Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Certifications such as CISSP, CISM, OSCP, GIAC (preferred but not mandatory). Must be eligible for SC security clearance. Experience More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Experis
/Wiltshire office, circa 2 days pw) Salary: 45,000 - 75,000 + Benefits Are you an experienced Security Consultant looking for your next challenge? We are seeking passionate cybersecurity professionals with strong expertise in governance, risk and compliance (GRC), who can deliver complex projects and build trusted client relationships. As a Security Consultant , you will work on a More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
Us Different: Purpose: you can use your passion and abilities at Leidos to keep the people you care about safe. We are at the forefront of machine learning, AI, cybersecurity and solutions. Using your skills in the technology frontline by helping to build a safer world. You can inspire change. Collaboration: having flexibility to do your job is one More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Lloyds Bank plc
modern technologies including some of the below: Cloud platforms (GCP, AWS, Azure) and hybrid hosting architectures APIs, microservices, and modular applications Data strategies (data lifecycle, ETL, data modelling, governance) Cybersecurity Technology sustainability Payments, digital transformation, retail banking Collaboration & Communication Strong communication and storytelling skills Ability to build trusted relationships across engineering, product, and business teams Continuous Improvement Commitment to continuous More ❯
including specifying technical security controls experience designing secure architectures for central enabling services/platforms (such as corporate identity and privileged access management approaches) strong working knowledge of current cybersecurity risks and experience implementing security solutions for infrastructure, network and application security good working knowledge of identity and access management (multi-factor authentication, single sign-on, identity management), end More ❯
with Apple Mac, iOS, mobile device support, Microsoft 365, cloud-based admin portals, Mobile Device Management tools such as Jamf or Intune, software packaging and deployment, networking basics, and CyberSecurity principles. Candidates will be required to have a full uk driver's licence If you are interested in this position please apply online or for more information please contact More ❯
with Apple Mac, iOS, mobile device support, Microsoft 365, cloud-based admin portals, Mobile Device Management tools such as Jamf or Intune, software packaging and deployment, networking basics, and CyberSecurity principles. Candidates will be required to have a full uk driver's licence If you are interested in this position please apply online or for more information please contact More ❯
with Apple Mac, iOS, mobile device support, Microsoft 365, cloud-based admin portals, Mobile Device Management tools such as Jamf or Intune, software packaging and deployment, networking basics, and CyberSecurity principles. Candidates will be required to have a full uk driver's licence If you are interested in this position please apply online or for more information please contact More ❯
audit tools, risk assessment methodologies, and security technologies. Broad ranging analyst skills acquired while working on diverse IT and/or business projects. Proven experience in performing IT/Cybersecurity control assessment reviews. Experience working with Information security frameworks and compliance standards (e.g. ISO27001, Cyber Essentials Plus, NIST, SOC2 and PCI-DSS). Strong interest in Information security and More ❯
Azure and Cloud technologies The role at present is split as follow: Design 30% Implementation 45% Support 25% Duties: - Ensure that solutions align with best practices, internal standards and cybersecurity requirements - Ownership of the implementation, configuration, development, security and operational support of the Azure Cloud platform - Provide technical expertise and hands-on support for deploying and managing Cloud Services, Microsoft More ❯
Azure and Cloud technologies The role at present is split as follow: Design 30% Implementation 45% Support 25% Duties: - Ensure that solutions align with best practices, internal standards and cybersecurity requirements - Ownership of the implementation, configuration, development, security and operational support of the Azure Cloud platform - Provide technical expertise and hands-on support for deploying and managing Cloud Services, Microsoft More ❯
Azure and Cloud technologies The role at present is split as follow: Design 30% Implementation 45% Support 25% Duties: - Ensure that solutions align with best practices, internal standards and cybersecurity requirements - Ownership of the implementation, configuration, development, security and operational support of the Azure Cloud platform - Provide technical expertise and hands-on support for deploying and managing Cloud Services, Microsoft More ❯
Azure and Cloud technologies The role at present is split as follow: Design 30% Implementation 45% Support 25% Duties: - Ensure that solutions align with best practices, internal standards and cybersecurity requirements - Ownership of the implementation, configuration, development, security and operational support of the Azure Cloud platform - Provide technical expertise and hands-on support for deploying and managing Cloud Services, Microsoft More ❯
Azure and Cloud technologies The role at present is split as follow: Design 30% Implementation 45% Support 25% Duties: - Ensure that solutions align with best practices, internal standards and cybersecurity requirements - Ownership of the implementation, configuration, development, security and operational support of the Azure Cloud platform - Provide technical expertise and hands-on support for deploying and managing Cloud Services, Microsoft More ❯
small to medium end users with specific (but not limited to) focus on Site standardisation and specification Promotion of the benefits of digitalisation Risk mitigation via Obsolescence Migration Networking, CyberSecurity, Data Analytics Promotion of Robotic/Cobot/Vision solutions Infrastructure and security upgrades Operating software solutions – Data collection, historians and Analytical Rockwell services (IBE, Training, ISA, Repairs) Routeco More ❯
