MoD) and other regulatory bodies to demonstrate compliance with stringent security and airworthiness standards.Key Responsibilities* Lead product-level cybersecurity assessments for UAV platforms, avionics, and embedded payload systems.* Conduct vulnerability analysis and assurance activities across software, firmware, and communication interfaces.* Develop and maintain product security architectures, ensuring compliance with secure-by-design principles and recognised standards.* Support and participate … Secure Development Lifecycle (SDL) processes.* Identify and mitigate cyber threats early in the product lifecycle through threat modelling and risk analysis.* Drive continuous improvement in security testing, automation, and vulnerabilitymanagement practices.* Proficiency in one or more programming/scripting languages: C, C++, Python, or Bash, preferably in embedded or Linux environments.* Familiarity with relevant standards, including:o More ❯
and other regulatory bodies to demonstrate compliance with stringent security and airworthiness standards. Key Responsibilities * Lead product-level cybersecurity assessments for UAV platforms, avionics, and Embedded payload systems. * Conduct vulnerability analysis and assurance activities across software, firmware, and communication interfaces. * Develop and maintain product security architectures, ensuring compliance with secure-by-design principles and recognised standards. * Support and participate … Development Lifecycle (SDL) processes. * Identify and mitigate cyber threats early in the product life cycle through threat modelling and risk analysis. * Drive continuous improvement in security testing, automation, and vulnerabilitymanagement practices. * Proficiency in one or more programming/Scripting languages: C, C++, Python, or Bash, preferably in Embedded or Linux environments. * Familiarity with relevant standards, including: o More ❯
Hands-on experience with security tools (OWASP Zap, Trivy, Dependabot) in CI/CD Cloud security expertise in AWS and Azure Strong scripting skills (Node.js, Python, Bash) Knowledge of vulnerabilitymanagement and secure DevOps practices Nice to Have IaC security knowledge Experience with defect tracking and automated testing frameworks Preferred Background Bachelor's in Computer Science or related More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Code) with Ansible, AAP VMware (upgrade, manage) Understanding of Networking Technologies Strong problem-solving skills with the ability to own, diagnose and resolve platforms Issues. Understanding of cybersecurity principles, vulnerabilitymanagement Experience of Python, Bash, API's Engineering mindset able to challenge the status quo and automate manual processes to deliver additional value. Exceptional communication & teamwork skills This More ❯
as Code) with Ansible, AAP VMware (upgrade, manage) Understanding of Networking Technologies Strong problem-solving skills with the ability to own, diagnose and resolve platformsIssues. Understanding of cybersecurity principles, vulnerabilitymanagement Experience of Python, Bash, API's Engineering mindset able to challenge the status quo and automate manual processesto deliver additional value. Exceptional communication & teamwork skills This is More ❯
geographically dispersed environment. Identify process and technical improvements for the environment Desirable Knowledge in a variety of endpoint solutions such as Sophos and/or Symantec AV Knowledge of VulnerabilityManagement and Risk Analysis AV policy enhancements for SACB solutions (Netskope) Vendor-specific AV/APT certifications Prior experience and/or training with regard to the ITIL More ❯
Knutsford, Cheshire, United Kingdom Hybrid/Remote Options
Applause IT Recruitment Ltd
such as ISO 27001 and SOC 2 Type II. This is a visible and strategic position - ideal for someone who enjoys combining technical depth with governance, audit, and risk management responsibilities. Key Responsibilities Develop and maintain the company's information security strategy, policies, and frameworks. Oversee day-to-day security operations including access control, patching, log review, and alert … Strong understanding of ISMS principles (ISO 27001) and audit support for SOC 2 Type II. Hands-on experience with security tools and controls - SIEM, IAM/PAM, endpoint protection, vulnerability management. Working knowledge of data-protection and privacy standards (GDPR, HIPAA). Excellent communication skills - able to collaborate across technical and non-technical teams. Relevant certifications welcomed - CISSP, CISM More ❯
with strong leadership and strategic planning capabilities. Key Responsibilities Security Leadership Define and implement the company's IT security strategy, policies, and frameworks. Lead risk assessments, threat modeling, and vulnerability management. Ensure compliance with ISO 27001, SOC 2, GDPR, HIPAA, and other relevant standards. Oversee incident response and monitoring to ensure rapid detection and remediation. Champion a security-first … detection/prevention systems. Experience supporting AI/ML platforms and GPU clusters is a plus. Familiarity with compliance frameworks (SOC 2, ISO 27001, FedRAMP). Excellent leadership, stakeholder management, and communication skills. Preferred Qualifications Advanced degree in Computer Science, Cybersecurity, or related field. Certifications such as CISSP, CISM, CCSP, or AWS Security Specialty. Experience in AI-focused or More ❯
in embedding security into IT platforms across both cloud and on-premises environments. You’ll advise on security design, implement and maintain controls, and contribute to incident response and vulnerability management. The role involves working closely with architects, infrastructure teams, and project managers to ensure systems are resilient, compliant, and aligned to best practice. You’ll also be involved … ll bring strong experience in cyber or IT infrastructure security, ideally within hybrid Microsoft-based environments. You should have hands-on expertise in areas such as identity and access management, encryption, monitoring tools, and vulnerability management. A sound knowledge of regulatory frameworks and industry security standards is important, along with the ability to balance technical detail with clear … endpoint protection. Familiarity with frameworks like NIST, CIS, ISO 27001, and Cyber Essentials Plus. Experience with monitoring and SIEM tools, threat detection, and incident response. Strong communication and stakeholder management skills. Desirable experience: Security certifications (e.g. CISSP, CISM, Microsoft security certs). Cloud security or architecture qualifications. Knowledge of automation, scripting, or SOAR platforms. Experience in OT or IoT More ❯
