will you be working? At M Group Telecom, were enabling and enhancing telecom networks, playing a lead role in the delivery of our tech enabled future. We deliver full network cycle services for fixed, private and mobile operators. This role will be within our Private networks .We find the best technology, manage assets and refresh systems. With 24/… network operations, we keep things running smoothly, while operating comprehensive network repair and maintenance to keep everything in top shape. Want to come and be a part of it? What will you be doing? Youll work as part of the Network Engineering team and provide operational support to the networksecurity architecture. Youll have a … good understanding of IP network architectures and Security and work well as part of a team. Whilst the role is office working hours you will need to be on a rota for emergency OOH support. At times travel will be required to go to the customer's sites which are in Warwickshire and Wokingham or to data centres More ❯
everybody for who they are and what they bring to the table, supporting one another as we continue to deliver for our customers. LI-KS1 The role of Cyber Security Consultant sits within the Cyber Security team in Three UK, which is responsible for providing subject matter expertise and guidance to business units across Three's Network and Enterprise domains to enable the business to deliver its outcomes in a secure manner, building customer trust in a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. In this role you will have a broad and challenging remit, you will therefore need to be flexible and agile in your … approach, switching between different security disciplines within the team as necessary. You will be engaging in the delivery of multiple business initiatives by introducing baseline and enhanced security requirements and supporting their implementation through guidance and advice. You will also be recommending security solutions and then providing design input and technical approvals, assurances, and governance of deliveries More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Sophos Group
About Us Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than … organizations. In addition to MDR and other services, Sophos' complete portfolio includes industry-leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of … advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops and the newly added More ❯
benefits to support your finances, wellbeing and family. Working Pattern: Permanent Full Time Flexible First options available The role We are seeking an experienced and visionary Head of Cyber Security Technology who will work across the SSE Group and deputise for the Group Chief Information Security Officer. The role holder will lead a small team to drive IT … and OT cyber security strategic direction and define and govern enterprise security architecture and will be the technical cyber security authority for the Group while also leading the Group wide IT security risk position working closely with Group IT. You will Develop and maintain the enterprise cyber security architecture for the Group including development of … the requirements of both IT and OT that aligns with industry standards, regulatory requirements and best practice in support of high risk and critical programmes and projects. Lead IT security risk position and lead consulting and assurance engagement into Group IT products and services. This includes overseeing the IT security risk position and mitigation planning. Management and challenge More ❯
The Role We are looking for an exceptionally seasoned Security Architect with over 15 years of progressive experience, including extensive leadership in designing and implementing robust security architectures, particularly within large-scale cloud environments and the highly regulated financial domain. This role demands a deep understanding of complex security challenges, a proven track record of strategic influence … and the ability to translate business requirements into secure, scalable, and compliant technical solutions. Your responsibilities: Strategic Security Leadership: Define, evangelize, and evolve the overall cloud security architecture strategy and roadmap, aligning with business objectives, relevant European regulatory requirements (e.g., GDPR, DORA, PSD2, NIS2 Directive), and industry best practices. Act as a trusted security advisor to senior … leadership, engineering teams, and business units on all aspects of cloud security. Lead the development and implementation of security architectural standards, patterns, and guidelines for cloud-native and hybrid-cloud deployments. Solution Design & Assurance: Provide expert security architecture guidance for critical enterprise applications, infrastructure, and data platforms, with a strong focus on secure-by-design principles. Conduct comprehensive More ❯
