Manchester, England, United Kingdom Hybrid / WFH Options
The MRJ Group
security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and controls for EUC environments, including endpoint … respond to security incidents, conducting forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory requirements. Collaborate Across Teams: Work … secure cloud architectures. Engagement: Foster a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. Security Automation & Optimization : Develop, implement More ❯
security controls. Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerabilitymanagement etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security controls, identify risks and propose treatment plans. Conduct regular vulnerability … Role: Essential: 3-5 years of experience in Information Security. Strong understanding of security principles, technologies, and best practices. Experience in networking, infrastructure (on-prem and in the cloud), vulnerability and incident management. Familiarity with application/device security monitoring (e.g. Firewalls, IDS/IPS, XDR etc.). Experience with SIEM/CNAPP/Log collection platforms (e.g. CrowdStrike … Lacework etc.) and capability to design, implement and manage such solutions. Experience with implementation of identity and access management (IAM) solutions. Ability to work in a team to deliver project outcomes within timeframes and objectives. Self-directed work experience, including planning and organising tasks. AWS experience and/or AWS security/administration certifications (e.g. AWS Certified Security etc. More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Board Communicate the information security strategy to relevant parties, as well as developing supporting policies and procedures required to meet the strategy Develop, maintain, and expand the Cyber Risk Management Framework as part of the overall Information Security Management System (“ISMS”) Responsible for the Company’s information security capabilities, including the technical training and awareness of colleagues, ensuring … containment and mitigation activities, as well as preparing for incidents by running threat simulations, tabletop and red team exercises Assess emerging and potential security threats using the Cyber Risk Management Framework and act proactively to mitigate relevant threats End-to-end vulnerabilitymanagement across the hybrid cloud environment Manage security toolset, including managing the relationship with the … GDPR, etc. Good communication and interpersonal skills, with the ability to effectively communicate security-related questions to technical and non-technical stakeholders (employees, customers, and/or partners) Project management skills, with the ability to manage projects such as processes implementation and improvement, security systems implementation Ability to collaborate cross-functionally and influence stakeholders at all levels of the More ❯
Board Communicate the information security strategy to relevant parties, as well as developing supporting policies and procedures required to meet the strategy Develop, maintain, and expand the Cyber Risk Management Framework as part of the overall Information Security Management System (“ISMS”) Responsible for the Company’s information security capabilities, including the technical training and awareness of colleagues, ensuring … containment and mitigation activities, as well as preparing for incidents by running threat simulations, tabletop and red team exercises Assess emerging and potential security threats using the Cyber Risk Management Framework and act proactively to mitigate relevant threats End-to-end vulnerabilitymanagement across the hybrid cloud environment Manage security toolset, including managing the relationship with the … GDPR, etc. Good communication and interpersonal skills, with the ability to effectively communicate security-related questions to technical and non-technical stakeholders (employees, customers, and/or partners) Project management skills, with the ability to manage projects such as processes implementation and improvement, security systems implementation Ability to collaborate cross-functionally and influence stakeholders at all levels of the More ❯
of security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. Relevant industry qualifications and certifications (CompTIA Security+, CEH, GCIH, GCIA CISSP etc) Experience … Knowledge of the following security products are ideal: ? SEIM (Rapid7 IDR, MS Sentinel, SPLUNK) ? SOAR (Rapid7 ICON, MS Sentinel) ? Endpoint Detection and Response (Microsoft Defender) ? Email Security (Proofpoint, Mimecast) ? VulnerabilityManagement (Rapid7 IVM, Nessus, Tenable) Proficiency with scripting and automation (e.g., Powershell, Python) Understanding of Zero-Trust Architecture within a hybrid cloud environment. Working knowledge of cyber threat More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
TechNET IT Recruitment Ltd
and wider business goals Build and implement policies, procedures, and board-level metrics to support the strategy Lead on the development and maturity of the organisation’s Cyber Risk Management Framework Drive a security-aware culture across departments through training, communication, and engagement Operational Security Oversight Support architectural decisions and strengthen the company’s threat modelling approach Lead incident … response efforts and run simulations, red team exercises, and readiness activities Conduct proactive assessments of emerging threats and implement mitigation strategies Oversee vulnerabilitymanagement across a hybrid cloud estate Manage security tooling and third-party SOC relationships Assess new technologies from a security standpoint, including AI initiatives Provide support to commercial teams with security input for tenders, bids … response and security operations Familiarity with compliance standards such as ISO 27001, SOC 2, HIPAA, GDPR Excellent communication skills; able to influence both technical and non-technical stakeholders Project management capabilities and experience delivering key security initiatives More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
TechNET IT Recruitment Ltd
