Antivirus and Anti-malware Protection Firewall compliance checks and Access Controls - regular audits of rules to ensure unauthorised access and threats are being blocked & access controls are implemented correctly. Incident Identification - helping to recognise and confirm potential incidents through alerts, logs and user reports, responding to potential security breaches or cyber-attacks. (containment, mitigating the damage, investigating root cause … hands on experience working in a similar Cyber Engineering role with a working knowledge of SonarQube, Nessus and Ivanti and a broad experience spanning Vulnerability Scanning & Reporting, Endpoint Security, IncidentManagement & System Hardening. Security Clearance: Must hold an active SC clearance If you're interested in hearing more about this opportunity, please submit your application. Reasonable Adjustments: Respect More ❯
for all aspects of Cyber security and the Firms IT infrastructure. Responsibilities: Determine the cyber security approach and operating model in consultation with stakeholders and aligned with the risk management approach and compliance monitoring of non-digital risk areas. Manage the budget for the cyber security. Lead, manage, develop, coach and mentor team members. Develop and deliver a cyber … Security Professional (CISSP), Certified Information Security Manager (CISM) or other similar credentials are desirable. Proven experience of working with IT security systems and information security governance, i.e., control frameworks, incidentmanagement, operations and application of security best-practices. Strong understanding and knowledge of cyber security technologies (e.g., firewalls, Microsoft enterprise cloud services, VPNs, ZTNA, IDS/IPS, SIEM More ❯
the adoption of Media Support Solution (MSS) for customers with media streaming workloads, ensuring they receive specialized support tailored to their needs. Additionally, you will lead the expansion of Incident Detection and Response (IDR) and Countdown Premium (CDP) for customers with non-media streaming workloads, helping them strengthen their incidentmanagement, proactive monitoring, and operational resilience.You will … and GTM strategy for MSS adoption among media streaming customers, ensuring optimized support, proactive monitoring, and operational guidance. • Drive IDR and CDP adoption for non-media streaming customers, enhancing incident detection, response readiness, and premium support experiences. • Data-Driven Strategy & ROI Analysis: • Analyze drivers of Enterprise Support Services adoption, identifying levers for growth and improvement. • Quantify the impact of More ❯
Head of Tech Operations Lead . The role holder will: Lead the Site Reliability Engineering (SRE) function to ensure platform stability, scalability, and performance. Own and evolve the major incidentmanagement process, including escalation, resolution, and post-mortem analysis and follow-up to closure. Drive resilience and disaster recovery strategy, ensuring regular testing and readiness across all critical … mentoring, and resource allocation to achieve team goals. Oversee technology budgets, prioritizing resources, optimizing costs, and ensuring investments support business goals while mitigating financial risks. Director Expectations Advise senior management and committees, influencing decisions and contributing to strategic initiatives. Manage resourcing, budgeting, and policy creation for a significant sub-function. Ensure compliance with policies and regulations, monitoring external environment More ❯
BBC output as well as a wide range of other production support services. This dayside role works as part of a shift-working team providing 24 hour operational support, incidentmanagement and stakeholder communication for a range of BBC platforms and services. YOUR KEY RESPONSIBILITIES AND IMPACT: The prime responsibility of the role is to provide 24/… Audition Knowledge of Apple IOS in a support environment Ability to support remote workers using a number of applications. OTHER SKILLS DESIRED: An understanding of the use of content management systems in large internet sites. Strong understanding of Intel based hardware. Knowledge and understanding of security issues in a large corporate networked environment. Knowledge of TCP/IP over More ❯
Liverpool, Merseyside, United Kingdom Hybrid / WFH Options
Hays Technology
roadmaps and document information accordingly Deliver clear, concise reports and presentations to senior leadership. Support the implementation/optimisation of SAP modules related to Health & Safety. Change, release and incidentmanagement About You Proven experience as a Business Analyst in a large, complex organisation. Strong stakeholder engagement skills, with the ability to influence and communicate at all levels. More ❯
