Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
activities, including incident monitoring and response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits. Gap Assessments: Facilitate and/or conduct internal gap assessments and audit readiness … of compliance processes. Audit Findings: Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security Monitoring: Use tools such as … and implementing recommendations to improve the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. VulnerabilityManagement: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong expertise in audit and compliance More ❯
infrastructure. You'll be hands-on, designing, implementing, and managing top-notch security solutions across all our cloud environments. You'll also play a key part in developing our vulnerabilitymanagement program, working closely with our operational support, infrastructure, and development teams. Plus, you'll be right in the thick of security event monitoring, threat intelligence, and incident … management - keeping us one step ahead! What you'll be doing: Delivering SOC Capabilities: You'll be a key team member in delivering ongoing Security Operations Centre (SOC) capabilities for the business. Driving Automation: You'll push for security automation wherever possible and play a big part in evolving our security tooling and services. Policy & Standards: You'll champion … firewalls, WAF, anti-virus, and O365 compliance & security centre . Familiarity with NIST (CSF Framework 2.0), ISO 27001, PCI-DSS, and GDPR . Experience operating and managing SIEM solutions , vulnerabilitymanagement tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and/or SecOps oriented teams More ❯
CaptivateIQ is the leading Sales Performance Management solution, recognized by Forrester and G2, and trusted by customers including Affirm, Gong, and Figma. With solutions for Sales Planning and Incentives, we help revenue teams automate processes, hit revenue targets, and adapt with business change, ultimately driving efficient growth. It's time to rethink ROI - your return on incentives - with CaptivateIQ. … and remediate application and cloud security vulnerabilities (e.g., XSS, SSRF, CSRF, CORS, SQL Injection, broken authentication/authorization, encryption flaws). Provide expert guidance on secure coding practices, common vulnerability classes (e.g., OWASP Top 10), and threat modeling for modern web applications. Conduct security reviews of design and architecture documents; lead threat modeling exercises using frameworks such as STRIDE … tooling (e.g., Burp Suite, ZAP, Amass, Nmap). Assess and mitigate static (SAST) and dynamic (DAST) vulnerabilities across services and components. Evaluate, implement, and maintain security tooling to support vulnerabilitymanagement, secure development, and event detection workflows. Define and track metrics related to application security, vulnerability remediation, detection coverage, and incident response effectiveness. Support compliance initiatives (e.g. More ❯
Northampton, Northamptonshire, England, United Kingdom Hybrid / WFH Options
PLANET RECRUITMENT SERVICES LTD
security alerts from various tools such as WAF, SIEM, IDS/IPS, firewalls, and endpoint protection platforms. Investigate and respond to security incidents, including containment, eradication, and recovery. Conduct vulnerability assessments and coordinate remediation efforts. Perform threat hunting and behavioural analysis using threat intelligence and analytics tools. Maintain and tune security tools, detection rules, and automation scripts. Support compliance … initiatives (e.g., ISO 27001, NIST, GDPR). Document incidents, procedures, and technical findings clearly and accurately. Ensure timely management and resolution of tickets, both internal/partner and third-party suppliers. Remain up to date with the latest security threats, trends, and technologies. Skill Requirements: Microsoft Defender Extended Detection &Response (XDR): Familiarity with Microsoft Security Portfolio of products. Network … Security: Understanding of TCP/IP, DNS, VPNs, firewalls, and packet analysis (e.g., Wireshark). Threat Intelligence: Use of platforms like MISP, Recorded Future, or ThreatConnect. VulnerabilityManagement: Experience with tools like Tenable Nessus, Qualys. Scripting &Automation: Proficiency in Python, PowerShell, or Bash for automating security tasks. Cloud Security: Knowledge of MS Azure. Privileged/Identity& Access ManagementMore ❯
is for you. What you will do: Develop and implement proactive security strategies, policies, and procedures to protect our systems, networks, and data assets. Lead regular security assessments, including vulnerability scans and penetration tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents … the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong capability … in risk assessment, vulnerabilitymanagement, and data informed decision-making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in scripting and programming (i.e., Python More ❯