and wider business goals Build and implement policies, procedures, and board-level metrics to support the strategy Lead on the development and maturity of the organisation’s Cyber Risk Management Framework Drive a security-aware culture across departments through training, communication, and engagement Operational Security Oversight Support architectural decisions and strengthen the company’s threat modelling approach Lead incident … response efforts and run simulations, red team exercises, and readiness activities Conduct proactive assessments of emerging threats and implement mitigation strategies Oversee vulnerabilitymanagement across a hybrid cloud estate Manage security tooling and third-party SOC relationships Assess new technologies from a security standpoint, including AI initiatives Provide support to commercial teams with security input for tenders, bids … response and security operations Familiarity with compliance standards such as ISO 27001, SOC 2, HIPAA, GDPR Excellent communication skills; able to influence both technical and non-technical stakeholders Project management capabilities and experience delivering key security initiatives Seniority level Seniority level Director Employment type Employment type Full-time Job function Job function Information Technology Industries Pension Funds and IT More ❯
and confidence in our organisation’s digital infrastructure. A Little About You... 3+ years experience in cyber security roles, with an understanding of networking protocols, security technologies, and risk management principles. Experience with security incident response, including handling and mitigating security incidents. Excellent analytical skills with the ability to assess complex security issues and develop practical solutions. Strong communication … proactive approach to professional development and staying updated on industry trends and emerging technologies. Knowledge of security tools and technologies, such as SIEM (Splunk), SOAR, DLP, endpoint protection, and vulnerability assessment tools. About The Role... Develop, implement, and maintain comprehensive cybersecurity strategies to protect organizational assets against cyber threats. Conduct regular risk assessments and vulnerability scans to identify … United Kingdom 4 days ago Manchester Area, United Kingdom 15 hours ago Manchester Area, United Kingdom 15 hours ago Huddersfield, England, United Kingdom 4 months ago Information Security Analyst - VulnerabilityManagement Manchester, England, United Kingdom 4 days ago Senior Threat Detection Engineer (Cyber Security) Stockport, England, United Kingdom 1 week ago Manchester, England, United Kingdom 1 week ago More ❯
Computer Science, Information Security, or a related field. At least 5 years of experience in a security engineering role. Strong knowledge of security technologies and concepts, such as Identity Management, SIEM, Encryption, VulnerabilityManagement, Secure Coding Standards etc. Familiarity with compliance standards and regulations, such as ISO27001, PCI-DSS, and GDPR. Experience with security assessments, penetration testing More ❯
Position: Cyber Security Lead Location: Manchester (90% remote) Salary: Up to £75,000 + Bonus Key Skills: Penetration testing Vulnerabilitymanagement Threat detection Cyber defence Security best practices CISSP, CISM or similar certification About the Role Are you a cybersecurity professional looking to lead the charge against evolving digital threats? We are seeking an experienced Cyber Security Lead … implement a comprehensive cybersecurity strategy to protect our IT environment. Establish, enforce, and regularly update security policies, protocols, and standards. Manage real-time threat detection, incident response, and conduct vulnerability assessments to safeguard our infrastructure. Oversee the deployment of security solutions, working closely with internal teams to strengthen our defences. Collaborate with external security partners to ensure high-quality … will bring a strong technical background in cybersecurity as well as a strategic approach. Key qualifications include: Professional certification such as CISSP, CISM, or similar. Significant experience in cybersecurity management, ideally within a medium-to-large organisation. Extensive knowledge of security technologies, risk assessment, and vulnerability management. Hands-on experience with security monitoring tools and incident response. Familiarity More ❯
and external audits by providing evidence of controls and contributing to audit readiness activities. Collaborate with the compliance and risk teams to ensure IT operations meet regulatory obligations. Support vulnerabilitymanagement efforts, including patching and system hardening. Assist in maintaining secure and efficient identity and access management practices, including integration with M365 and Azure AD. Contribute to … skills and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also Have More ❯
and external audits by providing evidence of controls and contributing to audit readiness activities. Collaborate with the compliance and risk teams to ensure IT operations meet regulatory obligations. Support vulnerabilitymanagement efforts, including patching and system hardening. Assist in maintaining secure and efficient identity and access management practices, including integration with M365 and Azure AD. Contribute to … skills and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also... Have More ❯
Bolton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
from Feb will be hybrid that they're trialling this from February. At least 5 years experience within a Security Operations role previously with at least plus security incident management experience. Ability to work independently to deliver personal and team objectives, liaising with relevant teams. Able to work under pressure and make judgment calls based on available information. Able … collaborative working with teams and stakeholders to share information, coordinate responses, and improve inter-team relationships. Exposure to key security technologies, such as IDS, Web content filters, AV, SIEM, VulnerabilityManagement, Firewalls, and awareness of their purpose in a layered security approach alongside analysing their outputs for security anomaly detection. In-depth understanding of the cyber threat landscape More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Smart DCC
share information, coordinate responses, and improve inter-team relationships. Previous experience within a Security Operations role. Exposure to key security technologies, such as IDS, Web content filters, AV, SIEM, VulnerabilityManagement, Firewalls, and awareness of their purpose in a layered security approach alongside analysing their outputs for security anomaly detection. In-depth understanding of the cyber threat landscape … applications such as AWS, Azure, Office 365, & Defender. Must have the ability to gain and hold HMG Security Clearance at “Security Check” (SC) level. 3 years plus security incident management experience. About the DCC: At the DCC, we believe in making Britain more connected, so we can all lead smarter, greener lives. That desire to make a difference is More ❯