Central London, London, England, United Kingdom Hybrid / WFH Options
Reed
and VDI platforms. Ability to build desktops from scratch and a deep understanding of Windows security constructs. Excellent problem-solving skills and ability to manage Change, Problem, and IncidentManagement processes effectively. Day-to-day of the role: Provide analysis, troubleshooting, implementation, administration, security, and maintenance of the Windows Desktop/Active Directory system. Manage end-user Windows More ❯
Holmfirth, West Yorkshire, Yorkshire, United Kingdom
Burton Security
Updating and generating reports from various databases on our performance levels. This is a fast-paced, multi-faceted role requiring strong communication, organisational skills and a proactive approach to incidentmanagement and service continuity.To be successful, you must: Have experience of working on a customer service desk, scheduling and/or helpdesk. Enjoy dealing with customers and understand More ❯
Dubai, Whitechapel, Greater London, United Kingdom Hybrid / WFH Options
VIQU IT
driven leader with deep technical cybersecurity expertise Proven experience managing SOC, SIEM, and SOAR operations In-depth knowledge of NIST CSF, ISO 27001, and GDPR Strong experience in cybersecurity incidentmanagement Bachelor’s degree in Cybersecurity, Computer Science, IT, or related field 10–15 years of professional experience in cybersecurity, including leadership roles Hands-on knowledge of next More ❯
Greater London, Whitechapel, United Kingdom Hybrid / WFH Options
VIQU IT
driven leader with deep technical cybersecurity expertise Proven experience managing SOC, SIEM, and SOAR operations In-depth knowledge of NIST CSF, ISO 27001, and GDPR Strong experience in cybersecurity incidentmanagement Bachelor’s degree in Cybersecurity, Computer Science, IT, or related field 10–15 years of professional experience in cybersecurity, including leadership roles Hands-on knowledge of next More ❯
air-gapped cloud technology to assist users with questions. Support internal reviews to identify opportunities for continuous improvement and reducing toil. Follow documented runbooks and procedures for high-priority incidentmanagement for potential UK critical workloads. Essential Skills and Experience: Experience with computer systems and networks, specifically Linux OS. Willingness to learn new skills in air-gapped cloud More ❯
support users with how-to questions. Support internal reviews to identify and enable opportunities for continuous improvement and reducing toil . Follow documented runbooks and procedures for high-priority incidentmanagement for potential UK critical workloads . show more show less Qualifications The following skills and experience are essential for this role: Experience in working with computer systems More ❯
scenarios Understanding of ITSO/Barcodes fulfilment methods as well as more traditional methods of fulfilment Able to record and maintain accurate and timely data in ASSIST/JIRA IncidentManagement System relating to accreditations that are being undertaken and any incidents that may arise in accreditation or live pilot running. Able to extract, understand and analyse multiple More ❯
not limited to: EC2, S3, EKS, DynamoDB, EBS, Cloud formation, Lambda, VPC, Route 53 Experience operating in core SDLC CI/CD processes, along with SRE concepts - Monitoring, Alerting, Incident management. Worked within DevOps operating model, data analytics, various models and application of AI/ML in this space. BS degree in computer science or equivalent field Preferred Qualifications More ❯
You will lead the development and implementation of information security and data protection policies, provide expert guidance and training to staff across the organisation, conduct supportive audits, and support incident management. Key Responsibilities Ensure compliance with data protection laws and internal policies. Develop and implement data protection policies and procedures. Generate and deliver training and guidance to staff on More ❯
TDD, CI/CD and pairing using tools like Git and GitHub. Experience of operationally managing software components once live, including; observability, logging, metrics, error reporting, debugging and live incident management. Experience of working with sensitive personal data. Competencies Experience working in/with cross-functional teams consisting of e.g. engineers, product, UX and non-technical stakeholders. Ability to More ❯
TDD, CI/CD and pairing using tools like Git and GitHub. Experience of operationally managing software components once live, including; observability, logging, metrics, error reporting, debugging and live incident management. Experience of working with sensitive personal data. Competencies Strong experience working and collaborating with vendors/partners. Experience working in/with cross-functional teams consisting of engineers More ❯
