Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Overview Monitor and manage IT security infrastructure Conduct vulnerability assessments and penetration tests Lead incident response and mitigation Implement security policies and procedures Ensure compliance with GDPR, ISO27001 Work with SIEM tools for threat detection Manage access controls and firewalls Oversee employee security awareness programs Respond to emerging cyber threats Document incidents and reports Collaborate with IT teams on More ❯
Nottingham, Nottinghamshire, England, United Kingdom Hybrid / WFH Options
Digital Waffle
response plans, ensuring continuous improvements Integrate security practices seamlessly into the DevOps pipeline Manage and optimise monitoring tools to provide real-time threat visibility Carry out regular threat and vulnerability assessments, applying effective remediation strategies Coach and mentor colleagues, keeping the team ahead of evolving risks and technologies What you bring: Significant experience in security operations across both cloud More ❯
strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security practices. Manage the relationship with the external SOC, ensuring proactive threat detection and response. Stay updated on industry More ❯
Birmingham, Chelmsley Wood, West Midlands (County), United Kingdom
SSR General & Management
strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security practices. Manage the relationship with the external SOC, ensuring proactive threat detection and response. Stay updated on industry More ❯
Lincoln, Lincolnshire, East Midlands, United Kingdom
MASS Consultants
Deliver Cyber Essentials and Cyber Essentials Plus assessments to clients Strengthen our internal security posture and processes Provide expert guidance on large, customer-facing projects Support penetration testing and vulnerability assessments, building real-world cyber skills The invaluable experience youll bring, to help us achieve more Essential: Around 3 years experience in an IT role Familiarity with operating systems More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
UKRI
organisation to identify, assess, and mitigate risks, ensuring security policies and processes align with organisational objectives and regulatory requirements. Advise stakeholders and implement effective security solutions, providing oversight for vulnerability assessments, remediation activities, and technical control evaluations. Promote a culture of security by participating in awareness programs, supporting internal and external audits, and assisting in the development of policy … standards, and procedures. Lead the collection, analysis, and presentation of InfoSec performance metrics, and prepare briefings for senior leaders on studies and plans. Analyse data from security assessment tools and systems, identify process inefficiencies, and contribute innovative solutions to improve security and efficiency across projects and initiatives Personal Specification: The below criteria will be scored during Shortlisting (S), Interview … I). Essential A professional certification (e.g., CISM, CISSP, CompTIA Security+, CCSP or AWS certification). Degree in a related subject or relevant comparable education. Solid experience with risk assessment methodologies and vulnerability management processes, including relevant tooling. (S&I) Excellent analytical, problem-solving, and decision-making skills, with strong attention to detail. (I) Proficient in communicating complex More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
robust and secure technology framework. Job Description Work with managed service provider for cyber security incident management Proactively conduct threats detection and improve threats detection and management process Conduct vulnerability assessments, ensure the remediation and recommend improvements to mitigate risks. Develop security playbooks Work with engineering team to implement security tools and controls Scope penetration testing and review related … newly acquired businesses Provide guidance and training to staff on cybersecurity best practices. The Successful Applicant Proven experience in cyber security operations including threats hunting, detection and response, vulnerabilities assessment remediation Familiarity with data protection regulations and compliance requirements such as ISO27001, GDPR Solid experience in SIEM tools, preferably Microsoft Sentinel Relevant certifications are desirable. Excellent stakeholder management skill More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Michael Page Technology
a robust and secure technology framework. Description Work with managed service provider for cyber security incident management Proactively conduct threats detection and improve threats detection and management process Conduct vulnerability assessments, ensure the remediation and recommend improvements to mitigate risks. Develop security playbooks Work with engineering team to implement security tools and controls Scope penetration testing and review related … posture to newly acquired businesses Provide guidance and training to staff on cybersecurity best practices. Profile Proven experience in cyber security operations including threats hunting, detection and response, vulnerabilities assessment remediation Familiarity with data protection regulations and compliance requirements such as ISO27001, GDPR Solid experience in SIEM tools, preferably Microsoft Sentinel Relevant certifications are desirable. Excellent stakeholder management skill More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
RSM UK
enthusiastic Cyber Security Consultant to join our team. Working alongside our experienced team of specialists, you'll deliver offensive security services including digital footprint reconnaissance, social engineering, penetration testing, vulnerability assessments, and more to high-profile clients across all industries. The purpose of this role is to deliver offensive security services such as digital footprint reconnaissance, social engineering, vulnerabilityMore ❯