Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
vulnerabilities or breaches. Collaborate with teams to resolve performance issues and ensure business continuity. Monitor and maintain security infrastructure, including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and remediation. Perform root cause analysis More ❯
Stafford, England, United Kingdom Hybrid / WFH Options
GE Vernova
trends, ICS/OT threat landscapes, and emerging technologies, recommending tools and methods to enhance product security posture. Partner with PSL, incident response and product security teams to support vulnerability remediation, post-incident analysis, and contribute to the creation of security documentation, including architecture specs, procedures, and training materials. Represent the company in industry forums, standards bodies, and technical … C++, RTOS), as well as Linux/Windows platforms. Strong hands-on background in PKI, identity management, network security appliances, and security monitoring. Proficient in threat modeling, risk/vulnerabilityassessment, and using forensic/security analysis tools.. Excellent communication and stakeholder engagement skills, able to translate technical content for non-technical audiences. Exposure to quality improvement methodologies … vision, and prescription drug coverage; access to a Health Coach, a 24/7 nurse-based resource; and access to the Employee Assistance Program, providing 24/7 confidential assessment, counseling and referral services. Retirement benefits include the GE Retirement Savings Plan, a tax-advantaged 401(k) savings opportunity with company matching contributions and company retirement contributions, as well More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
CET Structures Limited
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Desirable Skills Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Desirable Skills Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL More ❯
Walsall, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL servers – database More ❯
Dudley, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL servers – database More ❯
Stratford-upon-Avon, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL servers – database More ❯
Wolverhampton, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL servers – database More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
CET Careers
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL servers – database More ❯
Telford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Assess compliance with internal security policies and industry standards (e.g., ISO/IEC 27001/2, PCI-DSS). Conduct supplier risk assessments and third-party due diligence. Support vulnerability assessments, incident investigations, and operational resilience activities. Monitor the effectiveness of security controls to ensure confidentiality, integrity, and availability (CIA). Assist with security certifications and regulatory frameworks including … business-friendly advice. Stay on-call during scheduled weeks for incident support and response. Requirements Solid understanding of cyber security, governance, and risk management principles. Experience with risk/vulnerability assessments and incident management. Experience first and second line support Strong analytical thinking and attention to detail. Familiarity with compliance frameworks like ISO 27001/27002, NIST Cybersecurity Framework More ❯
Shrewsbury, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Assess compliance with internal security policies and industry standards (e.g., ISO/IEC 27001/2, PCI-DSS). Conduct supplier risk assessments and third-party due diligence. Support vulnerability assessments, incident investigations, and operational resilience activities. Monitor the effectiveness of security controls to ensure confidentiality, integrity, and availability (CIA). Assist with security certifications and regulatory frameworks including … business-friendly advice. Stay on-call during scheduled weeks for incident support and response. Requirements Solid understanding of cyber security, governance, and risk management principles. Experience with risk/vulnerability assessments and incident management. Experience first and second line support Strong analytical thinking and attention to detail. Familiarity with compliance frameworks like ISO 27001/27002, NIST Cybersecurity Framework More ❯
Wolverhampton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Assess compliance with internal security policies and industry standards (e.g., ISO/IEC 27001/2, PCI-DSS). Conduct supplier risk assessments and third-party due diligence. Support vulnerability assessments, incident investigations, and operational resilience activities. Monitor the effectiveness of security controls to ensure confidentiality, integrity, and availability (CIA). Assist with security certifications and regulatory frameworks including … business-friendly advice. Stay on-call during scheduled weeks for incident support and response. Requirements Solid understanding of cyber security, governance, and risk management principles. Experience with risk/vulnerability assessments and incident management. Experience first and second line support Strong analytical thinking and attention to detail. Familiarity with compliance frameworks like ISO 27001/27002, NIST Cybersecurity Framework More ❯
Assess compliance with internal security policies and industry standards (e.g., ISO/IEC 27001/2, PCI-DSS). Conduct supplier risk assessments and third-party due diligence. Support vulnerability assessments, incident investigations, and operational resilience activities. Monitor the effectiveness of security controls to ensure confidentiality, integrity, and availability (CIA). Assist with security certifications and regulatory frameworks including … clear, business-friendly advice. Stay on-call during scheduled weeks for incident support and response. Requirements Solid understanding of cybersecurity, governance, and risk management principles. Experience with risk/vulnerability assessments and incident management. Experience with first and second line support. Strong analytical thinking and attention to detail. Familiarity with compliance frameworks like ISO 27001/27002, NIST Cybersecurity More ❯
telephony/contact center platforms, and cloud data services. • Define correlation rules and alerts for proactive incident detection and response. Application Security: • Conduct secure code reviews, threat modelling, and vulnerability assessments. • Work with development and operations teams to integrate security into the SDLC and CI/CD pipelines. More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
encryption. * Ensure the security and integrity of the organisation's network infrastructure. * Collaborate with various departments to develop and enforce network security policies and procedures. * Conduct security assessments and vulnerability assessments to identify and mitigate potential risks. * Development of OT security solutions * Stay up to date with the latest industry trends and emerging technologies in network security. * Provide support More ❯
encryption. Ensure the security and integrity of the organisation’s network infrastructure. Collaborate with various departments to develop and enforce network security policies and procedures. Conduct security assessments and vulnerability assessments to identify and mitigate potential risks. Development of OT security solutions Stay up to date with the latest industry trends and emerging technologies in network security. Provide support More ❯
for a driven technology auditor who wants to play a role in audit execution which focuses on the review of technology processes, the analysis of risks involved, and the assessment of the design and operating effectiveness of the controls implemented to mitigate the risk. Audits may include the assessment of areas such as access management, IT operations, job … scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerabilityassessment and penetration testing, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology consulting or other relevant industry experience Basic understanding of software More ❯
those risks. Audits may include areas such as access management, IT operations, job scheduling/monitoring, data transfer (ensuring completeness and accuracy), network security, cybersecurity, system development and testing, vulnerability assessments, penetration testing, and operational resilience. This is a contract-to-hire position under Inside IR35, onsite in Birmingham 5 days a week. MUST HAVES: Experience as a technology … application development, information security, technology consulting, or relevant industry experience Basic understanding of software development concepts, system architecture, databases, operating systems, and messaging Proven experience in risk identification and assessment Ability to prepare and present audit conclusions and findings to senior management and stakeholders Knowledge of data analysis using Excel A strong interest in building a long-term career More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
RSM
Cyber Security Consultant to join our team at RSM UK. You will work alongside our specialists to deliver offensive security services including digital footprint reconnaissance, social engineering, penetration testing, vulnerability assessments, and more to high-profile clients across various industries. The role involves delivering cyber risk and control assessments, developing cyber programs, and conducting offensive security services such as … vulnerability assessments and cyber incident response exercises. You will receive ongoing coaching, career mentoring, and support through our career pathway, with opportunities to develop market-leading skills and professional growth. Key Responsibilities: Supporting technical scoping activities for client assignments. Delivering fieldwork and preparing reports. Managing tasks effectively to completion. Staying updated on the latest cyber threats and technology trends. More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
policies, and procedures to ensure clear understanding across the organisation. * Stay up-to-date with the latest security trends, technologies, and regulations to continuously improve our security practices. * Conduct vulnerability assessments and risk analysis. * Conduct Security Audits and Assessments: Perform regular security assessments to ensure compliance with industry standards. * Create and maintain security policies to ensure data confidentiality, integrity More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