and work closely with stakeholders to ensure compliance and security best practice across the business. You will also assist with maintaining and improving the company’s accredited Information Security Management System (ISMS), with a particular focus on ISO 27001 and Cyber Essentials Plus requirements. In addition, you will help mentor team members, providing guidance and support to develop their … is considered throughout the entire SDLC. Creates and maintains documentation around the use of cyber security technology in the organisation. Carries out threat detection and incident response. Carries out vulnerabilitymanagement and remediation. Collaborates as needed with third-party security vendors for expert advice and issue resolution. Carries out threat intel research and recommends security improvements. Qualifications Extensive … PHP, MySQL, PostgreSQL, Nginx, Mercurial and Git. Good understanding of cyber security practices in relation to cloud hosting, preferably with experience of AWS. Good understanding of open-source risk management using enterprise management tools. An understanding of Service Management disciplines, ideally using the ITIL framework. Ability to keep up to date with technology trends and to understand More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
and wider business goals Build and implement policies, procedures, and board-level metrics to support the strategy Lead on the development and maturity of the organisation’s Cyber Risk Management Framework Drive a security-aware culture across departments through training, communication, and engagement Operational Security Oversight Support architectural decisions and strengthen the company’s threat modelling approach Lead incident … response efforts and run simulations, red team exercises, and readiness activities Conduct proactive assessments of emerging threats and implement mitigation strategies Oversee vulnerabilitymanagement across a hybrid cloud estate Manage security tooling and third-party SOC relationships Assess new technologies from a security standpoint, including AI initiatives Provide support to commercial teams with security input for tenders, bids … response and security operations Familiarity with compliance standards such as ISO 27001, SOC 2, HIPAA, GDPR Excellent communication skills; able to influence both technical and non-technical stakeholders Project management capabilities and experience delivering key security initiatives #J-18808-Ljbffr More ❯
us at Barclays Internal Audit as a Cyber Audit AVP where you will collaborate with cross-functional teams to provide independent and reliable Cyber Security audit assurance to executive management and the Board on governance, risk management, and control effectiveness. In this role, you will contribute to audit planning and execution, risk assessment, control evaluation, and issue resolution. … assurance) covering Cyber Security. Experience in developing and executing assurance testing approaches in some of the following areas: data security (including cryptography), security configuration, network security, cyber incident response, vulnerabilitymanagement, cyber threat management, information risk management, data leakage protection, identity & access management, cyber resilience. Knowledge of new and emerging technology, cyber security, and cyber More ❯
us at Barclays Internal Audit as a Cyber Audit AVP where you will collaborate with cross-functional teams to provide independent and reliable Cyber Security audit assurance to executive management and the Board on governance, risk management, and control effectiveness. In this role, you will contribute to audit planning and execution, risk assessment, control evaluation, and issue resolution. … assurance) covering Cyber Security. Experience in developing and executing assurance testing approaches in some of the following areas: data security (including cryptography), security configuration, network security, cyber incident response, vulnerabilitymanagement, cyber threat management, information risk management, data leakage protection, identity & access management, cyber resilience. Knowledge of new and emerging technology, cyber security, and cyber More ❯
Chester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
for first and second line support tasks including: request handling from receipt through resolution or handover to senior engineers; commissioning and maintenance of assets (hardware and software); auditing; project management; and documentation. Responsibilities Providing support to staff throughout the business (troubleshooting/diagnosis, resolution and escalation). Recording details of support requests and ensuring that procedures and other documentation … knowledge of source control systems (Perforce & TortoiseSVN) Working knowledge of Citrix and Parsec remote desktop applications Working knowledge of System Center Configuration Manager(SCCM) Working knowledge of patching and vulnerabilitymanagement Extensive experience with Desktop PC hardware Understanding of basic LAN/WAN technologies (e.g. TCP/IP, OSI 7 layer model, etc). Remote administration tools for … for first and second line support tasks including: request handling from receipt through resolution or handover to senior engineers; commissioning and maintenance of assets (hardware and software); auditing; project management; and documentation. Responsibilities Providing support to staff throughout the business (troubleshooting/diagnosis, resolution and escalation). Recording details of support requests and ensuring that procedures and other documentation More ❯
Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerabilitymanagement platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be More ❯