Leeds, West Yorkshire, United Kingdom Hybrid/Remote Options
Corecom Consulting
Leeds is seeking a Full-Stack PHP Developer to join its small but growing team. The business has evolved from dark web monitoring into a full External Attack Surface Management (EASM) platform. The role is focused on enhancing, maintaining, and scaling this SaaS platform while embedding secure coding practices. Key Responsibilities * Enhance and maintain the SaaS platform hosted in … and general cybersecurity principles. * Ability to communicate effectively with technical and non-technical stakeholders. * Experience working in small teams or start-up environments. Desirable Skills * Experience in cybersecurity SaaS, vulnerabilitymanagement, or EASM. * Familiarity with serverless AWS infrastructure and cloud-native architectures. * Exposure to AI/ML in the context of cybersecurity. * Knowledge of DevOps practices, CI/ More ❯
automation, and a mobile-first strategy across a global footprint. Duties and Responsibilities Platform Ownership & Strategy • Act as the primary owner for the Azure cloud environment, including governance, cost management, architecture, and operations. • Develop and maintain a scalable, secure, and resilient cloud platform aligned with the firm's digital transformation goals. • Drive and implement the roadmap for infrastructure upgrades … regardless of time of day is an essential. • Lead by example, setting clear expectations and holding individuals and teams accountable for high performance and ethical conduct. • Provide direct line management of individuals where appropriate, ensuring clear direction, regular development conversations, and alignment with team and business goals. Operational Management • Take full ownership of day-to-day BAU operations … ensuring the cloud platform's performance, reliability, security, and compliance. This includes patch management across all infrastructure services, as well as ensuring regular reporting is carried out for patch compliance and vulnerability management. Beyond operational stability, the role demands a continuous improvement mindset - proactively evaluating the platform and driving enhancements to optimise efficiency, resilience, and user experience. • Manage More ❯
automation, and a mobile-first strategy across a global footprint. Duties and Responsibilities Platform Ownership & Strategy • Act as the primary owner for the Azure cloud environment, including governance, cost management, architecture, and operations. • Develop and maintain a scalable, secure, and resilient cloud platform aligned with the firm's digital transformation goals. • Drive and implement the roadmap for infrastructure upgrades … regardless of time of day is an essential. • Lead by example, setting clear expectations and holding individuals and teams accountable for high performance and ethical conduct. • Provide direct line management of individuals where appropriate, ensuring clear direction, regular development conversations, and alignment with team and business goals. Operational Management • Take full ownership of day-to-day BAU operations … ensuring the cloud platform's performance, reliability, security, and compliance. This includes patch management across all infrastructure services, as well as ensuring regular reporting is carried out for patch compliance and vulnerability management. Beyond operational stability, the role demands a continuous improvement mindset - proactively evaluating the platform and driving enhancements to optimise efficiency, resilience, and user experience. • Manage More ❯
of Infrastructure as Code, Containers and CI/CD concepts. In-depth knowledge of SAST/DAST tooling and concepts and how best to utilize it to enhance the VulnerabilityManagement and wider IAC capabilities. Significant knowledge of AWS environments and implementing AWS Well Architected Security pillar. Experience building and fine-tuning security tooling to be deployed in More ❯
Bristol, Avon, South West, United Kingdom Hybrid/Remote Options
Alexander Mae (Bristol) Ltd
desk Assist with pre-sales technical support Providing technical support by way of support tickets and emails Answering the phone when needed Completing business as usual activities such as vulnerabilitymanagement, patching, backend systems troubleshooting Acting as primary technical lead Training other members of the desk, or assisting non technical staff with support issues Answering to the service More ❯
them to real-world solutions. Strong background in web services, RESTful APIs, and event-driven architectures (MSMQ, RabbitMQ, Kafka). Security-first mindset with experience in threat modelling and vulnerability management. This is a super technical role with very complex software so your problem solving skills will be challenged every day. The Perks Salary: Up to More ❯
automation, and a mobile-first strategy across a global footprint. Key Responsibilities Platform Ownership s Strategy Act as the primary owner for the Azure cloud environment, including governance, cost management, architecture, and operations. Develop and maintain a scalable, secure, and resilient cloud platform aligned with the firm’s digital transformation goals. Drive and implement the roadmap for infrastructure upgrades … expectation of flexibility and responsiveness during critical incidents. Lead by example, setting clear expectations and holding individuals and teams accountable for high performance and ethical conduct. Provide direct line management of individuals where appropriate, ensuring clear direction, regular development conversations, and alignment with team and business goals. This role requires you to remain hands on as well as take … on leadership responsibilities. Operational Management Take full ownership of day-to-day BAU operations, ensuring the cloud platform’s performance, reliability, security, and compliance. This includes patch management across all infrastructure services, as well as ensuring regular reporting is carried out for patch compliance and vulnerability management. Beyond operational stability, the role demands a continuous improvement mindset More ❯