candidates across the UK, with travel into London around once or twice a month (expenses-paid). Responsibilities: * Implement and manage security controls for Microsoft and Azure infrastructure. * Lead vulnerabilitymanagement and incident response. * Enhance security monitoring and IAM with Microsoft tools. * Drive security architecture and ensure endpoint security. * Support M&A security assessments and maintain compliance. Requirements More ❯
implement, and configure existing security toolsets, and implement new security solutions. The Security Engineer will work closely with next generation technologies utilising machine learning and artificial intelligence. Responsibilities: Implementation, management and maintenance of security toolsets Investigation of security events and incidents Resolution of service requests, incidents and problems Identification and remediation of vulnerabilities Identification of control gaps and ensuring … adherence to best practice and standards Creation and maintenance of operational procedures, configuration and technical documentation Management and maintenance of security metrics and reporting Maintaining an awareness of new and emerging security technologies and threats Ensuring continual development of technical skills through both external and internal training and certification Qualifications Essential Requirements: Strong knowledge of security technologies, including NGFW … WAF, IPS, EDR, NDR, AV, MDM, MFA, SIEM, email security, patch management, vulnerabilitymanagement and vulnerability scanning Good knowledge of infrastructure, cloud, virtualisation and network security Experience working within a regulated environment Experience following change management and similar ITIL best practice Strong attention to detail Demonstrable passion and enthusiasm for security, including the ability to More ❯
EMEA regions. Skills & Experience Minimum 4 years of experience in Cyber Security within an AWS cloud environment Experience with CrowdStrike is a plus Proven experience with PCI DSS compliance Vulnerabilitymanagement and compliance expertise Leadership in audit processes Knowledge of security standards including GDPR, ISO, PCI, NIST Excellent stakeholder communication and training skills Relevant cybersecurity certifications are desirable … office is a vibrant space with forward-thinking professionals. Key Responsibilities Develop and analyze security requirements and manage vulnerabilities in PCI DSS projects Maintain consistency in IT security risk management activities Advise engineers on vulnerabilities, threats, and remediation strategies Provide security training and support internally and to clients Compensation & Application The starting salary is up to £65,000, depending More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
BizMarComm
analytics and Security Automation Orchestration and Response (SOAR). We are looking for someone who has: Exposure to key security technologies, such as IDS, Web content filters, AV, SIEM, VulnerabilityManagement, Firewalls, and awareness of their purpose in a layered security approach alongside analysing their outputs for security anomaly detection. In-depth understanding of the cyber threat landscape More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Smart DCC
design and implement all security controls. In-depth understanding of the cyber threat landscape and advanced adversary tactics. Expert knowledge and experience of Linux, Windows, Azure, AWS, Elastic Search, Vulnerabilitymanagement, and Mitre ATT&CK. Excellent experience with NW configuration, Routing, Transit Gateways, Private endpoints, and log collection specifically Cloud watch, Cloudtrail, and S3 buckets. About the DCC More ❯
critical IT systems needed by the organisation in its daily operations. Security Operations has four key areas of focus: incident response; network monitoring and intrusion detection; security testing; and vulnerability management. Team members will be expected to work across all of these security functions as needed. The Role The Cyber Security Analyst plays a critical role in leading the … note that we are unable to respond to enquiries, accept CVs, or applications from Recruitment Agencies. Enquiries about the vacancy, shortlisting, and interviews: Name: Please contact our IT Resource Management Team. Email: it.resource@manchester.ac.uk General enquiries: Email: People.Recruitment@manchester.ac.uk Technical support: Jobtrain: 0161 850 2004 https://jobseekersupport.jobtrain.co.uk/support/home . This vacancy will close for More ❯
Bolton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
the security stack, identify areas for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with partners in infrastructure, security operations … year experience with a background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a distributed workforce. Strong written and verbal More ❯
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK Head of Security and consulting … Skills & Experience Required: 4+ years of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK Head of Security and consulting … Skills & Experience Required: 2+ years of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
som3 Recruitment
expand its technical team with the addition of a Junior Consultant. Specialising in preventative cybersecurity, the organisation helps clients improve their IT cleanliness through services such as patch and vulnerabilitymanagement, product engineering, and project delivery. With clients ranging from mid-sized businesses to enterprises of over 100,000 employees, the consultancy has built a reputation for delivering … driven workflows, a broad range of technologies, and mentoring from highly experienced professionals. Key Responsibilities Support technical delivery across cybersecurity and IT hygiene-focused projects Assist with patch and vulnerabilitymanagement implementations Collaborate with internal and client teams to troubleshoot and resolve issues Maintain clear and structured documentation Participate in the design and automation of IT/security … Desirable : Experience in large or enterprise-scale organisations Familiarity with scripting languages such as PowerShell, Bash, or Python Understanding of automation tools (e.g. Ansible, Chef) Exposure to patch and vulnerabilitymanagement tools or frameworks Knowledge of basic networking concepts (TCP/IP, DNS, DHCP, firewalls) Awareness of platforms like Tanium or other systems management tools Experience with More ❯