response plans, ensuring they align with industry best practices. Escalation management in the event of a security incident Follow major incident process Threat Intelligence: Stay abreast of the latest cybersecurity threats and vulnerabilities, integrating threat intelligence into security monitoring processes. Contribute to the development of threat intelligence feeds to enhance proactive threat detection. Proactively hunt for threats within enterprise environments …/IPS, Firewalls) Education Requirements & Experience Minimum of 3 to 5 years of experience in the IT security industry, preferably working in a SOC/NOC environment. Preferably holds CyberSecurity Certification e.g. ISC2 CISSP, GIAC, SC-200, Certified SOC Analyst Experience with Cloud platforms (AWS and/or Microsoft Azure) Excellent knowledge of Microsoft Office products, especially Excel and More ❯
Permanent, Full Time vacancy that will close in a month at 23:59 BST. The Vacancy We currently have an exciting opportunity to join our IT department as a CyberSecurity Lead, on a full-time basis in our Glasgow office. What will your role look like? Our IT team is made up of enthusiastic and experienced IT professionals who … provide innovative technology in a collaborative and supportive environment. This role sits within our IT networking and security team, responsible for maintaining key cybersecurity technologies and the underlying network infrastructure. We are looking to recruit an experienced CyberSecurity Lead who wants to expand their knowledge in this area. You will manage a small team of cybersecurity engineers … leading technologies to facilitate our innovative business solutions. We adopt integrated working methods such as DevOps and Agile/Scrum methodologies. Key responsibilities include: Manage, mentor, and develop the cybersecurity team. Use Azure DevOps to set and manage project-related tasks. Oversee service request tickets related to cybersecurity, ensuring SLA compliance. Optimize the use of our Microsoft Licensing More ❯
SThree are pleased to announce we're recruiting for a talented Lead CyberSecurity Engineer to join & guide our excellent team based in our fantastic office space located in the Cadworks Building, Glasgow. The CyberSecurity Engineering Lead acts as the technical authority across all domains of cloud and endpoint security, taking full ownership of hardening, automation, and threat mitigation. … logic and alert fidelity. Leadership & Mentoring Provide engineering mentorship to junior analysts and engineers; lead by doing. Shape and communicate the security engineering road map in alignment with the CyberSecurity Strategy. What skills and knowledge are we looking for? Deep hands-on knowledge of Microsoft security stack (M365 Defender, Sentinel, Intune, Azure Policy, PIM). Proven experience deploying Cisco More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Cathcart Technology
and cloud services, resolving escalated issues while contributing to a variety of internal projects. You'll work within an ITIL aligned environment, helping improve system performance, network reliability, and cybersecurity posture. Collaborating across support functions and with senior leadership, you'll take ownership of your technical space, from endpoint security to server virtualisation and cloud platform improvements. It'd More ❯
to a vast array for different training and certifications in a variety of areas: cloud technologies (AWS, Azure, GCP), programming (Java, Kotlin, NodeJS, Spring Boot), DevOps (Terraform, Kubernetes, Docker), Cybersecurity (CISSP, CISM) and Agile delivery (Scrum Master, Product Owner, Scaled Agile Framework). Capgemini Invent offers you the flexibility to develop various areas of knowledge in technical domains aligned both More ❯
Profile) Ofgem NIS CAF Overlay NIS Regulations (UK) ISA/IEC 62443 series ISO/IEC 27001, 31010, and NIST CSF Represent the organisation in regulatory discussions, audits, and cybersecurity working groups Define and govern the security architecture using ISA/IEC 62443 zones and conduits methodology Provide assurance of technical controls across Security Levels SL1 to SL4, validating patterns … segmentation, RBAC, and incident containment Lead cyber risk management activities including threat modelling and formal risk analysis (Bow-Tie, Attack Trees, Swiss Cheese, HAZOPs) Own the delivery of the Cybersecurity Requirements Specification (CRS) for all programme systems Oversee end-to-end cyber risk posture management across the service lifecycle, from assessment and design to decommissioning Collaborate with ITIL-aligned service … functions and ensure the Target Operating Model integrates cybersecurity as a pillar of reliability and resilience Extensive experience in a senior cyber leadership role (CISO, SRO, or equivalent), ideally within regulated or Critical National Infrastructure (CNI) sectors Deep knowledge of regulatory and assurance frameworks such as ISA/IEC 62443, NCSC CAF, NIS Regulations, NIST CSF, and ISO/IEC More ❯
