improvement for ISO-27001 and Cyber Essentials compliance. Ensure adherence to security standards, policies, and procedures, including external audits. Key Technologies: Strong knowledge of M365 security tools (Defender, Azure) VulnerabilityManagement, Web Filtering, DLP, Cloudflare, Firewalls, VPN, PKI, DNS, Email Gateways, Security Audits, ISO27001, Azure DevOps, Mitre Attack Framework, ITIL, Microsoft OS, Exchange Online To succeed, you should More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Acumin
role, you will gather, analyze, and enrich data to produce governance scorecards and reports spanning key cybersecurity areas such as Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM), and Threat and VulnerabilityManagement (TVM). Your insights will inform senior leadership, regulatory More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Familiarity with security frameworks such as NIST, IEC62443, NIS Regulations, CAF, or SoGP. Understanding of threat intelligence, attack surfaces, and cyber kill chains relevant to OT. Proven experience in vulnerabilitymanagement and incident response in OT contexts. Ability to manage stakeholder relationships and communicate technical risks effectively. A proactive approach to problem-solving and strong attention to detail. More ❯
major incidents to determine the affected/vulnerable systems, affected/vulnerable users Identify any business areas impacted and coordinate communications with all relevant stakeholders as per Major Incident Management process. Coordinate the remediation and containment activities as advised by either the NTT DATA SOC or Incident Response Team. Oversee, support, and manage through to completion the investigative and … Manager in review of any service delivery processes and workflows, identifying areas for optimization and implementing best practices. Co-ordinate the running and reporting of a risk-based vulnerabilities management including: Scanning systems, networks, and applications to detect potential security weaknesses. Prioritize vulnerabilities based on their risk level, potential impact, and the criticality of the affected assets, ensuring that … challenging projects and a work environment that supports the creation of tangible solutions that make an impact. You will need to have a broad experience of security service delivery management and have evidence of experience in a number of the following fields of expertise: At least 10 years of experience in providing technical support and advice for a Security More ❯
ensuring the highest standards of performance, scalability and security are maintained. A research infrastructure technical expert with deep understanding of high-performance compute (HPC) and research data storage and management, the postholder will be responsible for specifying, deploying and maintaining related services. These services are research-driven and the postholder will establish close collaborative relationships with PIs to understand … Information Services/IT Services to ensure the security and resilience of RCaaS research computing infrastructure services underpinned by the development of a suitable quality assurance approach including sufficient management processes and audit controls. 5. Establish and maintain metrics and produce concise reporting that demonstrates performance and utilisation of RCaaS research computing infrastructure services, working with relevant University finance … PIs, research managers and College and University IT professionals to identify complex research computing infrastructure requirements and ensure needs are reflected in plans and implemented services. 11. Provide line management for RCaaS research computing infrastructure staff including responsibility for performance and development, managing workload and recruiting staff where necessary. 12. Perform such other duties, appropriate to the grade, as More ❯
Aberdeen, Aberdeenshire, Scotland, United Kingdom Hybrid / WFH Options
Reed
by developing and implementing robust security policies and procedures. Continuously assess the organisation’s IT security posture, identifying risks and designing secure, scalable solutions across systems and services. Support vulnerabilitymanagement efforts, monitor for threats, and coordinate effective responses to security incidents and breaches. Work closely with internal IT, engineering, and business teams, as well as external partners More ❯
in ensuring the security and integrity of the infrastructure, which includes the data centers, cloud environments, networks, and office/branch assets. This is an exciting opportunity to lead vulnerability assessments, drive remediation efforts, and enforce secure builds and configurations across our estate. Key Responsibilities: Lead the implementation of Infrastructure & Cloud security strategies, policies, controls, services, metrics, and compliance. … Oversee and support vulnerabilitymanagement efforts across both on-premise and cloud environments. Contribute to the strategy, policy, controls, services, and metrics related to network security, including WAF, DDoS protection, and firewalls. Experience & Skills: Primary Expertise: Vulnerabilitymanagement within infrastructure environments, with proven experience leading teams. Secondary Expertise: Knowledge and experience in network security, including firewalls More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Reed
risks and mitigation strategies. Plan and carry out security audits, tracking follow-up actions. Report on risk and compliance issues within set timelines. Help coordinate third-party penetration/vulnerability testing and follow up on findings. Perform internal security testing of web apps and infrastructure. Support staff with security awareness training and track completion. Respond to security incidents effectively. … Requirements: Proven experience in multiple cybersecurity areas: risk, compliance, vulnerability, and incident management. Solid understanding of InfoSec standards and practices, especially ISO27001. Good grasp of IT systems and architecture, with the ability to liaise effectively with technical teams. Excellent documentation, analytical, and presentation abilities. Self-motivated and able to work independently. Ideally holding certifications such as CompTIA Security+, CEH … or ISO27001 Lead Implementer. Experience engaging with senior management and building strong relationships. Hands-on experience managing security incidents. Familiarity with penetration testing and vulnerabilitymanagement tools. Benefits: Salary up to £50.000/annum, depending on experience. Excellent range of additional benefits. Hybrid working (2 days per week, on-site in Edinburgh). More ❯
You'll act as a subject matter expert in a Cloud security related field, building security early into design and supporting the continuous development of a sustainable, robust Cloud vulnerabilitymanagement programme You'll be joining an exciting and fast-paced area of the bank, where you can expect great exposure both for you and your work What … area of specialism. You'll also be: Making sure that decisions made are based on robust data, return on investment and value measures that demonstrate thoughtful and intelligent cost management Encouraging the identification of ideas and driving the delivery of initiatives that will reduce cost and simplify the bank Building and leveraging relationships with colleagues across the bank and More ❯