an inclusive environment that helps them thrive. Are you ready to make a significant impact in the Utilities sector? Our client is seeking a talented and dedicated Networks and Security Support Engineer to join their dynamic team. This is your chance to enhance the security posture of a vital infrastructure while working in a fast-paced environment. If … you have a passion for networksecurity and a proactive approach to problem-solving, we want to hear from you! Role: Networks and Security Support Engineer Duration: 6 Months Location: Reading Rate: 325 per day (umbrella) What You'll Do: As a Networks and Security Support Engineer, you will play a crucial role in monitoring, managing … and responding to security incidents. Your responsibilities will include: Controlling communications at external and internal system boundaries using firewalls, Intrusion Protection Systems (IPS), and Security Information and Event Management (SIEM) tools. Updating and maintaining network access control (NAC) and antivirus solutions. Monitoring and reviewing logs to detect unauthorized access attempts and ensure compliance with security policies. More ❯
an inclusive environment that helps them thrive. Are you ready to make a significant impact in the Utilities sector? Our client is seeking a talented and dedicated Networks and Security Support Engineer to join their dynamic team. This is your chance to enhance the security posture of a vital infrastructure while working in a fast-paced environment. If … you have a passion for networksecurity and a proactive approach to problem-solving, we want to hear from you! Role: Networks and Security Support Engineer Duration: 6 Months Location: Reading Rate: £325 per day (umbrella) What You'll Do: As a Networks and Security Support Engineer, you will play a crucial role in monitoring, managing … and responding to security incidents. Your responsibilities will include: Controlling communications at external and internal system boundaries using firewalls, Intrusion Protection Systems (IPS), and Security Information and Event Management (SIEM) tools. Updating and maintaining network access control (NAC) and antivirus solutions. Monitoring and reviewing logs to detect unauthorized access attempts and ensure compliance with security policies. More ❯
performance related bonus and a range of benefits to support your finances, wellbeing and family. Working Pattern: Permanent Full Time Flexible First options available The role The Lead Cyber Security Enterprise Architect will support the establishment of a new enterprise cyber security architecture capability for SSE and support the creation of technical sub-strategies and a tooling strategy … for cyber security. The role holder will be responsible for establishing and maintaining a robust cyber security architecture that aligns with the company's security ambitions to support cyber and IT/OT and business transformations and secure by design. You will Establish an enterprise security architecture capability for SSE Group including the development and publication of … by Design methodology for the Group to ensure that the right architectures, standards and guardrails exist to support delivery teams in implementing secure solutions. Develop and maintain a cyber security tooling strategy and technical sub strategies to the overall cyber security Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the More ❯
performance related bonus and a range of benefits to support your finances, wellbeing and family. Working Pattern: Permanent Full Time Flexible First options available The role The Senior Cyber Security Enterprise Architect will support the enterprise cyber security architecture capability for SSE and support the creation of technical sub-strategies and a tooling roadmap for cyber security. The … role holder will work closely with security officers and the outsourced service to lead and support the secure by design methodology. You will Develop key aspects of the enterprise security architecture capability for SSE Group including the development and publication of key architecture patterns, standards and guardrails for use across the Group. Implement core aspects of the Secure … for the Group to ensure that the right architectures, standards and guardrails exist to support delivery teams in implementing secure solutions. Support the development and maintenance of the cyber security tooling strategy and technical sub strategies in areas such as identity, network, detection, firewalls and encryption. Support the cyber security architecture design authority and a mechanism to More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Our client, a leading global organization, is partnering with a prestigious end client based in Reading. Were excited to offer an outstanding opportunity for a Security Architect with strong background in financial services to join a dynamic team on an initial 6-month contract. If you are interested and have the relevant skills and experience, please apply promptly to … discuss further. Location: Reading, UK (Hybrid 4 days onsite) Contract Duration: 6 Months Rate: £700 - 750 Inside IR35 About the Role We are seeking an exceptionally experienced Security Architect to join a major transformation programme in the financial services sector . This is a hands-on, strategic role that involves shaping cloud security architecture, influencing senior stakeholders, and … helping build secure, resilient systems in one of the most tightly regulated industries in the world. Why This Role is Unique Step into a mission-critical role influencing the security posture of a major financial player. Collaborate on high-scale, multi-cloud projects using cutting-edge technologies (AWS, Azure, GCP). Be part of a forward-thinking environment focused More ❯
