Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Thames Water offices as required Working More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerabilitymanagement, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. VulnerabilityManagement Collaboration: Work closely with the vulnerabilitymanagement team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth … compliance with GDPR, NIS, ISO 27001, and document threat intelligence processes and outputs. Strategic Capability Growth: Contribute to long-term improvement of threat and vulnerabilitymanagement (TVM) capabilities and the broader cyber security roadmap. Base Location: Hybrid - Flexible working with travel to Reading offices as required - 2 days More ❯
Buckinghamshire, England, United Kingdom Hybrid / WFH Options
identifi Global Resources
ll thrive in a change-oriented environment, stay ahead of emerging threats through horizon scanning, and push for continuous improvement across key areas like vulnerabilitymanagement, incident response, and SOC assurance. If you don't settle for second best and are passionate about embedding a culture of excellence … is your opportunity to make a meaningful impact. Key Responsibilities Security Operations Oversight: Lead day-to-day security operations including monitoring, threat analysis, and vulnerability management. Provide updates to the Head of Information Security and Executive Security Steering Group. Drive Key Improvements: Lead strategic efforts to enhance vulnerabilitymanagement confidence, improve incident response capability, and increase assurance around SOC operations. Change Leadership: Actively contribute to the implementation of the new Security TOM, championing change, innovation, and security best practice. Risk & Compliance: Collaborate with Privacy, Risk, and Audit teams to ensure compliance with regulatory requirements and internal More ❯
a challenging, vastly interesting, and technically diverse role. Key Responsibilities and Tasks Leading shifts throughout 24/7 SOC Service Delivery Providing oversight and management to Junior Analysts Monitoring of Systems for Security Alerts, Intrusions or activity considered to be unauthorised, unexpected or illegal Responding to incidents, utilising a … incidents to Tier 2 Incident Response Teams Review and develop existing security controls in line with a constantly growing technical environment Triage and Review Vulnerability Scanning Reports, feeding results back into technical teams Review Secure Configurations, feeding back into technical teams for remediations of issues Generate recurring service and … develop understanding of security as a discipline Experience (Essential) Previous experience in Security, SOC or related technical field with desired, specific focus on Incident ManagementVulnerabilityManagement Relevant qualification(s) in Cyber Security, or other related technical roles Examples Degree in Cyber Security, Computer Science, Networks etc. More ❯
We have an exciting new role for a proactive and technically capable Security Vulnerability Lead to join our VulnerabilityManagement team on a 1-year fixed-term contract to cover maternity leave. We are seeking a candidate with experience in a similar security vulnerability-focused role … engagement with business units, ensuring a robust security posture for high-value assets. The role requires strong organizational skills and a solid understanding of vulnerabilitymanagement practices, with the ability to communicate effectively with both technical and non-technical stakeholders. Who we are Virgin Media O2 is the … and inclusion into everything we do, supporting you to be your authentic self throughout your application journey. The must-haves Proven experience in a vulnerabilitymanagement-focused role Strong organizational and prioritization skills, especially in fast-paced, high-risk IT/security environments Ability to interpret technical vulnerabilityMore ❯
someone with broad security expertise who enjoys variety and continual development. You’ll take the lead on: First and second line security operations, including vulnerabilitymanagement Investigating and responding to security incidents Ensuring policies and procedures remain aligned to industry best practice Providing assurance that security controls are … Key skills for the Senior Information Security Analyst: Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerabilitymanagement, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid More ❯
working with the Ministry of Defence (MOD). The ideal candidate must possess DV Clearance and have a deep understanding of secure systems, risk management, and cyber security best practices within a defence environment. RESPONSIBILITIES Provide technical cyber security consultancy to public and private sector clients. Perform security assessments … penetration testing, and vulnerabilitymanagement to protect critical systems. Design, implement, and maintain security architectures and frameworks aligned with government standards. Lead and support risk assessments, threat modelling, and incident response initiatives. Work closely with stakeholders to ensure compliance with NCSC and other relevant security policies. Develop and … Ministry of Defence. Strong technical expertise in areas such as network security, endpoint security, cloud security, and secure system architecture. Experience in penetration testing, vulnerabilitymanagement, and cyber threat intelligence. Solid knowledge of security technologies such as SIEM, IDS/IPS, firewalls, and endpoint detection and response (EDR More ❯
