environment Huge opportunity for learning and growth, clear progression plan 2-week industry leading role-specific training About the Client: Our client is a high-growth cybersecurity company, providing vulnerabilitymanagement solutions to over 2,500 customers globally . With cyberattacks increasing every year, they help businesses to effortlessly solve their cybersecurity problems, making it easier to protect … About you: A strong “customer first” attitude, with a friendly and service-oriented approach. Strong communicator, with a desire to build long-term customer relationships. Strong organisational and time-management skills. Flexibility to adapt to changing priorities and deadlines. Strong interpersonal skills and the ability to collaborate effectively. Ability to prioritise and manage workloads effectively to meet KPIs. At More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Nomios
Netskope, Zscaler, CrowdStrike. We would also love to receive applications from people with skills solutioning SIEM, SOAR, or Managed Security Services (experience in DDoS, WAF, IDAM, EDR, MDM or VulnerabilityManagement is a plus). We are also interested to hear from candidates with operational expertise in these areas, who are looking to take their first step into More ❯
within regulated sectors such as Defence, Aerospace, or Industrial Engineering. Strong understanding of enterprise security frameworks, secure system design, and risk management. Experience with cloud security, identity and access management, and secure integration patterns. Familiarity with cybersecurity tools and platforms including SIEM, endpoint protection, IAM, and vulnerability management. Excellent communication and stakeholder engagement skills. UK citizenship and eligibility More ❯
Your Profile: Experience: 2-3 years of experience in cybersecurity or related IT fields. Familiarity with network security, cloud infrastructure, SaaS tools, and identity management. Exposure to risk and vulnerability management. Strong communication skills in English - verbal and written. Analytical mindset and structured problem-solving approach. Comfortable working in a team and eager to grow professionally. Technical Skills: Networking … Systems: Basic knowledge of hardening Windows, Linux, and Unix environments. Security Tools: Familiarity with firewalls, antivirus, and IDS/IPS systems. Scripting: Basic understanding of Python, Bash, or PowerShell. Vulnerability Assessment: Experience using tools like Nmap, Nessus, or OpenVAS. Incident Response: Foundational knowledge in managing and responding to security incidents. Security Frameworks: Awareness of common frameworks such as MITRE More ❯
of writing and reviewing code, with a strong interest in security, you will facilitate and manage security testing workflows in the SDLC with code and runtime security scanners and vulnerability testing tools, whilst enabling cloud security governance (AWS, GCP) with security monitoring, cloud security posture management, and vulnerability management. This role sits in the Security Architecture and More ❯
building out something exciting, with a fantastic long term career path, then this is the role for you! Within this role you will: Lead and evolve the cybersecurity risk management framework, ensuring effective identification, assessment, and remediation of risks. Conduct detailed risk and control assessments across business units, projects, vendors, and IT systems, aligning with standards like ISO … NIST CSF, and CIS Controls. Manage and enhance Third-Party Risk Management, including cybersecurity assessments of external partners and suppliers. Collaborate with stakeholders to develop and track cyber risk treatment plans, implement corrective actions, and report on key risk indicators and control effectiveness. Drive continuous improvement of cybersecurity policies and practices, while fostering strong relationships to embed a risk … and PCI. Strong technical and analytical skills, with the ability to assess risks, identify gaps, and propose mitigation strategies across IT systems and third parties. Excellent communication and stakeholder management, including experience presenting risk insights to senior leadership and working across technical and business teams. Proven experience in cybersecurity disciplines, ideally 5-7 years in roles covering risk managementMore ❯
building out something exciting, with a fantastic long term career path, then this is the role for you! Within this role you will: Lead and evolve the cybersecurity risk management framework, ensuring effective identification, assessment, and remediation of risks. Conduct detailed risk and control assessments across business units, projects, vendors, and IT systems, aligning with standards like ISO … NIST CSF, and CIS Controls. Manage and enhance Third-Party Risk Management, including cybersecurity assessments of external partners and suppliers. Collaborate with stakeholders to develop and track cyber risk treatment plans, implement corrective actions, and report on key risk indicators and control effectiveness. Drive continuous improvement of cybersecurity policies and practices, while fostering strong relationships to embed a risk … and PCI. Strong technical and analytical skills, with the ability to assess risks, identify gaps, and propose mitigation strategies across IT systems and third parties. Excellent communication and stakeholder management, including experience presenting risk insights to senior leadership and working across technical and business teams. Proven experience in cybersecurity disciplines, ideally 5-7 years in roles covering risk managementMore ❯
with Secure by Design. Strategic Alignment. Ensuring that security architectures align with the client's overall business strategy and technology goals. Translate business needs into security requirements. Threat and Vulnerability Management. Identifying, assessing, and communicating current and emerging security threats and vulnerabilities. Security Solution Design and Evaluation. Researching, evaluating, and recommending security technologies, tools (e.g., firewalls, VPNs, IDS/… Procedure Development: Defining, implementing, and maintaining corporate security policies, standards, and procedures to ensure compliance with industry regulations, legal requirements (e.g., GDPR, HIPAA), and best practices. Incident Response and Management: Playing a key role in developing incident response plans and coordinating efforts to detect, analyse, and respond to security incidents and breaches. Stakeholder Communication and Collaboration: Effectively communicating complex More ❯
