slough, south east england, united kingdom Hybrid / WFH Options
NCC Group
Role: OperationalTechnology Project Manager Location: London, Cheltenham, Manchester – Hybrid Thanks for checking out our job opening; we are excited that YOU are interested in learning more about NCC Group. We are on a mission to make society a safer and more secure place. Our people are the … The Opportunity: As a Project Manager in NCC Group's Project and Programme Management function, the primary responsibility will be to support our Global OT Consulting and Implementation (C&I) division, your role will be pivotal in providing project management to our clients. NCC Group provides end-to-end Cyber … contact for clients throughout the project lifecycle, ensuring clear communication, managing expectations, and fostering strong relationships. Leading end-to-end project management for client OT initiatives, including project planning, scope definition, resource allocation, risk management, and stakeholder communication. Co-ordinating client site visits in engineering facilities Providing regular updates to More ❯
This is an excellent opportunity for OT Cyber Security professionals to be part of leading-edge technology projects. Cognizant’s Cloud, Infrastructure & Security Services Practice provides end-to-end solutions covering architecture, design, implementation, management, and on-going support across the entire enterprise technology infrastructure. Our services include … and devices. Configure and manage Palo Alto Networks Next-Generation Firewalls (NGFW) to enforce micro-segmentation policies. Leverage Palo Alto Networks’ capabilities to identify OT (OperationalTechnology) protocols and communications, establish device inventories, and prioritize assets for security measures. Apply security principles specifically to OT environments, understanding the … unique challenges of industrial control systems. Continuously assess OT devices and applications for security posture, identifying vulnerabilities and potential threats. Collaborate with OT stakeholders to identify needs and implement suitable security measures. Configure, manage, and monitor security policies within Strata Cloud Manager. Utilize Strata’s IoT Security features for device More ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯
oxford district, south east england, United Kingdom
Americold Logistics, LLC
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯
including Security Operations Centers (SOC), Endpoint Detection and Response (EDR), Governance, Risk & Compliance (GRC), network security (including firewalls), cloud security, OperationalTechnology (OT) security, and data security (encryption, DLP, key management). Revenue Generation & Customer Relationship Management: Develop and execute strategic sales plans to achieve revenue targets and … Expertise: Deep understanding and practical experience across a broad spectrum of cybersecurity domains: SOC, EDR, GRC, network security (firewalls), cloud security (AWS, Azure, GCP), OT security, and data security (encryption, DLP, key management). RFP Leadership: Proven ability to successfully lead, manage, and influence complex RFP processes, resulting in successful … influence, and collaborate effectively across diverse, cross-functional teams. Seniority: Experience operating at a Senior Manager level or equivalent within a reputable cybersecurity or technology company. Travel: Willingness and ability to travel frequently across the UK, Ireland, and Continental Europe as required for customer meetings, industry events, and internal More ❯
is varied from office facilities modifications & construction to pipework inline inspection (ILI) projects, to SCADA control system upgrades on the OperationalTechnology (OT) network, to specialist vehicle builds, through to various mechanical & electrical projects on the process plant. You may also be involved with IT infrastructure and Cyber More ❯
is varied from office facilities modifications & construction to pipework inline inspection (ILI) projects, to SCADA control system upgrades on the OperationalTechnology (OT) network, to specialist vehicle builds, through to various mechanical & electrical projects on the process plant. You may also be involved with IT infrastructure and Cyber More ❯
is varied from office facilities modifications & construction to pipework inline inspection (ILI) projects, to SCADA control system upgrades on the OperationalTechnology (OT) network, to specialist vehicle builds, through to various mechanical & electrical projects on the process plant. You may also be involved with IT infrastructure and Cyber More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Consulting Point
Hybrid | Clearance: SC Cleared or Eligible | Salary: Competitive + Benefits Our client, a global consulting leader with a growing presence in the cybersecurity and technology risk space, is actively expanding its UK team. As part of a strategic growth initiative, they are hiring across multiple levels – from Consultant to … for professionals with a passion for security and innovation to join a collaborative environment at the forefront of emerging technologies such as Generative AI, OT security, and secure enterprise transformation. You’ll work on high-impact engagements, advising clients on how to mitigate risk and build resilience through secure design … enterprise and application architecture aligned with best practice standards (e.g., NIST, ISO27001, CIS). OperationalTechnology Security : Protect critical infrastructure through robust OT security assessments and frameworks (e.g., NIST SP 800-82, CAF). What We’re Looking For Proven experience in cybersecurity, technology risk, or security More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Ada Meher
