and Security functions are central to this position, leading a team of specialist engineers to maintain the secure operation of services and contributing to major projects that impact identity management across the organisation. The post holder also serves as a technical authority within the team and department. What you'll need to succeed Security Operations & Incident Response Lead security … operations services, including monitoring, incident response, threat management, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery efforts with internal teams and vendors. Establish and manage threat intelligence processes to ensure timely remediation of vulnerabilities. Monitor and analyse performance metrics … to support security troubleshooting and continuous improvement. Identity & Access Management Provide expert technical leadership for identity and access management, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of identity services, ensuring reliability and user demand readiness. Shape and deliver a strategic roadmap for identity services, focusing on automation and proactive improvements. More ❯
and Security functions are central to this position, leading a team of specialist engineers to maintain the secure operation of services and contributing to major projects that impact identity management across the organisation. The post holder also serves as a technical authority within the team and department. What you'll need to succeed Security Operations & Incident Response Lead security … operations services, including monitoring, incident response, threat management, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery efforts with internal teams and vendors. Establish and manage threat intelligence processes to ensure timely remediation of vulnerabilities. Monitor and analyse performance metrics … to support security troubleshooting and continuous improvement. Identity & Access Management Provide expert technical leadership for identity and access management, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of identity services, ensuring reliability and user demand readiness. Shape and deliver a strategic roadmap for identity services, focusing on automation and proactive improvements. More ❯
enhance incident response coordination and overall cyber defense posture. Provide executive reporting and briefings on SOC activities, threat trends, and operational effectiveness. Perform activities such as project tracking, schedule management, risk register maintenance, and the development of risk and issue mitigation strategies for SOC operations and incident response. Ensure the timeliness and quality of deliverables so that all information … active TS/SCI clearance. Must be a U.S. citizen. Proven experience in handling complex cybersecurity incidents and leading a team in a SOC environment. Demonstrated experience in project management, including scheduling, risk management, and delivering high-quality security operations and incident response activities. In-depth knowledge of cybersecurity frameworks and standards, such as NIST, FISMA, and ISO … 27001. Strong understanding of SOC operations, including network security, threat detection, incident response, and vulnerability management. Experience with SIEM platforms, intrusion detection systems (IDS), firewalls, and endpoint protection technologies. Familiarity with risk management frameworks and the ability to develop and implement effective risk mitigation strategies. Excellent communication, leadership, and coordination skills, with the ability to lead cross-functional More ❯
to support Security Consulting 'go to market' propositions and service offerings. Leading in the development and presentation of compelling client proposals collaborating with teams across our business. Strong stakeholder management and relationship building skills at senior levels that will enable consensus building in the shaping of secure client solutions Shaping, leading and delivering value through security advisory consultancy and … through guiding secure transformational delivery engagements. Providing security expertise across security standards and accreditations, measure and control the effectiveness of the security controls framework and maintain the Information Security Management System. Deriving and delivering documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies. Standards and guidelines Assiting with the identification … of identified risks and emerging cyber security vulnerabilities and threats. The subsequent analysis to quantify and lead risk mitigation plans Work with Service Management to ensure that partners and suppliers adhere to agreed standards, policies and verify/evidence appropriate compliance and security KPIs Work closely with 1st, 2nd and 3rd lines of defence on all matters relating to More ❯
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Creditsafe
intelligence accessible to all businesses big and small but most importantly, opened up new avenues of data intelligence for businesses with machine learning, AI and connected data. From risk management through to opportunity identification, our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger, grow faster and thrive. THE … RESPONSIBILITIES • Manage the day-to-day activities of the Security Operations Centre (SOC) and Security Engineering teams. • Produce reports on key security metrics across Security Operations, Application Security and Vulnerability Management. • Conduct regular 1-2-1s, Performance Reviews, and Personal Development Plans of team members. • Develop and implement security policies, processes, and procedures to comply with SOC2 and … ISO27001 standards. • Participate in Steering groups for Identity and Access Management and Data Protection • Setting and aligning team objectives and tasks to help achieve the overall Information Security and Compliance function’s strategy and goals • Participate in Quarterly Business Reviews with our security tooling vendors. Providing feedback to the vendors on product features, feature requests, SLA and reporting requirements More ❯
