detail and motivate a diverse group of stakeholders to build sponsorship for significant and impactful change Desired: Establishing observability platforms Capabilities adjacent to exposure/vulnerability management capabilities (ie cybersecurity asset management, attack surface management, etc) Pragmatic application of zero-trust philosophies Cloud based security (GCP, AWS and Azure) Pentest scoping and analysis experience Application security Threat modelling To More ❯
controls. Identify, document, and manage IDF/MDF infrastructure at sites. Oversee hardware procurement processes. Support shop floor asset connectivity to the network. Perform malware scanning and work with cybersecurity teams to remediate infections on OT devices; manage patching and vulnerability incidents. Install and manage Nozomi network taps. Configure and deploy IT/OT network infrastructure (e.g., switch installations) according More ❯
of each SAR; Responsible for the day-to-day management of the Data Protection mailbox; Provide guidance and support in regards email security, e.g., phishing, liaising with colleagues in CyberSecurity, where required; Contribute to the development of data protection policy, procedure and guidance; ensuring timelines, e.g., annual review dates, are actioned in good time; Keep up to date with More ❯
of each SAR; Responsible for the day-to-day management of the Data Protection mailbox; Provide guidance and support in regards email security, e.g., phishing, liaising with colleagues in CyberSecurity, where required; Contribute to the development of data protection policy, procedure and guidance; ensuring timelines, e.g., annual review dates, are actioned in good time; Keep up to date with More ❯
Tadley, Hampshire, South East, United Kingdom Hybrid / WFH Options
AWE Plc
to meet the needs of the UK's next-generation nuclear deterrent, we need to adapt to deliver data-driven decision making, flexible and future-proofed IT services, adaptable cybersecurity, support to a multi-billion Pound building programme, and many more. Do you have experience of working on change programmes involving multiple stakeholders? Are you passionate about ensuring people More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Lorien
key. Essential Skills Proven experience of modern JavaScript practices, frameworks and industry standards regarding front-end technologies. Experience of implementing these to produce services which meet Usability, Accessibility and CyberSecurity standards. Proficiency in building front end applications with Angular, NodeJS, Express, Typescript, HTML and CSS. Experience developing and working with REST APIs Familiarity with CI/CD practices and More ❯
Windows 11 Enterprise, macOS, iOS, and Android operating systems. Administer and maintain device management tools such as Microsoft Intune, Autopilot, JAMF, and PDQ. Troubleshoot and maintain endpoint protection and cybersecurity applications, including CrowdStrike, Microsoft Defender, Zscaler, and Rapid7. Support new device setup, configuration, and deployment through automated provisioning tools (Autopilot/JAMF). Apply now to speak with VIQU IT More ❯
Haywards Heath, West Sussex, England, United Kingdom
VIQU IT Recruitment
Windows 11 Enterprise, macOS, iOS, and Android operating systems. Administer and maintain device management tools such as Microsoft Intune, Autopilot, JAMF, and PDQ. Troubleshoot and maintain endpoint protection and cybersecurity applications, including CrowdStrike, Microsoft Defender, Zscaler, and Rapid7. Support new device setup, configuration, and deployment through automated provisioning tools (Autopilot/JAMF). Apply now to speak with VIQU IT More ❯
and macOS operating systems. Understanding of network fundamentals, including Wi-Fi, LAN, and VPN. Experience with enterprise ITSM tools (e.g., Jira Service Management, ServiceNow, or similar). Familiarity with cybersecurity practices and tools. Certifications such as CompTIA A+, ITIL, or Jamf 200 are a plus. KSGalway Should you require any support or assistance, please contact your local Gi Group office. More ❯
Boomi, and D365 CE is highly desirable. Deep knowledge of cloud platforms (AWS, Azure, GCP) and hybrid environments. Expertise in data architecture, integration patterns, APIs, and microservices. Familiarity with cybersecurity principles, DevOps, and ITIL practices. More ❯