Dashboards Excellent troubleshooting and diagnostic ability Good understanding of security principals Desired Skills Experience with Azure Experience driving process or practice improvement within a team Previous experience in the cyber-security industry Attributes Must be a self-starter with a strong work ethic that demonstrates enthusiasm, persistence and the desire to be the very best Naturally curious Good written and More ❯
Location: This role offers flexibility to work remotely, with occasional visits to client sites. Alternatively, you can choose a hybrid arrangement and work from our offices in Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired More ❯
solution architecture roadmaps across cloud and on-prem environments Lead the integration of enterprise applications, AI tools, and OT systems in a secure, scalable way Work closely with digital, cybersecurity, platform, and business teams to translate strategic goals into practical technical designs Champion security-by-design and compliance with frameworks like NIS2 and ISO27001 Guide architectural decisions across Azure, Power … scale digital transformation environments Deep understanding of Azure, enterprise networking, cloud-native development, and OT integration Expertise in Microsoft 365, API management, and AI-enabled tools Strong knowledge of cybersecurity, compliance, and regulated environments Leadership experience in guiding architectural teams and delivering strategic technical change Excellent communication and stakeholder engagement skills Preferred: experience in utilities, water, or energy sectors; familiarity More ❯
solution architecture roadmaps across cloud and on-prem environments Lead the integration of enterprise applications, AI tools, and OT systems in a secure, scalable way Work closely with digital, cybersecurity, platform, and business teams to translate strategic goals into practical technical designs Champion security-by-design and compliance with frameworks like NIS2 and ISO27001 Guide architectural decisions across Azure, Power … scale digital transformation environments Deep understanding of Azure, enterprise networking, cloud-native development, and OT integration Expertise in Microsoft 365, API management, and AI-enabled tools Strong knowledge of cybersecurity, compliance, and regulated environments Leadership experience in guiding architectural teams and delivering strategic technical change Excellent communication and stakeholder engagement skills Preferred: experience in utilities, water, or energy sectors; familiarity More ❯
solution architecture roadmaps across cloud and on-prem environments Lead the integration of enterprise applications, AI tools, and OT systems in a secure, scalable way Work closely with digital, cybersecurity, platform, and business teams to translate strategic goals into practical technical designs Champion security-by-design and compliance with frameworks like NIS2 and ISO27001 Guide architectural decisions across Azure, Power … scale digital transformation environments Deep understanding of Azure, enterprise networking, cloud-native development, and OT integration Expertise in Microsoft 365, API management, and AI-enabled tools Strong knowledge of cybersecurity, compliance, and regulated environments Leadership experience in guiding architectural teams and delivering strategic technical change Excellent communication and stakeholder engagement skills Preferred: experience in utilities, water, or energy sectors; familiarity More ❯
PCs and networked production equipment Support ERP integrations Ensure high availability of systems supporting production lines, including real-time monitoring and rapid incident response Implement and manage highly effective cybersecurity measures across all IT and associated equipment infrastructure Lead system upgrades and patching with minimal disruption to production schedules Collaborate with engineering and operations teams to align IT systems with More ❯
PCs and networked production equipment Support ERP integrations Ensure high availability of systems supporting production lines, including real-time monitoring and rapid incident response Implement and manage highly effective cybersecurity measures across all IT and associated equipment infrastructure Lead system upgrades and patching with minimal disruption to production schedules Collaborate with engineering and operations teams to align IT systems with More ❯
to a vast array for different training and certifications in a variety of areas: cloud technologies (AWS, Azure, GCP), programming (Java, Kotlin, NodeJS, Spring Boot), DevOps (Terraform, Kubernetes, Docker), Cybersecurity (CISSP, CISM) and Agile delivery (Scrum Master, Product Owner, Scaled Agile Framework). Capgemini Invent offers you the flexibility to develop various areas of knowledge in technical domains aligned both More ❯
compromising on compliance or control. To be successful as a Data Security Lead, you should have experience with: Proven architecture and control design experience in a data security or cybersecurity context. Strong background as a Cloud technologist with hands-on experience in data science platforms and AI/ML use cases. Demonstrated expertise in implementing security by design principles and More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Bright Purple Resourcing
