detects external-facing security gaps and misconfigurations, ensuring timely escalation to relevant resolver teams for remediation Your skills and experiences: A extensive technical background with a detailed knowledge of cybersecurity, computer networks and operating systems Broad and detailed experience of technologies including but not limited to DNS, Certificate Transparency, firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server More ❯
and delivered throughout the year. Help embed security best practices throughout the business and early in projects. Skills, Experience and Knowledge: Proven experience of IT GRC and Information/Cybersecurity Proven experience of risk and control management Proven experience of standards including ISO27001, PCI, GDPR/DPA & NIST Communication of complex ideas clearly in a non-technical way Strong More ❯
Worthing, Sussex, United Kingdom Hybrid / WFH Options
Nextech Group Ltd
your extensive experience with IT Service Desk tools to provide exceptional support to colleagues, both individually and in small groups. Security Focus: Utilise your deep knowledge of IT/Cybersecurity practices to identify and address security threats and breaches effectively. Collaborative Resolution: Partner with 3rd party suppliers to resolve issues efficiently and ensure seamless operations. Resource Planning: Apply your More ❯
Worthing, West Sussex, South East, United Kingdom Hybrid / WFH Options
Nextech Group Limited
your extensive experience with IT Service Desk tools to provide exceptional support to colleagues, both individually and in small groups. * Security Focus: Utilise your deep knowledge of IT/Cybersecurity practices to identify and address security threats and breaches effectively. * Collaborative Resolution: Partner with 3rd party suppliers to resolve issues efficiently and ensure seamless operations. * Resource Planning: Apply your More ❯
for the project. Manage and support the population of the Common Data Environment (CDE) for all stakeholders. Fulfil compliance requirements set forth in Schedule 24 of the Project Agreement. Cybersecurity Oversight: Implement measures to protect against potential security risks, including unauthorised access, malware, and other vulnerabilities. Ensure all third parties and subcontractors comply with established information security practices. Personnel Management More ❯
Rawtenstall, Lancashire, United Kingdom Hybrid / WFH Options
Nova Recruitment
macOS and Windows environments (using MDM tools like Jamf, Intune, etc.). Procure, configure, and maintain hardware (laptops, servers, networking gear). Implement IT policies, device encryption, backups, and cybersecurity best practices. Administer users, groups, access control, and device enrolment. Maintain asset inventory, licenses, and documentation. Monitor and resolve escalated issues from the 1st Line Support Technician. Participate in long More ❯
and other related benefits. Our salary ranges are determined by role, level, and location. These factors and individual capabilities will also determine the individual pay offered. Belonging at Mimecast Cybersecurity is a community effort. That's why we're committed to building an inclusive, diverse community that celebrates and welcomes everyone - unless they're a cybercriminal, of course.We're proud More ❯
Overview We are seeking an experienced individual with a strong foundation in SAP Vulnerability Management and Threat Detection systems, including associated controls, proficiency in SAP environments, and awareness of Cybersecurity frameworks. Responsibilities Design, implement, and assess vulnerability management frameworks, primarily within SAP-enabled environments. Lead client conversations on SAP Vulnerability and Threat Management strategy, compliance challenges, and controls optimisation. Provide More ❯
Platform, both their services and how to work in the cloud such as DevOps-centric approach Having worked in sensitive data environments and ideally have experience facing off to cybersecurity specialists Understand and apply recognised data modelling patterns and standards Aker Systems Attributes At Aker we work as a team; we are collaborative, hardworking, open, and delivery obsessed. There More ❯
from model management and CAD strategy to laser scanning, data visualisation, and reality capture. You'll also work with cross-functional teams and gain exposure to areas such as cybersecurity, systems engineering, and configuration control. Each rotation is designed to help you build technical and professional skills, with increasing levels of responsibility and autonomy. By the end of the More ❯
play a key role in implementing advanced security measures to protect database environments and sensitive data. This may involve implementing access controls, encryption technologies, and monitoring systems to mitigate cybersecurity risks and ensure compliance with NHS security policies and regulations. About us The Northern Care Alliance NHS Foundation Trust (NCA) provides hospital and integrated health and social care services More ❯
of storage solutions, backup, and disaster recovery tools. IT service frameworks (e.g., ITIL) Hands-on experience administering and supporting Microsoft 365 platforms (Exchange Online, Teams, SharePoint, OneDrive) Understanding of cybersecurity best practices and principles (antivirus, patching, endpoint security). Experience working on IT projects (e.g. system upgrades, migrations, rollouts). Strong communication and collaboration skills, with the ability to engage More ❯
