implementing ServiceNow solutions such as: GRC solutions aligned with clients' regulatory frameworks, risk assessments, and compliance goals. Security Operations (SecOps) solutions including incident response, vulnerabilitymanagement, and security automation. Your skills and experience We seek a ServiceNow Developer with experience in GRC and/or SecOps who wants … grow and delight customers. You will have: Experience with ServiceNow GRC: IRM Implementation Experience with ServiceNow SecOps and related products Knowledge in Identity & Access Management, VulnerabilityManagement, Security Monitoring, Incident Management, Platform, Network, and Application Security Broad experience across the Now Platform Good communication skills (written … Apr 2025 Experience level: Experienced Professionals Contract: Permanent Locations: Woking, Birmingham, Manchester, London Business unit: Cloud Infrastructure Services Brand: Capgemini Community: Cloud Infrastructure Management Joining Capgemini means becoming part of something bigger. Learn about our recruitment process, how to apply, and get interview tips to prepare for your application. More ❯
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
background required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Cyber Threat Intelligence and Vulnerability Lead Job Title: Cyber Threat Intelligence and Vulnerability Lead Requisition ID: 121483 Location: Leeds (this is a 100% office based role due to … key vulnerabilities are detected, triaged and reported on daily. Accountable for all regular reporting and ensuring the efficient delivery of all threat intelligence and vulnerability products by their respective deadlines. Where there is not established schedule for a product, the lead is responsible for ensuring that an achievable deadline … of both to ensure that the intelligence products are relevant to the client's interests. Accountable for the quality of all Threat Intelligence and Vulnerability Reports, ensuring that when a product is delivered it is at the highest possible standard. Accountable for ensuring that all relevant processes are effectively More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Radar Healthcare
and ensuring everyone understands their role in protecting our organisation. Leading from the front, you will champion a security conscious culture of proactive risk management and practical compliance to deliver meaningful and sustainable security improvements aligned to our strategic ambitions. What you'll be doing to make a difference … everyday processes. Oversee the security posture of cloud environments, ensuring secure configurations, proactive threat monitoring, and resilience planning. Establish and maintain a robust risk management framework, proactively identifying, assessing, and mitigating cybersecurity risks in alignment with business goals. Define standards for operational security including vulnerabilitymanagement, incident … . Demonstrated experience conducting security due diligence and managing integrations in acquisitions. A proven track record of building and embedding security awareness and risk management frameworks across business and technical teams. Strong operational experience, including establishing and managing incident response, vulnerabilitymanagement, and security monitoring programs. Ability More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. Experience More ❯
Portsmouth, yorkshire and the humber, united kingdom Hybrid / WFH Options
TRIA
We’re working with a leading organisation in critical infrastructure that is looking for a Vulnerability Analyst (OT) to join their team. This is a fantastic opportunity to contribute to the security of Operational Technology (OT) environments , helping to safeguard essential services. The Role: Our client is looking for … someone to: Conduct vulnerability assessments across OT environments to identify security risks. Work closely with internal teams to develop and implement risk mitigation strategies. Monitor and assess emerging threats impacting critical infrastructure . Provide expert guidance on best practices for OT security and compliance. Travel once per quarter to … the South of England for team collaboration. What We’re Looking For: Some hands-on experience in OT security or vulnerabilitymanagement – this could be from working with ICS/SCADA environments, network security, or cyber risk management in OT. A strong understanding of OT vulnerabilities and More ❯
complex technology audits focused on cloud environments (especially AWS), cybersecurity programs, network security, and enterprise applications. Evaluate cloud infrastructure controls, architecture risks, and configuration management within AWS environments, identifying gaps and control weaknesses. Conduct assessments of cybersecurity frameworks, including access management, vulnerabilitymanagement, incident response, and More ❯
Manchester OR Hertfordshire - Hybrid, Manchester, England Hybrid / WFH Options
InfraView
leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a "people manager" as well … business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerabilitymanagement, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and … SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerabilitymanagement tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials More ❯
Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. They re looking for … expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring Conduct regular security checks to ensure compliance with policies and regulations. User … Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & VulnerabilityManagement Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. More ❯
Security team. Known for their commitment to excellence, innovation, and a people-first culture, our client provides top-tier consultancy, delivery, operations, and program management services worldwide. This is a fantastic opportunity to join a global organisation with over 20,000 employees across 100+ locations. They're looking for … expertise in Microsoft O365 Security Solutions to play a key role in strengthening their IT Security operations. Information Security Consultant - Key Responsibilities: Security Incident Management – Identify, manage, and respond to security incidents swiftly and effectively. Security Monitoring – Conduct regular security checks to ensure compliance with policies and regulations. User … Alerts – Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & VulnerabilityManagement – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and refine disaster recovery plans to enhance business resilience. More ❯
