security operations service. Lead the organisation's response to security incidents, coordinating recovery efforts with internal teams and vendors. Establish and manage threat intelligence processes to ensure timely remediation of vulnerabilities. Monitor and analyse performance metrics to support security troubleshooting and continuous improvement. Identity & Access Management Provide expert technical leadership for identity and access management, ensuring secure, high-performing … equivalent industry certification. Professional certification in security/identity (e.g. CREST, GIAC). ITIL Foundation certification. Incident response certification preferred. Technical Knowledge Proficient in SIEM, EDR, threat detection, and vulnerability management. Solid understanding of network security (firewalls, segmentation, IDS/IPS). Experience with Windows, Mac, Linux environments and security tooling. Familiarity with public cloud platforms (Azure, OCI) and More ❯
supporting documentation for secure cloud adoption. Evaluate and recommend security technologies, tools, and vendors. Investigate vulnerabilities and implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & Access Management, Privileged Access Management, Endpoint Security, and Network Security. Support compliance with More ❯
supporting documentation for secure cloud adoption. Evaluate and recommend security technologies, tools, and vendors. Investigate vulnerabilities and implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & Access Management, Privileged Access Management, Endpoint Security, and Network Security. Support compliance with More ❯
and traffic flows. Solid understanding of networking concepts and traffic flows. Understanding of how technology choices impact Cyber Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical skills, with the ability to More ❯
High Wycombe, Buckinghamshire, UK Hybrid / WFH Options
Addition+
pre-engagement activities, including scoping and client calls Undertake quality assurance (QA) activities on other consultants' reports before client delivery Produce detailed reports outlining identified vulnerabilities and provide sensible remediation recommendations Main Skills/Requirements Must be eligible for Security Clearance due to the nature of clients Full UK Driving License & Access to a vehicle are essential Experience working More ❯
pre-engagement activities, including scoping and client calls Undertake quality assurance (QA) activities on other consultants' reports before client delivery Produce detailed reports outlining identified vulnerabilities and provide sensible remediation recommendations Main Skills/Requirements Must be eligible for Security Clearance due to the nature of clients Full UK Driving License & Access to a vehicle are essential Experience working More ❯
Milton Keynes, Buckinghamshire, UK Hybrid / WFH Options
Addition+
pre-engagement activities, including scoping and client calls Undertake quality assurance (QA) activities on other consultants' reports before client delivery Produce detailed reports outlining identified vulnerabilities and provide sensible remediation recommendations Main Skills/Requirements Must be eligible for Security Clearance due to the nature of clients Full UK Driving License & Access to a vehicle are essential Experience working More ❯