Lead the design and implementation of scalable, automated solutions that integrate seamlessly into enterprise platforms and user experiences. Establish a global security architecture and engineering roadmap focused on prevention, detection, and rapid response. Drive continuous improvement of security posture while aligning with business needs, regulatory requirements, and user experience expectations. Champion DevSecOps practices to embed security early into development … intervention. Operational Security, SRE & Assurance: Ensure security platforms are resilient, continuously monitored, and designed for 24x7 support and incident response readiness. Embed security telemetry and observability to enable proactive threatdetection and automated response. Apply SRE principles to improve reliability, performance, and maintainability of security services. Define service level objectives (SLOs) and key performance indicators (KPIs) for all More ❯
Expertise Deep understanding of enterprise security technologies, including: Firewalls, endpoint protection, SIEM/SOAR, IAM, DLP, SASE, Zero Trust. Public cloud security services (AWS, Azure, GCP). Data protection, threatdetection, and compliance tooling. Broad understanding of enterprise IT environments and how security integrates across them. Certifications (Preferred) Security certifications: CISSP, CCSP, or equivalent. Vendor certifications (e.g., Palo More ❯
Expertise Deep understanding of enterprise security technologies, including: Firewalls, endpoint protection, SIEM/SOAR, IAM, DLP, SASE, Zero Trust. Public cloud security services (AWS, Azure, GCP). Data protection, threatdetection, and compliance tooling. Broad understanding of enterprise IT environments and how security integrates across them. Certifications (Preferred) Security certifications: CISSP, CCSP, or equivalent. Vendor certifications (e.g., Palo More ❯
adoption and effective use. Contribute to internal process documentation and improvement initiatives, ensuring procedures support a consistent and high-quality customer experience. Deliver proactive communications to customers on relevant threat intelligence, product enhancements, best practices, and industry developments. Advocate for customers internally, ensuring their needs and feedback influence product development and service improvements. Support the introduction and adoption of … audiences. Ability to manage multiple customer accounts, prioritising effectively in a fast-paced environment. Experience driving customer satisfaction and retention through proactive engagement. Understanding of key concepts in cybersecurity, threatdetection, and managed security services. Familiarity with ITIL service management principles. Experience presenting to senior stakeholders and technical teams. Exposure to security technologies such as EDR, SIEM and More ❯
and threats, implementing security measures, and monitoring network activity. Key responsibilities include: Monitor Networks and Systems: Continuously monitor the organisation’s networks and systems for security breaches or intrusions. ThreatDetection and Response: Detect and respond to threats or security incidents by analysing data from various incident reports and alerts. Security Audits: Perform regular audits to ensure that … Science, Information Technology, or a related field. Experience in IT Infrastructure including security. Proficiency in supporting Active Directory, server, network and security technologies such as firewalls, antivirus, and intrusion detection systems. Excellent analytical and problem-solving skills. Ability to work under pressure and handle multiple tasks simultaneously. Strong communication and interpersonal skills. What you’ll get in return. From More ❯
support IT security projects, ensuring secure, timely, and effective project delivery. The client would like someone with NIST and Cyber Essentials. Strong knowledge of network security, endpoint protection, and threatdetection/protection. Always staying one step ahead, investigating cybersecurity tools to ensure strong, up-to-date defences across on-prem, cloud AWS and SaaS environments. The role More ❯
Bosham, Sussex, United Kingdom Hybrid / WFH Options
Spectrum IT Recruitment
and managing vendor relationships and audit requirements. Key Areas of Responsibility Cybersecurity Ensure compliance with ISO 27001, SOC 2, GDPR, and other frameworks. Lead incident response, vulnerability management, and threat detection. Oversee disaster recovery and business continuity planning. Champion a DevSecOps culture across the organisation. IT Management Lead IT support, enterprise systems, and SaaS tooling. Manage IAM, endpoint security More ❯
Chichester, West Sussex, England, United Kingdom Hybrid / WFH Options
Spectrum IT Recruitment
and managing vendor relationships and audit requirements. Key Areas of Responsibility Cybersecurity Ensure compliance with ISO 27001, SOC 2, GDPR, and other frameworks. Lead incident response, vulnerability management, and threat detection. Oversee disaster recovery and business continuity planning. Champion a DevSecOps culture across the organisation. IT Management Lead IT support, enterprise systems, and SaaS tooling. Manage IAM, endpoint security More ❯
