all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerabilitymanagement (tenable is tool used) and patching More ❯
all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerabilitymanagement (tenable is tool used) and patching More ❯
compliance Establish and enforce IT security policies and procedures Ensure compliance with relevant regulations, such as GDPR and PCI DSS Oversee security operations, including vulnerabilitymanagement and incident response What are we looking for? Senior-level IT leadership experience, including team management and strategic oversight. Deep hands More ❯
compliance Establish and enforce IT security policies and procedures Ensure compliance with relevant regulations, such as GDPR and PCI DSS Oversee security operations, including vulnerabilitymanagement and incident response What are we looking for? Senior-level IT leadership experience, including team management and strategic oversight. Deep hands More ❯
to security events across a complex, multi-departmental IT environment. You'll maintain and use key security tools such as SIEM, IDS, EDR, and vulnerabilitymanagement platforms. You will work closely with system owners and users to assess configurations, analyse logs, and improve security controls and procedures. In … career experience in a relative field Hands-on experience with security monitoring and incident response technologies such as SIEM, IDS and EDR. Experience with vulnerability assessment including practical assessments for risk analysis. A strong working knowledge of at least one major operating system (Windows, Linux, or MacOS). An More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
Randstad Technologies Recruitment
guidance. Run scheduled audits and follow through with actionable improvements. Roll out and stress-test our business continuity approach. Turn data into insights with management reports that track compliance trends. Partner with teams across the globe to design, implement, and test security tools and controls. Lead the journey to … standards. A solid foundation in enterprise-level Information Security practices. Strong analytical skills and a calm approach under competing demands. Familiarity with threat landscapes, vulnerabilitymanagement, and risk frameworks. Willingness to travel within the UK and potentially abroad when needed-UK driving license required Why You'll Love More ❯
Undertaking regular patch and upgrade activities across the network Providing business-focused reporting and information as required Configuring end-user devices (hardware setup, policy management, compliance) Producing clear, concise documentation for both end users and the support team What you'll need to succeed Proven experience with Windows Server … DNS, DHCP, TCP/IP, subnetting, and VLANs Proficiency with Office/Microsoft 365 (F through to E suites) Strong understanding of modern identity management and security protocols Experience with Azure (PaaS, IaaS), including security and governance aspects Capability to configure firewalls and perform advanced threat hunting Knowledge of … security tools and vulnerabilitymanagement practices Excellent documentation skills for technical and non-technical audiences Problem-solving mindset with the ability to work both independently and as part of a team Strong communication skills to interface with colleagues at all technical levels What you need to do now More ❯
Age Services security posture and initiatives, ensuring the protection of information assets from internal and external threats. Develop, manage, and enhance the fraud risk management framework to minimize the department's exposure to fraud risks. Oversee the implementation, management, and proper utilization of security tools such as intrusion … detection systems, vulnerabilitymanagement, anti-virus software, and data encryption. Assess and manage the identification and mitigation plans of existing and emerging security threats, vulnerabilities, and risks. Maintain awareness in information security technologies and fraud risk management methodologies, applying best practices and driving knowledge through Working Age More ❯
across the company, including training and best practices Work closely with engineering to embed security into the SDLC and product roadmap Manage incident response, vulnerabilitymanagement, and third-party risk processes Act as a key stakeholder in board-level and customer-facing security discussions 👤 What We’re Looking More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Maxwell Bond
across the company, including training and best practices Work closely with engineering to embed security into the SDLC and product roadmap Manage incident response, vulnerabilitymanagement, and third-party risk processes Act as a key stakeholder in board-level and customer-facing security discussions 👤 What We’re Looking More ❯
experience as a SOC/Security Engineer within a cloud environment Strong CrowdStrike experience is needed Experience with a range of SIEM, SOAR and vulnerabilitymanagement tools Experience advising on security best practices and developing SOC playbooks Networking and infrastructure experience, including with Firewalls and IDS/IPS More ❯
experience as a SOC/Security Engineer within a cloud environment Strong CrowdStrike experience is needed Experience with a range of SIEM, SOAR and vulnerabilitymanagement tools Experience advising on security best practices and developing SOC playbooks Networking and infrastructure experience, including with Firewalls and IDS/IPS More ❯
Portsmouth, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Computappoint
issues Support installation, configuration, and upgrades of operating systems and software Assist with virtualisation and cloud technologies Contribute to security initiatives, including patching and vulnerabilitymanagement Maintain accurate asset records and update documentation Follow and uphold change control processes Technologies: Windows and/or Linux Operating Systems Virtualisation … Platforms Cloud Environments Infrastructure Monitoring and Management Tools Microsoft Entra and Azure Environment Management Python and PowerShell scripting experience Veeam VBR server experience would be beneficial to your application Requirements: Strong communication skills and a customer-focused approach Ability to work both independently and within a team A More ❯
