experience to join our central cyber security team. This role offers the opportunity to work across a broad stakeholder base within the UK and Europe, contributing to essential cyber risk management and operational security initiatives. Key Responsibilities As a Cyber Security Operations Analyst, you will play a key role in supporting riskanalysis, security policy implementation, and … the Secure by Design framework across Operational Technology (OT) and Information Technology (IT). You will contribute to: Risk Management: Conduct riskanalysis and interpret first-line operational outputs to support VPI's overall cyber security risk posture. Operational Security: Assist in incident response testing, data management, and coordination of cyber security with physical and personnel … security teams. Human Risk Management: Develop cyber security awareness materials, manage phishing protection programmes, and handle external threat intelligence. Software Development & Cloud Security: Support the integration of security policies into DevOps processes and cloud-based tools. Business & Change Management: Contribute to risk mitigation strategies for business development and internal change projects. Incident Response: Act as a responder within More ❯
Immingham, North East Lincolnshire, UK Hybrid / WFH Options
Rullion
experience to join our central cyber security team. This role offers the opportunity to work across a broad stakeholder base within the UK and Europe, contributing to essential cyber risk management and operational security initiatives. Key Responsibilities As a Cyber Security Operations Analyst, you will play a key role in supporting riskanalysis, security policy implementation, and … the Secure by Design framework across Operational Technology (OT) and Information Technology (IT). You will contribute to: Risk Management: Conduct riskanalysis and interpret first-line operational outputs to support VPI’s overall cyber security risk posture. Operational Security: Assist in incident response testing, data management, and coordination of cyber security with physical and personnel … security teams. Human Risk Management: Develop cyber security awareness materials, manage phishing protection programmes, and handle external threat intelligence. Software Development & Cloud Security: Support the integration of security policies into DevOps processes and cloud-based tools. Business & Change Management: Contribute to risk mitigation strategies for business development and internal change projects. Incident Response: Act as a responder within More ❯
Immingham, Lincolnshire, United Kingdom Hybrid / WFH Options
Rullion Managed Services
experience to join our central cyber security team. This role offers the opportunity to work across a broad stakeholder base within the UK and Europe, contributing to essential cyber risk management and operational security initiatives. Key Responsibilities As a Cyber Security Operations Analyst, you will play a key role in supporting riskanalysis, security policy implementation, and … the Secure by Design framework across Operational Technology (OT) and Information Technology (IT). You will contribute to: * Risk Management: Conduct riskanalysis and interpret first-line operational outputs to support VPI's overall cyber security risk posture. * Operational Security: Assist in incident response testing, data management, and coordination of cyber security with physical and personnel … security teams. * Human Risk Management: Develop cyber security awareness materials, manage phishing protection programmes, and handle external threat intelligence. * Software Development & Cloud Security: Support the integration of security policies into DevOps processes and cloud-based tools. * Business & Change Management: Contribute to risk mitigation strategies for business development and internal change projects. * Incident Response: Act as a responder within More ❯
Employment Type: Permanent
Salary: £40000 - £43000/annum Pension,Medical,Incentive plan,25 Ho
branch environments Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform riskanalysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Kerv Digital for Digital Transformation
and business analysts to understand requirements and design test cases Report and track defects, and work with the development team to resolve issues Participate in test planning, estimation, and riskanalysis activities Contribute to the continuous improvement of automated testing processes and methodologies Required Experience: Minimum of 3 years' experience in both manual and automated testing at all More ❯
system design, deployment, and ongoing operations. Define cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Contribute to the production and review of assurance artefacts, including security cases, risk registers, control implementation evidence, and … depth understanding of operational technology (OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, riskanalysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems within large engineering or infrastructure … safety standards. Strong communication and stakeholder engagement skills, with the ability to liaise confidently across engineering, programme delivery, assurance, and regulatory audiences. Ability to produce high-quality documentation, including risk assessments, technical guidance, assurance artefacts, and audit-ready deliverables. Familiarity with UK cybersecurity regulations and sector guidance, including the NIS Regulations, CNI expectations, and industry-specific frameworks. Capable of More ❯
system design, deployment, and ongoing operations. Define cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Contribute to the production and review of assurance artefacts, including security cases, risk registers, control implementation evidence, and … depth understanding of operational technology (OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, riskanalysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems within large engineering or infrastructure … safety standards. Strong communication and stakeholder engagement skills, with the ability to liaise confidently across engineering, programme delivery, assurance, and regulatory audiences. Ability to produce high-quality documentation, including risk assessments, technical guidance, assurance artefacts, and audit-ready deliverables. Familiarity with UK cybersecurity regulations and sector guidance, including the NIS Regulations, CNI expectations, and industry-specific frameworks. Capable of More ❯
