Head of Security & Governance , the successful candidate will play a central role in delivering risk reduction across the business. You'll be responsible for maintaining ISO27001 compliance, overseeing risk assessment and mitigation, and supporting incident management across multi-entity operations. Key Accountabilities: Lead and manage a team of three security professionals , supporting their development and day-to-day delivery. … management or team leadership . In-depth knowledge of ISO27001, GDPR, FCA SYSC, PCI DSS and other regulatory/compliance frameworks. Hands-on experience with security technologies: SIEM, IAM, vulnerabilityassessment, endpoint protection, cloud services (AWS, SaaS, IaaS) . Strong communication skills and stakeholder management abilities. Experience in incident response and enterprise risk reporting. Professional certifications such as More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Reed Technology
Head of Security & Governance , the successful candidate will play a central role in delivering risk reduction across the business. You'll be responsible for maintaining ISO27001 compliance, overseeing risk assessment and mitigation, and supporting incident management across multi-entity operations. Key Accountabilities: Lead and manage a team of three security professionals , supporting their development and day-to-day delivery. … management or team leadership . In-depth knowledge of ISO27001, GDPR, FCA SYSC, PCI DSS and other regulatory/compliance frameworks. Hands-on experience with security technologies: SIEM, IAM, vulnerabilityassessment, endpoint protection, cloud services (AWS, SaaS, IaaS) . Strong communication skills and stakeholder management abilities. Experience in incident response and enterprise risk reporting. Professional certifications such as More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
Head of Security & Governance , the successful candidate will play a central role in delivering risk reduction across the business. You'll be responsible for maintaining ISO27001 compliance, overseeing risk assessment and mitigation, and supporting incident management across multi-entity operations. Key Accountabilities: Lead and manage a team of three security professionals , supporting their development and day-to-day delivery. … management or team leadership . In-depth knowledge of ISO27001, GDPR, FCA SYSC, PCI DSS and other regulatory/compliance frameworks. Hands-on experience with security technologies: SIEM, IAM, vulnerabilityassessment, endpoint protection, cloud services (AWS, SaaS, IaaS) . Strong communication skills and stakeholder management abilities. Experience in incident response and enterprise risk reporting. Professional certifications such as More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage and respond to security breaches More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Upbeat Ideas UK Ltd
consistency across environments. Collaborate with cross-functional teams to understand application requirements and translate them into network solutions. Ensure network security by implementing industry-best practices and conducting regular vulnerability assessments. Troubleshoot and resolve network-related issues in a timely and efficient manner. Stay abreast of the latest networking technologies and trends and recommend upgrades and improvements to keep More ❯
Enfield, Middlesex, England, United Kingdom Hybrid / WFH Options
Eden Brown Synergy
systems to identify, mitigate, and respond to risks and potential threats. * Utilise Microsoft Sentinel and related tools to analyse security data, detect anomalies, and respond effectively to incidents. * Oversee vulnerability assessments and penetration testing to ensure robust security measures are maintained. * Contribute to the development and execution of incident response plans, ensuring prompt action to contain and remediate security More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
Office (WFO) role. This role will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC) using Terraform. Their ideal candidate … Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & Penetration Testing: Review Penetration Testing, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk assessments, and ensure regulatory compliance. … Required Strong expertise in Azure cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetration testing, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of DevOps pipelines (CI/CD More ❯
software development testing experience - Experience programming with at least one modern language such as Java, C++, or C# including object-oriented design - Experience in penetration testing and exploitability-focused vulnerabilityassessment - Experience in platform-level security mitigations and hardening for Linux and Windows PREFERRED QUALIFICATIONS - Knowledge of overall system architecture, scalability, reliability, and performance in a database environment More ❯
to detect and respond to potential threats. Utilise advanced tools and techniques to analyse security data and identify patterns or anomalies that may indicate a security breach. Review regular vulnerability assessments and penetration testing to ensure the robustness of security measures. Ensure rapid response to common incidents: Contribute to incident response plans to address security breaches promptly and effectively. More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Henderson Scott
of security requirements & overall efficacy of the security features and tools. - Facilitate the formal accreditation by MoD of corporate systems & of other specified AWE systems. -Oversee IT Health Check & Vulnerability Assessments (approving scope of tests and overall testing programme). Job Profile - Advise managers on the appropriate level of risk tolerance. - Record and track assessments of information capability and More ❯
Sheffield, Yorkshire, United Kingdom Hybrid / WFH Options
Finsbury Food Group Plc
demonstrable experience in: Leading cybersecurity governance, risk management, and compliance initiatives within an enterprise environment. Managing incident response frameworks, including cross-functional planning and coordination. Conducting security audits and vulnerability assessments, with a proven track record of risk mitigation. Designing and implementing cybersecurity awareness programs to enhance company-wide security culture. Handling third-party cybersecurity risk, ensuring secure vendor More ❯
Salisbury, Wiltshire, United Kingdom Hybrid / WFH Options
Finsbury Food Group Plc
demonstrable experience in: Leading cybersecurity governance, risk management, and compliance initiatives within an enterprise environment. Managing incident response frameworks, including cross-functional planning and coordination. Conducting security audits and vulnerability assessments, with a proven track record of risk mitigation. Designing and implementing cybersecurity awareness programs to enhance company-wide security culture. Handling third-party cybersecurity risk, ensuring secure vendor More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Finsbury Food Group Plc