multiple security domains whilst working with wider enterprise architecture, technical SMEs, and platform owners. Key qualifications and skills required: Strong technical background in multiple security domains (Identity and Access Management, Data Protection, Networking, Endpoint Protection, VulnerabilityManagement, Application Security, and Security Operations). Ability to think strategically but have the technical expertise to deliver detailed roadmaps and … security benefit realization. An understanding of the commercial and operating model implications of proposed Cyber Security and Operational Resilience architecture strategies and roadmaps. Excellent senior stakeholder and third-party management skills. Capability to develop content optimized for target audiences including executive and senior-level committees as well as technical authorities and forums. Strong influencing and communication skills, with business … and technical teams. Excellent leadership skills and a 'can do' attitude - always positive and professional. Strong management and organizational skills. Excellent commercial awareness and financial management skills. Able to maintain composure and professionalism in pressurized, stressful, and uncertain situations. Ability to listen, communicate, constructively challenge, and influence team members, immediate peer group, Operational Resilience function senior team, and More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
col-narrow-right Job Views: 5 Posted: 16.06.2025 Expiry Date: 31.07.2025 col-wide Job Description: Who we are looking for An Information Security Analyst, who will work within our vulnerabilitymanagement team, which focuses on the technical side, ensuring IT systems are operated in a secure manner. The Information Security department monitor our live operation, creating and reacting … to alerts and other anomalies identified through automated tools or manual analysis. The vulnerabilitymanagement (VM) function covers two high-level areas, including owning the processes and schedules relating to the vulnerability scanning of all endpoints in the Business. You will review the results in terms of risk and impact assessment, additionally you will own the scheduling … of, and planning for specialist third-party vulnerability and penetration testing, in addition to the collation of reports. Liaising with parts of the Business, will aid your understanding of the risk profile then advice on options to resolve any issues identified. You will work closely with colleagues in the governance and compliance functions to ensure the Company meets its More ❯
in the field to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and training sessions, where More ❯
Crewe, Cheshire, United Kingdom Hybrid / WFH Options
Manchester Digital
e.g., Python, Bash, PowerShell. - Understanding of containerization, microservice architecture and cloud/software design patterns, GitLab or similar for CI/CD. - Understanding and implementation of security hardening and vulnerability management. - Understanding and management of identity providers and SSO configurations (Azure AD , Ory, Cognito, Firebase) - Understanding of Site Reliability Engineering and key concepts - Proficient in Infrastructure as Code … Cassandra - Experience with virtualisation platforms such as VMWare, Hyper V - Storage and Data availability systems, e.g., HP Nimble, NetApp. - Networking and Domain Communication, e.g., LDAP, DNS , VPN, Firewalls. - Configuration Management, e.g., Ansible, Puppet. - Thorough understanding of Infrastructure as Code principles and related tech such as Terraform or CloudFormation - Enhanced experience of AWS cloud technologies, e.g., ECS, EC2, VPC, Lambda More ❯
wide Job Description: High-Growth Cybersecurity Software Company Remote £45,000 to £55,000 per annum (depending on experience) Who are we? Titania’s multi-award-winning risk-based vulnerabilitymanagement (RBVM) and network exposure management software has been used by elite cyber teams for over a decade to safeguard critical infrastructure. Its Nipper solutions prevent attacks … addition, the following skills/qualifications are highly desirable: Experience in the Cybersecurity Industry 3-5years experience managing and executing effective demand/lead generation campaigns Strong project management and communication skills Understanding of B2B buyer journeys and sales funnels Self-motivation and proactive approach Strong ability to manage own time and prioritise workload Experience managing external agencies … to scale campaigns/execution KPI management (e.g. MQLs, MQL to SQL, MQL to customer, Cost per MQL, CAC, CLV) If you are the successful candidate, you will be rewarded with a generous holiday package starting at 25 days (plus bank holidays), including optional duvet days. Titania also offers an award-winning, cash-back healthcare plan, a competitive pension More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
to support mid-size to enterprise customers across sectors, including opportunities to travel to Florida, Sweden, and other international locations. What You'll Do: Assist on consultancy projects involving vulnerabilitymanagement, patching, and automation Support with troubleshooting OS-level issues (Windows/macOS/Linux) Scripting in Python, PowerShell, or Bash Learn and apply security best practices Contribute More ❯
cultivating relationships with other teams and stakeholders. Does the work get challenging at times? Yes! But you’ll collaborate with a diverse group of talented people and gain invaluable management and organizational skills, which will come in handy as you move forward in your career. Every position at Kyndryl offers a way forward to grow your career, from Junior … Mainframe z/OS system operations Experience with Mainframe product installation Willing to learn and grow future Mainframe Skills Eligible for UK Security Clearance (must have) Nice to have: Vulnerabilitymanagement expertise Familiarity with ticketing tools (SM9, ServiceNow) Mainframe-related certifications are a plus #J-18808-Ljbffr More ❯
cultivating relationships with other teams and stakeholders. Does the work get challenging at times? Yes! But you’ll collaborate with a diverse group of talented people and gain invaluable management and organizational skills, which will come in handy as you move forward in your career. Every position at Kyndryl offers a way forward to grow your career, from Junior … Mainframe z/OS system operations Experience with Mainframe product installation Willing to learn and grow future Mainframe Skills Eligible for UK Security Clearance (must have) Nice to have: Vulnerabilitymanagement expertise Familiarity with ticketing tools (SM9, ServiceNow) Mainframe-related certifications are a plus #J-18808-Ljbffr More ❯