This is a unique opportunity to get involved in guiding and supporting the organisation in understanding and implementing effective information security controls, as well as ensuring risk and compliance management aligns with the business's risk appetite Role: Information Security Consultant Contract Type: Full time, Permanent Location: Holborn, London Why You'll Love It Here Healthcar e: Individual & Family … BUPA healthcare Discounts : Up to 60% discount on Premier Inn stays and 25% discount on our Restaurant brand As an InfoSec Consultant, you will Support the effective management and resolution of Information Security incidents and/or data breaches following defined IncidentManagement processes. Alongside this, you will also monitor key controls across the areas you support More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Alexander Mae (Bristol) Ltd
ISO/IEC 27001 , ISO/IEC 42001 and Cyber Essentials PLUS standards. In this role you will be responsible for maintaining, auditing, and continuously improving their Information Security Management System (ISMS), overseeing compliance initiatives, coordinating with internal teams, and ensuring the organization remains audit-ready. Additionally you will be implementing (alongside the technical and sales team) a Compliance … helping customer maintain their ISO Certifications. Key Responsibilities: Instrumental in the building of a new Team to deliver CaaS and supporting services. Develop, implement, and maintain the Information Security Management System (ISMS) aligned with ISO/IEC 27001 and Cyber Essentials PLUS standards. Lead internal audits, gap assessments, and risk assessments for ISO 27001 and Cyber Essentials PLUS. Coordinate … audits and certifications, including liaison with third-party auditors. Maintain the Statement of Applicability (SoA) , Risk Treatment Plans , and supporting documentation. Identify compliance gaps and lead remediation activities. Oversee incidentmanagement, business continuity, and data protection processes as part of ISMS requirements. Stay current on changes to ISO 27001 and Cyber Essentials PLUS frameworks, regulatory expectations, and cybersecurity More ❯
You'll act as the first line of defense for data-related incidents , rapidly diagnose root causes, and implement resilient solutions that keep critical reporting systems up and running. IncidentManagement & Triage Serve as on-call escalation for data pipeline incidents, including real-time stream failures and batch job errors. Rapidly analyze logs, metrics, and trace data to … pinpoint failure points across AWS, Flink, Kafka, and Python layers. Lead post-incident reviews: identify root causes, document findings, and drive corrective actions to closure. Reliability & Monitoring Design, implement, and maintain robust observability for data pipelines: dashboards, alerts, distributed tracing. Define SLOs/SLIs for data freshness, throughput, and error rates; continuously monitor and optimize. Automate capacity planning, scaling … to runbooks, design docs, and on-call playbooks detailing common failure modes and recovery steps. Work cross-functionally with DevOps, Security, and Product teams to align reliability goals and incident response workflows. Enhanced leave - 38 days inclusive of 8 UK Public Holidays Private Health Care including family cover Life Assurance - 5x salary Flexible working-work from home and/ More ❯
hours and on an on-call basis, weekends, and evenings. To be successful in this role you should have: Expert knowledge of Mainframe security, including: RACF administration and the management of RACF profiles, user access, and permissions. The implementation and maintenance of RACF security policies and procedures to ensure data protection. Performance of regular audits and reviews of RACF … is reliable, scalable, and secure. Ensure the reliability, availability, and scalability of the systems, platforms, and technology through the application of software engineering techniques, automation, and best practices in incident response. Accountabilities Build Engineering: Development, delivery, and maintenance of high-quality infrastructure solutions to fulfil business requirements ensuring measurable reliability, performance, availability, and ease of use. Including the identification … of the appropriate technologies and solutions to meet business, optimisation, and resourcing requirements. IncidentManagement: Monitoring of IT infrastructure and system performance to measure, identify, address, and resolve any potential issues, vulnerabilities, or outages. Use of data to drive down mean time to resolution. Automation: Development and implementation of automated tasks and processes to improve efficiency and reduce More ❯