enjoys both technical implementation and supporting security frameworks such as Cyber Essentials. You will play a key role in deploying Microsoft security solutions and supporting client audits, assessments, and vulnerability remediation efforts. Responsibilities include: Delivering Microsoft security technologies including Defender XDR, Sentinel, and Endpoint Detection andamp; Response Supporting Cyber Essentials and Cyber Essentials Plus audits and assessments Acting as … an escalation point for cyber incidents, security alerts, and engineering tasks Conducting vulnerability remediation and assessments (infrastructure and application level) Assisting with presales engagements and technical scoping Onboarding clients onto security management platforms Providing reporting, analytics, and technical support to clients and internal teams What will you need? Minimum 2 years' experience in a cyber security role, ideally … Meraki, Fortinet, WatchGuard) Excellent communication and client service skills Self-motivated and detail-oriented with strong problem-solving abilities What would be desirable? Experience deploying Tenable or Qualys for vulnerabilitymanagement Knowledge of email security tools (e.g., Mimecast, Egress) Understanding of Azure Firewall and Defender for Cloud/Cloud Apps Experience conducting offensive security/web application assessments More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Searchability (UK) Ltd
enjoys both technical implementation and supporting security frameworks such as Cyber Essentials. You will play a key role in deploying Microsoft security solutions and supporting client audits, assessments, and vulnerability remediation efforts. Responsibilities include: Delivering Microsoft security technologies including Defender XDR, Sentinel, and Endpoint Detection & Response Supporting Cyber Essentials and Cyber Essentials Plus audits and assessments Acting as an … escalation point for cyber incidents, security alerts, and engineering tasks Conducting vulnerability remediation and assessments (infrastructure and application level) Assisting with presales engagements and technical scoping Onboarding clients onto security management platforms Providing reporting, analytics, and technical support to clients and internal teams What will you need? Minimum 2 years' experience in a cyber security role, ideally within … Meraki, Fortinet, WatchGuard) Excellent communication and client service skills Self-motivated and detail-oriented with strong problem-solving abilities What would be desirable? Experience deploying Tenable or Qualys for vulnerabilitymanagement Knowledge of email security tools (e.g., Mimecast, Egress) Understanding of Azure Firewall and Defender for Cloud/Cloud Apps Experience conducting offensive security/web application assessments More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Searchability
enjoys both technical implementation and supporting security frameworks such as Cyber Essentials. You will play a key role in deploying Microsoft security solutions and supporting client audits, assessments, and vulnerability remediation efforts. Responsibilities include: Delivering Microsoft security technologies including Defender XDR, Sentinel, and Endpoint Detection & Response Supporting Cyber Essentials and Cyber Essentials Plus audits and assessments Acting as an … escalation point for cyber incidents, security alerts, and engineering tasks Conducting vulnerability remediation and assessments (infrastructure and application level) Assisting with presales engagements and technical scoping Onboarding clients onto security management platforms Providing reporting, analytics, and technical support to clients and internal teams What will you need? Minimum 2 years' experience in a cyber security role, ideally within … Meraki, Fortinet, WatchGuard) Excellent communication and client service skills Self-motivated and detail-oriented with strong problem-solving abilities What would be desirable? Experience deploying Tenable or Qualys for vulnerabilitymanagement Knowledge of email security tools (e.g., Mimecast, Egress) Understanding of Azure Firewall and Defender for Cloud/Cloud Apps Experience conducting offensive security/web application assessments More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Techwaka
with stakeholders to maintain compliance with industry standards such as ISO27001, Cyber Essentials Plus, PCI/DSS Stay ahead of cyber threats, maintaining and improving security monitoring and risk management processes Support vulnerabilitymanagement, penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks More ❯
be advantageous to your application, as would CISSP and/or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerabilitymanagement, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ikhoi Recruitment
