hierarchy or titles. It's about impact, curiosity and partnering to build something that scales well and feels right. You'll be hands on with architecture, tooling, policy and incident response. You'll enable teams to move quickly and securely, bringing clarity to complex problems and designing systems that work long after you're done with them. What you … ll be doing Collaborating with your teammates to take ownership of security across the business from hardening and monitoring to governance and incidentresponse Designing and evolving secure architectures using defence in depth and threat modelling principles across cloud, networks and endpoints Driving vulnerability management and scaling tooling such as CSPM, SIEM, IAM and endpoint protection to manage … security and data privacy, helping ensure we remain audit ready Building lightweight processes that make it easy for teams to do the secure thing by default Sharing ownership of incidentresponse including triage, coordination and postmortem analysis Partnering with engineers and product teams to embed secure thinking into design and delivery Keeping pace with emerging threats and contributing More ❯
management experience (operational leadership or within an audit/control function) covering Technology Infrastructure, Cyber Security or Resilience. Experience of one or more of the following areas: cloud technologies, incidentresponse, vulnerability management, threat management, information risk management, data leakage protection, identity & access management, technology areas includes Unix/Linux, Windows, Databases, or Middleware storage technologies or Networks. … Additionally, ITIL service management processes including Incident, Problem and Change, Data Backup and Recovery. Knowledge of new and emerging technology, cyber security, and resilience risks and mitigating controls. Relevant professional qualifications (e.g. CISA, CISSP, CRISC, TOGAF or other relevant technical qualification; and graduate degree). Practical understanding of relevant regulatory environment. Strong ability to oversee and deliver timely delivery More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
aligned with financial services compliance standards (e.g., ISO 27001, SOC 2, PCI-DSS). Collaborate with DevOps, Security, and Application teams to support CI/CD pipelines, monitoring, and incident response. Optimize cloud costs and performance through resource governance, tagging strategies, and usage analytics. Develop and maintain documentation for infrastructure standards, procedures, and best practices. Participate in disaster recovery More ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Experis
aligned with financial services compliance standards (e.g., ISO 27001, SOC 2, PCI-DSS). Collaborate with DevOps, Security, and Application teams to support CI/CD pipelines, monitoring, and incident response. Optimize cloud costs and performance through resource governance, tagging strategies, and usage analytics. Develop and maintain documentation for infrastructure standards, procedures, and best practices. Participate in disaster recovery More ❯
in line with our Mid-Market technology roadmap. The Role Technology & Systems Management Oversee the ongoing maintenance and development of Mid-Market business applications and platforms. Lead fault resolution, incidentresponse, and ensure timely ticket management. Ensure compliance with security policies and lead on risk remediation activities. Manage cloud development, architecture, and system integrations. Coordinate licensing, certificates, and More ❯
is reliable, scalable, and secure. Ensure the reliability, availability, and scalability of the systems, platforms, and technology through the application of software engineering techniques, automation, and best practices in incident response. Accountabilities Build Engineering: Development, delivery, and maintenance of high-quality infrastructure solutions to fulfil business requirements ensuring measurable reliability, performance, availability, and ease of use. Including the identification … of the appropriate technologies and solutions to meet business, optimisation, and resourcing requirements. Incident Management: Monitoring of IT infrastructure and system performance to measure, identify, address, and resolve any potential issues, vulnerabilities, or outages. Use of data to drive down mean time to resolution. Automation: Development and implementation of automated tasks and processes to improve efficiency and reduce manual More ❯