designs Provide a point of contact for all security issues as needed escalating from security operations QUALIFICATIONS & EXPERIENCE: Experience: 5+ years' of cybersecurity experience In-depth knowledge of firewalls, intrusion detection/prevention systems, endpoint security software, cloud security tools, vulnerability & threat management tools, SIEM, encryption … software engineering), preferably as an engineer. Excellent written and verbal skills are necessary. Ability to articulate complex concepts clearly and concisely. Practical expertise in cybersecurity, including experience in Cloud Security, Application Security (DevSecOps), network security, endpoint security, threat modeling, SIEM, IAM, and various security controls. … Understanding of industrial control systems and differences between IT and OT security techniques. Cybersecurity, and/or technical certifications such as CISM, CISSP, or similar. Understanding of zero trust architecture and defense-in-depth principles. Knowledge of common InfoSec management frameworks, such as ISO 27001, COBIT, NIST, or PCI more »
designs Provide a point of contact for all security issues as needed escalating from security operations QUALIFICATIONS & EXPERIENCE: Experience: 5+ years' of cybersecurity experience In-depth knowledge of firewalls, intrusion detection/prevention systems, endpoint security software, cloud security tools, vulnerability & threat management tools, SIEM, encryption … software engineering), preferably as an engineer. Excellent written and verbal skills are necessary. Ability to articulate complex concepts clearly and concisely. Practical expertise in cybersecurity, including experience in Cloud Security, Application Security (DevSecOps), network security, endpoint security, threat modeling, SIEM, IAM, and various security controls. … Understanding of industrial control systems and differences between IT and OT security techniques. Cybersecurity, and/or technical certifications such as CISM, CISSP, or similar. Understanding of zero trust architecture and defense-in-depth principles. Knowledge of common InfoSec management frameworks, such as ISO 27001, COBIT, NIST, or PCI more »
designs Provide a point of contact for all security issues as needed escalating from security operations QUALIFICATIONS & EXPERIENCE: Experience: 5+ years' of cybersecurity experience In-depth knowledge of firewalls, intrusion detection/prevention systems, endpoint security software, cloud security tools, vulnerability & threat management tools, SIEM, encryption … software engineering), preferably as an engineer. Excellent written and verbal skills are necessary. Ability to articulate complex concepts clearly and concisely. Practical expertise in cybersecurity, including experience in Cloud Security, Application Security (DevSecOps), network security, endpoint security, threat modeling, SIEM, IAM, and various security controls. … Understanding of industrial control systems and differences between IT and OT security techniques. Cybersecurity, and/or technical certifications such as CISM, CISSP, or similar. Understanding of zero trust architecture and defense-in-depth principles. Knowledge of common InfoSec management frameworks, such as ISO 27001, COBIT, NIST, or PCI more »
designs Provide a point of contact for all security issues as needed escalating from security operations QUALIFICATIONS & EXPERIENCE: Experience: 5+ years' of cybersecurity experience In-depth knowledge of firewalls, intrusion detection/prevention systems, endpoint security software, cloud security tools, vulnerability & threat management tools, SIEM, encryption … software engineering), preferably as an engineer. Excellent written and verbal skills are necessary. Ability to articulate complex concepts clearly and concisely. Practical expertise in cybersecurity, including experience in Cloud Security, Application Security (DevSecOps), network security, endpoint security, threat modeling, SIEM, IAM, and various security controls. … Understanding of industrial control systems and differences between IT and OT security techniques. Cybersecurity, and/or technical certifications such as CISM, CISSP, or similar. Understanding of zero trust architecture and defense-in-depth principles. Knowledge of common InfoSec management frameworks, such as ISO 27001, COBIT, NIST, or PCI more »
designs Provide a point of contact for all security issues as needed escalating from security operations QUALIFICATIONS & EXPERIENCE: Experience: 5+ years' of cybersecurity experience In-depth knowledge of firewalls, intrusion detection/prevention systems, endpoint security software, cloud security tools, vulnerability & threat management tools, SIEM, encryption … software engineering), preferably as an engineer. Excellent written and verbal skills are necessary. Ability to articulate complex concepts clearly and concisely. Practical expertise in cybersecurity, including experience in Cloud Security, Application Security (DevSecOps), network security, endpoint security, threat modeling, SIEM, IAM, and various security controls. … Understanding of industrial control systems and differences between IT and OT security techniques. Cybersecurity, and/or technical certifications such as CISM, CISSP, or similar. Understanding of zero trust architecture and defense-in-depth principles. Knowledge of common InfoSec management frameworks, such as ISO 27001, COBIT, NIST, or PCI more »
