Horsforth, Leeds, West Yorkshire, England, United Kingdom
TPP (The Phoenix Partnership)
The role involves: • Managing, maintaining and upgrading enterprise server and storage hardware • Providing internal support for office hardware including, PCs, laptops, mobile devices (Windows OS, iOS, MacOS and Android) • Vulnerabilitymanagement using scanning tools such as Nessus • Remediation/automation of software rollout using Ninite/PDQ • Configuring and monitoring of Anti-virus software & Mobile Device Management • Firewall/Switch management - Configuration, patching and upgrading • Administering Microsoft Active Directory, Exchange Server & Office 365 • Achieving recognised Cyber Security accreditation • Management of video conferencing • Management of enterprise level phone system • Monitoring and managing the availability and scalability of resources, including CPU usage, disk usage and storage systems including network troubleshooting • Continuously improving and keeping up More ❯
Leominster, Herefordshire, West Midlands, United Kingdom Hybrid / WFH Options
Kingspan
available, you will be able to commute to your nearest site ideally twice a week. As the Website Platform Manager you will be responsible for the end-to-end management, performance, and evolution of our global website platform, which combines a headless CMS with an integrated Logik-powered product hub. You will ensure the platform delivers a seamless, high … and meets enterprise performance, security, and scalability standards. Responsibilities of our Website Platform Manager Platform Ownership Serve as the primary owner for the global website platform, overseeing its content management system, product hub integration, and related services. Maintain the platform roadmap, balancing global business priorities, regional needs, and technical improvements. Business continuity planning. Technical Oversight Liaise with development partners … content publishing, quality standards, and approval workflows. Provide CMS training and support for global and regional content teams. Data privacy (GDPR/CCPA) and cookie & consent management. Domain & DNS Management (e.g SSL certification) Cyber security operations including vulnerabilitymanagement and penetration testing. Regulatory compliance in local markets. Code quality & security including release management and change controls. More ❯
role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems and resolving … security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of … make an impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, VulnerabilityManagement, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
initiatives What you'll be doing You'll join a collaborative Cyber Security Operations team and get involved with: Handling Tier II-IV incidents and troubleshooting Change and configuration management Policy optimisation and risk reduction Patch, OS and capacity management Event monitoring and vulnerabilitymanagement Security incident response and project support What we're looking for More ❯
initiatives What you'll be doing You'll join a collaborative Cyber Security Operations team and get involved with: Handling Tier II-IV incidents and troubleshooting Change and configuration management Policy optimisation and risk reduction Patch, OS and capacity management Event monitoring and vulnerabilitymanagement Security incident response and project support What we're looking for More ❯
with clients. You’ll play a key part in helping the business and its clients stay secure by managing vulnerabilities and supporting compliance activities. Key Responsibilities Perform and manage vulnerability assessments across internal and client systems. Support remediation activities and ensure systems remain secure and compliant. Collaborate with internal IT and client teams to ensure systems are patched and … ISO 27001, GDPR, HIPAA . Stay current with evolving cyber threats, tools, and industry best practices. Provide helpdesk support to staff and clients when required. Skills & Experience Experience in vulnerabilitymanagement and remediation across Windows/Linux systems. Hands-on with vulnerability scanning tools and ideally some penetration testing exposure. Strong knowledge of cybersecurity principles and best More ❯
with clients. You’ll play a key part in helping the business and its clients stay secure by managing vulnerabilities and supporting compliance activities. Key Responsibilities Perform and manage vulnerability assessments across internal and client systems. Support remediation activities and ensure systems remain secure and compliant. Collaborate with internal IT and client teams to ensure systems are patched and … ISO 27001, GDPR, HIPAA . Stay current with evolving cyber threats, tools, and industry best practices. Provide helpdesk support to staff and clients when required. Skills & Experience Experience in vulnerabilitymanagement and remediation across Windows/Linux systems. Hands-on with vulnerability scanning tools and ideally some penetration testing exposure. Strong knowledge of cybersecurity principles and best More ❯
watford, hertfordshire, east anglia, united kingdom
Maxwell Bond
with clients. You’ll play a key part in helping the business and its clients stay secure by managing vulnerabilities and supporting compliance activities. Key Responsibilities Perform and manage vulnerability assessments across internal and client systems. Support remediation activities and ensure systems remain secure and compliant. Collaborate with internal IT and client teams to ensure systems are patched and … ISO 27001, GDPR, HIPAA . Stay current with evolving cyber threats, tools, and industry best practices. Provide helpdesk support to staff and clients when required. Skills & Experience Experience in vulnerabilitymanagement and remediation across Windows/Linux systems. Hands-on with vulnerability scanning tools and ideally some penetration testing exposure. Strong knowledge of cybersecurity principles and best More ❯
