role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems and resolving … security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of … make an impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, VulnerabilityManagement, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
initiatives What you'll be doing You'll join a collaborative Cyber Security Operations team and get involved with: Handling Tier II-IV incidents and troubleshooting Change and configuration management Policy optimisation and risk reduction Patch, OS and capacity management Event monitoring and vulnerabilitymanagement Security incident response and project support What we're looking for More ❯
initiatives What you'll be doing You'll join a collaborative Cyber Security Operations team and get involved with: Handling Tier II-IV incidents and troubleshooting Change and configuration management Policy optimisation and risk reduction Patch, OS and capacity management Event monitoring and vulnerabilitymanagement Security incident response and project support What we're looking for More ❯
security controls. Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerabilitymanagement etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security controls, identify risks and propose treatment plans. Conduct regular vulnerability … Role: Essential: 3-5 years of experience in Information Security. Strong understanding of security principles, technologies, and best practices. Experience in networking, infrastructure (on-prem and in the cloud), vulnerability and incident management. Familiarity with application/device security monitoring (e.g. Firewalls, IDS/IPS, XDR etc.). Experience with SIEM/CNAPP/Log collection platforms (e.g. CrowdStrike … Lacework etc.) and capability to design, implement and manage such solutions. Experience with implementation of identity and access management (IAM) solutions. Ability to work in a team to deliver project outcomes within timeframes and objectives. Self-directed work experience, including planning and organising tasks. AWS experience and/or AWS security/administration certifications (e.g. AWS Certified Security etc. More ❯
ll support the delivery of their Cyber Security Sub Strategy in line with the Cyber Assessment Framework, and contribute to the design and operation of threat intelligence, incident response, vulnerabilitymanagement, and ethical hacking capabilities. You'll work closely with internal stakeholders and external partners to ensure compliance with ISO27001, Cyber Essentials+, and other regulatory frameworks. This role … Microsoft security tools (Defender, Sentinel, Intune, Autopilot). Strong understanding of cyber security frameworks including ISO27001, Cyber Essentials+, and the Cyber Assessment Framework. Proven experience in identity and access management, end-user device management, and working with external SOCs. Ability to deliver against cyber security roadmaps, respond to incidents, and remediate vulnerabilities. Experience in building Power BI dashboards More ❯
You'll be instrumental in designing and implementing advanced detection and response strategies, working closely with cross-functional teams and contributing to continual service improvement. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain IBM QRadar SIEM platform Onboard and normalize diverse log sources across hybrid environments Develop and tune analytical rules for threat detection and behavioural analysis Playbook … automation and enrichment Deep knowledge of threat detection, incident response, and cyber kill chain Familiarity with MITRE ATT&CK, NIST, and CIS frameworks Understanding of network traffic flows and vulnerabilitymanagement Exposure to ethical hacking and penetration testing Knowledge of ITIL disciplines (Incident, Problem, Change Management) Experience with ServiceNow Security Suite Cloud experience (AWS and/or More ❯
world. We work with the companies that are Britain's economic engine - ambitious, entrepreneurially-spirited and high growth businesses that fuel the economy - and directly advise the owners and management teams that lead them. We'll broaden your horizons To ensure our services and applications are fit for the modern market, our IT team collaborates with every department. They … Lead Software Security Engineer to join our team. You will have a strong background in software development, security, and operations. This role is required to support the Digital Product Management team in embedding security requirements and best practices into new Digital Products and Services. You will work closely with the Digital Product Management and IT Security teams to … such as Powershell, YAML, JASON, etc. Collaborate with development teams to integrate security best practices into the secure software development lifecycle (SDLC) and ensure products are built securely Oversee vulnerabilitymanagement and remediation efforts, including leading responses to pen test findings and security assessments Experience conducting risk assessments and threat modelling for software development and advise where necessary More ❯
Chesterfield, Derbyshire, East Midlands, United Kingdom Hybrid / WFH Options
Hays
