in a highly visible, business-critical role— not just advising, but actively designing, documenting, and executing security strategies that meet strict compliance and risk management standards. Location: London (Hybrid – 2 days a week on-site) Technology Stack The organization operates primarily on the Microsoft Azure stack , so experience designing … policies, SOPs, and access control policies (IAM, RBAC, MFA). Implementation & Technical Controls Create a roadmap for security deployment. Confirm tool selections, define change management procedures. Establish Azure-native endpoint security and encryption strategies. Security Monitoring & Incident Response Review and enhance monitoring frameworks (e.g., Azure Security Center, SIEM). … and auditing procedures. Compliance & Regulatory Documentation Ensure adherence to GDPR, HIPAA, PCI-DSS, and other regulations. Prepare audit documentation and compliance mapping. Penetration Testing & VulnerabilityManagement Develop and execute penetration testing plans. Conduct vulnerability assessments and oversee remediation efforts. Training & Knowledge Transfer Create security awareness materials. Conduct More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Levy Search
in a highly visible, business-critical role— not just advising, but actively designing, documenting, and executing security strategies that meet strict compliance and risk management standards. Location: London (Hybrid – 2 days a week on-site) Technology Stack The organization operates primarily on the Microsoft Azure stack , so experience designing … policies, SOPs, and access control policies (IAM, RBAC, MFA). Implementation & Technical Controls Create a roadmap for security deployment. Confirm tool selections, define change management procedures. Establish Azure-native endpoint security and encryption strategies. Security Monitoring & Incident Response Review and enhance monitoring frameworks (e.g., Azure Security Center, SIEM). … and auditing procedures. Compliance & Regulatory Documentation Ensure adherence to GDPR, HIPAA, PCI-DSS, and other regulations. Prepare audit documentation and compliance mapping. Penetration Testing & VulnerabilityManagement Develop and execute penetration testing plans. Conduct vulnerability assessments and oversee remediation efforts. Training & Knowledge Transfer Create security awareness materials. Conduct More ❯
across various platforms. The consultant will play a critical role in evaluating and strengthening our clients’ cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with … develop, document, and implement security policies, standards, and guidelines aligned with industry standards (e.g., ISO 27001, NIST). Assist in the deployment, configuration, and management of security infrastructure and technologies, including firewalls, intrusion detection/prevention systems, and secure network architectures. Provide guidance and support on Azure security practices … including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerabilitymanagement, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit More ❯
across various platforms. The consultant will play a critical role in evaluating and strengthening our clients' cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with … develop, document, and implement security policies, standards, and guidelines aligned with industry standards (e.g., ISO 27001, NIST). Assist in the deployment, configuration, and management of security infrastructure and technologies, including firewalls, intrusion detection/prevention systems, and secure network architectures. Provide guidance and support on Azure security practices … including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerabilitymanagement, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit More ❯
opportunity to engage in various projects across a large and complex organisation. The ideal candidate will have a strong background in IT security, risk management, and regulatory compliance, with the ability to develop and implement effective strategies aligned with Global Policies and Standards. This role is crucial in protecting … regular assessments and audits to ensure compliance. Support IT demand processes for new solutions, assurance evidence, and documentation. Manage and improve the IT risk management framework for the UK & Ireland. Oversee the Information Security Management System and support security policies, vulnerabilitymanagement, and incident responses. Manage … review contractual security schedules, and support the commercial team during the bid process. Professional and Personal Competencies/Qualifications: Extensive experience leading IT risk management and compliance within a complex global organisation. Strong knowledge of IT regulations, standards, and best practices. Strong knowledge of IT General Controls and Information More ❯
will do: Design and implement robust, forward-thinking security strategies, policies, and procedures to safeguard our systems, networks, and data. Lead regular security assessments, vulnerability scans, and penetration tests to identify risks and deploy effective remediation measures. Monitor systems, networks, and logs for any signs of security incidents or … preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar). You excel in risk assessments, vulnerabilitymanagementMore ❯
