Southampton, England, United Kingdom Hybrid / WFH Options
Nice Group
ensure the confidentiality, integrity, and availability of our systems and data. How will you make an impact? Security Tooling: Deploy, maintain, integrate, and perform initial configuration of security tools. VulnerabilityManagement: Coordinate and conduct regular security assessments, penetration testing, and vulnerability scans to identify and address security weaknesses proactively. Incident Response: Lead incident response efforts to promptly … logs and alerts, investigate suspicious activities, and respond to security events in real-time. Implement and maintain security tools and technologies to enhance our security posture. Identity and Access Management: Manage user access controls, authentication mechanisms, and identity management systems to ensure appropriate levels of access and privilege. Have you got what it takes? At least 5 years More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
activities, including incident monitoring and response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits. Gap Assessments: Facilitate and/or conduct internal gap assessments and audit readiness … of compliance processes. Audit Findings: Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security Monitoring: Use tools such as … and implementing recommendations to improve the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. VulnerabilityManagement: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong expertise in audit and compliance More ❯
collaborate closely with internal teams to safeguard critical business operations by design and default. You will be responsible for security automation, CI/CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI/CD pipeline to enhance development security. Work with development teams to optimize … infrastructure security. Maintain and secure AWS cloud infrastructure for clients and internal operations. Automate AWS infrastructure builds following CIS hardening standards . Ensure top-tier security configuration, access management, and incident response on cloud platforms. Operational Support & Incident Response: Support business-critical Windows and Linux-based environments. Monitor and respond to security alerts across Infosec, servers, firewalls, and applications. … Conduct continuous monitoring of internal and third-party information security controls. Threat & VulnerabilityManagement: Assess SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) scans. Implement remediation and mitigation strategies in collaboration with development teams. Maintain network security protocols, firewalls, and threat management platforms . Compliance & Risk Management: Ensure compliance with ISO More ❯
future of our Managed Detection and Response capability, you will bring experience and knowledge in: Providing Managed Detection and Response as a Managed Services Provider Delivering effective Cyber Incident Management and Response Communicating effectively with technical specialists, leaders and peers Leadership and people management skills Strategic Problem solver and Motivator Demonstrable experience of managing 3rd Party Managed Services … Providers The Director Managed, Detection and Response is responsible for working with the VP Group Operational Security and Director Threat and VulnerabilityManagement for developing the strategy and vision for Managed, Detection and Response, and the execution of the responsibilities within the Proactive Analysis and Cyber Incident Management and Response functions. The Security Tooling team is a … to ensure the tooling is inline with the overall Security Strategy. Key Accountabilities This role is accountable for the key security operations areas, including but not limited to, Incident Management, Incident Response, Proactive Security Monitoring, Threat Hunting, Security Incident Analytics, Incident Trend Analysts and Reporting. This individual will manage the relationships with key partners across the Liberty Global, Retained More ❯
Information Security Analyst - Audit, Compliance & Cybersecurity Southampton, England, United Kingdom 2 days ago Southampton, England, United Kingdom 2 weeks ago Gosport, England, United Kingdom 4 weeks ago Security Architect - VulnerabilityManagement Southampton, England, United Kingdom 1 month ago Hampshire, England, United Kingdom 2 days ago Information Security Analyst - Audit, Compliance & Cybersecurity Southampton, England, United Kingdom 6 hours ago More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Sycurio
the attainment and maintenance of the ISO27001, PCI-DSS, and SOC2 compliance. They are the subject matter expert on all things regarding security and compliance, owning the information risk management processes. They are the thought leader on all matters within the security and compliance domain such that the company remains secure against the ever-changing security threat and compliance … Work across internal and external stakeholders, communicating the information security strategy to relevant parties and providing assurance of policies, procedures, and systems. Develop, maintain, and expand the information security management system ('ISMS') to optimise compliance for ISO27001, PCI-DSS, and SOC2. Identify gaps in the information security capability, both technical and operational, and propose remediation and mitigation plans and … internal teams and external parties on containment and mitigation activities. Execute threat simulations. Assess emerging and potential security threats and act proactively to mitigate relevant threats. End-to-end vulnerability management. Manage the security toolset. Act as the security "face" of Sycurio to its customers, suppliers, and auditors, supporting both in-life and sales engagements. Manage and participate in More ❯
