We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & Access Management (IAM), and Data Loss Prevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable, and resilient identity and data protection services. The ideal candidate will combine … deep technical expertise with strong leadership skills to shape the future of cybersecurity, identity, and data protection within the organization. This position is designated as a Senior Management Function (SMF) under the Financial Conduct Authority regime, carrying personal accountability for compliance, operational resilience, and security effectiveness. The Role: Strategic Leadership Define and execute the global strategy for Cyber Engineering … NYDFS), Sarbanes-Oxyley (SOX), and the Financia Conduct Authority(FCA). Cyber Engineering Oversight Lead engineering teams responsible for core security platforms, including endpoint protection, cloud security, network defense, vulnerabilitymanagement, and DevSecOps integrations. Build and mature a comprehensive vulnerabilitymanagement program, including continuous scanning, risk-based prioritization, remediation tracking, and Board-level reporting. Drive innovation More ❯
SOC Analyst - CISSP, ISC2 SCCP, Palo Alto, Threat Detection, VulnerabilityManagement, Firewall A global law firm client we work with are currently looking to take on a new SOC Analyst (CISSP, ISC2 SCCP, Palo Alto, Threat Detection, VulnerabilityManagement, Firewall) on a permanent basis. The firm are currently undergoing a significant transformation and expansion across the … deal of trust, autonomy and ownership with a very anti-micromanage managerial structure in place. To be considered for this SOC Analyst (CISSP, ISC2 SCCP, Palo Alto, Threat Detection, VulnerabilityManagement, Firewall) role, it's ideal you meet one of the following criteria: Work Experience Based Criteria 5+ Years of Working Experience in Cybersecurity or Related Field [Preferred More ❯
infrastructure, cloud environments, and data assets across the enterprise. This position provides strategic oversight of the Security Operations Centre (SOC) and threat detection capabilities, leads the incident response and vulnerabilitymanagement programmes, and drives the optimisation of security technologies and automation. This position also plays a key role in shaping internal security policies, standards and control frameworks. Success … of high-performing teams, and the ability to collaborate effectively with senior stakeholders, technology teams, and external partners. Key Accountabilities Security Operations: Provide leadership for security operations, ensuring effective management of Security Operations Centre (SOC) and Managed Detection & Response (MDR) services. Oversee threat detection, monitoring, and incident response capabilities, ensuring operational excellence and continuous improvement. Incident Response: Develop the … timely detection, triage, containment, and recovery from security incidents. Oversee collaboration with internal teams and external partners, and provide executive-level visibility on incident impact and response effectiveness. Exposure Management: Lead the enterprise vulnerabilitymanagement and threat exposure programme, ensuring proactive identification, assessment, and remediation of risks through vulnerability scanning, patch management, penetration testing, and More ❯
and maintain the organization's information security strategy, policies, standards, and procedures in alignment with business objectives and regulatory requirements. Lead the development and implementation of an Information Security Management System (ISMS), based on ISO 27001 Conduct regular security risk assessments, identify vulnerabilities, and recommend appropriate mitigation strategies. Stay up-to-date with the latest cybersecurity threats, trends, technologies … Oversee the day-to-day operation of security systems and tools, including firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus, anti-malware, SIEM (Security Information and Event Management), vulnerability scanners, and data encryption solutions. Manage vulnerabilitymanagement programs, including regular scanning, penetration testing, and remediation of identified weaknesses. Lead and manage security incident response … ensure security is embedded in the design, implementation, and maintenance of all IT infrastructure, including cloud environments (e.g., Azure, AWS, GCP), networks, servers, and endpoints. Manage access controls, identity management (e.g., Entra ID/Azure AD), and privileged access management (PAM) systems. Manage access control processes to 3rd party applications, and 3rd party relations. Oversee the patching and More ❯
Milton Keynes, England, United Kingdom Hybrid/Remote Options
Lorien
