services for platform components that are the backbone of Software Factory and CI/CD pipelines. You'll provide Day II operations support including routine patching, upgrades, continuous monitoring, vulnerabilitymanagement, and application optimization while maintaining established SLAs and SLOs. This role is contingent on contract award. What we are looking for: Associate: Bachelor's degree with 2+ More ❯
Stourbridge, West Midlands, United Kingdom Hybrid / WFH Options
Gambit Nash Limited
development, you will follow best practices to ensure that both new and existing code is secure and maintainable, following best practices for secure design, secure coding, security testing, and vulnerability management. Key skills a successful applicant must demonstrate A deep understanding and knowledge of WordPress from theme and plugin development Core skill set of PHP, HTML 5, CSS … and JavaScript with a demonstrable track record of systems delivery in this stack. Comfortable using version control (git) collaboratively, following branch strategies and pull-request based change management workflows. Understanding of the importance of Information Security and best practices for developing secure applications and websites. Familiarity with Scrum, Agile and Waterfall development methodologies. Sub-set of skills and appreciation More ❯
operation of the infrastructure estate, including but not limited to: Server OS Patch Management. Virtualisation (VMWare) Group Policy. M365 (including exchange online). Active Directory/Entra ID Server Vulnerability Management. Providing on site "eyes" & "hands" for the Network team to support the swift resolution of network related incidents at manufacturing sites. Make sure operational services, hardware and software More ❯
We are currently seeking an experienced Qualys Subject Matter Expert (SME) to lead the ongoing customisation, optimisation, and management of our client's Qualys vulnerabilitymanagement platform. This is a critical role focused on improving the organisation's security posture across on-premise, cloud, and hybrid environments. Key Responsibilities: Customise Qualys for reporting and real-time data … capture across organisational assets and infrastructure. Utilise and optimise Qualys Cloud Connectors for effective cloud vulnerability management. Mature the Qualys platform into a centralised view of vulnerabilitymanagement across environments. Troubleshoot and resolve issues including agent communication, inventory scanning, data purging, and user access. Design and implement tagging strategies, including dynamic tagging, to meet customer requirements. Customise … line with TruRisk scoring and stakeholder needs. Engage with internal customers to gather requirements, provide recommendations, and drive continuous improvements. Configure and maintain the Qualys platform to support ongoing vulnerability scans, compliance checks, and security assessments. Collaborate with IT and infrastructure teams to ensure seamless integration of Qualys into the broader security ecosystem. Deploy and manage Qualys Cloud Agents More ❯
systems and applications are compliant with all applicable Department of Defense (DoD) directives and guidelines, including Defense Information System Agency (DISA) Security Technical Implementation Guide (STIG) and Information Assurance VulnerabilityManagement (IAVM) bulletins. HS Diploma and 7+ years of relevant experience, or BS/BA Degree and 3+ years of relevant experience, or MS/MA Degree and More ❯
which will involve you been apart of an on call rota with the occasional meetings in Warwickshire/Wokingham. What will you be doing? Youll have day to day management of the OSS suite of services and underlying infrastructure as part of a 2nd Line team. Youll be proactive and Reactive within Incident Management Youll have user Access … Management & VulnerabilityManagement System Governance to ensure the effective operation of the services Providing Out of Hours Support via an On-Call Rota. What youll bring Youll bring experiencewith supporting OSS applications from a 2nd and 3rd Line level Youll have the experience of working with developers/vendors implementing fixes or improvements to systems Experience of More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
M Group Energy
which will involve you been apart of an on call rota with the occasional meetings in Warwickshire/Wokingham. What will you be doing? Youll have day to day management of the OSS suite of services and underlying infrastructure as part of a 2nd Line team. Youll be proactive and Reactive within Incident Management Youll have user Access … Management & VulnerabilityManagement System Governance to ensure the effective operation of the services Providing Out of Hours Support via an On-Call Rota. What youll bring Youll bring experiencewith supporting OSS applications from a 2nd and 3rd Line level Youll have the experience of working with developers/vendors implementing fixes or improvements to systems Experience of More ❯
crawley, west sussex, south east england, United Kingdom
M Group Energy
which will involve you been apart of an on call rota with the occasional meetings in Warwickshire/Wokingham. What will you be doing? Youll have day to day management of the OSS suite of services and underlying infrastructure as part of a 2nd Line team. Youll be proactive and Reactive within Incident Management Youll have user Access … Management & VulnerabilityManagement System Governance to ensure the effective operation of the services Providing Out of Hours Support via an On-Call Rota. What youll bring Youll bring experiencewith supporting OSS applications from a 2nd and 3rd Line level Youll have the experience of working with developers/vendors implementing fixes or improvements to systems Experience of More ❯
responsible for driving the technical direction, team growth, and execution of software initiatives that support our business goals. The ideal candidate combines deep technical expertise with strong leadership, project management, and cross-functional collaboration skills. We are ideally looking for someone who can primarily be office based, with flexibility for home working when required. Key Responsibilities Lead and mentor … and resource plans. Serve as the technical voice in executive discussions and strategic planning. Ensure all systems and software meet internal standards and external compliance requirements. Oversee incident response, vulnerabilitymanagement, and disaster recovery plans. As a visionary and strategic technology leader, the Director of Software Engineering is responsible for shaping and executing the software development strategy that More ❯
