Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Inspire People
a team at the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Threat and Vulnerability Manager to protect DIT and the wider UK government from cyberthreats in a fast paced and exciting role, responsible for the Vulnerability Management and … Threat Hunting of the Security Operations Centre (SOC) Target Operating Model (TOM). £62,534 to £82,200 (including allowances) London £66,257 to £82,200, National £62,534 to £78,580. Salary is dependent on location and technical skills as assessed at interview. Flexible, hybrid working from London, Salford, Birmingham, Cardiff, Darlington, Edinburgh or Belfast. As the CyberThreat and Vulnerability Manager you will be helping to protect DBT and the wider UK government from cyberthreats in a fast paced and exciting role. Reporting to the Head of Cyber Security Operations, the CyberThreat and Vulnerability Manager will manage and be responsible for the Threat and More ❯
Hereford, Herefordshire, England, United Kingdom Hybrid / WFH Options
TXP Technology x People
clearances that may be required Our leading services client requires an accomplished Information Security Manager to be responsible for protecting the Group's data and information systems from cyberthreats and unauthorised access. This includes developing and implementing security policies, assessing risks, providing reports and managing security incidents. You will also oversee security awareness training, security compliance, security … accreditation and collaborate with various stakeholders to foster a security-conscious culture. Key Deliverables: Align the business' security stance to comply with ISO 27001and Cyber Essentials Plus, or in accordance with the Cyber Assessment Framework Improve the Cyber Awareness within the company via communications, Cyber Awareness training and monitoring of Staff compliance … assessment of all third-party applications Provide regular security reports to the CISO as required Advise the CISO, IT Team and the wider business on matters relating to cyber security Skills & Experience: Solid experience working within a similar role within information security management, ideally within an ICT Infrastructure, Managed Service Provider and/or Systems Integrator In-depth More ❯
Warwick, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Telent Technology Services Ltd
Ensure enterprise application processes comply with ITGC, internal policies relevant industry standards, data protection regulations Implement appropriate security measures and controls to safeguard data integrity and protect against cyber threats. Manage the budget and Fin ops operations, including Saas subscription, capital and operational expenses, and maintain relationships with external service providers and vendors. What will you bring Extensive More ❯
Head of IT Security Incident and Threat Management Package to £117k DOE + 15% Bonus + Benefits Based Birmingham This is an exciting opportunity to take a strategic leadership role at the forefront of cybersecurity. As Head of IT Security Incident and Threat Management, you will shape and lead the organization s global response to cyberthreats ensuring they stay one step ahead of emerging risks. You will have the scope to define and deliver a world-class threat intelligence and incident response strategy, working with innovative cutting-edge tools, partners, and experts. The successful candidate will lead and develop a talented in-house team, while managing the external Security Operations Centre (SOC … to ensure proactive defence and rapid response to incidents. Key Responsibilities Develop and execute incident response and threat management strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust More ❯
Birmingham, Chelmsley Wood, West Midlands (County), United Kingdom
SSR General & Management
Head of IT Security Incident and Threat Management Package to £117k DOE + 15% Bonus + Benefits Based Birmingham This is an exciting opportunity to take a strategic leadership role at the forefront of cybersecurity. As Head of IT Security Incident and Threat Management, you will shape and lead the organization’s global response to cyberthreats — ensuring they stay one step ahead of emerging risks. You will have the scope to define and deliver a world-class threat intelligence and incident response strategy, working with innovative cutting-edge tools, partners, and experts. The successful candidate will lead and develop a talented in-house team, while managing the external Security Operations Centre (SOC … to ensure proactive defence and rapid response to incidents. Key Responsibilities Develop and execute incident response and threat management strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust More ❯
good understanding of technical language and solutions is necessary to manage a technical plan. Security Focus: The ultimate goal is to implement PAM strategies and tools to protect against cyberthreats by controlling privileged access to critical resources Candidates will ideally show evidence of the above in their CV in order to be considered.Please be advised if you haven't heard More ❯
Warwickshire, England, United Kingdom Hybrid / WFH Options
Pontoon Solutions
good understanding of technical language and solutions is necessary to manage a technical plan. Security Focus: The ultimate goal is to implement PAM strategies and tools to protect against cyberthreats by controlling privileged access to critical resources Candidates will ideally show evidence of the above in their CV in order to be considered. Please be advised if you haven't More ❯
West Midlands, England, United Kingdom Hybrid / WFH Options
KP Law
documentation, system monitoring, patching, and maintaining support contracts to ensure system health and compliance. Cybersecurity and risk management: The role will involve supporting the adoption and management of cyber security frameworks, participating in incident response … and disaster recovery planning and testing, implementing controls to maintain cyber security accreditation, and protecting the firm from cyberthreats through policies, audits, training, and threat assessment. Team leadership and communication: The IT Manager will lead and support technical projects, enforces project discipline, manages escalations, develops training plans for the IT support team, ensures effective … threats or incidents occur. • To work with the Executive, Legal Operations and Business Services teams, IT Managed Service Providers and Suppliers to control and mitigate risks associated with cyber security and information security, data loss and cyber-attack. Desirable Skills & Attributes: • Leadership: Ability to motivate and lead teams, fostering a culture of collaboration and open communication. More ❯
Bromsgrove, Worcestershire, United Kingdom Hybrid / WFH Options
First Choice Recruitment Services
and therefore they offer excellent opportunities to progress. The role will focus on supporting and implementing new ways of working to protect the company from a range of cyber and security threats. Candidates will need 2/3 years’ experience of working as a Security Analyst, including monitoring vulnerability and threats, risk mitigation and implementation of robust security … role is only open to British Nationals. Key Responsibilities Monitor and analyse security events and alerts. Perform initial triage, investigation, and classification of potential security incidents alongside the Cyber Security Consultant. Monitor security alerts from various sources and respond promptly, escalating as necessary. Generate reports on key metrics, processes, and the performance of different workflows. Escalate incidents to … Cyber Security Consultant. Work with IT and security teams to contain and resolve threats. Keep incident logs, reports, and tickets updated within incident tracking systems. Assist in threat intelligence gathering and analysis to enhance detection capabilities. Participate in vulnerability management activities. Update and oversee the software inventory. Support compliance reporting and audits. Assist in IT service desk More ❯
West Midlands Ambulance Service University NHS Foundation Trust
Liaise with NHS England, NCSC and other relevant bodies as required ensuring IT Security advisories, directives and notifications are actioned and logged. This includes but is not limited to threat & vulnerability alerts, vendor and other specialist threat intelligence feeds. Ensure all systems and applications where applicable are kept up to date and are encompassed in the patch management … qualifications such as CISMP, CISSP, CASP etc. Evidence of continuing professional development. Skills and Knowledge Essential Knowledge of NHS IT systems and services (desirable) Current knowledge on latest cyberthreats & mitigation of. Knowledge of hardening infrastructure systems both on premise & in the cloud. Familiarity with patch management methodologies. Familiarity with Microsoft cloud technologies (e.g., Microsoft Exchange, Azure, Intune More ❯
businesses can say that these days? What will you be doing You’ll be providing high level infrastructure support as well as monitoring and securing the business against cyberthreats, working alongside the Head of IT, to monitor endpoints, patch devices and develop security resilience, building on some of the work the head of IT has already undertaken … deployed a range of infrastructure and either has an affinity for security or has recently specialised in the security aspect, You may have been involved in things like Cyber Essentials (or Cyber Essentials Plus) or iso27001 and comfortable engaging with internal stakeholders to both assess security risks or communicate security policy You’ll be used to More ❯