is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
background required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. Experience More ❯
Manchester OR Hertfordshire - Hybrid, Manchester, England Hybrid / WFH Options
InfraView
leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a "people manager" as well … business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerabilitymanagement, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and … SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerabilitymanagement tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and controls … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory … a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. More ❯
Act as a key liaison between internal stakeholders, managed service providers, and external vendors to ensure operational continuity and alignment with business objectives. Infrastructure Management Oversee the day-to-day performance and availability of core infrastructure systems, including networks, servers, storage, and cloud services. Monitor infrastructure platforms proactively to … units. Service Operations & Technical Support Provide third-line support across infrastructure layers, supporting internal users and IT service desk teams. Maintain and enforce access management protocols for infrastructure components and enterprise applications. Lead incident resolution efforts involving infrastructure systems, ensuring timely escalation to third-party experts when required. Vendor … enhance Microsoft 365 security posture across the organization. Manage the configuration and policy enforcement of Microsoft Intune, including compliance and device security baselines. Oversee vulnerabilitymanagement and endpoint patching activities in partnership with external security consultancies. Administer firewall configurations and ensure consistent deployment across all locations and platforms. More ❯
for this role. We're on the hunt for a motivated, engaged Security Operations Analyst to support, maintain and improve/contribute to the management of real time security operations, including real time analysis and ongoing security management across Vix's application suite. This opportunity will suit someone … judgment when working with sensitive information Experience with application/device security monitoring (i.e., Firewalls, IDS/IPS, Anti-Virus) Experience with SIEM tools & VulnerabilityManagement (AlienVault, Nessus, Qualys) Demonstrated ability to work as part of a team to deliver project outcomes within specified parameters including timeframes and More ❯
compliance Establish and enforce IT security policies and procedures Ensure compliance with relevant regulations, such as GDPR and PCI DSS Oversee security operations, including vulnerabilitymanagement and incident response What are we looking for? Senior-level IT leadership experience, including team management and strategic oversight. Deep hands More ❯
compliance Establish and enforce IT security policies and procedures Ensure compliance with relevant regulations, such as GDPR and PCI DSS Oversee security operations, including vulnerabilitymanagement and incident response What are we looking for? Senior-level IT leadership experience, including team management and strategic oversight. Deep hands More ❯
compliance Establish and enforce IT security policies and procedures Ensure compliance with relevant regulations, such as GDPR and PCI DSS Oversee security operations, including vulnerabilitymanagement and incident response What are we looking for? Senior-level IT leadership experience, including team management and strategic oversight. Deep hands More ❯
Employment Type: Permanent
Salary: £80000 - £85000/annum discretionary bonus and more
experience as a SOC/Security Engineer within a cloud environment Strong CrowdStrike experience is needed Experience with a range of SIEM, SOAR and vulnerabilitymanagement tools Experience advising on security best practices and developing SOC playbooks Networking and infrastructure experience, including with Firewalls and IDS/IPS More ❯
experience as a SOC/Security Engineer within a cloud environment Strong CrowdStrike experience is needed Experience with a range of SIEM, SOAR and vulnerabilitymanagement tools Experience advising on security best practices and developing SOC playbooks Networking and infrastructure experience, including with Firewalls and IDS/IPS More ❯
early as possible Making sure that decisions are based on robust data, return on investment and value measures that demonstrate thoughtful and intelligent cost management Encouraging the identification of ideas and driving the delivery of initiatives that will reduce cost and simplify the bank Building and leveraging relationships with … architecture principles and practices, including secure design and implementation. Hands-on experience with security tools and technologies, such as SIEM, IDS/IPS, and vulnerabilitymanagement systems. The ability to communicate technical issues in a clear and concise manner to senior stakeholders More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Interact Consulting Ltd
/CD pipelines and integrating security tooling. Scripting Responsibilities: Lead efforts to assess the current security posture of Azure infrastructure, encompassing Azure resources, processes, vulnerabilitymanagement tools, and techniques. Collaborate with the wider Infosec team and any third-party consultants engaged by the client to provide recommendations based … into CI/CD pipelines. Maintain an active risk registry and devise a plan to address identified issues in order of priority, ensuring proactive management of security risks. More ❯
background required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will ... More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Manchester Digital
and approach highly. Experience with solutioning SIEM, SOAR, or Managed Security Services is preferred. Hands-on experience with DDoS, WAF, IDAM, EDR, MDM, or VulnerabilityManagement is a plus. We are also interested in candidates with operational expertise in these areas who are looking to transition into technical More ❯
SOAR, or Managed Security Services, this could be the perfect next step - and any hands-on experience with DDoS, WAF, IDAM, EDR, MDM, or VulnerabilityManagement will be a huge plus. We are also interested to hear from candidates with operational expertise in these areas, who are looking More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Nomios UK&I Limited
also love to receive applications from people with skills solutioning SIEM, SOAR, or Managed Security Services (experience in DDoS, WAF, IDAM, EDR, MDM or VulnerabilityManagement is a plus). We are also interested to hear from candidates with operational expertise in these areas, who are looking to More ❯
Security and Networking. Knowledge of SIEM, SOAR, or Managed Security Services is advantageous, particularly in areas like DDoS protection, WAF, IDAM, EDR, MDM, or Vulnerability Management. Multi-vendor knowledge, e.g. Fortinet, Palo Alto, CrowdStrike. Please apply now for immediate consideration More ❯
Senior SOCAnalyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's Overall Cyber Incident Management Process. You will work closely with the InfoSec Engineering Team within the Security Department to Define Requirements of the Tools & Onboard New Functionality. You … take Responsibility for Tuning & Maintaining Security Platforms to Deliver the Best Capability to other Information Security Analysts & SOC Analysts & Clients in Identifying & Delivering Threat & Vulnerability Management. You will act as Subject Matter Expert & Escalation Point for other SOC Analysts and will work closely with both the Senior Security Operations … Skills & Experience Required for Senior SOC Analyst role will include: Strong Experience in Security Operations or a related Information Security role Ideally leadership or Management Experience Strong Understanding of Information Security Principles & Technologies. Excellent Analytical & Problem-Solving Skills. Commercial Awareness & (Ideally) Experience of PCI DSS (Current Version) Knowledge of More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Senitor Associates
you’ll need: 3+ years in a security architecture or cyber consulting role Deep knowledge of enterprise security services – Pen Testing, Threat Modelling, Logging, Vulnerability Mgmt, and Incident Response Proven ability to produce secure design templates and influence technical direction Excellent communication, stakeholder management, and documentation skills CISSP More ❯