more exclusive features. We are seeking a dynamic and detail-oriented Cyber Security Business Analyst to join our clients team for an OT Asset & Vulnerability Project. This pivotal initiative aims to enhance our operational technology infrastructure by improving asset management and vulnerability processes. The project is preparing … feedback, and driving improvements during the implementation phase. Key Responsibilities Collaborate with stakeholders to define project objectives, scope, and deliverables for the OT Asset & Vulnerability Project. Conduct requirements gathering sessions with users and translate these into detailed functional specifications. Analyze current workflows and identify areas for improvement in asset … and vulnerabilitymanagement processes. Support the pilot phase by documenting outcomes, challenges, and insights to inform process adjustments. Facilitate workshops and feedback sessions to ensure user needs are met and processes are optimized. Develop comprehensive documentation, including user stories, process maps, and reporting templates. Work closely with technical More ❯
We are seeking a dynamic and detail-oriented Cyber Security Business Analyst to join our clients team for an OT Asset & Vulnerability Project. This pivotal initiative aims to enhance our operational technology infrastructure by improving asset management and vulnerability processes. The project is preparing to enter the … feedback, and driving improvements during the implementation phase. Key Responsibilities Collaborate with stakeholders to define project objectives, scope, and deliverables for the OT Asset & Vulnerability Project. Conduct requirements gathering sessions with users and translate these into detailed functional specifications. Analyze current workflows and identify areas for improvement in asset … and vulnerabilitymanagement processes. Support the pilot phase by documenting outcomes, challenges, and insights to inform process adjustments. Facilitate workshops and feedback sessions to ensure user needs are met and processes are optimized. Develop comprehensive documentation, including user stories, process maps, and reporting templates. Work closely with technical More ❯
aligned with global business risk/objectives. This role focuses on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. The position will support the Director of IT Security in reviewing … basis. Deploy new security tools, services, processes, and procedures. Support security services such as SIEM, MDR, endpoint technology, secure email gateways, cloud security, certificate management, network security, and vulnerability management. Respond promptly to critical incidents in collaboration with security operations, legal, compliance, incident response teams, etc. Qualifications & Experience … Bachelor’s degree in Management Information Systems, Computer Science, Engineering, or related field. 5-10 years of experience in information security and IT. Strong written and verbal communication skills. Industry certifications preferred: CISSP, CompTIA+, CEH, SSCP, Security+, etc. Solid understanding of IT and security practices, including host security, platform More ❯
for a Security Architect, min requirement is to be BPSS cleared and happy to go through Security Clearance. We need someone with experience of VulnerabilityManagement solutions such as Tenable or Qualys with a strong knowledge of network security solutions, ITIL and Service Management all within a … Experience: Strong background in IT Security design, ability to look over blueprints and make suggested technical changes to meet business needs. Strong background in vulnerabilitymanagement with strong Tenalbe or Qualys. Happy to go through security clearance, with current BPSS (Baseline Personnel Security Standard) a minimum. Strong knowledge More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security More ❯
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerabilitymanagement tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
suite of services including: MDR (Managed Detection and Response) XDR (Extended Detection and Response) EDR (Endpoint Detection and Response) SIEM (Security Information and Event Management) Penetration Testing & VulnerabilityManagement Governance, Risk & Compliance (GRC) support Phishing Simulation & Security Awareness Training Threat Intelligence and Continuous Monitoring As demand for More ❯
strong customer focus at all times Hold the responsibility for: Patching The Cyber Security Risk Register Firewall Rules Microsoft End Point Protection Microsoft Defender VulnerabilityManagement Microsoft secure score Phishing simulation and staff training with both Cyber Security and information governance Data Loss Protection Testing and identifying network More ❯
Cybersecurity Software Company Remote £45,000 to £55,000 per annum (depending on experience) Who are we? Titania’s multi-award-winning risk-based vulnerabilitymanagement (RBVM) and network exposure management software has been used by elite cyber teams for over a decade to safeguard critical infrastructure. … qualifications are highly desirable: Experience in the Cybersecurity Industry 3-5years experience managing and executing effective demand/lead generation campaigns Strong project management and communication skills Understanding of B2B buyer journeys and sales funnels Self-motivation and proactive approach Strong ability to manage own time and prioritise … workload Experience managing external agencies to scale campaigns/execution KPI management (e.g. MQLs, MQL to SQL, MQL to customer, Cost per MQL, CAC, CLV) If you are the successful candidate, you will be rewarded with a generous holiday package starting at 25 days (plus bank holidays), including optional More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
viable plans for delivering industry leading solutions on top of standard services and delivering in life support of GTT Enterprise customers. GTT’s Technical Management offering is a consultative, value-add professional services that provides a tailored experience to their client base. As a Technical Manager you will own … solution, understand the wider context of the solution with the customer and how it aligns with their business, bringing a holistic ITIL based Service Management structure to some of GTT’s most important Managed Customers. At any one time you will work on multiple client accounts and must have … excellence, agility, ownership, and responsibility. Becoming an invaluable partner to the client. Monitor industry networking updates, technologies, and best practices to improve overall network management and to remain informed of new technical developments and trends in the industry. Own the customer solution lifecycle from initial customer order onwards, highlighting More ❯
to enable secure coding and privacy by design Drive adoption of secure development standards and practices across the org Operate and evolve our software vulnerabilitymanagement and bug bounty programs Work cross-functionally to identify risks and improve security posture continuously Support cloud-native app and ML security More ❯
Max Qualifications & Certifications: Bachelor’s or Master’s degree in Architecture (BSc or MSc) Autodesk Certified Professional in AutoCAD and Revit Familiarity with project management tools and workflows What We Offer: Competitive salary based on experience Access to cutting-edge design tools and software Opportunities for professional development and … ago Southampton, England, United Kingdom 1 month ago Eastleigh, England, United Kingdom 1 year ago Hursley, England, United Kingdom 1 week ago Security Architect - VulnerabilityManagement Southampton, England, United Kingdom 4 weeks ago Southampton, England, United Kingdom 2 days ago Gosport, England, United Kingdom 2 weeks ago We More ❯
hands-on role focused on improving cyber posture, ensuring compliance, and protecting critical infrastructure. Key Responsibilities Manage cyber security tools (SIEM, IAM, Threat Intel, Vulnerability Mgmt) Monitor and respond to threats and incidents Support audits and create security policies Align with frameworks like NIST, ISO27001, and CAF/eCAF … What You'll Need 3-5 years in cyber security roles Experience with SIEM, IAM, and vulnerability tools Familiarity with security frameworks and standards Strong reporting and stakeholder communication skills Perks Up to 6% bonus 27 days holiday + bank hols 15% pension, private medical, life assurance Flexible working More ❯