Important Skills: Knowledge of Digital Identity Verification Technologies: Understanding of techniques like biometric verification, face recognition, document verification, and multi-factor authentication. Understanding of Cybersecurity: Awareness of security threats, vulnerabilities, and best practices for protecting sensitive data. Experience with Agile Methodologies: Familiarity with Agile/SCRUM and software development lifecycle More ❯
Important Skills: Knowledge of Digital Identity Verification Technologies: Understanding of techniques like biometric verification, face recognition, document verification, and multi-factor authentication. Understanding of Cybersecurity: Awareness of security threats, vulnerabilities, and best practices for protecting sensitive data. Experience with Agile Methodologies: Familiarity with Agile/SCRUM and software development lifecycle More ❯
Build and lead a high-performing, globally distributed security team. Oversee security budgets, tooling, and third-party risk management. Required Qualifications: 10+ years in cybersecurity leadership, including 3–5 years at a senior level within a SaaS or cloud-native environment. Expert knowledge of cloud security, IAM, DevSecOps, and data More ❯
factor authentication (MFA), and entitlement management. Fraud Detection: Familiarity with fraud detection systems, including rules engines, threat modelling, and risk assessment. Knowledge of emerging cybersecurity threats and vulnerabilities, as well as industry standards like FIDO, NIST 800-63, or ISO 27001. Understanding of Agile and Scrum methodologies, including backlog management More ❯
factor authentication (MFA), and entitlement management. Fraud Detection: Familiarity with fraud detection systems, including rules engines, threat modelling, and risk assessment. Knowledge of emerging cybersecurity threats and vulnerabilities, as well as industry standards like FIDO, NIST 800-63, or ISO 27001. Understanding of Agile and Scrum methodologies, including backlog management More ❯
factor authentication (MFA), and entitlement management. Fraud Detection: Familiarity with fraud detection systems, including rules engines, threat modelling, and risk assessment. Knowledge of emerging cybersecurity threats and vulnerabilities, as well as industry standards like FIDO, NIST 800-63, or ISO 27001. Understanding of Agile and Scrum methodologies, including backlog management More ❯
responsible to provide for an integrated smart and secure solutions for Next Generation Technologies, with unique solutions focused on Cloud, Mobility, Virtualization, threat management, CyberSecurity, Data Security and Identity Access Governance for stronger control and Improved Flexibility to adapt to business demands. As a solution consultant, you would be More ❯
northampton, midlands, United Kingdom Hybrid / WFH Options
Context Recruitment
and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting and security analytics. Knowledge of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security automation and proactive cyber defense strategies. Paying up to 60k + on-call (65k total package More ❯
northampton, midlands, United Kingdom Hybrid / WFH Options
Action1
is founder-led by industry veterans Alex Vovk and Mike Walters, who founded Netwrix, which has grown into a multi-billion-dollar industry-leading cybersecurity company. Introduction: We're currently seeking a Technical Support Engineer Tier I to provide exceptional support and customer service to Action1 clients. Key responsibilities: Provide More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom Hybrid / WFH Options
Ventula Consulting Limited
and monitoring the corporate information security policy, standards, procedures, guidelines, internal controls and business continuity to ensure critical Information is protected, in alignment to CyberSecurity best practice and data protection regulation. Key Accountabilities & Responsibilities Role Accountabilities Conduct risk and vulnerability assessments to identify and mitigate security risks Represent information More ❯
in North America, EMEA, and APAC. Our teams bring extensive cross-sector knowledge in critical technology areas such as mobility, software services, robotics, simulations, cybersecurity, AI, and data analytics, enabling clients to tackle complex challenges in today's rapidly evolving markets. With a comprehensive solution portfolio across four service lines More ❯
northampton, midlands, United Kingdom Hybrid / WFH Options
VirtueTech Recruitment Group
Senior Information Security Engineer - £75,000 per annum - Fully Remote - FinTech My client are building a lean, automation-focused team and looking for a Compliance and Information Security Engineer to lead data protection, regulatory compliance, and cybersecurity. This strategic, hands More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom Hybrid / WFH Options
Interaction - Letchworth
growing team. This role is ideal for someone with experience in selling a broad portfolio of IT services, including Audio Visual solutions, Cloud infrastructure, Cybersecurity, Fractional IT services, Networking, Software Licensing, and more. You will be responsible for identifying new business opportunities, nurturing client relationships, and driving end-to-end … tailored IT solutions · Present and sell a wide range of offerings including: o Audio Visual (AV) solutions o Cloud services (migration, hosting, infrastructure) o Cybersecurity services and products o Fractional IT/Managed IT services o Networking solutions (LAN/WAN, wireless, security) o Software licensing and enterprise software solutions … years of experience in B2B IT sales, preferably across multiple solution areas · Proven success in meeting or exceeding sales targets · Understanding of IT infrastructure, cybersecurity, cloud computing, and managed services · Excellent communication, presentation, and negotiation skills · Self-driven with the ability to manage multiple accounts and priorities · Experience using CRM More ❯