VulnerabilityManagement Architect - Product Selection and Design 5 Month Contract - Outside IR35 Hybrid - travel to Bracknell and London, Pimlico as and when required Our Retail client is seeking a VulnerabilityManagement Architect to join their team on a 5-month contract basis. As a VulnerabilityManagement Architect, you will play a crucial role in … modernising the company's vulnerabilitymanagement capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerabilitymanagement architecture Capture our vulnerabilitymanagement requirements and usage scenarios, captured as a set of patterns that a future solution will … evaluate the drivers and benefits for change Provide market assessment as appropriate, partnering with our procurement teams as needed Provide a validated and recommended strategy solution architecture for our vulnerabilitymanagement services (i.e. this is all about explaining how the elements of the solution will work together, vendor agnostic) Compile vendor solution options to address the above (with More ❯
computing, modelling, simulation, software engineering, business systems, data acquisition, and core IT services. Within the Computing Division, the Enterprise Infrastructure Solutions unit is responsible for the design, delivery, and management of centrally supported IT infrastructure and applications. This includes enterprise compute platforms, data networks, UNIX/Linux/Windows environments, cloud services, data centres, commercial software solutions, and end … matter expertise in security architecture, cyber risk governance, and assurance frameworks. This is a cross-functional role with both advisory and hands-on responsibilities, focusing on security assurance, risk management and supporting architecture reviews, vulnerabilitymanagement, risk assessments, cyber defence posture, driving technical assurance, and embedding risk-aligned security controls across IT and OT systems and secure … Azure AD), Microsoft 365 E5, Azure IaaS/PaaS, Windows/Linux/Unix. o Strong knowledge of security tooling such as SIEM, endpoint detection (EDR/XDR), and vulnerabilitymanagement platforms. o Hands-on experience with policy development, access control models (RBAC, ABAC), and logging standards. o Experience supporting assurance activities or government-mandated reviews (e.g. GovAssure More ❯
key role in supporting the delivery of the Government Cyber Security Strategy by coordinating and providing centralised cyber services to public sector organisations. These services help strengthen resilience, improve vulnerabilitymanagement, and enhance the security of core internet services such as DNS, email and web. Role Overview As a Senior Business Analyst , you will support the design, improvement … improvements that enhance service performance and security. Key Responsibilities Engage with public sector organisations to understand cyber security services and challenges Model current processes, systems and data, particularly around vulnerabilitymanagement Share analysis and findings with service owners and project teams Identify opportunities for improvement across processes and services Work closely with User Researchers and Service Designers to … across organisational boundaries Skills & Experience Required Aligned to the Senior Business Analyst role level in the Government Digital & Data Profession Framework: Strong practitioner-level experience in business modelling, requirements management, stakeholder management, process improvement and problem analysis Proven ability to analyse business problems across multiple organisations or business units Experience developing complex models to support solution development Ability More ❯
Wokingham, Berkshire, England, United Kingdom Hybrid / WFH Options
KBC Technologies UK LTD
architect, and maintain network security infrastructure including Firewalls, IDPS, Proxies, Load Balancers, VPNs, and WAFs. Develop and manage firewall policies, network access controls, IAM solutions, MFA, RBAC, and privilege management . Ensure alignment of security measures with compliance standards (GDPR, HIPAA, PCI DSS). Conduct regular security audits and assessments to identify and remediate risks. Apply industry frameworks such … as NIST Cybersecurity Framework, ISO 27001, CIS Controls . Oversee and enhance security technologies: SIEM, vulnerabilitymanagement, cloud security (OCI/Azure/AWS), PKI, cryptography, web/email security, logging and monitoring . Monitor network traffic for anomalies and potential breaches. Collaborate with IT teams (network engineers, sysadmins, developers) to ensure a holistic approach to security. Communicate More ❯
Birmingham, West Midlands, England, United Kingdom
Proactive Appointments
