ensure the effective day-to-day delivery of IT services across both shared and in-house environments, with a strong focus on ITIL disciplines - Incident, Problem, Change, and Asset Management - and Cyber Security risk management . The postholder will act as the customer-facing lead for operational IT, ensuring services are reliable, secure, and responsive to user needs. … Key Responsibilities Manage the performance and quality of outsourced, shared service and in-house IT services Own and operate the ITIL processes: Incident , Problem , Change , and Asset Management Act as the operational interface with the other organisation (the shared service provider) Maintain the CMDB and configuration item lifecycle tracking Lead on cyber security risk assessments , patch assurance , vulnerabilitymanagement , and coordination with SOC/XDR providers Ensure compliance with cyber and data protection standards (e.g. Cyber Essentials) Monitor service level agreements (SLAs), escalate issues, and lead service reviews Coordinate change activity to ensure minimal business disruption Deliver customer-focused service improvement initiatives Support audits and business continuity planning Essential Skills and Experience Demonstrable experience managing operational More ❯
Barrow-In-Furness, Cumbria, North West, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions
Vulnerability Manager - Barrow-in-Furness - Up to £50,000 + Hybrid Working Location: Barrow-in-Furness (Hybrid: 3 days onsite per week) Salary: Up to £50,000 Clearance Requirement: UK nationals only, SC eligible Deerfoot IT Recruitment is helping one of our trusted clients source a Vulnerability Manager to join a specialist cybersecurity team working on a high … profile programme. This is a fantastic opportunity for someone with a passion for cybersecurity, hands-on experience with vulnerabilitymanagement tools, and strong communication skills to play a key role in enhancing security assurance across a complex IT estate. The role will involve: Conducting vulnerability analysis and impact assessments, including risk assessments. Using tools such as Nessus … governance, risk, and compliance activities related to security findings. Collaborating with wider teams and contributing to security training and mentoring initiatives. Ideal candidate profile: 2-3 years' experience in vulnerabilitymanagement (3-5 years in wider cybersecurity desirable). Familiarity with vulnerability tools (e.g. Nessus, Tenable, Microsoft Defender, IBM QRadar). Relevant certifications such as CompTIA Security+ More ❯
Newport Pagnell, Buckinghamshire, United Kingdom Hybrid / WFH Options
Mentmore Recruitment
appropriate security controls and process enhancements. Documentation & Reporting Maintain thorough and clear documentation of incidents and actions taken. Summarize complex technical issues for non-technical stakeholders and senior management. VulnerabilityManagement Manage vulnerability detection and remediation using tools such as Tenable, Nessus, and Microsoft Defender. Monitor and address security weaknesses in a timely and structured manner. Stakeholder … incident response framework. Support broader efforts to enhance the group's overall security maturity. Technical Leadership Apply technical knowledge of tools such as Microsoft Defender, Sentinel, Azure 365, and vulnerabilitymanagement platforms. Ensure security operations align with organizational goals and industry best practices. Required Skills & Qualifications Significant hands-on experience with incident response and vulnerability management. Strong More ❯
cause harm. This involves continuous monitoring and analysis of network traffic, system logs, and other data sources to identify unusual patterns or behaviours that may indicate a security threat. VulnerabilityManagement: Identify and address security weaknesses in our systems. Conduct regular vulnerability assessments, apply patches and updates, and implement security controls to mitigate risks. Defence Management … policies and processes to ensure that all technology remains secure and compliant. Ensuring that all security layers align against our Internal Security Standards and Statutory and Regulatory obligations. SIEM Management: Manage, monitor, and respond to security incidents and events using the Council's Security Incident and Event Monitoring (SIEM) platform. Ensure timely detection, analysis, and response to security incidents … experience and skills that include: IT Security Operations Experience: Recent experience as a senior member of a multi-disciplinary team managing operational security (firewall, content filtering, DMZ, Pen Testing, VulnerabilityManagement) and external managed service partners. Security Qualifications: Accredited to a recognised Security qualification (e.g., CISSP, CCP, CCSP). The successful candidate must be willing to work towards More ❯