ll support the delivery of their Cyber Security Sub Strategy in line with the Cyber Assessment Framework, and contribute to the design and operation of threat intelligence, incident response, vulnerabilitymanagement, and ethical hacking capabilities. You'll work closely with internal stakeholders and external partners to ensure compliance with ISO27001, Cyber Essentials+, and other regulatory frameworks. This role … Microsoft security tools (Defender, Sentinel, Intune, Autopilot). Strong understanding of cyber security frameworks including ISO27001, Cyber Essentials+, and the Cyber Assessment Framework. Proven experience in identity and access management, end-user device management, and working with external SOCs. Ability to deliver against cyber security roadmaps, respond to incidents, and remediate vulnerabilities. Experience in building Power BI dashboards More ❯
You'll be instrumental in designing and implementing advanced detection and response strategies, working closely with cross-functional teams and contributing to continual service improvement. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain IBM QRadar SIEM platform Onboard and normalize diverse log sources across hybrid environments Develop and tune analytical rules for threat detection and behavioural analysis Playbook … automation and enrichment Deep knowledge of threat detection, incident response, and cyber kill chain Familiarity with MITRE ATT&CK, NIST, and CIS frameworks Understanding of network traffic flows and vulnerabilitymanagement Exposure to ethical hacking and penetration testing Knowledge of ITIL disciplines (Incident, Problem, Change Management) Experience with ServiceNow Security Suite Cloud experience (AWS and/or More ❯
Cyber Security Analyst (VP) - Investment Management - London Our client, a leading investment management firm, is seeking a Cyber Security Analyst (VP level) to join their London office. This role sits within the compliance function and plays a critical part in supporting external audits, particularly SOC 1 Type II and SOC 2. It combines hands-on security monitoring and … closely with IT, compliance, and external auditors to provide control evidence, enhance processes, and strengthen the firm's overall security posture. Responsibilities include monitoring and investigating security alerts, supporting vulnerabilitymanagement and patching, and maintaining a forward-looking 6-12 month roadmap to align emerging requirements with timely policy updates. Key Skills & Experience: Strong understanding of core cybersecurity … principles including network security, identity management, and threat detection Hands-on experience with security and IT monitoring tools such as SIEM, Network Configuration Manager, Zabbix, HALO, DarkTrace, and Fortinet firewalls Familiarity with IT access controls and their application in regulated environments Proven experience supporting or participating in SOC 1 Type II and SOC 2 audits Excellent documentation and evidence More ❯
Cyber Security Analyst (VP) - Investment Management - London Our client, a leading investment management firm, is seeking a Cyber Security Analyst (VP level) to join their London office. This role sits within the compliance function and plays a critical part in supporting external audits, particularly SOC 1 Type II and SOC 2. It combines hands-on security monitoring and … closely with IT, compliance, and external auditors to provide control evidence, enhance processes, and strengthen the firm's overall security posture. Responsibilities include monitoring and investigating security alerts, supporting vulnerabilitymanagement and patching, and maintaining a forward-looking 6-12 month roadmap to align emerging requirements with timely policy updates. Key Skills & Experience: Strong understanding of core cybersecurity … principles including network security, identity management, and threat detection Hands-on experience with security and IT monitoring tools such as SIEM, Network Configuration Manager, Zabbix, HALO, DarkTrace, and Fortinet firewalls Familiarity with IT access controls and their application in regulated environments Proven experience supporting or participating in SOC 1 Type II and SOC 2 audits Excellent documentation and evidence More ❯
london (city of london), south east england, united kingdom
Selby Jennings
Cyber Security Analyst (VP) - Investment Management - London Our client, a leading investment management firm, is seeking a Cyber Security Analyst (VP level) to join their London office. This role sits within the compliance function and plays a critical part in supporting external audits, particularly SOC 1 Type II and SOC 2. It combines hands-on security monitoring and … closely with IT, compliance, and external auditors to provide control evidence, enhance processes, and strengthen the firm's overall security posture. Responsibilities include monitoring and investigating security alerts, supporting vulnerabilitymanagement and patching, and maintaining a forward-looking 6-12 month roadmap to align emerging requirements with timely policy updates. Key Skills & Experience: Strong understanding of core cybersecurity … principles including network security, identity management, and threat detection Hands-on experience with security and IT monitoring tools such as SIEM, Network Configuration Manager, Zabbix, HALO, DarkTrace, and Fortinet firewalls Familiarity with IT access controls and their application in regulated environments Proven experience supporting or participating in SOC 1 Type II and SOC 2 audits Excellent documentation and evidence More ❯
Chesterfield, Derbyshire, East Midlands, United Kingdom Hybrid / WFH Options
Hays