walk the plant floor, proactively checking IT systems and addressing any issues. What We're Looking For Strong IT experience, ideally within a manufacturing or operational environment. Knowledge of cybersecurity best practices, especially in industrial settings. Experience with software and database backups, installations, and system patching. Understanding of networking infrastructure and Microsoft operating systems (legacy systems a plus). More ❯
walk the plant floor, proactively checking IT systems and addressing any issues. What We're Looking For Strong IT experience, ideally within a manufacturing or operational environment. Knowledge of cybersecurity best practices, especially in industrial settings. Experience with software and database backups, installations, and system patching. Understanding of networking infrastructure and Microsoft operating systems (legacy systems a plus). More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Paradigm Employment Services LTD
join a leading international business with operations across Dublin, the United Kingdom, and the United States. Our client is renowned for delivering proactive, secure, and highly efficient IT Support, CyberSecurity, and Cloud Management services offering cutting-edge solutions to businesses worldwide. We are keen to speak with marketing professionals who are eager to be part of an innovative, forward More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
manage cyber risks within their respective lines of business. Actively govern cyber risk in the Deloitte Technology risk register. Partner effectively with Deloitte Technology and BISO teams to facilitate cybersecurity risk reviews and analysis. Empower Deloitte Technology teams to establish cyber risk ownership and agree on acceptable risk levels aligned with their risk appetite. Review, test, and constructively challenge … Deloitte Technology cyber teams on their cybersecurity risk assessments, including risk mitigation and management responses. Manage any new requirements for cyber risk dashboards and maintain existing dashboards. Work closely with Cyber risk reporting team to automate and digitize risk metrics, ensuring accurate representation of all Cyber Risk Data. Relationship Management Lead, coach, and mentor project teams to incorporate security … register. Challenge and oversee cyber risk response, where the risk is not within appetite. Connect to your skills and professional experience Do you possess the following? Relevant experience in cybersecurity risk management or equivalent in organizations of a similar scale. Experience in the identification and evaluation of risk, as well as using GRC tools and guidance developed for Risk mitigation. More ❯
latest success stories. Read through the information? Passionate about starting a career in IT? Apply now and one of our friendly advisors will be in touch. Keywords:IT Security, CyberSecurity IT Support, IT Technician, Support Engineer, 1st Line Support, and 2nd Line Support, First Line Support, Second Line Support, Trainee, Training Course, Support, Network Engineer, IT Network Technician, IT More ❯
role, it’s your chance to build your own business within a business, own your market, and see the rewards of your hard work in real time. Sectors: AI, CyberSecurity, Data & Analytics, IT & Software Development & many more. Locations: Central London & International What You’ll Be Doing Building and nurturing long-term client relationships in high-growth industries. Generating new More ❯
putting innovative and effective technology into the hands of over 200,000 users, from the boardroom to the front line. We lead on cutting-edge data science, automation, and cybersecurity at scale. Our mission goes beyond the battlefield by leading humanitarian efforts and driving digital innovation that impacts lives across the globe. Passionate about using your skills to make a More ❯
Account Executive - UK Build the UK division of a proven US cybersecurity provider Our client is a cybersecurity provider delivering tailored security solutions, managed services, and innovative technologies. The Role Our client is looking for an experienced Account Executive - 3-5 years to help build their UK division. You will work very closely with the UK Sales Director, opening accounts … and associations. Generate proposals as needed. Maintain activity reporting and customer information in Salesforce. What they are Looking For Proven success selling for a VAR, IT technology reseller, or cybersecurity risk management provider. Demonstrated track record of opening new accounts in IT sales. General understanding of IT infrastructure—especially security, storage, and networking. Strong competitive drive, tenacity, resilience, and consistency. More ❯
CyberSecurity Placement Programme - No Experience Required, Are you looking to benefit from a new career in IT and Cybersecurity? Skills shortages in the IT sector are driving the need for qualified, entry-level career seekers and career changers. We help place graduates from this programme in top UK companies and organisations needing to employ entry-level IT and Cybersecurity … to give you the official certifications which will be recognised not only in the UK, but worldwide. The CompTIA Security+ and CySA+ is the most asked for certificates for cybersecurity specialists. These are the certification most professionals start their own careers with. Step 4 - Job Placement We work with you to secure your first role in IT. Ideally you … will need to gain two years’ experience in this role before you can progress into a cybersecurity role but for many students on completion of the training we can get them straight into entry level cyber roles. Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements More ❯
and innovations to ensure that data is used effectively and responsibly across the public sector. Our work supports key government priorities including the UK's AI Adoption Plan, the CyberSecurity Strategy, and the Blueprint for Modern Government. We are focused on improving data quality, accessibility, and sharing, while managing security risks and enabling safe, value-driven use of data More ❯