control traffic flow. - Collaborate with other teams to define and enforce network access policies, ensuring that only authorized personnel and devices have appropriate access rights. Proactive Security Testing and VulnerabilityManagement: - Conduct and organise regular security assessments, including vulnerability scanning and testing, to identify weaknesses in the network infrastructure. - Collaborate with system administrators and application owners to … address identified vulnerabilities and implement necessary patches or configuration changes. - Develop and maintain a comprehensive vulnerabilitymanagement program, including vulnerability tracking, risk assessment, and remediation planning. Stakeholder Collaboration: - Act as a stakeholder for the response team, providing expert guidance on security-related alerts, incidents, and potential improvements. - Collaborate with cross-functional teams, including network engineers, system administrators More ❯
candidate will have a strong technical background, leadership experience, and a proactive approach to managing cyber risks in a dynamic technology environment. What You'll Do: Leadership and Team Management: Lead, mentor, and manage a team of Security Engineers, fostering a culture of collaboration, innovation, and continuous improvement. Define team goals, assign responsibilities, and ensure the successful execution of … security initiatives. Conduct regular performance reviews and provide professional development opportunities for team members. Ability to work across the organisation and communicate at all levels Security Posture Management: Develop and maintain a comprehensive security posture management program to proactively identify and address vulnerabilities. Continuously assess the organization's security posture through vulnerability assessments, penetration testing, and threat … modelling. Collaborate with cross-functional teams to implement security best practices and ensure compliance with industry standards and regulations. Cyber Exposure Risk Management: Identify, analyse, and prioritize cyber exposure risks across the organization's infrastructure, applications, and systems. Develop and implement strategies to mitigate risks, including patch management, configuration management, and secure coding practices. Monitor and respond More ❯
be eligible for DV clearance. Are you ready to lead in one of the most critical roles in the cybersecurity industry? We are seeking a Cyber Threat Intelligence and Vulnerability Lead to play a pivotal role in the operation and improvement of a Security Operations Centre (SOC) dedicated to safeguarding a major UK organisation. This position offers an opportunity … to make a tangible impact in protecting the systems that power the nation. About the Role As the Cyber Threat Intelligence and Vulnerability Lead, you will: Take accountability for detecting, triaging, and reporting potential cyber threats and key vulnerabilities daily. Oversee the delivery and quality of all threat intelligence and vulnerability products, ensuring deadlines are met with excellence. … support threat mitigation. Assess and enhance the maturity of the SOC's existing functions, driving continuous improvement. Lead, mentor, and develop a high-performing team of threat intelligence and vulnerability professionals. Key Responsibilities Selection and analysis of key threat actors posing the greatest risk to the client. Regularly review and document processes, ensuring efficiency and relevance. Deliver top-quality More ❯
therefore must be British-born. Are you ready to lead in one of the most critical roles in the cybersecurity industry? We are seeking a Cyber Threat Intelligence and Vulnerability Lead to play a pivotal role in the operation and improvement of a Security Operations Centre (SOC) dedicated to safeguarding a major UK organisation. This position offers an opportunity … to make a tangible impact in protecting the systems that power the nation. About the Role As the Cyber Threat Intelligence and Vulnerability Lead, you will: Take accountability for detecting, triaging, and reporting potential cyber threats and key vulnerabilities daily. Oversee the delivery and quality of all threat intelligence and vulnerability products, ensuring deadlines are met with excellence. … support threat mitigation. Assess and enhance the maturity of the SOC's existing functions, driving continuous improvement. Lead, mentor, and develop a high-performing team of threat intelligence and vulnerability professionals. Key Responsibilities Selection and analysis of key threat actors posing the greatest risk to the client. Regularly review and document processes, ensuring efficiency and relevance. Deliver top-quality More ❯
Security Operations Securely manage M365 & Azure resources, implementing comprehensive security policies and initiatives. Implement security measures and controls for EUC environments, including endpoint security, access controls, and device management. VulnerabilityManagement Conduct and oversee regular vulnerability assessments on systems, networks, and applications. Identify, analyse, and prioritise vulnerabilities based on risk and potential impact and utilise threat intelligence … analysis to determine the risk posed by identified vulnerabilities. Collaborate with the IT MSP to develop and implement remediation plans, drive remediation efforts and identify improvements in the vulnerabilitymanagement program. Monitor and track the status of identified vulnerabilities and ensure timely resolution. Security Monitoring and Incident Response Leverage Microsoft Defender EDR/XDR and other security tools More ❯