to coding, networking, and digital literacy tools. Your Role Will Include: Teaching engaging and interactive Computing lessons to KS3 and KS4 students Inspiring students in topics such as programming, cybersecurity, algorithms, and data representation Supporting pupils through both theoretical and practical assessments Contributing to a collaborative and high-achieving ICT & Computing faculty What We re Looking For: Qualified Teacher Status More ❯
CyberSecurity Architect - Defence SectorLocation: Newport (Typically 4 days per week) | Clearance Required: SC Clearance RequiredType: Full-Time | Salary: Inside IR35 - from £63.00 per hour (PAYE/LTD option available) Belcan are currently supporting one of our long standing clients, who are seeking a CyberSecurity Architect with a strong background in secure systems design and defence standards to join … with engineering and development teams to embed security from the outset. Stay ahead of evolving threat landscapes and propose mitigation strategies. Essential Skills & Experience Minimum 6 years' experience in cybersecurity architecture within defence, aerospace, or critical national infrastructure. Strong knowledge of MOD security requirements (JSP 440, JSP 604, DEF STANs). Proven experience in Secure by Design principles and More ❯
CyberSecurity Architect - Defence Sector Location: Newport (Typically 4 days per week) Clearance Required: SC Clearance Required Type: Full-Time Salary: Inside IR35 - from 63.00 per hour (PAYE/LTD option available) Belcan are currently supporting one of our long standing clients, who are seeking a CyberSecurity Architect with a strong background in secure systems design and defence standards … with engineering and development teams to embed security from the outset. Stay ahead of evolving threat landscapes and propose mitigation strategies. Essential Skills & Experience Minimum 6 years' experience in cybersecurity architecture within defence, aerospace, or critical national infrastructure. Strong knowledge of MOD security requirements (JSP 440, JSP 604, DEF STANs). Proven experience in Secure by Design principles and More ❯
NHS Bristol, North Somerset and South Gloucestershire Integrated Care Board
ensuring security, stability, and scalability at all times. Manage and monitor system security , including threat detection, risk management, and incident response, ensuring compliance with SATRE, ISO27001, DSPT, and NHS cybersecurity frameworks. Develop and maintain secure data pipelines from contributing NHS and partner organisations, ensuring interoperability, data quality, and adherence to governance standards. Provide technical leadership to engineers, analysts, and platform … infrastructure or data platform teams in NHS, public sector, or regulated environments. Proven track record of managing secure data environments or similar platforms In-depth understanding of information governance, cybersecurity, ISO standards, and NHS-specific compliance frameworks. Demonstrable experience designing and implementing infrastructure aligned to best practices in security and resilience Ability to manage and lead a multidisciplinary technical More ❯
Our client is seeking an experienced Associate Security Analyst to join their Cyber Defence team. This is a hands-on role where you will investigate and respond to cybersecurity incidents that could impact critical systems and services across the UK. You will play a key part in identifying threats, supporting incident response, and helping to continually improve the organisation … also involves mentoring apprentice analysts and joining an out-of-hours on-call rota to ensure 24/7 coverage of potential cyber incidents. Key Responsibilities Investigate and triage cybersecurity alerts and user reports. Analyse systems, files, network traffic, and cloud environments to determine the extent of incidents. Support technical responses to incidents, including containment, eradication, and recovery. Contribute … as AWS. Interview Process The interview will be conducted via Microsoft Teams and will consist of: A short competency-based discussion. A practical Splunk exercise to investigate a simulated cybersecurity scenario. A short technical quiz covering general cybersecurity knowledge. More ❯
Welwyn Garden City, Hertfordshire, United Kingdom Hybrid / WFH Options
Adecco
data insights and cyber engagement, we would love to hear from you. Apply today to join our client's team and make a meaningful impact in the realm of cybersecurity! How to Apply: Please submit your CV and a brief cover letter outlining your relevant experience and motivation for this role. We look forward to reviewing your application! Adecco is More ❯
