Manchester, England, United Kingdom Hybrid / WFH Options
The MRJ Group
security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and controls for EUC environments, including endpoint … respond to security incidents, conducting forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory requirements. Collaborate Across Teams: Work … secure cloud architectures. Engagement: Foster a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. Security Automation & Optimization : Develop, implement More ❯
infrastructure. You'll be hands-on, designing, implementing, and managing top-notch security solutions across all our cloud environments. You'll also play a key part in developing our vulnerabilitymanagement program, working closely with our operational support, infrastructure, and development teams. Plus, you'll be right in the thick of security event monitoring, threat intelligence, and incident … management - keeping us one step ahead! What you'll be doing: Delivering SOC Capabilities: You'll be a key team member in delivering ongoing Security Operations Centre (SOC) capabilities for the business. Driving Automation: You'll push for security automation wherever possible and play a big part in evolving our security tooling and services. Policy & Standards: You'll champion … security, including firewalls, WAF, anti-virus, and O365 compliance & security centre. Familiarity with NIST (CSF Framework 2.0), ISO 27001, PCI-DSS, and GDPR. Experience operating and managing SIEM solutions, vulnerabilitymanagement tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and/or SecOps oriented teams. More ❯
infrastructure. You'll be hands-on, designing, implementing, and managing top-notch security solutions across all our cloud environments. You'll also play a key part in developing our vulnerabilitymanagement program, working closely with our operational support, infrastructure, and development teams. Plus, you'll be right in the thick of security event monitoring, threat intelligence, and incident … management - keeping us one step ahead! What you'll be doing: Delivering SOC Capabilities: You'll be a key team member in delivering ongoing Security Operations Centre (SOC) capabilities for the business. Driving Automation: You'll push for security automation wherever possible and play a big part in evolving our security tooling and services. Policy & Standards: You'll champion … firewalls, WAF, anti-virus, and O365 compliance & security centre . Familiarity with NIST (CSF Framework 2.0), ISO 27001, PCI-DSS, and GDPR . Experience operating and managing SIEM solutions , vulnerabilitymanagement tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and/or SecOps oriented teams More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
patterns and reference architectures that will drive adoption of modern technology meeting HMRCs business driven need towards rationalised strategic platforms. In addition, you may be encouraged to undertake line management responsibilities developing and managing a team. You may be expected to own and develop CSTS capabilities and/or services. Person specification Ideal candidate: A business and technology leader … development and delivery of technical security controls and services. Focused expertise to develop and lead within one or many security technology domains aligning capability to security tooling. Key stakeholder management experience across senior business and technical environments including vendors, partners and other government departments. Able to demonstrate a proven history of delivering high value outcomes in challenging and complex … the Secure by Design Lifecycle. Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors, and programs. Essential Criteria: You More ❯
desired outcomes and success criteria which is to be the baseline for post project review and benefit realisation validation, as well as measuring positive effects. Contribute to project risk management consulting and technical reviews, drafting mitigation plans and delivering on any actionable items allocated Draft procedures and or policies with regards to cyber security submitting them to the Information … intrusion detection and prevention, situational awareness of: network intrusions. security events. data spillage; and. Incident response actions. Identify and resolve vulnerabilities in networks, servers, systems, and applications by performing vulnerability scans Investigate improper access to ensure proper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements including but not limited to privilege account management. Provide … daily operational effectiveness reporting to the Information Security Officer Create and update weekly dashboard view of cyber risk ratings in the organisation. Prepare reports for circulation to the management teams related to investigations and threats for the month, this will also be rolled up into quarterly reporting. Support with managing vendor resource deliverables to ensure quality and consistency of More ❯
security controls. Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerabilitymanagement etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security controls, identify risks and propose treatment plans. Conduct regular vulnerability … Role: Essential: 3-5 years of experience in Information Security. Strong understanding of security principles, technologies, and best practices. Experience in networking, infrastructure (on-prem and in the cloud), vulnerability and incident management. Familiarity with application/device security monitoring (e.g. Firewalls, IDS/IPS, XDR etc.). Experience with SIEM/CNAPP/Log collection platforms (e.g. CrowdStrike … Lacework etc.) and capability to design, implement and manage such solutions. Experience with implementation of identity and access management (IAM) solutions. Ability to work in a team to deliver project outcomes within timeframes and objectives. Self-directed work experience, including planning and organising tasks. AWS experience and/or AWS security/administration certifications (e.g. AWS Certified Security etc. More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Board Communicate the information security strategy to relevant parties, as well as developing supporting policies and procedures required to meet the strategy