Solutions for our clients together with assisting our Chief Information Security Officer with Cyber Essentials and Cyber Essentials Plus Audits and Assessment. You will be reporting to the Project Management Office Team on a Daily Basis and work with other members of the Cyber Security Team which also includes a Solution Lead, Cyber Security SOC Analyst and Cyber Security … including: Microsoft Defender XDR Microsoft Sentinel SIEM Microsoft Defender for Endpoint/Business Azure Firewall Microsoft Defender for Cloud/Cloud Apps Microsoft Defender for Office 365 Deployment and management of Endpoint Detection and Response solutions including Sentinel One Deployment and management of networking solutions including firewalls, switches and access points including Cisco Meraki, Fortinet and Watchguard Deployment … of vulnerabilitymanagement solutions including Tenable and Qualys Deployment and management of email security solutions including Mimecast and Egress Main Tasks and Responsibilities Assisting with Cyber Essentials and Cyber Essentials Plus audits and assessments Undertaking technical vulnerability remediation Providing escalation support for Cyber Security Incidents and Alerts from the SOC Team Providing Security Reporting and Analytics More ❯
We are seeking experienced IT and Cyber Risk Management Professionals to support organizations in the financial sector, in strengthening their IT security posture. As a key part of the second line of defense, you will oversee risk management processes and provide independent validation and assurance to ensure that the first line is adhering to IT and cybersecurity standards. … on IT and cybersecurity risk management. Roles & Responsibilities: Monitor and assess IT and cybersecurity risks across the organization, focusing on second-line oversight of the first line's risk management practices. Conduct independent risk assessments and challenge the first line's processes and control effectiveness across applications, business solutions, assets, and third-party relationships. Review and validate risk assessments … compliance. Conduct audits and provide oversight of IT and cybersecurity practices within the first line of defense, especially in third-party risk management. Produce independent risk reports for senior management and governance committees, synthesizing security risks and providing recommendations for risk mitigation. Advise on risk management strategies and propose improvements to enhance the organization's security posture and More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
ECS Resource Group Ltd
those related to physical security. Maintain and enhance the security posture of servers for both existing and new applications, on-premise and in Azure cloud environments. Monitor and manage vulnerability scanning tools, address findings, and coordinate remediation efforts with infrastructure and development teams. Support the development, testing, and annual validation of disaster recovery and backup plans. Create and maintain … To Be Considered for This Role, You Will Need: Cybersecurity Experience: Demonstrated experience in implementing and managing security controls across hybrid environments. Familiarity with endpoint protection, threat detection, and vulnerabilitymanagement tools. Incident Response & Problem Solving: Ability to respond swiftly and effectively to security incidents. Skilled in structured analysis and incident remediation to ensure rapid recovery. Threat Awareness … Clear and confident verbal communication skills, including the ability to explain technical information to non-technical audiences. Proficient in written communication, including technical documentation, reports, and presentations. Strong time management and organisational skills to balance multiple priorities and meet deadlines. Capable of managing competing demands and shifting priorities in line with business objectives. High attention to detail and a More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Xpertise Recruitment Ltd
Security Lead London | Hybrid - 3 days in-office per week Up to £90,000 + ~20% Bonus + 10% Pension Are you passionate about cloud security and cyber risk management? A leading international business has completed a major IT transformation and is now expanding its technology team. They're looking for a highly skilled Cloud Security Lead to help … of experience in technical cyber roles (SOC, security engineering, threat analysis) Minimum 3-5 years working in cloud environments Deep knowledge of Microsoft Azure (and ideally AWS) Expertise in vulnerabilitymanagement, incident response, and cyber risk triage Strong understanding of cloud security principles and the shared responsibility model Familiarity with frameworks like MITRE ATT&CK and Zero Trust More ❯
