an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance VulnerabilityManagement (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance VulnerabilityManagement (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
services provider that offers a broad spectrum of capabilities across digital workplace, infrastructure, cloud/datacenter, and cybersecurity, with a focus on solutioning, service delivery, and end-to-end management for small to mid-size US clients. Below is a detailed, synthesized job-description-style profile for a Solution Consultant who could lead and own the practice for such … to SMB/MSP needs. Service delivery leadership: Define and enforce service delivery frameworks, SLAs, and operational playbooks; ensure seamless transition from presales to delivery; oversee service continuity, incident management, change control, and problem management. Platform and technology scope: Digital workplace services (end-user devices, collaboration tools, unified communications, remote/mobile workforce enablement); infrastructure and network (LAN/… WAN, SD-WAN, data-center design, virtualization, storage, backup); cloud and datacenter (IaaS/PaaS, public, private, hybrid architectures; migration and modernization); cybersecurity (identity, endpoints, network, identity & access management, threat detection, incident response); application support and managed services for critical business applications. Security and compliance: Build security-by-design into solution proposals; incorporate best practices for data protection, vulnerabilityMore ❯
City of London, London, United Kingdom Hybrid/Remote Options
TECEZE
services provider that offers a broad spectrum of capabilities across digital workplace, infrastructure, cloud/datacenter, and cybersecurity, with a focus on solutioning, service delivery, and end-to-end management for small to mid-size US clients. Below is a detailed, synthesized job-description-style profile for a Solution Consultant who could lead and own the practice for such … to SMB/MSP needs. Service delivery leadership: Define and enforce service delivery frameworks, SLAs, and operational playbooks; ensure seamless transition from presales to delivery; oversee service continuity, incident management, change control, and problem management. Platform and technology scope: Digital workplace services (end-user devices, collaboration tools, unified communications, remote/mobile workforce enablement); infrastructure and network (LAN/… WAN, SD-WAN, data-center design, virtualization, storage, backup); cloud and datacenter (IaaS/PaaS, public, private, hybrid architectures; migration and modernization); cybersecurity (identity, endpoints, network, identity & access management, threat detection, incident response); application support and managed services for critical business applications. Security and compliance: Build security-by-design into solution proposals; incorporate best practices for data protection, vulnerabilityMore ❯
roadmap that you will shape. What you'll be doing Application Security (AppSec) : Driving secure development practices, code analysis, and threat modelling. Security Operations (SOC) : Overseeing monitoring, incident response, vulnerabilitymanagement, and operational resilience. Governance, Risk & Compliance (GRC) : Leading our efforts to achieve and maintain compliance with PCI, GDPR, SOC2, and ISO27001. Vendor Security : Spearheading due diligence and … our Vendor Governance Forum. Policies & Assurance : Defining and enforcing security standards, collaborating with IT Ops and Platform Engineering on execution, and providing assurance to stakeholders, customers, and regulators. Risk Management : Escalating material risks directly to the CTO and other risk functions. Culture & Training : Promoting a secure-by-design culture through training, awareness, and best practices across the company. What … we're looking for We're seeking an experienced security leader who is comfortable with: Building a team : You have prior management experience and a proven track record of growing a collaborative and cross-functional Security team. Scaling AppSec : You've owned and scaled a robust Application Security program, including secure development, code analysis, and threat modelling. Running Security More ❯
of cyber security within one of the UK's most dynamic digital infrastructure organisations? We're looking for an Information Security Manager to own and evolve our Information Security Management System (ISMS) and drive alignment with ISO 27001:2022 . This is your chance to combine strategic influence with hands on impact - protecting critical assets, leading transformation, and championing … a security first culture across the business. You'll collaborate closely with teams across IT, Legal, Procurement, and Operations , acting as the go to expert for information assurance, incident management, and regulatory compliance . What You'll Be Doing Lead and continuously improve our ISMS Manage ISO 27001 certification, surveillance audits, and compliance activities Oversee cyber risk management … an enterprise ISMS and leading ISO 27001 audits Strong understanding of cyber threats and cloud security (Azure/M365) Sound knowledge of GDPR and relevant regulatory frameworks Experience in vulnerabilitymanagement, penetration testing, and supplier assurance Excellent communication skills with the ability to influence and engage stakeholders Confident leading governance forums and promoting a security first mindset Familiarity More ❯