continuity. Organize activities for the handover, archiving and disposal of data Create and uphold Business and Staff policies regarding the use of Business IT applications Develop and manage the CyberSecurity Strategy to ensure ongoing diligence and effective response measures. Audit, develop, map, and ensure the implementation of a suitable CyberSecurity architecture About You: Experience of implementation of Different … operating system Proven experience in leading enterprise technology system implementations in high-stakes environments. A strong foundation in business IT, cybersecurity, identity management, and endpoint security. Exceptional leadership, project management, and stakeholder engagement skills. Familiarity with compliance frameworks and risk mitigation in complex multi-supplier ecosystems. Ability to think strategically and execute with precision under tight timelines. Youll play a More ❯
headquartered in Durham, UK, with additional offices in London, Glasgow, and Sydney. The company specialises in a wide range of services including business and technology consulting, managed IT services, cybersecurity, software development, data and analytics, and project management. Known for its people-first culture, Waterstons offers flexible working, unlimited holidays, and a strong focus on learning and development. The … as education, manufacturing, housing, and healthcare, and is one of only a handful of UK consultancies to hold both CREST accreditation and Certified Cyber Consultancy status from the National CyberSecurity Centre. With a growing global team and ambitions to double its turnover by 2025, Waterston's continues to expand while maintaining a strong commitment to client success, innovation, and More ❯
systems, software and security needed to take the lead in a low carbon world. They provide expertise, advice and day-to-day support in emerging technologies, data and analytics, cybersecurity and more. Flexible benefits to fit your life Enjoy discounts on private healthcare and gym memberships. Wellbeing benefits like a free online GP and 24/7 counselling service. More ❯
and advanced AI services. What You'll Bring Proven experience leading architecture across large-scale digital transformation projects. Deep technical knowledge of Azure, enterprise applications, cloud-native design, and cybersecurity best practices. Strong understanding of regulated environments and compliance frameworks (NIS2, ISO27001). Experience integrating IT with OT environments, including edge computing and IoT/SCADA. Leadership skills to mentor More ❯
and corporations. With significant investment in technology and innovation, the organization offers a platform for engineers to work on everything from enterprise platforms to emerging tech like machine learning, cybersecurity, and cloud development. We foster a technology culture that values diversity, encourages professional growth, and supports long-term career development. With access to global resources and top-tier engineering talent … and corporations. With significant investment in technology and innovation, the organization offers a platform for engineers to work on everything from enterprise platforms to emerging tech like machine learning, cybersecurity, and cloud development. We foster a technology culture that values diversity, encourages professional growth, and supports long-term career development. With access to global resources and top-tier engineering talent More ❯
CyberSecurity Project Manager (Change and Transformation) Utilities Hybrid: 1-2 days per month in Glasgow 6 months £700 per day In short: Cyber PM required to join a cyber regulatory team in enhancing their NIS status. Classic PM skills, ideally utilities, oil, energy background and an understanding of cyber regulations would be great. This is not a techy PM More ❯
Solutions Delivery Engineer will provide technical thought leadership and direction to their aligned projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to … communicate clearly with non-security technical SMEs at a comfortable level Experience working in large-scale IT transformation programmes Qualifications & Certifications: Bachelors or masters degree in cybersecurity, computer science, software engineering, or related field CISSP/CISM certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency … rationale which leads to any negatively impacting change Leadership & Teamwork Provides technical thought leadership in their domain of expertise Willingness and ability to work across information technology as a cybersecurity SME, particularly with knowledge of SSH Key Management 3 days a week in either Edinburgh or Sheffield JBRP1_UKTJ More ❯
and able to work independently Desirable: A structured IT qualification such as a Level 3 IT Support Technician apprenticeship Hands-on IT support experience Familiarity with industry tools, basic cybersecurity, and troubleshooting techniques A proactive approach with the ability to see the bigger picture Benefits: Development and Training budget Career progression Healthcare This is a great opportunity to join a More ❯