SOC) , with one analyst reporting to you Oversee incident response , manage security incidents from detection to resolution Work closely with the compliance manager on vulnerabilitymanagement Architect secure solutions, validate baseline configurations, and recommend improvements to stay compliant Collaborate with key stakeholders including Compliance and Infrastructure teams Required … network security and firewalls Exposure to PenTesting methodologies or practices (desirable) Experience with NAC solutions like Cisco ISE , ForeScout , or similar Strong grasp of vulnerabilitymanagement processes Desired Certifications Microsoft Security certifications (preferred) CISM or CISSP (beneficial, not essential) Apply now or reach out for a confidential chat More ❯
Risk related activities which arise based on the needs of the business unit or broader Technology Risk and Information Security organization Assist regulatory exam management related to Technology Risk and Information Security Assess the needs of the Business Unit to ensure sufficient understanding of Operational Risk Management and … communication, early engagement in new products and projects, regulatory engagement, information security and technology risk consultation. Minimum Qualifications: 5+ years' experience in operational risk management (e.g., within Risk and/or Internal Audit function) with strong understanding of critical operational risk management lifecycle activities Excellent project management … and evaluate risk scenarios effectively Experience in Information Security Risk and Technology Audit. Relevant Experience and Skills: Information Security, Operational Risk or Technology Risk Management leadership experience Experience working with Regulators and in complex regulated businesses is an asset Broad understanding of information security disciplines with emphasis on vulnerabilityMore ❯
for a Security Architect, min requirement is to be BPSS cleared and happy to go through Security Clearance. We need someone with experience of VulnerabilityManagement solutions such as Tenable or Qualys with a strong knowledge of network security solutions, ITIL and Service Management all within a … Experience: Strong background in IT Security design, ability to look over blueprints and make suggested technical changes to meet business needs. Strong background in vulnerabilitymanagement with strong Tenalbe or Qualys. Happy to go through security clearance, with current BPSS (Baseline Personnel Security Standard) a minimum. Strong knowledge More ❯
established playbooks Escalating complex incidents to Tier 2 Incident Response Teams Reviewing and developing security controls in a growing technical environment Triaging and reviewing vulnerability scanning reports, providing feedback to technical teams Reviewing secure configurations and feeding back for remediations Generating recurring security reports for stakeholders Providing feedback for … a degree in Cyber Security, Computer Science, Networks, etc. Professional qualifications from organizations like CompTIA, ISACA, etc. Technical qualifications such as cloud computing, SIEM, vulnerabilitymanagement, etc. Experience (Nice to have) Understanding of concepts like cloud computing, incident management, risk management, information security (CIA), phishing, ransomware … and skilled IT professionals, committed to digital innovation. We excel in areas like Secure-by-Design, cloud computing, network design, rapid application development, cyber vulnerability mitigation, and intelligence systems. We offer independent consultancy and champion open-source technologies. A word on UK Security Clearance Due to the secure nature More ❯
of best-in-class security operations across the business. 🔍 Microsoft Security Engineer Key Responsibilities: Oversee the end-to-end security monitoring process, including log management, threat detection, and response using tools like Microsoft Sentinel . Drive vulnerabilitymanagement efforts and support remediation in collaboration with IT teams. … and external partners as needed. Maintain and continuously improve security controls across Microsoft Defender, Azure, Intune, and Purview. Design and implement identity and access management solutions with a security-first mindset. Support compliance initiatives across ISO 27001, Cyber Essentials, GDPR, and DPA. Align system configurations (Windows, Linux, network) with More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits. Gap Assessments: Facilitate and/or conduct internal … Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security … the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. VulnerabilityManagement: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong More ❯
across various platforms. The consultant will play a critical role in evaluating and strengthening our clients' cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with … develop, document, and implement security policies, standards, and guidelines aligned with industry standards (e.g., ISO 27001, NIST). Assist in the deployment, configuration, and management of security infrastructure and technologies, including firewalls, intrusion detection/prevention systems, and secure network architectures. Provide guidance and support on Azure security practices … including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerabilitymanagement, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit More ❯
tailored for experienced professionals with a strong track record in delivering complex cybersecurity projects. This role demands in-depth expertise in threat intelligence, risk management, incident response, compliance, and security architecture. The consultant will lead project teams, shape technical strategies, and mentor junior team members while working cross-functionally … collaboration. Business Development Support Contribute to business development efforts by supporting proposal creation, presentations, and identifying areas for growth in cyber resilience services. Knowledge Management Promote and contribute to the creation of reusable assets, documentation, and best practices to strengthen the knowledge base within the cyber resilience practice. Required … Skills & Qualifications Technical Expertise Deep understanding of threat intelligence, risk management, incident response, compliance (e.g., GDPR, ISO 27001), and security architecture. Experience with a range of security technologies including: SIEM (e.g., Rapid7 InsightIDR) XDR (e.g., SentinelOne) Firewalls (e.g., Fortinet) VulnerabilityManagement (e.g., Rapid7 InsightVM) PAM (e.g., Delinea More ❯
