Cyber Security Analyst - Local Government - Contract £400 per day | Inside IR35 | Hybrid (2 days on-site in North London) | Rolling 3-month contract Salt is partnered with a forward-thinking local government body in North London seeking a Cyber Security Analyst to support their internal IT and security teams on a key programme of work. This is … hybrid contract role, with two days per week on-site and the remainder remote. You'll play a central role in monitoring, analysing, and improving the organisation's cyber security posture - particularly around SIEM and incident response, with a strong focus on Microsoft Sentinel. Key Responsibilities: Monitor security alerts and log data using Microsoft Sentinel and related SIEM … tools Respond to security incidents, performing root cause analysis and recommending remediations Conduct vulnerability assessments and support threat detection activities Assist with the configuration and optimisation of the organisation's security infrastructure Collaborate with technical teams to ensure best practices in informationsecurity are maintained Essential Experience: Proven experience in a cyber security analyst or More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
Role: Cyber Security Engineer Salary/Rate: up to £700 per day (inside IR35) Location: Hybrid LondonContract Duration: until October 2025 We are currently looking for a Cyber Security Engineer for our government client. This Cyber Security Engineer role is hybrid, based between 2-3 days per week on site in central London and the remainder of … the week working remotely. The contract for the Cyber Security Engineer position is until October 2025 with potential to extend, operating inside IR35. Security Clearance: Security Check ("SC Clearance") This role is inside IR35 - Due to the service of the role, it will now be based on an Umbrella solution. Essential skills/experience required: Certifications: OSCP … Clearance, Active SC, SC Vetted, Cleared To A High Government Standard, Dv Cleared, Dv Clearance, Dv Check, Developed Vetted, Developed Vetting, Dv Strap, Active DV, Security, Cyber, Cybersecurity, Infosec, Cloud, AWS, Amazon Web Services, Azure, Python, Bash, Script, Scripting, Automate, Automation, Penetration, Pentest, Pentesting, Pen-Test, Pen-Testing, Hacking, Vulnerability, Threat, Engineer #vacancy #jobadvert #recruit #hiring #jobsearch #careers #talent More ❯
Gloucester, Gloucestershire, South West, United Kingdom Hybrid / WFH Options
Morson Talent
are met and communications are handled effectively. Use Microsoft Excel extensively to analyse data, track KPIs, and support the production of performance reports. Ensure the safe handling of sensitive information in line with company policies. Support the review of Third-Party Security Assessments, where required. Skills and Experience - Essential: Advanced proficiency in Microsoft Excel - including pivot tables, formulas … written and verbal communication skills. Ability to multitask and prioritise in a fast-paced environment. Desirable: Experience using Power BI to visualise and communicate data insights. Awareness of international informationsecurity standards and frameworks (e.g. ISO27001, ISO27017, GDPR, Cyber Essentials Plus). Understanding of common security risks, threats, and mitigation approaches. Tenacity, attention to detail, and a More ❯
Gloucestershire, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Via Umbrella Engagement Location: Gloucestershire (Hybrid 1-2 Days P/W - Can be flexible) We are seeking a highly motivated IAM SailPoint Analyst to join our InformationSecurity team. This role is crucial for administering, maintaining, and supporting our Identity and Access Management (IAM) systems and processes, ensuring users have the right access to the right resources … at the right time, thereby enhancing our security and compliance. Responsibilities: Hands-on experience with SailPoint IdentityIQ or IdentityNow is highly preferred, along with other enterprise IAM solutions (e.g., Okta, Microsoft Azure AD). Administer and manage IAM systems, including user provisioning, de-provisioning, access reviews, and RBAC. Perform daily operational tasks like processing access requests and troubleshooting issues. … Assist in developing and enforcing IAM policies and standards. Collaborate with IT and business units on IAM solutions. Participate in IAM projects (upgrades, integrations). Monitor IAM systems for security events and anomalies. Maintain comprehensive documentation of IAM configurations. Strong understanding of IAM concepts (authentication, authorization, provisioning, SSO, MFA, PAM). Familiarity with directories (Active Directory, LDAP). Knowledge More ❯
System. Key Responsibilities: · Design & Develop: Create the Cutover & Dress Rehearsal Runbook, including rollback scenario planning with detailed tasks, dependencies, owners, sequencing, and timing. · Collaborate: Work closely with engineering, infrastructure, infosec, and operations teams to validate technical cutover readiness and failback readiness. · Document & Manage: Identify, document, and manage technical Cutover requirements, including data, system configuration, interface activation, and failback procedures. · Define … Establish technical checkpoints, rollback procedures, and contingency plans. · Ensure Alignment: Stay in sync with change management, operational constraints, safety, security protocols, and regulatory standards. · Manage Rehearsals: Oversee Cutover rehearsals, dry runs, and simulations to validate cutover scenarios and runbook viability. · Provide Leadership: Offer technical leadership during Cutover execution, ensuring adherence to the plan and real-time issue management. · Support … developing and executing detailed cutover runbooks for complex mission-critical systems. · Deep knowledge of system integration infrastructure readiness and network configuration in Operational Technology (OT) environments. · Familiarity with cyber security requirements and operational risk management for Critical National Infrastructure (CNI). · Excellent problem-solving, documentation, and coordination skills under high-pressure situations. · Strong communication skills and the ability to More ❯