and domain expert within the organization and be able to communicate security risk and concepts to both technical and non-technical audiences. Lead initiatives with Engineering teams to optimize threat models and mitigate risks. Encourage a positive security culture across the Engineering organization. Relentlessly champion for security outcomes on behalf of our customers. Work with other engineering leaders to … embed security into day-to-day development processes. Help proactively assess security risk through product deep dives, threat modeling, and design, architecture and implementation reviews. Review and improve existing security processes related to product assessments, pen testing, and bug bounty findings. Develop product security controls and supervising strategies to grow our threatdetection capabilities. Seek opportunities for … tooling and automation. What You'll Bring 5+ years of proven experience securing enterprise applications and infrastructure, preferably in the Crypto and FinTech space. Experience with the application of threat modeling and other risk identification techniques. Strong understanding of the OWASP top 10, including details of common vulnerabilities and emerging threats. Experience with authentication and authorization standards, including OAuth More ❯
in a hosting provider or managed service provider environment Strong working knowledge of ISO 27001, ISO 27017, ISO 27018, and ISO 22301 Hands-on experience with scanning and vulnerability detection applications Hands-on experience of Real time threatdetection software Ability to analyze and explain exploitability of vulnerabilities, including attack vectors, prerequisites, and mitigations Skilled in producing More ❯
IT security infrastructure Conduct vulnerability assessments and penetration tests Lead incident response and mitigation Implement security policies and procedures Ensure compliance with GDPR, ISO27001 Work with SIEM tools for threatdetection Manage access controls and firewalls Oversee employee security awareness programs Respond to emerging cyber threats Document incidents and reports Collaborate with IT teams on security patches Manage More ❯
looking for a proactive, self-starting individual with strong technical knowledge across on-prem and cloud environments, and ideally experience in areas such as: Network security, IAM, SIEM, and threatdetection Compliance frameworks (e.g. NIST, ISO 27001, CIS Controls) Security automation and scripting Producing security artefacts and documentation Experience within Operational Technology/IoT-rich environments would be More ❯
looking for a proactive, self-starting individual with strong technical knowledge across on-prem and cloud environments, and ideally experience in areas such as: Network security, IAM, SIEM, and threatdetection Compliance frameworks (e.g. NIST, ISO 27001, CIS Controls) Security automation and scripting Producing security artefacts and documentation Experience within Operational Technology/IoT-rich environments would be More ❯
looking for a proactive, self-starting individual with strong technical knowledge across on-prem and cloud environments, and ideally experience in areas such as: Network security, IAM, SIEM, and threatdetection Compliance frameworks (e.g. NIST, ISO 27001, CIS Controls) Security automation and scripting Producing security artefacts and documentation Experience within Operational Technology/IoT-rich environments would be More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
looking for a proactive, self-starting individual with strong technical knowledge across on-prem and cloud environments, and ideally experience in areas such as: Network security, IAM, SIEM, and threatdetection Compliance frameworks (e.g. NIST, ISO 27001, CIS Controls) Security automation and scripting Producing security artefacts and documentation Experience within Operational Technology/IoT-rich environments would be More ❯
and align frameworks to protect business assets. You will join a collaborative environment focused on embedding long-term security resilience across the organisation. With growing regulatory expectations and evolving threat landscapes, this is a fantastic opportunity to lead high-impact initiatives and shape the future of cyber security within a complex enterprise. As part of this role, you will … to NIST CSF, CIS Controls, and defence-in-depth strategies. Strong background in stakeholder engagement, vendor management, and program governance. Experience across key security domains including cloud security, IAM, threatdetection, and remediation. Excellent communication skills and the ability to influence at senior levels. This role offers hybrid working closely with the wider team in a central London More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