Act as a key liaison between internal stakeholders, managed service providers, and external vendors to ensure operational continuity and alignment with business objectives. Infrastructure Management Oversee the day-to-day performance and availability of core infrastructure systems, including networks, servers, storage, and cloud services. Monitor infrastructure platforms proactively to … units. Service Operations & Technical Support Provide third-line support across infrastructure layers, supporting internal users and IT service desk teams. Maintain and enforce access management protocols for infrastructure components and enterprise applications. Lead incident resolution efforts involving infrastructure systems, ensuring timely escalation to third-party experts when required. Vendor … enhance Microsoft 365 security posture across the organization. Manage the configuration and policy enforcement of Microsoft Intune, including compliance and device security baselines. Oversee vulnerabilitymanagement and endpoint patching activities in partnership with external security consultancies. Administer firewall configurations and ensure consistent deployment across all locations and platforms. More ❯
and creating investment/programme plans to uplift their capabilities to appropriate levels. The role also encompasses traditional cyber security functions, such as incident management, and a focus on developing common group cyber services for consistency and efficiency. Key Competencies: Interpersonal Skills: Demonstrates a strong ability to build and … Assess TOC cyber security maturity, identify gaps, and develop/oversee implementation of tailored uplift programmes. Develop core cyber capabilities: Including robust cyber incident management (with executive reporting) and comprehensive threat intelligence/vulnerabilitymanagement programs as key priorities. Group Cyber Services & Technology: Develop, promote and implement … and TOC compliance with relevant UK regulations (GDPR, NIS) and establish effective governance. Act as a key interface to audit and risk functions. Stakeholder Management & Communication: Engage and communicate effectively with key stakeholders, including executive leadership and TOCs. Knowledge, Skills, Experience & Technical Qualifications Cyber Security Strategy & Risk ManagementMore ❯
the creation and refinement of security monitoring rules, techniques and processes. Proactively hunt for evidence of threats or compromise using all available tools. Incident Management Investigate and resolve escalated security incidents both independently and by leading a team of SOC colleagues. Ensure the defined playbooks are followed correctly, and … accurate logs are made of all actions during incident response. Support and mentor colleagues with best-practice incident management techniques and behaviours. Perform root cause analysis, recommend process improvements, and write final post-incident reports. Project Delivery Take part in the team's project delivery initiative, rotating between the … following roles on a 1-3 monthly schedule: VulnerabilityManagement - maintain regular scans, interpret results, identify asset owners, track remediation activities and report on the agreed SLAs. Security Controls Administration - maintain availability and functionality of all security controls; implement new and advanced features where available; write technical documentation More ❯
for security breaches, and responding to incidents. They also work to educate employees on best practices for information security. Main Responsibilities Security Implementation and Management Deploy and optimise security solutions to safeguard IT services and infrastructure. Lead security assessments including vulnerability testing and risk analysis to identify and … and effective action. Develop comprehensive incident response plans to maintain organisational resilience against threats. Oversee operational security processes with tools like SIEM, EDR, and VulnerabilityManagement, continuously enhancing capabilities. Network and System Security Manage advanced security tools such as firewalls and IDS/IPS to protect network integrity. … organisation. Cloud and Application Security Enhance the security of cloud services (SaaS, PaaS, IaaS) and enterprise applications through advanced security measures and identity access management (IAM). Education & Competencies University Degree or equivalent preferred A minimum of 3 years' experience in a similar role. Strong and demonstrable experience of More ❯
for security breaches, and responding to incidents. They also work to educate employees on best practices for information security. Main Responsibilities Security Implementation and Management Deploy and optimise security solutions to safeguard IT services and infrastructure. Lead security assessments including vulnerability testing and risk analysis to identify and … and effective action. Develop comprehensive incident response plans to maintain organisational resilience against threats. Oversee operational security processes with tools like SIEM, EDR, and VulnerabilityManagement, continuously enhancing capabilities. Network and System Security Manage advanced security tools such as firewalls and IDS/IPS to protect network integrity. … organisation. Cloud and Application Security Enhance the security of cloud services (SaaS, PaaS, IaaS) and enterprise applications through advanced security measures and identity access management (IAM). Education & Competencies University Degree or equivalent preferred A minimum of 3 years' experience in a similar role. Strong and demonstrable experience of More ❯
