security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and controls for EUC environments, including endpoint … respond to security incidents, conducting forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory requirements. Collaborate Across Teams: Work … secure cloud architectures. Engagement: Foster a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. Security Automation & Optimization : Develop, implement More ❯
security controls. Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerabilitymanagement etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security controls, identify risks and propose treatment plans. Conduct regular vulnerability … Role: Essential: 3-5 years of experience in Information Security. Strong understanding of security principles, technologies, and best practices. Experience in networking, infrastructure (on-prem and in the cloud), vulnerability and incident management. Familiarity with application/device security monitoring (e.g. Firewalls, IDS/IPS, XDR etc.). Experience with SIEM/CNAPP/Log collection platforms (e.g. CrowdStrike … Lacework etc.) and capability to design, implement and manage such solutions. Experience with implementation of identity and access management (IAM) solutions. Ability to work in a team to deliver project outcomes within timeframes and objectives. Self-directed work experience, including planning and organising tasks. AWS experience and/or AWS security/administration certifications (e.g. AWS Certified Security etc. More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Board Communicate the information security strategy to relevant parties, as well as developing supporting policies and procedures required to meet the strategy Develop, maintain, and expand the Cyber Risk Management Framework as part of the overall Information Security Management System (“ISMS”) Responsible for the Company’s information security capabilities, including the technical training and awareness of colleagues, ensuring … containment and mitigation activities, as well as preparing for incidents by running threat simulations, tabletop and red team exercises Assess emerging and potential security threats using the Cyber Risk Management Framework and act proactively to mitigate relevant threats End-to-end vulnerabilitymanagement across the hybrid cloud environment Manage security toolset, including managing the relationship with the … GDPR, etc. Good communication and interpersonal skills, with the ability to effectively communicate security-related questions to technical and non-technical stakeholders (employees, customers, and/or partners) Project management skills, with the ability to manage projects such as processes implementation and improvement, security systems implementation Ability to collaborate cross-functionally and influence stakeholders at all levels of the More ❯
Board Communicate the information security strategy to relevant parties, as well as developing supporting policies and procedures required to meet the strategy Develop, maintain, and expand the Cyber Risk Management Framework as part of the overall Information Security Management System (“ISMS”) Responsible for the Company’s information security capabilities, including the technical training and awareness of colleagues, ensuring … containment and mitigation activities, as well as preparing for incidents by running threat simulations, tabletop and red team exercises Assess emerging and potential security threats using the Cyber Risk Management Framework and act proactively to mitigate relevant threats End-to-end vulnerabilitymanagement across the hybrid cloud environment Manage security toolset, including managing the relationship with the … GDPR, etc. Good communication and interpersonal skills, with the ability to effectively communicate security-related questions to technical and non-technical stakeholders (employees, customers, and/or partners) Project management skills, with the ability to manage projects such as processes implementation and improvement, security systems implementation Ability to collaborate cross-functionally and influence stakeholders at all levels of the More ❯
of security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. Relevant industry qualifications and certifications (CompTIA Security+, CEH, GCIH, GCIA CISSP etc) Experience … Knowledge of the following security products are ideal: ? SEIM (Rapid7 IDR, MS Sentinel, SPLUNK) ? SOAR (Rapid7 ICON, MS Sentinel) ? Endpoint Detection and Response (Microsoft Defender) ? Email Security (Proofpoint, Mimecast) ? VulnerabilityManagement (Rapid7 IVM, Nessus, Tenable) Proficiency with scripting and automation (e.g., Powershell, Python) Understanding of Zero-Trust Architecture within a hybrid cloud environment. Working knowledge of cyber threat More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Techwaka
with stakeholders to maintain compliance with industry standards such as ISO27001, Cyber Essentials Plus, PCI/DSS Stay ahead of cyber threats, maintaining and improving security monitoring and risk management processes Support vulnerabilitymanagement, penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Techwaka
with stakeholders to maintain compliance with industry standards such as ISO27001, Cyber Essentials Plus, PCI/DSS Stay ahead of cyber threats, maintaining and improving security monitoring and risk management processes Support vulnerabilitymanagement, penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
TechNET IT Recruitment Ltd
and wider business goals Build and implement policies, procedures, and board-level metrics to support the strategy Lead on the development and maturity of the organisation’s Cyber Risk Management Framework Drive a security-aware culture across departments through training, communication, and engagement Operational Security Oversight Support architectural decisions and strengthen the company’s threat modelling approach Lead incident … response efforts and run simulations, red team exercises, and readiness activities Conduct proactive assessments of emerging threats and implement mitigation strategies Oversee vulnerabilitymanagement across a hybrid cloud estate Manage security tooling and third-party SOC relationships Assess new technologies from a security standpoint, including AI initiatives Provide support to commercial teams with security input for tenders, bids … response and security operations Familiarity with compliance standards such as ISO 27001, SOC 2, HIPAA, GDPR Excellent communication skills; able to influence both technical and non-technical stakeholders Project management capabilities and experience delivering key security initiatives More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