is for you. What you will do: Develop and implement proactive security strategies, policies, and procedures to protect our systems, networks, and data assets. Lead regular security assessments, including vulnerability scans and penetration tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents … the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong capability … in risk assessment, vulnerabilitymanagement, and data informed decision-making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in scripting and programming (i.e., Python More ❯
manage multiple engagements effectively. Current CREST CRT certification or higher is required. Eligibility for SC Clearance is required. Desirable Skills: Experience with Breach Attack Simulation tools and threat-informed vulnerability management. Knowledge of Risk Management frameworks and their integration with threat intelligence. Hands-on experience with cloud security reviews (AWS, Azure, GCP) considering cloud-specific threats. Familiarity with More ❯
enjoys both technical implementation and supporting security frameworks such as Cyber Essentials. You will play a key role in deploying Microsoft security solutions and supporting client audits, assessments, and vulnerability remediation efforts. Responsibilities include: Delivering Microsoft security technologies including Defender XDR, Sentinel, and Endpoint Detection andamp; Response Supporting Cyber Essentials and Cyber Essentials Plus audits and assessments Acting as … an escalation point for cyber incidents, security alerts, and engineering tasks Conducting vulnerability remediation and assessments (infrastructure and application level) Assisting with presales engagements and technical scoping Onboarding clients onto security management platforms Providing reporting, analytics, and technical support to clients and internal teams What will you need? Minimum 2 years' experience in a cyber security role, ideally … Meraki, Fortinet, WatchGuard) Excellent communication and client service skills Self-motivated and detail-oriented with strong problem-solving abilities What would be desirable? Experience deploying Tenable or Qualys for vulnerabilitymanagement Knowledge of email security tools (e.g., Mimecast, Egress) Understanding of Azure Firewall and Defender for Cloud/Cloud Apps Experience conducting offensive security/web application assessments More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Searchability (UK) Ltd
enjoys both technical implementation and supporting security frameworks such as Cyber Essentials. You will play a key role in deploying Microsoft security solutions and supporting client audits, assessments, and vulnerability remediation efforts. Responsibilities include: Delivering Microsoft security technologies including Defender XDR, Sentinel, and Endpoint Detection & Response Supporting Cyber Essentials and Cyber Essentials Plus audits and assessments Acting as an … escalation point for cyber incidents, security alerts, and engineering tasks Conducting vulnerability remediation and assessments (infrastructure and application level) Assisting with presales engagements and technical scoping Onboarding clients onto security management platforms Providing reporting, analytics, and technical support to clients and internal teams What will you need? Minimum 2 years' experience in a cyber security role, ideally within … Meraki, Fortinet, WatchGuard) Excellent communication and client service skills Self-motivated and detail-oriented with strong problem-solving abilities What would be desirable? Experience deploying Tenable or Qualys for vulnerabilitymanagement Knowledge of email security tools (e.g., Mimecast, Egress) Understanding of Azure Firewall and Defender for Cloud/Cloud Apps Experience conducting offensive security/web application assessments More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Searchability
enjoys both technical implementation and supporting security frameworks such as Cyber Essentials. You will play a key role in deploying Microsoft security solutions and supporting client audits, assessments, and vulnerability remediation efforts. Responsibilities include: Delivering Microsoft security technologies including Defender XDR, Sentinel, and Endpoint Detection & Response Supporting Cyber Essentials and Cyber Essentials Plus audits and assessments Acting as an … escalation point for cyber incidents, security alerts, and engineering tasks Conducting vulnerability remediation and assessments (infrastructure and application level) Assisting with presales engagements and technical scoping Onboarding clients onto security management platforms Providing reporting, analytics, and technical support to clients and internal teams What will you need? Minimum 2 years' experience in a cyber security role, ideally within … Meraki, Fortinet, WatchGuard) Excellent communication and client service skills Self-motivated and detail-oriented with strong problem-solving abilities What would be desirable? Experience deploying Tenable or Qualys for vulnerabilitymanagement Knowledge of email security tools (e.g., Mimecast, Egress) Understanding of Azure Firewall and Defender for Cloud/Cloud Apps Experience conducting offensive security/web application assessments More ❯
dashboarding solutions to provide real-time insights and situational awareness to cybersecurity analysts and stakeholders. The Data Analyst shall utilize the GISA Governance Board determined Security Information and Event Management (SIEM) solution, which as of January 2025 is transitioning from Splunk to a new architecture based on Elastic, Logstash, and Kibana (ELK), leveraging Cribl as a data broker to … threat detection and incident response, and enhance overall cybersecurity posture in accordance with DoD and IC standards and regulations. This is a full-time onsite position. Essential Duties & Responsibilities VulnerabilityManagement and Reporting: Generate detailed automated reports on identified vulnerabilities, outlining their severity, potential impact, and recommended remediation steps. Assess vulnerability assessment results and prioritize vulnerabilities based … on their criticality, potential impact, and ease of exploitation. Maintain accurate records of vulnerability assessments, reports, and remediation efforts for audit and compliance purposes. Remediation and Collaboration: Work closely with IT teams to oversee the application of security patches and updates that address identified vulnerabilities. Collaborate with incident response teams to address vulnerabilities that have been exploited or may More ❯