The Ellison Institute of Technology (EIT) tackles humanity's greatest challenges by turning science and technology into impactful global solutions. Focused on areas like health, food security, sustainable agriculture, climate change, clean energy, and robotics in an era of artificial intelligence. EIT blends groundbreaking research with practical applications to deliver lasting results. A cornerstone of EIT mission is its … pipelines and platform features, and support bioinformaticians in building and deploying their workflows. You'll be responsible for maintaining infrastructure, designing secure automation pipelines, managing cloud environments, and ensuring security and compliance. You'll collaborate with cross-functional teams, data engineers, backend, and full-stack developers, to build robust, automated deployment pipelines across our environments. Key Responsibilities Design, implement … Infrastructure (OCI). Develop and manage Infrastructure as Code (IaC) with tools like Terraform to enable secure, repeatable deployments. Implement and manage CI/CD pipelines, focusing on automated security testing, deployment, and monitoring. Ensure all aspects of the data platform OCI infrastructure, data ingest pipelines, tool deployments, access controls, and monitoring are developed, tested, and deployed using automation More ❯
Job Title: Network Wireless Engineer Location: Reading Experience: 5+ years Job Summary: We are looking for a skilled Network Wireless Engineer to design, implement, and maintain wireless network infrastructure. The ideal candidate will have hands-on experience with wireless technologies, troubleshooting connectivity issues, and ensuring optimal network performance. Key Responsibilities: Design, deploy, and maintain wireless LAN … Wi-Fi) networks. Perform site surveys and wireless coverage analysis. Troubleshoot wireless connectivity issues and resolve performance bottlenecks. Monitor wireless network health and implement improvements. Ensure security of wireless communications through proper configuration and encryption. Collaborate with IT teams for network upgrades and configurations. Required Skills: Strong understanding of wireless protocols (802.11a/b/g/… n/ac/ax). Experience with wireless controllers, access points, and antennas (e.g., Cisco, Aruba, Ubiquiti). Knowledge of networksecurity and authentication methods. Familiarity with tools like Ekahau, NetSpot, or AirMagnet. Basic understanding of wired network infrastructure and IP networking. Preferred Qualifications: Bachelor's degree in Computer Science, IT, or related field. Relevant certifications More ❯
Job Title: Network Wireless Engineer Location: Reading Experience: 5+ years Job Summary: We are looking for a skilled Network Wireless Engineer to design, implement, and maintain wireless network infrastructure. The ideal candidate will have hands-on experience with wireless technologies, troubleshooting connectivity issues, and ensuring optimal network performance. Key Responsibilities: Design, deploy, and maintain wireless LAN … Wi-Fi) networks. Perform site surveys and wireless coverage analysis. Troubleshoot wireless connectivity issues and resolve performance bottlenecks. Monitor wireless network health and implement improvements. Ensure security of wireless communications through proper configuration and encryption. Collaborate with IT teams for network upgrades and configurations. Required Skills: Strong understanding of wireless protocols (802.11a/b/g/… n/ac/ax). Experience with wireless controllers, access points, and antennas (e.g., Cisco, Aruba, Ubiquiti). Knowledge of networksecurity and authentication methods. Familiarity with tools like Ekahau, NetSpot, or AirMagnet. Basic understanding of wired network infrastructure and IP networking. Preferred Qualifications: Bachelor's degree in Computer Science, IT, or related field. Relevant certifications More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. Incident Response - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop and fine-tune detection … rules and alerts to identify malicious activities. Security Reporting - Generate reports on security events, trends, and system performance. Collaboration - Work with IT and security teams to improve overall cybersecurity posture. Required Skills & Qualifications Technical Expertise - Strong knowledge of SIEM platforms, networksecurity, and cybersecurity frameworks. Certifications - CISSP, CEH, GIAC, or vendor-specific SIEM certifications. Programming … Scripting - Familiarity with Python, PowerShell, or other scripting languages. Analytical Thinking - Ability to analyze large datasets and identify security threats. Communication Skills - Ability to document findings and communicate effectively with stakeholders All profiles will be reviewed against the required skills and experience. Due to the high number of applications we will only be able to respond to successful applicants More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. Incident Response - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop and fine-tune detection … rules and alerts to identify malicious activities. Security Reporting - Generate reports on security events, trends, and system performance. Collaboration - Work with IT and security teams to improve overall cybersecurity posture. Required Skills & Qualifications Technical Expertise - Strong knowledge of SIEM platforms, networksecurity, and cybersecurity frameworks. Certifications - CISSP, CEH, GIAC, or vendor-specific SIEM certifications. Programming … Scripting - Familiarity with Python, PowerShell, or other scripting languages. Analytical Thinking - Ability to analyze large datasets and identify security threats. Communication Skills - Ability to document findings and communicate effectively with stakeholders All profiles will be reviewed against the required skills and experience. Due to the high number of applications we will only be able to respond to successful applicants More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis
Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. Incident Response - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop and fine-tune detection … rules and alerts to identify malicious activities. Security Reporting - Generate reports on security events, trends, and system performance. Collaboration - Work with IT and security teams to improve overall cybersecurity posture. Required Skills & Qualifications Technical Expertise - Strong knowledge of SIEM platforms, networksecurity, and cybersecurity frameworks. Certifications - CISSP, CEH, GIAC, or vendor-specific SIEM certifications. Programming … Scripting - Familiarity with Python, PowerShell, or other scripting languages. Analytical Thinking - Ability to analyze large datasets and identify security threats. Communication Skills - Ability to document findings and communicate effectively with stakeholders All profiles will be reviewed against the required skills and experience. Due to the high number of applications we will only be able to respond to successful applicants More ❯
Leadership & Strategy: Define and execute the software engineering strategy, aligning with the company's overall PQC product roadmap. Lead and mentor a team of software engineers, developers, and software security experts, fostering a culture of innovation and technical excellence. Champion and continuously refine Agile development processes (e.g., Scrum, Kanban) to improve team velocity, predictability, and product quality. Stay informed … customers, to manage the integration and deployment of PQC software IP. Communicate technical concepts and development progress to executives, product management, and customers in a clear and actionable way. Security & Compliance: Ensure all software products meet the latest security standards and regulations for post-quantum cryptography. Maintain and enforce robust secure software development lifecycle (SSDLC) principles, including side … or a related field with a focus on cryptography or cybersecurity. Experience: 10+ years of software development experience, with 5+ years in a leadership role. Strong experience in software security, cryptographic software implementations (e.g., OpenSSL, BoringSSL), and knowledge of post-quantum cryptography. Experience in secure software development and validation, including knowledge of C, C++, Rust, or other relevant languages. More ❯
service performance metrics and ensure effective issue resolution in collaboration with internal teams. Work with project managers and engineers to deliver successful IT projects such as hybrid cloud setups, networksecurity, and software deployments. Advocate for clients within the organisation, leveraging ITIL frameworks and service management tools to escalate and resolve concerns. Account Growth & Opportunity Identification Use data … team. Mentorship Mentor Account Managers on technical alignment appropriate to their accounts. Work with the Director of Sales Ops & Customer Success to maintain and optimise the tech stack. Compliance & Security Maintain a solid understanding of Information Security Management Systems (ISMS) and ensure compliance with data protection policies and regulations. About you: Experience: Proven experience as a strategic IT More ❯
and implementation of cybersecurity policies, procedures, and standards. Collaborate with engineering and IT teams to ensure secure-by-design principles are embedded in systems and products. Maintain and update security tools including SIEM, endpoint protection, and identity management systems. Investigate security incidents, perform root cause analysis, and recommend corrective actions. Assist in compliance efforts with standards such as … documentation. Stay current with emerging threats, technologies, and regulatory changes. Required Skills & Experience Proven experience in cybersecurity operations, ideally within Defence, Aerospace, or other regulated sectors. Strong understanding of networksecurity, threat intelligence, and incident response. Familiarity with SIEM platforms, firewalls, IDS/IPS, and endpoint protection tools. Experience with regulatory frameworks such as ISO 27001, NIST SP800 … and MOD standards. Ability to interpret and apply security controls in complex, multi-vendor environments. Excellent analytical, communication, and stakeholder engagement skills. Desirable Certifications such as CISSP, CISM, CEH, or Security+. Experience with secure cloud environments (Azure, AWS). Knowledge of secure software development practices and DevSecOps. Exposure to cross-domain solutions and secure communications systems. More ❯
