levels of supervision. Education Requirements & Experience Minimum of 2 to 3 years of experience in the IT security industry, preferably working in a SOC/NOC environment. Preferably holds CyberSecurity Certification e.g. ISC2 CC, EPQ Experience with Cloud platforms (AWS and/or Microsoft Azure) Excellent knowledge of Microsoft Office products, especially Excel and Word Reports to Security Director More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
or equivalent). Demonstrable experience working on technical projects and managing stakeholders. Demonstrable experience of working within security standards and frameworks Desirable criteria: Degree in Computer Science, Information Technology, CyberSecurity or technical related field. Professional Membership (e.g. BCS, CITP) or a willingness to obtain within 12 months of taking up post SC Clearance before taking up post (will be More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Michael Page
or equivalent). Demonstrable experience working on technical projects and managing stakeholders. Demonstrable experience of working within security standards and frameworks Desirable criteria: Degree in Computer Science, Information Technology, CyberSecurity or technical related field. Professional Membership (e.g. BCS, CITP) or a willingness to obtain within 12 months of taking up post SC Clearance before taking up post (will be More ❯
Walsall, Staffordshire, United Kingdom Hybrid / WFH Options
CET Structures Limited
changes, and incident resolutions are properly logged and auditable. Be available to work extended hours when required to meet critical project deadlines Provide high-quality support during service outages, cybersecurity incidents, and other business-critical issues to ensure minimal disruption and rapid resolution. Liaise with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Clear IT Recruitment Limited
proficiency in managing and troubleshooting network devices and configurations, including VLANs, DNS, DHCP, and VPNs. • System administration - experience with Active Directory, Group Policy and Azure AD. • Security - familiarity with cybersecurity principles and tools, such as firewalls, antivirus and patch management. • Customer service - excellent communication and customer service skills to interact with clients and internal stakeholders in a clear, supportive manner. More ❯
Staffordshire, United Kingdom Hybrid / WFH Options
Gleeson Recruitment Group
friendly culture Benefits Strong training and development support Friendly, collaborative IT team of 50 across Infrastructure, Dev & Ops The chance to help shape how a major UK organisation tackles cybersecurity At Gleeson Recruitment Group, we embrace inclusivity and welcome applicants of all backgrounds, experiences, and abilities. We are proud to be a disability confident employer. By applying you will More ❯
Logic Apps and Azure Integration Services. Experience in semi/fully unstructured datasets and NoSQL environments Awareness of working in a regulated environment, with experience of data legislation and cybersecurity accreditations e.g., GDPR, ISO27001, Cyber Essentials. Expertise in Business Intelligence, ideally via Power BI for data visualization and reporting Use of DevOps (CI/CD) concepts to test, schedule More ❯
Configure and maintain network devices including routers, switches, and firewalls. Monitor network performance and proactively troubleshoot to ensure optimal service delivery. Maintain security compliance by working closely with IT, CyberSecurity, and service partners. Deliver network maintenance, upgrades, and documentation with accuracy and clarity. Provide training, guidance, and support to users and junior colleagues, contributing to a learning-focused culture. More ❯
Technologies: Security Cleared SC C++ C# Unix Solaris Java Powershell Shellscript Perl Python PHP VMware Docker AWS Azure HTPP SMTP SNMP Syslog NTP Visual Studio tfs CyberSecurity The Software Engineer will be part of an existing highly skilled development team, reporting directly to the Lead Developer, writing complex security solution software. The following are key responsibilities: Writing high quality More ❯
technical operations in the on-premises estate. Leading the Technology Estate for UKHSA, including the delivery of infrastructure platforms and technical operations and, through coordination with the Deputy Director CyberSecurity, ensuring the proportionate and timely reduction in cyber risk. The resilient, secure and cost-effective provision and operation of UKHSA's Workplace offer, including productivity tools (Microsoft 365) and More ❯
strategies and government requirements. Analyze customer needs and software requirements for feasibility. Conduct testing of new software sites for functionality. Develop testing, validation procedures, and documentation. Possess knowledge of cybersecurity, privacy, networking, protocols, security methods, and risk management. Perform software debugging. Understand content creation technologies like wikis, social networking, and content management systems. Communicate effectively and collaborate with team members. More ❯
Automate, and the wider Microsoft 365 ecosystem, is highly desirable. •Understanding of Agile development methodologies. •Exposure to enterprise resource planning (ERP) or customer relationship management (CRM) systems. •Knowledge of cybersecurity best practices in application development. About Us Benefits of working with us as a IT Applications Developer include: 28 days annual leave (plus public holidays) Bonus scheme Life Assurance Scottish More ❯
information governance, network protocols. Knowledge of system hardening techniques. Knowledge and experience in SIEM technologies. Knowledge and experience in vulnerability and risk management processes. Knowledge and experience of applying cybersecurity controls within SAAS environments. Project Engagement Strong stakeholder management skills Knowledge and experience in software development lifecycle processes and ITIL principles. Collaborative Working Effective communication skills (written and verbal) Prepared More ❯