designs Provide a point of contact for all security issues as needed escalating from security operations QUALIFICATIONS & EXPERIENCE: Experience: 5+ years' of cybersecurity experience In-depth knowledge of firewalls, intrusion detection/prevention systems, endpoint security software, cloud security tools, vulnerability & threat management tools, SIEM, encryption … software engineering), preferably as an engineer. Excellent written and verbal skills are necessary. Ability to articulate complex concepts clearly and concisely. Practical expertise in cybersecurity, including experience in Cloud Security, Application Security (DevSecOps), network security, endpoint security, threat modeling, SIEM, IAM, and various security controls. … Understanding of industrial control systems and differences between IT and OT security techniques. Cybersecurity, and/or technical certifications such as CISM, CISSP, or similar. Understanding of zero trust architecture and defense-in-depth principles. Knowledge of common InfoSec management frameworks, such as ISO 27001, COBIT, NIST, or PCI more »
Peaple Talent have partnered with a professional services organisation based in the heart of Bristol who are recruiting for a Cybersecurity Lead will be responsible for providing leadership and expertise in CyberSecurity across their organisation. Along with defining the overarching security posture, the role will also … be responsible for defining the strategies, policies, and procedures commensurate with the agreed security risk appetite for the organisation. You will ensure that all applications and services are secured and implemented following industry best practices. Job Requirements develop and maintain the CyberSecurity, policies and procedures develop … and maintain an appropriate information assurance framework to support delivery of the strategy leadership and insights into security threats working alongside Technology staff to ensure appropriate remediation an appropriate level of cybersecurity culture and awareness across the whole organisation requests for information relating to cybermore »
We are currently seeking a CyberSecurity Engineer to join our client, a leading technology company. As a CyberSecurity Engineer focusing on Security Operations, you will play a vital role in protecting our client's systems and data from cyber threats. This is … from the CyberSecurity Manager and Security Architect. Provide knowledge transfer to Service Delivery teams and mentor other members of the cybersecurity team. Develop an in-depth understanding of threats in a mission-critical or national infrastructure environment. Engage with stakeholders to promote a mindset of developing … secure systems and act as a subject matter expert in cybersecurity. Experience in working with MOD e.g., CyDR, JSP 604, or NCSC Cybersecurity Assessment Framework, or HMG, or commercial defence and security environments would be an added benefit. Skills and Qualifications Significant experience working in a security operations more »
Security Operations Analyst Salary: £31,373 (National Framework) or £36,775 (London Framework - if you are London office based or homebased and live within the boundary of the M25) - There is also an additional homeworking allowance of £553 per annum for those working from home Hours: Full-time … of care regulation, so the people of England receive the highest quality of health and social care services. We're now looking for a Security Operations Analyst to join us on a full-time, permanent basis. The Benefits - 27 days' annual leave, rising with service to 32.5 days, plus … win a voucher or two! - Equipment for homeworking Why this could be a great role for you... This is the perfect opportunity for a cybersecurity professional with experience using Microsoft security technologies to take their next step with our national organisation. In this vital role, you more »
Information Services and Security have a vital role to play in a crucial national mission. We're here to enable the organisation to deliver through the use of technology. As AWE transforms itself to meet the needs of the UK's next-generation nuclear deterrent, we need to adapt … to deliver data-driven decision making, flexible and future-proofed IT services, adaptable cybersecurity, support to a multi-billion Pound building programme, and many more. The scale might be daunting to some, but you'll find it stimulating. We've got a long journey that we've … will look very different, and you can help make that happen. This is a role where you'll contribute to a legacy of national security for decades to come. So come and join us. We are recruiting for a CyberSecurity Analyst to conduct the monitoring of more »