TechNET IT Recruitment Ltd
and wider business goals Build and implement policies, procedures, and board-level metrics to support the strategy Lead on the development and maturity of the organisation’s Cyber Risk Management Framework Drive a security-aware culture across departments through training, communication, and engagement Operational Security Oversight Support architectural decisions and strengthen the company’s threat modelling approach Lead incident … response efforts and run simulations, red team exercises, and readiness activities Conduct proactive assessments of emerging threats and implement mitigation strategies Oversee vulnerabilitymanagement across a hybrid cloud estate Manage security tooling and third-party SOC relationships Assess new technologies from a security standpoint, including AI initiatives Provide support to commercial teams with security input for tenders, bids … response and security operations Familiarity with compliance standards such as ISO 27001, SOC 2, HIPAA, GDPR Excellent communication skills; able to influence both technical and non-technical stakeholders Project management capabilities and experience delivering key security initiatives Seniority level Seniority level Director Employment type Employment type Full-time Job function Job function Information Technology Industries Pension Funds and IT More ❯
and work closely with stakeholders to ensure compliance and security best practice across the business. You will also assist with maintaining and improving the company’s accredited Information Security Management System (ISMS), with a particular focus on ISO 27001 and Cyber Essentials Plus requirements. In addition, you will help mentor team members, providing guidance and support to develop their … is considered throughout the entire SDLC. Creates and maintains documentation around the use of cyber security technology in the organisation. Carries out threat detection and incident response. Carries out vulnerabilitymanagement and remediation. Collaborates as needed with third-party security vendors for expert advice and issue resolution. Carries out threat intel research and recommends security improvements. Qualifications Extensive … PHP, MySQL, PostgreSQL, Nginx, Mercurial and Git. Good understanding of cyber security practices in relation to cloud hosting, preferably with experience of AWS. Good understanding of open-source risk management using enterprise management tools. An understanding of Service Management disciplines, ideally using the ITIL framework. Ability to keep up to date with technology trends and to understand More ❯
and confidence in our organisation’s digital infrastructure. A Little About You... 3+ years experience in cyber security roles, with an understanding of networking protocols, security technologies, and risk management principles. Experience with security incident response, including handling and mitigating security incidents. Excellent analytical skills with the ability to assess complex security issues and develop practical solutions. Strong communication … proactive approach to professional development and staying updated on industry trends and emerging technologies. Knowledge of security tools and technologies, such as SIEM (Splunk), SOAR, DLP, endpoint protection, and vulnerability assessment tools. About The Role... Develop, implement, and maintain comprehensive cybersecurity strategies to protect organizational assets against cyber threats. Conduct regular risk assessments and vulnerability scans to identify … United Kingdom 4 days ago Manchester Area, United Kingdom 15 hours ago Manchester Area, United Kingdom 15 hours ago Huddersfield, England, United Kingdom 4 months ago Information Security Analyst - VulnerabilityManagement Manchester, England, United Kingdom 4 days ago Senior Threat Detection Engineer (Cyber Security) Stockport, England, United Kingdom 1 week ago Manchester, England, United Kingdom 1 week ago More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
and wider business goals Build and implement policies, procedures, and board-level metrics to support the strategy Lead on the development and maturity of the organisation’s Cyber Risk Management Framework Drive a security-aware culture across departments through training, communication, and engagement Operational Security Oversight Support architectural decisions and strengthen the company’s threat modelling approach Lead incident … response efforts and run simulations, red team exercises, and readiness activities Conduct proactive assessments of emerging threats and implement mitigation strategies Oversee vulnerabilitymanagement across a hybrid cloud estate Manage security tooling and third-party SOC relationships Assess new technologies from a security standpoint, including AI initiatives Provide support to commercial teams with security input for tenders, bids … response and security operations Familiarity with compliance standards such as ISO 27001, SOC 2, HIPAA, GDPR Excellent communication skills; able to influence both technical and non-technical stakeholders Project management capabilities and experience delivering key security initiatives #J-18808-Ljbffr More ❯
us at Barclays Internal Audit as a Cyber Audit AVP where you will collaborate with cross-functional teams to provide independent and reliable Cyber Security audit assurance to executive management and the Board on governance, risk management, and control effectiveness. In this role, you will contribute to audit planning and execution, risk assessment, control evaluation, and issue resolution. … assurance) covering Cyber Security. Experience in developing and executing assurance testing approaches in some of the following areas: data security (including cryptography), security configuration, network security, cyber incident response, vulnerabilitymanagement, cyber threat management, information risk management, data leakage protection, identity & access management, cyber resilience. Knowledge of new and emerging technology, cyber security, and cyber More ❯
