IT Operation s Platforms and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation’s IT operations, ensuring the stability, continuity, security, and efficiency of its technology … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … and systems, driving transformative operational change, enhancing IT processes and ensuring compliance with governance bodies and industry regulations. Due to the nature of the role, complexity Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection More ❯
Security Lead In summary the Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk - ideally from within the banking or insurance sector. The IT Operational … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … technically augment the team capabilities (when required) and have a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management • Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection More ❯
IT Infrastructure Operation s and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation's IT operations, ensuring the stability, continuity, security, and efficiency of its technology … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and … access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions More ❯
NIST, ISO 27001, CIS). Develop and maintain secure architectural patterns and standards, with a solid working knowledge of cloud security (AWS, Azure, GCP). Apply risk-based and threat-based approaches to evaluate and recommend appropriate and proportionate security technologies and solutions (e.g., SIEM, IAM, CASB, container security). Outline key security components, interfaces, and dependencies. Develop architectural … Document security design principles and provide rationale. Ensure designs align with business objectives, security policies, and industry best practices, with a focus on cloud-native security considerations. Risk and ThreatManagement: Conduct comprehensive risk assessments and threat modelling, providing detailed analysis and actionable recommendations. Advise clients on risk mitigation strategies and security best practices, and support the … response and investigations, contributing to thorough post-incident reviews and identifying areas for improvement. Stakeholder Engagement and Technical Leadership: Provide expert guidance to clients on secure architecture and risk management, participating in technical discussions with stakeholders. Engage with stakeholders to contribute to informed security decisions and communicate complex security concepts effectively. Deliver clear presentations and reports to technical and More ❯
environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. The role requires the ability to "lead by example" and perform line management for direct reports and manage service partners reporting into the function. Additional responsibilities are to respond to support requests by Key Responsibilities: IT Operations & Cloud Platform Management Lead … business continuity (BC) and disaster recovery (DR) plans, ensuring cloud- based solutions support resilience and rapid recovery. Manage Global Infrastructure (Cloud, On-prem and Virtual product) Solution Life Cycle Management and removal (via decommissioning and succession planning) of technical debt. Drive a document first culture to new and legacy platforms/solutions. Oversee management of the End User More ❯
and Security functions are central to this position, leading a team of specialist engineers to maintain the secure operation of services and contributing to major projects that impact identity management across the organisation. The post holder also serves as a technical authority within the team and department. What you'll need to succeed Security Operations & Incident Response Lead security … operations services, including monitoring, incident response, threatmanagement, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery efforts with internal teams and vendors. Establish and manage threat intelligence processes to ensure timely remediation of vulnerabilities. Monitor and analyse … performance metrics to support security troubleshooting and continuous improvement. Identity & Access Management Provide expert technical leadership for identity and access management, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of identity services, ensuring reliability and user demand readiness. Shape and deliver a strategic roadmap for identity services, focusing on automation and More ❯
and Security functions are central to this position, leading a team of specialist engineers to maintain the secure operation of services and contributing to major projects that impact identity management across the organisation. The post holder also serves as a technical authority within the team and department. What you'll need to succeed Security Operations & Incident Response Lead security … operations services, including monitoring, incident response, threatmanagement, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery efforts with internal teams and vendors. Establish and manage threat intelligence processes to ensure timely remediation of vulnerabilities. Monitor and analyse … performance metrics to support security troubleshooting and continuous improvement. Identity & Access Management Provide expert technical leadership for identity and access management, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of identity services, ensuring reliability and user demand readiness. Shape and deliver a strategic roadmap for identity services, focusing on automation and More ❯
Evaluate and recommend new security tools and technologies to enhance security operations. Documentation: Create and maintain detailed documentation of security incidents, forensic analysis, and vulnerability assessments. Prepare reports for management and stakeholders. Collaboration: Work closely with other IT and Digital teams to ensure comprehensive security coverage. Provide security guidance to projects and programs as required. Work closely with developers … Network Security: Strong understanding of network protocols, VPNs, and network security architecture. Incident Response: Ability to detect, analyse, and respond to security incidents, including forensics and malware analysis. Vulnerability Management: Experience in identifying, assessing, and mitigating vulnerabilities in systems and applications. Automation: Skills in scripting and automation for security tasks (e.g. Python, PowerShell). Information Security Frameworks: Working knowledge … of common frameworks and standards, such as ISO 27001/2/5, NIST800-53, and Cyber Essentials. Risk Management and Compliance: Thorough understanding of Information Security Risk Management and Compliance frameworks, including ability to assess information risks and select appropriate controls. Data Protection: Understanding of data protection concepts and regulations, such as PII and GDPR. Documentation Skills More ❯
