the organisation's security. Key accountabilities: Assurance and Testing: Develop and improve security policies and guidance related to security assurance testing. Coordinate and manage vulnerability assessments, penetration testing, and other technical evaluations. Collaborate with technology teams to implement robust security controls and provide guidance on remediation. Perform third-party … vendor risk assessments and report findings to relevant stakeholders. Risk Management: Conduct regular risk assessments to identify vulnerabilities and associated risks. Develop and implement risk mitigation strategies. Define and report key risk metrics for security assurance. Maintain a comprehensive risk register. Attack Surface Management: Collaborate on assurance initiatives … to identify, monitor, and reduce exposed vulnerabilities. Monitor the external threat landscape and integrate attack surface management capabilities. Security Governance and Compliance: Develop and maintain information security policies, standards, and procedures. Ensure compliance with legal, regulatory, and contractual obligations. Act as the primary liaison for assurance audits and external More ❯
A proactive mindset, with a drive to identify, own, and solve security challenges end-to-end. Strong technical skills across areas like threat detection, vulnerabilitymanagement, identity and access control, and incident response. Familiarity with a range of security tools and platformssuch as SIEM, EDR, firewalls, and cloud More ❯
Cloud Security Penetration Testing Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) VulnerabilityManagement (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Intrusion Detection/Prevention Systems (IDS/ More ❯
Security Consultant you will work with the wider IT Security Team to support and maintain enterprise wide solutions. The Responsibilities Assist with security incident management and response activities General day-to-day support on managing and responding to security alerts from systems and end users Perform daily, weekly, and … standards including Cyber Essentials, ISO 27001, 27002 etc. Data Protection Act and the General Data Protection Regulation Microsoft O365 Security solutions; Networking; Security operations; VulnerabilityManagement Security Auditing Good understanding of security testing principles, including experience of vulnerability scanning, identifying, resolving, and reporting risks Experience of formal More ❯
York, England, United Kingdom Hybrid / WFH Options
Investigo
phishing emails and other security events. Use Endpoint Detection and Response (EDR) tools to examine endpoint and respond to cyber threats and malware. Undertake vulnerabilitymanagement including identifying and risk assessing vulnerabilities on any IT infrastructure. Reporting and tracking vulnerabilities through to mitigation. Conduct security administrator activities across … the Microsoft 365 stack including but not limited to configuration and change management of security tools. Be responsible for managing changes to security tools adhering to Persimmon IT change management policy. Conduct reviews of existing IT Infrastructure such as firewall ruleset reviews advising on where risks might exist. More ❯
overview: This is an opportunity to lead global Security Operations focused on safeguarding Arm's digital environment through exemplary threat detection, incident response, and vulnerabilitymanagement capabilities. This senior role, reporting directly into the CISO, is accountable for driving the strategic direction of Arm's Detect & Response function … delivering outstanding performance and ensuring we are resilient against an evolving threat landscape! In addition to operations, you will lead cyber crisis management, C-Suite level stress testing, team development, and top-level cybersecurity thought leadership. Responsibilities: Own and deliver the strategic roadmap for cyber incident and vulnerability … how they can be used as a force multiplier for a technology business strategy, with the ability to influence at all levels. Extensive people management experience, fostering a culture focused on mentoring, wellbeing, and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant More ❯
Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Frontier Resourcing
by embedding robust security controls throughout the development lifecycle, identifying and mitigating risks, and ensuring compliance with defence-grade standards. Key Responsibilities Risk Assessments & VulnerabilityManagement Conduct comprehensive security risk assessments at each product phase (design, implementation, deployment). Identify vulnerabilities in architectures, codebases, and configurations; drive remediation …/53, JSP 440/604, Def Stan 05-series). Lead the creation and maintenance of security documentation (RMADS, Security Assurance Documents, Security Management Plans). Testing & Assurance Design and execute penetration tests and automated vulnerability scans; validate fixes. Oversee third-party security assessments as required. Continuous … across teams. Qualifications & Experience Proven experience (5+ years) in product or application security within defence, government, or security-cleared environments. Deep knowledge of risk management frameworks (ISO 27001/2/5/31000, NIST 800-series) and Defence Standards (JSPs, Def Stan 05-138/139). Hands More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Frontier Resourcing Ltd
by embedding robust security controls throughout the development lifecycle, identifying and mitigating risks, and ensuring compliance with defence-grade standards. Key Responsibilities Risk Assessments & VulnerabilityManagement Conduct comprehensive security risk assessments at each product phase (design, implementation, deployment). Identify vulnerabilities in architectures, codebases, and configurations; drive remediation …/53, JSP 440/604, Def Stan 05-series). Lead the creation and maintenance of security documentation (RMADS, Security Assurance Documents, Security Management Plans). Testing & Assurance Design and execute penetration tests and automated vulnerability scans; validate fixes. Oversee third-party security assessments as required. Continuous … across teams. Qualifications & Experience Proven experience (5+ years) in product or application security within defence, government, or security-cleared environments. Deep knowledge of risk management frameworks (ISO 27001/2/5/31000, NIST 800-series) and Defence Standards (JSPs, Def Stan 05-138/139). Hands More ❯
can make a genuine impact on customers’ data security and business continuity, then keep reading. The Role: What You’ll Do Here: - Azure Infrastructure Management: Design, deploy, and manage scalable Azure-based infrastructure services including IaaS, PaaS, networking, and security components. - Virtualisation VMware & Hyper-v. Management of environments … Compliance: Implement and maintain infrastructure security policies and controls aligned with industry standards (e.g., ISO 27001, NIST, CIS). Collaborate with InfoSec teams on vulnerabilitymanagement and risk mitigation. - Infrastructure Automation & Optimization: Automate infrastructure deployment and configuration using tools such as PowerShell, ARM templates, or Terraform. Drive continuous More ❯
