intrusion prevention) are correctly configured and maintained. Participate in resilience planning, including disaster recovery and business continuity exercises, ensuring network components meet required redundancy and failover standards. Assist in vulnerabilitymanagement activities by reviewing and remediating network-related findings. Maintain compliance with NHS Digital, DSP Toolkit, and Cyber Essentials Plus standards as they apply to network operations. About … configuring cyber systems and associated functionality Significant knowledge of working practices within technical/cyber security Significant experience of Cisco networking hardware Experience of LAN, WLAN troubleshooting, implementation and management Working with suppliers Defining Trust security requirements and interpreting them to system suppliers Advanced knowledge of Microsoft Office applications Person Specification Qualifications Essential Please click 'apply now' to view More ❯
City Of London, England, United Kingdom Hybrid/Remote Options
DGH Recruitment
one scripting language (PowerShell or Python preferred). Experience and understanding of hyperconverged infrastructure preferably with Nutanix, VMWare, Commvault and hybrid cloud infrastructure (Azure or similar). Knowledge of vulnerabilitymanagement, monitoring/alerting, and automation/orchestration platforms. Disaster Recovery Specialist/IT Resilience Specialist More ❯
City of London, London, United Kingdom Hybrid/Remote Options
DGH Recruitment
at least one scripting language (PowerShell or Python preferred). - Understanding of hyperconverged infrastructure preferably with Nutanix, VMWare, Commvault and hybrid cloud infrastructure (Azure or similar). - Knowledge of vulnerabilitymanagement, monitoring/alerting, and automation/orchestration platforms. IT Disaster Recovery Technical Specialist In accordance with the Employment Agencies and Employment Businesses Regulations 2003, this position is More ❯
Basildon, England, United Kingdom Hybrid/Remote Options
Cloud Decisions
and respond to security alerts, incidents and vulnerabilities. Deliver Cyber Essentials & Cyber Essentials Plus engagements and renewals. Deploy and support Microsoft 365 Security, Intune and Defender solutions. Assist with vulnerabilitymanagement and remediation across customer estates. Work with platforms like Mimecast, SentinelOne, Sophos and Microsoft Security & Compliance Centre. Act as 2nd/3rd line escalation and drive root More ❯
looking for a more consultative, client-facing role. Ideal Background: Proven experience in cyber security design, architecture, or consultancy. Hands-on expertise across domains such as SIEM, SOAR, EDR, VulnerabilityManagement, WAF, IDAM, and Cloud Security. Strong understanding of vendor technologies (e.g., Fortinet, Palo Alto, Juniper). Excellent communication and stakeholder engagement skills — able to translate complex technical More ❯
looking for a more consultative, client-facing role. Ideal Background: Proven experience in cyber security design, architecture, or consultancy. Hands-on expertise across domains such as SIEM, SOAR, EDR, VulnerabilityManagement, WAF, IDAM, and Cloud Security. Strong understanding of vendor technologies (e.g., Fortinet, Palo Alto, Juniper). Excellent communication and stakeholder engagement skills — able to translate complex technical More ❯
Leeds, England, United Kingdom Hybrid/Remote Options
Corecom Consulting
coding principles and web application security. Comfortable working end-to-end across the stack in a small, fast-moving team. Desirable: Professional experience in cybersecurity SaaS, threat intelligence, or vulnerability management. Familiarity with AI/ML technologies, particularly around data classification or automation. Experience with CI/CD, containerisation, and serverless architectures. Front-end experience with React and TypeScript. More ❯
configuration, control code debugging, and API integration. Endpoint & Conferencing Systems: Expert in platform-specific deployment, configuration, and troubleshooting for Microsoft Teams Rooms), Zoom Rooms, and Cisco WebEx. Own the Vulnerability Lifecycle: Act as the subject matter expert (SME) responsible for the full vulnerabilitymanagement lifecycle for UC systems (e.g., UC Room software, Crestron, Q-SYS, DSPs, MTR More ❯
training material, and user guides for developed applications Collaborate with internal IT and business teams to define and deliver new features and integrations Operate within the organisation’s Risk Management and Compliance frameworks, escalating issues where appropriate Contribute to continuous improvement initiatives across development practices and system design Ideal Candidate Profile Proven experience as an RPG Developer working on …/BA in Computer Science or related field (MSc/MA desirable) Familiarity with development frameworks and standards used in financial institutions advantageous Experience with Citrix server administration or vulnerabilitymanagement would be an asset Why Join This is a chance to work at the centre of a major business and technology transformation , modernising critical banking systems and More ❯
training material, and user guides for developed applications Collaborate with internal IT and business teams to define and deliver new features and integrations Operate within the organisation’s Risk Management and Compliance frameworks, escalating issues where appropriate Contribute to continuous improvement initiatives across development practices and system design Ideal Candidate Profile Proven experience as an RPG Developer working on …/BA in Computer Science or related field (MSc/MA desirable) Familiarity with development frameworks and standards used in financial institutions advantageous Experience with Citrix server administration or vulnerabilitymanagement would be an asset Why Join This is a chance to work at the centre of a major business and technology transformation , modernising critical banking systems and More ❯
