My client has a requirement for a CompTIA Trainer on a contract basis. The client is a leading training provider in commercial IT and CyberSecurity click apply for full job details More ❯
S awareness - SSSTS or SMSTS preferred. CSCS card or equivalent - essential. Desirable Experience: Experience with Plant Historians. Network design and configuration knowledge. Understanding of cybersecurity principles. Knowledge in functional safety. Familiarity with industrial protocol standards (IEC 61850, DNP3, Modbus, OPC, etc.) If you are a skilled Software Commissioning Test More ❯
CyberSecurity Analyst +6 months + +On site fulltime in Erskine Scotland + 500 - 550 a day +DV cleared role - must be eligible for clearance Skills: +SIEM +Linux +Networking The role: Conduct escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on … effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. If you'd like to discuss the CyberSecurity Analyst role in more detail, please send your updated CV to (url removed) and I will get in touch. More ❯
team. The second one will specifically support the SIEM migration from an on-prem solution to a next-gen cloud SIEM. Experience required : Strong cybersecurity with good understanding of Infrastructure environment. Skills needed for this role : Maintain latest security and technology developments. Research and evaluate emerging cybersecurity trends and More ❯
Alexander Mann Solutions - Public Sector Resourcing
On behalf of The Ministry of Justice we are looking for a CyberSecurity Engineer (Inside IR35) for a 6 month contract. Hybrid working with 2-3 days per week required in London. The Ministry of Justice (MoJ) priorities include improving public safety and reducing reoffending by reforming prisons, probation More ❯
strategic and hands-on role in defining, implementing, and managing security standards and frameworks across global IT operations. You'll be instrumental in aligning cybersecurity initiatives with business goals, ensuring robust protection of digital assets and compliance with global standards. Drive initiatives aligned with ISO27001, NIST, and NIS2 frameworks. Manage … innovation organizations and knowledge of several different IT service areas. Deep expertise in ISO27001/2, NIST, NIS2, and SOX compliance. Strong knowledge in cybersecurity operations, risk management, BCP/DRP. Experience with audits, assessments, and governance documentation. Relevant certifications (e.g., CISSP, CISM, CEH, CISA) or equivalent experience. Personal attributes More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
/2026 Pay rate : 716 GBP/day inside IR35 Contractor must hold SC Clearance & DV Eligible Role Description: Enterprise Architect-Infrastructure, Applications & CyberSecurity Purpose of the Role The enterprise architect will play a pivotal role in shaping and governing the end-to-end technology landscape, ensuring it is … infrastructure, applications, and cybersecurity domains. Translate business requirements into secure, scalable, and cost-effective architectural solutions. Provide strategic direction on on-premise infrastructure strategies. CyberSecurity & Secure by Design Embed Secure by Design principles throughout the product lifecycle. Ensure architecture and solution designs comply with NIST controls, regulatory requirements, and … internal cybersecurity policies. Collaborate with information architecture, security, risk, and compliance teams to assess architectural risk and apply appropriate mitigation measures. Governance & Assurance Lead architectural governance forums, ensuring all solutions align with enterprise standards and security frameworks. Establish and maintain an architecture governance model that promotes alignment, traceability, and More ❯
Alexander Mann Solutions - Public Sector Resourcing
month contract based in Exeter office once per month. As the Security Architect within the Security Operations team of the Met Office's CyberSecurity Department, you will design and implement security solutions that protect Met Office digital services. You'll advise on enterprise security initiatives to further enhance our … cybersecurity posture, safeguarding systems that are essential to public safety and national security. This role requires close collaboration with our Security Operations Center and Vulnerability Management teams to continuously improve our security services. This role will specifically support the deployment of our Network Detection and Response solution. As a … Develop security solutions that enhance our ability to protect, detect and respond to, and recover from cyber incidents . Lead and coach teams on cybersecurity practices, technical excellence, while fostering a culture of collaboration and personal development . Assess risks related to proposed changes and recommend security controls that More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Morson Talent
must have expeirence with either Sailpoint or Cyberark. It would be a contract role for 12 months initially and a hybrid role. The SPEN CyberSecurity team is responsible for the development of the Identity and Access Management service, which is utilised to provision, monitor and maintain core user identities … engineering experience in either one however preferably both. The role reports directly to the project manager. The role holder will work closely with our CyberSecurity Operations team, Risk & Compliance, and HR, as well as specialist 3rd party security suppliers and the global IT and business teams. Key Responsibilities: This … to produce options and recommendations for a workable solution and drive action from key decision makers Key Skills/Experience: • Experience in security or CyberSecurity Degree • IT Security/Information Security knowledge • CyberArk PAM • SailPoint IdentityIIQ • Hands-on experience with Windows/Linux , scripting (Bash, PowerShell, Perl) , SQL , APIs More ❯
