issues Stay current with industry trends, threats, and best practices in access management Required Skills/Experience: The ideal candidate will have the following: Experience in PAM engineering or cybersecurity roles Proficiency with PAM tools such as CyberArk, BeyondTrust, or Delinea Strong understanding of Active Directory, LDAP, and authentication protocols Experience with scripting (PowerShell, Python) for automation and reporting Familiarity More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Talent
Essential Qualifications & Experience Proven experience in a SOC Level 2 or Level 3 role, with demonstrable expertise in incident response and advanced threat hunting. A degree in Computer Science, Cybersecurity, IT, or a related discipline, or equivalent professional experience. Industry-recognised certifications such as CISSP, GIAC/GCIA/GCIH, AZ-500, CEH, CASP+, or SIEM-specific training. Strong knowledge More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Talent
Essential Qualifications & Experience Proven experience in a SOC Level 2 or Level 3 role, with demonstrable expertise in incident response and advanced threat hunting. A degree in Computer Science, Cybersecurity, IT, or a related discipline, or equivalent professional experience. Industry-recognised certifications such as CISSP, GIAC/GCIA/GCIH, AZ-500, CEH, CASP+, or SIEM-specific training. Strong knowledge More ❯
Coventry, West Midlands, United Kingdom Hybrid / WFH Options
Stackstudio Digital Ltd
projects through delivery, engaging with architectural governance (HLDs) for approvals. Evaluate and recommend new technologies, tools, and vendors. Provide architectural oversight for implementation projects and troubleshooting escalations. Collaborate with cybersecurity, infrastructure, and application teams to ensure end-to-end solution integrity. Prepare network capacity and resilience plans. Document network topology, standards, and procedures. Skills, Experience, and Abilities Required: Technical Requirements More ❯
engineering teams to embed security from concept through to delivery. Keep up to date with evolving threats and recommend effective mitigations. Essential Skills & Experience Minimum 6 years experience in cybersecurity architecture within Defence, Aerospace, or Critical National Infrastructure. Strong understanding of MOD security frameworks (JSP 440, JSP 604, DEF STANs). Proven background in Secure by Design and securityMore ❯
requirements are met from the outset Keep up to date of evolving threat landscapes and propose mitigations aligned with system requirements Skill Set Essential Proven experience (6+) years in cybersecurity architecture within a defence, aerospace, or critical national infrastructure environment Strong knowledge of MOD security requirements (e.g. JSP 440, JSP 604, DEF STANs) Good working knowledge and experience of More ❯
requirements are met from the outset Keep up to date of evolving threat landscapes and propose mitigations aligned with system requirements Skill Set Essential Proven experience (6+) years in cybersecurity architecture within a defence, aerospace, or critical national infrastructure environment Strong knowledge of MOD security requirements (e.g. JSP 440, JSP 604, DEF STANs) Good working knowledge and experience of More ❯
ensure security requirements are met from the outset • Keep up to date of evolving threat landscapes and propose mitigations aligned with system requirements Skill Set Essential • Proven experience in cybersecurity architecture within a defence, aerospace, or critical national infrastructure environment • Strong knowledge of MOD security requirements (e.g. JSP 440, JSP 604, DEF STANs) • Good working knowledge and experience of More ❯
features. Familiarity with cloud platforms, in particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through clear and efficient reporting. Clear knowledge of current cybersecurity threats and trends. Familiarity with NCSC CAF, ONR SyAPs, and ISO27001 frameworks. Nice to have: Experience in complex, regulated environments, especially Critical National Infrastructure (CNI). Awareness of SOAR platforms More ❯
Employment Type: Contract
Rate: £600.0 - £800.0 per day + up to £800 per day (Inside IR35)
features. Familiarity with cloud platforms, in particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through clear and efficient reporting. Clear knowledge of current cybersecurity threats and trends. Familiarity with NCSC CAF, ONR SyAPs, and ISO27001 frameworks. Nice to have: Experience in complex, regulated environments, especially Critical National Infrastructure (CNI). Awareness of SOAR platforms More ❯
West Midlands (County), Birmingham, United Kingdom
Sherborne Talent Solutions
basis for my client to deliver critical network transformation projects across our hybrid (on-premises and cloud) environments. This role requires deep technical expertise in network architecture, operations, and cybersecurity best practices, with a strong focus on execution and delivery. Engagement Scope: Deliver a network refresh (firewall, switches, and routers) across both office and Birmingham data centre. Assist the DevOps More ❯
Warwick, Warwickshire, West Midlands, United Kingdom
Adroit People Ltd
standards and regulations (e.g., GDPR, HIPAA, PCI DSS). Conduct regular security audits and assessments to identify and address compliance gaps. Familiarity with industry standards and frameworks like NIST Cybersecurity Framework, ISO 27001, and CIS Critical Security Controls. Familiarity with the use of standard security technology solutions and processes such as user provisioning, directory, SIEM, vulnerability management, Cloud Security (OCI More ❯
management. 2+ years of experience in technical architecture design and IT development. Familiarity with RESTful API design, OAuth2/API authentication, and workflow automation (Power Automate). Understanding of cybersecurity and global compliance requirements. Excellent communication and stakeholder management skills. Strong problem-solving, debugging, and testing skills. Ability to work collaboratively in a dynamic, cross-functional environment. Experience with project More ❯
