CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and More ❯
CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
CET Structures Limited
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … service quality Essential Skills Proven 3rd Line Support Experience with strong focus on Microsoft 365 stack Strong knowledge of managing Azure AD, conditional access, virtual networks, MFA, SSO, Identity management and subscription governance. In-depth experience administering Exchange Online, SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider … Risk Management, Defender for Cloud, Defender for Endpoint, Defender VulnerabilityManagement, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and More ❯
VA Minimum Requirements: U.S. Citizenship Must have an active TS/SCI clearance Must be able to obtain DHS Suitability 5+ years of directly relevant experience in cyber incident management or cybersecurity operations Knowledge of incident response and handling methodologies Having close familiarity with NIST 800-62 (latest revision), and FISMA standards as they pertain to reporting incidents. Knowledge … mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return- oriented attacks, and malicious code) Excellent oral and written communication skills BS Incident Management, Operations Management, Cybersecurity or related degree. HS Diploma with a minimum of 7-9 years of incident management or cyber security experience Duties & Responsibilities: Supporting the management of cyber incidents through the incident response lifecycle. Creating and maintaining routine reporting of cyber incidents in official systems of record, to include case management systems and ticketing. Coordinating with internal and external customers, partners, and stakeholders. Ingesting, validating, and evaluating information to determine optimal courses of action, to include providing response support to requesting entities. Updating and More ❯
cutting-edge, robust security framework that supports ongoing innovation efforts. The position provides essential oversight for the companys information security, cybersecurity, and data protection functions, encompassing policy governance, process management, procedural standards, training programs, and awareness initiatives. A subject matter expert who will shape our internal IT direction, ensuring both customer and employee protection while managing daily security operations. … within global organizations, ideally in enterprise consulting environments Proficiency in security frameworks including ISO27001, Cyber Essentials, SOC2, NIST CSF and CIS Extensive understanding of cybersecurity regulations, cloud security, identity management, data protection, security governance, risk management, and remediation planning Technical expertise: SaaS, Cloud platforms, SDLC, VulnerabilityManagement, Networking, IDAM Security vetting eligibility, ITSM/SIEM platform More ❯
Portchester, Hampshire, United Kingdom Hybrid / WFH Options
Computappoint
edge, robust security framework that supports ongoing innovation efforts. The position provides essential oversight for the company's information security, cybersecurity, and data protection functions, encompassing policy governance, process management, procedural standards, training programs, and awareness initiatives. A subject matter expert who will shape our internal IT direction, ensuring both customer and employee protection while managing daily security operations. … within global organizations, ideally in enterprise consulting environments Proficiency in security frameworks including ISO27001, Cyber Essentials, SOC2, NIST CSF and CIS Extensive understanding of cybersecurity regulations, cloud security, identity management, data protection, security governance, risk management, and remediation planning Technical expertise: SaaS, Cloud platforms, SDLC, VulnerabilityManagement, Networking, IDAM Security vetting eligibility, ITSM/SIEM platform More ❯
Portsmouth, Hampshire, England, United Kingdom Hybrid / WFH Options
Computappoint
edge, robust security framework that supports ongoing innovation efforts. The position provides essential oversight for the company's information security, cybersecurity, and data protection functions, encompassing policy governance, process management, procedural standards, training programs, and awareness initiatives. A subject matter expert who will shape our internal IT direction, ensuring both customer and employee protection while managing daily security operations. … within global organizations, ideally in enterprise consulting environments Proficiency in security frameworks including ISO27001, Cyber Essentials, SOC2, NIST CSF and CIS Extensive understanding of cybersecurity regulations, cloud security, identity management, data protection, security governance, risk management, and remediation planning Technical expertise: SaaS, Cloud platforms, SDLC, VulnerabilityManagement, Networking, IDAM Security vetting eligibility, ITSM/SIEM platform More ❯
London, Portchester, Hampshire, United Kingdom Hybrid / WFH Options
Computappoint