is reliable, scalable, and secure. Ensure the reliability, availability, and scalability of the systems, platforms, and technology through the application of software engineering techniques, automation, and best practices in incident response. Accountabilities Build Engineering: Development, delivery, and maintenance of high-quality infrastructure solutions to fulfil business requirements ensuring measurable reliability, performance, availability, and ease of use. Including the identification … of the appropriate technologies and solutions to meet business, optimisation, and resourcing requirements. IncidentManagement: Monitoring of IT infrastructure and system performance to measure, identify, address, and resolve any potential issues, vulnerabilities, or outages. Use of data to drive down mean time to resolution. Automation: Development and implementation of automated tasks and processes to improve efficiency and reduce More ❯
is reliable, scalable, and secure. Ensure the reliability, availability, and scalability of the systems, platforms, and technology through the application of software engineering techniques, automation, and best practices in incident response. Accountabilities Build Engineering: Development, delivery, and maintenance of high-quality infrastructure solutions to fulfil business requirements ensuring measurable reliability, performance, availability, and ease of use. Including the identification … of the appropriate technologies and solutions to meet business, optimisation, and resourcing requirements. IncidentManagement: Monitoring of IT infrastructure and system performance to measure, identify, address, and resolve any potential issues, vulnerabilities, or outages. Use of data to drive down mean time to resolution. Automation: Development and implementation of automated tasks and processes to improve efficiency and reduce More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
QinetiQ Limited
Risk team that provides expert risk assessments, analysis and advice to clients within the Defence Sector. Day-to-day, you'll be a key stakeholder in the Security Risk Management process, working closely with our clients to identify and respond to cyber threats and security risks. Your responsibilities will include: Leading cyber security consultancy with key customers at a … Monitoring and reporting on system security requirements and vulnerabilities, escalating unresolved vulnerabilities when appropriate Managing the effective coordination of all security-related activities, including but not limited to, queries, incidentmanagement, document reviews and testing Modelling Cyber security risks using established and novel frameworks Essential experience of the Principal Cyber Security Consultant: In-depth knowledge of MoD Security … compelling cases and oversee creation of cyber security strategies in business and operational contexts Comprehensive knowledge of UK Defence deployed network architectures with an understanding of proactive security risk management Essential qualifications for the Principal Cyber Security Consultant: We value difference and we don't have a fixed idea when it comes to background or education, provided you can More ❯
of our various cloud services and applications. This role requires familiarity with concepts related to identity, such as multifactor authentication and single sign-on. Key Responsibilities: Cloud Identity & Access Management: Lead and manage the design, implementation, andongoing optimization of cloud-based identity solutions, including Azure Active Directory, AWS IAM, and other cloud IAM services. Identity Federation & Single Sign-On … Configure and manage identity federation (SAML, OAuth, OpenID) and Single Sign-On (SSO) integrations across multiple cloud applications and third-party systems. Administer Privileged Identity Management (PIM) in Entra. Access Control & Security: Establish and enforce security policies for user access, roles, and permissions, including multi-factor authentication (MFA) and conditional access rules. Identity Governance: Implement and maintain identity governance … and lifecycle management practices, ensuring compliance with industry standards and regulatory requirements. Collaboration & Cross-Functional Support: Collaborate with internal teams (security, DevOps, application owners) to ensure proper identity and access management practices across cloud-based environments, ensuring compliance and reducing security risks. Monitoring & Troubleshooting: Proactively monitor, troubleshoot, and resolve identity-related incidents and service disruptions, ensuring minimal impact More ❯