With the fast growth in our Cyber Security division we are delighted to introduce a new role: Cyber Security Services Manager. Management and organisation will be key in this role so we are looking for candidates who will bring: Leadership & Soft Skills: Strong leadership and team management abilities. Excellent problem-solving and decision-making skills. Strong communication and … stakeholder management skills, able to engage both technical and non-technical audiences. Ability to manage multiple client projects simultaneously and prioritise effectively. Technical Skills: 5+ years of experience in cybersecurity, with at least 2+ years in a management role. Strong knowledge of cybersecurity frameworks and regulations (ISO 27001, NIST, Cyber Essentials, GDPR, etc.). Experience in cybersecurity service … delivery, such as penetration testing, risk assessments, compliance consulting, or managed security services. Familiarity with security tools (MDR, EDR, vulnerability scanners, firewalls, etc.). Understanding of cloud security (Azure is mandatory) and modern security best practices. The following certifications are beneficial though not mandatory: CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CEH (Certified Ethical Hacker More ❯
South East London, England, United Kingdom Hybrid / WFH Options
The Curve Group
Cyber VulnerabilityManagement Analyst Fixed Term Contract (Maternity Cover) 18 months Our Client is a globally recognised, successful bank who provide world-class services to various institutions and individuals. Offering a comprehensive range of retail and corporate financial services/products, this thriving business boasts over 10 million active customers in over 700 business locations. Due to business … be part of the team supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber VulnerabilityManagement Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very … Cyber Security Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP Patch Management Applications, EDR/XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems (CVSS/CMSS) Incident/Response & Forensic More ❯
systems. This position involves managing security operations, implementing security measures, and leveraging Microsoft Azure’s security features to safeguard the organization’s data and infrastructure. Key Responsibilities: Security Operations Management: Be the Technical Expert to support and advance the objectives of IT Security and the wider group In conjunction with the leadership team, develop and implement security policies, procedures … and protocols Actively engaged in continuous monitoring and protection of networks, systems, and applications Technical Security Implementation: Design, implement and support new and existing security solutions. (Privileged Access Management, VulnerabilityManagement, Threat Intelligence, etc) Expert in Microsoft Azure’s security tools and services. (Entra, Privileged Identity Management, conditional access, Microsoft defender, Sentinel, etc) Perform security input … and guidance on tools being adopted within the organisation. Oversee and assess the outputs of the vulnerabilitymanagement platforms to effectively identify and mitigate vulnerabilities Ensure documentation of all solutions and designs are up to date, including technical design documents and associated policies, procedures and processes Azure Security Management: Utilize Microsoft Azure’s security features, including Azure More ❯
assessing, and mitigating security risks across various platforms. The consultant will play a critical role in evaluating and strengthening our clients’ cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with industry best practices. Provide expert … Collaborate with client teams to develop, document, and implement security policies, standards, and guidelines aligned with industry standards (e.g., ISO 27001, NIST). Assist in the deployment, configuration, and management of security infrastructure and technologies, including firewalls, intrusion detection/prevention systems, and secure network architectures. Provide guidance and support on Azure security practices, leveraging expertise in Microsoft Azure … reports on penetration testing findings, including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerabilitymanagement, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit, Burp Suite, Nessus, and Wireshark. More ❯
South East London, England, United Kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
posture has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST … Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threat detection, incident response, vulnerabilitymanagement, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance & Regulatory: Ensure adherence … risk frameworks (COSO, FAIR), and regulatory obligations (GDPR, PCI-DSS, SOX). Proven track record of managing enterprise-level security programs, including incident response and business continuity. Excellent stakeholder management skills, with experience reporting at board level. Strong grasp of both technical cybersecurity and governance frameworks, with the ability to balance business priorities and risk. Hands-on leadership style More ❯
Watford, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
purpose-driven organisation on a part-time basis . In this role, you'll take the lead in strengthening the organisation's security posture by driving forward incident response, vulnerabilitymanagement, and compliance initiatives. You'll be a key player in embedding security best practices across the business and ensuring alignment with industry standards. Responsibilities Work 7-hour … information security matters, supporting projects, solution development, and change initiatives with expert guidance. Perform regular risk evaluations to uncover and address potential security gaps. Lead the end-to-end management of security incidents, ensuring swift and effective resolution. Design and deliver engaging training sessions to raise awareness and promote a security-first mindset across the organisation. Monitor the evolving … technical vulnerabilities into business-relevant language for diverse audiences. Hands-on experience operating in or collaborating with a Security Operations Centre (SOC). Well-versed in applying recognised risk management methodologies such as ISO 27005 and NIST Risk Management Framework. Strong written and verbal communication abilities, with a focus on clear reporting and stakeholder engagement. Possession of industry More ❯
Employment Type: Part Time, Work From Home
Salary: £28.49 - £36.98 per hour + £36.98 p/h via Umbrella (Inside IR35)