the CRM platform. This is an ideal opportunity for someone who thrives in dynamic environments, enjoys cross-functional collaboration, and is passionate about how technology can transform traditional industries. As part of their commitment to work/life balance, the company work on a hybrid basis with employees spending … fast-paced, collaborative environment This company is at the forefront of digital transformation in the property sector, offering an exciting opportunity to shape how operationaltechnology impacts tenants, landlords, and property managers alike. With flexible working, a collaborative team culture, and significant ownership over your work, this is More ❯
understand core security components, their principles: systems and networks, security devices (firewalls, AV/EDR, VPN...), cloud (AWS, Azure, Google...) Familiarity with industrial/OT environments (SCADA, ICS...) is a plus – it's our specialty (and if not, we’ll train you!) You master risk analysis methodologies (ISO 27005, EBIOS More ❯
be responsible for managing and conducting advanced penetration testing engagements, leveraging threat intelligence to simulate real-world attacks across a variety of environments, including OT, IT, web applications, cloud infrastructure, and APIs. This role requires a deep understanding of adversarial approaches, excellent communication skills, and the ability to provide strategic … applying a strong threat intelligence-led approach. Execute advanced penetration tests across a broad range of environments (applications, infrastructure, web, APIs, O365, Azure, AWS, OT), directly applying your knowledge of current threat landscapes and attacker TTPs. Develop and maintain sophisticated test plans, execution plans, and targeted use cases directly informed … by in-depth threat intelligence analysis. Identify and prioritize OT and IT assets, services, and systems based on their criticality and potential exposure to identified threats. Strategically prioritize, plan, and schedule penetration testing engagements based on comprehensive threat assessments and client-specific requirements. Produce high-quality, detailed reports that clearly More ❯
to play a key technical role working on a global basis. We are seeking candidates with experience of the Microsoft Security Stack, and ideally OT security experience, although the OT experience can be picked up with training offered. This is an all-rounder role, which whilst it will have a … provider Threat hunting using proactive methods Vulnerability management (tenable is tool used) and patching Security policy, compliance, and user awareness in relation to the OT\ SCADA systems Incident investigation and documentation Utilisation of the Microsoft Security Stack – Azure Sentinel, Defender, Purview In order to be suitable you will need the … Cisco FirePower and Cisco Meraki desirable Some knowledge of technical security frameworks – ISO27001, NIST, SOC2 with experience of compliance related work Any knowledge of OT/SCADA security including the IEC 62443 OT security standard highly desirable Any Microsoft or wider security certifications desirable The role is based in the More ❯
teams including Leadership & Senior Leadership teams tounderstand the business needs and recommend network solutions that fits best Participate in planning, designing and maintaining the OT network infrastructure of our clients Operational Management Assist DFIR team with imaging, data acquisition & installing agents for compromised clients on-site Assist with the … requires further investigation and analysis Configure, install and maintain network hardware such as a Router, Switch, Access Points, etc. in both the IT and OT space of CyberClan clients Configure, install and maintain security firewalls and other security systems to maintain and continuously improve our clients’ security posture in the … IT and OT space Provide Level 3 network support and be an escalation contact by supporting the clients’ Service desk staffs and other team members in troubleshooting network incidents and escalations in a timely manner for both IT and OT network infrastructure Troubleshoot network incidents by identifying and diagnosing network More ❯
teams including Leadership & Senior Leadership teams tounderstand the business needs and recommend network solutions that fits best Participate in planning, designing and maintaining the OT network infrastructure of our clients Operational Management Assist DFIR team with imaging, data acquisition & installing agents for compromised clients on-site Assist with the … requires further investigation and analysis Configure, install and maintain network hardware such as a Router, Switch, Access Points, etc. in both the IT and OT space of CyberClan clients Configure, install and maintain security firewalls and other security systems to maintain and continuously improve our clients’ security posture in the … IT and OT space Provide Level 3 network support and be an escalation contact by supporting the clients’ Service desk staffs and other team members in troubleshooting network incidents and escalations in a timely manner for both IT and OT network infrastructure Troubleshoot network incidents by identifying and diagnosing network More ❯
teams including Leadership & Senior Leadership teams tounderstand the business needs and recommend network solutions that fits best Participate in planning, designing and maintaining the OT network infrastructure of our clients Operational Management Assist DFIR team with imaging, data acquisition & installing agents for compromised clients on-site Assist with the … requires further investigation and analysis Configure, install and maintain network hardware such as a Router, Switch, Access Points, etc. in both the IT and OT space of CyberClan clients Configure, install and maintain security firewalls and other security systems to maintain and continuously improve our clients’ security posture in the … IT and OT space Provide Level 3 network support and be an escalation contact by supporting the clients’ Service desk staffs and other team members in troubleshooting network incidents and escalations in a timely manner for both IT and OT network infrastructure Troubleshoot network incidents by identifying and diagnosing network More ❯
