Work with global teams more »
role is Inside of IR35 Job Description: "As an experienced SSPM Consultant, you will assist in the strategic design, implementation, and ongoing optimisation of Security Monitoring Project initiatives Primary Responsibilities Apply security skills to design, build and protect enterprise systems, applications, data, assets and people. Provide services to … business against Cyber Threats Develop telemetry solution to give full observability of malicious traffic. Investigate strategic XDR solution. Secure 3rd Party SaaS configuration - Uplift securityposture management controls to reflect greater business dependency and increased targeting of third and fourth-party providers to FIS Work with global teams more »
or Data platforms) to join our dynamic team. As a Software Engineer you will play a critical role in designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threat detection, incident response, and overall … security posture. What you’ll be doing • Data Ingestion and Enrichment: o Configure Elasticsearch pipelines for data ingestion from various sources, primarily from Kafka o Enhance data enrichment by integrating threat intelligence feeds and contextual information. • SIEM Solution Development: o Collaborate with security analysts and architects to design … o Optimize SIEM rules, alerts, and dashboards for efficient threat detection. • Query Optimization and Performance Tuning: o Write efficient Elasticsearch queries to retrieve relevant security events. o Monitor and manage the performance of the SIEM infrastructure. • Security Engineering: o Contribute to security engineering projects, transitions, and transformations. more »
Network Security Analyst Up to £70,000 As the Network Security Analyst, you'll be at the forefront of resolving technical issues with telecom suppliers, placing a strong emphasis on security and compliance. Your expertise will be pivotal in providing recommendations on security, risk, and compliance … matters, collaborating seamlessly with cross-functional teams to confirm audit results and propose crucial security improvements. You'll serve as a translator of complex technical issues, ensuring clear communication with non-technical staff. Working closely with security teams, you'll contextualise supplier security within the overarching framework. … Constantly on the lookout for opportunities to enhance processes and technology, you'll contribute to the continuous improvement of our security posture. Requirements for this confidential position include a recognised security qualification (e.g., CISSP), lead auditor/assessor qualification (e.g., ISO27001), and a relevant degree or equivalent. Bring more »
. We invite you to join our client’s dynamic team as a Red Team Lead for a leading and fast-growing UK cyber security consulting firm. Our client isn't just about providing cybersecurity solutions and services; they're dedicated to fostering your professional advancement and development. They … growth journey and funding certifications to help you excel. The Principal Red Team Operator will be at the forefront of the client’s offensive security operations, it will be your role to uncover weaknesses in client’s securityposture and provide actionable insights to enhance their resilience … engagements, including attack simulation. Identify vulnerabilities in networks, applications, and systems through advanced penetration testing techniques. Collaborate closely with clients to understand their unique security challenges and develop tailored strategies for mitigating risks. Provide detailed reports and recommendations, guiding clients towards effective security solutions and best practices. Requirements more »
Risk Develop and maintain the technical compliance framework and documentation for the company’s platform, keeping this updated as changes are made to their security approach. Implement and monitor technical controls and measures to ensure compliance with internal and external policies, regulations, and requirements, and address any gaps or … issues. Create and suggest useful measurements to aid in improving Information security processes and procedures. Compliance Management: Collaborate with external consultants to plan and deliver industry-standard security accreditations such as ISO 27001& 9001, Cyber Essentials Plus, SOC2, IRAP and ensure these are renewed successfully on an annual … basis. Collaborate with internal and external technical security teams to schedule security testing, review output from security testing, and schedule remediation of any detected vulnerabilities. Liaise with external vendors to manage security and regulatory requirements. Sales & Customer Success Collaboration: Create and catalogue the responses made in more »
problems into technical design and mediate between stakeholders at all levels. Bridging the gap between the technical and non-technical. • Designing defence-in-depth security controls throughout solutions, and working with RSO’s Security Group and NCSC to make sure that the Buyer’s IT service accreditation is … includes but is not limited to solution technology costs, ongoing licencing, technical resource requirements, and total cost of ownership. • Taking account of the enhanced securityposture and significant threats to the Buyer’s IT service and ensuring that designs justify this. Understanding the implications of design choices in … stations and USB hubs • working knowledge and practical delivery experience of using Mobile Device Management (MDM)/Unified Endpoint Management (UEM) platforms • Experience undertaking security assessments of physical hardware, with an understanding of sophisticated threats at the hardware, firmware and OS levels. more »
in the field of secure collaboration solutions, is seeking a talented Software Engineer to join their team. They build scalable, secure solutions for highly security-conscious organizations, enabling them to collaborate on their most sensitive information. The successful candidate must be a British national and be eligible for security … JavaScript, TypeScript, React, Java, Spring Frameworks Experience with cloud technologies such as AWS, Docker, and Kubernetes Understanding of the impact of engineering decisions on securityposture Ability to adapt quickly to new technologies and tools Excellent problem-solving and communication skills Experience working in a distributed team environment … Must be a British national and eligible for security clearance Nice to Have: Experience with Python, Langchain, GitLab CI, or Pulumi Familiarity with databases such as Postgres, MongoDB, Redis, Neo4j, or Elastic Benefits: Competitive salary, up to £70,000 (depending on experience) Flexible working hours and remote work options more »