and align frameworks to protect business assets. You will join a collaborative environment focused on embedding long-term security resilience across the organisation. With growing regulatory expectations and evolving threat landscapes, this is a fantastic opportunity to lead high-impact initiatives and shape the future of cyber security within a complex enterprise. As part of this role, you will … to NIST CSF, CIS Controls, and defence-in-depth strategies. Strong background in stakeholder engagement, vendor management, and program governance. Experience across key security domains including cloud security, IAM, threatdetection, and remediation. Excellent communication skills and the ability to influence at senior levels. This role offers hybrid working closely with the wider team in a central London More ❯
and AWS. Implement and maintain security and SD-WAN solutions using Fortinet technologies to improve both security and efficiency. Deploy and manage cloud security tools, enhancing internet protection and threat detection. Monitor network and cloud systems to identify performance improvements, delivering detailed reports with actionable insights. Document network configurations, updates, and incidents to maintain compliance with company policies and More ❯
Sheffield, South Yorkshire, England, United Kingdom
Adria Solutions
and AWS. Implement and maintain security and SD-WAN solutions using Fortinet technologies to improve both security and efficiency. Deploy and manage cloud security tools, enhancing internet protection and threat detection. Monitor network and cloud systems to identify performance improvements, delivering detailed reports with actionable insights. Document network configurations, updates, and incidents to maintain compliance with company policies and More ❯
in validating security controls across enterprise environments. REQUIRED SKILLS AND EXPERIENCE Lead and manage end-to-end testing strategies for Cyber security solutions, ensuring robust validation of security controls, threatdetection mechanisms, and compliance with industry standards. Collaborate with cross-functional teams including security architects, engineers, and risk analysts to define test plans, penetration testing scopes, and vulnerability More ❯
Security, Compliance & Governance: Ensure compliance with corporate security and privacy policies through proactive monitoring and enforcement. Partner with cyber and ISRM teams to integrate secure access into incident response, threatdetection, and policy governance workflows. Support enforcement of access policies for third-party, BYOD, and contractor devices using secure, scalable methods. Collaboration & User Experience: Work closely with cyber More ❯
commercial and technical expertise, supporting solution design, shaping customer proposals, and guiding conversations from scoping through to delivery. Key experience Background in managed security services, including SOC operations and threatdetection Strong knowledge of cloud and on-prem security tooling (SIEM, EDR, IAM) Penetration testing Proven ability to translate technical concepts into clear business value Confident in customer More ❯
is fully remote. For location-specific details, please connect with our recruiting team. What You Will Do: Product Strategy : Create roadmaps in tandem with engineers for products like AI threatdetection, post-quantum cryptography, managed rulesets etc. Build customer trust in Vercel's comprehensive security capabilities. Pricing : Collaborate with product managers and engineers to price new and existing More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Onyx-Conseil
architecture and infrastructure. Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identity and access management, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure provisioning, deployment, and management using Infrastructure as Code (IaC) tools. Perform … VPC, IAM, CloudFormation, and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identity and access management, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in scripting languages such as Python, Bash, or PowerShell. Familiarity with Infrastructure More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
The Bridge (IT Recruitment) Limited
the cyber security vision and build a corresponding technical roadmap which delivers a world class security controls across cloud infrastructure, networks, end points, identity & access management, application security, and threat detection. Collaborate closely with the SNOPs Lead to adapt the SNOPs roadmap priorities in line with shifts in industry, evolving threat landscape and regulatory requirements. Ensure effective … evolving technology needs. Technology Platform Delivery Oversee the delivery and lifecycle management of: Microsoft 365 and collaboration platforms Cloud platforms (design, automation, cost optimisation) Network and security operations (compliance, threat management) Monitoring, observability, and backup/recovery systems Ensure alignment with architectural standards and regulatory requirements (e.g., DORA, Cyber Essentials Plus). Stakeholder Engagement Act as the escalation point More ❯