London, South East, England, United Kingdom Hybrid / WFH Options
Searchability
enjoys both technical implementation and supporting security frameworks such as Cyber Essentials. You will play a key role in deploying Microsoft security solutions and supporting client audits, assessments, and vulnerability remediation efforts. Responsibilities include: Delivering Microsoft security technologies including Defender XDR, Sentinel, and Endpoint Detection & Response Supporting Cyber Essentials and Cyber Essentials Plus audits and assessments Acting as an … escalation point for cyber incidents, security alerts, and engineering tasks Conducting vulnerability remediation and assessments (infrastructure and application level) Assisting with presales engagements and technical scoping Onboarding clients onto security management platforms Providing reporting, analytics, and technical support to clients and internal teams What will you need? Minimum 2 years' experience in a cyber security role, ideally within … Meraki, Fortinet, WatchGuard) Excellent communication and client service skills Self-motivated and detail-oriented with strong problem-solving abilities What would be desirable? Experience deploying Tenable or Qualys for vulnerabilitymanagement Knowledge of email security tools (e.g., Mimecast, Egress) Understanding of Azure Firewall and Defender for Cloud/Cloud Apps Experience conducting offensive security/web application assessments More ❯
Central London, London, England, United Kingdom Hybrid / WFH Options
Bupa UK
yet profound: to help people live longer, happier, healthier lives, and to make a better world. As Head of Cyber Threat Exposure, you’ll play a crucial role in vulnerabilitymanagement and offensive activities across Bupa. You’ll provide threat-led cyber security leadership, subject matter expertise, oversight, E2E process design and implementation, and coordination of vulnerabilitymanagement and offensive security servicesacross all technology in Bupa. How you’ll help us make health happen Lead a team of technical security experts to drive a continuous ecosystem for managing vulnerabilities and offensive security to limit Bupa’s exposure from both strategic and tactical threats. End to end management and delivery of security services including penetration … and reporting capabilities leveraging threat intelligence and proactively identify, prioritise, and remediate vulnerabilities and threat exposures Ensure that all technology, cloud services and third-party solutions comply with defined vulnerabilitymanagement and penetration testing requirements. Act as Bupa’s subject matter expert on vulnerability impact and risk, providing guidance on root cause and managing the full lifecycle More ❯
IT Operation s Platforms and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation’s IT operations, ensuring the stability, continuity, security, and efficiency of its technology … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … and systems, driving transformative operational change, enhancing IT processes and ensuring compliance with governance bodies and industry regulations. Due to the nature of the role, complexity Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection More ❯
assessing, and mitigating security risks across various platforms. The consultant will play a critical role in evaluating and strengthening our clients’ cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with industry best practices. Provide expert … Collaborate with client teams to develop, document, and implement security policies, standards, and guidelines aligned with industry standards (e.g., ISO 27001, NIST). Assist in the deployment, configuration, and management of security infrastructure and technologies, including firewalls, intrusion detection/prevention systems, and secure network architectures. Provide guidance and support on Azure security practices, leveraging expertise in Microsoft Azure … reports on penetration testing findings, including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerabilitymanagement, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit, Burp Suite, Nessus, and Wireshark. More ❯
environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. The role requires the ability to "lead by example" and perform line management for direct reports and manage service partners reporting into the function. Additional responsibilities are to respond to support requests by Key Responsibilities: IT Operations & Cloud Platform Management Lead … business continuity (BC) and disaster recovery (DR) plans, ensuring cloud- based solutions support resilience and rapid recovery. Manage Global Infrastructure (Cloud, On-prem and Virtual product) Solution Life Cycle Management and removal (via decommissioning and succession planning) of technical debt. Drive a document first culture to new and legacy platforms/solutions. Oversee management of the End User More ❯
