Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
purpose of your role is the coordination of product cyber resilience activities, in particular, within the technical and business functions, to ensure continued product compliance with internal and external cybersecurity standards.Working with the senior leadership team within Product Security across all lines of business, you will have responsibility for the Electronics UK Product Security and Information Management System, security … Your responsibilities include; Partnering with technical and business functions across LEUK, including; Engineering, Manufacturing, Customer Support, Physical Security and Information Technology to ensure continued compliance with internal and external cybersecurity standards specified by national security authorities or by international bodies and with cybersecurity requirements expressed by the customer. Maintain the Electronics Product Security and Information Management System, securityMore ❯
be part of a small, agile team responsible for ensuring the reliability, security, and performance of IT systems within industrial assets. This includes software and hardware configuration, network management, cybersecurity, and proactive maintenance across the plant. Key Responsibilities Diagnose and resolve IT-related issues at the industrial asset level Install, configure, and maintain software, hardware, and network equipment Manage … software vendors Required Skills & Experience Strong IT support experience, ideally within a manufacturing or industrial setting Familiarity with SCADA, HMI, or Numerical Control systems is a plus Understanding of cybersecurity practices in industrial environments Experience with system patching, antivirus deployment, and backup procedures Knowledge of networking infrastructure and Microsoft operating systems (including legacy) Ability to manage IT documentation and More ❯
Cheltenham, England, United Kingdom Hybrid / WFH Options
Searchability NS&D
Enhanced DV cleared to start – must be active (West) Globally leading defence/cybersecurity company Up to £65k DoE - plus benefits and bonuses Cheltenham location – hybrid working model Experience required in Splunk/ELK, Linux, Apache NiFi, Java/Python, Docker/Kubernetes Who Are We? We are recruiting a Senior Support Engineer to work with a multi-national … industry-leading cybersecurity/defence company in Cheltenham. Our teams are what drive us forward in our mission to make the UK as safe as possible. Therefore, we are looking for the best talent to join the team. Due to the nature of our client, you must hold active enhanced DV clearance. What will the Senior Support Engineer be More ❯
gloucester, south west england, united kingdom Hybrid / WFH Options
Searchability NS&D
Enhanced DV cleared to start – must be active (West) Globally leading defence/cybersecurity company Up to £65k DoE - plus benefits and bonuses Cheltenham location – hybrid working model Experience required in Splunk/ELK, Linux, Apache NiFi, Java/Python, Docker/Kubernetes Who Are We? We are recruiting a Senior Support Engineer to work with a multi-national … industry-leading cybersecurity/defence company in Cheltenham. Our teams are what drive us forward in our mission to make the UK as safe as possible. Therefore, we are looking for the best talent to join the team. Due to the nature of our client, you must hold active enhanced DV clearance. What will the Senior Support Engineer be More ❯
and engage with diversity. Hours: Full Time, 37 hours Salary: £35,254.70 up to £45,000 per annum + £4000 Scarce skills Bonus Requirements: A technical background gained within CyberSecurity and IT, experience working in a CyberSecurity setting, or experience in a broad range of technical areas relevant to CyberSecurity such as networking or programming. A minimum … of a level 4 qualification in a relevant subject area such as Computing, Computer Science, Software Development, Cybersecurity, Computer forensics, or equivalent discipline and sufficient experience in industry if relevant degree not held GCSE English and Maths at grade C or above (or willingness to complete) Assessors’ qualification (or willingness to complete) Experience in planning, controlling, implementing, and delivering … or assessing qualification V1 or IQA Relevant industry certifications, which may include, but not necessarily be limited to: − CompTIA in A+ − CompTIA Network+ − CompTIA Security+ A firm appreciation of CyberSecurity elements, e.g. Cryptography, Information Security and Systems, Information Management, Security Case Studies, Incident Response and Forensics. More ❯
and engage with diversity. Hours: Full Time, 37 hours Salary: £35,254.70 up to £45,000 per annum + £4000 Scarce skills Bonus Requirements: A technical background gained within CyberSecurity and IT, experience working in a CyberSecurity setting, or experience in a broad range of technical areas relevant to CyberSecurity such as networking or programming. A minimum … of a level 4 qualification in a relevant subject area such as Computing, Computer Science, Software Development, Cybersecurity, Computer forensics, or equivalent discipline and sufficient experience in industry if relevant degree not held GCSE English and Maths at grade C or above (or willingness to complete) Assessors’ qualification (or willingness to complete) Experience in planning, controlling, implementing, and delivering … or assessing qualification V1 or IQA Relevant industry certifications, which may include, but not necessarily be limited to: − CompTIA in A+ − CompTIA Network+ − CompTIA Security+ A firm appreciation of CyberSecurity elements, e.g. Cryptography, Information Security and Systems, Information Management, Security Case Studies, Incident Response and Forensics. More ❯
Cheltenham, Gloucestershire, England, United Kingdom
Crimson