can make a genuine impact on customers’ data security and business continuity, then keep reading. The Role: What You’ll Do Here: - Azure Infrastructure Management: Design, deploy, and manage scalable Azure-based infrastructure services including IaaS, PaaS, networking, and security components. - Virtualisation VMware & Hyper-v. Management of environments … Compliance: Implement and maintain infrastructure security policies and controls aligned with industry standards (e.g., ISO 27001, NIST, CIS). Collaborate with InfoSec teams on vulnerabilitymanagement and risk mitigation. - Infrastructure Automation & Optimization: Automate infrastructure deployment and configuration using tools such as PowerShell, ARM templates, or Terraform. Drive continuous More ❯
london (battersea), south east england, united kingdom
Databarracks
can make a genuine impact on customers’ data security and business continuity, then keep reading. The Role: What You’ll Do Here: - Azure Infrastructure Management: Design, deploy, and manage scalable Azure-based infrastructure services including IaaS, PaaS, networking, and security components. - Virtualisation VMware & Hyper-v. Management of environments … Compliance: Implement and maintain infrastructure security policies and controls aligned with industry standards (e.g., ISO 27001, NIST, CIS). Collaborate with InfoSec teams on vulnerabilitymanagement and risk mitigation. - Infrastructure Automation & Optimization: Automate infrastructure deployment and configuration using tools such as PowerShell, ARM templates, or Terraform. Drive continuous More ❯
can make a genuine impact on customers' data security and business continuity, then keep reading. The role What you'll do here Azure Infrastructure Management Design, deploy, and manage scalable Azure-based infrastructure services, including IaaS, PaaS, networking and security components. Virtualisation VMware & Hyper-V Management of environments. … Compliance Implement and maintain infrastructure security policies and controls aligned with industry standards (e.g., ISO 27001, NIST, CIS). Collaborate with InfoSec teams on vulnerabilitymanagement and risk mitigation. Infrastructure Automation & Optimisation Automate infrastructure deployment and configuration using tools such as PowerShell, ARM templates, or Terraform. Drive continuous More ❯
Portsmouth, Hampshire, South East, United Kingdom Hybrid / WFH Options
University of Portsmouth
procedures for the University as well as managing, guiding and directing the Cyber Security Team. The role will establish and maintain effective governance, risk management and compliance frameworks for cyber security and oversee the delivery of cyber security services, including security operations, incident response, threat intelligence, vulnerabilitymanagement, awareness and training. The role will regularly engage with internal and external stakeholders, including senior management, business units, customers, suppliers, regulators and law enforcement agencies. Whilst there is a need to be in Portsmouth a few days a week, hybrid working is available for this role. Interviews are More ❯
enterprise standards. Support the detection, response, and resolution of security and privacy incidents. What You'll Bring Broad experience across information security disciplines, including vulnerabilitymanagement, identity, and incident response. Strong stakeholder engagement and change management skills. Background in hands-on technical roles such as infrastructure, software More ❯
enterprise standards. Support the detection, response, and resolution of security and privacy incidents. What You'll Bring Broad experience across information security disciplines, including vulnerabilitymanagement, identity, and incident response. Strong stakeholder engagement and change management skills. Background in hands-on technical roles such as infrastructure, software More ❯
enterprise standards. Support the detection, response, and resolution of security and privacy incidents. What You'll Bring Broad experience across information security disciplines, including vulnerabilitymanagement, identity, and incident response. Strong stakeholder engagement and change management skills. Background in hands-on technical roles such as infrastructure, software More ❯
enterprise standards. Support the detection, response, and resolution of security and privacy incidents. What You'll Bring Broad experience across information security disciplines, including vulnerabilitymanagement, identity, and incident response. Strong stakeholder engagement and change management skills. Background in hands-on technical roles such as infrastructure, software More ❯
enterprise standards. Support the detection, response, and resolution of security and privacy incidents. What You'll Bring Broad experience across information security disciplines, including vulnerabilitymanagement, identity, and incident response. Strong stakeholder engagement and change management skills. Background in hands-on technical roles such as infrastructure, software More ❯
equivalent + 6-7 years in InfoSec Experience maturing security programs & frameworks ( ISO27001, NIST CAF, OWASP ) Strong knowledge of SIEM, IDS/IPS, RBAC, vulnerabilitymanagement Understanding of cloud, COTS/SaaS platforms & IoT security Ability to communicate risks & strategies at executive level Full driving license & personal transport More ❯
one or more SEIM solutions, including Azure Sentinel Experience of oone or more EDR solutions such as Microsoft Defender or SentinelOne Experience with ISO2071 VulnerabilityManagement and Scanning tools; Tenable, Rapid7 or Qualys Good understanding of attacker tactics, techniques and procedures Experience using Mitre ATT&CK framework Strong More ❯
travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerabilitymanagement and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security More ❯
Peterborough, Cambridgeshire, United Kingdom Hybrid / WFH Options
AB Agri Ltd
systems and data across the business Advising on and reviewing the implementation of Information Security Policies, Standards and Controls across projects and operations Coordinating vulnerabilitymanagement activities across IT, OT, and cloud environments Providing guidance on security best practices, supporting compliance with internal policy and external regulations Supporting … the development and rollout of the third-party risk management framework Participating in internal forums and external security events, bringing fresh insights to shape future security initiatives Maintaining awareness of business systems, data flows, and architecture to inform security recommendations Collaborating with stakeholders to ensure secure design and implementation … and improvement Knowledge or experience of working within an Information Security, Risk or Compliance function Familiarity with cyber security principles, governance frameworks, and risk management practices Understanding of cloud environments, particularly Microsoft Azure, and their associated security considerations A relevant degree (e.g. Computer Science or similar) and/or More ❯