to mitigate risks and breaches. Work collaboratively with other departments to ensure comprehensive security awareness and compliance with industry standards and regulations. Conduct regular security assessments, vulnerability testing, and riskanalysis to identify and address potential threats. Maintain up-to-date knowledge of emerging cybersecurity trends, technologies, and best practices. Prepare and present reports on the status of More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
to mitigate risks and breaches. Work collaboratively with other departments to ensure comprehensive security awareness and compliance with industry standards and regulations. Conduct regular security assessments, vulnerability testing, and riskanalysis to identify and address potential threats. Maintain up-to-date knowledge of emerging cybersecurity trends, technologies, and best practices. Prepare and present reports on the status of More ❯
to mitigate risks and breaches. Work collaboratively with other departments to ensure comprehensive security awareness and compliance with industry standards and regulations. Conduct regular security assessments, vulnerability testing, and riskanalysis to identify and address potential threats. Maintain up-to-date knowledge of emerging cybersecurity trends, technologies, and best practices. Prepare and present reports on the status of More ❯
prevent recurrence. Implement and upgrade security measures and controls. Establish protocols to protect information systems from unauthorized access or destruction. Maintain data security and monitor access. Perform vulnerability testing, risk analyses, and security assessments. Conduct security audits and tests to ensure system integrity. Essential Job Functions Con't Anticipate and reduce security alerts, incidents, and disasters. Collaborate with infrastructure … security analyst role, including: Penetration testing and vulnerability remediation Anti-virus and anti-malware management Networking, firewalls, IDS, IPS, security appliances Windows and Linux OS Network protocols and packet analysis Scripting languages (C#, VB, Python, C, .NET) Cloud computing Certificates, Licenses, Registrations Valid driver’s license required Preferred certifications: CEH, ECSA, EC-Council Certified Security Analyst Supervision None Physical More ❯
Develop, debug, and deploy software for real-time, non-real-time, and interactive systems. Recommend architecture and design improvements, utilizing refactoring and modern tools. Conduct research, problem-solving, and riskanalysis; articulate solutions effectively. Lead and participate in software integration and deployment throughout the product cycle. Requirements Proficient in C#, WPF, .NET, and Object-Oriented Design. Experienced in More ❯
Rednal, Birmingham, United Kingdom Hybrid / WFH Options
Kerv
or similar tools Manage secrets and configurations using Azure Key Vault Participate in code reviews and contribute to continuous improvement of testing practices Participate in test planning, estimation, and riskanalysis activities Report and track defects, and work with the development team to resolve issues Contribute to the continuous improvement and maintenance of automated testing frameworks, processes and More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Kerv Digital for Digital Transformation
or similar tools Manage secrets and configurations using Azure Key Vault Participate in code reviews and contribute to continuous improvement of testing practices Participate in test planning, estimation, and riskanalysis activities Report and track defects, and work with the development team to resolve issues Contribute to the continuous improvement and maintenance of automated testing frameworks, processes and More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST, DAST, IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant certifications such More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
and £50,000 plus benefits depending on experience. Key Responsibilities * Develop, implement and maintain comprehensive IT security processes and procedures in support of achieving ISO 27001. * Conduct security audits, risk assessments and compliance reporting to identify vulnerabilities and recommend corrective actions. * Collaborate with various departments to ensure comprehensive security awareness and adherence to established policies. * Proactively monitor and analyse … to ensure clear understanding across the organisation. * Stay up-to-date with the latest security trends, technologies, and regulations to continuously improve our security practices. * Conduct vulnerability assessments and risk analysis. * Conduct Security Audits and Assessments: Perform regular security assessments to ensure compliance with industry standards. * Create and maintain security policies to ensure data confidentiality, integrity, and availability. * Communicate … security risks and recommendations to management. * Support incident response. Critical Skills for Success * Experience in IT security compliance or a related field. * Proven experience with security audits, risk assessments, and compliance reporting. * Proficiency in using security tools and technologies. * Strong analytical and problem-solving skills. * Excellent communication and collaboration abilities. Interested?! Send your up-to-date CV to Emma More ❯
arena. Our client is passionate about innovation using leading-edge technologies to create scalable and user-centric digital solutions. Responsibilities: Focus on the delivery of 1st line security controls analysis while undertaking deep riskanalysis to identify trends and gaps. Produce and present risk reports to the senior management team, ensuring accuracy with factual information. Translate … non-technical stakeholders such as decision makers. Ensure the reports are framed in a way which reflects all compensatory controls in place. Criteria: Proven experience in technical security controls analysis across various platforms such as networks, cloud, legacy systems, and web-based applications. Proven experience in scoping and planning security testing through interpretation of architecture diagrams. Ability to prioritize … appropriate security controls to mitigate cyber security risks. Evidence of working with key stakeholders such as product owners and SMEs (Subject Matter Experts), enabling them to make well-informed risk-based decisions. A deep understanding of threats and cyber attacks using local and strategic threat information in decision-making and planning. Proven experience in MI and risk-related More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