systems Experience in customer-focused environments, providing high-quality technical support Ability to explain technical concepts to non-technical users Follow Security procedures and keep a vigilant eye for CyberSecurity issues Excellent knowledge of service desk processes and functions in support of end-user computing needs Strong knowledge of troubleshooting Windows Desktop (10 & 11) and hands-on experience of More ❯
systems Experience in customer-focused environments, providing high-quality technical support Ability to explain technical concepts to non-technical users Follow Security procedures and keep a vigilant eye for CyberSecurity issues Excellent knowledge of service desk processes and functions in support of end-user computing needs Strong knowledge of troubleshooting Windows Desktop (10 & 11) and hands-on experience of More ❯
laptops, mobile devices, peripherals Basic knowledge of IT infrastructure: networks, servers, storage, phone systems Familiarity with manufacturing IT equipment (barcode scanners, RF scanners, industrial PCs, specialist printers) Understanding of cybersecurity principles Soft Skills: Strong troubleshooting and problem-solving ability Ability to adapt to complex, fast-moving IT environments Knowledge of ITSM processes: Asset, Incident, Request, Problem, and Change Management More ❯
management. 2+ years of experience in technical architecture design and IT development. Familiarity with RESTful API design, OAuth2/API authentication, and workflow automation (Power Automate). Understanding of cybersecurity and global compliance requirements. Excellent communication and stakeholder management skills. Strong problem-solving, debugging, and testing skills. Ability to work collaboratively in a dynamic, cross-functional environment. Experience with project More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
malware, and data breaches, ensuring swift, effective responses to minimize risk to the organization and its clients. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, as well as managing security tools and mentoring junior analysts. This role involves proactive threat hunting, incident response, and collaboration with cross-functional teams to enhance the organization s … to improve overall organizational security posture. Participate in post-incident reviews and recommend improvements to processes, tools, and techniques. Security Intelligence & Research: Stay up-to-date with the latest cybersecurity trends, vulnerabilities, and attack techniques. Contribute to the enhancement of threat intelligence by sharing research findings on emerging threats. Develop and maintain custom detection signatures or playbooks to enhance detection … experience: (Up to 10, Avoid repetition) Bachelor's degree in Computer Science, Information Technology, Systems Engineering, or a related field. Experience: Minimum of [6-8] years of experience in cybersecurity, with incident response, digital forensics, or threat hunting. Strong experience in handling complex cyber incidents (e.g., APTs, ransomware, data breaches). Hands-on experience with SIEM platforms (e.g., Splunk, ArcSight More ❯
and resolving issues within NiFi flows, managing performance bottlenecks, and implementing robust error handling strategies. You ll work closely with cross-functional teams including data architects, compliance officers, and cybersecurity specialists to integrate data from various systems such as databases, APIs, and cloud platforms. Your work will directly support batch processing, real-time streaming, and event-driven data pipelines across More ❯
and resolving issues within NiFi flows, managing performance bottlenecks, and implementing robust error handling strategies. You’ll work closely with cross-functional teams including data architects, compliance officers, and cybersecurity specialists to integrate data from various systems such as databases, APIs, and cloud platforms. Your work will directly support batch processing, real-time streaming, and event-driven data pipelines across More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Investigo
/day Inside IR35 - Candidates will need to work through an Umbrella Company Clearance Required: Active SC Clearance We are looking for an experienced Penetration Tester to join a cybersecurity team. This role offers the opportunity to work on a hybrid basis, engaging in high-impact security assessments across various platforms and environments. Key Responsibilities: Conduct manual and automated penetration More ❯
to offices, suppliers, and vendor meetings (3-4 days per week). About You: Proven track record in vendor management, partner management, or channel management within the technology sector (cybersecurity experience desirable). Strong commercial acumen, with experience of delivering both revenue growth and margin improvement. Confident engaging with senior stakeholders, both internally and externally. Comfortable working in a fast More ❯
This role is pivotal in ensuring that testing activities are well-managed, results are clearly communicated, and remediation efforts are tracked across the organisation. While deep technical expertise in cybersecurity is not required, the ideal candidate will possess a strong understanding of PEN Testing concepts and be able to translate technical findings into actionable insights for senior stakeholders. Key Responsibilities … remediation progress to senior leadership and relevant business units Track and escalate unresolved issues or critical vulnerabilities Maintain documentation, dashboards, and audit trails for compliance and governance Collaborate with cybersecurity teams to ensure alignment with broader security strategy Facilitate post-test reviews and lessons learned sessions Required Skills & Experience Proven experience in a PMO, project management, or program coordination role … Familiarity with cybersecurity principles, especially around PEN Testing and vulnerability management Strong communication skills with the ability to translate technical content for non-technical audiences Excellent organisational and stakeholder management abilities Experience working in regulated environments or with compliance frameworks (e.g. ISO 27001, NIST, etc.) is a plus Proficiency in project management tools (e.g. Jira, Confluence, MS Project, or similar More ❯
