Lytham St. Annes, Lancashire, North West, United Kingdom
JAM Recruitment Ltd
or leading in the following activities for mission systems as part of a multi-functional engineering team: Concepting, Architecting, Requirements management, Design, Testing, Safety, CyberSecurity, Qualification and certification. You will be positioned as and where needed on any of these activities. Lead and support team meetings/DSUMs/ more »
working in the Lincolnshire Integrated Care System supporting all the organisations providing health and care services to establish the current state in relation to cybersecurity, assess the desired future state and strategic principles and produce the high level plan to align to national strategy and policy. This role is more »
University Hospitals Bristol and Weston NHS Foundation Trust (UHBW)
across the community. Reporting initially to the Technology Services Manager and will be part of their senior leadership team. You will be responsible for CyberSecurity Risk Management for the organisation. This will be key in supporting the safe delivery of the five year digital strategy. Main duties of the … job Job Purpose Develop and deliver the Trust's cybersecurity strategy. Lead and advise on the timely design, delivery, operation and on-going management of the Trust's Cyber-security counter-measures. Act as the focal point for local, regional and national collaboration with relevant bodies operating in the … CyberSecurity sector to ensure that the Trust's counter-measures are fit for purpose and meet relevant Standards Lead in the development and execution of periodic testing of business continuity management and containment plans associated with CyberSecurity incidents, including coordination of penetration testing where appropriate. Provide a point more »
IR35, Regular Travel, IT Service Design, Cyber Digital Transformation, My leading client is looking for a Service Designer with a focus on working on CyberSecurity projects and you must be really keen on travel into Europe on a regular basis. You will must have experience of providing responsibility for … Leading service design activities, and delivering service outcomes based on business, end user, and organisational needs Development of high level Service Models Working with Cybersecurity SMEs Ability to choose and apply appropriate design methods for different design life cycle phases and situations. Experience of carrying out Service Design activities utilising … project methodologies Experience working in a range of organisations from small, medium enterprises to blue chip across multiple industries Experience of a variety of CyberSecurity and IT disciplines such as development and testing, Enterprise Architecture, and solution design If this role sounds of interest please send me your cv more »
application teams, clarifying roles and expectations in the project. Required Skills and Experience: Proven experience as a Business Analyst, with a strong background in cybersecurity, identity management (IDAM), and cloud technologies. Demonstrated ability to work in complex, supplier-heavy environments, ideally with experience in managing relationships with multiple suppliers. more »
Quality Engineer Location: Reading Contract : 6 Months Belcan has a job opportunity to work with one of our clients, a world leader within many key industries based in Reading location for 6 months contract role. As a Quality engineer the more »
technical options for progressing against project objectives. Map a transformation journey from existing on-premise data structures to future Azure state. Provide assurance that cybersecurity standards and technical standards are met and that the solution is technically compatible with our platforms, infrastructure and processes. Document configuration, development and common more »
platforms. Experience using host and network-based IDS/IPS Experience using packet capture solutions. Skill in developing and deploying signatures. Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to provide technical and service leadership to junior SOC more »
platforms. Experience using host and network-based IDS/IPS Experience using packet capture solutions. Skill in developing and deploying signatures. Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to provide technical and service leadership to junior SOC more »
Job Specification: CyberSecurity Team Lead Service Care Solutions is recruiting for a top legal firm for the role of CyberSecurity Team Lead . This position offers an exciting opportunity for an experienced professional to join a well-respected law firm with offices across the UK, providing leadership and … guidance to the CyberSecurity team. Position: CyberSecurity Team Lead Location: Manchester - Salary: £73,000- £80,000 + benefits Purpose of the Role Provide hands-on leadership in the development, integrity, and availability of client data. Act as the primary interface for CyberSecurity within the company and IT … Department. Manage day-to-day operations and guidance of the CyberSecurity Team. Liaise with third parties to ensure system patching, vulnerability resolution, and system hardening. Create and manage the Security Cloud migration process. Handle complaints and escalations effectively. Develop and update security support documentation, processes, and procedures. Lead forensic more »
month contract with possibility of extension or permanency Rate: Inside IR35, Umbrella and PAYE options available Job Purpose Statement Reporting into the CyberSecurity Architecture Lead, CyberSecurity Architect Consultant role is a critical role in ensuring delivery against the strategic security vision and development and maintenance of associated securitymore »
Ability to track complex remedial activities from multiple sources and provide updates to the customer in a user centric way. Ability to clearly articulate cybersecurity risks against business outcomes and provide advice on the remedial actions that should be undertaken. Experience in managing security incidents on behalf of stakeholders. more »