Microsoft 365, SharePoint, and Azure/cloud migration projects from scoping to rollout.* Delivered technical solutions and infrastructure migrations, ensuring quality and acting as escalation point.* Developed and maintained cybersecurity strategies aligned with industry standards.* Built secure user devices and managed device integrity and anti-malware.* Implemented proactive monitoring and automation tools for predictive operations.* Drove service management improvements including … whether on-premises or cloud-based, should be assessed for suitability, with monitoring and management processes implemented to maintain data integrity and support business continuity* Develop and implement a cybersecurity strategy for all customers, ensuring compliance with industry standards and best practices.* Design and build secure user devices, including PC/laptop setups, anti-malware measures, mirroring, and device integrity. More ❯
Cheltenham, Gloucestershire, South West, United Kingdom
Crimson
Microsoft 365, SharePoint, and Azure/cloud migration projects from scoping to rollout. Delivered technical solutions and infrastructure migrations, ensuring quality and acting as escalation point. Developed and maintained cybersecurity strategies aligned with industry standards. Built secure user devices and managed device integrity and anti-malware. Implemented proactive monitoring and automation tools for predictive operations. Drove service management improvements including … whether on-premises or cloud-based, should be assessed for suitability, with monitoring and management processes implemented to maintain data integrity and support business continuity Develop and implement a cybersecurity strategy for all customers, ensuring compliance with industry standards and best practices. Design and build secure user devices, including PC/laptop setups, anti-malware measures, mirroring, and device integrity. More ❯
Microsoft 365, SharePoint, and Azure/cloud migration projects from scoping to rollout. Delivered technical solutions and infrastructure migrations, ensuring quality and acting as escalation point. Developed and maintained cybersecurity strategies aligned with industry standards. Built secure user devices and managed device integrity and anti-malware. Implemented proactive monitoring and automation tools for predictive operations. Drove service management improvements including … whether on-premises or cloud-based, should be assessed for suitability, with monitoring and management processes implemented to maintain data integrity and support business continuity Develop and implement a cybersecurity strategy for all customers, ensuring compliance with industry standards and best practices. Design and build secure user devices, including PC/laptop setups, anti-malware measures, mirroring, and device integrity. More ❯
Cheltenham, Gloucestershire, South West, United Kingdom
Rise Technical Recruitment Limited
learners both in the classroom and workplace, and develop innovative resources that bring cyber and IT concepts to life. The ideal candidate will have a strong technical background in CyberSecurity or IT, hold a minimum Level 4 qualification in a relevant subject (Computing, Software Development, CyberSecurity, Forensics or similar), and bring excellent communication skills. Teaching or assessing qualifications … engaging teaching resources and sessions Using cutting-edge facilities including cyber labs and forensics toolkits Full assessor/teacher training provided if not already held The Person Background in CyberSecurity, IT or related technical field Minimum Level 4 qualification in Computing, CyberSecurity, Forensics or related area Assessors' qualification (or willingness to work towards) Strong communication and organisational skills More ❯
I'm recruiting an Interim Finance Business Partner for a PE Backed Cybersecurity Business in Bristol. They've recently received PE investment and are on a professionalisation journey. Key Responsibilities; Lead budgeting and forecasting Provide financial insights to support strategic decision-making Generate accurate reports for management and investors, in line with accounting standards Analyse performance, identify trends, and drive More ❯
configuration, maintenance, and upgrades of software, hardware, and networks in a fast-paced industrial setting. You will play a key role in minimising downtime, supporting production efficiency, and strengthening cybersecurity within manufacturing environments. The company are based in Filton & this will be an initial 6 month contract with extensions likely. Main Responsibilities: Diagnose, troubleshoot, and resolve IT-related issues … on system upgrades, patching, backups, and IT asset disposal. Skills Required: Previous experience within an IT services or industrial support environment (e.g., SCADA, HMI, CNC). Strong knowledge of cybersecurity practices in an operational technology context. Practical experience with system installations, security patching, and backup/restore procedures. Solid understanding of network infrastructure and Windows operating systems (legacy knowledge More ❯
configuration, maintenance, and upgrades of software, hardware, and networks in a fast-paced industrial setting. You will play a key role in minimising downtime, supporting production efficiency, and strengthening cybersecurity within manufacturing environments. The company are based in Filton & this will be an initial 6 month contract with extensions likely. Main Responsibilities: Diagnose, troubleshoot, and resolve IT-related issues … on system upgrades, patching, backups, and IT asset disposal. Skills Required: Previous experience within an IT services or industrial support environment (e.g., SCADA, HMI, CNC). Strong knowledge of cybersecurity practices in an operational technology context. Practical experience with system installations, security patching, and backup/restore procedures. Solid understanding of network infrastructure and Windows operating systems (legacy knowledge More ❯
to delivering resilient, modern, and user-centric technology for students, staff, and external partners. You will be responsible for the strategic direction and operational excellence of IT Operations and Cybersecurity, including but not limited to Infrastructure, networking, and platforms (on-prem and cloud), Service management and customer support, End-to-end Identity and Access Management (IAM) and Cybersecurity strategy and More ❯