ensuring key support functions are delivered in a smart, flexible and holistic manner to ensure the business continues to operate safely and securely. Support vulnerabilitymanagement activities such as vulnerability assessments and security control assessments. Support the maintenance of the programme Information Security Management System (ISO27001 … . Support the Information Security Manager to deliver Information Security best practices across the programme. Create and maintain high quality security documentation, such as vulnerability and control assessment reports. This role is full time, 37 hours per week and provides hybrid working arrangements with 2 days in the office More ❯
ensuring key support functions are delivered in a smart, flexible and holistic manner to ensure the business continues to operate safely and securely. Support vulnerabilitymanagement activities such as vulnerability assessments and security control assessments. Support the maintenance of the programme Information Security Management System (ISO27001 … . Support the Information Security Manager to deliver Information Security best practices across the programme. Create and maintain high quality security documentation, such as vulnerability and control assessment reports. This role is full time, 37 hours per week and provides hybrid working arrangements with 2 days in the office More ❯
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
Babcock Mission Critical Services España SA
ensuring key support functions are delivered in a smart, flexible and holistic manner to ensure the business continues to operate safely and securely. Support vulnerabilitymanagement activities such as vulnerability assessments and security control assessments. Support the maintenance of the programme Information Security Management System (ISO27001 … . Support the Information Security Manager to deliver Information Security best practices across the programme. Create and maintain high quality security documentation, such as vulnerability and control assessment reports. This role is full time, 37 hours per week and provides hybrid working arrangements with 2 days in the office More ❯
Stroud, England, United Kingdom Hybrid / WFH Options
Ecotricity
Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Linux Operating Systems On-Premise Active Directory Networking - Cisco/Fortigate Penetration Testing & VulnerabilityManagement Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate for this … be working towards a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (ie. NIST or Cyber Security Essentials). Knowledge of vulnerability databases (ie. NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tooling. Experience using Code Security scanning More ❯
Stroud, south east england, united kingdom Hybrid / WFH Options
Ecotricity
Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Linux Operating Systems On-Premise Active Directory Networking - Cisco/Fortigate Penetration Testing & VulnerabilityManagement Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate for this … be working towards a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (ie. NIST or Cyber Security Essentials). Knowledge of vulnerability databases (ie. NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tooling. Experience using Code Security scanning More ❯
processes Support the agenda for our cloud first strategy and ensure any cloud solutions meet our security aspirations and requirements Take responsibility for incident management and lead our response to cyber security events, incidents and potential breaches Ensure our suppliers adequately monitor the IT estate for threats and alerts … technical area or equivalent industry experience Security domain specific experience showing progression through a number of roles with increasing responsibilities Strong technical leadership, stakeholder management and communication skills Experience working in a public body, particularly a local authority would be advantageous Experience of working through matrix management of … multi-disciplinary teams in complex infrastructure environments A strong technical background across Networks, Security, Firewall, VulnerabilityManagement, SIEM and EDR technologies Experience with cyber security concepts, such as Threat Modelling, Incident Response, Penetration Testing (external/internal) Advanced knowledge of cloud products and services e.g. Azure, Microsoft More ❯
testing into Agile development workflows and DevSecOps pipelines. As a Security Testing Engineer , you will conduct static and dynamic security assessments, penetration testing, and vulnerability analysis , ensuring that applications meet the highest security standards. Key Responsibilities 1. Security Test Planning & Execution Develop, implement, and execute comprehensive security test plans … Access Control), MFA (Multi-Factor Authentication), and API security mechanisms . Ensure compliance with GDPR, ISO 27001, and NCSC Cyber Essentials security standards. 3. VulnerabilityManagement & Defect Tracking Identify, document, and track security defects, working closely with development teams to resolve vulnerabilities . Provide detailed security test reports … and conduct penetration testing on applications and infrastructure. Knowledge of database security testing , including writing security-focused SQL queries. Familiarity with identity and access management (IAM), RBAC, MFA, JWT authentication, and OAuth 2.0 security mechanisms . Strong risk assessment, problem-solving, and communication skills . Awareness of UK government More ❯
