Position Overview LCS Defense is seeking a highly motivated CyberSecurity Engineer to support critical cryptographic operations. The ideal candidate will possess a strong technical background in COMSEC management and a demonstrated ability to develop and implement robust key management solutions. in Aberdeen Proving Grounds. MD Key Responsibilities: • Work on a small team of cyber engineers to perform security assessments … prototyping and advanced technologies. About LCS LCS Defense, LLC is a small business specializing in Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) services by providing complex cybersecurity and secure communication solutions. Our capabilities include the requirements analysis, definition design, development, integration and deployment of systems that support national leadership and our warfighters. Established in 2017, LCS More ❯
Cybersecurity Analyst I'm currently supporting a forward-thinking organisation that's undergoing a major digital and tech transformation. They're looking for a cybersecurity Analyst to join their growing InfoSec team and play a key role in protecting systems, data, and people from the latest cyber threats. This is a fantastic opportunity for someone passionate about cybersecurityMore ❯
IT Infrastructure Manager Azure/AWS/CyberSecurity £60,000 - £65,000 Fully remote An established organization in the cybersecurity is seeking an IT Infrastructure Manager to lead the operational delivery of its cloud platforms, core infrastructure, endpoint management, and enterprise tools. This role is central to maintaining secure, scalable, and resilient technology environments that support both external services … Entra ID and O365 Cloud native apps, e.g. Function Apps, Logic Aps, Power Automate, External Entra ID ISO27001 implementation and maintenance Proactive and self-motivated Desirable but not required: CyberSecurity experience - understanding of vulnerability, pen testing and communicate with CyberSec professionals. Please apply directly with an up today CV and we will be in touch More ❯
Are you passionate about IT Compliance and CyberSecurity? Do you want to work in the green offshore wind industry where your skills and expertise will help secure a sustainable future based on renewable energy? Then keep reading - Cadeler is looking for an IT Senior Risk & Compliance Manager with your skills and interests! Cadeler is a global partner in the … IT Business Continuity and Disaster Recovery plans, including periodic drills. Develop and run training and awareness programs, including phishing campaigns. Act as a subject matter expert and mentor on cybersecurity and compliance topics for the broader IT team. To succeed in this role Being part of the Cadeler community means you will have a natural interest and care for … such as Computer Science and/or Information Technology. 5-10 years of experience in IT with increasing areas of responsibility. Proven experience with projects or achievements within the CyberSecurity area. Strong understanding of network and infrastructure technologies, cloud environments (MS365, Azure), and E5 Security suite. Hands-on experience managing or auditing frameworks such as SOX IT controls, CIS18 More ❯
Are you passionate about IT Compliance and CyberSecurity? Do you want to work in the green offshore wind industry where your skills and expertise will help secure a sustainable future based on renewable energy? Then keep reading - Cadeler is looking for an IT Senior Risk & Compliance Manager with your skills and interests! Cadeler is a global partner in the … IT Business Continuity and Disaster Recovery plans, including periodic drills. Develop and run training and awareness programs, including phishing campaigns. Act as a subject matter expert and mentor on cybersecurity and compliance topics for the broader IT team. To succeed in this role Being part of the Cadeler community means you will have a natural interest and care for … such as Computer Science and/or Information Technology. 5-10 years of experience in IT with increasing areas of responsibility. Proven experience with projects or achievements within the CyberSecurity area. Strong understanding of network and infrastructure technologies, cloud environments (MS365, Azure), and E5 Security suite. Hands-on experience managing or auditing frameworks such as SOX IT controls, CIS18 More ❯
adoption of new services or solutions that align with customer needs and business objectives. ESSENTIAL TRAITS: Proven experience in customer-facing account management or customer success roles, ideally within cybersecurity or managed services. Strong communication and presentation skills, with the ability to engage technical and non-technical audiences. Ability to manage multiple customer accounts, prioritising effectively in a fast-paced … environment. Experience driving customer satisfaction and retention through proactive engagement. Understanding of key concepts in cybersecurity, threat detection, and managed security services. Familiarity with ITIL service management principles. Experience presenting to senior stakeholders and technical teams. Exposure to security technologies such as EDR, SIEM and network monitoring. Ability to interpret data to inform account strategy and demonstrate value. Kroll is More ❯