Develop, maintain, and expand the Cyber Risk Management Framework as part of the overall Information Security Management System (“ISMS”) Responsible for the Company’s information security capabilities, including the technical training and awareness of colleagues, ensuring … containment and mitigation activities, as well as preparing for incidents by running threat simulations, tabletop and red team exercises Assess emerging and potential security threats using the Cyber Risk Management Framework and act proactively to mitigate relevant threats End-to-end vulnerabilitymanagement across the hybrid cloud environment Manage security toolset, including managing the relationship with the … GDPR, etc. Good communication and interpersonal skills, with the ability to effectively communicate security-related questions to technical and non-technical stakeholders (employees, customers, and/or partners) Project management skills, with the ability to manage projects such as processes implementation and improvement, security systems implementation Ability to collaborate cross-functionally and influence stakeholders at all levels of the More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Secure Recruitment LTD
Award Winning Offices Complete with Restaurant , Free Bar , Gym/Private (Family) Healthcare/Regular Funding Towards Professional Development Hybrid Working Our Client is a leading Fintech, delivering Risk Management & Payment Solutions to some of the world's most respected organisations, backed by a number of globally respected institutions and responsible for transacting £Billions. They are now looking for … fast-growing SecOps Team . You will be monitoring & maintaining secure systems & networks as well as mitigating & containing real-time risks & identified threats. You will also be involved in vulnerabilitymanagement, threat hunting, playbook designing & detection rule staging. Key Responsibilities of the role would include: Provide SecOps support capability working with information security alerts using Security Information & Event … Management (SIEM) to triage, mitigate & escalate issues as needed while capturing essential details and artefacts. Perform analysis of security alerts to evaluate risk, determine containment action & identify required preventative measures. Review & triage security vulnerabilities detection. Identify trends, potential new technologies & emerging threats which may impact the business. Implement technical controls to mitigate against security risk. Development & integration of security More ❯
Board Communicate the information security strategy to relevant parties, as well as developing supporting policies and procedures required to meet the strategy Develop, maintain, and expand the Cyber Risk Management Framework as part of the overall Information Security Management System (“ISMS”) Responsible for the Company’s information security capabilities, including the technical training and awareness of colleagues, ensuring … containment and mitigation activities, as well as preparing for incidents by running threat simulations, tabletop and red team exercises Assess emerging and potential security threats using the Cyber Risk Management Framework and act proactively to mitigate relevant threats End-to-end vulnerabilitymanagement across the hybrid cloud environment Manage security toolset, including managing the relationship with the … GDPR, etc. Good communication and interpersonal skills, with the ability to effectively communicate security-related questions to technical and non-technical stakeholders (employees, customers, and/or partners) Project management skills, with the ability to manage projects such as processes implementation and improvement, security systems implementation Ability to collaborate cross-functionally and influence stakeholders at all levels of the More ❯
of security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. Relevant industry qualifications and certifications (CompTIA Security+, CEH, GCIH, GCIA CISSP etc) Experience … Knowledge of the following security products are ideal: ? SEIM (Rapid7 IDR, MS Sentinel, SPLUNK) ? SOAR (Rapid7 ICON, MS Sentinel) ? Endpoint Detection and Response (Microsoft Defender) ? Email Security (Proofpoint, Mimecast) ? VulnerabilityManagement (Rapid7 IVM, Nessus, Tenable) Proficiency with scripting and automation (e.g., Powershell, Python) Understanding of Zero-Trust Architecture within a hybrid cloud environment. Working knowledge of cyber threat More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Techwaka
with stakeholders to maintain compliance with industry standards such as ISO27001, Cyber Essentials Plus, PCI/DSS Stay ahead of cyber threats, maintaining and improving security monitoring and risk management processes Support vulnerabilitymanagement, penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Techwaka
with stakeholders to maintain compliance with industry standards such as ISO27001, Cyber Essentials Plus, PCI/DSS Stay ahead of cyber threats, maintaining and improving security monitoring and risk management processes Support vulnerabilitymanagement, penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks More ❯
role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems and resolving … security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of … make an impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, VulnerabilityManagement, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, incident response, and compliance. Our mission is to protect businesses from cyber threats by delivering tailored security solutions that keep them resilient and secure. The Role We … threats and attack techniques, and the ability to implement effective security controls to mitigate risks. This role involves proactively monitoring security events, investigating potential breaches, and supporting clients with vulnerabilitymanagement and security best practices. About You You are passionate about cybersecurity and have a strong ability to think critically, solve complex problems, and anticipate security threats before … to mitigate security risks. Conduct digital forensics and root cause analysis on security breaches. Work closely with internal teams and clients to ensure swift containment and resolution of threats. VulnerabilityManagement & Security Operations Perform regular vulnerability scans and assessments, identifying security gaps and misconfigurations. Recommend and implement security improvements based on assessment findings. Optimize security configurations and More ❯