Offensive security and exploitation techniques. Digital Forensics : Host, network, or memory-based investigation. Threat Hunting : Detection engineering and hypothesis-driven threat investigation. Knowledge of modern security tooling (SIEM, EDR, vulnerabilitymanagement, SOAR). Strong documentation and communication skills; fluent in written and spoken English. Diversity, Inclusion, and Equal Opportunity We hire, promote, and compensate employees based on their More ❯
have now closed. We're seeking an experienced Cyber Defence Manager to safeguard our digital infrastructure View job & apply Location: Frankfurt Salary: 145,000 + Benefits Sector: Banking, Asset Management & Funds We're hiring an experienced IAM Lead to take ownership of identity governance and access controls View job & apply Location: Frankfurt Salary: 145000 + Benefits Job type: Permanent … Sector: Banking, Asset Management & Funds A growing investment firm headquartered in Frankfurt is looking to appoint a senior IT Governance View job & apply Location: Fully Remote Job type: Contract Position Overview: Fast growing FinTech seeking a highly motivated and technically capable DevSecO View job & apply SOC Manager Location: Fully Remote Job type: Contract Position Overview: Rapidly growing FinTech company … seeks an Incident Response Manager to join their CIRT team. This role plays View job & apply Location: Frankfurt Salary: 120,000 + Benefits Job type: Permanent Sector: Banking, Asset Management & Funds A fast-growing investment firm based in Frankfurt is looking for a motivated IT Governance & View job & apply Technical IAM Consultant Location: London when needed Job type: Contract More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
leonardo company
support the development and delivery of the products (whilst considering cyber resilience) with the ambition to meet the Secure by Design principles. You'll ensure the development, implementation, and management of security protocols, tools, and practices on maturing products meets the appropriate standards and Def Cons. Working closely with the Integrated Product Team (IPT) frameworks with specialists from other … wider Product IA and Security community across Leonardo Electronics UK, influencing corporate policies, processes and guidance. Managing architects such as the generation of Technical Risk Assessments, Security Design and Management Documentation, and Remediation Action Plans. As well as this, you'll oversee the generation and approval of Product Security and Information Assurance Management Plan; Product Design Reviews; generation … of Product Security deliverable information (Product Integrity certificates, product security cases.) What you will be doing as a Lead Security Engineer; Risk Management: Perform risk assessments to identify potential security risks and work product development teams to implement mitigations and preventive measures. Incident Response & Mitigation: Assess and maintain the Incident Response Plan, lead the response to security incidents and More ❯
a crucial role in leading and managing complex Cyber Security projects, ensuring the successful execution of initiatives that safeguard our clients' organisations against evolving threats. Leveraging your extensive project management expertise and technical knowledge, you will partner with and contribute to the enhancement of the overall Cyber Security posture and resilience of our clients, collaborating with cross-functional teams … and resource allocation approaches. Conduct comprehensive risk assessments and develop mitigation strategies to address potential security threats and project risks. Utilise industry frameworks and standards to ensure robust risk management practices. Oversee and manage projects end-to-end in line with the Association for Project Management guidance. Manage projects such as Security Framework Audits and Implementation, Cyber Strategy … Cyber Risk Management, Data Privacy, Offensive Security, Security Architecture, and Cloud Security & Engineering. Lead the onboarding process for Managed Security Services including Managed Detection & Response, Cyber Threat Intelligence, and VulnerabilityManagement Services. Collaborate with technical teams to ensure seamless integration of managed services within clients' environments. Build and maintain strong relationships with internal teams and clients, serving More ❯
Boston, Massachusetts, United States Hybrid / WFH Options
Digital Prospectors
