bonus + package Our client is a global security leader, operating at the cutting edge of digital transformation, cloud integration, and enterprise security. With a workforce of 7500+ cybersecurity specialists and strategic partnerships with top-tier security tech providers, they're redefining how enterprise-grade security is built, deployed, and continuously improved. They're now seeking a Security Development and More ❯
bonus + package Our client is a global security leader, operating at the cutting edge of digital transformation, cloud integration, and enterprise security. With a workforce of 7500+ cybersecurity specialists and strategic partnerships with top-tier security tech providers, they're redefining how enterprise-grade security is built, deployed, and continuously improved. They're now seeking a Security Development and More ❯
Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH) are preferred. Experience: We are looking for candidates with experience in: Assessing network infrastructure requirements and associated cybersecurity controls. Hands-on configuration and maintenance of live mission-critical networks and security tools. A strong understanding of network protocols, security architecture, and risk management. Imaging servers and storage More ❯
Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH) are preferred. Experience: We are looking for candidates with experience in: Assessing network infrastructure requirements and associated cybersecurity controls. Hands-on configuration and maintenance of live mission-critical networks and security tools. A strong understanding of network protocols, security architecture, and risk management. Imaging servers and storage More ❯
collaborative, and confident operating both independently and within teams Desirable Qualifications & Experience: Certifications such as CISSP, CISM, CISA, or ISO 27001 Lead Auditor/Implementer Knowledge of the NIST Cybersecurity Framework Experience with Smart Metering or highly regulated environments Familiarity with Cloud Security Controls and Public Key Infrastructure (PKI) Understanding of Hardware Security Modules (HSMs) About the DCC: At the More ❯
with big responsibilities, and flexibility is key. Investigate and triage security alerts, manage security incidents. Gather, curate and communicate threat intelligence. Support and advise business stakeholders in relation to cybersecurity issues. Generate reports for both technical and non-technical staff and stakeholders. What you bring: At least 7 years of experience in the information security field. Hands-on experience More ❯
Foster a strong security culture across the organisation, helping to embed risk-aware behaviours and make information security integral to day-to-day operations. Expereince : Essential Prior experience in cybersecurity, risk management, compliance, or governance. Strong understanding of regulatory requirements, security frameworks, and standards such as ISO 27001, NIST CSF, CIS, and SOC 2. Hands-on experience with ISO More ❯
Apply locations Great Britain - London time type Full time posted on Posted Yesterday job requisition id R5807 Job Description: Senior Information Security Manager Position Overview: We are seeking aSenior CyberSecurity Posture and Exposure Managerto lead and enhance our organization's security posture and manage cyber exposure risks. This role will oversee a small team of highly skilled Security Engineers … mitigation efforts. Prepare detailed reports and metrics to demonstrate the effectiveness of security initiatives and identify areas for improvement. What You'll Bring: Experience: A depth of experience in cybersecurity, with at least 3 years in a leadership or management role. Proven experience in vulnerability management, threat modelling, and incident response. Strong understanding of security frameworks, compliance standards, and best … practices. Education:Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related field. Advanced degrees or certifications (e.g., CISSP, CISM, CEH) are highly desirable. Technical Skills: Proficiency in security tools and technologies, such as SIEM, vulnerability scanners, and endpoint protection platforms. Knowledge of cloud security, network security, and secure software development practices. Familiarity with scripting and automation tools More ❯
SharePoint Online, Teams, and OneDrive. Exceptional troubleshooting abilities and the capacity to diagnose and resolve complex technical issues efficiently. Excellent customer service skills, with a user-focused approach. Solid cybersecurity awareness and a foundational understanding of penetration testing methodologies or security auditing principles. Demonstrable experience in incident response, particularly in identifying, containing, and escalating cyber incidents. Experience in Microsoft Windows More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Energy Institute
SharePoint Online, Teams, and OneDrive. Exceptional troubleshooting abilities and the capacity to diagnose and resolve complex technical issues efficiently. Excellent customer service skills, with a user-focused approach. Solid cybersecurity awareness and a foundational understanding of penetration testing methodologies or security auditing principles. Demonstrable experience in incident response, particularly in identifying, containing, and escalating cyber incidents. Experience in Microsoft Windows More ❯
Thetford, Norfolk, England, United Kingdom Hybrid / WFH Options
Agilis Search
operations Manage the service desk and ensure effective support across the organisation Lead transition to a hybrid (on-premise/cloud) IT model Maintain server operations, disaster recovery, and cybersecurity (Cyber Essentials compliance) Manage cloud platforms (Google Workspace, AWS, Azure AD, Office 365) Support database and software development teams through resilient and scalable systems Deliver strategic input on infrastructure More ❯
systems, software and security needed to take the lead in a low carbon world. They provide expertise, advice and day-to-day support in emerging technologies, data and analytics, cybersecurity and more. Flexible benefits to fit your life Enjoy discounts on private healthcare and gym memberships. Wellbeing benefits like a free online GP and 24/7 counselling service. More ❯