for safeguarding QA from intrusion, security threats, security weaknesses, software bugs and exploits. You will be responsible for direct and virtual teams involved in keeping QA secure. Role Responsibilities Management of the Security Operations Centre service, ensuring resources are aligned to monitor and protect QA IT assets including 24/7 out of hours on call coverage. Responsible for … to a successful conclusion. Ensure that the monitoring, logging, and prevention toolsets are aligned to the needs of the security function/the business and are delivering best value. Management of direct and virtual security related IT teams for the delivery of the security operations service and security related projects. Work proactively to understand the threat landscape, how it … enhance the security of IT systems both on-prem and cloud. Creation of reports, dashboards, metrics for SOC operations and presentation to senior management. Oversight, planning and execution of vulnerability assessments, penetration tests, audits or related security assessment exercises (eg Red Team) to improve the security posture of the infrastructure, applications and services. Manage the remediation of identified vulnerabilities More ❯
procedures and practices. Solid technical knowledge and experience on security technologies (like Endpoint protection, Mobile Security, Data Protection, Cloud Security, etc.) and on cyber security capabilities (SIEM, SOC, CERT, VulnerabilityManagement, Threat intelligence etc.) Strong knowledge of main Information Security standards and frameworks (ISO27001, ISO22301, ISF, NIST, COBIT.) Good background in information management, with clear understanding of … the challenges of Information and IT security. A good understanding and experience of implementing information security within cloud-based environments. Experience and skills in the project management of corporate Information security projects. Excellent oral and written communication skills, with the ability to present and explain information security clearly across the organization. Certifications on Information Security (e.g., CISSP, CISM, ISO27001 … Core Responsibilities: Provide consultancy across the business (UK & internationally as required) to ensure relevant and appropriate information security controls are applied to meet departmental and business objectives. Liaise with management and business users to understand goals and information needs, recommending suitable security practices and solutions. Manage security assessments based on ISO 27001:2022, including oversight on physical & corporate security. More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
TechNET IT Recruitment Ltd
and wider business goals Build and implement policies, procedures, and board-level metrics to support the strategy Lead on the development and maturity of the organisation’s Cyber Risk Management Framework Drive a security-aware culture across departments through training, communication, and engagement Operational Security Oversight Support architectural decisions and strengthen the company’s threat modelling approach Lead incident … response efforts and run simulations, red team exercises, and readiness activities Conduct proactive assessments of emerging threats and implement mitigation strategies Oversee vulnerabilitymanagement across a hybrid cloud estate Manage security tooling and third-party SOC relationships Assess new technologies from a security standpoint, including AI initiatives Provide support to commercial teams with security input for tenders, bids … response and security operations Familiarity with compliance standards such as ISO 27001, SOC 2, HIPAA, GDPR Excellent communication skills; able to influence both technical and non-technical stakeholders Project management capabilities and experience delivering key security initiatives More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role We … ability to work collaboratively with clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits and risk assessments to identify … alignment with industry standards and regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerabilitymanagement, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages (e.g., Python, Bash, PowerShell) for More ❯
Overview Reporting to the Director - Cybersecurity, the Cybersecurity Analyst is responsible for the day-to-day administration of the Information Security Management System (ISMS). This role will also involve performing key Security Operations duties, including system and application audits and reporting. Responsibilities Monitor and support all internal and external systems infrastructure (Incident & Problem Management), collaborating with colleagues … defining and testing specific information security controls and policies. Contribute to the global information security awareness program and ensure company-wide compliance. Conduct security assessments for projects and change management initiatives. Maintain the threat and information risk register and recommend appropriate remediation measures. Develop comprehensive documentation detailing system specifications and operating instructions. Ensure infrastructure, applications, and data security/… out-of-hours support coverage on a rotational basis (one week per month). Qualifications 1-3 years’ experience in security operations in the capacity of incident response and vulnerabilitymanagement; implementing and managing core Microsoft stack (MCSE equivalent certification); administering and supporting virtualization platforms (VMWare); implementing and managing with Linux operating systems. Experience in scripting technologies such More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
TechNET IT Recruitment Ltd
