Key Responsibilities - Develop, implement, and maintain information security assurance programs. Ensure compliance with regulatory requirements and standards (e.g., ISO 27000, NIST SP800 series, CSF). Conduct risk assessments and vulnerabilitymanagement activities. Maintain robust security controls across enterprise assets, software, networks, and applications. Support incident response and recovery processes, including penetration testing and audit log management. Deliver training … expert advice on secure configurations, malware defences, and network monitoring strategies. Qualifications & Experience - Mandatory: At least 5 years' experience in information security assurance roles. Proven experience with information security management frameworks and regulatory compliance (e.g., ISO 27000, NIST). Strong understanding of security controls across data, networks, applications, devices, and users. Desirable: Familiarity with regulations in the Nuclear industry … and ability to engage with diverse stakeholders. A proactive, curious, and analytical mindset with strong problem-solving skills. Technical Skills: Comprehensive knowledge of security controls, including: Data Protection, Account Management, and Access Control Management. Continuous VulnerabilityManagement and Incident Response. Penetration Testing and Security Awareness Training. Secure Configuration and Network Monitoring. More ❯
Paddington, Sheldon Square, Greater London, United Kingdom Hybrid/Remote Options
Morson Edge
Key Responsibilities - Develop, implement, and maintain information security assurance programs. Ensure compliance with regulatory requirements and standards (e.g., ISO 27000, NIST SP800 series, CSF). Conduct risk assessments and vulnerabilitymanagement activities. Maintain robust security controls across enterprise assets, software, networks, and applications. Support incident response and recovery processes, including penetration testing and audit log management. Deliver training … expert advice on secure configurations, malware defences, and network monitoring strategies. Qualifications & Experience - Mandatory: At least 5 years' experience in information security assurance roles. Proven experience with information security management frameworks and regulatory compliance (e.g., ISO 27000, NIST). Strong understanding of security controls across data, networks, applications, devices, and users. Desirable: Familiarity with regulations in the Nuclear industry … and ability to engage with diverse stakeholders. A proactive, curious, and analytical mindset with strong problem-solving skills. Technical Skills: Comprehensive knowledge of security controls, including: Data Protection, Account Management, and Access Control Management. Continuous VulnerabilityManagement and Incident Response. Penetration Testing and Security Awareness Training. Secure Configuration and Network Monitoring. More ❯
West London, London, United Kingdom Hybrid/Remote Options
Sanderson Recruitment
are effectively deployed, maintained and optimised, while driving efficiencies and ensuring secure, compliant infrastructure. This role requires a background and strong expertise in enterprise toolsets, automation technologies and patch management processes. Engagement via Umbrella Company Only; all taxes & NI deducted at source. General responsibilities Lead operations of enterprise tooling platforms including SCCM, Scorch, BMC, Ansible and MuleSoft. Define and … consistent monitoring, reporting and compliance dashboards are in up to date and in-place for patching and tooling. Work with security and governance teams to align patching schedules with vulnerabilitymanagement requirements. Provide operational reporting for Stakeholders, including compliance metrics. Manage vendor relationships and licensing agreements for tooling and middleware platforms. Required Skills & Experience Proven experience managing enterprise … operations tooling, middleware and patch management. Strong expertise with SCCM, Scorch, BMC, Ansible and MuleSoft platforms. Demonstrated experience in patch management, vulnerability remediation and compliance reporting. Hands-on knowledge of automation frameworks and orchestration platforms. ITIL Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built More ❯
not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerabilitymanagement, identity & access management, and network security. Develop and manage project plans, milestones, risks, and budgets. Coordinate delivery across regional teams, ensuring consistency and practicality. Manage third … progress. Essential Skills & Experience Proven experience managing complex cyber security projects within multi-region or federated organisations. Strong technical understanding across key cyber domains within Microsoft environments. Excellent stakeholder management and communication skills. Familiarity with structured project management methodologies (e.g. PRINCE2, PMP, Agile). Relevant security certifications such as CISSP, CISM, CompTIA Security+, or AWS/Azure Security More ❯