ISO 27001 implementation as a minimum, but preferably also experience in ISOs 27701/22301/9001 A strong understanding of information security and data privacy frameworks like NIST Cybersecurity Framework (CSF), GDPR, CIS or similar. Experience of certification body audits. Should have good experience and knowledge of Cyber/Information Security Governance, Risk Management, and Compliance. ISO Consultant – SC More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Capgemini
mindset, meaning you will have countless training and development opportunities from thinktanks to hackathons, and access to 250,000 courses with numerous external certifications from AWS, Microsoft, Harvard ManageMentor, Cybersecurity qualifications and much more. You'll be bringing your unique skills and perspectives to the team, inspiring and taking inspiration from your teammates as you unlock value in everything you More ❯
mindset, meaning you will have countless training and development opportunities from thinktanks to hackathons, and access to 250,000 courses with numerous external certifications from AWS, Microsoft, Harvard ManageMentor, Cybersecurity qualifications and much more. Youll be bringing your unique skills and perspectives to the team, inspiring and taking inspiration from your teammates as you unlock value in everything you do. More ❯
Build relational databases, perform data access analysis, and design archive/recovery processes. Review and develop object/data models and metadata repositories for better data management. Knowledge of cybersecurity, privacy principles, networking, protocols, and risk management is required. Maintain databases and optimize performance. Understand database management systems, query languages, and data warehousing principles. Manage physical and virtual data storage More ❯
Nuneaton, Warwickshire, United Kingdom Hybrid / WFH Options
Analytical Services International Ltd
IntaForensics, Alecto Forensics, Analytical Services International, and Forensic Testing Services) is a leading provider of forensic science services to the Criminal Justice System. IntaForensics, a leader in digital forensics, cybersecurity, and e-Discovery services, offers a comprehensive suite of forensic and investigative expertise trusted by clients across law enforcement, legal, and corporate sectors. We empower organizations to manage digital evidence More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Talan Group
as Gemserv Limited, Talan provides a range of consultancy and outsourcing capabilities including programme management, market design and governance. We also have extensive and award-winning capabilities across cybersecurity, data privacy and digital transformation. We are a B Corp, IIP Gold accredited and Great Place to Work accredited. The nature of what we do means we are very much More ❯
Warwick, Warwickshire, West Midlands, United Kingdom
Tata Technologies Europe Ltd
systems engineering, software engineering, coding, and all levels of functional testing. Beyond core development, ESS also integrates critical supporting processes such as project management, risk assessment, functional safety, and cybersecurity, ensuring compliance with ASPICE standards and delivering reliable, secure, and high-quality embedded systems & solutions. The Role: This role sits within the (BEV/XHEV) Propulsion System Integration team. The More ❯
more efficient supply chains, and are more sustainable than single-use packaging. To strengthen our IT-department at our office in Dudley (UK), we are currently recruiting a driven Cybersecurity & Compliance Manager. Position purpose The Cybersecurity & Compliance Manager will lead Tosca’s efforts to ensure adherence to NIST CFS 2.0, ISO 27001, and other standards. This role focuses on developing … security protocols, maintaining documentation, conducting risk assessments, and ensuring regulatory compliance. Responsibilities include managing security infrastructure, incident response, and promoting cybersecurity awareness. The position requires collaboration with Global IT, cross-functional teams, and third-party partners. Key qualifications include experience in cybersecurity and compliance, strong knowledge of NIST and ISO standards, risk management expertise, and effective communication skills. This is … actions. Strong communication and interpersonal skills, capable of working effectively with diverse teams and stakeholders. Ability to stay current with security trends, emerging threats, and best practices in the cybersecurity landscape. Experience of manufacturing and/or supply chain industry is preferred. Able to operate in a multinational corporation with several locations. Competencies You have expertise within Customer/Relationship More ❯
Hereford, Herefordshire, West Midlands, United Kingdom
Thorn SDS
Carry out installation, configuration, and support activities across varied IT environments Work collaboratively with technical teams and project stakeholders Troubleshoot issues, apply fixes, and maintain documentation Ensure adherence to cybersecurity protocols and operational standards Skills and Experience: Experience in a relevant IT engineering role (network/server/desktop/installation) Demonstrated capability within a defence environment Strong understanding More ❯
Wealth Management, and Platform Solutions. Finance Technology Engineering : Covers audits related to software engineering, product management, and system design within Compliance & Legal, Controllers & Tax, Enterprises, and Risk & Capital Planning. CyberSecurity : Responsible for audits related to AI, cyber threats, and system design within the Engineering division. Basic Qualifications Bachelor's degree 0-3 years of relevant work experience Proficiency in More ❯
and Active Directory architecture. Proficiency in Group Policy management, PowerShell scripting, and AD automation. Experience with identity management tools (Entra ID, SailPoint, etc.) is a plus. Understanding of cybersecurity principles related to identity and access management. Ability to work independently and as part of a team in a fast-paced environment. Manage and maintain Active Directory (AD) environment, including user More ❯