M.Inst.ISP, CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threatmanagement, vulnerability management, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports More ❯
M.Inst.ISP, CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threatmanagement, vulnerability management, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports More ❯
Vulnerability Analyst Tenable SME Outside IR35 6 Months Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerability management programme and Tenable is central to the role. As the SME, you will own the … end-to-end vulnerability management lifecycle from tooling and assessments to governance, reporting and stakeholder engagement. You ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading the end-to-end vulnerability management process using Tenable . Develop, deploy and maintain a comprehensive vulnerability management program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to prioritise, track, and resolve vulnerabilities, ensuring timely and effective More ❯
Vulnerability Analyst – Tenable SME – Outside IR35 – 6 Months – Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerability management programme and Tenable is central to the role. As the SME, you will own the … end-to-end vulnerability management lifecycle — from tooling and assessments to governance, reporting and stakeholder engagement. You’ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading the end-to-end vulnerability management process using Tenable . Develop, deploy and maintain a comprehensive vulnerability management program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to prioritise, track, and resolve vulnerabilities, ensuring timely and effective More ❯
Kensington, West Holland Park, Greater London, United Kingdom
VIQU IT
Vulnerability Analyst – Tenable SME – Outside IR35 – 6 Months – Hybrid - Central London My client is looking for a Vulnerability Analyst with a deep understanding of Threat management. A leading organisation is urgently seeking a Vulnerability Analyst to help mature and deliver their vulnerability management programme and Tenable is central to the role. As the SME, you will own the … end-to-end vulnerability management lifecycle — from tooling and assessments to governance, reporting and stakeholder engagement. You’ll work cross-functionally with technical teams, business units, and leadership to ensure that vulnerability risks are effectively understood and addressed in line with business priorities and regulatory requirements. Key Responsibilities of the Vulnerability Analyst: Leading the end-to-end vulnerability management process using Tenable . Develop, deploy and maintain a comprehensive vulnerability management program. Conducting regular vulnerability scans and penetration testing activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security stakeholders to prioritise, track, and resolve vulnerabilities, ensuring timely and effective More ❯
M.Inst.ISP, CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threatmanagement, vulnerability management, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
to-end delivery of cyber security projects, ensuring alignment with business goals and compliance requirements Work across InfoSec, IT, risk, and compliance teams to deliver initiatives such as vulnerability management, identity and access management (IAM), SIEM upgrades, and cloud security improvements Manage third-party vendors and internal stakeholders to ensure smooth project execution Develop and maintain project documentation … projects adhere to regulatory and governance frameworks Skills and Experience Proven track record delivering cyber security or information security projects in large, complex organisations Strong understanding of cyber risk, threatmanagement, and technical security controls Excellent stakeholder management and communication skills Experience with governance, risk, and compliance frameworks (e.g., ISO 27001, NIST, GDPR) PRINCE2, PMP, or similar … project management certification desirable Knowledge of cloud security (Azure/AWS) a plus Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome applications from people of all backgrounds and perspectives. Our success is driven by our people, united by the spirit of partnership More ❯
M.Inst.ISP, CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threatmanagement, vulnerability management, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports More ❯
M.Inst.ISP, CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threatmanagement, vulnerability management, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
R3vamp Limited
Security Operations Manager Location: Hybrid - Reading area Salary: Up to £73,000 per annum Type: Permanent | Full-Time Are you a technical security leader with deep expertise in identity management and a passion for building high-performing teams? This is a fantastic opportunity to shape and lead a modern Security Operations function at a forward-thinking public sector organisation. … You’ll manage a team of specialists covering Microsoft Entra ID (Azure AD), Microsoft 365 and broader technical security tooling, while shaping the strategic direction of identity and access management services. What You’ll Be Doing Leading a small but highly skilled team across identity, M365, and security operations Overseeing day-to-day technical delivery and long-term strategy … for identity and access services Driving improvements in security monitoring, incident response and threatmanagement Managing the relationship with an outsourced 24/7 SOC partner Influencing roadmap decisions around tooling, automation and “shift-left” initiatives Acting as the go-to expert on Microsoft Entra ID and Active Directory What You’ll Bring Proven leadership experience in Security More ❯
Burton Latimer, Northamptonshire, United Kingdom Hybrid / WFH Options
Weetabix