in developing and implementing information security strategies, policies, and procedures to safeguard the organisation's digital assets and mitigating potential risks. You will oversee information security, compliance, and risk management practices based on industry-accepted information security and risk management frameworks, whilst establishing and maintaining an incident response plan, including incident detection, response, investigation, and resolution, to minimise … incidents. What you'll need to succeed Demonstrable experience of implementing and maintaining information security frameworks e.g. ISO27001 within a medium/large sized public sector organisation Solid stakeholder management and mentoring skills Information Security,Cyber Security, Assurance and vulnerabilitymanagement would be ideal Comprehensive knowledge of Information Security Management Systems with the ability to scope … design, and implement such systems Strong ICT infrastructure, application, and cloud technical skills would be advantageous Evidenced knowledge and understanding of ISO270001, ITIL, and Prince 2 management practices Ability to lead the workforce, increasing their skills and knowledge in relation to information security What you'll get in return This exciting position is paying between £50,000 and More ❯
Epsom, Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
Support, first line (some 2nd line) Ensure all incidents and service requests are successfully logged and accurately identified, categorised, prioritised, diagnosed and managed in the Service Desk IT service management tool Keep detailed, accurate and consistent records for the teams' calls to ensure they are updated regularly, and that the customer is kept informed. Work with third parties and … colleagues to investigate, accurately diagnose, analyse & resolve issues and service interruptions Customer Care/Collaboration/Communication Knowledge Management/Asset Management/Reporting & Regulatory Create and maintain all documentation (Customer facing and internal technical documentation) ensuring it is completed to a professional quality, checked for accuracy of grammar and spelling and reviewed prior to distribution. Ensure that … all IT equipment the Service Desk manage is asset tagged and maintained accurately and consistently. VulnerabilityManagement Complete daily reports (when assigned) to ensure all active attacks and vulnerabilities are resolved and removed from the vulnerability report. Liaise with 3rd level teams where appropriate. This applies to client and mobile devices. Microsoft Power Apps: Work with other More ❯
Load Balancers, VPN, WAF etc., align with the organization's strategies, policies, and standards. Design and manage firewall policies, network access controls, AAA mechanisms, MFA, IAM solutions, RBAC, Privilege Management etc., In-depth understanding of cloud network security, different network architectures (e.g., LAN, WAN, DMZ) and topologies, network protocols, routing, switching, and subnetting. Ensure network security measures are aligned … frameworks like NIST Cybersecurity Framework, ISO 27001, and CIS Critical Security Controls. Familiarity with the use of standard security technology solutions and processes such as user provisioning, directory, SIEM, vulnerabilitymanagement, Cloud Security (OCI/Azure/AWS), Web Security, Email Security, Logging and Monitoring, General PKI and Cryptography. Evaluate and recommend security technologies, tools, and methodologies to More ❯
security controls in lab-based environments used for R&D operations. Network Security - Implement and manage network segmentation, access controls (user/vendor), and secure wireless communication. Firewall Policy Management - Own and deliver Firewall policy; engage with Firewall change processes and tools (eg . Zscaler, Dynamic Edge Segmentation (DES). Incident Management - Serve as the lead contact for … OT-related incidents, ensuring rapid technical resolution. Device Management - Work closely with R&D and global teams to secure OT assets to internal standards. VulnerabilityManagement - Identify, assess, and prioritise vulnerabilities based on business risk. Patch Management - Coordinate with R&D lines and vendors to validate and deploy security updates for OT environments. Security Controls Deployment More ❯
technical risks into business impact. Part of this role, you will be required to obtain GCP certification. What You'll Do: Design and implement secure architectures, incorporating identity, access management, encryption, and network security. Conduct cloud security assessments and gap analyses for UK-based organisations. Advise on compliance with UK regulations (e.g. GDPR, NCSC Cloud Security Principles, ISO … . Develop and enforce cloud security policies, procedures, and governance models. Lead threat modelling, risk assessments, and vulnerabilitymanagement initiatives. Configure and manage security tools such as Google SecOps tooling, Security Command Center, Cloud Armour, and VPC Service Controls. Collaborate with engineering and DevOps teams to embed security into CI/CD pipelines. Support incident response planning and More ❯