The apprentice will be tasked with sending regular reports using tools like our Security Awareness Training platform, Vulnerability Management tool and conducting various scans to assess security posture. Role A IT and Security Apprentice is an integral part of the security team, responsible for a variety … tasks that ensure the protection and integrity of data and systems. The apprentice will be tasked with sending regular reports using tools like our Security Awareness Training platform, Vulnerability Management tool and conducting various scans to assess security posture. They will also be responsible for the setup and … configuration of security solutions, ensuring that these tools are effectively integrated into the company's security framework. Additionally, the apprentice will be providing administrative support to the financial operations related to cyber security services. They will assist in the automation and maintenance of various tools streamlining processes more »
Senior AWS Platform Engineer - Appvia - Security Clearance eligibility required. Location: London, UK About Us At Appvia, we're committed to helping our customers navigate their journey to Cloud and DevOps maturity. As a leading provider in the industry, we offer cutting-edge technologies and services to support our clients … to architect their applications to be cloud native, or helping them transform existing applications to cloud native where possible. Implementing monitoring and alerting Improving securityposture of applications being migrated Creating secure deployment patterns and templates/modules for application development teams to reuse. Gathering requirements for building … desirable, e.g.: AWS Certified: Solutions Architect Associate AWS Certified: Solutions Architect Professional Certification in Kubernetes administration is desirable: Certified Kubernetes Administrator (CKA) Certified Kubernetes Security Specialist (CKSS) Benefits Why join Appvia? We are a self-funded, London based startup; providing businesses with a fast and secure way to deploy more »
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
running globally distributed systems.You will use your deep knowledge and experience of DevSecOps tooling and services to understand, monitor and mitigate challenges concerning the securityposture of our cloud infrastructure.You will have the ability to explain technical concepts to non-technical stakeholders.You will have experiences of working with more »
our cloud infrastructure and CI/CD pipelines. Your expertise in Terraform, CircleCI, AWS, and DDoS prevention will be instrumental in ensuring the scalability, security, and efficiency of our systems. Responsibilities : Infrastructure as Code: Design, build, and manage infrastructure using Terraform to enable automated and scalable provisioning of cloud … Implement and enhance the CI/CD pipeline with CircleCI, ensuring smooth and reliable software delivery from development to production environments. DDoS Prevention and Security: Develop and maintain strategies to protect our systems from DDoS attacks and ensure the overall securityposture of our infrastructure. Performance Optimisation … applications. AWS and Cloud: In-depth knowledge of AWS services and cloud infrastructure management. DDoS Prevention: Demonstrated experience in implementing DDoS prevention measures and security best practices. Scripting Skills: Proficiency in scripting languages (e.g., Python, Bash) for automation and system management. Monitoring and Logging: Familiarity with monitoring and logging more »
Sheffield, England, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
their entire IT Infrastructure You will collaborate closely with cross-functional teams to ensure compliance with regulatory standards, mitigate risks, and enhance the overall securityposture of the organization. Key Responsibilities: Develop, review, and update IT policies, standards, and guidelines in alignment with industry best practices and regulatory … identify potential gaps or vulnerabilities, and recommend strategies for improvement. Provide expert guidance and consultation to internal stakeholders on IT policy-related matters, including security protocols, data privacy, and compliance requirements. Collaborate with IT teams to integrate policy requirements into system designs and configurations. Conduct regular audits and assessments … to evaluate adherence to IT policies and identify areas for enhancement. Stay abreast of emerging trends, threats, and technologies in the IT security landscape and incorporate relevant insights into policy development. Qualifications: Proven experience (5+ years) as a Technical Consultant or similar role, with a focus on IT policy more »
Our client is a premier cybersecurity firm specializing in advanced penetration testing and vulnerability assessments. They help organizations identify and mitigate security risks, ensuring their systems are robust and secure. Position Summary: As a Penetration Tester, you will conduct advanced penetration tests, assess system vulnerabilities, and provide detailed reports … and remediation recommendations. You will work with a team of security experts to enhance our clients' security posture. Key Responsibilities: Perform comprehensive penetration tests on client systems, networks, and applications. Identify, analyze, and document security vulnerabilities and exploits. Develop and execute test plans, methodologies, and tools for … assessing security. Provide detailed reports with findings, risk assessments, and remediation recommendations. Collaborate with clients to understand their security needs and provide expert guidance. Assist in the development of security policies, procedures, and best practices. Conduct follow-up tests to ensure vulnerabilities have been effectively remediated. Stay current more »