CyberSecurity Engineer My client, a leading MSP based in Exeter, is currently looking for a CyberSecurity Engineer to join their team and hit the ground running - delivering a suite of technical, operational, and risk management services. Collaborating closely with regional teams, you'll ensure … compliance with industry standards, policies, and procedures, while actively mitigating evolving threats, thus driving forward a diverse array of security enhancement initiatives. Salary: Up to £35,000 DOE Location: Exeter Key responsibilities: Monitor for attacks, intrusions and unusual, Unauthorised or illegal activity Creating and executing strategies to secure and … protect networks and data resources Planning computer and network security upgrades and testing hardware and software related to the upgrade Use advanced analytic tools to determine emerging threat patterns and vulnerabilities i.e. SentinelOne Managing technical problems related to applications and production equipment Addressing intrusions using expertise in computer forensics more »
Due to growth our client is seeking an experienced CyberSecurity Engineer for their team in Reading. For this exciting role we are seeking an engineer who has gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. They are also … looking for experience working with cloud hosting providers, managing application testing and working with system owners/developers to improve application security. The Senior CyberSecurity Engineer role will be challenged with researching and implementing the latest technologies in the industry. This environment is highly technical and collaborative. … You will work closely with the Head of CyberSecurity, and join other Senior CyberSecurity Engineers, to implement effective security solutions and harden existing systems. As a Senior CyberSecurity Engineer, you will: Carry out daily security engineering/operation tasks more »
Due to growth our client is seeking an experienced CyberSecurity Engineer for their team in Reading. For this exciting role we are seeking an engineer who has gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. They are also … looking for experience working with cloud hosting providers, managing application testing and working with system owners/developers to improve application security. The Senior CyberSecurity Engineer role will be challenged with researching and implementing the latest technologies in the industry. This environment is highly technical and collaborative. … You will work closely with the Head of CyberSecurity, and join other Senior CyberSecurity Engineers, to implement effective security solutions and harden existing systems. As a Senior CyberSecurity Engineer, you will: Carry out daily security engineering/operation tasks more »
Our client is looking to bring on a CyberSecurity Incident Responder with NATO Secret Clearance, for a fully on-site 6-month contract based in Mons, Belgium. About the Role: As a CyberSecurity Incident Responder you will: Deliver CyberSecurity Incident Response … activities (TRIAGE, Contain, Eradicate, Recover). Lead or be a member of a CyberSecurity Incident Response Team, designated to provide CyberSecurity Incident Response. Manage the life cycle of the taxonomy. Improve and implement to the Incident Response activities. Realise procedures for the Incident Response … in this role you will need: A University Degree in IT. 4 years+ of experience in Incident Response. An understanding of the principles of Security, Networks, Vulnerabilities of Networks and Applications. Recent experience in Intrusion Detection and Incident Response, ideally with the use of MITRE ATTACK framework. Desirable: University more »
Bristol Area, South West, United Kingdom Hybrid / WFH Options
Defence
Will You Be Doing? Your role will be at the core of everything that our client does - from supporting their customers with high quality cybersecurity consultancy and cyber assurance. As part of the growth of their existing successful cybersecurity risk and compliance team … new and exciting roles are available for cybersecurity specialists. You will: Create and support risk assessments and security risk management processes. Develop information security management/governance systems. Communicate information security risks recommending appropriate risk treatment/mitigation to a variety of stakeholders. Provide … security-related design advice, guidance and recommendations to project teams and customers (following Secure by Design principles). Apply your knowledge and skills to projects achieving suitable security accreditation or compliance with security policies and standards. Work with the wider engineering specialists in delivering cyber assurance more »