Wokingham, Berkshire, England, United Kingdom Hybrid/Remote Options
KBC Technologies UK LTD
architect, and maintain network security infrastructure including Firewalls, IDPS, Proxies, Load Balancers, VPNs, and WAFs. Develop and manage firewall policies, network access controls, IAM solutions, MFA, RBAC, and privilege management . Ensure alignment of security measures with compliance standards (GDPR, HIPAA, PCI DSS). Conduct regular security audits and assessments to identify and remediate risks. Apply industry frameworks such … as NIST Cybersecurity Framework, ISO 27001, CIS Controls . Oversee and enhance security technologies: SIEM, vulnerabilitymanagement, cloud security (OCI/Azure/AWS), PKI, cryptography, web/email security, logging and monitoring . Monitor network traffic for anomalies and potential breaches. Collaborate with IT teams (network engineers, sysadmins, developers) to ensure a holistic approach to security. Communicate More ❯
packages, installation files, and automation scripts for large-scale deployments. Conduct network connectivity validation and testing to ensure seamless Defender integration with Microsoft 365 Defender services. Collaborate with image management and infrastructure teams to embed Defender within server builds and auto-scaling environments. Remove Legacy antivirus agents and validate clean transitions to Defender coverage. Manage policy deployment through AAD … managing Microsoft Defender for Servers in enterprise environments. Strong track record migrating from Symantec Endpoint Protection or McAfee ePO to Defender. Deep knowledge of Defender for Servers EDR, Threat & VulnerabilityManagement, Attack Surface Reduction, and Automated Investigation and Remediation. Skilled in AV policy and exclusion management for Windows and Linux Servers. Experienced deploying Defender via GPO, SCCM More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid/Remote Options
Morson Edge
Operations - Windows & Linux administration - Regulatory - NIS/CAF and other assessment frameworks - Governance, process and documentation - Operational Technology/SCADA - Telecoms & Transport networks - Deployment of SIEMs, IDAM & PAM, and VulnerabilityManagement products - Legacy technologies Requirements • Skills and experience in understanding at a technical level security operation. • Awareness of key legislation and regulation impacting IT/OT General Control More ❯
Azure Storage. Knowledge of immutable backups and secure data retention strategies. Experience with disaster recovery planning, including full restore testing. Expertise in multi-factor authentication (MFA) setup and testing. Vulnerabilitymanagement - scanning, prioritization, remediation validation. Ability to design and interpret security dashboards for monitoring and reporting Awareness of system throttling and its security implications. Ideally comfortable upskilling the More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid/Remote Options
Hirexa Solutions UK
Pod Security Policies (or the newer Pod Security Admission controller), and GKE Sandbox. Configuring and enforcing network policies to control traffic between pods and namespaces. Using container scanning and vulnerabilitymanagement tools to secure container images. Implementing Binary Authorization to ensure only trusted images are deployed to clusters. Establishing robust IAM policies for GKE and related GCP services. … Excellent communication, stakeholder management, and problem-solving skills. Relevant professional certifications (e.g., Google Cloud Certified Professional Cloud Architect or DevOps Engineer) are a plus. More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Adecco
public sector organisations. What You'll Do: As a Senior Business Analyst, you will: Engage with public sector organisations to enhance cyber security services. Model processes and systems around vulnerability management. Share insights with service owners and project teams. Identify and recommend improvements across multiple organisations. Collaborate with User Researchers and Service Designers to meet user needs. Monitor and … measure service effectiveness through KPIs. Who You Are: We're looking for a dynamic professional with: Expertise in context, problem, and option analysis. Strong user experience and stakeholder relationship management skills. Proven ability in requirements definition and management. Experience in business modelling and process improvement. A solid understanding of cyber security risks and best practises. Proficiency in agile working More ❯