to security events and incidents, as well as spearheading engaging user awareness campaigns and training sessions. In addition, you'll play a vital role in supporting the implementation and management of identity, access, and threatmanagement controls throughout our IT environment. Identify, analyse, and respond to security events and incidents, escalating as per the incident response plan. … understanding of Active Directory (AD) and Entra ID (Azure AD), MFA, SSO, conditional access, Azure RBAC, PIM Experience with the following products and technologies: Microsoft Defender, Exchange Online, vulnerability management tools, phishing simulation tools Experience creating policies, procedures and response plans Excellent communicator with the ability to reduce complex issues and ideas to simple terms and express these both More ❯
understanding of GDPR and experience leading a privacy team. Experience leading and developing teams of specialists. Exceptional communication skills to influence stakeholders at all levels. Familiarity with vulnerability and threatmanagement tools and processes, including SIEM, EDR, WAF, SSO, and penetration testing. Ability to deliver and prioritize multiple complex projects. Knowledge of relevant laws and compliance standards. Desirable More ❯
An SC cleared ThreatManagement Consultant is required for an initial 6 month contract. This role is fully remote and is inside IR35 so will require working via an FCSA accredited umbrella company. Key Skills and experience: Establish an operational interlock with the CSMS and own security incident response and recovery on behalf of IBM as the supplier … sending of appropriate log event data to the CSMS Develop incident response playbooks Design and implement SIOC processes to supplement the UK SOC monitoring service: * Ongoing tuning of Qradar * Threat Intelligence * Threat Hunting Implement vunlnerability scanning using Tenable in AWS Design and Implement UK SOC monitoring service Due to the nature and urgency of this post, candidates holding More ❯
You will ensure robust, efficient and globally coordinated security operations that protect the organisation's people, systems, and data. This includes direct ownership of security controls, security testing, vendor management, vulnerability and threatmanagement, and incident response. You will work daily with the Group CISO to support consistent, high-assurance security practices across all regions, in-line … with regional regulation and to support the management of cyber incidents. It is essential the individual who will fill this role has prior management experience, has supported building security teams previously and has knowledge around their responsibility at this level to report incidents and security concerns within regulatory timelines and standards. About the role Within this role, you … will have been supporting the Group CISO by managing the security team and programmes of work in your responsibility area. You will be responsible for the management of any global Cyber Incidents by supporting the CISO team. Additionally, you will be: Working collaboratively with the SOC to ensure 24/7 visibility and threat detection across global environments More ❯
Birmingham, West Midlands, England, United Kingdom
Crimson
Head of IT Security Incident and ThreatManagement - Solihull Crimson and IMI have joined forces to build IMI's new security team, and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future of … security within a successful global company, we want to hear from you! We are seeking a highly skilled and experienced Head of IT Security Incident and ThreatManagement to join our team. In this role, you will be responsible for leading the strategic efforts to safeguard the company's digital assets against potential threats and incidents. This role … requires a seasoned professional with a deep understanding of cybersecurity, incident response an threatmanagement within a FTSE 100 environment. The salary on offer for this position is between £90,000 and £110,000 per annum plus benefits. Key Responsibilities Develop and implement comprehensive incident response strategies to address security threats swiftly and effectively Lead the threatMore ❯
We are supporting a global consulting group's award-winning cyber security practice in the hiring of a Director specialising in Identity & Access Management (IAM) advising into the UK Financial Services sector. Working on a hybrid basis, the role, team, and clients are London-centric. The position offers a basic salary of approximately £200,000 plus additional cash benefits … annual bonuses, and broad benefits. Our client's cyber security services are organized into three capability groups: Cyber Risk, Resilience, and Privacy Identity and Access Management (IAM) and Cloud Security Cyber ThreatManagement They serve clients across three coverage sectors: Financial Services Sectors Infrastructure, Government, and Health A key focus of this role is leading the delivery … in other coverage groups and Technology Risk. Managing relationships with IAM alliance partners like SailPoint, CyberArk, Okta, to foster collaboration and sales opportunities. Working with IAM leadership on people management to support strategic goals. Connecting business transformation initiatives with IAM, and shaping the future of IAM through innovative services and tools. Building a pipeline of opportunities and securing client More ❯
We are supporting a global consulting group's award-winning cyber security practice in the hiring of a Director specialising in Identity & Access Management (IAM) advising into the UK Financial Services sector. Working on a hybrid-basis, the role, team and clients are London-centric - and will pay c£200,000 basic plus extra cash benefits, annual bonuses and … broad benefits. We are supporting a global consulting group's award-winning cyber security practice in the hiring of a Director specialising in Identity & Access Management (IAM) advising into the UK Financial Services sector. Working on a hybrid-basis, the role, team and clients are London-centric - and will pay c£200,000 basic plus extra cash benefits, annual … bonuses and broad benefits. Our client's cyber security services are defined within three capability groups: Cyber Risk, Resilience and Privacy Identity and Access Management (IAM) and cloud security Cyber ThreatManagement They provide cyber security services to clients across three coverage groups: Financial Services Sectors Infrastructure, Government and Health A key emphasis of the role will More ❯