Cyber Security Analyst – Aberdeen, Hybrid We’re looking for a motivated and capable Cyber Security Analyst to join our team in Aberdeen . In this role, you’ll help identify, assess, and report on cyber risks, playing a key part in strengthening our overall security posture. You’ll bring a proactive mindset and a solid grounding in … security practices, with the ability to deliver second-line assurance activities that support both day-to-day operations and project work. You’ll work closely with colleagues across the business and with third-party partners to ensure we’re managing cyber risks effectively and meeting regulatory requirements. If you're passionate about cybersecurity and enjoy working in a collaborative … fast-paced environment, we’d love to hear from you. What you’ll do Work with the Project Team, Operations and Information Systems (IS) Security team to support IS in the delivery of secure, reliable, and safe IS operations to the business Work across vendors, project teams and wider IS team to define IS Security requirements for systems More ❯
modifications. This role includes maintaining all risk assessments and procedures related to cybersecurity for operational technology (OT), staying updated on threats and policy developments, and implementing and continuously improving security controls. The specialist will identify vulnerabilities, implement security measures, and respond to incidents to ensure the uninterrupted operation of critical infrastructure. Additionally, this position will be responsible for … cybersecurity projects and will implement and continuously improve security controls to ensure compliance with global and UK standards. Main duties and responsibilities Monitoring and analysing network traffic and system logs to detect and respond to security incidents. Responding to and investigating cybersecurity breaches and incidents. Managing ICS/OT Cybersecurity, ensuring compliance with relevant standards IEC62443, NIS(R … and UK legislation. Participating in the design and implementation of secure ICS/OT architectures. Actively collaborating in the management of IT cybersecurity and supporting the LISO (Local Information Security Officer) in its oversight responsibilities. Developing and implementing security policies, procedures, and controls to mitigate identified risks. Implementing and continuously improving security controls to protect critical infrastructure. More ❯
Acumin Location: Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 3 Posted: 06.06.2025 Expiry Date: 21.07.2025 col-wide Job Description: Senior DevSecOps/Application Security Engineer Location: Remote – UK or EMEA based 6 months+ Contract Niche SaaS Tech company are seeking a Senior DevSecOps/Application Security Engineer to champion and drive their … DevSecOps initiatives—shaping secure software delivery across a fast-moving, cloud-native environment. In this role, you’ll own and evolve the security tooling and automation embedded in their SDLC and CI/CD pipelines, working closely with software engineers, DevOps, and data scientists. You'll help ensure security is not a final step—but an integral, continuous … part of how they build and ship software. You will: Embed and automate security controls across CI/CD workflows Lead the integration of SAST, DAST, SCA, and threat modeling tools in DevSecOps pipelines Collaborate with developers to enable secure coding and privacy by design Drive adoption of secure development standards and practices across the org Operate and evolve More ❯
Aberdeen, Scotland, United Kingdom Hybrid / WFH Options
JR United Kingdom
Lead incident response, system reliability efforts, and infrastructure scalability initiatives. ● Manage messaging queues (e.g., Kafka, RabbitMQ) and optimize for low-latency event handling and throughput. ● Contribute to evolving our securityposture, including secrets management, access controls, and audit logging. Qualifications: ● Bachelor's degree in Computer Science, Engineering, or a related field, or equivalent practical experience. ● 5+ years of … Experience with messaging systems (RabbitMQ, Kafka, etc.) and event-driven ● Proficiency in infrastructure as code (Terraform preferred). ● Familiarity with monitoring stacks (Prometheus, Grafana, ELK, etc.) and system tuning. ● Security-conscious mindset; experience implementing controls in regulated or financial environments is a plus. ● Excellent problem-solving skills and a proactive attitude. ● Strong communication and teamwork abilities. Preferred Qualifications: ● Prior More ❯
Play a key role in shaping IT security strategy! Work to develop policies, manage risks, and drive security innovation. Ideal for those with extensive experience in cyber and information security and a passion for safeguarding digital assets. Overview job description: Working directly with the IT Manager, this role ensures IT Security by developing policies, managing risks … monitoring incidents, and ensuring compliance. Main duties and responsibilities: Working within IT strategy in support of the company’s mission and core objectives. Developing IT security policies and procedures. Continuously evaluating the IT securityposture of the organisation, identifying areas for improvement and implementing changes accordingly. Establishing and developing solution architecture for IT security and end … user service domains, ensuring security is integrated into all aspects of the organisation’s IT. Driving and facilitating vulnerability management and secure the design of IT services. Monitoring, identifying, resolution activities, and reporting IT security KPI’s and incidents. Liaising with the Engineering Team on all aspects of offshore security. Participating in audits relating to IT security. Developing More ❯
business applications. We have a passion for using technology to solve business problems, working in partnership with our clients to help in achieving their goals. The Sword IACS Consulting Security team provide consultancy services to help our customers understand the existing securityposture of their Operational Technology (OT) environment, identifying where potential gaps or vulnerabilities exist while … introducing appropriate security improvements and ways of working. Description of Duties: The candidate should have excellent communication skills, both written and oral, and the ability to interact effectively with fellow team members and our customers Customer interaction can be from executive level down to highly technical analysts working in structured and unstructured situations Participation in control system cyber security … audits and risk assessments Inventory gathering on offshore and onshore industrial locations Creation and interpretation of OT network topology diagrams and data flows Creation and installation of baseline cyber security controls Creation of relevant customer focused processes and procedures based on industry standards (e.g., IEC62443, OG86 etc.) Implementation of defined cyber security controls on customer systems Deployment of More ❯
Aberdeen, Scotland, United Kingdom Hybrid / WFH Options
JR United Kingdom
on insider risk management and regulatory compliance. You will also support the integration of Purview with Microsoft Entra ID, Exchange Online, SharePoint Online, Teams, and OneDrive, assess customer cloud securityposture, and liaise with stakeholders to align security strategies with business goals. The Person The ideal candidate will have hands-on experience delivering Microsoft Purview solutions in … Lifecycle Management, and Records Management. You should be able to present findings and recommendations clearly, have a passion for problem-solving and teamwork, and possess broad knowledge of Microsoft Security products, including Microsoft Entra, Microsoft 365 Defender, Microsoft Defender for Cloud, and Microsoft Sentinel. Due to project sensitivity, candidates should either hold SC Clearance or be eligible to obtain More ❯
We’re looking for an experienced Email Security Solutions Architect to join the team and lead the adoption of cutting-edge email security solutions. In this role, you’ll collaborate with both customers and internal teams to address challenges, demonstrate how our solutions fill security gaps, and enhance customers’ email security posture. Key Responsibilities: Collaborate with … Pre-Sales and Post-Sales teams to provide expert email security support Assess client needs and demonstrate how our solutions solve email security challenges Deliver technical presentations, product demos, and webinars Stay up-to-date on product updates and communicate new features Create and deliver training materials for internal and external stakeholders Maintain a lab environment for hands … on demos Partner with sales teams to advocate for feature enhancements Key Requirements: In-depth experience in Email Security, DLP, and Privacy Strong knowledge of Messaging and Email Architecture Proven collaboration and teamwork skills Exceptional communication skills, with the ability to present complex technical concepts to diverse audiences More ❯