in developing and implementing information security strategies, policies, and procedures to safeguard the organisation's digital assets and mitigating potential risks. You will oversee information security, compliance, and risk management practices based on industry-accepted information security and risk management frameworks, whilst establishing and maintaining an incident response plan, including incident detection, response, investigation, and resolution, to minimise … incidents. What you'll need to succeed Demonstrable experience of implementing and maintaining information security frameworks e.g. ISO27001 within a medium/large sized public sector organisation Solid stakeholder management and mentoring skills Information Security,Cyber Security, Assurance and vulnerabilitymanagement would be ideal Comprehensive knowledge of Information Security Management Systems with the ability to scope … design, and implement such systems Strong ICT infrastructure, application, and cloud technical skills would be advantageous Evidenced knowledge and understanding of ISO270001, ITIL, and Prince 2 management practices Ability to lead the workforce, increasing their skills and knowledge in relation to information security What you'll get in return This exciting position is paying between £50,000 and More ❯
Epsom, Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
Support, first line (some 2nd line) Ensure all incidents and service requests are successfully logged and accurately identified, categorised, prioritised, diagnosed and managed in the Service Desk IT service management tool Keep detailed, accurate and consistent records for the teams' calls to ensure they are updated regularly, and that the customer is kept informed. Work with third parties and … colleagues to investigate, accurately diagnose, analyse & resolve issues and service interruptions Customer Care/Collaboration/Communication Knowledge Management/Asset Management/Reporting & Regulatory Create and maintain all documentation (Customer facing and internal technical documentation) ensuring it is completed to a professional quality, checked for accuracy of grammar and spelling and reviewed prior to distribution. Ensure that … all IT equipment the Service Desk manage is asset tagged and maintained accurately and consistently. VulnerabilityManagement Complete daily reports (when assigned) to ensure all active attacks and vulnerabilities are resolved and removed from the vulnerability report. Liaise with 3rd level teams where appropriate. This applies to client and mobile devices. Microsoft Power Apps: Work with other More ❯
Load Balancers, VPN, WAF etc., align with the organization's strategies, policies, and standards. Design and manage firewall policies, network access controls, AAA mechanisms, MFA, IAM solutions, RBAC, Privilege Management etc., In-depth understanding of cloud network security, different network architectures (e.g., LAN, WAN, DMZ) and topologies, network protocols, routing, switching, and subnetting. Ensure network security measures are aligned … frameworks like NIST Cybersecurity Framework, ISO 27001, and CIS Critical Security Controls. Familiarity with the use of standard security technology solutions and processes such as user provisioning, directory, SIEM, vulnerabilitymanagement, Cloud Security (OCI/Azure/AWS), Web Security, Email Security, Logging and Monitoring, General PKI and Cryptography. Evaluate and recommend security technologies, tools, and methodologies to More ❯
security controls in lab-based environments used for R&D operations. Network Security - Implement and manage network segmentation, access controls (user/vendor), and secure wireless communication. Firewall Policy Management - Own and deliver Firewall policy; engage with Firewall change processes and tools (eg . Zscaler, Dynamic Edge Segmentation (DES). Incident Management - Serve as the lead contact for … OT-related incidents, ensuring rapid technical resolution. Device Management - Work closely with R&D and global teams to secure OT assets to internal standards. VulnerabilityManagement - Identify, assess, and prioritise vulnerabilities based on business risk. Patch Management - Coordinate with R&D lines and vendors to validate and deploy security updates for OT environments. Security Controls Deployment More ❯
technical risks into business impact. Part of this role, you will be required to obtain GCP certification. What You'll Do: Design and implement secure architectures, incorporating identity, access management, encryption, and network security. Conduct cloud security assessments and gap analyses for UK-based organisations. Advise on compliance with UK regulations (e.g. GDPR, NCSC Cloud Security Principles, ISO … . Develop and enforce cloud security policies, procedures, and governance models. Lead threat modelling, risk assessments, and vulnerabilitymanagement initiatives. Configure and manage security tools such as Google SecOps tooling, Security Command Center, Cloud Armour, and VPC Service Controls. Collaborate with engineering and DevOps teams to embed security into CI/CD pipelines. Support incident response planning and More ❯
and respond to security alerts and threats. Application Security Collaborate with the Application Security Engineer to ensure the security of software applications through secure coding practices, regular assessments, and vulnerability management. Conduct periodic security assessments of existing applications and systems. Security Awareness and Training Promote a culture of security awareness among all employees through training programs and communication initiatives. … or application security expertise is favoured. Experience designing, building and implementing security controls. Programming skills are required. Experience in application security-inclusive of secure coding practices-and threat and vulnerabilitymanagement are desirable. Strong communication and interpersonal skills. Ability to influence and drive security initiatives at both the tactical and strategic levels. Familiarity with relevant laws, regulations, and More ❯
be advantageous to your application, as would CISSP and/or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerabilitymanagement, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform More ❯