automation, and a mobile-first strategy across a global footprint. Key Responsibilities Platform Ownership s Strategy Act as the primary owner for the Azure cloud environment, including governance, cost management, architecture, and operations. Develop and maintain a scalable, secure, and resilient cloud platform aligned with the firm’s digital transformation goals. Drive and implement the roadmap for infrastructure upgrades … expectation of flexibility and responsiveness during critical incidents. Lead by example, setting clear expectations and holding individuals and teams accountable for high performance and ethical conduct. Provide direct line management of individuals where appropriate, ensuring clear direction, regular development conversations, and alignment with team and business goals. This role requires you to remain hands on as well as take … on leadership responsibilities. Operational Management Take full ownership of day-to-day BAU operations, ensuring the cloud platform’s performance, reliability, security, and compliance. This includes patch management across all infrastructure services, as well as ensuring regular reporting is carried out for patch compliance and vulnerability management. Beyond operational stability, the role demands a continuous improvement mindset More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid/Remote Options
Last Mile Infrastructure Limited
our digital resilience. As a Cyber Security Lead, reporting into the Director, Technology and Data, youll lead and develop a team of security professionals, oversee the delivery and ongoing management of our security infrastructure, and act as the go-to technical expert in threat detection, incident response, and vulnerability management. Were looking for someone with strong leadership skills … cyber security role, with a proven track record of leading and mentoring a team. Extensive experience with security technologies such as SIEM, firewalls, intrusion detection/prevention systems, and vulnerability scanning tools. In-depth knowledge of incident response procedures, threat hunting, and forensic investigation techniques. Strong understanding of networking protocols, operating systems, and cloud security principles. Qualifications Bachelor's … wastewater. Working through our operating companiesUKPS(in South of England and Wales),Energetics(in Scotland, North Wales and the North of England) and our asset adoption businessLast Mile Asset Management, we offer a one-stop shop for new utility connections. Were proud to be both aGreat Place to Workcertified business and a Living Wage Employer, reflecting our commitment to More ❯
Pod Security Policies (or the newer Pod Security Admission controller), and GKE Sandbox. Configuring and enforcing network policies to control traffic between pods and namespaces. Using container scanning and vulnerabilitymanagement tools to secure container images. Implementing Binary Authorization to ensure only trusted images are deployed to clusters. Establishing robust IAM policies for GKE and related GCP services. … Excellent communication, stakeholder management, and problem-solving skills. Relevant professional certifications (e.g., Google Cloud Certified Professional Cloud Architect or DevOps Engineer) are a plus. More ❯
Lincoln, Lincolnshire, East Midlands, United Kingdom Hybrid/Remote Options
ITSS Recruitment Ltd
responsible for driving the technical direction, team growth, and execution of software initiatives that support our business goals. The ideal candidate combines deep technical expertise with strong leadership, project management, and cross-functional collaboration skills. We are ideally looking for someone who can primarily be office based, with flexibility for home working when required. Key Responsibilities * Lead and mentor … and resource plans. * Serve as the technical voice in executive discussions and strategic planning. * Ensure all systems and software meet internal standards and external compliance requirements. * Oversee incident response, vulnerabilitymanagement, and disaster recovery plans. As a visionary and strategic technology leader, the Director of Software Engineering is responsible for shaping and executing the software development strategy that More ❯
project teams. Perform vendor risk assessments insupport of internal business process area project teams. May be required tosupport Critical Infrastructure Protection (CIP) readiness and compliance activities. Generate regular risk management reports using various security technologies. Perform internal vulnerability assessments and ensure remediation of vulnerabilitiesfor business process area infrastructure and web applications. May be requested toperform internal penetration testing. More ❯
on senior role for someone who thrives on solving complex challenges, mentoring others, and shaping IT standards in an evolving and ambitious organisation. What You’ll Do Lead the management and development of a hybrid IT estate, ensuring performance, security, and resilience. Oversee Windows Server, Active Directory, Intune, Azure, and virtualisation platforms (Hyper-V, SAN). Drive improvements in … on system upgrades, automation, and business continuity planning. What You’ll Bring Strong expertise in Windows Server, Active Directory, Azure, Hyper-V, and Veeam. Solid understanding of cybersecurity, identity management, and vulnerability management. Proven troubleshooting and documentation skills. Experience supporting multi-site or hybrid environments. Desirable: Certifications (e.g. Microsoft, CompTIA, or cybersecurity) PowerShell scripting, networking (Barracuda, Ubiquiti), or More ❯