Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
project to ensure the efficient operation of end user devices, including Laptops, phones, handheld devices etc. The primary responsibility with the role will be vulnerabilityManagement, including conducting regular assessments, implementing security measures and liaising with various depts. The successful candidate will implement and manage software patches promptly … and configure MS Teams, Intune and Endpoint Config Manager accordingly. Skills required: - Relevant experience in vulnerabilitymanagement and endpoint security Strong knowledge of MS Teams, Intune and Endpoint Configuration manager Familiar with identity and access management principles Responsibilities: Respond to incidents related to EUC reported through the … Implement and manage software patches for end user computing devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. Experience More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Somerset Bridge Group
manage the Infrastructure team. Assign tasks, manage workloads and ensure team members meet performance expectations. Facilitate professional development and skills training for the team.Process Management Implement and optimise ITIL-based processes for incident, problem and change management. Drive process improvements to increase operational efficiency and reduce incidents. Ensure service … level agreements (SLAs) are met or exceeded.Project Management Plan and manage infrastructure projects such as upgrades, migrations and deployments. Define project scope, timelines and budgets, ensuring projects are delivered on time and within budget. Coordinate with vendors and service providers for procurement and support.Security & Compliance Collaborate with IT Compliance … to ensure infrastructure is secure and compliant with industry regulations. Manage regular security audits, patch management and vulnerability assessments in accordance with the VulnerabilityManagement framework.Stakeholder Management Develop and maintain strong relationships with key stakeholders across the organisation. Liaise with suppliers and service providers to More ❯
About Comply365 Comply365 is a leading provider of Operational Content Management, Safety Management, and Training Management in the highly regulated industries of Aviation, Defense, and Rail. We provide a powerful combination of expertise and products underpinned by unified best practices, empowering airlines, rail, and defense organizations with … the most comprehensive product portfolio to elevate operational excellence, and transform safety management and training, with closer integration of data across these domains. Comply365 ensures our customers' teams and assets are always geared for peak operational performance and unlocks unparalleled financial and operational gains through more streamlined, robust, and … and methods. Experience designing secure networks, systems, and application architectures. Eligible for SC Clearance (lived in the UK for 5 years or more). VulnerabilityManagement Carry out internal vulnerability assessments in line with industry best practice. Manage our 3rd party penetration testing (Continuous Security Testing) service More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Duel
Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerability scanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development process. Assist in securing … to security compliance frameworks such as ISO 27001 or SOC 2, even if not previously responsible for certification processes. Experience working within security risk management, vulnerability tracking, or operational security efforts. Prior experience working with engineering teams on security topics is beneficial, particularly around secure development practices. Ability … or Vanta. Experience working with pen testing and bug bounties a plus. Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerabilitymanagement solutions. Experience or knowledge of cloud security (AWS, GCP, or Azure). Awareness of security best practices in application and infrastructure security. More ❯
frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • VulnerabilityManagement and More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Frontier Resourcing Ltd
by embedding robust security controls throughout the development lifecycle, identifying and mitigating risks, and ensuring compliance with defence-grade standards. Key Responsibilities Risk Assessments & VulnerabilityManagement Conduct comprehensive security risk assessments at each product phase (design, implementation, deployment). Identify vulnerabilities in architectures, codebases, and configurations; drive remediation …/53, JSP 440/604, Def Stan 05-series). Lead the creation and maintenance of security documentation (RMADS, Security Assurance Documents, Security Management Plans). Testing & Assurance Design and execute penetration tests and automated vulnerability scans; validate fixes. Oversee third-party security assessments as required. Continuous … across teams. Qualifications & Experience Proven experience (5+ years) in product or application security within defence, government, or security-cleared environments. Deep knowledge of risk management frameworks (ISO 27001/2/5/31000, NIST 800-series) and Defence Standards (JSPs, Def Stan 05-138/139). Hands More ❯
equivalent + 6-7 years in InfoSec Experience maturing security programs & frameworks ( ISO27001, NIST CAF, OWASP ) Strong knowledge of SIEM, IDS/IPS, RBAC, vulnerabilitymanagement Understanding of cloud, COTS/SaaS platforms & IoT security Ability to communicate risks & strategies at executive level Full driving license & personal transport More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
e.g., AWS Shield, Security Hub, IAM). Knowledge of security frameworks such as ISO 27001, NIST, or CIS benchmarks. Experience in application security reviews, vulnerabilitymanagement, and security controls implementation. Familiarity with OWASP Top 10, CWE, and secure coding practices. Proficiency in using security tools such as static More ❯