Response: Monitor and analyze security events to detect potential threats or breaches. Respond to security incidents, conduct root cause analysis, and implement corrective actions. VulnerabilityManagement: Perform regular security assessments, including penetration testing and vulnerability scanning. Collaborate with development teams to address vulnerabilities and enforce remediation timelines. … or a similar role. Strong understanding of security principles, cryptography, and network protocols. Hands-on experience with security tools (e.g., SIEM, IDS/IPS, vulnerability scanners). Familiarity with cloud platforms (e.g., AWS, Azure, GCP) and their security frameworks. Knowledge of secure coding practices and common vulnerabilities (e.g., OWASP More ❯
Response: Monitor and analyze security events to detect potential threats or breaches. Respond to security incidents, conduct root cause analysis, and implement corrective actions. VulnerabilityManagement: Perform regular security assessments, including penetration testing and vulnerability scanning. Collaborate with development teams to address vulnerabilities and enforce remediation timelines. … or a similar role. Strong understanding of security principles, cryptography, and network protocols. Hands-on experience with security tools (e.g., SIEM, IDS/IPS, vulnerability scanners). Familiarity with cloud platforms (e.g., AWS, Azure, GCP) and their security frameworks. Knowledge of secure coding practices and common vulnerabilities (e.g., OWASP More ❯
risks. Key Responsibilities Develop and implement security strategy : aligning security plans with business goals. Own our security program: building and maintaining an information security management system. Promote security culture : working closely with IT to educate and enable teams across Attest. Support with compliance : partner with our Legal team to … framework . Hands-on expertise in network security, application security, IAM, and incident response . Proficiency with SIEM, IDS/IPS, WAFs, EDR, and vulnerabilitymanagement tools . Understanding of secure coding practices and ability to collaborate with engineering teams. Strong communication skills to articulate security risks effectively More ❯
Portsmouth, yorkshire and the humber, United Kingdom
Computappoint
detection, response, and containment. Maintain and improve SOC documentation and playbooks. Collaborate with team members and other departments to improve overall security posture. Support vulnerabilitymanagement and threat intelligence processes. Stay informed on emerging threats and security best practices. Required Skills & Qualifications: Degree in Cybersecurity, IT, or related More ❯
portsmouth, hampshire, south east england, United Kingdom
Computappoint
detection, response, and containment. Maintain and improve SOC documentation and playbooks. Collaborate with team members and other departments to improve overall security posture. Support vulnerabilitymanagement and threat intelligence processes. Stay informed on emerging threats and security best practices. Required Skills & Qualifications: Degree in Cybersecurity, IT, or related More ❯
companies that are Britain's economic engine - ambitious, entrepreneurially-spirited and high growth businesses that fuel the economy - and directly advise the owners and management teams that lead them. We'll broaden your horizons To ensure our services and applications are fit for the modern market, our IT team … join our team. You will have a strong background in software development, security, and operations. This role is required to support the Digital Product Management team in embedding security requirements and best practices into new Digital Products and Services. You will work closely with the Digital Product Management … etc. Collaborate with development teams to integrate security best practices into the secure software development lifecycle (SDLC) and ensure products are built securely Oversee vulnerabilitymanagement and remediation efforts, including leading responses to pen test findings and security assessments Experience conducting risk assessments and threat modelling for software More ❯
companies that are Britain's economic engine - ambitious, entrepreneurially-spirited and high growth businesses that fuel the economy - and directly advise the owners and management teams that lead them. We'll broaden your horizons To ensure our services and applications are fit for the modern market, our IT team … join our team. You will have a strong background in software development, security, and operations. This role is required to support the Digital Product Management team in embedding security requirements and best practices into new Digital Products and Services. You will work closely with the Digital Product Management … etc. Collaborate with development teams to integrate security best practices into the secure software development lifecycle (SDLC) and ensure products are built securely Oversee vulnerabilitymanagement and remediation efforts, including leading responses to pen test findings and security assessments Experience conducting risk assessments and threat modelling for software More ❯