MoD) and other regulatory bodies to demonstrate compliance with stringent security and airworthiness standards.Key Responsibilities* Lead product-level cybersecurity assessments for UAV platforms, avionics, and embedded payload systems.* Conduct vulnerability analysis and assurance activities across software, firmware, and communication interfaces.* Develop and maintain product security architectures, ensuring compliance with secure-by-design principles and recognised standards.* Support and participate … Secure Development Lifecycle (SDL) processes.* Identify and mitigate cyber threats early in the product lifecycle through threat modelling and risk analysis.* Drive continuous improvement in security testing, automation, and vulnerabilitymanagement practices.* Proficiency in one or more programming/scripting languages: C, C++, Python, or Bash, preferably in embedded or Linux environments. Modis International Ltd acts as an More ❯
and other regulatory bodies to demonstrate compliance with stringent security and airworthiness standards. Key Responsibilities * Lead product-level cybersecurity assessments for UAV platforms, avionics, and Embedded payload systems. * Conduct vulnerability analysis and assurance activities across software, firmware, and communication interfaces. * Develop and maintain product security architectures, ensuring compliance with secure-by-design principles and recognised standards. * Support and participate … Development Lifecycle (SDL) processes. * Identify and mitigate cyber threats early in the product life cycle through threat modelling and risk analysis. * Drive continuous improvement in security testing, automation, and vulnerabilitymanagement practices. * Proficiency in one or more programming/Scripting languages: C, C++, Python, or Bash, preferably in Embedded or Linux environments. Modis International Ltd acts as an More ❯
Attack Path analysis; IT and Infrastructure experience (Windows Server and/or Red Hat Linux); development of monitoring use cases; collaboration and remediation engagement 3+ years of experience in vulnerabilitymanagement or compliance monitoring Experience in design and implementation of security technologi Experience with IT controls monitoring for regulatory and compliance requirements Experience with visualization tools In-depth More ❯
Sentinel, and Tenable One, ensuring these platforms are aligned with security best practices and operational readiness standards. The Role: The role requires strong technical expertise across SIEM, EDR, and VulnerabilityManagement technologies Combined with consultative experience in capacity planning, architectural design, and gap analysis This position bridges the gap between pre-sales design and post-implementation operations, ensuring More ❯
dive deep into the technical tooling and set strategic direction for a small but high-performing team. The remit cover end-to-end defence, covering security strategy, incident response, vulnerabilitymanagement, cloud security and insider risk protection, all within one of the most data-driven, high speed environments. You'll partner closely with engineering, IT and senior leadership More ❯
in IT operations, or security support role. Exposure to security monitoring or incident response processes (e.g. handling alerts, phishing investigations, or log review). Familiarity with patching, configuration, or vulnerabilitymanagement activities. Experience of working in a technical information security role, covering operations and/or infrastructure security. Experience working with or alongside a managed SOC, including escalation More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
COMPUTACENTER (UK) LIMITED
team members Ensure accurate documentation and incident records Participate in team meetings and contribute to service improvements Use monitoring tools to track and resolve incidents Support compliance, patching, and vulnerabilitymanagement Liaise with 3rd Line teams to drive service enhancements Deliver small project work to customer timelines What youll need Were looking for a team player with a More ❯
Manchester, England, United Kingdom Hybrid/Remote Options
iO Associates
architecture or engineering) Strong communication and presentation skills, with the confidence to engage at all levels Hands-on experience with security tools such as SIEM, SOAR, EDR, WAF or vulnerabilitymanagement A desire to move into a solutions or pre-sales role , combining your technical expertise with commercial awareness Energy, curiosity and a genuine passion for helping customers More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid/Remote Options
Operations Resources
the role is to develop policies to protect the Companies data and networks which is a Microsoft-centric environment. Secondary, you should have been involved in incident response and vulnerability management. This is a new interesting role which will surely evolve over time. This is a full time permanent position based on site and does NOT offer remote working. More ❯