governance Collaborate with cybersecurity teams to ensure alignment with broader security strategy Facilitate post-test reviews and lessons learned sessions Required Skills & Experience Proven experience in a PMO, project management, or program coordination role Familiarity with cybersecurity principles, especially around PEN Testing and vulnerabilitymanagement Strong communication skills with the ability to translate technical content for non … technical audiences Excellent organisational and stakeholder management abilities Experience working in regulated environments or with compliance frameworks (e.g. ISO 27001, NIST, etc.) is a plus Proficiency in project management tools (e.g. Jira, Confluence, MS Project, or similar) Additional Skills - Certifications like PMP, Prince2, or CISM/CISSP - Experience working with external PEN Testing vendors or consultancies - Ability to More ❯
governance Collaborate with cybersecurity teams to ensure alignment with broader security strategy Facilitate post-test reviews and lessons learned sessions Required Skills & Experience Proven experience in a PMO, project management, or program coordination role Familiarity with cybersecurity principles, especially around PEN Testing and vulnerabilitymanagement Strong communication skills with the ability to translate technical content for non … technical audiences Excellent organisational and stakeholder management abilities Experience working in regulated environments or with compliance frameworks (e.g. ISO 27001, NIST, etc.) is a plus Proficiency in project management tools (e.g. Jira, Confluence, MS Project, or similar) Additional Skills - Certifications like PMP, Prince2, or CISM/CISSP - Experience working with external PEN Testing vendors or consultancies - Ability to More ❯
roadmap that you will shape. What you'll be doing Application Security (AppSec) : Driving secure development practices, code analysis, and threat modelling. Security Operations (SOC) : Overseeing monitoring, incident response, vulnerabilitymanagement, and operational resilience. Governance, Risk & Compliance (GRC) : Leading our efforts to achieve and maintain compliance with PCI, GDPR, SOC2, and ISO27001. Vendor Security : Spearheading due diligence and … our Vendor Governance Forum. Policies & Assurance : Defining and enforcing security standards, collaborating with IT Ops and Platform Engineering on execution, and providing assurance to stakeholders, customers, and regulators. Risk Management : Escalating material risks directly to the CTO and other risk functions. Culture & Training : Promoting a secure-by-design culture through training, awareness, and best practices across the company. What … we're looking for We're seeking an experienced security leader who is comfortable with: Building a team : You have prior management experience and a proven track record of growing a collaborative and cross-functional Security team. Scaling AppSec : You've owned and scaled a robust Application Security program, including secure development, code analysis, and threat modelling. Running Security More ❯
Security Officer , you will set the strategic vision for cybersecurity and ensure our infrastructure and products comply with industry-leading security standards. Your role includes developing security policies, incident management strategies, hardening and protecting existing architecture and operations and ensuring adherence to global regulatory frameworks, particularly those related to blockchain technologies and financial services. You will partner closely with … Responsibilities: Define and implement Wallet’s cybersecurity strategy, aligning with business objectives. Develop, manage and evolve robust security frameworks and policies. Oversee cybersecurity audits, penetration testing, risk assessments and vulnerability management. Lead the response to cybersecurity incidents, ensuring alignment with regulatory requirements. Manage and develop a strong security team, supporting professional growth and security awareness. Communicate regularly with executive … communities and stakeholders. Requirements: 5+ years of experience in cybersecurity leadership roles, preferably in fintech, blockchain, or high- growth tech environments. Expertise in cybersecurity frameworks, regulatory requirements and incident management practices. Proven leadership in incident response, vulnerabilitymanagement, and security architecture design. Strong technical understanding of blockchain technologies, cryptography, cloud environments and distributed systems. Excellent communication and More ❯
Security Officer , you will set the strategic vision for cybersecurity and ensure our infrastructure and products comply with industry-leading security standards. Your role includes developing security policies, incident management strategies, hardening and protecting existing architecture and operations and ensuring adherence to global regulatory frameworks, particularly those related to blockchain technologies and financial services. You will partner closely with … Responsibilities: Define and implement Wallet’s cybersecurity strategy, aligning with business objectives. Develop, manage and evolve robust security frameworks and policies. Oversee cybersecurity audits, penetration testing, risk assessments and vulnerability management. Lead the response to cybersecurity incidents, ensuring alignment with regulatory requirements. Manage and develop a strong security team, supporting professional growth and security awareness. Communicate regularly with executive … communities and stakeholders. Requirements: 5+ years of experience in cybersecurity leadership roles, preferably in fintech, blockchain, or high- growth tech environments. Expertise in cybersecurity frameworks, regulatory requirements and incident management practices. Proven leadership in incident response, vulnerabilitymanagement, and security architecture design. Strong technical understanding of blockchain technologies, cryptography, cloud environments and distributed systems. Excellent communication and More ❯