is not an active opening but is representative of positions within CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI. Responsibilities: VulnerabilityManagement: Conduct regular vulnerability assessments to identify and prioritize potential security risks. Collaborate with cross-functional teams to analyze and interpret vulnerability scan results. Communicate response … Risk Assessment: Evaluate the severity and potential impact of identified vulnerabilities on our systems. Provide actionable recommendations for remediation and risk mitigation. Policy Development: Create and manage the programs VulnerabilityManagement Plan; outlining how the program tracks CVEs and remediations for all systems. Contribute to the development and enhancement of other cybersecurity policies and procedures. Ensure compliance with … DAF standards and regulations related to vulnerability management. Collaboration and Communication: Work closely with IT, development, and operations teams to facilitate timely vulnerability remediation. Communicate effectively with stakeholders, translating technical vulnerabilities into business impact. Continuous Improvement: Stay abreast of the latest cybersecurity threats, vulnerabilities, and industry best practices. Drive continuous improvement initiatives to enhance the overall cybersecurity posture More ❯
IT Operation s Platforms and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation’s IT operations, ensuring the stability, continuity, security, and efficiency of its technology … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … and systems, driving transformative operational change, enhancing IT processes and ensuring compliance with governance bodies and industry regulations. Due to the nature of the role, complexity Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection More ❯
assessing, and mitigating security risks across various platforms. The consultant will play a critical role in evaluating and strengthening our clients’ cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with industry best practices. Provide expert … Collaborate with client teams to develop, document, and implement security policies, standards, and guidelines aligned with industry standards (e.g., ISO 27001, NIST). Assist in the deployment, configuration, and management of security infrastructure and technologies, including firewalls, intrusion detection/prevention systems, and secure network architectures. Provide guidance and support on Azure security practices, leveraging expertise in Microsoft Azure … reports on penetration testing findings, including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerabilitymanagement, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit, Burp Suite, Nessus, and Wireshark. More ❯
environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. The role requires the ability to "lead by example" and perform line management for direct reports and manage service partners reporting into the function. Additional responsibilities are to respond to support requests by Key Responsibilities: IT Operations & Cloud Platform Management Lead … business continuity (BC) and disaster recovery (DR) plans, ensuring cloud- based solutions support resilience and rapid recovery. Manage Global Infrastructure (Cloud, On-prem and Virtual product) Solution Life Cycle Management and removal (via decommissioning and succession planning) of technical debt. Drive a document first culture to new and legacy platforms/solutions. Oversee management of the End User More ❯
will have come from related security and architecture roles, focusing on security operations and product development. Your duties and responsibilities Support design and execution of the information security risk management framework Work with Legal, Risk and IT to ensure compliance with NIS2, DORA and/or ISO27K where relevant. Maintain and improve policies, standards and control documentation aligned to … system visibility by expanding logging coverage and implementing additional monitoring capabilities. Maintain, update, and regularly test incident response runbooks, containment strategies, and escalation protocols. Lead the end-to-end vulnerabilitymanagement process for ION Markets systems, from identification to remediation. Provide support for security architecture reviews of developed systems to ensure alignment with best practices. This role may … or operating security technologies is preferred, such as endpoint security (e.g. AV/EPP/EDR), SIEM, DLP, SWG, CASB, UEBA, IDS, IPS, firewalls, IAM/PIM/PAM, vulnerabilitymanagement, MDM, etc. More ❯
of security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. Relevant industry qualifications and certifications (CompTIA Security+, CEH, GCIH, GCIA CISSP etc) Experience … Knowledge of the following security products are ideal: ? SEIM (Rapid7 IDR, MS Sentinel, SPLUNK) ? SOAR (Rapid7 ICON, MS Sentinel) ? Endpoint Detection and Response (Microsoft Defender) ? Email Security (Proofpoint, Mimecast) ? VulnerabilityManagement (Rapid7 IVM, Nessus, Tenable) Proficiency with scripting and automation (e.g., Powershell, Python) Understanding of Zero-Trust Architecture within a hybrid cloud environment. Working knowledge of cyber threat More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Techwaka
with stakeholders to maintain compliance with industry standards such as ISO27001, Cyber Essentials Plus, PCI/DSS Stay ahead of cyber threats, maintaining and improving security monitoring and risk management processes Support vulnerabilitymanagement, penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks More ❯
new technologies, experienced people, and new ideas to help all our clients maximize every opportunity. Experience and Skills What your background is A bachelor's degree in computer science, management information systems, or a relevant field, or equivalent demonstrable experience. 5+ years' of experience in Information Security or Information Technology 3+ years' experience performing IT Audit or security control … regulations (e.g., GDPR, CCPA) and breach notification laws. Experience with sector-specific frameworks (e.g., HIPAA, PCI). Technical Skills Proficiency with security tools (SailPoint, Rapid7, Wiz.io , MS Defender, SIEM, vulnerabilitymanagement, penetration testing). Knowledge of cloud technologies (AWS, Azure). Experience using generative AI (e.g., ChatGPT) for test strategies, reports, and communications. Skills in automation and analytics More ❯