Employment Type: Permanent, Part Time, Work From Home
CyberSecurity Engineer/SOC Engineer Remote working available - £60k UK - must be eligible to work in the UK A CyberSecurity/SOC Engineer is required for this hands-on technical role to onboard customers to the SIEM/SOAR. The ideal candidate will have … experience working for/in a Managed Service Provider/MSP/MSSP/MDR - now or recently. The CyberSecurity/SOC Engineer will be involved in setting up and configurating the systems, log parser creation, python scripting & debugging, Linux admin, Azure/GCP admin, supporting investigations …/analysis, SOAR and API-based integrations/connections. This is an opportunity to work alongside cyber SME’s and run with a strong level of security, innovation is key, therefore budget for high level security will NOT be compromised. Responsibilities of the CyberSecuritymore »
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Project People
LEAD CYBERSECURITY CONSULTANT - READING - CONTRACT- HYBRID Lead CyberSecurity Consultant Contract - 6 Months rolling- Inside IR35 Location: Reading - 2 days onsite/week must The role of CyberSecurity Consultant sits within the CyberSecurity team which is responsible for providing … a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Should have experience of using common information security management frameworks, such as NIST, PCI, GDPR, ISO Series, OWASP the IT Infrastructure Library (ITIL), the ISF Standards of Good Practice (SoGP) and ISACA … and implementing processes, procedures, and architecture/design/decision templates is vital. Must have at least 3-5 years of experience working in CyberSecurity within a technical field. Must have a mix of security consulting, architecture/design, and professional services experience. Must be able more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
We are currently recruiting for a Chief Information Security Officer (CISO) , reporting to the Chief Technology Officer, to be responsible for ensuring the security, privacy, and compliance of Tunstall's operations on a global scale. This role could work on a hybrid basis from any of our main … and a chance to build a rewarding career. Some of your key tasks will be... Develop, execute, deliver, and provide support on a comprehensive cybersecurity and information security strategy that aligns with business objectives, Lead, mentor, and oversee a small global team responsible for security operations, incident response … code reviews are conducted, Ensure compliance with all relevant laws and regulations related to security, including GDPR, if applicable, Stay informed about evolving cybersecurity regulations, standards, and best practices, Collaborate with legal and compliance teams to address security and privacy concerns, Identify, assess, and prioritise security risks more »
ensure a safe, secure and sustainable energy supply to British households and businesses. Join us in a pivotal role at the heart of our CyberSecurity Directorate. This is a fantastic opportunity to have a bold impact on Ofgem's CyberSecurity Policy. You'll drive … your team. We are seeking a candidate who will have significant experience of government or organisational policy development and regulation compliance. As a seasoned CyberSecurity Policy Expert, you'll have extensive experience working in CyberSecurity, with preferable experience relating to Critical National Infrastructure. Working … serve. Everyone is welcome - as an inclusive workplace, our employees are comfortable bringing their authentic selves to work. This role will be part of CyberSecurity Directorate at Ofgem which, acts as Joint Competent Authority (“CA”) for The Security of Network & Information Systems Regulations (“NIS”) and the more »
+ Bonus + Benefits Locke & McCloud are looking for an experienced Senior DevSecOps Engineer to join our client who’re currently building out their Security Engineering team within their established CyberSecurity function. In this role, you will be part of a growing team that will enable … you to lead the growth and development of various DevSecOps and Security Architecture projects, influence and implement change, with various opportunities to lead and grow a team. Main responsibilities: Collaborate with cross-functional teams to implement security practices throughout the SDLC, emphasising DevSecOps principles. Design, implement, and manage … mentorship to junior team members, fostering a culture of security awareness and continuous improvement. Stay abreast of emerging threats, technologies, and trends in cybersecurity, proactively adapting security strategies to mitigate risks. Act as a subject matter expert on security-related matters, collaborating with stakeholders to address securitymore »