calculated measures using DAX and Power Query M code. • Implement Row-Level Security (RLS), governance frameworks, and workspace architecture adhering to DoD/USG cybersecurity protocols. • Collaborate with project stakeholders, including Program Managers, Contracting Officers, and Data Governance teams. • Conduct business requirement workshops and convert functional needs into technical execution … enterprise environment. • Possess expert-level proficiency with DAX, M (Power Query), and advanced data modeling techniques. • Be well-versed in U.S. government reporting standards, cybersecurity protocols (e.g., NIST SP 800-53, FedRAMP), and DoD data practices. • Have experience with KPI scorecard, RLS implementation, and publishing in Power BI Service/ More ❯
Alexander Mann Solutions - Public Sector Resourcing
end experience of delivery life cycle experience for improvements to Splunk SaaS. . Experience of defining improvements within Cyber departments, particularly, SIEM improvements within CyberSecurity Operations Centre (CSOC) functions that result in an increase in SIEM Maturity Levels. . Good communication, reporting, documentation and presentational skills. . AWS Infrastructure … for the configuration of EC2 Servers, S3 buckets etc. Desirable: . Public Sector experience. . Experience with wider SIEM Solutions. . Experience with multiple CyberSecurity related technologies. Please be aware that this role can only be worked within the UK and not Overseas. Disability Confident As a member of More ❯
Synapri is working with a leading public sector agency to hire a cybersecurity engineer with cloud experience, some exposure to Oracle (OCI, Oracle Fusion, etc.), and prior experience within the public sector. … This is a remote-first role with travel only for specific workshops or training (maybe once a month). Key Responsibilities: Assisting the Principal CyberSecurity Engineer in crafting the cyber strategy. Working to update and implement SIEM tools Assist with active investigations Risk Modelling and Threat Detection Key Skills More ❯
ECS Resource Group are currently working in partnership with a global managed service provider, assisting them with the search for a CyberSecurity Architect on a contract basis. The successful candidate will be working with a Telecoms end client across various projects. Key Responsibilities: Lead integration of security tools such … across multi-cloud environments using InsightCloudSec. Apply architectural governance using PRISM and contribute to enterprise architecture frameworks. Requirements: Minimum 7+ years of experience in cybersecurity, with at least 3 years in a security architecture or lead design role. Experience with tools such as: Qualys, TrueSight (BMC), Microsoft Security Suite More ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
would design and implement secure AI/ML solutions, ensuring data protection and compliance while leveraging AI's capabilities. This role combines expertise in cybersecurity, AI/ML, and cloud technologies to architect secure and scalable AI solutions. Responsibilities : Security Architecture: Design and implement security solutions for AI/ML … AI-powered solutions, integrating security measures throughout the life cycle, from data ingestion to model deployment. Skills and Qualifications: Security Expertise: Strong understanding of cybersecurity principles, threat modelling, vulnerability assessment, and penetration testing. Cloud Computing: Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Data Privacy and Compliance More ❯
I am recruiting for an experienced Security Architect with a strong specialisation in Artificial Intelligence (AI) and Machine Learning (ML) security. This is a hybrid role - 2 days in London, 3 days remote. This role does fall inside IR35 so More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Oscar Associates (UK) Limited
and security requirements. This role would be great for someone who is a strategic thinker with strong technical expertise, particularly in solution architecture and cybersecurity, and who thrives on balancing business needs with technical design. Key Responsibilities: Effectively manage and escalate both technical and project risks. Articulate and ensure approval … programmes, offering technical thought leadership and maintaining strong stakeholder relationships through regular executive-level communication on project deliverables. Requirements: Bachelors or Masters degree in Cybersecurity, Computer Science or related field. Experience in CNAPP platforms such as Wiz, Prisma Cloud, Orca or Aqua. Strong knowledge of public cloud platforms. Familiar with More ❯
ensuring it is secure, resilient, and aligned with the organisation's strategic objectives. This individual will provide architectural leadership across IT Infrastructure, Applications, and CyberSecurity domains, with a strong emphasis on Secure by Design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client … a team of Architects across multiple disciplines (Infra, Apps, Cyber) o Define, maintain, and evolve enterprise-level conceptual architecture designs covering infrastructure, applications, and cybersecurity domains. o Translate business requirements into secure, scalable, and cost-effective architectural solutions. o Provide strategic direction on on-premise infrastructure strategies. · CyberSecurity … o Embed Secure by Design principles throughout the product lifecycle. o Ensure architecture and solution designs comply with NIST controls, regulatory requirements, and internal cybersecurity policies. o Collaborate with Information Architecture, Security, Risk, and Compliance teams to assess architectural risk and apply appropriate mitigation measures. · Governance & Assurance o Lead More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