will have come from related security and architecture roles, focusing on security operations and product development. Your duties and responsibilities Support design and execution of the information security risk management framework Work with Legal, Risk and IT to ensure compliance with NIS2, DORA and/or ISO27K where relevant. Maintain and improve policies, standards and control documentation aligned to … system visibility by expanding logging coverage and implementing additional monitoring capabilities. Maintain, update, and regularly test incident response runbooks, containment strategies, and escalation protocols. Lead the end-to-end vulnerabilitymanagement process for ION Markets systems, from identification to remediation. Provide support for security architecture reviews of developed systems to ensure alignment with best practices. This role may … or operating security technologies is preferred, such as endpoint security (e.g. AV/EPP/EDR), SIEM, DLP, SWG, CASB, UEBA, IDS, IPS, firewalls, IAM/PIM/PAM, vulnerabilitymanagement, MDM, etc. More ❯
of security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. Relevant industry qualifications and certifications (CompTIA Security+, CEH, GCIH, GCIA CISSP etc) Experience … Knowledge of the following security products are ideal: ? SEIM (Rapid7 IDR, MS Sentinel, SPLUNK) ? SOAR (Rapid7 ICON, MS Sentinel) ? Endpoint Detection and Response (Microsoft Defender) ? Email Security (Proofpoint, Mimecast) ? VulnerabilityManagement (Rapid7 IVM, Nessus, Tenable) Proficiency with scripting and automation (e.g., Powershell, Python) Understanding of Zero-Trust Architecture within a hybrid cloud environment. Working knowledge of cyber threat More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Techwaka
with stakeholders to maintain compliance with industry standards such as ISO27001, Cyber Essentials Plus, PCI/DSS Stay ahead of cyber threats, maintaining and improving security monitoring and risk management processes Support vulnerabilitymanagement, penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks More ❯
new technologies, experienced people, and new ideas to help all our clients maximize every opportunity. Experience and Skills What your background is A bachelor's degree in computer science, management information systems, or a relevant field, or equivalent demonstrable experience. 5+ years' of experience in Information Security or Information Technology 3+ years' experience performing IT Audit or security control … regulations (e.g., GDPR, CCPA) and breach notification laws. Experience with sector-specific frameworks (e.g., HIPAA, PCI). Technical Skills Proficiency with security tools (SailPoint, Rapid7, Wiz.io , MS Defender, SIEM, vulnerabilitymanagement, penetration testing). Knowledge of cloud technologies (AWS, Azure). Experience using generative AI (e.g., ChatGPT) for test strategies, reports, and communications. Skills in automation and analytics More ❯
MCS Group is seeking a Cyber Security Third Party Risk Management Lead to join their client, a thriving and well-established organisation with headquarters in Dublin. This position is a 12 month Fixed Term Contract into permanency as is standard in the organisation. With multiple projects in the pipeline and a growing team, this is a fantastic opportunity for … an experienced Risk Management professional to join a successful team in a newly created position. The Third-Party Risk Management (TPRM) Lead will be responsible for designing, implementing, and overseeing a robust third-party risk management programme. This role ensures that all external vendors, suppliers, and partners align with the organisation's security, compliance, and operational risk … procurement, legal, IT, the cyber team, and other business units, the TPRM Lead will assess, monitor, and mitigate third-party risks. This position is part of a growing risk management function, playing a key role in safeguarding the organisation against external threats. The successful candidate will be afforded public sector benefits - increased holidays, fantastic pension and unmatched job security More ❯
are ready for the challenges of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security weaknesses in web, mobile, and … play a hands-on role in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & Vulnerability Assessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including demonstrating the business impact of potential … with recommended remediation steps for developers and system administrators. Keep up to date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerabilitymanagement program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work with stakeholders to develop mitigation More ❯
successful Assessment and Authorization (A&A) process activities (ICD-503 RMF) and related documentation such as security concept of operations, systems security plans, security control assessments, contingency plans, configuration management plans, incident response plans, plan of actions and milestones, risk management plans, vulnerability and compliance scanning, and/or vulnerabilitymanagement plans. The ISSE will … hundreds of Linux instances on virtual and bare metal hardware. Team responsibilities include Linux system build automation, network architecture and implementation, all facets of cyber security compliance, deployment and management of core subsystems and services such as DNS, FreeIPA, email, Jira, Elastic Stack, VMware, Veeam. The team also maintains a small number of Windows systems. The ISSE will assume … and Information Security (InfoSec) experience working with Intelligence Community (IC) customers, which includes developing and reviewing security concept of operations, systems security plans, security control assessments, contingency plans, configuration management 1 , plans, incident response plans, plan of actions and milestones, risk management plans, vulnerability and compliance scanning, and/or vulnerabilitymanagement plans. Must have More ❯