new technologies, experienced people, and new ideas to help all our clients maximize every opportunity. Experience and Skills What your background is A bachelor's degree in computer science, management information systems, or a relevant field, or equivalent demonstrable experience. 5+ years' of experience in Information Security or Information Technology 3+ years' experience performing IT Audit or security control … regulations (e.g., GDPR, CCPA) and breach notification laws. Experience with sector-specific frameworks (e.g., HIPAA, PCI). Technical Skills Proficiency with security tools (SailPoint, Rapid7, Wiz.io , MS Defender, SIEM, vulnerabilitymanagement, penetration testing). Knowledge of cloud technologies (AWS, Azure). Experience using generative AI (e.g., ChatGPT) for test strategies, reports, and communications. Skills in automation and analytics More ❯
incidents, conducting thorough investigations and mitigating threats; produce comprehensive incident reports, including root cause analysis and recommendations for future prevention; work closely with other cybersecurity teams, including threat intelligence, vulnerabilitymanagement, and risk assessment. Minimum Qualifications: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field (or equivalent experience). 3+ years of experience in More ❯
MCS Group is seeking a Cyber Security Third Party Risk Management Lead to join their client, a thriving and well-established organisation with headquarters in Dublin. This position is a 12 month Fixed Term Contract into permanency as is standard in the organisation. With multiple projects in the pipeline and a growing team, this is a fantastic opportunity for … an experienced Risk Management professional to join a successful team in a newly created position. The Third-Party Risk Management (TPRM) Lead will be responsible for designing, implementing, and overseeing a robust third-party risk management programme. This role ensures that all external vendors, suppliers, and partners align with the organisation's security, compliance, and operational risk … procurement, legal, IT, the cyber team, and other business units, the TPRM Lead will assess, monitor, and mitigate third-party risks. This position is part of a growing risk management function, playing a key role in safeguarding the organisation against external threats. The successful candidate will be afforded public sector benefits - increased holidays, fantastic pension and unmatched job security More ❯
including DNS, DHCP, and file sharing services • Implement and maintain endpoint security solutions and antivirus systems • Create and maintain system documentation, procedures, and configuration standards • Conduct security assessments and vulnerabilitymanagement for Windows infrastructure • Coordinate with cybersecurity teams to implement security controls and incident response procedures • Manage software deployment, updates, and licensing compliance across the enterprise • Provide technical … support and troubleshooting for end users and system issues • Participate in change management processes and maintain system configuration baselines • Collaborate with network administrators and other IT teams for integrated system solutions Qualifications: Bachelor's degree in Information Technology, Computer Science, or related technical field • Active TS/SCI security clearance with ability to maintain clearance eligibility • 3+ years of … experience in Windows system administration in enterprise environments • Strong expertise in Windows Server operating systems (2016, 2019, 2022) • Proven experience with Active Directory administration, group policy management, and domain services • Knowledge of virtualization technologies (VMware vSphere, Hyper-V) • Understanding of network protocols, services, and Windows networking fundamentals • Experience with PowerShell scripting for automation and system management • Familiarity with More ❯
are ready for the challenges of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security weaknesses in web, mobile, and … play a hands-on role in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & Vulnerability Assessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including demonstrating the business impact of potential … with recommended remediation steps for developers and system administrators. Keep up to date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerabilitymanagement program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work with stakeholders to develop mitigation More ❯
successful Assessment and Authorization (A&A) process activities (ICD-503 RMF) and related documentation such as security concept of operations, systems security plans, security control assessments, contingency plans, configuration management plans, incident response plans, plan of actions and milestones, risk management plans, vulnerability and compliance scanning, and/or vulnerabilitymanagement plans. The ISSE will … hundreds of Linux instances on virtual and bare metal hardware. Team responsibilities include Linux system build automation, network architecture and implementation, all facets of cyber security compliance, deployment and management of core subsystems and services such as DNS, FreeIPA, email, Jira, Elastic Stack, VMware, Veeam. The team also maintains a small number of Windows systems. The ISSE will assume … and Information Security (InfoSec) experience working with Intelligence Community (IC) customers, which includes developing and reviewing security concept of operations, systems security plans, security control assessments, contingency plans, configuration management 1 , plans, incident response plans, plan of actions and milestones, risk management plans, vulnerability and compliance scanning, and/or vulnerabilitymanagement plans. Must have More ❯