Minneapolis, Minnesota, United States Hybrid / WFH Options
Target
disability, long term disability, paid sick leave, paid national holidays, and paid vacation. Find competitive benefits from financial and education to well-being and beyond at . JOIN TARGET CYBERSECURITY AS A LEAD ENGINEER - RED TEAM About Us Target is an iconic brand, a Fortune 50 company, and one of America's leading retailers. Target as a tech company? Absolutely. … performing teams balance independence with collaboration, and we pride ourselves on being versatile, agile and creative. Use your skills, experience, and talents as a member of a world-class cybersecurity team! About Red Team Target's Red Team uses adversary simulation to uncover risk in our environment, provide training opportunities to defenders, and measure the processes and technology defending … real-world threat actor tactics, techniques, and procedures to develop proof-of-concept tools and playbooks Bypass preventative and detective security controls to accomplish operational goals Partner with the CyberSecurity Incident Response Team and other stakeholders in the organization to identify improvement opportunities Collaborate with Cyber Threat Intelligence, Detection, and Threat Hunting engineers and analysts on research Work with More ❯
Salary: $90,000-$120,000 Clearance: Top Secret clearance willing to sit for CI Poly Responsibilities Responsible for monitoring computer networks for security issues. Investigating security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to More ❯
Test Plan, SSPs SCTM) Minimum Requirements : Must have active TS/SCI security clearance and be willing and able to obtain CI Polygraph Bachelor's degree in Information Systems, CyberSecurity or related field 5+ years of experience in CyberSecurity; an additional 4 years of relevant experience may be substituted in lieu of a degree 3+ years of experience … Experience analyzing and prioritizing compliance scan results for both Information Assurance Vulnerability Management (IAVM) and Security Technical Implementation Guides (STIGs) Experience with automating data cleaning, reduction and normalization for cybersecurity related data sets using both VBA and Python Working knowledge of the Risk Management Framework (RMF) and associated standards and guidelines CompTIA Security+ Desired Requirements : Experience with Linux (Red Hat More ❯
Wed: 12pm-10pm Wed-Sat: 12pm-10pm Sun-Wed: 9pm-7am Wed-Sat: 9pm-7am Responsibilities Responsible for monitoring computer networks for security issues. Investigating security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to More ❯
Warwick, England, United Kingdom Hybrid / WFH Options
Pontoon Solutions
stakeholder groups for eliciting stakeholder requirements. Working knowledge of Agile and Waterfall Methodologies Desirable Knowledge of cybersecurity regulations (NIS Regulations) and frameworks, e.g., ISA/IEC 62443 or NIST CyberSecurity Framework. Candidates will ideally show evidence of the above in their CV in order to be considered. Please be advised if you haven't heard from us within More ❯
services (Teams, Outlook, SharePoint, OneDrive, Intune, Entra, etc.). Help maintain and troubleshoot Dynamics 365 and Power Automate workflows under guidance. Install and update software applications securely and efficiently. Cybersecurity & Compliance Help monitor and enforce endpoint security using Panda Adaptive Defence 360 and Action 1 Assist with patch management and threat detection alerts. Support compliance processes such as Cyber Essentials More ❯
technical skills would be greatly beneficial: Containerisation (podman/kubernetes) Security (SELinux, STIG/CIS lockdown, cryptographic principles, TPM) Software build process (Make, CMake, Maven, Gradle, Jenkins, git, artifactory) Cybersecurity Embedded SW Development Rhapsody or Enterprise Architect The ideal candidate would also have some of the following experience in Industry: Experience in the Defence industry Experience of Radio Communication … responsible for the definition of a feasible, maintainable and scalable software architecture consistent with the solution/system architecture.They ensure that design takes into account performance, robustness, safety, and cybersecurity constraints.They support the development team in their rise in competence in architecture fields and coding. We encourage you to apply even if you feel you don't meet every single More ❯
ll be doing • Leading the transformation of IT and OT systems using secure-by-design principles• Working with leadership to define and deliver the long-term technology strategy• Overseeing cybersecurity to protect highly sensitive data environments• Developing strategies to migrate away from legacy systems and implement modern solutions• Inspiring and mentoring IT and OT teams to thrive during change• Managing More ❯