suit someone with a blend of hands-on technical skills and strategic thinking. What You'll Be Doing: Support and improve day-to-day security operations, incident response, and vulnerability management. Lead on security investigations and ensure remediation is aligned with industry best practices. Conduct risk assessments and provide security consultancy for technical projects and service design. Help maintain More ❯
security systems/solutions aligned with global business risk/objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new … the PMO to optimize existing security services and deploy new tools in support of the security roadmap. Must be capable of interacting effectively with various internal teams, peers, and management staff. Support the information security manager with creating information security metrics for the respective supported security products. This will be done monthly. Deploy new information security tools, services, processes … and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security operations, legal, compliance, incident response teams, etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Liberty Global
We’re looking for a Senior Cyber Threat Intelligence Analyst role to join us in Reading As part of the Global Security Threat & VulnerabilityManagement team, the Cyber Threat Intelligence team collects, processes, and analyses data to produce information an organisation can use to understand the threats that have, will, or are currently targeting our organisation. Threat Intelligence … who enjoys collaborative problem solving. Desirable: Experience of supporting security governance initiatives within a telecommunications organisation. Exposure to, and experience in, technical security disciplines (e.g. Security Architecture, Threat Intelligence, VulnerabilityManagement). Experience in researching new or emerging security requirements (e.g. new regulation or technology). CompTIA Security+. Achieved and willing to work towards - Certified Information Security Manager … Join Liberty Global and Shape Tomorrow’s Connections Today! Liberty Global is a dynamic team of veteran operators and investors committed to generating and delivering value through the strategic management of our three platforms: Liberty Telcom, Liberty Growth, and Liberty Services. We prioritize diversity, equity, and sustainability, using technology for good. If you're curious, resilient, and have a More ❯
team members in the Information Technology department to ensure that systems and networks are always designed, developed, deployed, and managed with an emphasis on strong, effective security and risk management controls. The Cyber Security Analyst leads the firm's vulnerabilitymanagement program, manages the annual cybersecurity assessments and penetration tests, and researches and reports on emerging threats … threat patterns and vulnerabilities. Runs internal security scans, coordinates mitigation and tracks results. Investigates security alerts and is a part of the incident response team. Monitors identity and access management, including monitoring for abuse of permissions by authorized system users. Liaises with stakeholders in relation to cyber security issues and provides future recommendations. Generates reports for both technical and More ❯
enhance the Security Operations Center (SOC) , with one analyst reporting to you Oversee incident response , manage security incidents from detection to resolution Work closely with the compliance manager on vulnerabilitymanagement Architect secure solutions, validate baseline configurations, and recommend improvements to stay compliant Collaborate with key stakeholders including Compliance and Infrastructure teams Required Experience: Microsoft security suite experience … Sentinel or similar Experience managing network security and firewalls Exposure to PenTesting methodologies or practices (desirable) Experience with NAC solutions like Cisco ISE , ForeScout , or similar Strong grasp of vulnerabilitymanagement processes Desired Certifications Microsoft Security certifications (preferred) CISM or CISSP (beneficial, not essential) Apply now or reach out for a confidential chat- ngoren@mcgregor-boyall.com More ❯
Objective Acknowledge, analyse and validate incidents triggered from correlated via analysis and various tools Acknowledge, analyse and validate incidents received through other reporting mechanisms such as email, phone calls, management directions, etc. Collection of necessary logs that could help in the incident containment and security investigation Be able to make high quality decisions, often with incomplete information, and actively … Help develop platforms and tools to automate and improve security posture across the group Help improve and develop documentation. Skills and Competencies Required Knowledge and hands-on experience in management of IDS/IPS, Firewall, VPN, EDR/XDR, mail filtering and other security products Experience in Security Information Event Management (SIEM) tools, creation of basic co-relation … SIEM preferred Should have expertise on TCP/IP network traffic and event log analysis Network Troubleshooting skills required . Knowledge and hands-on experience in penetration testing/vulnerability scanning, security tools like tenable Nessus, kali Linux Knowledge of ITIL disciplines such as Incident, Problem and Change Management Experience of infrastructure design and management in mission More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Better Days Recruitment Ltd
cyber and information security strategy ensuing it is aligned with ISO 27001, GDPR and Cyber essentials. Combining strong information security experience with hands-on technical knowledge of SIEM, EDR, vulnerabilitymanagement and incident response. You will have the ability to translate technical risk into clear business advice. This is a great permanent opportunity to demonstrate your strong experience … and great benefits on offer. Skills/Experience and attributes: A minimum of 4-5 years experience working in a similar role Strong understanding of information security principles, risk management and compliance (GDPR, ISO 27001 and Cyber Essentials) Ability to talk technically then non-technically to the business Solid understanding of IT Infrastructure eg; networking, Active Directory and endpoint More ❯
