Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
In Technology Group Limited
security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure system architecture and application development. Maintain and enhance incident response procedures and disaster recovery … Proven experience in a cyber security or information security engineering role. Strong knowledge of network and system security, encryption, and authentication protocols. Experience with security tools such as SIEM, vulnerability scanners, firewalls, antivirus, and endpoint protection platforms. Familiarity with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks and standards (ISO 27001, NIST, PCI More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role … into CI/CD pipelines. Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerabilityscanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers, DevOps, and compliance teams to More ❯
access, threats, and vulnerabilities. Monitoring & Incident Response: Continuously monitor network traffic and system logs for security incidents, investigate, triage and contain breaches, and coordinate response efforts. Risk Assessment: Conduct vulnerability assessments and organise penetration testing to identify security gaps and deal with any recommendations, recommend necessary fixes or improvements as a result of those tests. Security Protocols: Develop and … will I bring to the role? Significant experience in a similar role. Hands-on experience with security technologies such as firewalls, IDS/IPS, SIEM, endpoint protection, encryption, and vulnerability scanners. Proficiency in security frameworks and standards such as NIST, ISO 27001, and CIS controls. Strong understanding of network protocols, firewalls, VPNs, and encryption techniques. Experience with scripting or More ❯
insights to inform executive briefings and assurance reports. Risk Management, Incident Management, and Regulatory Engagement Support the development and implementation of a robust risk management framework, including threat modelling, vulnerability assessments, and risk assessments aligned with FCA expectations. Lead and coordinate responses to security incidents, such as phishing attacks, malware infections, and data breaches, in compliance with FCA incident … technologies (e.g., email and web security gateways) that monitor operations, detect cyber threats, and respond to unauthorized events and incidents in line with established playbooks. Supervise penetration testing and vulnerabilityscanning activities, ensuring timely remediation of identified risks. Provide technical security guidance to project teams, embedding security considerations throughout the software development lifecycle (Security by Design). Maintain More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
NearTech Search
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding … a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
SW Group
with installation or processing of new security products and procedures Ensuring controls for monitoring products and systems for security breaches or intrusions Identifying production stability concerns via break point, vulnerabilityscanning, and impact analysis, and designing and developing implement remediation plans to address these concerns. Work on the trifecta of visibility, compliance and remediation for public cloud security. … with installation or processing of new security products and procedures Ensuring controls for monitoring products and systems for security breaches or intrusions Identifying production stability concerns via break point, vulnerabilityscanning, and impact analysis, and designing and developing implement remediation plans to address these concerns. Work on the trifecta of visibility, compliance and remediation for public cloud security. More ❯
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning and risk mitigation. Knowledge of security auditing and incident response processes. Experience with event and log analysis. Solid understanding of Disaster Recovery and Business Continuity principles. Excellent … a global organization, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery, Business Continuity Nice-to-have skills: ISO 27001 VulnerabilityScanning Disaster Recovery Work Experience: Cyber Security Specialist Security More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
Preston, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with … Expertise in Microsoft O365 Security Solutions including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerabilityscanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location: Leeds (LS18) On-site with More ❯
policies and regulations. User Support & Alerts – Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development – Support compliance with … Expertise in Microsoft O365 Security Solutions – including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerabilityscanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location: Leeds (LS18) – On-site with More ❯
policies and regulations. User Support & Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance & Policy Development Support compliance with … Expertise in Microsoft O365 Security Solutions including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerabilityscanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location: Leeds (LS18) On-site with More ❯
TCP/IP, DNS, Load Balancers, network firewalls, SSL/TLS/mTLS, along with AWS Shield for DDoS protection, AWS WAF for web security, VPC segmentation, and automated vulnerability scanning. Container Security & Orchestration: Expertise in Docker, ECS, EKS, Kubernetes, implementing security best practices like image vulnerabilityscanning, Kubernetes RBAC, IAM Roles for Service Accounts (IRSA), Pod … such as CloudWatch, Security Hub, SIEM integrations. CI/CD Security & Automation: Proficient in Jenkins, Git, GitHub Actions, ensuring secure CI/CD pipelines with artifact encryption, automated security scanning, and DevSecOps best practices. Cloud-Based Database Security: Experience managing Amazon RDS, DynamoDB, ElastiCache, enforcing database encryption (KMS), automated backups, fine-grained access controls, and data integrity monitoring. Cost More ❯
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
AJ Bell
the threats targeting AJ Bell and ensuring our defences provide and effective response. Key responsibilities: Reviewing and assessing Security Operations Centre alerts to ensure an appropriate response taken. Overseeing vulnerabilityscanning to confirm the effectiveness of patching Monitoring systems for compliance with policy and supporting remediation where required. Track and manage penetration testing programs. Investigate and respond to More ❯
and implementation of business continuity planning, disaster recovery management, risk assessment and mitigation to cyber, data and security threats. Having a good understanding of the cyber security landscape, horizon scanning and proactive education of latest developments. The post holder may be required to undertake any other duties at the request of the line manager which are commensurate with the … knowledge of Microsoft platforms with a focus on Intune, Microsoft Exchange Online, Office 365 support technologies, and Azure Active Directory. Strong experience configuring anti-malware, intrusion detection, firewalls and vulnerabilityscanning systems and network security. Extensive experience and working knowledge with Microsoft Azure Infrastructure as a Service platform and hybrid infrastructure; including planning, configuration, optimisation and deployment. Extensive More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