Lincoln, Lincolnshire, East Midlands, United Kingdom Hybrid / WFH Options
ITSS Recruitment Ltd
responsible for driving the technical direction, team growth, and execution of software initiatives that support our business goals. The ideal candidate combines deep technical expertise with strong leadership, project management, and cross-functional collaboration skills. We are ideally looking for someone who can primarily be office based, with flexibility for home working when required. Key Responsibilities * Lead and mentor … and resource plans. * Serve as the technical voice in executive discussions and strategic planning. * Ensure all systems and software meet internal standards and external compliance requirements. * Oversee incident response, vulnerabilitymanagement, and disaster recovery plans. As a visionary and strategic technology leader, the Director of Software Engineering is responsible for shaping and executing the software development strategy that More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
advice and guidance on secure development methodologies and tooling. Contribute to the design and implementation of secure infrastructure solutions. Key Skills and Experience: Proven expertise in Application Security and vulnerability management. Strong background in DevSecOps , including experience with CI/CD pipeline security integration. Familiarity with Cyber Assurance frameworks and practices. Hands-on development experience with security automation and More ❯
Stockport, Lancashire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
systems. Maintain accurate documentation of IT assets and processes. Assist in the planning and implementation of new infrastructure projects. Identify and mitigate potential risks to IT systems and services. Vulnerabilitymanagement system experience such as Rapid 7 Linux patching The Successful Applicant A successful Infrastructure Specialist should have: Experience managing IT infrastructure in the industrial or manufacturing Software … and storage systems. Proficiency in troubleshooting and problem-solving within IT environments. Knowledge of system security best practices and compliance standards. Ability to work collaboratively with cross-functional teams. VulnerabilityManagement system experience such as Rapid 7 Linux patching skills Cloud Infrastructure experience Excellent attention to detail and organisational skills. What's on Offer Competitive salary ranging from More ❯
every aspect. Team members are encouraged to challenge established thinking and share ideas to foster an environment of continuous improvement and shared success. What you will be doing: Infrastructure Management: Create, execute, and maintain cloud and on-premises infrastructure to support mission-critical applications, such as race telemetry and real-time analytics systems. CI/CD Pipelines: Build and … pipelines for rapid deployment and software updates. Monitoring & Alerting: Utilize advanced monitoring tools for proactive system health checks and automated incident alerts. Site Reliability: Improve system reliability through incident management, root cause analysis, and capacity planning. Security & Compliance: Follow security best practices, including access control, vulnerabilitymanagement, and adherence to F1 technical regulations. Collaboration & Communication: Work with … cross-functional teams, including software developers, data engineers, and race strategists, to facilitate seamless application deployment and integration. Automation & Optimization: Automate infrastructure management and operations to enhance scalability and performance. Disaster Recovery: Develop and test disaster recovery and business continuity plans to ensure zero downtime during peak race events. More ❯
location. Support includes general maintenance, upgrades, and new installs of servers and applications. Applies advanced technical knowledge of application networking, including load balancing applications, and ensuring fault tolerance. Performs vulnerability management. Required qualifications to be successful in this role: Seven (7) years of progressive experience in the field of Information Processing, six of which are specialized in numerous specialized … with various software. Security Clearance: Top Secret DoD 8570.01-M Certification: DFARS Information Assurance Contractor Training and Certification is required for this position. o IA Technical (IAT)/IA Management (IAM) Level: IAT Level II o IA Baseline Certification: Attachment_3_DOD 8570 Approved Baseline Certifications_Full_ o CE/OS Certificate: Attachment_4_DLA Approved CS CE List More ❯
scores, including technology performance and adoption. The role will also be collaborating with digital workplace engineering and IT security teams to support endpoint security and compliance, configuration, patching and vulnerabilitymanagement processes. You will have the following: Experience of implementing DEX tools or with endpoint management, analytics and automation. Experience driving and reporting on digital workplace technology More ❯
with colleagues in the London branch and wider teams while delivering global IT projects. Identify, plan and deliver service improvements, with a focus on operational stability, resilience and security. Vulnerabilitymanagement, including maintaining operating system and application security patch levels. IT documentation (working instructions, policies and procedures). Assist planning and delivery of Business Continuity and annual Disaster … and procedure Compliance with assigned and regulatory training Any other reasonable duty as required, which may be assigned from time to time. Key Skills and Experience required: IT Project management Understand advanced networking concepts Logic, reasoning and planning skills. Experience with hardware and software virtualisation technologies More ❯