Crawley, West Sussex, United Kingdom Hybrid / WFH Options
Better Days Recruitment Ltd
cyber and information security strategy ensuing it is aligned with ISO 27001, GDPR and Cyber essentials. Combining strong information security experience with hands-on technical knowledge of SIEM, EDR, vulnerabilitymanagement and incident response. You will have the ability to translate technical risk into clear business advice. This is a great permanent opportunity to demonstrate your strong experience … and great benefits on offer. Skills/Experience and attributes: A minimum of 4-5 years’ experience working in a similar role Strong understanding of information security principles, risk management and compliance (GDPR, ISO 27001 and Cyber Essentials) Ability to talk technically then non-technically to the business Solid understanding of IT Infrastructure eg; networking, Active Directory and endpoint More ❯
Employment Type: Permanent
Salary: £65000 - £70000/annum Great company benefits
South East London, England, United Kingdom Hybrid / WFH Options
NOTHREAT
infrastructure, and operations. Lead security architecture reviews, threat modeling, and secure development practices across engineering teams. Oversee the implementation and operation of security controls, incident response plans, and risk management frameworks. Work closely with the AI engineering team to address security implications of machine learning models and data pipelines. Evaluate and adopt new security technologies and frameworks aligned with … with AI/ML systems, securing data pipelines, models, and associated infrastructure. Strong technical background in areas such as application security, cloud security (AWS/Azure), identity and access management, and threat detection. Proficiency with SIEM, SOAR, EDR, vulnerabilitymanagement, and DevSecOps practices. Deep understanding of modern attack vectors, threat intelligence, and incident response processes. Experience with … SOC 2, GDPR). Proven ability to align security priorities with business and product strategy. Demonstrated experience delivering large-scale, cross-functional security projects. Excellent leadership, communication, and stakeholder management skills. Preferred Qualifications Experience in cybersecurity for SaaS or AI-native platforms. Familiarity with adversarial machine learning, model governance, or AI-specific threat models. Prior experience scaling security functions More ❯
Windsor, England, United Kingdom Hybrid / WFH Options
Women in Tech UK
best practices. Preferred experience dealing with incidents in a wide range of environments, including OT and ICS technologies. Preferred experience of working with wider Cyber Defence teams, including Intelligence, VulnerabilityManagement, Threat Hunting and Purple Teams Personal Attributes: Strong interpersonal, analytical, and problem-solving skills. Effective team player with excellent communication. Adaptable, detail-oriented, and proactive. Why Join More ❯
Reigate, Surrey, United Kingdom Salary Competitive Closing date 29 May 2025 View more categories View less categories Sector Engineering ,IT ,Security Job Role Cloud Security Job Type Permanent Support Vulnerability and Patch Management for ICT. Resolve issues with internal stakeholders. Prioritize and reduce Vulnerability risk on ICT IT assets. Perform Vulnerability risk assessments. Analyze severe vulnerabilities … and provide mitigation strategies. Assess Cloud Security threats using native and third-party tools. Implement, monitor, and report on secondary security controls, ensuring policy compliance. Support the management of risk when patches or standards cannot be applied. Assist in audit programs. Update governance and MI reports. Maintain documentation for security controls, policies, and procedures. Collaborate with WTW (ICS) corporate … security team. Stay updated on cloud security threats and measures. Job Description The Role Support Vulnerability and Patch Management for ICT. Resolve issues with internal stakeholders. Prioritize and reduce Vulnerability risk on ICT IT assets. Perform Vulnerability risk assessments. Analyze severe vulnerabilities and provide mitigation strategies. Assess Cloud Security threats using native and third-party tools. More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Sarafin Partners
experienced professional to work with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the defined policies … standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception and management reports Reporting … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerabilitymanagement, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of network infrastructure, including routers, switches More ❯
Crawley, England, United Kingdom Hybrid / WFH Options
DGH Recruitment
information security strategy, ensuring alignment with ISO 27001, GDPR and Cyber Essentials. The ideal candidate will have strong information security experience alongside hands-on technical knowledge of SIEM, EDR, vulnerabilitymanagement, and incident response. Responsibilities: - Serve as a subject matter expert for information security, advising stakeholders on risks, controls, and security best practices. - Support business units with risk … and mail filtering systems to ensure effective threat detection and response. - Monitor, investigate, and respond to alerts and incidents, coordinating with internal teams and third-party providers. - Oversee regular vulnerability scans and third-party penetration tests; track and report remediation efforts. - Maintain the internal compliance programme for information security and data protection, including ISO27001, GDPR and Cyber Essentials requirements. … Required Skills/Experience: - Strong understanding of information security principles, risk management, and compliance (ISO 27001, GDPR, Cyber Essentials). - Hands-on experience with cybersecurity tools. - Experience conducting or supporting internal security audits or assessments. - Solid understanding of IT infrastructure (e.g. networking, Active Directory, endpoint security). - Certifications such as CISSP, CISM, CISA, Security+, or equivalent (highly advantageous) Information More ❯