edge, robust security framework that supports ongoing innovation efforts. The position provides essential oversight for the company's information security, cybersecurity, and data protection functions, encompassing policy governance, process management, procedural standards, training programs, and awareness initiatives. A subject matter expert who will shape our internal IT direction, ensuring both customer and employee protection while managing daily security operations. … within global organizations, ideally in enterprise consulting environments Proficiency in security frameworks including ISO27001, Cyber Essentials, SOC2, NIST CSF and CIS Extensive understanding of cybersecurity regulations, cloud security, identity management, data protection, security governance, risk management, and remediation planning Technical expertise: SaaS, Cloud platforms, SDLC, VulnerabilityManagement, Networking, IDAM Security vetting eligibility, ITSM/SIEM platform More ❯
Minimum Requirements Knowledge and Skills: Proficient knowledge of Host Based Security Systems (HBSS) and the Assured Compliance Assessment Solution (ACAS) Experience with the use fo the DoD/DISA VulnerabilityManagement System (VMS) and Electronic Enterprise Mission Assurance Support Service (eMASS) Experience performing vulnerability/risk assessment analysis to support Assessment & Authorization (A&A). Understanding and … acquisition documents. Minimum years of experience: Up to two (2) years of Information Assurance/Cybersecurity (IA/CS) experience is required. Qualified candidates will have experience with Risk Management Framework (RMF), Up to two (2) years of experience with security controls and implementation delineated in Committee of National Security Systems Education: BS in Computer Science, Information Systems ManagementMore ❯
Government agencies and critical asset owners who experience cyberattacks, providing immediate investigation and resolution. This position will support one of our Government clients in Arlington, VA. Responsibilities Supporting the management of cyber incidents through the incident response lifecycle. Creating and maintaining routine reporting of cyber incidents in official systems of record, including case management systems and ticketing. Coordinating … summaries of ongoing operations and providing oral presentations for various levels of leadership. Maintaining knowledge objects in a system of record consistently and professionally. Supporting teams that apply risk management and protocols to evaluate risks and prioritize responses based on national security strategies (NCISS). Supporting teams conducting threat and vulnerabilitymanagement to recognize and categorize types … performing network security monitoring and/or security operations analysis, system administration, operating system hardening, cyber hygiene techniques, and cybersecurity defense policies, procedures, and regulations. Minimum Qualifications BS Incident Management, Operations Management, Cybersecurity, or related degree. HS Diploma with 7-9 incident management or cybersecurity experience 5+ years of directly relevant experience in cyber incident managementMore ❯
cybersecurity threat and security posture situational awareness for the enterprise. This opportunity is in anticipation of a future contract award! What you'll be doing: Oversee and enhance configuration management strategies for mission-critical systems that are essential to national security. Drive strategic initiatives, ensure compliance with rigorous standards, and collaborate with cross-functional teams to deliver innovative, secure … and efficient solutions. Develop and enforce a Cybersecurity Configuration Management Plan (CMP) aligned with DoD cybersecurity policies Integrate CM practices with cybersecurity objectives to ensure that systems remain secure, resilient, and compliant with DoD cybersecurity frameworks. Identify and document cybersecurity-related Configuration Items (CIs), such as: Operating systems, firewalls, and intrusion detection/prevention systems (IDS/IPS). … Critical security patches, configurations, and software baselines. Establish and maintain secure system baselines for hardware, software, and network configurations to mitigate vulnerabilities. Oversee cybersecurity-specific change management processes, ensuring all updates and modifications are reviewed for potential security impacts before implementation. Facilitate Patch Management: Track, test, and deploy security patches to eliminate vulnerabilities in a controlled and timely More ❯
approach to safeguarding critical systems and sensitive data. Monitor network traffic, system logs, and security alerts to identify potential threats, anomalies, or suspicious activities. Use Security Information and Event Management (SIEM) tools (e.g., Splunk, ArcSight, or QRadar) to aggregate and analyze security events. Investigate and escalate security incidents, including malware infections, phishing attempts, and unauthorized access. Respond to and … following established incident response protocols. Perform root cause analysis of security breaches and recommend remediation strategies. Coordinate with internal and external stakeholders to contain and recover from incidents. Conduct vulnerability scans using tools like Nessus, Qualys, or OpenVAS and report findings. Collaborate with IT and engineering teams to prioritize and remediate vulnerabilities. Assist in conducting risk assessments and security … and cybersecurity threats (e.g., malware, phishing, ransomware). Experience with scripting or automation tools (e.g., Python, PowerShell) is a plus. Proficiency with cybersecurity tools, such as SIEM (Splunk, ArcSight), vulnerabilitymanagement platforms (Tenable, Qualys), and IAM systems. Experience with secure software development and DevSecOps practices. Original Posting: April 8, 2025 For U.S. Positions: While subject to change based More ❯
