Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Oxfordshire, England, United Kingdom Hybrid / WFH Options
F5 Consultants
as designing and overseeing phishing simulations. Required Skills 2+ years' experience in an information security role Strong understanding of information security and cyber threat defence Hands-on experience with vulnerabilityscanning Ability to explain threats, vulnerabilities, and risks in a business context Experience delivering security training and running phishing simulations Experience with Microsoft Defender and/or third More ❯
oxford district, south east england, united kingdom Hybrid / WFH Options
F5 Consultants
as designing and overseeing phishing simulations. Required Skills 2+ years' experience in an information security role Strong understanding of information security and cyber threat defence Hands-on experience with vulnerabilityscanning Ability to explain threats, vulnerabilities, and risks in a business context Experience delivering security training and running phishing simulations Experience with Microsoft Defender and/or third More ❯
virtualisation environments (Hyper-V, VMWare) Strong knowledge of core Microsoft technologies including Active Directory, SCCM, Intune, and Microsoft 365 Proven experience with security tools: antivirus solutions (SOPHOS, Microsoft Defender), vulnerabilityscanning (Tenable Nessus), mail/web filtering (Clearswift, Fortinet) Proficiency with monitoring platforms such as SolarWinds and Azure Monitor Excellent analytical skills and ability to create comprehensive design More ❯
virtualisation environments (Hyper-V, VMWare) Strong knowledge of core Microsoft technologies including Active Directory, SCCM, Intune, and Microsoft 365 Proven experience with security tools: antivirus solutions (SOPHOS, Microsoft Defender), vulnerabilityscanning (Tenable Nessus), mail/web filtering (Clearswift, Fortinet) Proficiency with monitoring platforms such as SolarWinds and Azure Monitor Excellent analytical skills and ability to create comprehensive design More ❯
including executive briefings, and actionable recommendations to technical and non-technical stakeholders Set yourself apart: Monitoring, incident response and playbook development Detection creation within SIEM tools and using GitHub Vulnerabilityscanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Ability More ❯
the day-to-day operation of security systems and tools, including firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus, anti-malware, SIEM (Security Information and Event Management), vulnerability scanners, and data encryption solutions. Manage vulnerability management programs, including regular scanning, penetration testing, and remediation of identified weaknesses. Lead and manage security incident response, including detection … Strong understanding of information security principles, frameworks (e.g., ISO 27001, NIST, Cyber Essentials), and best practices. Hands-on experience with security technologies such as firewalls, SIEM, IDS/IPS, vulnerability scanners, endpoint detection and response (EDR), and identity management solutions. Experience with cloud security (e.g., Azure Security). Proven experience in managing security incidents and conducting incident response. Familiarity More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Last Mile Infrastructure Limited
a team of security professionals, oversee the delivery and ongoing management of our security infrastructure, and act as the go-to technical expert in threat detection, incident response, and vulnerability management. Were looking for someone with strong leadership skills, a deep knowledge of the cyber security landscape, and a real passion for safeguarding digital assets. Whats in it for … cyber security role, with a proven track record of leading and mentoring a team. Extensive experience with security technologies such as SIEM, firewalls, intrusion detection/prevention systems, and vulnerabilityscanning tools. In-depth knowledge of incident response procedures, threat hunting, and forensic investigation techniques. Strong understanding of networking protocols, operating systems, and cloud security principles. Qualifications Bachelor More ❯
into our pipelines, automate compliance and help us ship fast without compromise. Key Responsibilities: Integrate security tools and practices into CI/CD pipelines (GitHub Actions, Jenkins, GitLab) Automate vulnerabilityscanning, code analysis, and container hardening Collaborate with developers to design secure architectures and threat models Monitor cloud infrastructure (AWS, Azure, GCP) for misconfigurations and anomalies Lead incident More ❯
West Bridgford, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
loves to automate mundane tasks, make software and systems that are scalable, highly available, and robust, and making sure whatever you’re working on is secure, through things like vulnerabilityscanning, threat analysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with More ❯
analytics to enhance integrations and documentation. Key skills for this role Security & Compliance:o Implement and enforce security best practices across the platform, includingsecure coding, dependency management, and vulnerability scanning.o Ensure API security and access control using OAuth, API keys, JWT, and othermechanisms.o Monitor and remediate security vulnerabilities in third-party packages andlibraries.o Collaborate with security teams to More ❯