more about this opportunity, feel free to reach out and apply today! Responsibilities: Monitor and analyse security events within the SOC, ensuring timely detection and response. Perform threat analysis, vulnerability assessments, and implement mitigation strategies. Develop and refine incident response playbooks and procedures. Conduct root cause analysis (RCA) for high-priority incidents to prevent recurrence. Collaborate with internal teams … of two years' experience in a SOC or managed security environment. Strong knowledge of network security (firewalls, IDS/IPS, VPNs). Proficiency in incident response, threat analysis, and vulnerability management. Experience working with SIEM tools for monitoring and event analysis. Understanding of malware analysis, forensic investigations, and endpoint security. Strong analytical and problem-solving skills. Excellent communication skills More ❯
Sunderland, Tyne and Wear, England, United Kingdom
Nigel Wright Group
and maintenance of public cloud infrastructure. Monitoring performance and implementing optimisations to enhance user experience. Ensuring system availability and reliability through proactive monitoring, backups, and disaster recovery planning. Incident management and root cause analysis with preventive measures. Implementation of security best practices and compliance monitoring. Design and execution of disaster recovery and business continuity plans. Automation and orchestration using … new partner firms, including IT due diligence and remediation planning. Provision of quality 3rd line technical support and escalation handling. Accurate issue tracking and resolution documentation. Time and workload management across multiple incidents. Occasional travel and out-of-hours work for deployments and integrations. Execution of live changes via approved change management procedures. Mentoring and guidance to users … and colleagues. Relationship management with third-party service providers. Ownership of incidents and requests, escalating when necessary. Job Requirements: Exceptional customer service skills. Minimum 3 years’ experience in a similar role. Full UK driving licence with business insurance. Strong workload management and prioritisation skills. Logical and thorough fault-finding and troubleshooting abilities. ITIL awareness. Technical Skills Microsoft Windows More ❯
writing and reviewing code, along with a strong interest in security, you will facilitate and manage security testing workflows within the SDLC using code and runtime security scanners and vulnerability testing tools. You will also enable cloud security governance for AWS and GCP through security monitoring, posture management, and vulnerability management. Team and Environment: This role is More ❯
detections to improve efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline operations, including incident response, threat hunting, cyber threat intelligence, and vulnerability management. Collaborate with analysts to identify repetitive tasks and automate them to improve operational efficiency. Work with Threat Intelligence, Incident Response, and Attack Surface Management teams to build More ❯
to improve the efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to build and More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
QinetiQ Limited
and maintain RBAC, Policies, Blueprints (or equivalent governance approaches), tagging strategies, and cost control measures. Security First: Embed secure design principles into everything you build; support identity and access management, key vault integration, and vulnerability management. Collaboration & Enablement: Work with delivery teams to support their use of the platform, coach on best practices, and help define golden paths … with Azure cloud environments in production. Strong experience with: Terraform CI/CD tooling (GitLab, Azure DevOps Pipelines) Azure Networking (VNETs, Private Endpoints, NSGs, Route Tables, etc.) Identity & Access Management (Azure AD, Managed Identities, RBAC) Azure Monitor, Log Analytics, Defender for Cloud Experience building and consuming shared infrastructure as code modules in a GitOps-style setup. Ability to troubleshoot More ❯
junior DevOps engineers while collaborating with cross-functional teams. Responsibilities Architect, implement, and maintain CI/CD pipelines to optimise software build, test, and deployment processes. Lead cloud infrastructure management and automation efforts on Microsoft Azure, ensuring scalability, security, and efficiency. Develop and enforce best practices in infrastructure as code using tools such as Terraform, Ansible, or CloudFormation. Design … and mentorship skills, with experience guiding junior engineers. Excellent communication and collaboration abilities, working effectively across teams. Desirable Strong understanding of DevOps security best practices, including IAM, compliance, and vulnerability management. Experience with Azure AI services, such as Azure Machine Learning or Azure AI Services (Cognitive), to enhance CI/CD automation, optimize DevOps processes, and accelerate developer code … pipeline automation. Experience with observability and monitoring tools such as Datadog, Grafana, or the ELK Stack. In-depth knowledge of networking, security protocols, and firewall configurations. Experience with database management and performance optimisation strategies. Familiarity with software development methodologies, including Agile and Waterfall. Experience in incident response and disaster recovery planning. Certara bases all employment-related decision on merit More ❯
SDLC) practices. Advise and offer guidance on: * Design, implement, and maintaining secure CI/CD pipelines.* Integrate security tools and practices into DevOps workflows (e.g., SAST, DAST, SCA, secrets management).* Collaborate with development, operations, and security teams to implement and ensure secure coding and deployment practices.* Advise on threat modeling, risk assessments, and vulnerability management.* Provide expert More ❯
Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Exposed Solutions
fostering a positive, motivated team environment. The Role Design, build, and maintain our cloud infrastructure, optimising for cost, security, and performance. Lead on system monitoring, security best practices, and vulnerability management. Drive development and optimisation of CI/CD pipelines and containerised environments. Develop and manage Infrastructure as Code (IaC) using Terraform. Provide Level 4 support and act as … Lambda, VPC, IAM, ECS, ECR, and CloudFront. Strong skills in Terraform, Jenkins/Bitbucket CI/CD pipelines, and Docker. Scripting and automation experience (bash, PowerShell, Python) and configuration management tools (Ansible, Puppet, or Chef). Familiarity with monitoring and logging tools such as CloudWatch, Prometheus, and Grafana. Certified AWS Solutions Architect Associate (or equivalent experience). Strong knowledge More ❯