in computer science or engineering or equivalent Several years professional Experience Proficiency in programming languages and operating systems, such as C, C++, Python, Windows, and Linux Good knowledge of Cybersecurity standard practices and communication protocols. Knowledge or experience in Quantum Cryptography, with particular focus on secure communication protocols. Knowledge of system integration processes IT literacy, including proficiency with MS Office More ❯
is written. IriusRisk's platform automates the threat modeling process, enabling developers to design and build secure software. At scale. Purpose of the Role IriusRisk is a fast-growing cybersecurity startup searching for flexible go-getters who welcome the challenge of meeting the needs of a growing business. As the Principal Customer Success Manager (CSM), you will play a pivotal More ❯
to build a more secure and resilient digital world. You will act as a critical liaison between client stakeholders and internal operational teams, ensuring the delivery of world-class cybersecurity services. You'll drive incident response coordination, lead vulnerability management efforts, and ensure service excellence through strategic oversight and hands-on technical engagement. What You'll Be Doing Serve … closely with the Senior Service Delivery Manager to identify process improvements and implement best practices. What You'll Bring 10+ years of experience in technical support for SOC or CyberSecurity operations. 5+ years of vulnerability management experience, with demonstrable risk-based prioritisation skills. Proven leadership in high-pressure, crisis-response situations. Strong client relationship management and stakeholder engagement skills. More ❯
Resolve complex IT issues across networking, servers, cloud, and security. Proactive IT Management - Maintain and improve IT systems. Projects & Migrations - Implement IT projects including cloud migrations and security enhancements. CyberSecurity Best Practices - Ensure compliance and security standards. I.T Support Engineer Job Requirements 2nd or 3rd line support experience A true team player - Someone that works best when surrounded by … AD, DNS, DHCP, Group Policy, Hyper-V/VMware. Microsoft 365 & Azure - Administration, migrations, security best practices. Linux experience - Strong troubleshooting skills. PSA & RMM experience - NinjaOne, ConnectWise, or similar. CyberSecurity Awareness - Patching, MFA, endpoint protection. I.T Support Engineer Salary & Benefits Salary- £35,000- £45,000 (dependent on experience) 20 days holiday Christmas bonus and yearly salary review On-site More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Tria
on designing, building, and maintaining internal developer platforms (IDP) and infrastructure that power our organisation's applications and services. You will collaborate closely with software engineering, DevOps, IT, and cybersecurity teams to ensure our platforms are secure, scalable, and highly reliable, enabling seamless delivery of business-critical services. This role is ideal for a proactive engineer who enjoys automation … and improve operational efficiency across on-premises, cloud, and hybrid environments. Provide technical support and root cause analysis for high-priority incidents, following blameless post-mortem practices. Collaborate with cybersecurity teams to embed security best practices and ensure compliance with governance and regulatory standards. Partner with stakeholders to align platform strategies with organisational goals and business objectives. Manage platform … projects and hybrid cloud solutions. Knowledge of Dynamics 365 customer engagement modules or Power Platform. What You'll get Opportunity to work on innovative projects with a focus on cybersecurity and digital transformation. Hybrid working with flexible arrangements. Professional development and certification support. Collaborative environment with strong stakeholder engagement. To apply for this opportunity please apply with your latest More ❯
We are seeking passionate people to grow the CyberSecurity team within WTW and provide an excellent service and trusted expertise to all parts of our business. As part of a business wide transformation, we have an exciting opening for a new role of Global Head of Threat Intelligence. As part of the Cyber Defence and Security Operations department, you More ❯
Southampton, Hampshire, South East, United Kingdom
Sterling Bridge Limited
perfect role for a 2nd Line Engineer whos hungry to step up fast. Within your first year, youll be working towards 3rd Line level with paid training in Azure, CyberSecurity, M365 and more. Youll be surrounded by a young, ambitious, and social team who regularly organise events and push each other to be the best. The energy is infectious … and the career progression is real. Whats In It For You: £30,000 £35,000 salary Clear roadmap to 3rd Line/Infrastructure Engineer Paid training & certifications (Azure, CyberSecurity & more) 30 days holiday (+ 8 bank holidays) 10% pension contribution Hybrid & flexible working options Social team with regular events What Youll Bring: Experience in a 2nd Line IT Support More ❯
