Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
IO Associates
to solve problems and push boundaries. Progression: As the function expands, you'll have the chance to build your own specialism or sub-function, whether that's automation, exposure management, or advanced threat engineering. What You'll Be Doing Deliver hands-on security engineering and automation projects for enterprise clients. Build custom integrations, playbooks, and scripts to streamline SOC … operations. Optimise SIEM detection logic and vulnerabilitymanagement workflows. Collaborate with technical teams on innovation, labs, and roadmap projects. Act as a trusted consultant - parachuting in, solving problems fast, and moving on to the next challenge. What We're Looking For Background in SOC, Security Engineering, or Automation - ideally customer-facing. Python/PowerShell/REST API scripting More ❯
ensure the products they deliver are secure by design. You'll work closely with developers, architects, and business stakeholders to create an environment where secure coding and proactive risk management come naturally. What you'll be doing You'll play a leading role in driving a security-first culture across agile product teams, defining and delivering a clear application … Working hand-in-hand with developers, you'll weave security seamlessly into the software development lifecycle - from designing controls and integrating testing into CI/CD pipelines to supporting vulnerabilitymanagement and remediation. Acting as the go-to expert for secure design, threat modelling, and compliance, you'll make sure teams have the knowledge, tools, and confidence to More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
ensure the products they deliver are secure by design. You'll work closely with developers, architects, and business stakeholders to create an environment where secure coding and proactive risk management come naturally. What you'll be doing You'll play a leading role in driving a security-first culture across agile product teams, defining and delivering a clear application … Working hand-in-hand with developers, you'll weave security seamlessly into the software development lifecycle - from designing controls and integrating testing into CI/CD pipelines to supporting vulnerabilitymanagement and remediation. Acting as the go-to expert for secure design, threat modelling, and compliance, you'll make sure teams have the knowledge, tools, and confidence to More ❯
advise on and implement appropriate security controls in line with design specifications. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identity and access management (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Familiarity with common regulatory and compliance frameworks (e.g. NIST, CIS Controls, ISO 27001, Cyber Essentials Plus). Experience … and secure storage/access principles. Experience defining security configurations and collaborating with engineers to apply them consistently across the entire IT estate. Familiarity with endpoint protection platforms and vulnerabilitymanagement tools. Experience securing hybrid identity solutions and federated authentication models Understanding of security automation concepts, including security orchestration and response (SOAR) including ability to script or automate More ❯
penetration testing with strong understanding of adversarial tactics and threat intelligence Expertise across network, cryptography, vulnerabilities, and attack vectors Strong communication and reporting skills Experience with Breach Attack Simulation, vulnerabilitymanagement, cloud security reviews (AWS/Azure/GCP), or frameworks like ISO 27001 Certifications such as CISM, CISSP, ECSA, CREST CCT Eligible for UK SC Clearance is More ❯
our client's internal security posture and you'll be working closely with the engineering and product teams to enable security across the company. Key Requirements: AWS - Cloud Security VulnerabilityManagement Tools IAM CPSM Incident Response/small amounts of ISO27001 This role is 5 days a week on-site , you’ll enjoy the perks of a sleek More ❯
ATT&CK and network/cloud security principles. Strong analytical and communication skills. Bonus points for: Scripting or automation experience (KQL, PowerShell, Python). Background in threat hunting or vulnerability management. Why apply? Hybrid flexibility, funded certifications, cutting-edge tooling, and clear development paths into leadership or specialist roles. If you’re ready to step up and help evolve More ❯
ATT&CK and network/cloud security principles. Strong analytical and communication skills. Bonus points for: Scripting or automation experience (KQL, PowerShell, Python). Background in threat hunting or vulnerability management. Why apply? Hybrid flexibility, funded certifications, cutting-edge tooling, and clear development paths into leadership or specialist roles. If you’re ready to step up and help evolve More ❯