portsmouth, hampshire, south east england, United Kingdom Hybrid / WFH Options
Computappoint
issues Support installation, configuration, and upgrades of operating systems and software Assist with virtualisation and cloud technologies Contribute to security initiatives, including patching and vulnerabilitymanagement Maintain accurate asset records and update documentation Follow and uphold change control processes Technologies: Windows and/or Linux Operating Systems Virtualisation … Platforms Cloud Environments Infrastructure Monitoring and Management Tools Microsoft Entra and Azure Environment Management Python and PowerShell scripting experience Veeam VBR server experience would be beneficial to your application Requirements: Strong communication skills and a customer-focused approach Ability to work both independently and within a team A More ❯
of a team responsible for protecting IT infrastructure through technical expertise and strategic planning, ensuring security controls are properly implemented and maintained. Responsibilities include: Vulnerability Scanning & Reporting Endpoint Security Incident Management & Tickets System Hardening Change Work Participation in Regular Meetings Documentation Qualifications and skills required include experience with … security frameworks such as Government Functional Standard 007, vulnerabilitymanagement, endpoint protection, incident response, system hardening, and compliance auditing. Clearance Requirements: Security Clearance to Start SC Security Clearance for Role DV What we offer: Contributory Pension Scheme Private Medical Insurance 33 days Annual Leave Flexible benefits including health More ❯
leadership role that requires an individual with a strong technical background, as well as an ability to work with the IT organization and business management to align priorities and plans with key business objectives. This role and its function are part of the Information Technology shared services model. A … legal and purchasing departments to establish mutually acceptable contracts and service-level agreements. Manages production issues and incidents and participates in problem and change management forums. Works with the Executive Director of IT and IT Security and business stakeholders to define metrics and reports strategies that effectively communicate successes … Manages outsourced vendors that provide information security functions for compliance with contracted service-level agreements. Manages the day-to-day activities of threat and vulnerabilitymanagement, identify risk tolerances, recommend treatment plans, and communicate information about residual risk. Manages security projects and provides expert guidance on security matters More ❯
Dover, Kent, South East, United Kingdom Hybrid / WFH Options
Migrant Help
and experience we are looking for in our Information Security Officer: Proficiency in security domains, tools and technologies such as DLP, SIEM, SOAR and VulnerabilityManagement Good working knowledge of network security, firewalls, threat management, endpoint detection and response Ability to identify, assess, and mitigate security risks More ❯
Shepherdswell, Kent, United Kingdom Hybrid / WFH Options
Migrant Help
and experience we are looking for in our Information Security Officer: Proficiency in security domains, tools and technologies such as DLP, SIEM, SOAR and VulnerabilityManagement Good working knowledge of network security, firewalls, threat management, endpoint detection and response Ability to identify, assess, and mitigate security risks More ❯
to support the organisational objectives The experience and skills you need Proficiency in security domains, tools and technologies such as DLP, SIEM, SOAR and VulnerabilityManagement Good working knowledge of network security, firewalls, threat management, endpoint detection and response Ability to identify, assess, and mitigate security risks More ❯
diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency in … Experience with CI/CD tools and practices, ensuring secure and automated deployment processes. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Responsibilities Security Strategy: Define and execute cloud security strategy, partnering with platform and Site Reliability Engineering (SRE More ❯
diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency in … Experience with CI/CD tools and practices, ensuring secure and automated deployment processes. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Responsibilities Security Strategy: Define and execute cloud security strategy, partnering with platform and Site Reliability Engineering (SRE More ❯
diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency in … Experience with CI/CD tools and practices, ensuring secure and automated deployment processes. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Responsibilities Security Strategy: Define and execute cloud security strategy, partnering with platform and Site Reliability Engineering (SRE More ❯
diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency in … Experience with CI/CD tools and practices, ensuring secure and automated deployment processes. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Responsibilities Security Strategy: Define and execute cloud security strategy, partnering with platform and Site Reliability Engineering (SRE More ❯
You will be responsible for advanced design, support, and management of customer-facing security solutions for CyberCX. 02nd April, 2025 At CyberCX, everyone works together to create cyber security for the world around us. The work we do has a real impact, and you could be part of the … in an agile and resilient manner. Required technical experience: Microsoft Sentinel Microsoft Defender products Splunk Cloud + Splunk Enterprise Security (ES) Crowdstrike Falcon Tenable VulnerabilityManagement Be yourself. We embrace diverse perspectives, experiences, and backgrounds. Please let us know if you require support or adjustments to assist with More ❯