and respond to security alerts and threats. Application Security Collaborate with the Application Security Engineer to ensure the security of software applications through secure coding practices, regular assessments, and vulnerability management. Conduct periodic security assessments of existing applications and systems. Security Awareness and Training Promote a culture of security awareness among all employees through training programs and communication initiatives. … or application security expertise is favoured. Experience designing, building and implementing security controls. Programming skills are required. Experience in application security-inclusive of secure coding practices-and threat and vulnerabilitymanagement are desirable. Strong communication and interpersonal skills. Ability to influence and drive security initiatives at both the tactical and strategic levels. Familiarity with relevant laws, regulations, and More ❯
be advantageous to your application, as would CISSP and/or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerabilitymanagement, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform More ❯
governance Collaborate with cybersecurity teams to ensure alignment with broader security strategy Facilitate post-test reviews and lessons learned sessions Required Skills & Experience Proven experience in a PMO, project management, or program coordination role Familiarity with cybersecurity principles, especially around PEN Testing and vulnerabilitymanagement Strong communication skills with the ability to translate technical content for non … technical audiences Excellent organisational and stakeholder management abilities Experience working in regulated environments or with compliance frameworks (e.g. ISO 27001, NIST, etc.) is a plus Proficiency in project management tools (e.g. Jira, Confluence, MS Project, or similar) Additional Skills - Certifications like PMP, Prince2, or CISM/CISSP - Experience working with external PEN Testing vendors or consultancies - Ability to More ❯
governance Collaborate with cybersecurity teams to ensure alignment with broader security strategy Facilitate post-test reviews and lessons learned sessions Required Skills & Experience Proven experience in a PMO, project management, or program coordination role Familiarity with cybersecurity principles, especially around PEN Testing and vulnerabilitymanagement Strong communication skills with the ability to translate technical content for non … technical audiences Excellent organisational and stakeholder management abilities Experience working in regulated environments or with compliance frameworks (e.g. ISO 27001, NIST, etc.) is a plus Proficiency in project management tools (e.g. Jira, Confluence, MS Project, or similar) Additional Skills - Certifications like PMP, Prince2, or CISM/CISSP - Experience working with external PEN Testing vendors or consultancies - Ability to More ❯
roadmap that you will shape. What you'll be doing Application Security (AppSec) : Driving secure development practices, code analysis, and threat modelling. Security Operations (SOC) : Overseeing monitoring, incident response, vulnerabilitymanagement, and operational resilience. Governance, Risk & Compliance (GRC) : Leading our efforts to achieve and maintain compliance with PCI, GDPR, SOC2, and ISO27001. Vendor Security : Spearheading due diligence and … our Vendor Governance Forum. Policies & Assurance : Defining and enforcing security standards, collaborating with IT Ops and Platform Engineering on execution, and providing assurance to stakeholders, customers, and regulators. Risk Management : Escalating material risks directly to the CTO and other risk functions. Culture & Training : Promoting a secure-by-design culture through training, awareness, and best practices across the company. What … we're looking for We're seeking an experienced security leader who is comfortable with: Building a team : You have prior management experience and a proven track record of growing a collaborative and cross-functional Security team. Scaling AppSec : You've owned and scaled a robust Application Security program, including secure development, code analysis, and threat modelling. Running Security More ❯
driving the success of our people and the organisation. Our managers give clear communication, lead by example and feed back to foster growth and development of their team members. Management excellence is essential to the company's success, and effective leadership requires a combination of interpersonal skills, strategic thinking, and a commitment to providing a positive and productive work … VMware, Hyper-V, and Azure-hosted environments. Own and enhance Active Directory, Entra ID (Azure AD), Group Policy, Conditional Access, and role-based access control (RBAC). Lead patching, vulnerabilitymanagement, and disaster recovery initiatives across global environments. Drive infrastructure automation with PowerShell, Intune, and Azure Automation. Administer and optimise Microsoft 365, including Exchange Online, SharePoint Online, Teams … OneDrive for Business, and Viva. Implement and manage Intune Autopilot for secure device provisioning, lifecycle management, and compliance enforcement across Windows and macOS endpoints. Enhance collaboration through Teams governance, voice integration, security policies, and adoption programmes. Act as the technical authority for SharePoint Online architecture, migration projects, site governance, and workflow automation (Power Platform). Ensure data loss prevention More ❯