including Azure Networking, RBAC/IAM and Storage Microsoft Security stack tools (Defender, Security and Compliance, Purview) Virtualisation Technologies (VMWare) Networking Technologies (LAN/WLAN, WAN/MPLS) Storage Management (physical SAN and software-defined) With practical experience of securing and hardening platforms, as well as experience of using vulnerabilitymanagement systems, you'll also have exposure … to SIEM/XDR/MDR systems and knowledge and practical experience of Service Management tools (Manage Engine). You'll have significant experience of implementing and supporting Infrastructure technology solutions, as well as practical experience of Security stack systems including but not exclusively vulnerability management. With experience of working in an IT Operations/Service Environment, you More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Found Talent
managing IT security operations and driving improvements across infrastructure and processes? This Manchester based organisation is looking for an IT Security Manager to take ownership of information security, risk management and ongoing security enhancement activities. You’ll work closely with Senior Leadership, leading key initiatives to protect systems, data and users while helping shape the organisation’s security posture. … ISO27001 or similar What you’ll need: Proven experience managing IT security or information security functions Strong technical knowledge of Microsoft environments and security controls Experience with incident response, vulnerabilitymanagement, and security risk mitigation Confident working with both technical teams and business stakeholders Solid understanding of security frameworks and compliance standards Ability to lead projects and drive … security improvements proactively What’s in it for you: A key management role focused on shaping and improving security within a collaborative IT leadership team Hybrid working Annual bonus and regular salary reviews Company pension scheme More ❯
is looking to take their career to the next level by having more input into organisations as you help them strengthen their security posture, conduct vital areas such as vulnerability analysis and security audits that meet recommended industry standards. You will be working closely with stakeholders in order to implement Cybersecurity strategies, manage client information and provide expertise across … Conduct detailed risk assessments and gap analysis for client environments Deliver control reviews and maturity assessments aligned to relevant frameworks (ISO 27001, NIST, CIS, Cyber Essentials/Plus) Perform vulnerability assessments and develop mitigation strategies Support the deployment of Managed Detection and Response (MDR), Penetration Testing, and Data Loss Prevention (DLP) solutions Advise clients on governance, incident response, and … Experience Proven experience in a Cybersecurity consultancy role Professional certifications such as CISSP or CISM Strong working knowledge of ISO 27001, NIST and Cyber Essentials/Plus Proficiency with vulnerabilitymanagement, endpoint protection and SIEM tools The role is genuinely exciting with a forward thinking business who have their employees careers at the forefront of their minds and More ❯
chance to lead security operations, respond to real-world threats, and shape the future of cybersecurity in a dynamic, multi-entity environment. Requirements: Proven experience in incident response and vulnerability management. Hands-on with Microsoft Defender, Sentinel, Azure 365, and related tools. Strong communicator—able to engage technical and non-technical stakeholders. Experience in distributed or franchisee-based environments … plus. Certifications like CISSP, CISM, GIAC, or Azure Security Engineer are highly valued. Responsibilities: Be the go-to expert for security incidents—detect, respond, and remediate across regions. Drive vulnerabilitymanagement using top-tier tools like Tenable, Nessus, and Microsoft Defender. Collaborate with franchisees, vendors, and internal teams to close security gaps and elevate resilience. Translate complex threats More ❯
for security practices and deployment processes. Engage with clients to understand their requirements and deliver tailored security solutions. Collaborating with Security and Infrastructure teams to improve Network Defence and Vulnerability Management. Skills required, including - Checkpoint Firewall, Network Defence and VulnerabilityManagement: AWS KMS, AWS Secrets Manager, AWS API Gateway, AWS WAF, Amazon Inspector, Amazon Macie ,Amazon GuardDuty More ❯
for security practices and deployment processes. Engage with clients to understand their requirements and deliver tailored security solutions. Collaborating with Security and Infrastructure teams to improve Network Defence and Vulnerability Management. Skills required, including - Checkpoint Firewall, Network Defence and VulnerabilityManagement: AWS KMS, AWS Secrets Manager, AWS API Gateway, AWS WAF, Amazon Inspector, Amazon Macie ,Amazon GuardDuty More ❯