services and user support to ensure optimum service availability and user productivity. This includes all user support and comes with responsibilities over run and maintain services, as well as cybersecurity operations. The Head of Service Operations brings current knowledge and future vision for transforming Service Operations functions, including strategy, to remain effective whilst supporting modern service delivery approaches, including … strategic thinking and operational management of live services. The role's level of operational responsibility is high and includes leading through major disruption at times of major incidents including cybersecurity ones. As a key member of the GIO senior IT leadership team this role contributes to the development and execution of the GIO business plan and is responsible for … user-friendly Catalogue of requestable items backed by lean workflow and supported by an efficient exceptions process to deliver what users need, when they need it. Provision of effective cybersecurity protective monitoring, vulnerability management in conjunction with technical teams and suppliers, and a responsive and effective cyber incident response capability. Lead on software licencing (circa £40m/y) seeking More ❯
services and user support to ensure optimum service availability and user productivity. This includes all user support and comes with responsibilities over run and maintain services, as well as cybersecurity operations. The Head of Service Operations brings current knowledge and future vision for transforming Service Operations functions, including strategy, to remain effective whilst supporting modern service delivery approaches, including … strategic thinking and operational management of live services. The role's level of operational responsibility is high and includes leading through major disruption at times of major incidents including cybersecurity ones. As a key member of the GIO senior IT leadership team this role contributes to the development and execution of the GIO business plan and is responsible for … user-friendly Catalogue of requestable items backed by lean workflow and supported by an efficient exceptions process to deliver what users need, when they need it. Provision of effective cybersecurity protective monitoring, vulnerability management in conjunction with technical teams and suppliers, and a responsive and effective cyber incident response capability. Lead on software licencing (circa £40m/y) seeking More ❯
services and user support to ensure optimum service availability and user productivity. This includes all user support and comes with responsibilities over run and maintain services, as well as cybersecurity operations. The Head of Service Operations brings current knowledge and future vision for transforming Service Operations functions, including strategy, to remain effective whilst supporting modern service delivery approaches, including … strategic thinking and operational management of live services. The role's level of operational responsibility is high and includes leading through major disruption at times of major incidents including cybersecurity ones. As a key member of the GIO senior IT leadership team this role contributes to the development and execution of the GIO business plan and is responsible for … user-friendly Catalogue of requestable items backed by lean workflow and supported by an efficient exceptions process to deliver what users need, when they need it. Provision of effective cybersecurity protective monitoring, vulnerability management in conjunction with technical teams and suppliers, and a responsive and effective cyber incident response capability. Lead on software licencing (circa £40m/y) seeking More ❯
services and user support to ensure optimum service availability and user productivity. This includes all user support and comes with responsibilities over run and maintain services, as well as cybersecurity operations. The Head of Service Operations brings current knowledge and future vision for transforming Service Operations functions, including strategy, to remain effective whilst supporting modern service delivery approaches, including … strategic thinking and operational management of live services. The role's level of operational responsibility is high and includes leading through major disruption at times of major incidents including cybersecurity ones. As a key member of the GIO senior IT leadership team this role contributes to the development and execution of the GIO business plan and is responsible for … user-friendly Catalogue of requestable items backed by lean workflow and supported by an efficient exceptions process to deliver what users need, when they need it. Provision of effective cybersecurity protective monitoring, vulnerability management in conjunction with technical teams and suppliers, and a responsive and effective cyber incident response capability. Lead on software licencing (circa £40m/y) seeking More ❯