ensuring it is secure, resilient, and aligned with the organisation's strategic objectives. This individual will provide architectural leadership across IT Infrastructure, Applications, and CyberSecurity domains, with a strong emphasis on Secure by Design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client … a team of Architects across multiple disciplines (Infra, Apps, Cyber) o Define, maintain, and evolve enterprise-level conceptual architecture designs covering infrastructure, applications, and cybersecurity domains. o Translate business requirements into secure, scalable, and cost-effective architectural solutions. o Provide strategic direction on on-premise infrastructure strategies. CyberSecurity … o Embed Secure by Design principles throughout the product lifecycle. o Ensure architecture and solution designs comply with NIST controls, regulatory requirements, and internal cybersecurity policies. o Collaborate with Information Architecture, Security, Risk, and Compliance teams to assess architectural risk and apply appropriate mitigation measures. Governance & Assurance o Lead More ❯
Siemplify, IBM Resilient or similar tools. Knowledge of advanced threat detection and response methodologies alongside tools such as SIEM and Soar. Comprehensive understanding of cybersecurity principles including security operations, incident response and threat intelligence. Strong analytical and problem-solving skills to identify and address complex technical challenges in Soar solution … and a positive work environment. Excellent familiarity with standard security frameworks such as MITRE, cyber kill chain and APT campaign strategies. One or more cybersecurity certifications such as GCIA, GCIH, GCFA, GNFA, CEH, ECSA preferred More ❯
day-to-day operations while also guiding the long-term technology roadmap. As IT Manager, you’ll be responsible for driving infrastructure, systems, and cybersecurity, while supporting the business in scaling effectively. A key part of the remit is to ensure technology solutions align with the company’s short … day IT support and administration though your team, including 1st to 3rd line issues Maintain and enhance network, communications and VOIP systems Ensure robust cybersecurity practices and data protection protocols are in place Maintain and regularly test the major incident response plan Monitor system performance metrics and identify improvement More ❯
PKI Security Architect 3 months Remote SC security clearance required Inside IR35 - Umbrella only Role overview: We are seeking an experienced cybersecurity professional with a strong focus on Public Key Infrastructure (PKI), Hardware Security Modules (HSMs), digital certificates, and encryption technologies. The ideal candidate will have at least 7 years … of hands-on experience in these areas and a solid foundation in overall cybersecurity architecture. Key Responsibilities: Lead the architecture, design, and implementation of PKI solutions, with a focus on large-scale, secure environments. Support the migration from an existing PKI to a newly developed PKI infrastructure as part of … our Smart Meter Solution. Work closely with cross-functional teams to ensure secure and seamless integration of PKI within the broader cybersecurity framework. Manage and maintain HSMs, including configuration, deployment, and troubleshooting. Provide expert guidance on encryption standards, certificate lifecycle management, and secure key storage. Collaborate with other cybersecurity architects More ❯
Southampton, Hampshire, South East, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
Network and CyberSecurity Assurance Engineers Hybrid working - remote and travel to Southampton Inside IR35 1. Ability to write large complex designs 2. Top class documentation ability 3. Network or cybersecurity background 4. Governance and Assurance experience 5. Attention to detail 6. experience working in a highly regulated environment More ❯
Senior Software Engineer - Client Identity We are seeking a Senior Software Engineer to join a newly formed cybersecurity team based in Europe. This role is pivotal in shaping secure and seamless digital experiences for hundreds of thousands of clients across the UK and Europe. As part of the Enterprise Security … protecting clients from cyber threats while building and evolving critical identity and access management services. Key Responsibilities Design, develop, and enhance modern cloud-native cybersecurity services, spanning database to content delivery networks (CDNs). Implement secure authentication mechanisms such as Multi-Factor Authentication (MFA) and Passkeys. Integrate with identity providers … Node.js, NestJS Authentication & Identity: Auth0, Transmit Security Collaboration: GitHub Join us in securing digital identities and protecting client trust through cutting-edge engineering and cybersecurity innovation. McGregor Boyall is an equal opportunity employer and do not discriminate on any grounds. More ❯
South Glamorgan, United Kingdom Hybrid / WFH Options
IntaPeople
MS365, Azure for endpoint/user support Manage LAN/WAN networking issues (ideally Cisco/Sophos/HPE experience) Handle day-to-day cybersecurity: firewalls, endpoint protection, email security Operate within a fast-moving business, dealing with multiple clients Required Experience: Multi-client environment experience strongly preferred Comfortable working … knowledge of Microsoft 365, Azure AD/Entra, Intune Decent networking background (LAN/WAN, Cisco/Sophos/HPE gear) Practical understanding of cybersecurity tools and issues (firewalls, email/endpoint security) Start: ASAP To apply: Send your CV with availability. You ll need to be on-site More ❯
Cardiff, Butetown Community, South Glamorgan, United Kingdom Hybrid / WFH Options
IntaPeople
MS365, Azure for endpoint/user support Manage LAN/WAN networking issues (ideally Cisco/Sophos/HPE experience) Handle day-to-day cybersecurity: firewalls, endpoint protection, email security Operate within a fast-moving business, dealing with multiple clients Required Experience: Multi-client environment experience strongly preferred Comfortable working … knowledge of Microsoft 365, Azure AD/Entra, Intune Decent networking background (LAN/WAN, Cisco/Sophos/HPE gear) Practical understanding of cybersecurity tools and issues (firewalls, email/endpoint security) Start: ASAP To apply: Send your CV with availability. You’ll need to be on-site More ❯