of application patching schedules for the client estate Keeping up to date with and leveraging the latest Microsoft technologies into our policy and systems management Manage end user system builds, images and remote deployment and asset management toolsets Support and maintain telephony systems and other corporate IT services … a wide breadth and depth of desktop and hardware support experience in a similar technical role. You will have a robust background in the management and provision of Microsoft Windows clients and end user systems, with experience in Microsoft 365 and Exchange Online tenant administration. 1st/2nd line … things through, end to end, including the investigation of possible solutions, documenting processes and contributing to the success of the team. Desirable: Mobile Device Management experience using Intune/Endpoint Manager Foundation certification or knowledge of the ITIL framework Experience in management/support of telecoms systems Microsoft More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Duel
Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerability scanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development process. Assist in securing … to security compliance frameworks such as ISO 27001 or SOC 2, even if not previously responsible for certification processes. Experience working within security risk management, vulnerability tracking, or operational security efforts. Prior experience working with engineering teams on security topics is beneficial, particularly around secure development practices. Ability … or Vanta. Experience working with pen testing and bug bounties a plus. Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerabilitymanagement solutions. Experience or knowledge of cloud security (AWS, GCP, or Azure). Awareness of security best practices in application and infrastructure security. More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
Benefact Group plc
solutions that align with security and project requirements by articulating the real-world cyber security risks associated. You will also be responsible for our VulnerabilityManagement program ensuring that agreed SLAs are achieved and provide consultation when solutions are not straight forward. As the Senior Cyber Security Consultant … matter expertise for internal projects and stakeholders, identifying risks and advising on the correct approach to mitigate those risks You will have responsibility for VulnerabilityManagement managing outputs from internal tooling and external vendors in order to prioritise remediation by relevant internal parties in order to ensure the … inclusive, supportive and engaged learning environment, being a key contributor to a high performing and professional Security Team. Knowledge, skills and experience Strong stakeholder management skills A strong understanding of enterprise ICT and security principles A strong understanding of cloud security concepts and technologies Understanding of the CI/ More ❯
Our client seeks a IP Network Engineer to join their team. Role Profile: To be responsible for the engineering provision, development, management, and maintenance of the IP & MPLS networks, Corporate LAN, broadband RADIUS & BNGs, DDoS protection and related systems and platforms. To propose and develop appropriate operational, maintenance and … testing and implementation of enhancements and new technologies for IP & MPLS networks Implement and evaluate IP & MPLS related solutions/technologies Liaise with Product Management, Service Management and other internal teams as required Assist the management team, as required, with the preparation of performance, growth, and budgeting … strategy is implemented. If/when potential weaknesses, attacks, intrusions, unusual, unauthorised or illegal activity are identified, assist in the implementation of mitigations, including vulnerabilitymanagement Investigate security alerts and provide incident response within the IP domain Support as required, from within the IP domain, integration with the More ❯
of modern technology meeting HMRC's business driven need towards rationalised strategic platforms. In addition, you may be encouraged to undertake line management responsibilities developing and managing a team.?? You may be expected to own and develop CSTS capabilities and/or services. Focused expertise to develop and lead within one or many security technology domains aligning capability to security tooling. Key stakeholder management experience across senior business and technical environments including vendors, partners and other government departments. Able to demonstrate a proven history of delivering … Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors More ❯
frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • VulnerabilityManagement and More ❯
to market' propositions and service offerings. Leading in the development and presentation of compelling client proposals collaborating with teams across our business. Strong stakeholder management and relationship building skills at senior levels that will enable consensus building in the shaping of secure client solutions Shaping, leading and delivering value … engagements. Providing security expertise across security standards and accreditations, measure and control the effectiveness of the security controls framework and maintain the Information Security Management System. Deriving and delivering documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies. Standards and … identification of identified risks and emerging cyber security vulnerabilities and threats. The subsequent analysis to quantify and lead risk mitigation plans Work with Service Management to ensure that partners and suppliers adhere to agreed standards, policies and verify/evidence appropriate compliance and security KPIs Work closely with 1st More ❯
South West London, London, United Kingdom Hybrid / WFH Options
La Fosse
environment as well as experience in firewall upgrades, network upgrades and wifi upgrades. This role will also manage a couple of junior engineers (no management experience necessary). The role is based in Westminster with 1-2 days working from home. Further detail: To configure, maintain, secure & develop the … models for membership services, commercial activities, Events & Charity. To provide technical infrastructure support of all server, cloud, security and networking platforms. Maintain effective data management, backup and DR capabilities, and provide elevated support assistance to helpdesk where needed, both within local offices and remote sites to enable all users … daily job functions to the optimum level. To manage the MIS Servicedesk. Responsible for the configuration and maintenance of the group helpdesk ticketing platform. Management of ticket lifecycles, technician work load balancing and reporting. IT Infrastructure Management : Oversee the smooth operation of the Group IT infrastructure, ensuring stability More ❯
Stroud, England, United Kingdom Hybrid / WFH Options
Ecotricity
Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Linux Operating Systems On-Premise Active Directory Networking - Cisco/Fortigate Penetration Testing & VulnerabilityManagement Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate for this … be working towards a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (ie. NIST or Cyber Security Essentials). Knowledge of vulnerability databases (ie. NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tooling. Experience using Code Security scanning More ❯
systems. • Regular testing of Disaster Recovery processes and updating procedures. • Periodic password and physical access audits. • Able to work to strict project deadlines. • Asset Management of OT systems including spare stock and liaising with 3rd party vendors. • Comply with company IT standards and Cyber Security guidelines. • To regularly review … supporting VMware ESXi. • Experience of Veeam and Backup Exec/restore solutions. • Experience of Win OS 10/11 & MS Office 365. • Experience of Vulnerabilitymanagement/patch management in an Offline Environment. • Experience of Local Area Networking infrastructure, including Firewalls, Telecomms, TCP/IP. • Experience off … IEC 62443. • Knowledge of OSI/AVEVA PI Architecture • Understanding of DCOM. • Ability to work with minimal supervision, but able to communicate with line management on a regular basis. Benefits: At Perenco we value and reward our people, offering competitive salaries and a wide range of benefits including: • Life More ❯
Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Frontier Resourcing
by embedding robust security controls throughout the development lifecycle, identifying and mitigating risks, and ensuring compliance with defence-grade standards. Key Responsibilities Risk Assessments & VulnerabilityManagement Conduct comprehensive security risk assessments at each product phase (design, implementation, deployment). Identify vulnerabilities in architectures, codebases, and configurations; drive remediation …/53, JSP 440/604, Def Stan 05-series). Lead the creation and maintenance of security documentation (RMADS, Security Assurance Documents, Security Management Plans). Testing & Assurance Design and execute penetration tests and automated vulnerability scans; validate fixes. Oversee third-party security assessments as required. Continuous … across teams. Qualifications & Experience Proven experience (5+ years) in product or application security within defence, government, or security-cleared environments. Deep knowledge of risk management frameworks (ISO 27001/2/5/31000, NIST 800-series) and Defence Standards (JSPs, Def Stan 05-138/139). Hands More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Frontier Resourcing Ltd
by embedding robust security controls throughout the development lifecycle, identifying and mitigating risks, and ensuring compliance with defence-grade standards. Key Responsibilities Risk Assessments & VulnerabilityManagement Conduct comprehensive security risk assessments at each product phase (design, implementation, deployment). Identify vulnerabilities in architectures, codebases, and configurations; drive remediation …/53, JSP 440/604, Def Stan 05-series). Lead the creation and maintenance of security documentation (RMADS, Security Assurance Documents, Security Management Plans). Testing & Assurance Design and execute penetration tests and automated vulnerability scans; validate fixes. Oversee third-party security assessments as required. Continuous … across teams. Qualifications & Experience Proven experience (5+ years) in product or application security within defence, government, or security-cleared environments. Deep knowledge of risk management frameworks (ISO 27001/2/5/31000, NIST 800-series) and Defence Standards (JSPs, Def Stan 05-138/139). Hands More ❯
equivalent + 6-7 years in InfoSec Experience maturing security programs & frameworks ( ISO27001, NIST CAF, OWASP ) Strong knowledge of SIEM, IDS/IPS, RBAC, vulnerabilitymanagement Understanding of cloud, COTS/SaaS platforms & IoT security Ability to communicate risks & strategies at executive level Full driving license & personal transport More ❯
Key Requirements: Previous experience in a SOC Analyst or similar cybersecurity role Strong expertise in Splunk or similar SIEM tools Familiarity with Flexera for vulnerabilitymanagement Understanding of firewalls, network protocols, intrusion detection/prevention systems Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous Must be eligible for Developed More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
e.g., AWS Shield, Security Hub, IAM). Knowledge of security frameworks such as ISO 27001, NIST, or CIS benchmarks. Experience in application security reviews, vulnerabilitymanagement, and security controls implementation. Familiarity with OWASP Top 10, CWE, and secure coding practices. Proficiency in using security tools such as static More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
implementing, and maintaining IAM solutions, including system integration. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Support monitoring and analysis of access management systems, including issue resolution. Participate in IAM audits and compliance activities. Document IAM processes and … collaborative. We appreciate those willing to challenge the status quo to help us improve. We support growth and learning, offering training in Cloud Security, VulnerabilityManagement, Agile Security, and more. Relevant knowledge & experience can be demonstrated through qualifications and work history, such as: Certifications in IAM technologies like More ❯
On-Prem Infrastructure – Experience with Windows Server setup, Active Directory, VMWare (or similar), VEEAM (or equivalent) backups, and infrastructure monitoring. Additional Tools – Familiarity with vulnerabilitymanagement, SIEM, PowerShell scripting, and Infrastructure as Code (Terraform/Ansible preferred). The Package: Base salary: up to £60,000 24 days More ❯
West London, Marylebone High Street, Greater London, United Kingdom Hybrid / WFH Options
Ashdown Group
the wider business on ISO27001 and Cyber Essentials - Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Deploy SIEM - Support ongoing improvements to internal defence - Oversee policies and procedures - Support data protection initiatives - Security projects - Develop disaster recovery plans - Establish and … improve vulnerabilitymanagement To be considered suitable you will need the following skills and experience: - Experience in either a Cyber Analyst or Cyber Engineer role - Knowledge on SIEM and EDR tools - Experience in network audits and penetration testing - Infrastructure support experience - Knowledge on security frameworks More ❯
development lifecycle—from inception to retirement. Expertise in automation tools and processes for streamlined deployment and operations. Strong knowledge of security best practices and vulnerability management. Proficiency in a variety of coding languages and scripting techniques. A proactive, problem-solving mindset with a focus on continuous learning and improvement. … Charts, Python, PowerShell, REST APIs. Kubernetes: Experience building and managing Kubernetes clusters and application delivery. Applications: Familiarity with Apache NiFi, Elastic ECK, Artifactory. Secret Management: Expertise in using HashiCorp Vault. Operating Systems: Solid experience with Red Hat and Windows environments. Apply today via the link provided More ❯