implement, and maintain information security policies, procedures, and guidelines. - Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001). - SIEM & Vulnerability Management. - Monitor and respond to security incidents, conducting investigations and implementing corrective actions. - Collaborate with IT and other departments to ensure the security of network infrastructure and data. - Manage … risk assessments and vulnerability assessments to identify potential security threats. - Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies. - Provide training and guidance to staff on information security best practices. - Stay updated on the latest cybersecurity trends and technologies. **Qualifications:** - Bachelor's degree in Information Security, Computer Science, or a related field. … Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor. - Proven experience in information security management and conducting security audits. - Strong knowledge of information security frameworks and standards. - Excellent analytical and problem-solving skills. - Strong communication and interpersonal skills. **Preferred Qualifications:** - Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX. - Familiarity with security tools and technologies More ❯
implement, and maintain information security policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001).- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage … risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information Security, Computer Science, or a related field. … Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor.- Proven experience in information security management and conducting security audits.- Strong knowledge of information security frameworks and standards.- Excellent analytical and problem-solving skills.- Strong communication and interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX.- Familiarity with security tools and technologies More ❯
VMware environments. Troubleshoot and resolve system, platform, and network issues with minimal supervision. Apply knowledge of networking technologies to support infrastructure needs. Implement and maintain cybersecurity best practices and vulnerabilitymanagement processes. Utilize Python, Bash, and APIs for scripting, automation, and integrations. Continuously challenge and improve existing processes, driving automation and operational excellence. Collaborate effectively with cross-functional … Linux (RHEL) administration. Proven expertise with Red Hat Satellite installation, configuration, and management. Hands-on experience with Ansible/AAP and Infrastructure as Code practices. Practical knowledge of VMware management and upgrades. Solid understanding of networking fundamentals and cybersecurity principles. Scripting experience with Python and Bash; familiarity with working via APIs. Excellent problem-solving abilities and ownership mindset. Strong More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Randstad Digital
VMware environments. Troubleshoot and resolve system, platform, and network issues with minimal supervision. Apply knowledge of networking technologies to support infrastructure needs. Implement and maintain cybersecurity best practices and vulnerabilitymanagement processes. Utilize Python, Bash, and APIs for scripting, automation, and integrations. Continuously challenge and improve existing processes, driving automation and operational excellence. Collaborate effectively with cross-functional … Linux (RHEL) administration. Proven expertise with Red Hat Satellite installation, configuration, and management. Hands-on experience with Ansible/AAP and Infrastructure as Code practices. Practical knowledge of VMware management and upgrades. Solid understanding of networking fundamentals and cybersecurity principles. Scripting experience with Python and Bash; familiarity with working via APIs. Excellent problem-solving abilities and ownership mindset. Strong More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Randstad Digital
VMware environments. Troubleshoot and resolve system, platform, and network issues with minimal supervision. Apply knowledge of networking technologies to support infrastructure needs. Implement and maintain cybersecurity best practices and vulnerabilitymanagement processes. Utilize Python, Bash, and APIs for scripting, automation, and integrations. Continuously challenge and improve existing processes, driving automation and operational excellence. Collaborate effectively with cross-functional … Linux (RHEL) administration. Proven expertise with Red Hat Satellite installation, configuration, and management. Hands-on experience with Ansible/AAP and Infrastructure as Code practices. Practical knowledge of VMware management and upgrades. Solid understanding of networking fundamentals and cybersecurity principles. Scripting experience with Python and Bash; familiarity with working via APIs. Excellent problem-solving abilities and ownership mindset. Strong More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Randstad Technologies
VMware environments. Troubleshoot and resolve system, platform, and network issues with minimal supervision. Apply knowledge of networking technologies to support infrastructure needs. Implement and maintain cybersecurity best practices and vulnerabilitymanagement processes. Utilize Python, Bash, and APIs for scripting, automation, and integrations. Continuously challenge and improve existing processes, driving automation and operational excellence. Collaborate effectively with cross-functional … Linux (RHEL) administration. Proven expertise with Red Hat Satellite installation, configuration, and management. Hands-on experience with Ansible/AAP and Infrastructure as Code practices. Practical knowledge of VMware management and upgrades. Solid understanding of networking fundamentals and cybersecurity principles. Scripting experience with Python and Bash; familiarity with working via APIs. Excellent problem-solving abilities and ownership mindset. Strong More ❯