and wider business goals Build and implement policies, procedures, and board-level metrics to support the strategy Lead on the development and maturity of the organisation’s Cyber Risk Management Framework Drive a security-aware culture across departments through training, communication, and engagement Operational Security Oversight Support architectural decisions and strengthen the company’s threat modelling approach Lead incident … response efforts and run simulations, red team exercises, and readiness activities Conduct proactive assessments of emerging threats and implement mitigation strategies Oversee vulnerabilitymanagement across a hybrid cloud estate Manage security tooling and third-party SOC relationships Assess new technologies from a security standpoint, including AI initiatives Provide support to commercial teams with security input for tenders, bids … response and security operations Familiarity with compliance standards such as ISO 27001, SOC 2, HIPAA, GDPR Excellent communication skills; able to influence both technical and non-technical stakeholders Project management capabilities and experience delivering key security initiatives Seniority level Seniority level Director Employment type Employment type Full-time Job function Job function Information Technology Industries Pension Funds and IT More ❯
and work closely with stakeholders to ensure compliance and security best practice across the business. You will also assist with maintaining and improving the company’s accredited Information Security Management System (ISMS), with a particular focus on ISO 27001 and Cyber Essentials Plus requirements. In addition, you will help mentor team members, providing guidance and support to develop their … is considered throughout the entire SDLC. Creates and maintains documentation around the use of cyber security technology in the organisation. Carries out threat detection and incident response. Carries out vulnerabilitymanagement and remediation. Collaborates as needed with third-party security vendors for expert advice and issue resolution. Carries out threat intel research and recommends security improvements. Qualifications Extensive … PHP, MySQL, PostgreSQL, Nginx, Mercurial and Git. Good understanding of cyber security practices in relation to cloud hosting, preferably with experience of AWS. Good understanding of open-source risk management using enterprise management tools. An understanding of Service Management disciplines, ideally using the ITIL framework. Ability to keep up to date with technology trends and to understand More ❯
Work for an award-winning provider of Security Services, specialising in Cyber Security Services such as VulnerabilityManagement, Information Security, Penetration Testing, and Managed Security Services. We boast a fully managed Security Operations Centre (SOC) staffed by dedicated professionals. We're seeking a skilled Cyber Security Engineer to join our clients eam. The ideal candidate will have expertise More ❯
security capabilities across its global infrastructure. This role is vital in ensuring the integrity and resilience of the company’s IT environment against cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents effectively. Perform regular security checks, including monitoring of systems and resolving vulnerabilities. Assist with compliance checks, ensuring … security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning and risk mitigation. Knowledge of security auditing and incident response processes. Experience with event and log analysis. Solid understanding of Disaster Recovery and Business Continuity principles. Excellent communication … make an impact in a global organization, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, VulnerabilityManagement, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery, Business Continuity Nice-to-have skills: ISO 27001 Vulnerability Scanning Disaster Recovery Work More ❯
procedures and practices. Solid technical knowledge and experience on security technologies (like Endpoint protection, Mobile Security, Data Protection, Cloud Security, etc.) and on cyber security capabilities (SIEM, SOC, CERT, VulnerabilityManagement, Threat intelligence etc.) Strong knowledge of main Information Security standards and framework (ISO27001, ISO22301, ISF, NIST, COBIT.) Good background in information management, with clear understanding of … the challenges of Information and IT security. A good understanding and experience of implementing information security within cloud-based environments. Experience and skills in the project management of corporate Information security projects. Excellent oral and written communications skills, as well as ability to present and explain information security in a way that establishes rapport, persuades others, and gains understanding … across the business (UK & Internationally as required) to ensure relevant and appropriate information security controls are applied to ensure both the departmental and business objectives are met. Liaise with management and business users, to understand business goals, priorities, and information needs, and to recommend information security practices and solutions in line with business requirements. Manage security assessments, based on More ❯
and confidence in our organisation’s digital infrastructure. A Little About You... 3+ years experience in cyber security roles, with an understanding of networking protocols, security technologies, and risk management principles. Experience with security incident response, including handling and mitigating security incidents. Excellent analytical skills with the ability to assess complex security issues and develop practical solutions. Strong communication … proactive approach to professional development and staying updated on industry trends and emerging technologies. Knowledge of security tools and technologies, such as SIEM (Splunk), SOAR, DLP, endpoint protection, and vulnerability assessment tools. About The Role... Develop, implement, and maintain comprehensive cybersecurity strategies to protect organizational assets against cyber threats. Conduct regular risk assessments and vulnerability scans to identify … United Kingdom 4 days ago Manchester Area, United Kingdom 15 hours ago Manchester Area, United Kingdom 15 hours ago Huddersfield, England, United Kingdom 4 months ago Information Security Analyst - VulnerabilityManagement Manchester, England, United Kingdom 4 days ago Senior Threat Detection Engineer (Cyber Security) Stockport, England, United Kingdom 1 week ago Manchester, England, United Kingdom 1 week ago More ❯