individual with a passion for defending complex digital environments from sophisticated threats. The successful candidate will be part of a dedicated team responsible for executing and advancing a comprehensive VulnerabilityManagement Program supporting mission-critical systems in a high-security environment. Essential Duties and Responsibilities (but not limited to): • Conduct proactive cyber monitoring and vulnerabilitymanagement activities across a diverse enterprise IT environment. • Support the execution of vulnerability scanning, analysis, reporting, and remediation efforts, using tools such as Tenable Security Center (or equivalent platforms). • Collaborate with cross-functional teams to drive vulnerability remediation plans and lead working groups to assess, prioritize, and track mitigation efforts. • Collect, analyze, and validate open-source intelligence … enterprise intrusion detection systems (IDS/IPS), host/network security tools, firewalls, HIPS, WAFs, and event correlation. • Proven experience in cybersecurity operations, including threat analysis, incident response, and vulnerability remediation across multiple OS platforms (Linux, Windows, Mac). • Technical expertise in at least one scripting/programming language: Python, PowerShell, Bash, C++, etc. • Familiarity with cyber threat intelligence More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Better Days Recruitment Ltd
cyber and information security strategy ensuing it is aligned with ISO 27001, GDPR and Cyber essentials. Combining strong information security experience with hands-on technical knowledge of SIEM, EDR, vulnerabilitymanagement and incident response. You will have the ability to translate technical risk into clear business advice. This is a great permanent opportunity to demonstrate your strong experience … and great benefits on offer. Skills/Experience and attributes: A minimum of 4-5 years experience working in a similar role Strong understanding of information security principles, risk management and compliance (GDPR, ISO 27001 and Cyber Essentials) Ability to talk technically then non-technically to the business Solid understanding of IT Infrastructure eg; networking, Active Directory and endpoint More ❯
Crawley, West Sussex, United Kingdom Hybrid / WFH Options
Better Days Recruitment Ltd
cyber and information security strategy ensuing it is aligned with ISO 27001, GDPR and Cyber essentials. Combining strong information security experience with hands-on technical knowledge of SIEM, EDR, vulnerabilitymanagement and incident response. You will have the ability to translate technical risk into clear business advice. This is a great permanent opportunity to demonstrate your strong experience … and great benefits on offer. Skills/Experience and attributes: A minimum of 4-5 years’ experience working in a similar role Strong understanding of information security principles, risk management and compliance (GDPR, ISO 27001 and Cyber Essentials) Ability to talk technically then non-technically to the business Solid understanding of IT Infrastructure eg; networking, Active Directory and endpoint More ❯
Employment Type: Permanent
Salary: £65000 - £70000/annum Great company benefits
CISSP, CISM, CISA, CRISC, or CGEIT. Proven experience in leading IT cyber security teams, with a strong emphasis on operational security and incident response. Extensive knowledge of IT risk management, threat intelligence, IAM and vulnerability management. Familiarity with key regulatory and compliance frameworks, including ISO 27001, GDPR, NIST, and CyberEssentials. Ability to articulate complex technical risks in clear More ❯
Yorkshire and the Humber, United Kingdom Hybrid / WFH Options
Harvey Nash
CISSP, CISM, CISA, CRISC, or CGEIT. Proven experience in leading IT cyber security teams, with a strong emphasis on operational security and incident response. Extensive knowledge of IT risk management, threat intelligence, IAM and vulnerability management. Familiarity with key regulatory and compliance frameworks, including ISO 27001, GDPR, NIST, and CyberEssentials. Ability to articulate complex technical risks in clear More ❯
external regulatory requirements. Other responsibilities include: Security Analysis and Improvement: Continuously analyse our security systems for potential improvements, ensuring that our defences remain at the forefront of cybersecurity practices. VulnerabilityManagement: Proactively identify, assess, and remediate security vulnerabilities to maintain the integrity and confidentiality of our customer data. Security Automation: Automate security processes and procedures to enhance efficiency … practices. Secure Design: Collaborate with development teams to ensure that web and mobile front-ends, as well as microservice architectures, are designed with robust security measures in mind. Risk Management and Compliance: Assist teams in ensuring that products and services are secure by design, align with the organisation's risk appetite, and comply with all relevant group standards, policies … knowledge with any combination of the following: Threat modelling and risk assessments, Working knowledge of secure coding principles (OWASP and OWASP mobile, SANS ), Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2), Working knowledge of cryptography including encryption, signing and digital certificates, Principles of securing mobile applications and More ❯