Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Michael Page
Ensure security controls are in-place based on ISO27001 and NIST As the regional security representative in the global Security/Technology project Lead/execute phishing campaign Conduct vulnerability assessments and implement measures to mitigate potential risks. Involve in global security operations process, analysis and escalate security alerts/tickets from global SOC team Maintain and update security More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
knowledge of cybersecurity who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and More ❯
Wallington, Surrey, England, United Kingdom Hybrid / WFH Options
Newmarket Holidays
Competencies: In-depth knowledge of cybersecurity frameworks, tools, and technologies Strong understanding of networking protocols, cloud security, and secure software development principles. Experience with incident response, risk management, and vulnerability assessment. Familiarity with regulatory compliance and standards (e.g., GDPR, ISO 27001). Excellent problem-solving and analytical skills, with the ability to handle complex security challenges. Strong communication and More ❯
L33, Knowsley, Merseyside, United Kingdom Hybrid / WFH Options
Curveball Solutions
business objectives. Drafting, maintaining and implementing information security policies and Standard Operating Procedures (SOPs). Configuring and overseeing mobile security—MDM (MAM/BYOD)—to protect business continuity. Leading vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Authoring compelling tender responses, clearly demonstrating technical capability and strategic value. Enhancing Microsoft 365 security leveraging Purview, Conditional Access, MFA More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Curveball Solutions
evolving business objectives. Drafting, maintaining and implementing information security policies and Standard Operating Procedures (SOPs). Configuring and overseeing mobile securityMDM (MAM/BYOD)to protect business continuity. Leading vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Authoring compelling tender responses, clearly demonstrating technical capability and strategic value. Enhancing Microsoft 365 security leveraging Purview, Conditional Access, MFA More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Copello
optimise, automate and improve relevant systems. The Role The Principal Security Analyst will support busy pods on more complex issues, lead and coordinate threat hunting activities, perform and lead vulnerabilityassessment activities and perform SIEM-based event analysis, incident triage and coordinate incident response activities. Furthermore, the Principal Security Analyst will actively collaborate with other analysts and enhance … IT Security Operations in large and complex organisations -Some coding ability Beneficial -Splunk -Palo Alto (XDR/XSIAM) -Skills in Forensics -Experience or interest in Reverse Engineering, Malware Analysis, Vulnerability Research -Industry recognised qualifications (eg. SANS, OSCP, ISC2) Security Clearance Eligibility for UK SC will be sought but wont be required from the start. Remote Working This role can More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
or similar technical positions. Fundamental understanding of security threats and compromise methods. Proficiency in server, client, and network technologies. Knowledge of malware, network reconnaissance, and emerging threats. Competence in vulnerabilityassessment and remediation procedures. Strong analytical skills, logical thinking, and sound judgment. Proficiency in KQL. Familiarity with the Microsoft Defender Suite. Education/Qualifications: CompTIA Security+ or equivalent More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harrison Holgate
Administer and support Microsoft platforms and enterprise tools. Troubleshoot Windows operating systems and Microsoft applications. Support cloud-based solutions, including SaaS applications and integration technologies. Assist with cybersecurity controls, vulnerability assessments, compliance auditing, and security operations. Provide clear, non-technical explanations of IT concepts to colleagues across the business. Key Requirements 5+ years' IT experience in financial services (insurance More ❯
Derby, Derbyshire, East Midlands, United Kingdom Hybrid / WFH Options
ECS
and maintain security controls and policies within the Azure environment. Monitor and respond to security incidents and threats using Azure Sentinel and other security tools. Conduct security audits and vulnerability assessments to identify and mitigate risks. Collaborate with development and operations teams to embed security best practices throughout the software development lifecycle. Manage and configure Azure security services, including More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
ECS
and maintain security controls and policies within the Azure environment. Monitor and respond to security incidents and threats using Azure Sentinel and other security tools. Conduct security audits and vulnerability assessments to identify and mitigate risks. Collaborate with development and operations teams to embed security best practices throughout the software development lifecycle. Manage and configure Azure security services, including More ❯
Uxbridge, London, United Kingdom Hybrid / WFH Options
Network IT
alignment with IT transformation goals. Lead and manage a high-performing team, responsible for wired, Wi-Fi, and remote access services. Oversee the security of the network , including compliance, vulnerability assessments, and incident response. Provide technical and strategic advice to senior stakeholders on network performance and emerging risks. Manage budgets, procurement, and vendor relationships, ensuring cost-effective service delivery. More ❯
Uxbridge, Middlesex, England, United Kingdom Hybrid / WFH Options
Network IT
alignment with IT transformation goals. Lead and manage a high-performing team, responsible for wired, Wi-Fi, and remote access services. Oversee the security of the network , including compliance, vulnerability assessments, and incident response. Provide technical and strategic advice to senior stakeholders on network performance and emerging risks. Manage budgets, procurement, and vendor relationships, ensuring cost-effective service delivery. More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
security compliance and best practices, ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks … MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
security compliance and best practices, ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks … MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree More ❯
/experience: Experience of security assurance and the measurement of controls. Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO 27001 To apply, please submit your most recent CV for review. More ❯
Warrington, Cheshire, North West, United Kingdom Hybrid / WFH Options
Oscar Associates (UK) Limited
security, and consultancy. They focus on proactive system health checks, monitoring, and intervention to ensure smooth business operations. Additionally, their IT security services help protect data and networks through vulnerability assessments, risk mitigation, and business continuity planning Apply now! Or email your CV to Referrals: If this role is not right for you, do you know someone that might More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
DMS Computer Recruitment
of the position include: Design and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments Participate More ❯
Wall, Hexham, Northumberland, England, United Kingdom Hybrid / WFH Options
Goodman Masson
and information. You’ll work closely with the IT Security Manager to monitor networks, respond to incidents, and enhance cyber resilience across the organisation. The role also includes conducting vulnerability assessments, supporting audits, and helping to strengthen third-party security compliance. Key Responsibilities: Monitor security systems and investigate incidents Operate firewalls, EDR, SIEM tools, and encryption software Support vulnerabilityMore ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the criteria More ❯
Uxbridge, Middlesex, England, United Kingdom Hybrid / WFH Options
Network IT
design, implement, and maintain security network infrastructure to protect against cyber threats. Key Responsibilities: Act as a key reference point for network security , advising IT teams and stakeholders. Perform vulnerability assessments, audits, and continuous traffic monitoring for anomalies. Analyse and respond to security incidents, developing remediation and incident reports. Provide 2nd/3rd line support for network services, ensuring … Participate in project and change management, providing expertise on network security in planning and delivery. Experience Requirements: Strong technical background in network infrastructure and security operations . Experience with vulnerability assessments, incident response, and security tools. Knowledge of enterprise networking (wired, wireless, remote access). Familiarity with monitoring, alerting, and reporting solutions. Strong problem-solving skills and the ability More ❯
Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
Act as a security advocate and guide cross-functional teams in secure practices. Lead technical initiatives - Provide hands-on leadership and mentor more junior team members. Conduct threat and vulnerability assessments - Take a proactive role in identifying potential security threats. Skills and experience required: Strong experience in risk & controls within the information security, ideally in a regulated industry. Experience … e.g., multiple sites, technologies). Hands-on leadership in technical InfoSec initiatives. Strong understanding and implementation of control frameworks (NIST CSF, COBIT). Ability to run threat intelligence and vulnerability assessments. Experience collaborating with 2nd and 3rd line governance teams (e.g., audit, compliance). Strong stakeholder engagement and influencing skills. Reasonable Adjustments: Respect and equality are core values to More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the criteria More ❯