Lincoln, Lincolnshire, East Midlands, United Kingdom Hybrid / WFH Options
Walsh Employment
Analyst to join the information security function. Reporting to the Information Security Manager , you will support critical activities related to threat monitoring, incident response, vulnerabilitymanagement and risk mitigation, while also acting as a key advocate for cyber awareness across the wider organisation Key Requirements Essential: 3+ years … experience in cyber security Proficiency in SIEM , antivirus , and vulnerabilitymanagement tools Understanding of AD , Office 365 , Windows Server , and infrastructure security Strong IT skills with experience across networks, OS, and security protocols Incident response and threat analysis expertise Familiar with Azure/Microsoft Defender and best practice More ❯
Lincoln, England, United Kingdom Hybrid / WFH Options
Walsh Employment Careers
Analyst to join the information security function. Reporting to the Information Security Manager , you will support critical activities related to threat monitoring, incident response, vulnerabilitymanagement and risk mitigation, while also acting as a key advocate for cyber awareness across the wider organisation Key Requirements Essential: 3+ years … experience in cyber security Proficiency in SIEM , antivirus , and vulnerabilitymanagement tools Understanding of AD , Office 365 , Windows Server , ... More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
Coordinate with Development and other departments to ensure these systems and records remain accurate and available Plan & Develop automation workflows to streamline deployments, infrastructure management and security processes with dry run testing and complete roll back functionality Analyse, diagnose and rectify system or service errors/faults as tasked … as Terraform, Ansible, PowerShell Experience with monitoring/logging tools SolarWinds, Grafana, Elastic Familiarity with security concepts such as Zero Trust, Identity and Access ManagementVulnerabilitymanagement, OWASP Understanding of CI/CD pipelines Familiar with Entra ID, AD, DNS, Azure Ability to troubleshoot complex issues across … desirable) Backup Concepts Database knowledge (MS SQL, Postgres) CI/CD Tools (Azure DevOps pipelines) IAM - OAuth/SAML/OIDC Credentials, Certificates, Secrets management SolarWinds Grafana Elastic Why Microlise? When your groceries arrive at your door or you sign for your online parcel, one or more of our More ❯
Coordinate with Development and other departments to ensure these systems and records remain accurate and available Plan & Develop automation workflows to streamline deployments, infrastructure management and security processes with dry run testing and complete roll back functionality Analyse, diagnose and rectify system or service errors/faults as tasked … as Terraform, Ansible, PowerShell Experience with monitoring/logging tools SolarWinds, Grafana, Elastic Familiarity with security concepts such as Zero Trust, Identity and Access ManagementVulnerabilitymanagement, OWASP Understanding of CI/CD pipelines Familiar with Entra ID, AD, DNS, Azure Ability to troubleshoot complex issues across … desirable) Backup Concepts Database knowledge (MS SQL, Postgres) CI/CD Tools (Azure DevOps pipelines) IAM - OAuth/SAML/OIDC Credentials, Certificates, Secrets management SolarWinds Grafana Elastic Why Microlise? When your groceries arrive at your door or you sign for your online parcel, one or more of our More ❯
Coordinate with Development and other departments to ensure these systems and records remain accurate and available Plan & Develop automation workflows to streamline deployments, infrastructure management and security processes with dry run testing and complete roll back functionality Analyse, diagnose and rectify system or service errors/faults as tasked … as Terraform, Ansible, PowerShell Experience with monitoring/logging tools SolarWinds, Grafana, Elastic Familiarity with security concepts such as Zero Trust, Identity and Access ManagementVulnerabilitymanagement, OWASP Understanding of CI/CD pipelines Familiar with Entra ID, AD, DNS, Azure Ability to troubleshoot complex issues across … desirable) Backup Concepts Database knowledge (MS SQL, Postgres) CI/CD Tools (Azure DevOps pipelines) IAM - OAuth/SAML/OIDC Credentials, Certificates, Secrets management SolarWinds Grafana Elastic Why Microlise? When your groceries arrive at your door or you sign for your online parcel, one or more of our More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
The Nottingham
environments using SIEM and EDR tools. Incident Investigation: Investigate security incidents and support the full incident response lifecycle, including documentation and root cause analysis. Vulnerability Assessments: Conduct regular vulnerability assessments and collaborate with IT teams to ensure timely remediation. Regulatory Compliance: Support compliance with regulatory requirements (FCA, PRA … and regulatory changes affecting the financial sector. About you: Security Tools Expertise: Strong understanding of security tools (SIEM, EDR, firewalls, IDS/IPS) and vulnerabilitymanagement processes. Technical Knowledge: Solid grasp of networking, system administration, and secure configurations. Standards Familiarity: Familiarity with standards and frameworks such as ISO More ❯
processes Support the agenda for our cloud first strategy and ensure any cloud solutions meet our security aspirations and requirements Take responsibility for incident management and lead our response to cyber security events, incidents and potential breaches Ensure our suppliers adequately monitor the IT estate for threats and alerts … technical area or equivalent industry experience Security domain specific experience showing progression through a number of roles with increasing responsibilities Strong technical leadership, stakeholder management and communication skills Experience working in a public body, particularly a local authority would be advantageous Experience of working through matrix management of … multi-disciplinary teams in complex infrastructure environments A strong technical background across Networks, Security, Firewall, VulnerabilityManagement, SIEM and EDR technologies Experience with cyber security concepts, such as Threat Modelling, Incident Response, Penetration Testing (external/internal) Advanced knowledge of cloud products and services e.g. Azure, Microsoft More ❯
skills/experience: Strong IT infrastructure background with a security focus Security certifications (CISMP, GSEC, or equivalent) Proven experience with firewalls, encryption, AV, and vulnerabilitymanagement Familiarity with ISMS, NIS Regulations, GDPR (desirable) Salary is mainly dependent on experience but can stretch up to £50,000pa. This role More ❯
skills/experience: Strong IT infrastructure background with a security focus Security certifications (CISMP, GSEC, or equivalent) Proven experience with firewalls, encryption, AV, and vulnerabilitymanagement Familiarity with ISMS, NIS Regulations, GDPR (desirable) Salary is mainly dependent on experience but can stretch up to £50,000pa. This role More ❯
a Cybersecurity Architect, you will specialize in DevSecOps, integrating security into the software development lifecycle, automating security practices, and ensuring robust threat modeling and vulnerability management. Your primary focus will be on cloud-native and on-premises environments, with a strong emphasis on application security, infrastructure as code (IaC … security, and cloud security posture management. Additionally, you will contribute to data security efforts, securing data at rest, managing key management systems, and ensuring strong governance across data access. Responsibilities: Integrate security into the software development lifecycle, automating security practices into CI/CD pipelines. Implement automated security testing … SCA, SAST, DAST) to identify and remediate vulnerabilities at every stage of development. Secure IaC configurations, ensuring secure provisioning, configuration management, and continuous monitoring of infrastructure. Utilize CNAPP and CSPM tools to secure cloud-native environments, focusing on application security and cloud posture management. Design and deploy PKI solutions More ❯