Stonehouse, Gloucestershire, South West, United Kingdom
LM RECRUITMENT SOLUTIONS LTD
applications. Support all school software applications, including the School Management Information System, VLE, and library management system. . Provide support and maintenance for servers, including backup routines. Installation, Configuration & CyberSecurity Ensure all College-owned devices are installed with required software and kept up to date with the latest security fixes. Manage, monitor, and implement security systems and policies to More ❯
applications. Support all school software applications, including the School Management Information System, VLE, and library management system. . Provide support and maintenance for servers, including backup routines. Installation, Configuration & CyberSecurity Ensure all College-owned devices are installed with required software and kept up to date with the latest security fixes. Manage, monitor, and implement security systems and policies to More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
Us Different: Purpose: you can use your passion and abilities at Leidos to keep the people you care about safe. We are at the forefront of machine learning, AI, cybersecurity and solutions. Using your skills in the technology frontline by helping to build a safer world. You can inspire change. Collaboration: having flexibility to do your job is one More ❯
Essential Significant experience related to the responsibilities specified Desirable NHS Experience Qualifications and Training Essential Educated to degree lever or equivalent experience. Cisco/HP/Aruba Certifications Desirable Cybersecurity qualifications Post graduate qualification or equivalent experience. Evidence of continual professional development Knowledge and Skills Essential The ability to communicate complex technical issues effectively with a wide range of More ❯
with Apple Mac, iOS, mobile device support, Microsoft 365, cloud-based admin portals, Mobile Device Management tools such as Jamf or Intune, software packaging and deployment, networking basics, and CyberSecurity principles. Candidates will be required to have a full uk driver's licence If you are interested in this position please apply online or for more information please contact More ❯
with Apple Mac, iOS, mobile device support, Microsoft 365, cloud-based admin portals, Mobile Device Management tools such as Jamf or Intune, software packaging and deployment, networking basics, and CyberSecurity principles. Candidates will be required to have a full uk driver's licence If you are interested in this position please apply online or for more information please contact More ❯
with Apple Mac, iOS, mobile device support, Microsoft 365, cloud-based admin portals, Mobile Device Management tools such as Jamf or Intune, software packaging and deployment, networking basics, and CyberSecurity principles. Candidates will be required to have a full uk driver's licence If you are interested in this position please apply online or for more information please contact More ❯
company as the partner of choice for innovative autonomous off-highway technologies. The company is focused on delivering excellence and developing software systems that meet international safety standards and cyber-security requirements. Your contributions will directly support their mission to create advanced solutions for the global market. Location: This role is based at the company's UK headquarters in Warwickshire More ❯
company as the partner of choice for innovative autonomous off-highway technologies. The company is focused on delivering excellence and developing software systems that meet international safety standards and cyber-security requirements. Your contributions will directly support their mission to create advanced solutions for the global market. Location: This role is based at the company's UK headquarters in Warwickshire More ❯
reviews and provide expert guidance throughout the solution lifecycle. Solution Design & Delivery Design and document Azure solutions that meet business, technical, and regulatory needs. Collaborate with engineering, infrastructure, and cybersecurity teams to ensure successful implementation. Ensure traceability of architectural decisions and maintain high-quality documentation. Cloud Strategy Execution Support the execution of the Azure cloud strategy and roadmap. Identify opportunities More ❯
Desirable Skills & Qualifications -Certifications such as CCNA, CompTIA Network+, or ITIL. -Knowledge of cloud networking (AWS, Azure, or GCP). -Scripting/automation skills (Python, PowerShell). -Exposure to cybersecurity monitoring. Benefits - 25 days leave plus the option to purchase more holiday (this is discretionary) - 10% Employer Pension Contribution (3% Employee Pension Contribution) - Flexible working - Health Cash Plan for Employee More ❯
own. Of course, as a senior member of the team, you will also be in a position to contribute to a body-of-knowledge across key domains of networking, cybersecurity and edge computing, as well as industry analyses and perspectives. For this role, our Solutions Engineering team members focus on large clients for whom we are able to develop deep More ❯