My client, a successful well-known international bank is looking for a VulnerabilityManagement Support Engineer to assist with the assessment and remediation of security vulnerabilities within infrastructure. This role involves supporting vulnerability analysis, coordinating with cross-functional teams, and ensuring timely remediation to reduce risk exposure. Key Responsibilities Collaborate with system, application, and infrastructure teams to … exceptions, waivers, and risk acceptances. Support updates to asset inventory and CMDB related to scan coverage and tool integration. Act as liaison between security teams and IT teams for vulnerability remediation. Link vulnerability IDs (CVEs) to corresponding tickets for traceability. Generate regular reports and maintain SOPs/runbooks for remediation tasks. Skills & Experience Required to be Successful Understanding More ❯
engineering teamsproviding hands-on guidance, resolving concerns, and fostering a security-first mindset. DevSecOps Enablement: Promote and implement secure development practices across CI/CD pipelines, secrets and key management, dependency management, and secure design. VulnerabilityManagement: Lead vulnerability remediation effortstriaging findings, prioritizing risks, and partnering with teams to deliver effective, pragmatic fixes. Tooling & Automation … Hands-on experience with secure CI/CD practices, DevSecOps methodologies, GitHub workflows, and Terraform. Deep understanding of cloud security principles in AWS and Azure, particularly around IAM, secrets management, and networking. Proficient in secure coding practices, threat modeling, and vulnerability remediation. Familiar with a range of security tooling including static and dynamic analysis, software composition analysis, and More ❯
the design and implementation of Azure security best practices, policies, and controls. Manage and optimise Microsoft Sentinel SIEM, including rule creation, use-case development, automation, and threat hunting. Oversee vulnerabilitymanagement activities using Tenable, ensuring timely identification, prioritisation, and remediation of risks. Support incident response activities, including investigation, containment, and root-cause analysis. Conduct security assessments, recommend improvements … Security Centre, Azure AD, Defender for Cloud, and cloud security architecture. Proven expertise in Microsoft Sentinel SIEM administration, threat detection, and automation (KQL experience desirable). Solid understanding of vulnerabilitymanagement with Tenable (Tenable.io/Tenable.sc). Knowledge of industry security frameworks (ISO 27001, NIST, CIS). Strong analytical, problem-solving, and communication skills. Relevant certifications highly desirable More ❯
the design and implementation of Azure security best practices, policies, and controls. Manage and optimise Microsoft Sentinel SIEM, including rule creation, use-case development, automation, and threat hunting. Oversee vulnerabilitymanagement activities using Tenable, ensuring timely identification, prioritisation, and remediation of risks. Support incident response activities, including investigation, containment, and root-cause analysis. Conduct security assessments, recommend improvements … Security Centre, Azure AD, Defender for Cloud, and cloud security architecture. Proven expertise in Microsoft Sentinel SIEM administration, threat detection, and automation (KQL experience desirable). Solid understanding of vulnerabilitymanagement with Tenable (Tenable.io/Tenable.sc). Knowledge of industry security frameworks (ISO 27001, NIST, CIS). Strong analytical, problem-solving, and communication skills. Relevant certifications highly desirable More ❯
the design and implementation of Azure security best practices, policies, and controls. Manage and optimise Microsoft Sentinel SIEM, including rule creation, use-case development, automation, and threat hunting. Oversee vulnerabilitymanagement activities using Tenable, ensuring timely identification, prioritisation, and remediation of risks. Support incident response activities, including investigation, containment, and root-cause analysis. Conduct security assessments, recommend improvements … Security Centre, Azure AD, Defender for Cloud, and cloud security architecture. Proven expertise in Microsoft Sentinel SIEM administration, threat detection, and automation (KQL experience desirable). Solid understanding of vulnerabilitymanagement with Tenable (Tenable.io/Tenable.sc). Knowledge of industry security frameworks (ISO 27001, NIST, CIS). Strong analytical, problem-solving, and communication skills. Relevant certifications highly desirable More ❯
the design and implementation of Azure security best practices, policies, and controls. Manage and optimise Microsoft Sentinel SIEM, including rule creation, use-case development, automation, and threat hunting. Oversee vulnerabilitymanagement activities using Tenable, ensuring timely identification, prioritisation, and remediation of risks. Support incident response activities, including investigation, containment, and root-cause analysis. Conduct security assessments, recommend improvements … Security Centre, Azure AD, Defender for Cloud, and cloud security architecture. Proven expertise in Microsoft Sentinel SIEM administration, threat detection, and automation (KQL experience desirable). Solid understanding of vulnerabilitymanagement with Tenable (Tenable.io/Tenable.sc). Knowledge of industry security frameworks (ISO 27001, NIST, CIS). Strong analytical, problem-solving, and communication skills. Relevant certifications highly desirable More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Oscar Technology