s hybrid infrastructure, spanning both on-premise and cloud environments. This role is ideal for a hands-on technical professional with a strong background in network and system security, vulnerability remediation, and endpoint protection using Microsoft Intune . Key Responsibilities Support and secure network infrastructure across cloud and on-prem environments . Strengthen Windows Server and network security configurations. … Lead efforts in vulnerabilitymanagement and remediation , working closely with IT and security teams. Implement and maintain endpoint hardening policies through Microsoft Intune . Monitor and respond to network security events and incidents. Contribute to the continuous improvement of security posture, compliance, and best practices. Collaborate with internal teams to support ongoing infrastructure and security projects. Key Skills … environments. Strong understanding of network infrastructure (switching, routing, firewalls, VPNs). Experience securing Windows Server environments. Proficiency in network security principles , firewalls, and access control. Hands-on experience with vulnerability remediation tools and processes. Strong knowledge of endpoint hardening and management via Microsoft Intune . Familiarity with cloud networking and security (Azure, AWS, or equivalent) is desirable. Excellent More ❯
Birmingham, West Midlands, England, United Kingdom
Proactive Appointments
s hybrid infrastructure, spanning both on-premise and cloud environments. This role is ideal for a hands-on technical professional with a strong background in network and system security, vulnerability remediation, and endpoint protection using Microsoft Intune . Key Responsibilities Support and secure network infrastructure across cloud and on-prem environments . Hands on experience of Network & Security design … and implementation Strengthen Windows Server and network security configurations. Lead efforts in vulnerabilitymanagement and remediation , working closely with IT and security teams. Implement and maintain endpoint hardening policies through Microsoft Intune . Monitor and respond to network security events and incidents. Contribute to the continuous improvement of security posture, compliance, and best practices. Collaborate with internal teams … environments. Strong understanding of network infrastructure (switching, routing, firewalls, VPNs). Experience securing Windows Server environments. Proficiency in network security principles , firewalls, and access control. Hands-on experience with vulnerability remediation tools and processes. Strong knowledge of endpoint hardening and management via Microsoft Intune . Familiarity with cloud networking and security (Azure, AWS, or equivalent) is desirable. Excellent More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Morson Edge
Operations - Windows & Linux administration - Regulatory - NIS/CAF and other assessment frameworks - Governance, process and documentation - Operational Technology/SCADA - Telecoms & Transport networks - Deployment of SIEMs, IDAM & PAM, and VulnerabilityManagement products - Legacy technologies Requirements • Skills and experience in understanding at a technical level security operation. • Awareness of key legislation and regulation impacting IT/OT General Control More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
Azure Storage. Knowledge of immutable backups and secure data retention strategies. Experience with disaster recovery planning, including full restore testing. Expertise in multi-factor authentication (MFA) setup and testing. Vulnerabilitymanagement - scanning, prioritization, remediation validation. Ability to design and interpret security dashboards for monitoring and reporting Awareness of system throttling and its security implications. Ideally comfortable upskilling the More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Hirexa Solutions UK
Pod Security Policies (or the newer Pod Security Admission controller), and GKE Sandbox. Configuring and enforcing network policies to control traffic between pods and namespaces. Using container scanning and vulnerabilitymanagement tools to secure container images. Implementing Binary Authorization to ensure only trusted images are deployed to clusters. Establishing robust IAM policies for GKE and related GCP services. … Excellent communication, stakeholder management, and problem-solving skills. Relevant professional certifications (e.g., Google Cloud Certified Professional Cloud Architect or DevOps Engineer) are a plus. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Adecco
public sector organisations. What You'll Do: As a Senior Business Analyst, you will: Engage with public sector organisations to enhance cyber security services. Model processes and systems around vulnerability management. Share insights with service owners and project teams. Identify and recommend improvements across multiple organisations. Collaborate with User Researchers and Service Designers to meet user needs. Monitor and … measure service effectiveness through KPIs. Who You Are: We're looking for a dynamic professional with: Expertise in context, problem, and option analysis. Strong user experience and stakeholder relationship management skills. Proven ability in requirements definition and management. Experience in business modelling and process improvement. A solid understanding of cyber security risks and best practises. Proficiency in agile working More ❯