risk assessment frameworks tailored for the OTSN. Provide specialised technical guidance for evaluating vulnerabilities and defining appropriate corrective measures. Contribute to the formulation of cybersecurity protocols and specifications for risk mitigation. Enhance the cybersecurity maturity of the organisation and ensure compliance with Network and Information Systems Regulations (NIS-R) for … OTSN. Collaborate with project teams and design units to understand cybersecurity requirements related to OTSN. Effectively communicate risks and vulnerabilities to stakeholders. Shape security and resilience strategies to expedite the reduction of cybersecurity risks. Refine long-term management strategies for OTSN to align with organisational objectives. Essential (Knowledge, skills … like IEC 62443, ISO27000, NIST CSF, and audit methodologies. Technical familiarity with LAN/WAN Networks and Operational Technology (OT). Knowledgeable about international cybersecurity standards, particularly IEC62443. Familiarity with O365, particularly Excel, and preferably Power BI. Relevant security risk certifications such as CRISC, FAIR. Bachelor's degree or more »
Senior GRC Consultant/GRC Lead Must have current/active SC or DV clearance British National needed due to security requirements 3-6 months Location: Hampshire with some travel to Scotland We’re working with our cybersecurity client who provide expertise and solutions to military … departments, you'll be instrumental in establishing and maintaining robust governance frameworks and processes. Your expertise and experience will shape strategies to effectively manage cybersecurity risks and ensure compliance with regulatory requirements and industry standards. You'll collaborate closely with cross-functional teams, proposing future organisational structures … that optimize cybersecurity governance and streamline operations. Key Responsibilities: Governance Framework Development: Design, implement, and enhance governance frameworks tailored to our clients' needs, incorporating industry best practices and regulatory guidelines. Policy and Procedure Management: Develop and maintain clear, consistent policies, procedures, and guidelines for cybersecuritymore »
LEAD CYBERSECURITY CONSULTANT – READING – CONTRACT- HYBRID Lead CyberSecurity Consultant Contract – 6 Months - Inside IR35 Location: Reading – 2 days onsite/week must The role of CyberSecurity Consultant sits within the CyberSecurity team which is responsible for providing subject … building customer trust in a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Experience with information security management frameworks (NIST, PCI, GDPR, ISO, OWASP, ITIL, ISF SoGP, COBIT) is essential. The role will involve supporting project managers in risk and issue … Experience in documenting and implementing processes, procedures, and architecture/design/decision templates is vital. Expertise and experience in technical domains ie hybrid security, infrastructure and data centre security, network security, application security, identity and access management, and vulnerability management are important. Experience of influencing more »
CyberSecurity Technical Lead - £50,000-£60,000 + BONUS + Benefits -London (Hybrid) Fryer Miles have partnered with a dynamic financial services company who are looking to add a hands on & technical cybersecurity lead to bolster their growing cyber function. This role is … perfect for someone who would like to take the pathway to security leadership however is still keen to keep the hands on and technical aspect of their work. Key Responsibilities: Lead and manage the cybersecurity team, providing guidance and direction in all aspects of security operations. Develop and implement robust security strategies and policies to protect company assets and data. Configure and maintain SIEM tools to monitor and analyze security events across the organization. Collaborate with DEVOPS teams to ensure security best practices are integrated into the development and deployment processes. more »
Employment Type: Permanent
Salary: £50000 - £60000/annum Bonus + Health insurance
Cyber Risk Manager – London hybrid - £60,000 - £80,000 + Benefits Locke & McCloud are looking for a Cyber Risk Manager to join our client as they go through a super exciting growth project across their established CyberSecurity function! As a Cyber Risk Manager, you … will play a key role in assessing, mitigating, and managing cyber risks across our client and their vendors/3rd party suppliers. Our client is looking for candidates who hold strong skills in vulnerability management, vendor relationship management, incident response, and possess a deep understanding of cyber risk. … vulnerability management efforts, including identifying, assessing, prioritising, and remediation of vulnerabilities. Establish and maintain strong vendor relationships to ensure third-party vendors comply with cybersecurity requirements and standards. Oversee incident response activities, including incident detection, analysis, containment, eradication, and recovery. Conduct risk assessments to identify potential cyber threats and more »