are seeking a highly motivated Cyber-Security Engineer to safeguard our critical data and infrastructure from cyber threats by implementing and maintaining robust security solutions. Key Responsibilities Security Assessments & VulnerabilityManagement: Identifying weaknesses in systems and networks through vulnerability assessments and penetration testing. Implementing Security Solutions: Putting in place firewalls, intrusion detection systems (IDS), and other tools … to actively block and monitor for threats. Patch Management: Ensuring all systems are up-to-date with the latest security patches to fix known vulnerabilities. Security Monitoring & Incident Response: Keeping watch for suspicious activity and responding to security incidents effectively, including analysing logs, investigating alerts, and containing breaches. Disaster Recovery & Business Continuity: Helping develop plans to restore systems and More ❯
emerging attack techniques. Manage and optimise SIEM tools (Splunk, QRadar, Microsoft Sentinel). Develop SOC use cases, runbooks, and playbooks to improve response capability. Collaborate with IT, legal, and management teams during incident response. Support pre-sales, client demonstrations, and solution scoping for new opportunities. Contribute to continual service improvement and security tool enhancements Skills & Experience Strong background in … incident response, SOC operations, and security investigations. Hands-on expertise with SIEM tools (Splunk, QRadar, Microsoft Sentinel). Deep understanding of network traffic analysis, vulnerabilitymanagement, and penetration testing. Knowledge of DFIR principles, malware reverse engineering, and digital forensics. Familiarity with ITIL processes (Incident, Problem, Change). Experience with cloud platforms (AWS and/or Azure). More ❯
Chichester, West Sussex, South East, United Kingdom Hybrid / WFH Options
Spectrum It Recruitment Limited
exclusively with a global leader in the software industry to recruit a Head of Cyber & IT. This is a senior leadership role with strategic responsibility across Cloud Operations, IT Management, and Cybersecurity in a fast-paced SaaS environment. The company has a strong portfolio of products that are essential to industries such as energy, offshore, and large-scale infrastructure. … with business goals, and managing vendor relationships and audit requirements. Key Areas of Responsibility Cybersecurity Ensure compliance with ISO 27001, SOC 2, GDPR, and other frameworks. Lead incident response, vulnerabilitymanagement, and threat detection. Oversee disaster recovery and business continuity planning. Champion a DevSecOps culture across the organisation. IT Management Lead IT support, enterprise systems, and SaaS More ❯
Bosham, Sussex, United Kingdom Hybrid / WFH Options
Spectrum IT Recruitment
exclusively with a global leader in the software industry to recruit a Head of Cyber & IT. This is a senior leadership role with strategic responsibility across Cloud Operations, IT Management, and Cybersecurity in a fast-paced SaaS environment. The company has a strong portfolio of products that are essential to industries such as energy, offshore, and large-scale infrastructure. … with business goals, and managing vendor relationships and audit requirements. Key Areas of Responsibility Cybersecurity Ensure compliance with ISO 27001, SOC 2, GDPR, and other frameworks. Lead incident response, vulnerabilitymanagement, and threat detection. Oversee disaster recovery and business continuity planning. Champion a DevSecOps culture across the organisation. IT Management Lead IT support, enterprise systems, and SaaS More ❯
will play a key role in strengthening the organization's security posture. This role covers a broad range of responsibilities, including enhancing security controls, conducting security assessments, overseeing patch management, and supporting the implementation of information security solutions and related projects. What you'll do: Oversee the implementation, audit, and assurance of information security policies, standards, guidelines, and procedures … measures across the organization. Provide support in handling and resolving security incidents, minimizing impact and ensuring timely remediation. What you'll bring: 8 years of experience in information security management Certified with CISSP or related qualifications are strongly preferred In-depth understanding of ISO 27001 standards and practical experience with their implementation. Strong knowledge of risk management frameworks … and methodologies. Hands-on experience with security technologies such as EDR, SIEM, IAM, VulnerabilityManagement Systems, Anti-Virus, APT, DLP, Threat Protection, Web Proxy, and Access Control solutions. Prior experience in the broadcast media or digital industries is highly desirable. Have the right to work in the UK (Mandatory) Robert Walters Operations Limited is an employment business and More ❯