This role is pivotal in ensuring that testing activities are well-managed, results are clearly communicated, and remediation efforts are tracked across the organisation. While deep technical expertise in cybersecurity is not required, the ideal candidate will possess a strong understanding of PEN Testing concepts and be able to translate technical findings into actionable insights for senior stakeholders. Key Responsibilities … remediation progress to senior leadership and relevant business units Track and escalate unresolved issues or critical vulnerabilities Maintain documentation, dashboards, and audit trails for compliance and governance Collaborate with cybersecurity teams to ensure alignment with broader security strategy Facilitate post-test reviews and lessons learned sessions Required Skills & Experience Proven experience in a PMO, project management, or program coordination role … Familiarity with cybersecurity principles, especially around PEN Testing and vulnerability management Strong communication skills with the ability to translate technical content for non-technical audiences Excellent organisational and stakeholder management abilities Experience working in regulated environments or with compliance frameworks (e.g. ISO 27001, NIST, etc.) is a plus Proficiency in project management tools (e.g. Jira, Confluence, MS Project, or similar More ❯
Join us and be at the forefront of the green revolution, where every line of code contributes to a cleaner, brighter future. Key Responsibilities: Develop and maintain the enterprise cybersecurity architecture for the Group including development of enterprise architecture standards and patterns that address the requirements of both IT and OT that aligns with industry standards, regulatory requirements and … of security assurance to critical IT security projects and programmes. Lead SSE's Secure by Design approach and provide technical expertise and support for the development and implementation of cybersecurity policies and architecture standards and patterns. Define and manage a security tooling roadmap to ensure the implementation of effective security controls and technologies and regularly update cybersecurity technical … working with the National Energy System Operator on cyber resilience. What do you need? Enterprise security architecture expertise and ability to understand and advise on the strategic direction for cybersecurity in IT and OT implementations advising programmes and projects with pragmatic best practice advice. Deep experience in defining and driving Secure by Design and Secure by Default in order More ❯
Join us and be at the forefront of the green revolution, where every line of code contributes to a cleaner, brighter future. Key Responsibilities: * Develop and maintain the enterprise cybersecurity architecture for the Group including development of enterprise architecture standards and patterns that address the requirements of both IT and OT that aligns with industry standards, regulatory requirements and … of security assurance to critical IT security projects and programmes. * Lead SSE's Secure by Design approach and provide technical expertise and support for the development and implementation of cybersecurity policies and architecture standards and patterns. * Define and manage a security tooling roadmap to ensure the implementation of effective security controls and technologies and regularly update cybersecurity technical … working with the National Energy System Operator on cyber resilience. What do you need? * Enterprise security architecture expertise and ability to understand and advise on the strategic direction for cybersecurity in IT and OT implementations advising programmes and projects with pragmatic best practice advice. * Deep experience in defining and driving Secure by Design and Secure by Default in order More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Henderson Scott
CyberSecurity Engineer - SIEM - Splunk - Cloud Security - 12 month contract - DV Clearance I have an immediate opportunity for a CyberSecurity/SIEM professional to join our client's team and play a key role in protecting critical systems and data. You'll take ownership of day-to-day SIEM capabilities, helping to design and enhance controls while leading responses … large-scale data ingestion and analysis. Reviewing and improving Data collection and Data normalisation Continuous improvement and updating of processes and workflow requirements Working with stakeholders, IT operations, and cybersecurity teams to understand requirements, provide training, and resolve issues. We're looking for someone who can bring: A background in solving complex security challenges. Strong knowledge of SIEM tools, ideally More ❯
Location: Aldermaston Onsite 1-2 days per week. Duration: 2 years We are seeking a DV Cleared OT CyberSecurity Engineer with strong expertise in Secure by Design (SbD) principles to join a high-profile Defence programme. This is a critical role ensuring that Operational Technology (OT) environments are protected against evolving cyber threats while remaining resilient, safe, and compliant More ❯