Security Operations Securely manage M365 & Azure resources, implementing comprehensive security policies and initiatives. Implement security measures and controls for EUC environments, including endpoint security, access controls, and device management. VulnerabilityManagement Conduct and oversee regular vulnerability assessments on systems, networks, and applications. Identify, analyse, and prioritise vulnerabilities based on risk and potential impact and utilise threat intelligence … analysis to determine the risk posed by identified vulnerabilities. Collaborate with the IT MSP to develop and implement remediation plans, drive remediation efforts and identify improvements in the vulnerabilitymanagement program. Monitor and track the status of identified vulnerabilities and ensure timely resolution. Security Monitoring and Incident Response Leverage Microsoft Defender EDR/XDR and other security tools More ❯
Buckinghamshire, England, United Kingdom Hybrid / WFH Options
X4 Technology
risk-based KPIs, KRIs, and metrics to measure cyber resilience and overall security performance. Support compliance efforts across frameworks including Cyber Essentials, ISO 27001, GDPR and DPA. Lead the vulnerabilitymanagement programme, advising IT on remediation strategies. Oversee security incident monitoring and response in coordination with the SOC team. Design and implement an effective identity and access management … GDPR, DPA, and Cyber Essentials. Proven experience managing or working closely with Security Operations Centres (SOC), including incident response and threat detection. Demonstrable background in implementing and running vulnerabilitymanagement programmes, with experience using industry-standard tooling. Experience designing, deploying, and managing Identity and Access Management (IAM) systems and processes. Strong understanding of risk management principles More ❯
infrastructure. You'll be hands-on, designing, implementing, and managing top-notch security solutions across all our cloud environments. You'll also play a key part in developing our vulnerabilitymanagement program, working closely with our operational support, infrastructure, and development teams. Plus, you'll be right in the thick of security event monitoring, threat intelligence, and incident … management - keeping us one step ahead! What you'll be doing: Delivering SOC Capabilities: You'll be a key team member in delivering ongoing Security Operations Centre (SOC) capabilities for the business. Driving Automation: You'll push for security automation wherever possible and play a big part in evolving our security tooling and services. Policy & Standards: You'll champion … firewalls, WAF, anti-virus, and O365 compliance & security centre . Familiarity with NIST (CSF Framework 2.0), ISO 27001, PCI-DSS, and GDPR . Experience operating and managing SIEM solutions , vulnerabilitymanagement tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and/or SecOps oriented teams More ❯
Peterborough, Cambridgeshire, England, United Kingdom
INTEC SELECT LIMITED
opportunity has arisen with a global brand for a Security Analyst/SOC Analyst on a 6-month Contract basis. You’ll play a key role in security operations, vulnerabilitymanagement, compliance auditing, and incident response, ensuring robust security for cloud services across UK data centres. Role and Responsibilities Manage vulnerability assessments using Tenable.io, including triage, exception … tracking, and remediation Handle EDR alert triage (CrowdStrike) and escalate incidents as needed Conduct system audits for ISO 27001 compliance and review pen test/vulnerability scan outputs Perform log analysis, assist with threat hunting, and escalate risks or unusual activity Develop incident reports and track system impacts for analysis and improvement Collaborate with clients on infrastructure hardening and … identify security gaps Support incident response, forensic analysis, and document findings for knowledge sharing Maintain internal guides and playbooks for security operations Skills and Experience Strong understanding of vulnerabilitymanagement (Tenable.io) and EDR platforms (CrowdStrike) Experience with ISO 27001 audits, system audits, and compliance validation Knowledge of SIEM platforms (Elastic SIEM) and log analysis Hands-on experience with More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Circle Group
with a cloud background (AWS, Azure or GCP) is required to join our client's UK cybersecurity team. This in house role is predominantly advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. So you should have good knowledge of security tooling and processes, compliance … and security management (endpoint protection, cloud, SIEM etc). There is an opportunity to build out a cyber security team in the future with this role Skills & Experience Required: 3+ years of experience working in Cyber Security within an cloud environment (AWS, Azure of GCP) Any experience with CrowdStrike/Endpoint Protection would be a bonus Good experience with … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