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Experis
Bachelor's degree in Information Technology, Computer Science or a related discipline. Previous experience in the financial sector Good awareness of Enterprise Security and CyberSecurity as problem domains Demonstrates excellent judgment for balancing between rapid development, long-term code maintainability and supportability. Believes in the power of and the more »
Lancashire Teaching Hospitals NHS Foundation Trust
to users and support staff. Troubleshoots problems with in-house developments. Project Management - Produces project plans and estimates. Evaluates new hardware and software. Evaluates cybersecurity notices Assists third party suppliers in setting up and testing of bought-in solutions as directed by line management. Maintains an up to date more »
. As the BISO, you will be responsible for overseeing the overall security of our organisation's information, including data protection, network security, and cybersecurity measures. Key responsibilities: - Developing and implementing information security policies and procedures Conducting regular security risk assessments and making recommendations for improvement Managing security incidents more »
Solihull, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Pontoon
required commensurate with the level of responsibility. Experience Required Relevant digital qualifications (e.g., Data Analyst/MI, Digital Marketing, Cloud Computing/IT, coding, cybersecurity) Minimum L3 Award in Education and Training (or equivalent) Experience of studying at level 4 or above L3 Assessor Award (or equivalent) Experience of … environment (OFSTED, awarding bodies etc) Relevant industry experience in the digital sector (e.g., Data Analyst/MI, Digital Marketing, Cloud Computing/IT, coding, cybersecurity) Strong administration skills, ability to record information accurately and demonstrate attention to detail. Ability to communicate both verbally and written, including patience and empathy. more »
Worcestershire, United Kingdom Hybrid / WFH Options
Cubiq Recruitment
frontline operators. Vision: Providing fast, flexible solutions to public sector technical challenges. Specialists in software-centric systems, particularly for constrained networking environments or challenging cybersecurity requirements. Core Values: User Focus: Deliver the best outcomes for system users. Urgency: Solve pressing problems quickly. Diversity: Inclusive and multidisciplinary teams enhance performance. more »
IT support or related roles within an IT department. Proficiency in troubleshooting general IT hardware, software, and network issues. Basic to intermediate understanding of cybersecurity principles. Excellent communication skills in English, both verbal and written. If you're a results-driven IT professional with a passion for excellence in technical more »
to define cloud strategy and perform PoC on new technologies. Keep up-to-date and have expertise on current tools, technologies and areas like cybersecurity and regulations pertaining to aspects like data privacy, consent, data residency etc. that are applicable. Key Skills 6+ years working with Kubernetes 6+ years more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Belcan Technical Recruiting (UK) Ltd
has become a global technological leader and established go to Engineering Services provider, working within many industries including Aerospace, Defence, Marine, Nuclear, Automotive and CyberSecurity with over 10,000 professionals serving hundreds of customers in over 60 locations worldwide. This vacancy is being advertised by Belcan more »
North Cumbria Integrated Care NHS Foundation Trust
Contract management Estimation methods for scheduling Quality management processes; metrics for processes and quality standards Development of stakeholder management and communications plans Information Governance & CyberSecurity requirements Skills & Aptitudes Essential Takes responsibility for own learning, development and behaviour - actively seeks to develop and demonstrate own competence Effective interpersonal and communication more »
cloud transformation? We have a fantastic opportunity for you! The Opportunity: We are seeking a motivated and experienced Product Manager to join a leading cybersecurity Managed Service Provider (MSP) on a 6-month contract basis. In this role, you will be at the forefront of driving product processes, managing projects … to senior management and stakeholders on project progress and performance. What We're Looking For: Proven experience as a Product Manager, preferably within the cybersecurity or IT services sector. Strong understanding of product management principles and methodologies. Experience managing end-to-end product development and project delivery. Excellent soft skills more »
Didcot, Oxfordshire, United Kingdom Hybrid / WFH Options
Hays Technology
portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral to the delivery of the cyber programme. You will work on priorities set by the CybersecurityProgramme and align … with relevant Project Managers. Your role includes the implementation of CyberSecurity Operations Centres (C-SOC) with two laboratory sites. You will assist STFC's cyber team to define, practice,and verify the adequacy of the cyber critical incident response. You will also assist STFC's infrastructure team whomanage the BAU more »
CyberSecurity Architect On site in Manchester Inside IR35 6 Months Contract Overall Purpose of the Job The Security Architect is responsible for designing and implementing comprehensive and scalable security architectures for technology transformation initiatives. These architectures must embed and ensure that the concept of security by design is both more »