virtual servers, workstations, and network devices. * Oversight of IT security by implementing and enforcing policies and procedures to safeguard the organization’s assets against cybersecurity threats; manage endpoint protection, vulnerability assessments, and incident response. * Managing Windows PCs and servers, including Active Directory, Group Policy, patch management, and system backup processes. * Administration of cloud services to include Microsoft 365 environments More ❯
Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
Russell Taylor Group Ltd
within OT/ICS environments, leveraging frameworks such as MITRE ATT&CK for ICS and modelling using Bow-Tie Analysis to proactively identify and exploit vulnerabilities. You'll conduct vulnerability assessments and administrative audits on client computer systems and network devices considering the sensitivity of Operational Technology testing. You'll lead collaboration efforts with other cybersecurity experts on team More ❯
in-depth technical analysis, documentation, and triage of security events and alerts Support threat hunting activities using cyber threat intelligence inputs Investigate security events by leveraging threat intelligence and vulnerability assessments Identify and respond to security-relevant anomalies, IOCs and TTPs Challenge existing detection rules and implement improvements Create and update security use cases and operational playbooks Report security More ❯
Skills • 4–5 years of IT security auditing or consulting experience. • Bachelor’s degree in information security or related field. • Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. • Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. • Strong understanding of cloud environments and network architectures. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
CONTROLCASE LIMITED
Skills • 4–5 years of IT security auditing or consulting experience. • Bachelor’s degree in information security or related field. • Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. • Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. • Strong understanding of cloud environments and network architectures. More ❯
Skills • 4–5 years of IT security auditing or consulting experience. • Bachelor’s degree in information security or related field. • Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. • Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. • Strong understanding of cloud environments and network architectures. More ❯
East London, London, United Kingdom Hybrid / WFH Options
CONTROLCASE LIMITED
Skills • 4–5 years of IT security auditing or consulting experience. • Bachelor’s degree in information security or related field. • Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. • Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. • Strong understanding of cloud environments and network architectures. More ❯
Skills • 4–5 years of IT security auditing or consulting experience. • Bachelor’s degree in information security or related field. • Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. • Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. • Strong understanding of cloud environments and network architectures. More ❯
Altrincham, Greater Manchester, United Kingdom Hybrid / WFH Options
CONTROLCASE LIMITED
Skills • 4–5 years of IT security auditing or consulting experience. • Bachelor’s degree in information security or related field. • Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. • Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. • Strong understanding of cloud environments and network architectures. More ❯
Bury, Greater Manchester, United Kingdom Hybrid / WFH Options
CONTROLCASE LIMITED
Skills • 4–5 years of IT security auditing or consulting experience. • Bachelor’s degree in information security or related field. • Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. • Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. • Strong understanding of cloud environments and network architectures. More ❯
Leigh, Greater Manchester, United Kingdom Hybrid / WFH Options
CONTROLCASE LIMITED
Skills • 4–5 years of IT security auditing or consulting experience. • Bachelor’s degree in information security or related field. • Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. • Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. • Strong understanding of cloud environments and network architectures. More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
CONTROLCASE LIMITED
Skills • 4–5 years of IT security auditing or consulting experience. • Bachelor’s degree in information security or related field. • Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. • Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. • Strong understanding of cloud environments and network architectures. More ❯
Bolton, Greater Manchester, United Kingdom Hybrid / WFH Options
CONTROLCASE LIMITED
Skills • 4–5 years of IT security auditing or consulting experience. • Bachelor’s degree in information security or related field. • Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. • Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. • Strong understanding of cloud environments and network architectures. More ❯
Central London / West End, London, United Kingdom Hybrid / WFH Options
CONTROLCASE LIMITED
Skills • 4–5 years of IT security auditing or consulting experience. • Bachelor’s degree in information security or related field. • Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. • Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. • Strong understanding of cloud environments and network architectures. More ❯
Ashton-Under-Lyne, Greater Manchester, United Kingdom Hybrid / WFH Options
CONTROLCASE LIMITED
Skills • 4–5 years of IT security auditing or consulting experience. • Bachelor’s degree in information security or related field. • Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. • Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. • Strong understanding of cloud environments and network architectures. More ❯