mapping for critical business functions. Complete divisional discovery work to identify gaps in suppliers and data processors. - Populate identified gaps into the central Data Agreement Register. - Review contracts for: - Cybersecurity clauses - Right to audit - Data protection clauses - Incident breach notification requirements - Details of sub-processors - Review contracts for technical and security risks. - Document supplier certifications and ensure records are in More ❯
Manager who has experience with technical delivery and ideally Cyber Transformation programmes. The role is inside IR35 and you would be paid PAYE through us here at Opus.Skills required: - Cybersecurity projects- PAM, IDAM, SIEM, Data protection projects- Ideally some experience of RFP/Tendering More ❯
Contract Role: CyberSecurity Delivery Manager Outside IR35 | Immediate Start | £500 per day Location: Central London (Hybrid) Duration: 6 months (with potential extension) About the Role We are seeking an experienced CyberSecurity Delivery Manager to join a global organisation operating within a federated model. This is a technical delivery-focused role responsible for driving and overseeing a range of … on several high-impact initiatives, including but not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cybersecurity projects such as endpoint protection, vulnerability management, identity & access management, and network security. Develop and manage project plans, milestones, risks, and budgets. Coordinate delivery across regional teams, ensuring consistency … practicality. Manage third-party vendors and partners to ensure timely, high-quality outcomes. Provide delivery assurance and proactively resolve barriers to progress. Essential Skills & Experience Proven experience managing complex cybersecurity projects within multi-region or federated organisations. Strong technical understanding across key cyber domains within Microsoft environments. Excellent stakeholder management and communication skills. Familiarity with structured project management methodologies More ❯
and external service providers. Maintenance, administration and monitoring of IT/OT infrastructure for wind farm operation (servers, systems, network devices, voice communication systems). Management of OT environment cybersecurity in accordance with internal regulations and industry standards Requirements Bachelor's or Master's degree in a technical field: IT, Automation, Electrical Engineering, Telecommunications, or related . * 2-3+ More ❯
Oracle eBusiness Suite R12 technical components within a major business transformation programme. Key Responsibilities: Manage a multi-disciplinary technical team including Oracle EBS developers, DBAs, OIC integration developers, and cybersecurity specialists. Oversee full project lifecycle from requirements through to deployment. Develop and maintain detailed delivery plans, manage dependencies, risks, and issues. Produce regular progress reports and contribute to programme More ❯
and usability of their platform and take it to the next level within the AI and Security space. Key Focus Areas: UI/UX Design. React Expertise. Design Inspiration. Cybersecurity Awareness. Data-Driven Mindset. Ideal Candidate: Someone who combines creative UI design instincts with technical capability and a data-informed mindset. We want a designer who understands both the aesthetics More ❯
Employment Type: Contract
Rate: £400 - £500 per day + Outside IR35 and Remote-FIrst
including how these processes influence the design e.g. FMECA, Hazard Analysis, Fault Tree Analysis, Common Mode Analysis, using tools such as Reliability Workbench Desirable An understanding of information assurance, cybersecurity and environmental impact aspects relating to real time embedded engineering products More ❯
resulting from the migration to Oracle Cloud HCM Managing the successful testing and acceptance of reporting solutions Providing leadership and direction to a team of reporting analysts Collaborating with CyberSecurity and Data Protection teams to ensure data compliance Qualifications and Experience To be successful in this Oracle Fusion Developer role, you will need: Demonstrable experience leading reporting workstreams for More ❯
cross-functional teams to ensure seamless delivery and implementation of power systems that meet Bentley's stringent requirements. Test & Validate : Lead functional testing and ensure compliance with Golden Rules, CyberSecurity, and Functional Safety processes. Troubleshoot : Utilize your diagnostic skills to resolve vehicle issues, ensuring all systems function flawlessly. What We're Looking For: To thrive in this role, you More ❯