Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Xcede
of the organisations Azure-based infrastructure, with a key application hosted in AWS. This role blends hands-on technical delivery with strategic oversight, covering endpoint security, identity management, patching, vulnerabilityremediation, and threat response. Key activities include: Managing and supporting a small infrastructure and security team. Overseeing Azure and AWS environments, contributing to architecture decisions. Driving endpoint and … identity security via Microsoft Intune, Defender, and Entra ID. Leading patch management, endpoint hardening, and vulnerability resolution. Acting as escalation point for incidents from a third-party SOC and coordinating internal response. Supporting Cyber Essentials Plus and ISO 27001 compliance activities. Administering operational security tools including Microsoft Sentinel and Defender XDR. Maintaining technical documentation and clear operational procedures. About … You Strong hands-on experience with cloud infrastructure management (Azure essential). Proven track record in endpoint protection, IAM, patching, and vulnerability management. Skilled in Microsoft Intune, Defender suite, and Sentinel SIEM. Experience supporting security compliance programmes. Excellent coordination skills, especially during incident response. Able to balance operational delivery with strategic infrastructure and security improvements. Contract Details Duration: Initial More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
/CD pipelines, including automated testing, code scanning, and policy enforcement. * Security Testing Coverage: Proportion of applications and systems that undergo static, dynamic, and interactive security testing before release. * VulnerabilityRemediation Velocity: Average time taken to remediate critical and high-severity vulnerabilities identified during development and testing phases. * Toolchain Utilisation Effectiveness: Adoption and effective use of security tools More ❯
Nuneaton, Warwickshire, United Kingdom Hybrid / WFH Options
IntaForensics
and private sectors, ensuring work is performed to the highest professional standards. Key Responsibilities Conduct thorough penetration tests on infrastructure, web applications, APIs, mobile applications, and cloud environments. Perform vulnerability and cloud assessments using a variety of tools and techniques. Document testing procedures, findings, and recommendations in detailed reports for both technical and non-technical audiences. Serve as the More ❯
Birmingham, West Midlands (County), United Kingdom
VIQU IT
document lifecycle processes in line with operational best practices Act as a trusted point of contact for business users, ensuring application needs are met effectively Support system compliance and vulnerabilityremediation activities aligned with security standards Key Requirements of the iManage Application Specialist: Strong hands-on experience with iManage, including Work 10, Control Center, and third-party integration More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Robert Walters
working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerability management activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party risks … Assist in managing third party risk processes by evaluating external partners' security postures and ensuring compliance with internal requirements. Work closely with Security Operations and IT teams to oversee vulnerability assessments and coordinate remediation efforts effectively. Conduct thorough reviews of security architecture for new systems and services to ensure robust protection measures are in place from the outset. … experience on protecting sensitive data within regulated environments. Your background should include hands-on involvement with risk assessments, policy development aligned with industry standards like ISO 27001 or NIST, vulnerability management activities spanning identification through remediation, and direct participation in incident response processes. Demonstrable experience applying risk assessment methodologies to identify vulnerabilities and recommend effective mitigations is highly More ❯
skillset What You'll Be Doing Leading incident response and managing containment, analysis, and resolution Monitoring security systems (SIEM, EDR, threat intel) to identify and respond to threats Conducting vulnerability assessments and supporting remediation for financial systems Ensuring compliance with GLBA, PCI, FFIEC, and other regulatory frameworks Supporting risk reviews, vendor assessments, and internal audits Participating in security … What You'll Need to be Considered 3-5+ years of relevant experience Prior experience in financial services, banking, or fintech cybersecurity Expertise with SIEM, EDR, NGFW, and vulnerability management tools Familiarity with scripting (Python, PowerShell) for automation and threat detection Experience conducting third-party risk reviews and regulatory reporting ITAC Solutions firstName lastName Email Address Phone Number More ❯