understanding of how humans are interacting and using it. Automation can then replicate and improve these actions independently. Complexio is a joint venture between Hafnia, in partnership with Marfin Management, C Transport Maritime, Trans Sea Transport and BW Epic Kosan and Símbolo We are looking for a Security & Compliance Speciallist to own and drive our security and compliance requirements. … engaging senior stakeholders. Monitor changes in relevant compliance frameworks (e.g., CIS Benchmarks, EU AI Act, GDPR) and adapt processes accordingly. Operational Security Oversee day-to-day security operations, including vulnerabilitymanagement, access reviews, and incident response readiness. Provide insights and triage signals from security tooling (SAST, DAST, dependency scanning, SIEM). Work hands-on to perform internal security … protection posture in customer and partner discussions. Provide clear and confident explanations of controls, certifications, and processes during due diligence. Contribute to security documentation for customer-facing materials. Risk Management & Strategy Perform regular risk assessments and maintain the company’s risk register. Translate technical risks into business context to enable leadership decisions. Proactively identify emerging security and compliance risks More ❯
You’ll Do Lead and investigate high-impact cyber security incidents across global customer environments. Proactively hunt for threats, triage alerts, and identify anomalous behaviours before they escalate. Manage vulnerability assessments end-to-end, driving remediation outcomes with customers and internal teams. Optimise the Microsoft Security Stack: Sentinel, Defender (for Endpoint/Identity), Purview, and XDR. Support Zero Trust … build detections, correlations, and meaningful insights. Experience centralising log sources and onboarding new tools and data feeds into a SIEM/SOAR platform. Strong understanding of threat hunting methodologies, vulnerabilitymanagement, and incident response. Knowledge of frameworks: ISO27001, NIST CSF, SOC2, Cyber Essentials Plus. Comfortable adapting to unfamiliar tooling and integrating new technologies quickly. Why Join? Work at More ❯
Reading, Berkshire, England, United Kingdom Hybrid/Remote Options
Hays Specialist Recruitment Limited
it's a mission-critical role at the heart of our cyber security strategy. As Operational Security Manager, you'll take ownership of our security operations, overseeing threat intelligence, vulnerabilitymanagement, incident response and the performance of our outsourced 24/7 SOC. You'll work closely with internal technology teams to embed security into every aspect of More ❯
City of London, London, United Kingdom Hybrid/Remote Options
DVF Recruitment
days in London per week* What You’ll Do Build the SecOps team from the ground up and manage/mentor the team. Lead the implementation, optimisation, and management of cutting-edge security tools like CrowdStrike, Palo Alto, and Mimecast. Take ownership of our cyber defence posture from incident response and vulnerabilitymanagement to WAFs, DDoS protection More ❯
days in London per week* What You’ll Do Build the SecOps team from the ground up and manage/mentor the team. Lead the implementation, optimisation, and management of cutting-edge security tools like CrowdStrike, Palo Alto, and Mimecast. Take ownership of our cyber defence posture from incident response and vulnerabilitymanagement to WAFs, DDoS protection More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Career Legal
days in London per week* What You’ll Do Build the SecOps team from the ground up and manage/mentor the team. Lead the implementation, optimisation, and management of cutting-edge security tools like CrowdStrike, Palo Alto, and Mimecast. Take ownership of our cyber defence posture from incident response and vulnerabilitymanagement to WAFs, DDoS protection More ❯
London, England, United Kingdom Hybrid/Remote Options
Focus on SAP
architecture, integrations, and platform governance while influencing strategic security decisions across the organisation. Key Responsibilities: Lead the architecture and design of ServiceNow SecOps capabilities, including: Security Incident Response (SIR) Vulnerability Response (VR) Threat Intelligence Configuration Compliance Define secure processes and automation across vulnerabilitymanagement and incident response. Integrate ServiceNow SecOps with cybersecurity platforms (SIEM, SOAR, EDR, CMDB … platform adoption and maturity. Key Skills: Proven background as a ServiceNow Architect with strong delivery experience across SecOps and/or IRM. Deep understanding of security operations , incident response, vulnerability lifecycle, and tool integrations. Hands-on expertise with ServiceNow configuration, scripting, workflows, CMDB, Discovery, and integrations (REST/SOAP, MID Server) . Experience supporting organisations with critical infrastructure (energy More ❯
Security Site Lead works across multiple technical and business areas to facilitate implementation of the regional OT security initiatives and provide onsite support for core security functions of asset management, vulnerability remediation, and equipment backup and recovery as well as support for incident management. The role is the primary collaborator with IT/business users to ensure secure … Site representative - lead interface with site members to facilitate execution of regional OT security initiatives including leading communication mtgs, providing technical support, providing training, and managing project activity. Asset management - achieve/maintain equipment asset visibility targets for the site through the vulnerability and intrusion detection systems (IDS). Vulnerability remediation - lead annual remediation plans for the … resolving issues, and lead incident response coordination with site members. Regional support - contribute as a subject matter expert in developing OT security tools, systems, and processes across the prevention, vulnerability mgmt., and incident response/recovery workstreams. Qualifications, Experience, and Skills: Bachelor's degree in Cybersecurity, Networking, Electrical or Computer Engineering, or Computer Science. 2+ years of experience with More ❯