oxford district, south east england, United Kingdom
CyberClan
teams including Leadership & Senior Leadership teams tounderstand the business needs and recommend network solutions that fits best Participate in planning, designing and maintaining the OT network infrastructure of our clients Operational Management Assist DFIR team with imaging, data acquisition & installing agents for compromised clients on-site Assist with the … requires further investigation and analysis Configure, install and maintain network hardware such as a Router, Switch, Access Points, etc. in both the IT and OT space of CyberClan clients Configure, install and maintain security firewalls and other security systems to maintain and continuously improve our clients’ security posture in the … IT and OT space Provide Level 3 network support and be an escalation contact by supporting the clients’ Service desk staffs and other team members in troubleshooting network incidents and escalations in a timely manner for both IT and OT network infrastructure Troubleshoot network incidents by identifying and diagnosing network More ❯
teams including Leadership & Senior Leadership teams tounderstand the business needs and recommend network solutions that fits best Participate in planning, designing and maintaining the OT network infrastructure of our clients Operational Management Assist DFIR team with imaging, data acquisition & installing agents for compromised clients on-site Assist with the … requires further investigation and analysis Configure, install and maintain network hardware such as a Router, Switch, Access Points, etc. in both the IT and OT space of CyberClan clients Configure, install and maintain security firewalls and other security systems to maintain and continuously improve our clients’ security posture in the … IT and OT space Provide Level 3 network support and be an escalation contact by supporting the clients’ Service desk staffs and other team members in troubleshooting network incidents and escalations in a timely manner for both IT and OT network infrastructure Troubleshoot network incidents by identifying and diagnosing network More ❯
Harrington Starr are seeking a Senior Security Analyst with experience of working with OT\ Scada based systems to work for a small specialist security team to play a key role in securing their critical infrastructure systems within the energy sector (renewables). This role will offer excellent scope to play … a key role for a global company from botha technical and strategic perspective. Key day to day duties will include: OT & IT Security Monitoring: Continuously monitor the security of both OT and IT environments, including SCADA systems and Industrial Control System (ICS) Governance and compliance of all OT systems - NIST … teams User training/awareness Key skills needed are: 3+ years in a cyber security role with a good level of exposure to OT security Knowledge of NIST and IEC 62443 OT frameworks Knowledge of the Microsoft security stack and wider IT security experience highly desirable Knowledge of NERC More ❯
of PoA architecture and its components. Should have worked on deployment and POA systems in Power Utilities. Should have experience in integrating PoA with OT applications like GIS, WFM, PI, Historian and other corporate application systems Customer interactions and working in multi-vendor environment Arrange end to end solution for … Servers, Reports and Proxy Servers). Knowledge on PoA cartography for network build. Good level of understanding on Windows and Linux server IT/OT and security standards (e.g., NERC CIP). Use relevant utility experience to engage with client utilities to understand their specific applications, approaches and methodologies in … across engagements or multiple phases of a more complex engagement Assess effectiveness of client’s use of tools, applications, processes to adapt to new OT applications for solution areas such as DERMS/DRMS/ADMS/OMS/SCADA Apply appropriate methods or recognized equivalent to identified client needs More ❯
of PoA architecture and its components. Should have worked on deployment and POA systems in Power Utilities. Should have experience in integrating PoA with OT applications like GIS, WFM, PI, Historian and other corporate application systems Customer interactions and working in multi-vendor environment Arrange end to end solution for … Servers, Reports and Proxy Servers). Knowledge on PoA cartography for network build. Good level of understanding on Windows and Linux server IT/OT and security standards (e.g., NERC CIP). Use relevant utility experience to engage with client utilities to understand their specific applications, approaches and methodologies in … across engagements or multiple phases of a more complex engagement Assess effectiveness of client’s use of tools, applications, processes to adapt to new OT applications for solution areas such as DERMS/DRMS/ADMS/OMS/SCADA Apply appropriate methods or recognized equivalent to identified client needs More ❯
a deep focus on details Excellent situational awareness, proven ability to influence, drive accountability & build consensus with all team members and customers to drive operational excellence and quality of deliverables Executive presence with strong verbal and written communication successfully influencing the C-suite to act Exceptional business problem solving … justify business cases Demonstrated ability to learn quickly and participate on projects with varied industry and business imperative focus including business-related IT and OT challenges and cybersecurity, business applications, systems, and business process integration solutions Experience with risk assessment, especially cyber risk is preferred Additional Information The Team Business More ❯