our mental and financial health resources, and our personalized learning opportunities - just to name a few! Your Career As a domain consultant for network security transformation, you provide technical expertise and guidance in customers' network security and zero trust journey . You will be key in defining technical … solutions that secure a customer's key business imperatives. You evangelize our industry leadership in on-prem, cloud, and security services that establish Palo Alto Networks as a customer's cybersecurity partner. Your Impact Collaborate with sales teams to recommend and develop customer solutions within your assigned specialization. Present … Validation projects based on best practices to ensure technical win in assigned opportunities. Architect solutions that will help our customers strengthen and simplify their security posture. Document high-level design and key use cases to ensure proper implementation and value realization of Palo Alto Networks solutions. Lead conversations about More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
Randstad Technologies Recruitment
IT Information Security Analyst - Swindon - Perm - Hybrid Are you passionate about protecting critical systems and data? We're on the lookout for a proactive and solution-driven Information Security Analyst to be part of our forward-thinking global IT team. While this role is UK-based, your influence … What You'll Be Doing You won't just be ticking compliance boxes-you'll be leading the charge in fortifying our organisation's security posture. Keep our local IT security framework in sync with wider Group standards by developing and updating policies, procedures, and guidance. Run scheduled … continuity approach. Turn data into insights with management reports that track compliance trends. Partner with teams across the globe to design, implement, and test security tools and controls. Lead the journey to achieving and maintaining ISO 27001 certification. Stay sharp on cybersecurity developments, translating new risks and regulations into More ❯
business partnering to support strategic and operational goals Overseeing IT support services to ensure timely and effective resolution of user needs Ensuring robust IT securityposture, compliance, and risk management across all systems Your Profile We are looking for a candidate with a transformation mindset, a strong preference More ❯
individual to lead the operational resilience, cybersecurity, data and privacy risk management strategies and implementation, in line with DORA, GDPR, and global privacy and security regulations. This is an exciting new role in an industry in its infancy. This role is essential to ensure our ICT infrastructure is resilient … Manage the implementation of cybersecurity controls, including encryption, secure access management, and monitoring systems to safeguard customer data from unauthorized access or cyberattacks. Establish security KPIs and reporting mechanisms that provide clear visibility into the organization's security posture. Incident Response & Recovery: Lead the ICT incident response team … with a focus on security and privacy-related incidents, ensuring the timely resolution of security vulnerabilities in line with GDPR and operational resilience standards. Planning, implementing and managing incident response and business continuity programs, including regular drills and simulations. About You Experience: 7+ years in ICT risk management More ❯
inform product strategies that address customer needs. Define a clear and well-prioritized product roadmap, working with engineering to deliver features that enhance the Securityposture for our customers and elevate the Admin Experience. Partner with design teams to create high-quality, user-friendly experiences that meet the … manager for a software product, B2B or B2C cloud experience preferred. 5+ years experience as a people manager. Experience in related product segments - Enterprise Security and/or IT Administration. Experience working with UX and engineering teams; deep commitment to customers and team collaboration. Passionate drive and extraordinary ability More ❯
Join us as we secure the applications that power the enterprise. We created the category called SaaS securityposture management (SSPM). And now, over 25% of the Fortune 100 and many global companies are using our platform to overcome challenges such as SaaS application attacks, sensitive data … applications that power the enterprise. Our customers are global enterprises who store and process their business-critical data in SaaS applications. We deliver frictionless security that combines our industry-leading threat research, expertise, and product depth, so that our customers are productive and cyber resilient. What We Value at More ❯