Havant, Hampshire, United Kingdom Hybrid / WFH Options
Reed Technology
Cyber Security Specialist Location: Havant Job Type: Full-time, Hybrid (3-4 days per week), 12-month FTC (with likely extension to permanent) Salary: 50 - 53K plus benefits We are seeking a Cyber Security Specialist to lead the implementation of a new InformationSecurity Management System (ISMS) and ensure compliance with security standards. This role … is crucial in driving security improvements, managing risks, and maintaining regulatory compliance within a dynamic IT environment of circa 500 IT users. Key Accountabilities: * Lead the implementation of a new ISMS, ensuring alignment with industry security standards. * Develop and maintain cyber security policies, procedures, and risk management frameworks. * Manage compliance with cyber security regulations, standards, and … frameworks (ISO27001, CAF/eCAF, Cyber Essentials Plus). * Implement and manage security monitoring tools to detect and respond to security events. * Identify and assess security risks and vulnerabilities, developing mitigation strategies. * Support regular audits and assessments to ensure adherence to security policies. * Provide reporting on security incidents, compliance status, and risk assessments. * Collaborate with More ❯
yourself and further develop your skills to enable you to grow within the company and industry. You will be involved in: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with … the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList … and BlockList Conduct activities in line with SOC Maturity and continuous improvement Your skillset may include: Background in Cyber SecuritySecurity awareness Experience in Network Security, Infrastructure, and Operating Systems & Applications Knowledge of IT Security standard methodologies Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP More ❯
Security Risk Analyst - Artificial Intelligence (AI) - Machine Learning (ML) Our client, a global insurance organisation, is looking to recruit the services of an experienced Senior Risk Analyst with deep expertise in Artificial Intelligence (AI), Machine Learning (ML), and Large Language Models (LLMs) to join our client's Security Risk Management team. This role plays a pivotal part in … Collaborate with stakeholders across IT, Data Privacy, Innovation, and Business to identify and mitigate risks. Translate complex technical risks into business-friendly language for executive audiences. Improve and evolve security risk assessment methodologies for advanced AI systems. Develop threat models and propose compensatory controls. Present findings to internal governance groups and help shape AI risk frameworks. Required Skills & Experience … communication skills, up to C-level. Strong analytical and reporting abilities. Familiarity with risk management frameworks (ISO 3100X, NIST 800 series, ENISA, EBIOS, OCTAVE, FAIR). Preferred: Background in informationsecurity and security frameworks (eg, MITRE ATT&CK, ISO 2700X). Experience working in multinational environments. Knowledge of AI governance or ethics is a plus. Please apply More ❯
Bromley, London, United Kingdom Hybrid / WFH Options
Pontoon
with various technology organizations and divisional leads to enhance risk management practices. Present recommendations to leadership for efficient risk identification and remediation. Leverage your technical expertise in data management, informationsecurity, or network operations to ensure policy adherence. Oversee end-to-end issue management activities, including action plan development for audit and compliance issues. What We're Looking … For: Experience : Years in technology, ideally with a focus in financial services or risk. Technical Expertise : Proficiency in areas such as data management, artificial intelligence, or information security. Communication Skills : Ability to translate complex technical information into clear, concise language for various audiences. Change Advocacy : A proven record of advocating for and embracing change across diverse stakeholder groups. More ❯
with various technology organizations and divisional leads to enhance risk management practices. Present recommendations to leadership for efficient risk identification and remediation. Leverage your technical expertise in data management, informationsecurity, or network operations to ensure policy adherence. Oversee end-to-end issue management activities, including action plan development for audit and compliance issues. What We're Looking … For: Experience : Years in technology, ideally with a focus in financial services or risk. Technical Expertise : Proficiency in areas such as data management, artificial intelligence, or information security. Communication Skills : Ability to translate complex technical information into clear, concise language for various audiences. Change Advocacy : A proven record of advocating for and embracing change across diverse stakeholder groups. More ❯
Bromley, Kent, England, United Kingdom Hybrid / WFH Options
Pontoon
with various technology organizations and divisional leads to enhance risk management practices. Present recommendations to leadership for efficient risk identification and remediation. Leverage your technical expertise in data management, informationsecurity, or network operations to ensure policy adherence. Oversee end-to-end issue management activities, including action plan development for audit and compliance issues. What We're Looking … For: Experience : Years in technology, ideally with a focus in financial services or risk. Technical Expertise : Proficiency in areas such as data management, artificial intelligence, or information security. Communication Skills : Ability to translate complex technical information into clear, concise language for various audiences. Change Advocacy : A proven record of advocating for and embracing change across diverse stakeholder groups. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Pontoon