with a cloud background (AWS, Azure or GCP) is required to join our client's UK cybersecurity team. This in house role is predominantly advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. So you should have good knowledge of security tooling and processes, compliance … and security management (endpoint protection, cloud, SIEM etc). There is an opportunity to build out a cyber security team in the future with this role Skills & Experience Required: 3+ years of experience working in Cyber Security within an cloud environment (AWS, Azure of GCP) Any experience with CrowdStrike/Endpoint Protection would be a bonus Good experience with … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
GCP) Hands-on with IaC tools (Terraform, Bicep, CloudFormation) and CI/CD pipelines Proficient in Python or Bash scripting Knowledge of cloud security best practices (e.g. IAM, encryption, vulnerabilitymanagement) Familiar with Docker, Kubernetes, serverless, and event-driven architectures Comfortable working with both SQL and NoSQL databases A passion for engineering excellence and staying on top of … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
M Group Telecom
the nature of the on call, you must hold a valid drivers licence with reasonable means to a vehicle. What will you be doing? Youll have day to day management of the OSS suite of services and underlying infrastructure as part of a 2nd Line team. Youll be proactive and Reactive within Incident Management Youll have user Access … Management & VulnerabilityManagement System Governance to ensure the effective operation of the services Providing Out of Hours Support via an On-Call Rota. What youll bring Youll bring experiencewith supporting OSS applications from a 2nd and 3rd Line level Youll have the experience of working with developers/vendors implementing fixes or improvements to systems Experience of More ❯
cyber security into business operations Work across a range of industries and environments to solve real-world security challenges Key Skills & Experience Cyber Security: Experience in cyber strategy, risk management, security architecture, transformation programmes, and regulatory compliance Knowledge of relevant standards: NIST CSF, ISO27001, NCSC CAF, GDPR, NIS2, etc. Certifications such as CISSP, CISM, CISA, M.Inst.ISP, or MSc in … Cyber Security Hands-on experience in areas like GRC, cyber threat management, vulnerabilitymanagement Strong communication skills – written and verbal – with the ability to present to both technical and business stakeholders Consulting: Proven project delivery using Agile and Waterfall methodologies Team leadership across on-site and remote teams Strong client stakeholder engagement from technical teams to board More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson McCade
cyber security into business operations Work across a range of industries and environments to solve real-world security challenges Key Skills & Experience Cyber Security: Experience in cyber strategy, risk management, security architecture, transformation programmes, and regulatory compliance Knowledge of relevant standards: NIST CSF, ISO27001, NCSC CAF, GDPR, NIS2, etc. Certifications such as CISSP, CISM, CISA, M.Inst.ISP, or MSc in … Cyber Security Hands-on experience in areas like GRC, cyber threat management, vulnerabilitymanagement Strong communication skills – written and verbal – with the ability to present to both technical and business stakeholders Consulting: Proven project delivery using Agile and Waterfall methodologies Team leadership across on-site and remote teams Strong client stakeholder engagement from technical teams to board More ❯
or contribute to cyber engagements across various sectors, adapting to different organisational cultures and regulatory contexts. Core Cyber Security Skills: Strong expertise in areas such as cyber strategy, risk management, cyber maturity assessments, security architecture, transformation programmes, and regulatory compliance. Familiarity with leading frameworks and standards including NIST CSF, ISO27001, NCSC CAF, GDPR, NIS2, and CRI2.0. Hands-on experience … and assessments in varied environments. Relevant certifications such as CISSP, CISM, CISA, M.Inst.ISP, or a postgraduate qualification (e.g. MSc in Cyber Security). Practical knowledge in domains like threat management, vulnerabilitymanagement, cyber GRC, cyber architecture, and cyber assurance. Detail-oriented with strong analytical and problem-solving capabilities. Excellent written and verbal communication skills, including stakeholder reporting More ❯