Poole, Dorset, England, United Kingdom Hybrid/Remote Options
Mexa Solutions LTD
week in the office) Scope : Work across IT, application, cloud, and physical security, no siloed remits here Responsibility : Be the go-to person for penetration testing, compliance audits, and vulnerabilitymanagement Environment : Modern SaaS product environment, working alongside DevOps, engineering, and IT Growth : Get stuck into a wide variety of work, with support from leadership and autonomy to … make a real impact What you’ll be doing: Leading vulnerability assessments and coordinating regular penetration testing across systems and products Owning risk remediation actions, from security audits to PCI scans and compliance reporting Working across cloud (AWS), infrastructure, and software environments to ensure security best practices are embedded throughout Supporting the secure design of products and infrastructure, providing … ideally 2-3+ years), ideally across cloud and hybrid environments Strong penetration testing experience with confidence to act on the findings A solid grasp of access controls, identity management, and cloud security (especially AWS) Familiarity with secure software development practices and working alongside dev teams Understanding of key frameworks like ISO 27001, PCI-DSS, and GDPR Bonus points More ❯
Reading, Berkshire, England, United Kingdom Hybrid/Remote Options
Reed
practices. You’ll work closely with IT, development, and project teams to embed security into every stage of the software development lifecycle and drive a risk-based approach to vulnerability management. Key Responsibilities Lead application security initiatives across cloud-native and enterprise environments. Promote secure design principles, threat modelling, and best practices across teams. Own and evolve the technical … vulnerabilitymanagement programme. Implement and support security controls, particularly within Azure cloud environments. Evaluate and deploy best-in-class application security tools. Mentor teams and deliver tailored security awareness programmes. Assist with incident response, security training, and supplier/client security assessments. What We’re Looking For Essential Skills & Experience: Proven experience in application security engineering. Strong knowledge More ❯
facing Security Architecture/Consulting roles, presenting to Senior Stakeholders Experience in the telecommunications sector (ideally on a global scale), working to GSMA standards Advanced Security Architecture & Threat Modeling Vulnerabilitymanagement Penetration testing & exploitation Cloud security (AWS, Azure, GCP) and container security (Docker, Kubernetes) Network security (firewalls, SIEM, IDS/IPS, packet analysis) Secure software development & code review … Incident response, digital forensics, malware analysis Identity & access management (IAM, Zero Trust, SSO/MFA) Security frameworks & compliance (NIST, CIS, SOC2) Interviews: October/November 2025 Start Date: January 2026 How to Apply: Apply to Gary Hargreaves at X4 Technology to learn more about the role or connect with me on LinkedIn to hear about regular job updates available More ❯
are patched and secure. Responsibilities: Managing and optimising security tools and platforms (SIEM, XDR, IDAM policies etc.) Monitoring vulnerabilities, investigating incidents and implementing corrective actions Supporting patching compliance and vulnerability remediation Ensuring security best practices are applied across networks, applications and systems Participating in change reviews and advising on improvements to existing setups Supporting compliance experience against frameworks such … as ISO27001, Cyber Essentials+ and CAF Requirements: A solid background in IT infrastructure and/or network engineering Some exposure to, or a growing focus on, cybersecurity and vulnerabilitymanagement Understanding of network devices, configurations and security principles Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) Confidence to identify issues More ❯
Birmingham, West Midlands, United Kingdom Hybrid/Remote Options
Context
are patched and secure. Responsibilities: * Managing and optimising security tools and platforms (SIEM, XDR, IDAM policies etc.) * Monitoring vulnerabilities, investigating incidents and implementing corrective actions * Supporting patching compliance and vulnerability remediation * Ensuring security best practices are applied across networks, applications and systems * Participating in change reviews and advising on improvements to existing setups * Supporting compliance with frameworks such as … ISO 27001, Cyber Essentials Plus and CAF Requirements: * A solid background in IT infrastructure and/or network engineering * Some exposure to, or a growing focus on, cybersecurity and vulnerabilitymanagement * Understanding of network devices, configurations and security principles * Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) * Confidence to identify More ❯
Reading, England, United Kingdom Hybrid/Remote Options
Project People
We’re seeking an experienced Information Security Manager to lead, develop, and continuously improve our Information Security Management System (ISMS) , ensuring compliance with ISO 27001:2022 and protecting the digital infrastructure. In this strategic yet hands-on role, you’ll manage cyber risk , drive security governance , and embed a security-first culture across the organisation. You’ll also act … we’re looking for: Proven experience managing an enterprise ISMS and ISO 27001 audits. Strong knowledge of cyber threats, cloud security (Azure, M365), and GDPR. Hands-on experience in vulnerabilitymanagement, supplier assurance, and incident response. Excellent communication and stakeholder management skills. Benefits: Competitive salary with bonus scheme Very generous holiday allowance Hybrid working – 3 days per More ❯