and ensure compliance with recognised security frameworks. Key Responsibilities Lead and develop a team of cyber security engineers, providing technical and strategic direction. Oversee security operations including monitoring, incident management, and threat response. Conduct assessments across the IT estate to identify risks and emerging threats. Manage security events from detection through to remediation, ensuring timely and effective responses. Drive … improvements to the organisation's security posture in line with a rapidly evolving technology landscape. Maintain adherence to relevant security standards and regulatory frameworks. Oversee vulnerabilitymanagement activities and ensure effective patch governance. Support cloud security programmes and the development of secure architecture patterns. Lead enhancements to threat detection, SIEM/SOC processes, and endpoint security controls. Provide … equivalent knowledge. Ability to communicate complex cyber risks to a range of audiences, including senior leadership. Hands-on experience with: SIEM/SOC operations XDR/EDR platforms and vulnerabilitymanagement tools Cloud security controls and best practices CNAPP or similar cloud-native protection solutions Working knowledge of frameworks such as Cyber Essentials, ISO 27001, NIST. Expertise in More ❯
security initiatives, influence secure design standards, and mentor colleagues in best practices. Key Responsibilities Lead application and cloud security initiatives, ensuring systems and software are secure by design. Drive vulnerabilitymanagement and implement a risk-based approach across the technology stack. Perform security testing (SAST, DAST, SCA) and work with developers to remediate findings. Support cloud security controls … hands-on experience in application and cloud security engineering. Deep understanding of web app vulnerabilities (OWASP Top 10, CWE) and secure coding practices. Proficiency with security testing tools and vulnerabilitymanagement platforms. Broad knowledge of network and infrastructure security concepts (WAFs, ACLs, VPNs, etc.). Familiarity with security frameworks and principles such as Zero Trust and risk-based More ❯
Southampton, Hampshire, South East, United Kingdom
Adroit People Ltd
JD: VulnerabilityManagement Maintaining vulnerability scanning platforms to identify and analyse vulnerabilities Taking a risk-based approach to prioritise remediation efforts Working with support teams to remediate issues Building a range of reporting capabilities to inform our stakeholders on the status and progress of VM remediation efforts across engineering and up to leadership teams Data correlation and … identifying patterns and trends, building MI which can be shared with stakeholders Security Incident response Assist in the management of high priority vulnerability incidents Co-ordinate with support teams in order roll out mitigation of vulnerability solutions Monitor daily dashboards from security tooling and produce weekly reports to demonstrate progress of remediation by support teams Qualys Patch … Management Manage the deployment of patches and updates to end-user systems using Qualys Patch Management Monitor patch compliance status across all devices and ensure timely application of critical updates Troubleshoot and resolve patching issues, coordinating with stakeholders as necessary Schedule patch windows and coordinate with end-users to minimize disruption Ability to script and adapt any patching More ❯
Automate repetitive tasks through scripting and streamline processes Perform firmware/software upgrades and maintain accurate asset and documentation records Uphold rigorous change control and security best practices, including vulnerabilitymanagement Mentor junior team members and contribute to the continuous improvement of systems and processes What We’re Looking For Proven experience as a Senior or Lead Network … in designing and delivering network projects from concept through to implementation Scripting/automation skills (Python, Ansible, or similar) to improve efficiency Solid grasp of IT security principles and vulnerabilitymanagement Excellent customer-facing skills with the ability to articulate technical concepts clearly Relevant industry certifications (CCNP, CCIE, JNCIP, Fortinet NSE, etc.) strongly preferred Services offered by Computappoint More ❯