The Ellison Institute of Technology (EIT) tackles humanity's greatest challenges by turning science and technology into impactful global solutions. Focused on areas like health, food security, sustainable agriculture, climate change, clean energy, and robotics in an era of artificial intelligence. EIT blends groundbreaking research with practical applications to deliver lasting results. A cornerstone of EIT mission is its … management of services. Ability to automate everything using Terraform and appropriate toolchains. In-depth knowledge of containerisation technologies (e.g. Docker) and orchestration tools like Kubernetes. Solid understanding of cloud security best practices, including identity and access management (IAM), networksecurity, and encryption. Experience with Git or other version control systems. Desirable Knowledge, Skills and Experience: Certifications in … new technology. Hands-on approach to exploring new technologies and developing proofs of concept (POCs). Strong problem-solving and analytical skills, with the ability to think critically about security challenges. Excellent communication and teamwork skills, especially within cross-functional teams. Ability to manage multiple tasks and meet deadlines in a fast-paced, dynamic environment. Attention to detail and More ❯
IT Service Desk Engineer (1st Line) Full-time Company Profile An exciting, forward-thinking and innovative provider of complete, bespoke, managed IT, communication and networksecurity solutions for businesses of all sizes for over 10 years. Now hiring for multiple talented IT Support Engineers to join the team due to continued growth and expansion in customer base and … demand. They offer and encourage development and progression, with the opportunity of great career with unrivalled job security and stability. Job Profile The job will suit skilled IT support engineers with a minimum of 1 year proven and demonstrable experience within a Managed Service Provider (MSP) environment. The successful candidates will need a customer focused approach and a commitment More ❯
infrastructure, and software tools supporting architectural workflows (e.g., AutoCAD, Revit, BIM platforms) Lead and mentor a team of two skilled technical engineers, fostering a high-performance, collaborative culture Ensure networksecurity, data backups, and business continuity across on-prem and cloud environments Liaise with department heads to anticipate tech needs and improve operational efficiency Manage vendor relationships and More ❯
CAT Cabling Engineer Permanent/Full-time ** CAT cabling experience required ** Company Profile An exciting, forward-thinking, and innovative provider of complete, bespoke managed IT, communication, and networksecurity solutions for businesses of all sizes for over 10 years. Due to continued growth and increasing demand from a diverse customer base, we are now looking for a Field … support, troubleshooting and maintenance across diverse client environments Install, test, and troubleshoot CAT6 cabling as a primary function of the role Install, configure, and support IT hardware, software, and network systems Collaborate with internal teams to escalate and resolve complex issues quickly and effectively Deliver excellent customer service, ensuring high levels of satisfaction Maintain accurate documentation for all work More ❯
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
Press Tab to Move to Skip to Content Link Select how often (in days) to receive an alert: VodafoneThree - Product Manager Cyber Security Business Area: Local Vodafone Business Unit Posting Country: United Kingdom Full Time/Part Time: Full Time Contract Type: Permanent At Vodafone, we're working hard to build a better future. A more connected, inclusive and … Our "Office in a Box" home working kit will provide you with everything you need, no matter where you are. Who We Are We're here to build a network the UK can count on - one that connects people, places and potential. Because no matter where you live, what your background is, or how you get online - we think … and the Internet of Things (IoT). What you'll do You will be overseeing the complete end-to-end product life-cycle for a segment of the Cyber Security portfolio, including Managed Security Services (MSS) and Network Security. This involves product development, continuous improvement, life-cycle management, and decommissioning. Additionally, collaborating with the Security Product More ❯
office. Purpose of the Role Primark Technology is on a transformation journey supporting the business strategy which includes modernising our operating model as well as technology architecture and Cyber Security and Risk posture. This role is key in building and improving Primark's Cyber Security posture. Duties & Responsibilities Actively progress and improve Primark's cyber security posture … Agile delivery methodology and development methods Certified with appropriate qualifications is desirable, 1. Structured Project Management : Prince/PMP 2. Agile certification, such as Scrum, SaFe, AgilePM 3. Information Security/Data Protection certification An appropriate degree, equivalent qualification or experience Desirable Be a passionate and visionary technologist able to inspire others to challenge and disrupt the current reality … ways to translate that into business opportunities. Be able to take people along with you, empowering new ways of working and successfully executing on those opportunities. Have extensive cyber security delivery and programme/project management experience, Retail experience would be beneficial. Be technically strong across a range of IT disciplines and systems, including cloud and network security. More ❯