with various technology organizations and divisional leads to enhance risk management practices. Present recommendations to leadership for efficient risk identification and remediation. Leverage your technical expertise in data management, informationsecurity, or network operations to ensure policy adherence. Oversee end-to-end issue management activities, including action plan development for audit and compliance issues. What We're Looking … For: Experience : Years in technology, ideally with a focus in financial services or risk. Technical Expertise : Proficiency in areas such as data management, artificial intelligence, or information security. Communication Skills : Ability to translate complex technical information into clear, concise language for various audiences. Change Advocacy : A proven record of advocating for and embracing change across diverse stakeholder groups. More ❯
M44, Irlam, City and Borough of Salford, Greater Manchester, United Kingdom Hybrid / WFH Options
First Recruitment Group
is correctly generated from these systems. Drive continuous improvement of processes, highlight data discrepancies, and create operational procedures to address data quality. Work within the relevant FFL policies e.g. InformationSecurity Be a Subject Matter Expert in your allocated business area, and to cross train other BI Team members in this area’s needs. Produce BI reports and … such as Point to Point (POP)/10 Gigabit passive optical network (XGS-PON) Strong analytical skills with the ability to collect, organize, analyse, and disseminate significant amounts of information with accuracy. Basic understanding of programming principles, previous excel work or python, working with conditional formulas/expressions (IF-ELSE logic) The ability to present data/information … degree level in a relevant subject, or experience equivalent to this Power BI and/or other similar or relevant qualifications/skills Benefits: Hybrid working Competitive rate Company information At First Recruitment Group we understand just how important it is to secure the right people. That is why our Recruitment Consultants always take the time to understand requirements More ❯
platform. Key Responsibilities: Runbook Development: Design and create a detailed Cutover & Dress Rehearsal Runbook, including rollback scenario planning, task sequencing, dependencies, and timing. Collaboration: Work closely with engineering, infrastructure, infosec, and operations teams to validate readiness for the cutover and any necessary failback procedures. Requirement Management: Identify, document, and manage all technical cutover requirements, including data needs, system configurations, interface … rollback procedures. Checkpoint Definition: Establish technical checkpoints, rollback plans, and contingency strategies to mitigate risks. Compliance Assurance: Ensure all activities align with change management processes, operational constraints, safety protocols, security standards, and regulatory requirements. Rehearsal Management: organise and manage cutover rehearsals, dry runs, and simulations to ensure the viability of cutover scenarios and the effectiveness of the runbook. Execution More ❯
platform. Key Responsibilities: Runbook Development: Design and create a detailed Cutover & Dress Rehearsal Runbook, including rollback scenario planning, task sequencing, dependencies, and timing. Collaboration: Work closely with engineering, infrastructure, infosec, and operations teams to validate readiness for the cutover and any necessary failback procedures. Requirement Management: Identify, document, and manage all technical cutover requirements, including data needs, system configurations, interface … rollback procedures. Checkpoint Definition: Establish technical checkpoints, rollback plans, and contingency strategies to mitigate risks. Compliance Assurance: Ensure all activities align with change management processes, operational constraints, safety protocols, security standards, and regulatory requirements. Rehearsal Management: organise and manage cutover rehearsals, dry runs, and simulations to ensure the viability of cutover scenarios and the effectiveness of the runbook. Execution More ❯
Infrastructure Security Engineer - Application/Network experience We are currently recruiting for a Infrastructure Security Engineer on a 6 month initial contract. Hybrid basis (2-3 days), office location being London. They are looking for a candidate to take responsibility for leading, guiding, supporting and delivering secure architectural design for the group cyber security maturity programme. They … are also looking for a candidate who is able to provide advice and recommendations for the programme. Key Skills InformationSecurity Management System (Infrastructure Security Operations). Azure cloud infrastructure and configuration. System Centre Configuration Manager, Operations Manager and Virtual Machine Manager. Microsoft Exchange online Azure and on-premises Active Directory Cyber Incident Management and or Security Forensic experience. Windows Server and Linux Network (WAN, Wi-Fi) and Network Access Control (NAC) management Cloud email security gateway services Server hardware including and CIS controls. Security monitoring, orchestrator and SEIM tools Next-gen application firewalls, anti-malware, cloud proxies and CASB Please apply! Carbon60, Lorien & SRG - The Impellam Group STEM Portfolio are acting as an More ❯