teams and shaping best practice. Essential Skills & Experience 5+ years in IT security or MSP environments . Strong understanding of Cyber Essentials, ISO27001, or NIST frameworks. Experience managing patching, vulnerability, and risk governance . Skilled communicator with the ability to explain risks to non-technical audiences. Proven experience leading client-facing security reviews . Desirable CISSP, CISM , or equivalent … certifications. Experience auditing or delivering compliance frameworks. Familiarity with RMM/XDR/EDR , SIEM, and vulnerabilityscanning platforms. Background in mentoring or managing small teams. Exposure to incident response and tabletop exercises. Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome More ❯
DevSecOps Lead to set technical direction and ensure secure, scalable, and resilient systems. Key Responsibilities: Define and enforce platform architecture standards with a focus on security and resilience Lead vulnerability management and compliance alignment Implement security best practices across CI/CD pipelines and infrastructure Drive API security (OAuth, JWT, API keys) and lifecycle management Oversee disaster recovery strategies … and resilience testing Automate infrastructure upgrades using IaC tools 🛠️ Tech Stack: Cloud & DevOps: AWS (Lambda, API Gateway, ECS, DynamoDB, S3), Azure DevOps, GitHub Workflows Security: Secure coding, vulnerabilityscanning, compliance frameworks Infrastructure Automation: Terraform, Ansible, Docker Programming: Python, Node.js API Management: Apigee Edge/Apigee X What We’re Looking For: Strong expertise in cloud-native architecture and More ❯
and forensic analysis using LogRhythm analytics capabilities Provide cybersecurity compliance monitoring of classified and unclassified naval networks Verify ACAS implementation, operations, and scan result analysis for immediate remediation Monitor vulnerability management programs and assess cybersecurity posture of training networks Lead development and maintenance of RMF artifacts (SSPs, SCTMs, POA&Ms, Security Assessment Reports) Perform system security engineering for naval … platforms including secure architecture design Conduct vulnerabilityscanning, assessment and mitigation using LogRhythm and approved DoD tools Support cybersecurity inspections, audits and authorization reviews for naval expeditionary programs Develop automation scripts and workflows to streamline security operations Interpret results from network/server/application scanning tools such as Trellix Configure API integrations and custom connectors for More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
protocols and secure key lifecycle management - Securing microservices, APIs, and DevSecOps best practices Skilled in penetration testing and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerabilityscanning, remediation, and vendor management Collaborative mindset with the ability to partner across engineering, security, and product teams Desirable Skills: Hands-on configuration, deployment, and operation of ForgeRock More ❯
issues.* Collaboration: Work closely with software developers, network engineers, and product managers to troubleshoot issues and optimize performance* Security: Integrate security best practices (DevSecOps) into the development lifecycle, including vulnerabilityscanning, static code analysis, and compliance checks. The Requirements* Hands-on experience in a DevOps, SRE, or similar role.* Strong proficiency with at least one major cloud provider More ❯
issues.* Collaboration: Work closely with software developers, network engineers, and product managers to troubleshoot issues and optimize performance* Security: Integrate security best practices (DevSecOps) into the development lifecycle, including vulnerabilityscanning, static code analysis, and compliance checks. The Requirements* Hands-on experience in a DevOps, SRE, or similar role.* Strong proficiency with at least one major cloud provider More ❯
Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom
Akkodis
issues.* Collaboration: Work closely with software developers, network engineers, and product managers to troubleshoot issues and optimize performance* Security: Integrate security best practices (DevSecOps) into the development lifecycle, including vulnerabilityscanning, static code analysis, and compliance checks. The Requirements* Hands-on experience in a DevOps, SRE, or similar role.* Strong proficiency with at least one major cloud provider More ❯
Kingston Upon Hull, East Riding of Yorkshire, United Kingdom
Akkodis
issues. * Collaboration: Work closely with software developers, network engineers, and product managers to troubleshoot issues and optimize performance * Security: Integrate security best practices (DevSecOps) into the development lifecycle, including vulnerabilityscanning, static code analysis, and compliance checks. The Requirements * Hands-on experience in a DevOps, SRE, or similar role. * Strong proficiency with at least one major cloud provider More ❯
NG1, Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
You are someone who loves to automate mundane tasks, make scalable, highly available, and robust solutions, and making sure whatever you’re working on is secure, through things like vulnerabilityscanning, threat analysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with More ❯
NG2, West Bridgford, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
You are someone who loves to automate mundane tasks, create scalable, highly available, and robust solutions, and ensure that whatever you’re working on is secure, through measures like vulnerabilityscanning, threat analysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with More ❯
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