through our comprehensive suite of cloud-native solutions. With over 100,000 customers across 135 countries, we deliver mission-critical software spanning accountancy and finance, HR and payroll, education management, and business operations. Our impact reaches deep into communities: over 4 million UK families connect with their children’s schools through our education apps, nearly 5 million employees globally … team, comprehensive learning opportunities, and a vibrant technical community committed to creating exceptional solutions that make a real difference in how our customers operate and succeed. Main Responsibilities : Delivery Management (40%) Ensure projects are scoped, prioritised, and delivered on time with clear alignment to business goals and quarterly OKRs Drive predictability, velocity, and quality through effective agile practices and … Provide strategic technical leadership through architectural guidance and critical technical decisions, with selective hands-on contributions Define technical decisions and maintain system health through architectural oversight and technical debt management Establish and drive comprehensive quality culture including TDD/BDD practices, testing standards, automated quality gates, and team code review excellence Define team security standards ensure team compliance governance More ❯
through our comprehensive suite of cloud-native solutions. With over 100,000 customers across 135 countries, we deliver mission-critical software spanning accountancy and finance, HR and payroll, education management, and business operations. Our impact reaches deep into communities: over 4 million UK families connect with their children’s schools through our education apps, nearly 5 million employees globally … team, comprehensive learning opportunities, and a vibrant technical community committed to creating exceptional solutions that make a real difference in how our customers operate and succeed. Main Responsibilities : Delivery Management (40%) Ensure projects are scoped, prioritised, and delivered on time with clear alignment to business goals and quarterly OKRs Drive predictability, velocity, and quality through effective agile practices and … Provide strategic technical leadership through architectural guidance and critical technical decisions, with selective hands-on contributions Define technical decisions and maintain system health through architectural oversight and technical debt management Establish and drive comprehensive quality culture including TDD/BDD practices, testing standards, automated quality gates, and team code review excellence Define team security standards ensure team compliance governance More ❯
Information Security Officer - Risk. - Hybrid - Lancashire £61,500 10.5% bonus 14% pension healthcare plus additional benefits. Information Security Officer with Risk management and risk register experience needed as part of an extremely well-funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As the Information Security Officer for Risk your primary purpose … will be to become a trusted cyber security risk advisor, ensuring the business is compliant against security policy, acting as advisory, collaborating with stakeholders and management to assess risks, review and advise ratings for IT/OT/Physical Cyber risks and support business coordinators in assessing their risk position. As the Information Security Officer for Risk, you will … build strong relationships with business and technology functions as well as 3rd parties offering real world experience of cyber security risk management In this role you will act in an advisory capacity to the business day-to-day basis monitoring cyber security risk, compliance across diverse business functions, supporting business area coordinators. Reviewing risks to ensure they are clear More ❯
Information Security Officer - Risk. - Hybrid - Lancashire £61,500 10.5% bonus 14% pension healthcare plus additional benefits. Information Security Officer with Risk management and risk register experience needed as part of an extremely well-funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As the Information Security Officer for Risk your primary purpose … will be to become a trusted cyber security risk advisor, ensuring the business is compliant against security policy, acting as advisory, collaborating with stakeholders and management to assess risks, review and advise ratings for IT/OT/Physical Cyber risks and support business coordinators in assessing their risk position. As the Information Security Officer for Risk, you will … build strong relationships with business and technology functions as well as 3rd parties offering real world experience of cyber security risk management In this role you will act in an advisory capacity to the business day-to-day basis monitoring cyber security risk, compliance across diverse business functions, supporting business area coordinators. Reviewing risks to ensure they are clear More ❯
to protect customer’s IT networks from cyber attack. Responsibilities : Monitor and analyse Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, and Security Incident and Event Management (SIEM) toolset event logs to identify security attacks and threats for remediation/suppression. Assist in Computer Security Incident Response activities for large organisations as a 1st line security … operational effectiveness and efficiency. Qualifications: Broad experience of technologies including but not limited to; Firewalls, IPS & IDS, Active Directory, Windows Server, Linux, TCP/IP, Networks, AWS, CDN's, Vulnerabilitymanagement and SIEM, DRM. At least basic knowledge the fundamentals of cyber security Security Administration Incident containment, recovery and mitigation Excellent customer service skills Strong analytical and problem More ❯