application and hardware support for Exchange, Active Directory, Office 365, system backups, antivirus solutions, security solutions (SIEM), network administration, virtualization technologies, UPS maintenance, database management, end-user applications. Service Improvements: Proactively identify and implement service improvements, manage bespoke in-house software, oversee information security administration, IT infrastructure procurement, software … management, maintenance and warranty control, IT service delivery continuity, disaster recovery model, change management & documentation, patch and vulnerability management. Experience & Skills: Experience: Minimum 3 years in infrastructure and 2nd/3rd Line support roles, expertise in technical design, administration, and implementation of enterprise networks, VMware administration, Active … administration, firewall administration, Office 365, server hardware and software infrastructure, automation, Dell hardware, IDP administration, SAN/storage architecture. Skills: Proficient in operating system management, cloud technologies, automation and scripting, storage and backup management, disaster recovery planning, Office 365 administration, problem-solving, change control, project management, patch More ❯
make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly … Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security … global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, VulnerabilityManagement, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and controls … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory … a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. More ❯
Act as a key liaison between internal stakeholders, managed service providers, and external vendors to ensure operational continuity and alignment with business objectives. Infrastructure Management Oversee the day-to-day performance and availability of core infrastructure systems, including networks, servers, storage, and cloud services. Monitor infrastructure platforms proactively to … units. Service Operations & Technical Support Provide third-line support across infrastructure layers, supporting internal users and IT service desk teams. Maintain and enforce access management protocols for infrastructure components and enterprise applications. Lead incident resolution efforts involving infrastructure systems, ensuring timely escalation to third-party experts when required. Vendor … enhance Microsoft 365 security posture across the organization. Manage the configuration and policy enforcement of Microsoft Intune, including compliance and device security baselines. Oversee vulnerabilitymanagement and endpoint patching activities in partnership with external security consultancies. Administer firewall configurations and ensure consistent deployment across all locations and platforms. More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead … clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits … regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerabilitymanagement, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages More ❯
technologies (firewalls, IDS/IPS, SIEM, etc.). Experience with security tools such as SIEM/SOAR platforms, endpoint detection and response (EDR) solutions, vulnerabilitymanagement, detection and response/remediation (VMDR) solutions and threat intelligence platforms. Knowledge of security standards and frameworks (e.g., NIST, CIS Controls, ISO More ❯
for this role. We're on the hunt for a motivated, engaged Security Operations Analyst to support, maintain and improve/contribute to the management of real time security operations, including real time analysis and ongoing security management across Vix's application suite. This opportunity will suit someone … judgment when working with sensitive information Experience with application/device security monitoring (i.e., Firewalls, IDS/IPS, Anti-Virus) Experience with SIEM tools & VulnerabilityManagement (AlienVault, Nessus, Qualys) Demonstrated ability to work as part of a team to deliver project outcomes within specified parameters including timeframes and More ❯
Security Consultant you will work with the wider IT Security Team to support and maintain enterprise wide solutions. The Responsibilities Assist with security incident management and response activities General day-to-day support on managing and responding to security alerts from systems and end users Perform daily, weekly, and … standards including Cyber Essentials, ISO 27001, 27002 etc. Data Protection Act and the General Data Protection Regulation Microsoft O365 Security solutions; Networking; Security operations; VulnerabilityManagement Security Auditing Good understanding of security testing principles, including experience of vulnerability scanning, identifying, resolving, and reporting risks Experience of formal More ❯
compliance Establish and enforce IT security policies and procedures Ensure compliance with relevant regulations, such as GDPR and PCI DSS Oversee security operations, including vulnerabilitymanagement and incident response What are we looking for? Senior-level IT leadership experience, including team management and strategic oversight. Deep hands More ❯
compliance Establish and enforce IT security policies and procedures Ensure compliance with relevant regulations, such as GDPR and PCI DSS Oversee security operations, including vulnerabilitymanagement and incident response What are we looking for? Senior-level IT leadership experience, including team management and strategic oversight. Deep hands More ❯
compliance Establish and enforce IT security policies and procedures Ensure compliance with relevant regulations, such as GDPR and PCI DSS Oversee security operations, including vulnerabilitymanagement and incident response What are we looking for? Senior-level IT leadership experience, including team management and strategic oversight. Deep hands More ❯
Employment Type: Permanent
Salary: £80000 - £85000/annum discretionary bonus and more
to security events across a complex, multi-departmental IT environment. You'll maintain and use key security tools such as SIEM, IDS, EDR, and vulnerabilitymanagement platforms. You will work closely with system owners and users to assess configurations, analyse logs, and improve security controls and procedures. In … career experience in a relative field Hands-on experience with security monitoring and incident response technologies such as SIEM, IDS and EDR. Experience with vulnerability assessment including practical assessments for risk analysis. A strong working knowledge of at least one major operating system (Windows, Linux, or MacOS). An More ❯
the OT environment. Incident Response: Developing and implementing incident response plans for handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. VulnerabilityManagement: Acknowledging and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Collaboration: Collaborating with IT and Generation Engineering … and problem-solving skills including root-cause analysis with the ability to manage multiple activities at pace. You’ll have strong communication and stakeholder management skills, both verbal and written, with the ability to lead small projects, work with complexity and think outside the box. Rewards and benefits As More ❯