Maidstone, England, United Kingdom Hybrid / WFH Options
Tiger Resourcing Group
of hands-on technical skills and strategic thinking. 🔧 What You'll Be Doing: Support and improve day-to-day security operations, incident response, and vulnerability management. Lead on security investigations and ensure remediation is aligned with industry best practices. Conduct risk assessments and provide security consultancy for technical projects More ❯
companies that are Britain's economic engine - ambitious, entrepreneurially-spirited and high growth businesses that fuel the economy - and directly advise the owners and management teams that lead them. We'll broaden your horizons To ensure our services and applications are fit for the modern market, our IT team … join our team. You will have a strong background in software development, security, and operations. This role is required to support the Digital Product Management team in embedding security requirements and best practices into new Digital Products and Services. You will work closely with the Digital Product Management … etc. Collaborate with development teams to integrate security best practices into the secure software development lifecycle (SDLC) and ensure products are built securely Oversee vulnerabilitymanagement and remediation efforts, including leading responses to pen test findings and security assessments Experience conducting risk assessments and threat modelling for software More ❯
procedures Work collaboratively with cross-functional teams to align IT operations with business needs and objectives Ensure IT security best practices, performing risk assessments, vulnerabilitymanagement, and maintaining compliance with frameworks such as ISO 27001, NIST & CIS. Contribute to IT infrastructure projects, ensuring on-time delivery, documentation, and … VLANs, routing protocols VPNs, zero-trust and firewall administration Proficient cloud experience with AWS and/or Azure, including networking, security, IaaS and performance management Strong communication skills, capable of translating technical concepts to non-technical audiences Experience in team leadership or technical mentoring, supporting the development of junior … automation and Infrastructure as Code (IaC) tools such as Terraform, Ansible, or Salt Strong scripting skills (e.g. PowerShell, Bash, Python) for automation and system management Knowledge of virtualization and containerization technologies, including Hyper-V, Docker and Kubernetes (K8s) Experience with Microsoft Defender and Microsoft Purview for threat protection, security More ❯
Farnborough, Hampshire, United Kingdom Hybrid / WFH Options
Thebusinessyear
expertise and strategic planning to prevent attacks and vulnerabilities. Your responsibilities include planning and implementing security controls to safeguard information. Key functions/outputs: Vulnerability Scanning & Reporting Change Work Participation in Regular Meetings Documentation Main Objectives: Vulnerability Scanning & Reporting Conduct regular vulnerability scans, generate reports, and ensure … tools are current to identify system weaknesses. Perform code scans, vulnerabilitymanagement scans, and assist in reporting to the cyber security team. Update endpoint protection, ensure antivirus and anti-malware are current, and audit network controls and access permissions. Recognize and respond to potential incidents, including containment and … SITT and perform security testing and assurance activities during planning phases. Participation in Regular Meetings: Lead or attend meetings such as Security Working Groups, Vulnerability Triage, Security Workshops, PI Planning, and Daily Standups, providing cybersecurity input. Documentation: Create and maintain detailed security documentation including design documents, SOPs, and compliance More ❯
Portsmouth, Hampshire, United Kingdom Hybrid / WFH Options
G2 Ops, Inc
plus benefits Openings: 2 Full-Time Roles Knowledge Requirements: Understanding of C4ISR architectures and information-assurance principles Familiarity with DoD Risk Management Framework (RMF) and accreditation processes Experience with system and network security analysis on NIPRNet, SIPRNet, etc. Knowledge of DoD 8570.01-M IAT requirements Proficiency with cybersecurity tools … a motivated, team-oriented Information Systems Security Engineer to work on cybersecurity governance, risk, and compliance, supporting DoD projects involving security controls, risk assessments, vulnerabilitymanagement, cloud security, policy development, and system analysis. Must have or be eligible for a DoD Secret clearance and IA Technical II certification More ❯
Information Security Analyst working as part of a central team supporting a mixture of security operations ensuring compliance with business needs. This will involve vulnerabilitymanagement, making sure security controls are functioning, mentorship of more junior members and working as part of a 24 x 7 remote support More ❯
Information Security Analyst working as part of a central team supporting a mixture of security operations ensuring compliance with business needs. This will involve vulnerabilitymanagement, making sure security controls are functioning, mentorship of more junior members and working as part of a 24 x 7 remote support More ❯
of best-in-class security operations across the business. Microsoft Security Engineer Key Responsibilities: Oversee the end-to-end security monitoring process, including log management, threat detection, and response using tools like Microsoft Sentinel . Drive vulnerabilitymanagement efforts and support remediation in collaboration with IT teams. More ❯