and processes adhere to regulatory standards, with comprehensive documentation and audit trails. Partner with compliance and risk teams to monitor and report on IT governance metrics. Software Security & Risk Management Lead application security strategy, including vulnerabilitymanagement, patching, and secure coding practices. Oversee penetration testing, threat modelling, and remediation plans. Manage identity and access controls across all … systems, ensuring least-privilege principles. Systems Process Management Standardise and optimise system workflows for efficiency and compliance. Implement automated monitoring and alerting for critical applications. Maintain version control, change management, and release processes with full auditability. Incident Response & Business Continuity Develop and maintain incident response playbooks for system and security breaches. Coordinate disaster recovery testing for applications and … data integrity. Ensure robust backup and failover strategies for regulated systems. Stakeholder & Vendor Management Liaise with software vendors and third-party providers to ensure compliance and security standards. Support regulatory audits and provide evidence of system controls and security measures. Continuous Improvement Stay current with FCA guidelines, cybersecurity trends, and emerging technologies. Recommend enhancements to security architecture and compliance More ❯
automation and tooling, working with Security Operations to monitor and analyse network traffic for malicious activity or potential breaches. Additionally, this role implements network access controls, enforces robust patch management for network devices, and works with network security partners to identify network vulnerabilities, planning and implementing upgrades to ensure the highest standards of network security. This role is required … Service and Portfolio Requests i.e. Meraki configuration and firewall changes. On Call Rota: Participate in on-call rota and occasionally work out of regular business hours to facilitate change management and incident resolution. Secure Network Configurations: Establish and maintain secure network configurations including Cisco Meraki and Palo Alto firewalls, routers, switches, and VPNs. Firewall and Access Review: Periodically review … monitor and analyse network traffic for malicious activity or potential breaches. Access Controls: Implement network access controls to ensure only authorised users and devices can access specific network segments. Vulnerability and Patch Management: Identify and manage the remediation of network vulnerabilities and upgrades to ensure the highest standards of network security. This includes vulnerabilitymanagement of More ❯
systems proactively for suspicious activity. Maintain and update cyber security procedures and documentation. Provide IT support when required, including first, second, and third line assistance. Attend monthly cyber/vulnerability meetings and contribute expertise as needed. Essential Skills & Experience: Minimum 2 years' experience in an IT security-related role ???. Experience with vulnerabilitymanagement and reporting tools. … verbal communication skills to explain risks to both technical and non-technical stakeholders. CompTIA Security+ or equivalent qualification ??. Desirable: Experience with SIEM systems, EDR, IDS/IPS, and vulnerability scanners. Previous experience in a law firm or professional services environment. Familiarity with Practice Management Systems (PMS) and Document Management Systems (DMS). Personal Attributes: Methodical, thorough More ❯
JD: VulnerabilityManagement Maintaining vulnerability scanning platforms to identify and analyse vulnerabilities Taking a risk-based approach to prioritise remediation efforts Working with support teams to remediate issues Building a range of reporting capabilities to inform our stakeholders on the status and progress of VM remediation efforts across engineering and up to leadership teams Data correlat click More ❯
GDPR, PCI DSS, Cyber Essentials Plus, and ISO/IEC 27001:2022 aligned practices. Lead Data Protection Impact Assessments (DPIAs), data mapping, classification, and retention programs. Oversee incident response, vulnerabilitymanagement, patch compliance, and secure configuration baselines using SCCM, Ivanti, Intune, GPO, and Azure Defender. Drive SOC integration, threat intelligence, and monitoring to continuously improve detection and response … Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in Zero Trust security models. Experienced in security tooling selection and implementation. Deep understanding of data protection legislation, risk management frameworks, and compliance requirements. Exceptional leadership, stakeholder engagement, and influencing skills. More ❯
scalable, secure and resilient solutions that align with organisational objectives. This role will be within the infrastructure projects team and act as the technical lead for all security/vulnerability remediation activities of the current Windows endpoint and server estate, with an initial focus of Cyber Essentials compliance. The role will also be responsible for the allocation and management of tasks/work packages for a team of Senior System Analysis who will also be focused on security/vulnerability remediation activities of the current Windows estate. The overall objective is to assist with security/venerability patching, applications packaging other areas of support for the University’s estate of approximately 4,500 Windows 11 devices, plus … and adoption of cloud/managed services. Build strong relationships with stakeholders Desirable Professional certifications (e.g., Microsoft MCSE/MCP). ITIL Foundation or higher; PRINCE2 or Agile project management qualifications. Experience in Higher Education or DevOps. Experience working on and delivering Cyber Essentials Technical Requirements Essential 5+ years’ experience in day-to-day management of large Windows More ❯