IT Infrastructure Operation s and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation's IT operations, ensuring the stability, continuity, security, and efficiency of its technology … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and … access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such More ❯
role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems and resolving … security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of … make an impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, VulnerabilityManagement, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
employee at M.C. Dean, you will join forces with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the … for effective and efficient execution of business functions. 3. Provide effective leadership to identify, assess, and mitigate cybersecurity risks; exercise direct ownership of system monitoring and auditing, threat intelligence, vulnerabilitymanagement, incident response, cybersecurity awareness, and other critical continuous monitoring processes. 4. Lead investigations of computer security violations and incidents, reporting as necessary to both the Facility Security … operations teams to design, implement, and maintain cybersecurity controls and secure system development practices consistent with the established policies and standards. 6. Provide organizational leadership including expertise development, budget management, and resource allocation in support of the established policies, plans, and strategic direction, and to enable effective extension of cybersecurity capabilities to customer-facing operations. 7. Establish and maintain More ❯
including Endpoint Detection and Response. Good experience of Microsoft Sentinel (SIEM) Knowledge of Azure firewalls Networking and firewall solutions expertise with the like of (Cisco Meraki, Fortinet, Ubiquiti. WatchGuard) Vulnerabilitymanagement tool expertise (Tenable, Qualys) Email security solutions Knowledge (Mimecast, Egress) A Working understanding of Microsoft 365 Cloud Technologies and their threat landscape Familiarity with SOC operations, threat … Essentials and Cyber Essentials Plus (CE & CE+) audits, ensuring clients meet security compliance standards Provide escalation support for complex cyber incidents raised by the internal SOC team Perform technical vulnerability remediation, threat analysis, and reporting Conduct Microsoft 365 and Cloud Security assessments to identify gaps and secure client environments Carry out offensive security and web application assessments (including penetration … onboarding and deliver professional security consultations Onboard clients into key security platforms and ensure a smooth transition to managed services Support wider project delivery, working closely with the Project Management Office My client are investors in people an will invest in your career progression in a growing security team This is a great opportunity to work directly with a More ❯
contracts, you will be responsible for maintaining the cybersecurity posture of classified and unclassified information systems. You will ensure compliance with DoD cybersecurity policies and standards, including the Risk Management Framework (RMF), NIST Special Publications, and DoD Instructions (e.g., DoDI 8500.01 and 8510.01). The ISSO works closely with the FSO, IT staff, and program stakeholders to ensure systems … Assessment and Authorization (A&A) activities to obtain and maintain Authority to Operate (ATO). • Conduct and document regular security reviews, risk assessments, and audit log analysis. • Assist with vulnerability scanning and remediation (e.g., ACAS, Nessus, STIGs, SCAP). • Enforce security policies, procedures, and guidelines for users, developers, and administrators. • Report and respond to security incidents in coordination with … 3+ years of experience in DoD cybersecurity, including RMF and NIST 800-53 compliance. • Active DoD Secret security clearance or higher. • Familiarity with DISA STIGs, SCAP tools, eMASS, and vulnerabilitymanagement tools. • Experience with A&A processes and associated documentation and submission of RMF packages. • Experience coordinating with DCSA • DoD 8570 IAT Level II or IAM Level I More ❯
be advantageous to your application, as would CISSP and/or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerabilitymanagement, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform More ❯
must. • Solid knowledge of IT infrastructure administration, including Active Directory, DNS, DHCP, Group Policy, access control, endpoint hardening, Windows Server roles, and scripting (e.g., PowerShell). • Working knowledge of vulnerabilitymanagement tools and remediation practices in both OT and IT environments. • Ability to interpret and apply security frameworks (e.g., NIST 800-82, ISA/IEC 62443, NIST CSF More ❯