focus on Security Governance, Risk and Compliance activities that help underpin the maturity of our information security programme, primarily: Controls & Risk assessments and improvements Access Governance Third-party risk management Employee training and awareness Asset and vulnerabilitymanagement Cyber Essentials, ISO 27001 and other frameworks Supporting various operational security initiatives such as email security/phishing, environment … team and interpath colleagues. Strong passion for Cyber with the desire to develop and grow. Ability to multitask, prioritise workload, and meet deadlines. Great communication skills and great stakeholder management skills. Be a "people person". Desirable Criteria: This is an entry-level role, but previous experience in the field will be beneficial. Work experience, placements or internships that More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Suits Me Limited
and external audits by providing evidence of controls and contributing to audit readiness activities. Collaborate with the compliance and risk teams to ensure IT operations meet regulatory obligations. Support vulnerabilitymanagement efforts, including patching and system hardening. Assist in maintaining secure and efficient identity and access management practices, including integration with M365 and Azure AD. Contribute to … skills and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also Have More ❯
Own service performance metrics and embed proactive capacity planning across infrastructure and services. • Proactive Issue Resolution: Lead root-cause analysis, implement preventive controls, and champion continuous service improvement. • Service Management Governance: Oversee ITIL processes and support internal audits with robust systems and policies. • Incident & Change Leadership: Manage incidents and changes efficiently, providing strategic oversight on high-priority issues. • Financial … and manage Opex/Capex budgets, track spend, and identify cost-saving opportunities. You ll also lead on: • Cybersecurity Operations: Partner with our vCISO to manage 24 7 monitoring, vulnerabilitymanagement, and secure-by-design principles. • Supplier & Contract Management: Oversee MSPs, cloud, and hardware partners, ensuring value-for-money and service excellence. • Asset & Licensing Management: Maintain … leader with a passion for operational excellence and a proven track record in IT service delivery. You ll bring: Experience & Expertise • 5+ years in a senior IT operations, service management, or IT director role. • Proven ownership of 24 7 production environments with >99.9% availability. • Strong experience managing multi-vendor ecosystems and regulated environments. • Deep technical knowledge of enterprise infrastructure More ❯
Own service performance metrics and embed proactive capacity planning across infrastructure and services. • Proactive Issue Resolution: Lead root-cause analysis, implement preventive controls, and champion continuous service improvement. • Service Management Governance: Oversee ITIL processes and support internal audits with robust systems and policies. • Incident & Change Leadership: Manage incidents and changes efficiently, providing strategic oversight on high-priority issues. • Financial … and manage Opex/Capex budgets, track spend, and identify cost-saving opportunities. You’ll also lead on: • Cybersecurity Operations: Partner with our vCISO to manage 24×7 monitoring, vulnerabilitymanagement, and secure-by-design principles. • Supplier & Contract Management: Oversee MSPs, cloud, and hardware partners, ensuring value-for-money and service excellence. • Asset & Licensing Management: Maintain … leader with a passion for operational excellence and a proven track record in IT service delivery. You’ll bring: Experience & Expertise • 5+ years in a senior IT operations, service management, or IT director role. • Proven ownership of 24×7 production environments with >99.9% availability. • Strong experience managing multi-vendor ecosystems and regulated environments. • Deep technical knowledge of enterprise infrastructure More ❯
Functional Domain Responsibility: Previous work experience managing below three or more Cybersecurity delivery engagements o Audit principles and associated compensating controls o Enterprise Security architecture o Cloud Security o VulnerabilityManagement o E-Mail security o Web Application Firewall o Cyber Incident Management (CERT) Delivery Operations & Excellence: Manage & maintain steady state global delivery operations (Green) Manage Operational … Service Quality Review governance Provides leadership & direction to Delivery team in complex problems and creates innovative solutions Facilitates Business Continuity for the account during regional/location outages Team Management Responsible for Performance Appraisal for direct reports Support Delivery Head to manage team functions viz. resource selection, allocation, availability planning, effort estimation, utilization & attrition management Tracking individual and …/weekly basis and continually improve them efficiently and effectively Ensure that the productivity goals for the team are met, including service level, utilization, and customer satisfaction Customer Relationship Management Acts as a trusted security advisor to the clients Interlock with Management to define operations strategy and action plan based on Customer feedback & CSAT result Analyzing customer requirements More ❯
