effectively across teams. What you'll do: Develop and implement proactive security strategies, policies, and procedures to protect our systems, networks, and data assets. Lead regular security assessments, including vulnerability scans and penetration tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents … the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerabilityassessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong … capability in risk assessment, vulnerability management, and data informed decision -making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in scripting and programming (i.e. More ❯
Senior Vulnerability Analyst £50,000 - £57,000 + bonus and extensive benefits Full Time/Permanent West Midlands/Hybrid - 1-2 days a month in the office on average The Role and Company: I am looking for a driven Senior Vulnerability Analyst to join a large nationally recognised brand head quartered in the West Midlands. As a … Senior Vulnerability Analyst you will be joining a highly skilled Cyber Defence team. As a key part if this team you will manage threats to the organisation and safeguard systems that enable the business to function safely and effectively. We are ideally looking for someone Midlands based who can be on site in Warwickshire 1-2 days a month … on average. Responsibilities: Conducting regular vulnerability assessments using automated scanning tools, manual testing techniques, and security best practices to identify vulnerabilities in systems, networks, and applications Managing the lifecycle of vulnerabilities from discovery to remediation, including vulnerability triage, prioritisation, tracking, and reporting Analysing the impact and severity of identified vulnerabilities based on factors such as the likelihood of More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Oversee contractors and third-party delivery. Whats essential. Degree in a cyber security-related field. Professional certification (e.g. CISSP, Azure Security Engineer, or equivalent). Skilled in risk/vulnerability assessments, compliance checks, and audits. Experienced in penetration testing and remediation. Knowledge of business continuity, disaster recovery, and incident response. Hands-on with hybrid cloud security tools (e.g. M365 More ❯
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Michael Page
Ensure security controls are in-place based on ISO27001 and NIST As the regional security representative in the global Security/Technology project Lead/execute phishing campaign Conduct vulnerability assessments and implement measures to mitigate potential risks. Involve in global security operations process, analysis and escalate security alerts/tickets from global SOC team Maintain and update security More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
knowledge of cybersecurity who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and More ❯
Wallington, Surrey, England, United Kingdom Hybrid / WFH Options
Newmarket Holidays
Competencies: In-depth knowledge of cybersecurity frameworks, tools, and technologies Strong understanding of networking protocols, cloud security, and secure software development principles. Experience with incident response, risk management, and vulnerability assessment. Familiarity with regulatory compliance and standards (e.g., GDPR, ISO 27001). Excellent problem-solving and analytical skills, with the ability to handle complex security challenges. Strong communication and More ❯
Ashby de la Zouch, Ashby-de-la-Zouch, Leicestershire, United Kingdom
VIQU IT
Analyst: Support the design, implementation, and management of cyber security technologies across the business Monitor and respond to security incidents, alerts, and helpdesk requests, maintaining robust threat detection Conduct vulnerability assessments, penetration testing, and phishing simulations to identify and mitigate risks Collaborate closely with IT teams to embed security best practices into system management and project delivery Stay up More ❯
L33, Knowsley, Merseyside, United Kingdom Hybrid / WFH Options
Curveball Solutions
business objectives. Drafting, maintaining and implementing information security policies and Standard Operating Procedures (SOPs). Configuring and overseeing mobile security—MDM (MAM/BYOD)—to protect business continuity. Leading vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Authoring compelling tender responses, clearly demonstrating technical capability and strategic value. Enhancing Microsoft 365 security leveraging Purview, Conditional Access, MFA More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Curveball Solutions
evolving business objectives. Drafting, maintaining and implementing information security policies and Standard Operating Procedures (SOPs). Configuring and overseeing mobile securityMDM (MAM/BYOD)to protect business continuity. Leading vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Authoring compelling tender responses, clearly demonstrating technical capability and strategic value. Enhancing Microsoft 365 security leveraging Purview, Conditional Access, MFA More ❯
Group leaders to embed best-in-class practices across industrial operations. Security Operations Maintain and oversee the cyber security framework for industrial and operational technology (OT) environments. Lead audits, vulnerability assessments, and improvement programmes to continuously strengthen our cyber security and resilience posture. Support programme initiatives to ensure secure operations across manufacturing and plant facilities. Incident Management & Response Act More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Copello