to new heights, this opportunity is for you. In a nutshell We have an outstanding opportunity for a driven professional to join our Cyber Security team at Virgin Atlantic Ltd. You will support and challenge existing access and privileged access management across Technology and the business. You will provide … compliance with relevant legislation, regulations, and business policies. Responsible for process automation where applicable and managing the technologies required to strengthen the access management security posture. Day to day Assist in developing and maintaining policies, standards, and guidelines for access management that reflect applicable laws and regulations. Provides subject … Identity and Access Management systems for on-premise and cloud-based systems such as Azure and AWS Experience of working within or with Information Security and experience of various governance concepts, tools, processes, and methodologies used in Access Management. (e.g., RBAC, PAM, least-privilege, MFA etc.) Experience of working More ❯
to new heights, this opportunity is for you. In a nutshell We have an outstanding opportunity for a driven professional to join our Cyber Security team at Virgin Atlantic Ltd. You will support and challenge existing access and privileged access management across Technology and the business. You will provide … compliance with relevant legislation, regulations, and business policies. Responsible for process automation where applicable and managing the technologies required to strengthen the access management security posture. Day to day Assist in developing and maintaining policies, standards, and guidelines for access management that reflect applicable laws and regulations. Provides subject … Identity and Access Management systems for on-premise and cloud-based systems such as Azure and AWS. Experience of working within or with Information Security and experience of various governance concepts, tools, processes, and methodologies used in Access Management. (e.g., RBAC, PAM, least-privilege, MFA etc.) Experience of working More ❯
enable secure yet flexible access, authentication, and automation that transforms how people move through the digital world, putting Identity at the heart of business security and growth. At Okta, we celebrate a variety of perspectives and experiences. We are not looking for someone who checks every single box - we … solving business problems using cloud technology. Owns business architecture workshops and leads customer discussions that will transform customer's digital experiences, IT infrastructure, and security posture. Crafts collaborative, engaging workshop material that synthesizes known customer experiences and sequences what is possible with Okta. Understands how to architect an optimal … adoption. REQUIRED QUALIFICATIONS: 8+ years of experience in pre-sales, solutions architecture or consulting within professional services. Strong understanding of enterprise architecture, cloud technologies, security frameworks and integration strategies. A passion to advocate for the customer, which has been expressed through previous functional or technical delivery & customer-facing roles More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Oscar Associates (UK) Limited
backup, disaster recovery, and high availability solutions. Lead infrastructure upgrade and automation projects (Infrastructure as Code). Monitor and improve system performance, capacity, and security posture. Collaborate with internal teams and 3rd parties to deliver scalable solutions. Mentor junior engineers and contribute to long-term infrastructure strategy. What we … experience with backup and DR solutions (Veeam, Commvault, etc). Familiarity with monitoring tools (e.g., PRTG, SolarWinds, Azure Monitor). Solid understanding of IT security principles and compliance frameworks. Excellent documentation, communication, and stakeholder management skills. Desirable (nice-to-haves): Exposure to Linux environments. Knowledge of DevOps principles or More ❯
and escalations. Champion Agile & DevOps, embedding CI/CD, value slicing, and continuous improvement. Address tech debt, helping prioritise and resolve longstanding issues. Enhance security, working with teams to reduce vulnerabilities. Track key engineering metrics to drive continuous improvements. A Few Things About You Hands-on technical experience - a … Serverless. DevOps & CI/CD: TeamCity, Octopus, BitBucket Pipelines, GitHub Actions, Docker, Kubernetes. Software Architecture & Testing: Microservices, TDD, unit testing (xUnit, NUnit, Moq). Security Practices: OWASP, Wiz, Snyk for improving security posture. A Bit About Us When it comes to appliances and electricals, we've got the More ❯
Job Title: Cyber Security Compliance Coordinator Function: Data & Technology Location: Nottingham/Hybrid Contract type: Permanent Salary: £41,826 with potential to rise to £49,207 over 3 years Closing Date: Monday 7th April 2025 NHS Supply Chain currently has an opportunity for a Cyber Security Compliance Coordinator … during an exciting period of transformation, working to make it easier for the NHS to put patients first. We are seeking an experienced Cyber Security Compliance Coordinator , which will be a key role within NHS Supply Chain's Cyber Security Team, as part of the Data and Technology … GRC) role, you will manage a number of compliance projects, the delivery of which ensures NHS Supply Chain can provide assurance of its cyber security posture. The role will require engaging with a wide range of internal stakeholders, as well as outsourced IT partners. You will be required to More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Supply Chain Coordination Limited