in Cyber Security, PCI DSS within a cloud environment Have good Security architecture experience, ideally with a DevSecOps environment Excellent experience with PCI DSS and able to lead design Vulnerabilitymanagement & Compliance Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, and NIST Confidence when speaking with More ❯
day work. The ideal candidate will have the following skills: Deep understanding of cyber security principles, secure software development, and threat modeling Experience conducting security assessments, code reviews, and vulnerabilitymanagement across diverse technology stacks Experience in building full-stack products (web applications, APIs, CI tooling or low-level software) Hands-on experience with cloud technologies (AWS, GCP More ❯
continuous improvement across all infrastructure processes and systems. Ensure infrastructure and data security standards are implemented and maintained, aligning with company and legal requirements. Oversee governance, compliance, and risk management within the IT operations function. Build and manage strong partnerships with key vendors, managed service providers (MSPs), and internal stakeholders. Ensure vendors deliver against agreed SLAs, performance, and cost … and operation of the company’s technology infrastructure (networks, servers, cloud environments, data centres, and endpoints). Ensure infrastructure availability, performance, and security meet agreed service levels. Lead incident management processes and ensure rapid, effective response to minimise business disruption. Champion the adoption of modern infrastructure technologies, including cloud platforms and automation tools. Work closely with internal and external … partners to maintain compliance with cyber security standards and frameworks. Implement and oversee vulnerabilitymanagement, patching, and system hardening programmes. Ensure all systems comply with data protection, privacy, and regulatory standards. Manage key vendor relationships, including Managed Security Service Providers (MSSPs) and Managed Service Providers (MSPs). Negotiate and oversee infrastructure contracts and service agreements to ensure value More ❯
continuous improvement across all infrastructure processes and systems. Ensure infrastructure and data security standards are implemented and maintained, aligning with company and legal requirements. Oversee governance, compliance, and risk management within the IT operations function. Build and manage strong partnerships with key vendors, managed service providers (MSPs), and internal stakeholders. Ensure vendors deliver against agreed SLAs, performance, and cost … and operation of the company’s technology infrastructure (networks, servers, cloud environments, data centres, and endpoints). Ensure infrastructure availability, performance, and security meet agreed service levels. Lead incident management processes and ensure rapid, effective response to minimise business disruption. Champion the adoption of modern infrastructure technologies, including cloud platforms and automation tools. Work closely with internal and external … partners to maintain compliance with cyber security standards and frameworks. Implement and oversee vulnerabilitymanagement, patching, and system hardening programmes. Ensure all systems comply with data protection, privacy, and regulatory standards. Manage key vendor relationships, including Managed Security Service Providers (MSSPs) and Managed Service Providers (MSPs). Negotiate and oversee infrastructure contracts and service agreements to ensure value More ❯
for deployment. Ability to demonstrate any IRM solution and SecOps solutions as and when needed. Knowledge of various modules like Policy Mgmt. Compliance & Audit Mgmt., Vendor Mgmt., Business Continuity Management, Vulnerability Response, Incident Response, Security Dashboard on ServiceNow IRM platform Assess as-is IRM processes for maturity and automation on ServiceNow platform Knowledge of Advance risk management … SecOps administrator/consultant (this is mandatory) Must have concluded at least 1 lifecycle of ServiceNow IRM/SecOps implementation. Experience in JavaScript, API, Web Services Working knowledge of Vulnerability Mgmt. process & tools ISO/CISA/CISM/CISSP/CRICS (preferred) Platform expertise required: ServiceNow GRC & SecOps. More ❯
for deployment. Ability to demonstrate any IRM solution and SecOps solutions as and when needed. Knowledge of various modules like Policy Mgmt. Compliance & Audit Mgmt., Vendor Mgmt., Business Continuity Management, Vulnerability Response, Incident Response, Security Dashboard on ServiceNow IRM platform Assess as-is IRM processes for maturity and automation on ServiceNow platform Knowledge of Advance risk management … SecOps administrator/consultant (this is mandatory) Must have concluded at least 1 lifecycle of ServiceNow IRM/SecOps implementation. Experience in JavaScript, API, Web Services Working knowledge of Vulnerability Mgmt. process & tools ISO/CISA/CISM/CISSP/CRICS (preferred) Platform expertise required: ServiceNow GRC & SecOps. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
vertex-it-solutions