optimise, automate and improve relevant systems. The Role The Principal Security Analyst will support busy pods on more complex issues, lead and coordinate threat hunting activities, perform and lead vulnerabilityassessment activities and perform SIEM-based event analysis, incident triage and coordinate incident response activities. Furthermore, the Principal Security Analyst will actively collaborate with other analysts and enhance … IT Security Operations in large and complex organisations -Some coding ability Beneficial -Splunk -Palo Alto (XDR/XSIAM) -Skills in Forensics -Experience or interest in Reverse Engineering, Malware Analysis, Vulnerability Research -Industry recognised qualifications (eg. SANS, OSCP, ISC2) Security Clearance Eligibility for UK SC will be sought but wont be required from the start. Remote Working This role can More ❯
Office, Security Operation Centre of Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and in line with local regulations.The ideal candidate will be responsible for managing information security systems, ensuring compliance with … respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on … MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Experience with security tools and technologies such as intrusion detection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
or similar technical positions. Fundamental understanding of security threats and compromise methods. Proficiency in server, client, and network technologies. Knowledge of malware, network reconnaissance, and emerging threats. Competence in vulnerabilityassessment and remediation procedures. Strong analytical skills, logical thinking, and sound judgment. Proficiency in KQL. Familiarity with the Microsoft Defender Suite. Education/Qualifications: CompTIA Security+ or equivalent More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harrison Holgate
Administer and support Microsoft platforms and enterprise tools. Troubleshoot Windows operating systems and Microsoft applications. Support cloud-based solutions, including SaaS applications and integration technologies. Assist with cybersecurity controls, vulnerability assessments, compliance auditing, and security operations. Provide clear, non-technical explanations of IT concepts to colleagues across the business. Key Requirements 5+ years' IT experience in financial services (insurance More ❯
for a driven technology auditor who wants to play a role in audit execution which focuses on the review of technology processes, the analysis of risks involved, and the assessment of the design and operating effectiveness of the controls implemented to mitigate the risk. Audits may include the assessment of areas such as access management, IT operations, job … scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerabilityassessment and penetration testing, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology consulting or other relevant industry experience Basic understanding of software More ❯
Office, Security Operation Centre of Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and in line with local regulations.The ideal candidate will be responsible for managing information security systems, ensuring compliance with … implement, and maintain information security policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001).- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage … risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information Security, Computer Science, or a related field. More ❯
Life on the team Computacenter is growing our penetration testing capability and we are looking for an experienced penetration tester to support the delivery of vulnerabilityassessment and penetration testing services to Computacenter and our customers delivered services. As a highly skilled and motivated Penetration Tester, you will join our dynamic Cybersecurity team. In this role, you will … Conduct comprehensive penetration tests: Execute internal and external network penetration tests, web application penetration tests, mobile application penetration tests, API penetration tests, cloud security assessments, and social engineering simulations. Vulnerability identification and analysis: Research, identify, and exploit security vulnerabilities in a variety of systems and applications. Red/Purple/Blue Teaming: participate in exercises with the goal of More ❯
Uxbridge, London, United Kingdom Hybrid / WFH Options
Network IT
alignment with IT transformation goals. Lead and manage a high-performing team, responsible for wired, Wi-Fi, and remote access services. Oversee the security of the network , including compliance, vulnerability assessments, and incident response. Provide technical and strategic advice to senior stakeholders on network performance and emerging risks. Manage budgets, procurement, and vendor relationships, ensuring cost-effective service delivery. More ❯
Uxbridge, Middlesex, England, United Kingdom Hybrid / WFH Options
Network IT
alignment with IT transformation goals. Lead and manage a high-performing team, responsible for wired, Wi-Fi, and remote access services. Oversee the security of the network , including compliance, vulnerability assessments, and incident response. Provide technical and strategic advice to senior stakeholders on network performance and emerging risks. Manage budgets, procurement, and vendor relationships, ensuring cost-effective service delivery. More ❯
and Log Analytics. Creating dashboards and reports with Power BI to visualise system performance. Ensuring security and compliance with GDPR, ISO 27001, RBAC, and NSGs. Conducting security audits and vulnerability assessments using Azure Security Centre. Collaborating across engineering teams to align goals and resolve technical issues. Mentoring junior team members and promoting a culture of continuous improvement. Providing expert More ❯
legacy CRMs UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
legacy CRMs UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
CRM’s UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