systems, software and security needed to take the lead in a low carbon world. They provide expertise, advice and day-to-day support in emerging technologies, data and analytics, cybersecurity and more. Flexible benefits to fit your life Enjoy discounts on private healthcare and gym memberships. Wellbeing benefits like a free online GP and 24/7 counselling service. More ❯
Warrington, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
per week in office)?? Hours: Full-time, standard UK hours (9 AM-5 PM) + on-call one week every four weeks About the Role Are you passionate about cybersecurity and cryptography? Our client is looking for a Cryptography HSM & Key Management Specialist to join their global team. In this role, you'll help protect the their most sensitive data More ❯
and drive technology adoption and optimization. Key Responsibilities: Technical Expertise & Advisory: Act as a technical expert and advisor on innovation-driven projects, providing support in areas like disaster recovery, cybersecurity, and cloud solutions. Engage with enterprise clients to gather requirements, implement and support solutions and optimize service delivery. Develop and maintain strong technical relationships with key stakeholders, partners, and More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Assured Data Protection Limited
and drive technology adoption and optimization. Key Responsibilities: Technical Expertise & Advisory: Act as a technical expert and advisor on innovation-driven projects, providing support in areas like disaster recovery, cybersecurity, and cloud solutions. Engage with enterprise clients to gather requirements, implement and support solutions and optimize service delivery. Develop and maintain strong technical relationships with key stakeholders, partners, and More ❯
role will support the Head of Operational Risk with the development, implementation and embedding of the IT and security Risk Framework. Key Responsibilities: Support the execution of IT and cybersecurity risk strategies, procedures, and controls aimed at identifying, evaluating, managing, and reporting on risk exposure. Collaborate on building and refining the enterprise risk management framework, including defining risk appetite in More ❯
role will support the Head of Operational Risk with the development, implementation and embedding of the IT and security Risk Framework. Key Responsibilities: Support the execution of IT and cybersecurity risk strategies, procedures, and controls aimed at identifying, evaluating, managing, and reporting on risk exposure. Collaborate on building and refining the enterprise risk management framework, including defining risk appetite in More ❯
Sunderland, Tyne and Wear, England, United Kingdom
Nigel Wright Group
Microsoft Entra, Group Policy. Office 365 administration and support. Microsoft SQL Server and IIS administration. Network topology (VLANs, 802.1x, DHCP Snooping, Routing, IPARP, STP, LAG). Firewall management and cybersecurity best practices. Microsoft Azure (VMs, VNETs, Storage, DNS, AVD, PIM, WAF, Front Door, Security Groups). SharePoint administration. Anti-virus, MDR/EDR, and cloud security platforms. Intune console management. More ❯
Hyper-V) Experience in IT room and device administration Experience in project management Knowledge of principles of Information Technology Knowledge of database operations and management Knowledge of Information Security, CyberSecurity and GDPR Good problem solving skills Team player Excellent English and Mandarin communication skills Please view all our Team China jobs at people-first-recruitment Please follow us on More ❯
Westminster, Greater London, England Hybrid / WFH Options
Parliamentary Digital Service
collaborative team culture, empowering others to take ownership, deliver and develop. You have substantial experience in successfully managing digital identity platform lifecycle and the ability to resiliently respond to cybersecurity threats. You can support the implementation of highly effective operational & BCDR plans, ensuring a robust and resilient approach for digital identity, utilising external suppliers where appropriate. You can think More ❯
as firewalls, intrusion detection systems, and VPNs. Act on to and recover from security incidents, including conducting post-event analyses to prevent future incidents. Stay abreast of the latest cybersecurity threats and trends, as well as advancements in network security technologies. Develop and enforce policies and procedures for network access, monitoring, and security incident response. What youll bring Youll have More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
The Maine Group
forward-thinking, values-led organisation dedicated to driving positive social change in health and care. The team supports a broad range of systems and services - from cloud infrastructure and cybersecurity to AV equipment and end-user devices - enabling the organisation to deliver research, influence policy, and innovate for impact. Key Responsibilities Provide technical support and troubleshooting for operating systems, M365 More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
audiences. Ability to work independently with minimal supervision, taking ownership of assigned tasks and driving them to completion while maintaining high standards of quality and accuracy. Strong understanding of CyberSecurity Domains including Threat Intelligence, Vulnerability Management, Security Testing, Security Architecture, Infrastructure Protection, Application Security, Identity and Access Management, Incident Investigation & Response and Cryptography. Additional skills and experiences would be More ❯
Active Sync, Active Directory, LAN/WAN, MDM, Azure and Microsoft Office Suite Knowledge of VMware, Citrix, MDM (Mobile Device Management), Disaster Recovery, Cisco, SAN (e.g., EMC, Equallogic), and CyberSecurity (e.g., IPS, IDS). Impeccable verbal/written communication. Exhibit a high-level of professionalism and sound judgement. Experience with ConnectWise or similar ticketing system preferred. More ❯