to security incidents, including malware, phishing, and unauthorized access attempts. Document incidents and produce reports for internal stakeholders and governance teams. Threat Prevention & Risk Management Arrange/conduct regular vulnerability assessments and penetration testing. Implement and manage security tools such as firewalls, antivirus, and endpoint detection systems. Collaborate with third-party providers to maintain and enhance cyber resilience capabilities. More ❯
documentation (e.g., designs, network diagrams, data flows) to ensure alignment with security policies and architecture. Conduct Information Security Impact Assessments and Data Protection Impact Assessments. Support penetration testing and vulnerability assessments, tracking remediation to closure or handover to BAU. Translate technical risks into business language for stakeholders. Maintain alignment with ISO27001 and other frameworks (e.g., NIST). Advise on More ❯
L33, Knowsley, Merseyside, United Kingdom Hybrid / WFH Options
Curveball Solutions
business objectives. Draft, maintain, and implement information security policies and Standard Operating Procedures (SOPs). Configure and oversee mobile security—MDM (MAM/BYOD)—to protect business continuity. Lead vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Author compelling tender responses, clearly demonstrating technical capability and strategic value. Enhance Microsoft 365 security—leveraging Purview, Conditional Access, MFA More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Curveball Solutions
evolving business objectives. Draft, maintain, and implement information security policies and Standard Operating Procedures (SOPs). Configure and oversee mobile securityMDM (MAM/BYOD)to protect business continuity. Lead vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Author compelling tender responses, clearly demonstrating technical capability and strategic value. Enhance Microsoft 365 securityleveraging Purview, Conditional Access, MFAto safeguard More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
CRM's UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
CRM's UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
legacy CRMs UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