hierarchy or titles. It's about impact, curiosity and partnering to build something that scales well and feels right. You'll be hands on with architecture, tooling, policy and incident response. You'll enable teams to move quickly and securely, bringing clarity to complex problems and designing systems that work long after you're done with them. What you … ll be doing Collaborating with your teammates to take ownership of security across the business from hardening and monitoring to governance and incidentresponse Designing and evolving secure architectures using defence in depth and threat modelling principles across cloud, networks and endpoints Driving vulnerability management and scaling tooling such as CSPM, SIEM, IAM and endpoint protection to manage … security and data privacy, helping ensure we remain audit ready Building lightweight processes that make it easy for teams to do the secure thing by default Sharing ownership of incidentresponse including triage, coordination and postmortem analysis Partnering with engineers and product teams to embed secure thinking into design and delivery Keeping pace with emerging threats and contributing More ❯
recommendations to technical and non-technical audiences. Familiarity with NHS and public sector data protection responsibilities (e.g. NHS Data Security Standards, GDPR, DSP roles). Experience participating in security incidentresponse, post-incident reviews, and technical root cause analysis. Knowledge of identity and access management, security logging/monitoring, and asset/information classification. Strong documentation skills More ❯
cyber resilience. As a Senior Cyber Security Analyst, you will play a key role in protecting systems, networks, and data against cyber threats. You will lead threat detection and incidentresponse efforts, support the development of security policies and controls, and work closely with stakeholders to ensure compliance and security best practice across the business. You will also … cyber security best practice is considered throughout the entire SDLC. Creates and maintains documentation around the use of cyber security technology in the organisation. Carries out threat detection and incident response. Carries out vulnerability management and remediation. Collaborates as needed with third-party security vendors for expert advice and issue resolution. Carries out threat intel research and recommends security … Detailed understanding of application security along with experience of working alongside software development teams, supporting and advising on best practice to maintain security. Significant experience of endpoint detection and response (EDR) technologies and network detection and response (NDR) technologies. Detailed knowledge of Information Security standards including Cyber Essentials, Cyber Essentials Plus and ISO27001. Good understanding of Linux and More ❯
grasp of network security components, log management processes, multi-tier application architecture, and Scripting capabilities. Candidates should bring solid experience in cybersecurity, particularly in areas such as security logging, incidentresponse, forensic investigations, and audit remediation activities. Strong analytical skills are essential for reviewing security reports and uncovering potential vulnerabilities. Effective communication, collaboration, multitasking abilities, and a high More ❯
Crewe, Cheshire, England, United Kingdom Hybrid / WFH Options
DCS Recruitment
What you'll be doing Drive improvements to cyber security posture across internal and customer-facing platforms Design and secure cloud-based infrastructure and customer applications Perform threat detection, incidentresponse , and vulnerability remediation Maintain security architecture documentation and collaborate with third-party vendors Conduct threat intelligence research and recommend ongoing improvements What you'll need Strong technical More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
aligned with financial services compliance standards (e.g., ISO 27001, SOC 2, PCI-DSS). Collaborate with DevOps, Security, and Application teams to support CI/CD pipelines, monitoring, and incident response. Optimize cloud costs and performance through resource governance, tagging strategies, and usage analytics. Develop and maintain documentation for infrastructure standards, procedures, and best practices. Participate in disaster recovery More ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Experis
aligned with financial services compliance standards (e.g., ISO 27001, SOC 2, PCI-DSS). Collaborate with DevOps, Security, and Application teams to support CI/CD pipelines, monitoring, and incident response. Optimize cloud costs and performance through resource governance, tagging strategies, and usage analytics. Develop and maintain documentation for infrastructure standards, procedures, and best practices. Participate in disaster recovery More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management. HSM configuration/installation/support. Incident management. Change management. ITIL. Ensure the integrity and availability of cryptographic and key management services to business functions and applications. Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of Monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance. Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality. Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills. More ❯
Free secure on-site parking, Access to Employee assistance programmes with a range of discounts. What will you be doing? You will be leading 24x7 OT cybersecurity monitoring and incidentresponse, Managing cybersecurity service providers, Collaborate to enhance compliance and risk management, Deliver cyber security awareness campaigns. Where will you be doing it? Our client is a key More ❯
infrastructure automation capabilities Proficiency in configuring, managing, and troubleshooting Firewalls. Cisco, Palo Alto etc, Experience with intrusion detection/prevention systems, as well as with SIEM tools and security incident response. Design and implement secure network architectures, including Firewalls, intrusion detection/prevention systems, and encryption technologies. Be able to communicate to technical and non-technical stakeholders Must have More ❯
Cheshire, North West, United Kingdom Hybrid / WFH Options
Exalto Consulting ltd
infrastructure automation capabilities Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc, Experience with intrusion detection/prevention systems, as well as with SIEM tools and security incident response. Design and implement secure network architectures, including firewalls, intrusion detection/prevention systems, and encryption technologies. Be able to communicate to technical and non-technical stakeholders Must have More ❯
in line with our Mid-Market technology roadmap. The Role Technology & Systems Management Oversee the ongoing maintenance and development of Mid-Market business applications and platforms. Lead fault resolution, incidentresponse, and ensure timely ticket management. Ensure compliance with security policies and lead on risk remediation activities. Manage cloud development, architecture, and system integrations. Coordinate licensing, certificates, and More ❯
Macclesfield, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
and availability of our security infrastructure. What You'll Be Doing * Managing Hardware Security Modules (HSMs)and cryptographic infrastructure* Creating, storing, and retiring encryption keyssecurely across multiple platforms* Supporting incident and change managementprocesses* Collaborating with application, infrastructure, and support teams* Ensuring compliance with security standards and audit requirements* Contributing to project deliveryand continuous improvement initiatives What We're Looking … work under pressure* Excellent communication and stakeholder management skills Nice to Have * ITIL Foundation certification* Security or project management certifications* Experience with tools like JIRA, Confluence, SharePoint* Background in incident responseand risk management Benefits * Salary up to £41,000 depending on experience* Pension of 12%* Private medical* Discretionary bonus Please Note: This is a permanent role for UK residents More ❯
Warrington, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
and availability of our security infrastructure. What You'll Be Doing Managing Hardware Security Modules (HSMs)and cryptographic infrastructure Creating, storing, and retiring encryption keyssecurely across multiple platforms Supporting incident and change managementprocesses Collaborating with application, infrastructure, and support teams Ensuring compliance with security standards and audit requirements Contributing to project deliveryand continuous improvement initiatives What We're Looking … work under pressure Excellent communication and stakeholder management skills Nice to Have ITIL Foundation certification Security or project management certifications Experience with tools like JIRA, Confluence, SharePoint Background in incident responseand risk management Benefits Salary from £35-45,000 depending on experience Pension of 12% Private medical Discretionary bonus Please Note: This is a permanent role for UK residents More ❯
is reliable, scalable, and secure. Ensure the reliability, availability, and scalability of the systems, platforms, and technology through the application of software engineering techniques, automation, and best practices in incident response. Accountabilities Build Engineering: Development, delivery, and maintenance of high-quality infrastructure solutions to fulfil business requirements ensuring measurable reliability, performance, availability, and ease of use. Including the identification … of the appropriate technologies and solutions to meet business, optimisation, and resourcing requirements. Incident Management: Monitoring of IT infrastructure and system performance to measure, identify, address, and resolve any potential issues, vulnerabilities, or outages. Use of data to drive down mean time to resolution. Automation: Development and implementation of automated tasks and processes to improve efficiency and reduce manual More ❯