world. We work with the companies that are Britain's economic engine - ambitious, entrepreneurially-spirited and high growth businesses that fuel the economy - and directly advise the owners and management teams that lead them. We'll broaden your horizons To ensure our services and applications are fit for the modern market, our IT team collaborates with every department. They … Lead Software Security Engineer to join our team. You will have a strong background in software development, security, and operations. This role is required to support the Digital Product Management team in embedding security requirements and best practices into new Digital Products and Services. You will work closely with the Digital Product Management and IT Security teams to … such as Powershell, YAML, JASON, etc. Collaborate with development teams to integrate security best practices into the secure software development lifecycle (SDLC) and ensure products are built securely Oversee vulnerabilitymanagement and remediation efforts, including leading responses to pen test findings and security assessments Experience conducting risk assessments and threat modelling for software development and advise where necessary More ❯
knowledge of the UK Telecoms Security Act would be advantageous to your application. You will develop and maintain the cyber security architecture and will have proven experience with compliance, vulnerabilitymanagement, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform More ❯
Gemini Industries Inc. provides technical, management and operations services to support National Security projects. We provide rapid response to the critical needs of our customers and those they serve. We perform analyses and develop operations plans to anticipate and prepare for the future. And we deliver advanced technology to improve our customer's success in executing its mission. Gemini … but are not limited to: •Assist with coordination of cybersecurity related processes and activities for AAZ Information Systems and related interfaces. The processes include: bare not limited to, Risk Management Framework (RMF) and system authorization, Cyber Incident Handling, System Life Cycle Management Processes (e.g. Engineering Change and Configuration Management), VulnerabilityManagement, Malware Protection, Security Assessments … cybersecurity assessments, security impact analysis and system authorization of AAZ information Systems per ISSM guidance. •Assist with maintaining an Information Assurance Program and ensure compliance with DODO 8510.01 - Risk Management Framework (RMF) for DOD IT. • Develop system security and information assurance documentation consistent with the standards above to support system assessment and authorization, as well as interim authority and More ❯
ensuring the security and integrity of systems and data. Key Responsibilities: Serve as the primary point of contact for security-related matters, including but not limited to threat detection, vulnerabilitymanagement, and incident response. Conduct regular security assessments and audits to identify potential risks and vulnerabilities in our systems and infrastructure. Develop and implement robust security policies, procedures … system development life cycle Assessing security needs, implementing security solutions and determining potential risk by evaluating cybersecurity compliance protocols Understanding Security Categorization and Control standard Understanding of the Risk Management Framework Qualifications: Proven experience in information security roles, including Information Systems Security Engineer, Information Systems Security Officer, and Security Systems Engineer. Strong analytical skills and attention to detail. Excellent More ❯
City of London, London, United Kingdom Hybrid / WFH Options
FIND | Creating Futures
at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetration testing and vulnerabilitymanagement Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why Join? Be at More ❯
at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetration testing and vulnerabilitymanagement Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why Join? Be at More ❯
payments security. Your Day-to-Day Alert Triage: Analyze SIEM and threat-intelligence feeds to spot anomalies. Threat Hunting: Use forensic tools to track indicators of compromise across networks. VulnerabilityManagement: Run scans, prioritize remediation tasks, and validate fixes. Incident Response Support: Coordinate with SRE and DevOps teams to contain breaches. Report & Recommend: Draft concise, actionable incident summaries More ❯
Employment Type: Full-Time
Salary: £36,000 - £43,000 per annum, Negotiable, OTE
and manage Cybersecurity tools that enable the delivery of cyber security services. These include: security filtering, network monitoring, host based monitoring, event logging and correlation, and scanning tools. Cybersecurity VulnerabilityManagement (IAVM) and DISA VDP Reviews Conducts cyber threat intelligence analysis, develops correlation techniques, correlates actionable cybersecurity events, participates in the coordination of resources during incident response efforts More ❯