Nottinghamshire, England, United Kingdom Hybrid / WFH Options
Digital Waffle
response plans, ensuring continuous improvements Integrate security practices seamlessly into the DevOps pipeline Manage and optimise monitoring tools to provide real-time threat visibility Carry out regular threat and vulnerability assessments, applying effective remediation strategies Coach and mentor colleagues, keeping the team ahead of evolving risks and technologies What you bring: Significant experience in security operations across both cloud More ❯
nottingham, midlands, united kingdom Hybrid / WFH Options
Digital Waffle
response plans, ensuring continuous improvements Integrate security practices seamlessly into the DevOps pipeline Manage and optimise monitoring tools to provide real-time threat visibility Carry out regular threat and vulnerability assessments, applying effective remediation strategies Coach and mentor colleagues, keeping the team ahead of evolving risks and technologies What you bring: Significant experience in security operations across both cloud More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
of security incidents from detection to resolution. Ensure compliance with SLAs and escalation protocols. Maintain and enhance incident response plans and procedures. Direct threat intelligence collection and analysis. Manage vulnerability assessments and coordinate remediation. Monitor and analyse security events across multiple platforms. Identify, assess, and escalate threats and vulnerabilities. Maintain and evolve SOC operational documentation and processes. Deliver training More ❯
Role They're looking for an experienced Penetration Tester to join their expert team in Bristol. You'll be responsible for conducting advanced penetration tests, red team exercises, and vulnerability assessments, helping clients strengthen their defences and reduce risk. What You'll Do Perform penetration testing across networks, systems, and applications Lead vulnerability assessments and red teaming activities … Create detailed reports and communicate findings clearly to clients Contribute to internal research and tool development What You'll Bring 2+ years' experience in penetration testing or vulnerabilityassessment CHECK, Crest, or equivalent certification Strong technical understanding of networks, OS, and security tools (Metasploit, Burp Suite, Nmap, etc.) Excellent communication and problem-solving skills Nice to Have Coding More ❯
Role They’re looking for an experienced Penetration Tester to join their expert team in Bristol. You’ll be responsible for conducting advanced penetration tests, red team exercises, and vulnerability assessments, helping clients strengthen their defences and reduce risk. What You’ll Do Perform penetration testing across networks, systems, and applications Lead vulnerability assessments and red teaming activities … Create detailed reports and communicate findings clearly to clients Contribute to internal research and tool development What You’ll Bring 2+ years’ experience in penetration testing or vulnerabilityassessment CHECK, CREST, or equivalent certification Strong technical understanding of networks, OS, and security tools (Metasploit, Burp Suite, Nmap, etc.) Excellent communication and problem-solving skills Nice to Have Coding More ❯
or reported issues. Implement and maintain version promotion of one or more applications within CI pipelines. Integrate CI pipelines with development tools for artifact management, software test, software quality assessment, etc. Implement Continuous Delivery and execute automated or manual deployments of applications into orchestrated k8s environments. Execute checkout and troubleshooting of deployed applications within development and production environments. Execute … Ability to work 100% on-site Detail oriented Good verbal and written communication skills Candidates who have any of the following skills will be preferred: Strong experience with software vulnerability scanning with static and dynamic code analysis Experience with software vulnerabilityassessment and remediation using SAST/DAST and tools like Sonarqube Strong experience with software package More ❯
Salford, England, United Kingdom Hybrid / WFH Options
Premier Group
Essentials+, ISO 27001, CIS, PCI-DSS Experience with EDR/XDR platforms - Crowdstrike Falcon Proficiency with Microsoft security stack (Defender, Intune, MFA, etc.) Solid grasp of patch management and vulnerabilityassessment Ability to interpret logs and alerts to assess threat response Clear communicator with the ability to explain risk to non-technical teams Desirable Skills Familiarity with SIEM More ❯
manchester, north west england, united kingdom Hybrid / WFH Options
Premier Group
Essentials+, ISO 27001, CIS, PCI-DSS Experience with EDR/XDR platforms - Crowdstrike Falcon Proficiency with Microsoft security stack (Defender, Intune, MFA, etc.) Solid grasp of patch management and vulnerabilityassessment Ability to interpret logs and alerts to assess threat response Clear communicator with the ability to explain risk to non-technical teams Desirable Skills Familiarity with SIEM More ❯
They are currently seeking a DeFi Security Engineer for their London office. This role focuses on supporting the security of their Crypto trading infrastructure and OTC platform Responsibilities: Conduct vulnerability assessments, threat modeling, and penetration testing across infrastructure, smart contracts, and OTC-specific components Lead system hardening, network segmentation, identity management, and rapid incident response for DeFi and OTC More ❯
They are currently seeking a DeFi Security Engineer for their London office. This role focuses on supporting the security of their Crypto trading infrastructure and OTC platform Responsibilities: Conduct vulnerability assessments, threat modeling, and penetration testing across infrastructure, smart contracts, and OTC-specific components Lead system hardening, network segmentation, identity management, and rapid incident response for DeFi and OTC More ❯