security requirements are met from the outset Keep up to date of evolving threat landscapes and propose mitigations aligned with system requirements Your skillset may include: Proven experience in cybersecurity architecture within a defence, aerospace, or critical national infrastructure environment Strong knowledge of MOD security requirements (e.g. JSP 440, JSP 604, DEF STANs) Good working knowledge and experience of More ❯
security requirements are met from the outset Keep up to date of evolving threat landscapes and propose mitigations aligned with system requirements Your skillset may include: Proven experience in cybersecurity architecture within a defence, aerospace, or critical national infrastructure environment Strong knowledge of MOD security requirements (e.g. JSP 440, JSP 604, DEF STANs) Good working knowledge and experience of More ❯
features. Familiarity with cloud platforms, in particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through clear and efficient reporting. Clear knowledge of current cybersecurity threats and trends. Familiarity with NCSC CAF, ONR SyAPs, and ISO27001 frameworks. Nice to have: Experience in complex, regulated environments, especially Critical National Infrastructure (CNI). Awareness of SOAR platforms More ❯
Employment Type: Contract
Rate: £600.0 - £800.0 per day + up to £800 per day (Inside IR35)
features. Familiarity with cloud platforms, in particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through clear and efficient reporting. Clear knowledge of current cybersecurity threats and trends. Familiarity with NCSC CAF, ONR SyAPs, and ISO27001 frameworks. Nice to have: Experience in complex, regulated environments, especially Critical National Infrastructure (CNI). Awareness of SOAR platforms More ❯
strategies to meet organisational goals, on time and within budget Lead stakeholder engagement and change initiatives to support technology adoption Oversee governance, risk management, and compliance with data protection, cybersecurity, and procurement regulations Manage resource planning, budgets, and business cases Provide leadership and development for programme teams, fostering collaboration and innovation Drive innovation by monitoring emerging technologies and leading More ❯
West Yorkshire, United Kingdom Hybrid / WFH Options
Harvey Nash
strategies to meet organisational goals, on time and within budget · Lead stakeholder engagement and change initiatives to support technology adoption · Oversee governance, risk management, and compliance with data protection, cybersecurity, and procurement regulations · Manage resource planning, budgets, and business cases · Provide leadership and development for programme teams, fostering collaboration and innovation · Drive innovation by monitoring emerging technologies and leading More ❯
enterprise compute platforms, data networks, UNIX/Linux/Windows environments, cloud services, data centres, commercial software solutions, and end-user support across all UKAEA sites. Role Overview : The CyberSecurity Specialist plays a pivotal role in advancing UKAEA's hybrid digital estate, encompassing enterprise IT, operational technology (OT), and research platforms. This role sits within the Information & CyberSecurity … strong stakeholder engagement, technical depth, and a sound understanding of UK-specific cyber risk frameworks. You will help shape and maintain a secure posture across UKAEA. A degree in Cybersecurity, Information Technology, or a STEM subject (or equivalent experience). Essential o Security Assurance certifications such as CCP, SIRA o Security certifications such as CISSP, SSCP, CISM, CRISC, CCSP, SABSA More ❯
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Synergize Consulting Limited
cyber threats, threat actors, attack vectors, and vulnerabilities. Knowledge of information assurance standards and frameworks including CIS, NIST, ISO 27001, Cyber Essentials/Essentials Plus, GDPR. Knowledge of threat cybersecurity frameworks such as MITRE ATT&CK, Kill Chain and NIST CSF 2.0. The ideal candidate will combine strong technical expertise with a solid understanding of global events and their More ❯
activities required to support the engineering lifecycle with experience of operating in the phase relevant to the role. The PSA Principal Engineer will have a working knowledge of the cybersecurity and information assurance marketplace, including products, suppliers and key threats, and will also have an understanding of the direction of potential future technologies. Proven experience of assessing and managing More ❯
activities required to support the engineering lifecycle with experience of operating in the phase relevant to the role. The PSA Principal Engineer will have a working knowledge of the cybersecurity and information assurance marketplace, including products, suppliers and key threats, and will also have an understanding of the direction of potential future technologies. Proven experience of assessing and managing More ❯
contractor design and integration work, ensuring compliance with project and stakeholder requirements. Develop and maintain system architecture, information models, and supporting documentation. Collaborate with technical specialists, system architects, and cybersecurity professionals to ensure the MPS is secure, safe, and fit for purpose. Engage with internal and external stakeholders to capture and validate user needs. Participate in design reviews, test and More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Matchtech
contractor design and integration work, ensuring compliance with project and stakeholder requirements. Develop and maintain system architecture, information models, and supporting documentation. Collaborate with technical specialists, system architects, and cybersecurity professionals to ensure the MPS is secure, safe, and fit for purpose. Engage with internal and external stakeholders to capture and validate user needs. Participate in design reviews, test and More ❯