Information Security strategy. - Ability to build strong relationships and collaboration across all levels of the organisation (including c suite). - At least 3-5 years experience in information security management, ideally operating at Head of level. - Expertise in developing, implementing, and enforcing security policies and standards Proficiency in creating, enforcing, and updating security policies and standards to maintain robust … security practices. - Strong experience in risk management, vulnerabilitymanagement and security operations. - Strong familiarity with regulatory requirements (ISO 27001, GDPR, Cyber Essentials). - Professional certifications such as CISSP or CISM (highly desirable). Head of Information Security In accordance with the Employment Agencies and Employment Businesses Regulations 2003, this position is advertised based upon DGH Recruitment Limited More ❯
by Three and its partners, ensuring that effective governance and technical assurance can be performed. Maintain and improve the use of artefact templates. Ensure that there is effective capacity management and planning in place for the security services and solutions assigned to you and ensure that the solution is incorporated into the 18-month technical and budget roadmap for … capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue management and the budgeting process. Our people make us who we are. We're a diverse and inclusive bunch, and it's important you can feel you belong here. We value everybody for who they are and what they bring to the … exploit these vulnerabilities Experience in one or more of the following technical domains: Cloud/Hybrid security, Infrastructure and data centre security, Network security, Application security, Identity and access management, VulnerabilityManagement Expertise in defining and then governing the delivery of security contractual/business outcomes and know how to influence/negotiate technical outcomes with 3rd More ❯
ll Be Doing Conducting Cyber Security Assessments and audits across Microsoft 365 and Azure environments Performing Cyber Essentials and Cyber Essentials PLUS audits in line with IASME standards Delivering vulnerability assessments, remediation, and penetration testing across infrastructure, networks, and applications Contributing to client reporting, assurance audits, and scoping security solutions Acting as an escalation point for security-related technical … work in a Managed Service Provider (MSP) environment A Strong understanding of Microsoft 365 & Azure Cloud Experience with technical audits and offensive security tools (e.g. Kali Linux) Familiarity with vulnerabilitymanagement tools like Tenable or Qualys OSCP (Offensive Security Certified Professional) status Microsoft SC-200 and AZ-500 certifications Experience with Microsoft Defender suite (XDR, Endpoint, Cloud, Office … Good knowledge of Microsoft Sentinel SIEM Expertise with Azure Firewalls and Email Security Solutions (Mimecast, Egress) Experience with Endpoint Detection & Response (SentinelOne) and Vulnerabilitymanagement tools (e.g. Tenable, Qualys) You will be part of a recognised, established and fast-growing MSP, regularly ranked among the best UK tech companies to work for. You will work alongside a collaborative More ❯
Board, other internal sub-Boards, and relevant stakeholders. Compliance and Assurance : Ensure ongoing compliance with ISO27001 certification requirements, including managing audits, reviews, and continual improvement of the Information Security Management System (ISMS). Stay abreast of and ensure adherence to regulations (e.g., GDPR, NIS2, DORA) and other relevant legal and contractual obligations, as well as application security standards. Risk … Management : Lead the information security risk management process, including identification, assessment, treatment, and monitoring of risks, with a particular emphasis on application security risks. Conduct regular risk assessments and vulnerability analyses of systems, applications, and infrastructure. Security Operations : Oversee the management of security technologies and controls, including but not limited to, firewalls, intrusion detection/prevention … systems, security information and event management (SIEM), data loss prevention (DLP), vulnerabilitymanagement tools, and application security testing tools. Secure Software Development Lifecycle (SSDLC) : Integrate security best practices into the software development lifecycle. Work closely with development teams to ensure secure coding practices, conduct comprehensive security testing (e.g., penetration testing, vulnerability scanning, application security reviews), and More ❯
Peterborough, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
The One Group
/3 days a week) Rate: £465 per day inside IR35 Start Date: ASAP What's the role? This is a technically diverse Security Analyst position covering areas like: Vulnerabilitymanagement (Tenable.io or equivalent) SIEM monitoring (Elastic preferred) and log analysis Incident detection, triage, and escalation (CrowdStrike or similar EDR) Compliance audits (ISO27001, STIGs) Infrastructure hardening and security … playbooks, and security runbooks Who are we looking for? Ideal candidates will bring: At least 2 years' experience in a Security Analyst or SOC-type role Strong understanding of vulnerabilitymanagement, EDR/SIEM alert triage, and incident response Experience with compliance frameworks (ISO 27001, NIST, etc.) A working knowledge of VMware, AD, Windows Server, Linux Comfort handling More ❯