ideal candidate will be a proactive problem-solver, a mentor to junior team members, and a driving force in the ongoing improvement of our IT services. Key Responsibilities Infrastructure Management & Support: Design, build, and maintain the company's global IT infrastructure, including on-premises HPE/Dell server and storage hardware, co-located data centres, and cloud-based systems. … device management. Ensure the security of our infrastructure and data by managing on-premises and cloud security controls and working closely with the Security Operations Centre (SoC) to action vulnerabilitymanagement and system patching. Manage and maintain our Windows and Linux (CentOS, Red Hat, Ubuntu) server estate, as well as core Microsoft services (AD, GPO, DNS, NPS/… SMTP Relay), and our extensive VMware vSphere/vCenter virtualisation platform. Administer and optimise our System Centre Configuration Manager (SCCM) hierarchy, including Primary/Secondary sites, Distribution Points, Cloud Management Gateway (CMG), and Azure integration for global software deployment and updates. Manage and maintain our VDI environment (VMware Horizon/Citrix/OLVM), ensuring a reliable experience for our More ❯
with our people and customers at the heart of everything we do. We’re hiring an Information Security Manager to lead the development and evolution of our Information Security Management System (ISMS), aligned with ISO 27001:2022. This strategic and hands-on role is pivotal in safeguarding our digital infrastructure, managing cyber risk, and embedding a security-first culture … across the business. What You’ll Be Doing Lead and maintain our ISO 27001:2022-compliant ISMS Drive risk management across systems, suppliers, and processes Respond to security incidents with forensic precision and coordination Conduct supplier assurance audits and enforce security policies Champion cyber awareness through training and simulations Oversee compliance with GDPR, ISO standards, and regulatory frameworks Collaborate … What We’re Looking For Proven experience managing enterprise ISMS and leading ISO 27001 audits Deep understanding of cyber threats, cloud security (Azure, M365), and compliance frameworks Skilled in vulnerabilitymanagement, penetration testing, and supplier assurance Strong communicator with the ability to translate technical risk into business impact Experience with tools like ISMS Online, Qualys VMDR, and Cofense More ❯
Description We re seeking a hands-on Security Architect to lead the design and assurance of security across our Financial Advice & Wealth Management SaaS platform. This is a pivotal role where you ll own the security architecture across cloud infrastructure and networking, drive secure-by-design application architectures, and ensure robust security for integrations with external partners and systems. … us meet the expectations of our customers, clients, and regulators What you'll do Design and maintain secure cloud environments, including network segmentation, WAFs, DDoS protection, secret and certificate management, and encryption. Embed secure SDLC practices such as SAST/DAST, dependency scanning, secure coding standards, threat modelling, and API security. Architect identity-centric controls across cloud infrastructure and … Align security standards and frameworks with business and technology strategy. Monitor and communicate emerging security trends. Identify and address security design gaps in application and infrastructure architectures. Assist with vulnerabilitymanagement, testing, risk analysis, and reporting. Clearly communicate security concepts and strategies to stakeholders. The knowledge, experience and qualifications you need Strong expertise in cloud security, preferably within More ❯
Description We’re seeking a hands-on Security Architect to lead the design and assurance of security across our Financial Advice & Wealth Management SaaS platform. This is a pivotal role where you’ll own the security architecture across cloud infrastructure and networking, drive secure-by-design application architectures, and ensure robust security for integrations with external partners and systems. … us meet the expectations of our customers, clients, and regulators What you'll do Design and maintain secure cloud environments, including network segmentation, WAFs, DDoS protection, secret and certificate management, and encryption. Embed secure SDLC practices such as SAST/DAST, dependency scanning, secure coding standards, threat modelling, and API security. Architect identity-centric controls across cloud infrastructure and … Align security standards and frameworks with business and technology strategy. Monitor and communicate emerging security trends. Identify and address security design gaps in application and infrastructure architectures. Assist with vulnerabilitymanagement, testing, risk analysis, and reporting. Clearly communicate security concepts and strategies to stakeholders. The knowledge, experience and qualifications you need Strong expertise in cloud security, preferably within More ❯