effectively across teams. What you'll do: Develop and implement proactive security strategies, policies, and procedures to protect our systems, networks, and data assets. Lead regular security assessments, including vulnerability scans and penetration tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents … the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerabilityassessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong … capability in risk assessment, vulnerability management, and data informed decision -making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in scripting and programming (i.e. More ❯
L33, Knowsley, Merseyside, United Kingdom Hybrid / WFH Options
Curveball Solutions
business objectives. Drafting, maintaining and implementing information security policies and Standard Operating Procedures (SOPs). Configuring and overseeing mobile security—MDM (MAM/BYOD)—to protect business continuity. Leading vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Authoring compelling tender responses, clearly demonstrating technical capability and strategic value. Enhancing Microsoft 365 security leveraging Purview, Conditional Access, MFA More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Curveball Solutions
evolving business objectives. Drafting, maintaining and implementing information security policies and Standard Operating Procedures (SOPs). Configuring and overseeing mobile securityMDM (MAM/BYOD)to protect business continuity. Leading vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Authoring compelling tender responses, clearly demonstrating technical capability and strategic value. Enhancing Microsoft 365 security leveraging Purview, Conditional Access, MFA More ❯
and Log Analytics. Creating dashboards and reports with Power BI to visualise system performance. Ensuring security and compliance with GDPR, ISO 27001, RBAC, and NSGs. Conducting security audits and vulnerability assessments using Azure Security Centre. Collaborating across engineering teams to align goals and resolve technical issues. Mentoring junior team members and promoting a culture of continuous improvement. Providing expert More ❯
legacy CRMs UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
legacy CRMs UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
CRM’s UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
legacy CRMs UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
as Active Directory, DNS, DHCP, and email systems Support employee workstations, software provisioning, and user permissions Document infrastructure configurations, processes, and changes Assist in 3rd party IT audits and vulnerability assessments Provide out-of-hour support as needed and last line technical support for the customer support team Skills and experience 3-5 years of experience in IT infrastructure More ❯
Warrington, Cheshire, North West, United Kingdom Hybrid / WFH Options
Oscar Associates (UK) Limited
security, and consultancy. They focus on proactive system health checks, monitoring, and intervention to ensure smooth business operations. Additionally, their IT security services help protect data and networks through vulnerability assessments, risk mitigation, and business continuity planning Apply now! Or email your CV to Referrals: If this role is not right for you, do you know someone that might More ❯
Wall, Hexham, Northumberland, England, United Kingdom Hybrid / WFH Options
Goodman Masson
and information. You’ll work closely with the IT Security Manager to monitor networks, respond to incidents, and enhance cyber resilience across the organisation. The role also includes conducting vulnerability assessments, supporting audits, and helping to strengthen third-party security compliance. Key Responsibilities: Monitor security systems and investigate incidents Operate firewalls, EDR, SIEM tools, and encryption software Support vulnerabilityMore ❯
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: Lead the development and delivery of threat intelligence and … vulnerability products. Select and profile key threat actors posing the greatest risk to the client's estate. Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. Provide in-depth contextual threat analysis, including actor capability and intent. Maintain and improve internal documentation and … reporting processes. Lead, mentor, and support a multidisciplinary team of cyber analysts. Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: 5+ years of experience in Threat Intelligence, Vulnerability Management, or cyber research. Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. Experience in More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
Anson Mccade
cloud-hosted environments against sophisticated nation-state actors and advanced cyber adversaries. As Threat Intelligence Lead, you will be responsible for managing the production of actionable threat intelligence and vulnerability assessments, ensuring high-quality outputs that directly inform security operations and strategic defence decisions. Responsibilities of the Threat Intelligence Lead: Lead the development and delivery of threat intelligence and … vulnerability products. Select and profile key threat actors posing the greatest risk to the client's estate. Own the continuous development of Priority Intelligence Requirements (PIRs) and the associated collection plan. Ensure timely delivery of daily, weekly, and ad hoc intelligence reporting. Provide in-depth contextual threat analysis, including actor capability and intent. Maintain and improve internal documentation and … reporting processes. Lead, mentor, and support a multidisciplinary team of cyber analysts. Identify and implement improvements to mature threat intelligence and vulnerability functions. Requirements of the Threat Intelligence Lead: 5+ years of experience in Threat Intelligence, Vulnerability Management, or cyber research. Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. Experience in More ❯
ensuring mitigation plans are in place. · Support the development and maintenance of security policies and standards. · Assist with third-party security reviews and supplier risk management. · Provide oversight of vulnerability assessments. · Conduct architecture reviews for new systems and services. · Evaluate technical controls and recommend improvements. · Support the rollout of new security tools and technologies. · Provide input into incident management … and security metrics reporting. About You: · 2+ years' experience in an security role. · Strong understanding of risk assessment methodologies. · Knowledge of frameworks such as ISO 27001. · Experience with vulnerability management and technical controls. · Excellent problem-solving skills with strong attention to detail. · Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is more More ❯
ensuring mitigation plans are in place.· Support the development and maintenance of security policies and standards.· Assist with third-party security reviews and supplier risk management.· Provide oversight of vulnerability assessments.· Conduct architecture reviews for new systems and services.· Evaluate technical controls and recommend improvements.· Support the rollout of new security tools and technologies.· Provide input into incident management … and security metrics reporting. About You: · 2+ years' experience in an security role.· Strong understanding of risk assessment methodologies.· Knowledge of frameworks such as ISO 27001.· Experience with vulnerability management and technical controls.· Excellent problem-solving skills with strong attention to detail.· Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is more More ❯