demonstrable experience in: Leading cybersecurity governance, risk management, and compliance initiatives within an enterprise environment. Managing incident response frameworks, including cross-functional planning and coordination. Conducting security audits and vulnerability assessments, with a proven track record of risk mitigation. Designing and implementing cybersecurity awareness programs to enhance company-wide security culture. Handling third-party cybersecurity risk, ensuring secure vendor More ❯
testing for embedded systems, IoT devices while ensuring compliance with industry regulations Work alongside client R&D teams to lead on secure code reviews, threat modeling, security risk assessments, vulnerability assessments and validation and verification of controls Monitor emerging cybersecurity threats in the IoT and medical device landscape and write though leadership to showcase PA's point of view More ❯
Northampton, Northamptonshire, England, United Kingdom Hybrid / WFH Options
PLANET RECRUITMENT SERVICES LTD
security alerts from various tools such as WAF, SIEM, IDS/IPS, firewalls, and endpoint protection platforms. Investigate and respond to security incidents, including containment, eradication, and recovery. Conduct vulnerability assessments and coordinate remediation efforts. Perform threat hunting and behavioural analysis using threat intelligence and analytics tools. Maintain and tune security tools, detection rules, and automation scripts. Support compliance … of products. Network Security: Understanding of TCP/IP, DNS, VPNs, firewalls, and packet analysis (e.g., Wireshark). Threat Intelligence: Use of platforms like MISP, Recorded Future, or ThreatConnect. Vulnerability Management: Experience with tools like Tenable Nessus, Qualys. Scripting &Automation: Proficiency in Python, PowerShell, or Bash for automating security tasks. Cloud Security: Knowledge of MS Azure. Privileged/Identity More ❯
availability of Marex's critical systems Contributing to the organisation's security standards and procedures Assessing and approving requests Assisting ISO and/or lead security projects such as vulnerability scanning, DLP and/or privileged access monitoring Participating in 3rd party monitoring activities; Advising IT and business on security matters Building connectors to various 3rd party products and … services Maintenance and development of the in-house security framework Supporting vulnerabilityassessment scans and collaborating with other teams on remediation approach Collaborating with technology teams for incident handling, patching disciplines, and system hardening frameworks Collaborating with the Information Technology team on deployment, operation, and continual improvements of security solutions Collaborating with software developers to secure proprietary applications More ❯
analysis and management of risk. Managing Firewalls and Cisco networking devices, and/or analysis of network traffic information, and web server logs Experience with Remote Access (VMWare, VPN), Vulnerabilityassessment tools, and Cloud Security (SaaS, PaaS, IaaS, etc.) Experience maintaining Endpoint and content protection systems (eg Antivirus protection, content filters, Mobile device Management policies) UAL is a More ❯
analysis and management of risk. Managing firewalls and Cisco networking devices, and/or analysis of network traffic information, and web server logs Experience with Remote Access (VMWare, VPN), Vulnerabilityassessment tools, and Cloud Security (SaaS, PaaS, IaaS, etc.) Experience maintaining Endpoint and content protection systems (e.g. Antivirus protection, content filters, Mobile device Management policies) UAL is a More ❯
Microsoft Sentinel. Key Responsibilities: Monitor security alerts and log data using Microsoft Sentinel and related SIEM tools Respond to security incidents, performing root cause analysis and recommending remediations Conduct vulnerability assessments and support threat detection activities Assist with the configuration and optimisation of the organisation's security infrastructure Collaborate with technical teams to ensure best practices in information security More ❯
to detect and respond to potential threats Utilise advanced tools and techniques to analyse security data and identify patterns or anomalies that may indicate a security breach Review regular vulnerability assessments and penetration testing to ensure the robustness of security measures Contribute to incident response plans to address security breaches promptly and effectively About you: You will have the More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Marlin Selection
threats. Key Responsibilities Manage and optimise enterprise-grade security tools: WAF, DDoS, email and web security gateways, SIEM, SOAR, EDR, MFA, SSO, IDS/IPS, PAM and more. Perform vulnerability assessments and penetration test remediation. Deliver Cyber Security Awareness Training across the business. Lead ad-hoc security initiatives and projects. Mentor junior security staff and collaborate across IT and More ❯
as Active Directory, DNS, DHCP, and email systems Support employee workstations, software provisioning, and user permissions Document infrastructure configurations, processes, and changes Assist in 3rd party IT audits and vulnerability assessments Provide out-of-hour support as needed and last line technical support for the customer support team Skills and experience 3-5 years of experience in IT infrastructure More ❯
as Active Directory, DNS, DHCP, and email systems Support employee workstations, software provisioning, and user permissions Document infrastructure configurations, processes, and changes Assist in 3rd party IT audits and vulnerability assessments Provide out-of-hour support as needed and last line technical support for the customer support team Skills and experience 3-5 years of experience in IT infrastructure More ❯
platforms. A good understanding of network security and protocols like TCP/IP. Experience with technical concepts such as tunneling traffic and IP configuration. Experience delivering penetration tests and vulnerability assessments for networks, applications, and cloud services. Excellent communication skills, both verbal and written, with the ability to present to clients. Ability to manage time effectively and work to More ❯
CI/CD tools like GitLab Strong practitioner of DevOps practices, utilizing relevant tooling to enhance development and deployment processes, and ensuring application security through secure coding techniques and vulnerability assessments Technical skillset includes data models, messaging, REST, API design and development, and standard methodologies for system integration Knowledge of Oracle Database and SQL, with experience in performance monitoring More ❯