Security Project Manager - NIST, Insurance, Cyber Up to £750 per day - Inside IR35 London/Hybrid 6 months My client is an instantly recognisable Insurer who require a Security Project Manager with Insurance industry experience to join a business-critical cyber programme. Key Requirements: Proven commercial experience working as a Security Project Manager within the Insurance Space. … Expertise in Cyber/Information Security. A strong understanding of Cybersecurity frameworks, specifically NIST. Previous experience carrying out NIST assessments. Excellent communication skills. Nice to have: Immediate availability. If interested, with relevant experience, please apply with your latest CV ASAP. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of More ❯
cleansing, validating, matching, analysing and visualising large, complex data sets Proficiency with Power BI and SQL Experience drawing actionable insights from data to support transformation Ability to present complex information clearly to non- technical audiences Strong attention to detail and accuracy in analysis and outputs Comfortable working across multiple work streams in a fast-moving team Desirables : Familiarity with … Python, R, or Microsoft Fabric Understanding of data governance, GDPR and informationsecurity Experience with financial data modelling, cost to serve or service bench marking Experience coaching or training non- data teams in data use Background in wider transformation or change programmes If you're interested or know someone who might be send your CV to More ❯
related data repositories on a day-to-day basis. Monitor, measure, report and review current performance of application services and ensure availability and capacity meet business demand. Apply applicable informationsecurity procedures to maintain compliance across infrastructure applications. More ❯
Senior Back End Engineer - Golang InformationSecurity Team 6-Month Contract 600- 650 per day - Inside IR35 Hybrid - London/Remote (3 days on-site per week) The role: Our global media and consumer technology client is seeking a Senior Back End Engineer to join their InformationSecurity team for an initial 6-month contract. This … role focuses on building and maintaining internal tools used for large-scale web application testing , automation , and scraping , helping to improve the security and resilience of digital platforms used worldwide. This is a fast-paced, high-impact role suited to experienced engineers who are confident working autonomously and contributing to complex systems with minimal onboarding. The ideal candidate will … Responsibilities Creating tools that emulate malicious activity in order to detect and fix weaknesses in web platforms. Build and enhance microservice-based automation pipelines that test and strengthen the security of web apps. Design, develop, and maintain scalable back end systems for internal web crawling and scraping tools. Collaborate with engineering and security stakeholders across global teams. Deliver More ❯
City of London, London, Lime Street, United Kingdom
PCR Digital
Senior Back End Engineer - Golang InformationSecurity Team 6-Month Contract £600-£650 per day - Inside IR35 Hybrid - London/Remote (3 days on-site per week) The role: Our global media and consumer technology client is seeking a Senior Back End Engineer to join their InformationSecurity team for an initial 6-month contract. This … role focuses on building and maintaining internal tools used for large-scale web application testing , automation , and scraping , helping to improve the security and resilience of digital platforms used worldwide. This is a fast-paced, high-impact role suited to experienced engineers who are confident working autonomously and contributing to complex systems with minimal onboarding. The ideal candidate will … Responsibilities Creating tools that emulate malicious activity in order to detect and fix weaknesses in web platforms. Build and enhance microservice-based automation pipelines that test and strengthen the security of web apps. Design, develop, and maintain scalable back end systems for internal web crawling and scraping tools. Collaborate with engineering and security stakeholders across global teams. Deliver More ❯
yourself and further develop your skills to enable you to grow within the company and industry. You will be involved in: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with … the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList … and BlockList Conduct activities in line with SOC Maturity and continuous improvement Your skillset may include: Background in Cyber SecuritySecurity awareness Experience in Network Security, Infrastructure, and Operating Systems & Applications Knowledge of IT Security standard methodologies Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP More ❯
and Vendor Management skills Has experience leading a Service Desk and support teams Strong experience with Microsoft Azure, Exchange Online and Microsoft 365 is required Strong understanding of cyber security principles and best practices, having worked in an informationsecurity accredited environment Strong technical background with experience in managing outsourced IT services and vendor relationships Benefits include More ❯
Agile Programming Applied Machine Learning Computer Graphics Web Design and Programming Cloud Technologies Advanced Databases and Big Data Introduction to AI Natural Language Processing DevOps Data Analysis and Visualisation InfoSec Key Responsibilities Delivering lectures, seminars, and workshops aligned to module specifications Updating and maintaining engaging digital learning content via VLE and MS Teams Supporting student assessment and providing timely, constructive More ❯
Agile Programming Applied Machine Learning Computer Graphics Web Design and Programming Cloud Technologies Advanced Databases and Big Data Introduction to AI Natural Language Processing DevOps Data Analysis and Visualisation InfoSec Key Responsibilities Delivering lectures, seminars, and workshops aligned to module specifications Updating and maintaining engaging digital learning content via VLE and MS Teams Supporting student assessment and providing timely, constructive More ❯