templates, and standards. Assist in the development and localisation of standard test scripts, ensuring they are tailored to specific control environments and aligned with the organisation's Enterprise Risk Management Framework. Conduct control testing activities to evaluate the design and operational effectiveness of cybersecurity controls, documenting results clearly and raising issues where appropriate. Ensure timely delivery of assigned control … role, the essential criteria you'll need are Proven experience in performing cybersecurity control assessments, including evaluating design and operational effectiveness. Strong understanding of information security principles, cyber risk management, and control frameworks. Experience in IT, OT and Cloud environments, with a focus on cybersecurity controls. Clear and professional verbal and written communication, including the ability to explain cybersecurity … with minimal supervision, taking ownership of assigned tasks and driving them to completion while maintaining high standards of quality and accuracy. Strong understanding of Cybersecurity Domains, including Threat Intelligence, VulnerabilityManagement, Security Testing, Security Architecture, Infrastructure Protection, Application Security, Identity and Access Management, Incident Investigation & Response and Cryptography. Additional skills and experiences would be great to have More ❯
responsible for: Managing and enhancing IT security controls, frameworks and processes Overseeing BAU security operations, ensuring services are delivered efficiently and in line with SLAs Leading activity across Threat & VulnerabilityManagement (TVM), PAM, IAM, DLP, Network Security and Penetration Testing Managing outsourced security providers and holding them to account on performance Acting as SME for security improvement projects … IT security operations within complex, enterprise environments Industry-recognised certifications such as CISSP, TOGAF, CCSP, GCIH or equivalent Strong experience securing Microsoft cloud environments (Azure) - design, deployment, configuration and management Broad knowledge of infrastructure and security solutions, including SIEM/SOAR Proven track record designing end-to-end solutions with security Embedded across network, infrastructure, access, cloud services, controls … cloud transformation initiatives, ensuring security is integrated throughout Good understanding of security standards, procedures, reviews and security automation Familiarity with security frameworks such as ISO27001 and NIST Strong stakeholder management skills, with the ability to work closely with IT, Security, Risk and external suppliers To discuss this permanent opportunity in more detail, please get in touch directly for a More ❯
frameworks such as ISO 27001, NIST, CIS Controls, and ITIL. Experience with automation tools and scripting languages (e.g., PowerShell, Python) for configuration and compliance checks. Knowledge of patch and vulnerabilitymanagement tools and practices. Understanding of identity and access management (IAM) principles and technologies. If you are ready for the next challenge and you have the above More ❯
Guildford, England, United Kingdom Hybrid/Remote Options
Hawksworth
frameworks such as ISO 27001, NIST, CIS Controls, and ITIL. Experience with automation tools and scripting languages (e.g., PowerShell, Python) for configuration and compliance checks. Knowledge of patch and vulnerabilitymanagement tools and practices. Understanding of identity and access management (IAM) principles and technologies. If you are ready for the next challenge and you have the above More ❯
year cyber security strategy and roadmap Lead enterprise security governance and represent security at senior/board level Own policies, frameworks, compliance, DPIAs, and operating models Oversee incident response, vulnerabilitymanagement, SOC integration, and threat monitoring Secure hybrid platforms (Azure, AWS, Nutanix, SD-WAN, Zero Trust, CASB, SASE) Lead risk assessments, KRIs, and reporting to senior leadership Embed … security culture through training, phishing simulations, and awareness programmes Drive security into operational teams, vendors, partners, and third-party risk management Success Measures Strategy delivered within first 90 days Strong GDPR & PCI audit outcomes Reduction in vulnerabilities and phishing incidents Improved audit ratings and team engagement What We're Looking For Senior leadership experience in cyber/security CISSP More ❯