Job Posted: 25 April 2025 Job Updated: 25 April 2025 Job Title Cyber Security Compliance Coordinator Function: Data & Technology Location: Nottingham/Hybrid Contract type: Permanent Salary: £41,826 with potential to rise to £49,207 over 3 years, Closing Date: Friday 9 th May 2025 NHS Supply Chain … currently has an opportunity for a Cyber Security Compliance Coordinator tojoin our team during an exciting period of transformation, working to make it easier for the NHS to put patients first. We are seeking an experienced Cyber Security Compliance Coordinator which will be a key role within NHS … Supply Chain's Cyber Security Team, as part of the Data and Technology Directorate. In this first dedicated Governance, Risk and Compliance (GRC) role, you will manage a number of compliance projects, the delivery of which ensures NHS Supply Chain can provide assurance of its cyber security posture. More ❯
My Client is a cybersecurity company who offer security services to multiple businesses across varying industries. They are now looking for a graduate Penetration Tester to join their growing team! Main Duties: Vulnerability Identification: Conduct thorough assessments to identify security vulnerabilities in networks, applications, and systems. Exploitation and … Reporting: Simulate cyberattacks to exploit vulnerabilities and document findings in detailed reports. Security Recommendations: Provide actionable guidance to mitigate risks and improve the organization's security posture. Compliance and Standards: Ensure testing aligns with industry regulations and security standards (e.g., OWASP, PCI-DSS). Continuous Research: Stay More ❯
My Client is a cybersecurity company who offer security services to multiple businesses across varying industries. They are now looking for a graduate Penetration Tester to join their growing team! Main Duties: Vulnerability Identification: Conduct thorough assessments to identify security vulnerabilities in networks, applications, and systems. Exploitation and … Reporting: Simulate cyberattacks to exploit vulnerabilities and document findings in detailed reports. Security Recommendations: Provide actionable guidance to mitigate risks and improve the organization's security posture. Compliance and Standards: Ensure testing aligns with industry regulations and security standards (e.g., OWASP, PCI-DSS). Continuous Research: Stay More ❯
and other tools to proactively identify and resolve issues. Incident & Problem Management Respond to network-related incidents, analyse root causes, and implement solutions. Firewall & Security Management Work with Fortinet, Palo Alto (Panorama), and Cisco firewalls to maintain security posture. Change Management Follow best practices to implement network changes … NTA and Cisco Prime. Knowledge of Fortinet, Aruba, HPE, Palo Alto (Panorama), and Cisco Nexus . Understanding of MPLS, VPNs, LAN/WAN, and security best practices . Familiarity with ITIL processes and change management is beneficial. Strong troubleshooting skills and ability to work independently in a BAU environment. More ❯
London, Bishopsgate, United Kingdom Hybrid / WFH Options
VIQU Limited
and other tools to proactively identify and resolve issues. Incident & Problem Management – Respond to network-related incidents, analyse root causes, and implement solutions. Firewall & Security Management – Work with Fortinet, Palo Alto (Panorama), and Cisco firewalls to maintain security posture. Change Management – Follow best practices to implement network changes … NTA and Cisco Prime. Knowledge of Fortinet, Aruba, HPE, Palo Alto (Panorama), and Cisco Nexus . Understanding of MPLS, VPNs, LAN/WAN, and security best practices . Familiarity with ITIL processes and change management is beneficial. Strong troubleshooting skills and ability to work independently in a BAU environment. More ❯
will be accountable for its overall success, including all technical and delivery outcomes, and will guide the long-term technical strategy of the networking posture for the company. What you'll be doing: Line managing teams of network engineers that build & run the infrastructure on which the company relies … Leading the team strategy, including defining and tracking its success measures Driving the operational excellence of the team, including its on-call, observability and security postures Working closely with our telecommunication and networking partners and managing those relationships Building a team of diverse & experienced engineers, and guiding them to More ❯
Surevine's mission is to build and deliver secure, scalable, collaboration solutions for the most security conscious organisations, enabling collaboration on their most highly sensitive information. We hire software engineers who are adaptable, curious, and driven to make great engineering solutions. How we work You will have exposure to … the job in hand. (Actually, zealots are fine, welcome to the team!). You have an understanding of the impact of engineering decisions on security posture. Critically, you know what you know and what you don't know, and you know how to work with your "don't know More ❯