System Administrator GES is seeking a skilled Systems Administrator to join the I3TS team supporting DTRA. The I3TS program provides enterprise-wide IT support to enable DTRA's Information Management & Technology Directorate (ITD) to consolidate, modernize, and continuously innovate the delivery of IT services and mission capabilities to DTRA's internal and external mission partners operating in CONUS and … OCONUS locations. The candidate will be responsible for ensuring the security and integrity of IT systems by applying Security Technical Implementation Guides (STIGs), managing system patches, and overseeing vulnerabilitymanagement processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate will be responsible for identifying points … of vulnerability, non-compliance with established Information Assurance (IA) guidelines and regulations and recommend mitigation strategies, along with assisting users as needed in a classified computing environment. The selected candidate must be able to work independently as well as with a team of IT analysts, administrators, and engineers. The position requires excellent communications skills, both verbal and written. The More ❯
with federal regulations, and maintaining the overall security posture of information systems. Key Responsibilities: Security Compliance: Ensure compliance with NIST 800-53, RMF, STIGs, and DoD security policies. Risk Management: Conduct security risk assessments, vulnerabilitymanagement, and security audits. Authorization & Accreditation (A&A): Assist in developing and maintaining System Security Plans (SSP), POA&Ms, and Risk Assessments. …/SCI clearance with FULL SCOPE POLYGRAPH Certifications: Security+ (DoD 8570 IAT Level II required); CISSP, CISM, or CISA preferred. Experience: 3-7 years of experience in cybersecurity, risk management, or IT security. Technical Skills: Knowledge of NIST RMF, FISMA, STIGs, and ATO processes. Experience with SIEM tools, vulnerability scanners (e.g., Nessus, ACAS), and endpoint security solutions. Familiarity More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ikhoi Recruitment
Solutions for our clients together with assisting our Chief Information Security Officer with Cyber Essentials and Cyber Essentials Plus Audits and Assessment. You will be reporting to the Project Management Office Team on a Daily Basis and work with other members of the Cyber Security Team which also includes a Solution Lead, Cyber Security SOC Analyst and Cyber Security … including: Microsoft Defender XDR Microsoft Sentinel SIEM Microsoft Defender for Endpoint/Business Azure Firewall Microsoft Defender for Cloud/Cloud Apps Microsoft Defender for Office 365 Deployment and management of Endpoint Detection and Response solutions including Sentinel One Deployment and management of networking solutions including firewalls, switches and access points including Cisco Meraki, Fortinet and Watchguard Deployment … of vulnerabilitymanagement solutions including Tenable and Qualys Deployment and management of email security solutions including Mimecast and Egress Main Tasks and Responsibilities Assisting with Cyber Essentials and Cyber Essentials Plus audits and assessments Undertaking technical vulnerability remediation Providing escalation support for Cyber Security Incidents and Alerts from the SOC Team Providing Security Reporting and Analytics More ❯
role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems and resolving … security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of … make an impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, VulnerabilityManagement, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems and resolving … security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of … make an impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, VulnerabilityManagement, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
and/or re-design activities. Develop, implement, and evaluate security controls, measures, and frameworks in cloud-based systems to ensure data integrity, confidentiality, and availability. Perform risk analysis, vulnerability assessments, and security audits to identify and address potential weaknesses in cloud environments. Follow all appropriate security authorization process for requesting and maintaining an Authority to Operate (ATO). … to provide documentation to the system Certification and Accreditation process. Ensure audits and reviews are responded to with accurate information. Perform system access control responsibilities. Participate in the change management process for assigned applications. Work with Product Owner, Product Manager, OCIO, Security Division, and other stakeholders to ensure security concerns are addressed during all phases of system lifecycle. Perform … continuous system security monitoring. Implement and manage cloud-native and third-party security tools for monitoring, threat detection and vulnerability management. Act as a SME on Cloud Security while applying methods, standards, and approaches for ensuring the baseline security safeguards are appropriately implemented and documented. Provides reports to superiors regarding effectiveness of data security and makes recommendations for the More ❯