Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
newport, midlands, United Kingdom Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerabilitymanagement tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerabilitymanagement tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable VulnerabilityManagement (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
newport, midlands, United Kingdom Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable VulnerabilityManagement (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
equivalent + 6-7 years in InfoSec Experience maturing security programs & frameworks ( ISO27001, NIST CAF, OWASP ) Strong knowledge of SIEM, IDS/IPS, RBAC, vulnerabilitymanagement Understanding of cloud, COTS/SaaS platforms & IoT security Ability to communicate risks & strategies at executive level Full driving license & personal transport More ❯
City, Cardiff, United Kingdom Hybrid / WFH Options
CMD Recruitment
involves building on existing technical and soft skills while deepening expertise in SaaS systems, Microsoft 365 services, and cybersecurity management. Key Responsibilities: Microsoft 365 Management: Administers and maintains Microsoft 365 services, including Identity, InTune, Exchange, Security, SharePoint, Teams, and Teams Direct/Calling. Ensures performance, availability, and security of …/SSO and security awareness training. Machine Configuration & Diagnostics: Configures, deploys, and troubleshoots Windows and Mac systems. Performs system audits, updates, patches, and automates vulnerability fixes. Service Desk Operations: Provides internal IT support, manages incidents and service requests, and maintains documentation and knowledge base articles. System Integrations & Migrations: Supports … Office troubleshooting. Exhibits strong knowledge of ISO 27001, GDPR, Cyber Essentials, and PCI-DSS standards. Has experience with IT service desk tools, malware/vulnerabilitymanagement, and security awareness platforms (e.g., KnowBe4). Displays familiarity with ITIL and ISO 9001/27001 frameworks. Soft Skills Approach work proactively More ❯
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
CMD Recruitment
involves building on existing technical and soft skills while deepening expertise in SaaS systems, Microsoft 365 services, and cybersecurity management. Key Responsibilities: Microsoft 365 Management: Administers and maintains Microsoft 365 services, including Identity, InTune, Exchange, Security, SharePoint, Teams, and Teams Direct/Calling. Ensures performance, availability, and security of …/SSO and security awareness training. Machine Configuration & Diagnostics: Configures, deploys, and troubleshoots Windows and Mac systems. Performs system audits, updates, patches, and automates vulnerability fixes. Service Desk Operations: Provides internal IT support, manages incidents and service requests, and maintains documentation and knowledge base articles. System Integrations & Migrations: Supports … Office troubleshooting. Exhibits strong knowledge of ISO 27001, GDPR, Cyber Essentials, and PCI-DSS standards. Has experience with IT service desk tools, malware/vulnerabilitymanagement, and security awareness platforms (e.g., KnowBe4). Displays familiarity with ITIL and ISO 9001/27001 frameworks. Soft Skills Approach work proactively More ❯
cardiff (grangetown), cardiff, United Kingdom Hybrid / WFH Options
Creditsafe
big and small but most importantly, opened up new avenues of data intelligence for businesses with machine learning, AI and connected data. From risk management through to opportunity identification, our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger … day activities of the Security Operations Centre (SOC) and Security Engineering teams. • Produce reports on key security metrics across Security Operations, Application Security and Vulnerability Management. • Conduct regular 1-2-1s, Performance Reviews, and Personal Development Plans of team members. • Develop and implement security policies, processes, and procedures … to comply with SOC2 and ISO27001 standards. • Participate in Steering groups for Identity and Access Management and Data Protection • Setting and aligning team objectives and tasks to help achieve the overall Information Security and Compliance function’s strategy and goals • Participate in Quarterly Business Reviews with our security tooling More ❯
newport, wales, United Kingdom Hybrid / WFH Options
Creditsafe
big and small but most importantly, opened up new avenues of data intelligence for businesses with machine learning, AI and connected data. From risk management through to opportunity identification, our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger … day activities of the Security Operations Centre (SOC) and Security Engineering teams. • Produce reports on key security metrics across Security Operations, Application Security and Vulnerability Management. • Conduct regular 1-2-1s, Performance Reviews, and Personal Development Plans of team members. • Develop and implement security policies, processes, and procedures … to comply with SOC2 and ISO27001 standards. • Participate in Steering groups for Identity and Access Management and Data Protection • Setting and aligning team objectives and tasks to help achieve the overall Information Security and Compliance function’s strategy and goals • Participate in Quarterly Business Reviews with our security tooling More ❯
skills/experience: Strong IT infrastructure background with a security focus Security certifications (CISMP, GSEC, or equivalent) Proven experience with firewalls, encryption, AV, and vulnerabilitymanagement Familiarity with ISMS, NIS Regulations, GDPR (desirable) Salary is mainly dependent on experience but can stretch up to £50,000pa. This role More ❯
skills/experience: Strong IT infrastructure background with a security focus Security certifications (CISMP, GSEC, or equivalent) Proven experience with firewalls, encryption, AV, and vulnerabilitymanagement Familiarity with ISMS, NIS Regulations, GDPR (desirable) Salary is mainly dependent on experience but can stretch up to £50,000pa. This role More ❯
experience working with data and cloud technologies, including databases, cloud infrastructure, and basic cloud administration (e.g., networking, compute and storage resources, identity and access management). Familiarity with APIs, web services, and automation through scripting or programming languages. Practical knowledge and demonstrated experience in areas such as Data Loss … Prevention (DLP), Data Privacy/Protection, DSPM/CSPM, SIEM, or vulnerabilitymanagement is highly preferred. Proven success in a technical, customer-facing role within a software or SaaS company. Full spec available, please apply to Locke44 for the details. More ❯
experience working with data and cloud technologies, including databases, cloud infrastructure, and basic cloud administration (e.g., networking, compute and storage resources, identity and access management). Familiarity with APIs, web services, and automation through scripting or programming languages. Practical knowledge and demonstrated experience in areas such as Data Loss … Prevention (DLP), Data Privacy/Protection, DSPM/CSPM, SIEM, or vulnerabilitymanagement is highly preferred. Proven success in a technical, customer-facing role within a software or SaaS company. Full spec available, please apply to Locke44 for the details. More ❯
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
newport, midlands, United Kingdom Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
development lifecycle—from inception to retirement. Expertise in automation tools and processes for streamlined deployment and operations. Strong knowledge of security best practices and vulnerability management. Proficiency in a variety of coding languages and scripting techniques. A proactive, problem-solving mindset with a focus on continuous learning and improvement. … Charts, Python, PowerShell, REST APIs. Kubernetes: Experience building and managing Kubernetes clusters and application delivery. Applications: Familiarity with Apache NiFi, Elastic ECK, Artifactory. Secret Management: Expertise in using HashiCorp Vault. Operating Systems: Solid experience with Red Hat and Windows environments. Apply today via the link provided More ❯