Computer Science, Information Security, or a related field. At least 5 years of experience in a security engineering role. Strong knowledge of security technologies and concepts, such as Identity Management, SIEM, Encryption, VulnerabilityManagement, Secure Coding Standards etc. Familiarity with compliance standards and regulations, such as ISO27001, PCI-DSS, and GDPR. Experience with security assessments, penetration testing More ❯
us at Barclays Internal Audit as a Cyber Audit AVP where you will collaborate with cross-functional teams to provide independent and reliable Cyber Security audit assurance to executive management and the Board on governance, risk management, and control effectiveness. In this role, you will contribute to audit planning and execution, risk assessment, control evaluation, and issue resolution. … assurance) covering Cyber Security. Experience in developing and executing assurance testing approaches in some of the following areas: data security (including cryptography), security configuration, network security, cyber incident response, vulnerabilitymanagement, cyber threat management, information risk management, data leakage protection, identity & access management, cyber resilience. Knowledge of new and emerging technology, cyber security, and cyber More ❯
Position: Cyber Security Lead Location: Liverpool (90% remote) Salary: Up to £75,000 + Bonus Key Skills: Penetration testing Vulnerabilitymanagement Threat detection Cyber defence Security best practices CISSP, CISM or similar certification About the Role Are you a cybersecurity professional looking to lead the charge against evolving digital threats? We are seeking an experienced Cyber Security Lead … implement a comprehensive cybersecurity strategy to protect our IT environment. Establish, enforce, and regularly update security policies, protocols, and standards. Manage real-time threat detection, incident response, and conduct vulnerability assessments to safeguard our infrastructure. Oversee the deployment of security solutions, working closely with internal teams to strengthen our defences. Collaborate with external security partners to ensure high-quality … thorough risk assessments and ensure compliance with industry standards and regulatory requirements. What We’re Looking For: Professional certification such as CISSP, CISM, or similar. Significant experience in cybersecurity management, ideally within a medium-to-large organisation. Extensive knowledge of security technologies, risk assessment, and vulnerability management. Hands-on experience with security monitoring tools and incident response. Familiarity More ❯
Position: Cyber Security Lead Location: Manchester (90% remote) Salary: Up to £75,000 + Bonus Key Skills: Penetration testing Vulnerabilitymanagement Threat detection Cyber defence Security best practices CISSP, CISM or similar certification About the Role Are you a cybersecurity professional looking to lead the charge against evolving digital threats? We are seeking an experienced Cyber Security Lead … implement a comprehensive cybersecurity strategy to protect our IT environment. Establish, enforce, and regularly update security policies, protocols, and standards. Manage real-time threat detection, incident response, and conduct vulnerability assessments to safeguard our infrastructure. Oversee the deployment of security solutions, working closely with internal teams to strengthen our defences. Collaborate with external security partners to ensure high-quality … will bring a strong technical background in cybersecurity as well as a strategic approach. Key qualifications include: Professional certification such as CISSP, CISM, or similar. Significant experience in cybersecurity management, ideally within a medium-to-large organisation. Extensive knowledge of security technologies, risk assessment, and vulnerability management. Hands-on experience with security monitoring tools and incident response. Familiarity More ❯
security risks. Develop and maintain security frameworks, policies, and procedures aligned with industry standards and regulations. Lead third-party risk assessments and security audits. Collaborate with technical teams on vulnerabilitymanagement and remediation. Contribute to the secure design and architecture of new systems. Monitor and improve security tools and incident response processes. Promote security awareness and education throughout … and technical roles. Strong knowledge of ISO 27001, NIST, or similar frameworks. Excellent communication skills, able to explain technical issues to non-technical stakeholders. Proven leadership and proactive risk management abilities. Experience influencing across various business units. The company offers a supportive, inclusive environment emphasizing personal development and employee wellbeing, with benefits including: 25 days holiday plus bank holidays More ❯
and external audits by providing evidence of controls and contributing to audit readiness activities. Collaborate with the compliance and risk teams to ensure IT operations meet regulatory obligations. Support vulnerabilitymanagement efforts, including patching and system hardening. Assist in maintaining secure and efficient identity and access management practices, including integration with M365 and Azure AD. Contribute to … skills and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also Have More ❯
and external audits by providing evidence of controls and contributing to audit readiness activities. Collaborate with the compliance and risk teams to ensure IT operations meet regulatory obligations. Support vulnerabilitymanagement efforts, including patching and system hardening. Assist in maintaining secure and efficient identity and access management practices, including integration with M365 and Azure AD. Contribute to … skills and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also... Have More ❯
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Stockport, Greater Manchester, UK Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Chester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