Southampton, England, United Kingdom Hybrid / WFH Options
Nice Group
ensure the confidentiality, integrity, and availability of our systems and data. How will you make an impact? Security Tooling: Deploy, maintain, integrate, and perform initial configuration of security tools. VulnerabilityManagement: Coordinate and conduct regular security assessments, penetration testing, and vulnerability scans to identify and address security weaknesses proactively. Incident Response: Lead incident response efforts to promptly … logs and alerts, investigate suspicious activities, and respond to security events in real-time. Implement and maintain security tools and technologies to enhance our security posture. Identity and Access Management: Manage user access controls, authentication mechanisms, and identity management systems to ensure appropriate levels of access and privilege. Have you got what it takes? At least 5 years More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
activities, including incident monitoring and response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits. Gap Assessments: Facilitate and/or conduct internal gap assessments and audit readiness … of compliance processes. Audit Findings: Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security Monitoring: Use tools such as … and implementing recommendations to improve the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. VulnerabilityManagement: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong expertise in audit and compliance More ❯
Information Security Analyst - Audit, Compliance & Cybersecurity Southampton, England, United Kingdom 2 days ago Southampton, England, United Kingdom 2 weeks ago Gosport, England, United Kingdom 4 weeks ago Security Architect - VulnerabilityManagement Southampton, England, United Kingdom 1 month ago Hampshire, England, United Kingdom 2 days ago Information Security Analyst - Audit, Compliance & Cybersecurity Southampton, England, United Kingdom 6 hours ago More ❯
systems. This position involves managing security operations, implementing security measures, and leveraging Microsoft Azure’s security features to safeguard the organization’s data and infrastructure. Key Responsibilities: Security Operations Management: Be the Technical Expert to support and advance the objectives of IT Security and the wider group In conjunction with the leadership team, develop and implement security policies, procedures … and protocols Actively engaged in continuous monitoring and protection of networks, systems, and applications Technical Security Implementation: Design, implement and support new and existing security solutions. (Privileged Access Management, VulnerabilityManagement, Threat Intelligence, etc) Expert in Microsoft Azure’s security tools and services. (Entra, Privileged Identity Management, conditional access, Microsoft defender, Sentinel, etc) Perform security input … and guidance on tools being adopted within the organisation. Oversee and assess the outputs of the vulnerabilitymanagement platforms to effectively identify and mitigate vulnerabilities Ensure documentation of all solutions and designs are up to date, including technical design documents and associated policies, procedures and processes Azure Security Management: Utilize Microsoft Azure’s security features, including Azure More ❯
Objective Acknowledge, analyse and validate incidents triggered from correlated via analysis and various tools. Acknowledge, analyse and validate incidents received through other reporting mechanisms such as email, phone calls, management directions, etc. Collection of necessary logs that could help in the incident containment and security investigation. Be able to make high quality decisions, often with incomplete information, and actively … Help develop platforms and tools to automate and improve security posture across the group. Help improve and develop documentation. Skills and Competencies Required Knowledge and hands-on experience in management of IDS/IPS, Firewall, VPN, EDR/XDR, mail filtering and other security products. Experience in Security Information Event Management (SIEM) tools, creation of basic correlation rules … of SIEM preferred. Should have expertise on TCP/IP network traffic and event log analysis. Network Troubleshooting skills required. Knowledge and hands-on experience in penetration testing/vulnerability scanning, security tools like Tenable Nessus, Kali Linux. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Experience of infrastructure design and management in mission critical More ❯
Basingstoke, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Southampton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security More ❯
Southampton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
in depth technical understanding. You will be expected to cover the initiation through to the design and implementation, across several of the skills and technologies below: Microsoft Sentinel Tenable VulnerabilityManagement (Or similar technology) Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/Related Certifications DESIRED KNOWLEDGE, SKILLS & EXPERIENCE The ability … significant value to your application. Training and development in these technologies/solutions may be provided if required. Microsoft Intune (Focused on Security, not the full suite) Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee must be able to demonstrate the following qualities: Autonomy … Quality Focus – Concern for quality, being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in written and verbal communication. The More ❯
by the team Maintain a strong customer focus at all times Hold the responsibility for: Patching The Cyber Security Risk Register Firewall Rules Microsoft End Point Protection Microsoft Defender VulnerabilityManagement Microsoft secure score Phishing simulation and staff training with both Cyber Security and information governance Data Loss Protection Testing and identifying network and system vulnerabilities Security features More ❯
Job Title: Vulnerability Manager Overview: Responsible for safeguarding the organization's systems by identifying, assessing, and mitigating security vulnerabilities. Key Responsibilities: Conduct regular vulnerability scans and coordinate remediation with IT teams. Analyze and prioritize risks; provide clear reporting to stakeholders. Integrate threat intelligence to proactively address vulnerabilities. Support incident response by identifying and addressing root causes. Ensure alignment … with security policies, regulations, and best practices. Maintain documentation and promote continuous improvement. Deliver training and awareness on vulnerability management. Qualifications: Bachelor's degree in Computer Science, Information Security, or equivalent. Relevant certifications (e.g., CISSP, CISM). Strong experience in vulnerabilitymanagement, risk analysis, and incident response. Key Competencies: Results-driven and proactive in implementing change. Strong More ❯
Farnborough, England, United Kingdom Hybrid / WFH Options
GardPass Consulting
attacks and vulnerabilities. You will be responsible for planning and implementing appropriate security controls to ensure that the information within the client is kept secure. Key functions/outputs: Vulnerability Scanning & Reporting Endpoint Security Incident Management & Tickets System Hardening Change Work Participation in Regular Meetings Documentation Main Objectives: Vulnerability Scanning & Reporting Perform regular vulnerability scans and … similar. The process should be focused on ensuring that the below tool sets are kept up to date and ensure that scans are performed regularly to help assist the Vulnerability and Patch Manager with identifying weaknesses in the system. Code Scans: perform regular code scans to audit code quality metrics, potential bugs, and security vulnerabilities. VulnerabilityManagement Tooling: perform regular VulnerabilityManagement Scans and ensure that the warehouse and plugins are kept up to date to capture new vulnerabilities. Reporting: assist the Vulnerability and Patch Manager with generating regular vulnerabilitymanagement reports, which are to be provided to the cyber security and IA lead. Endpoint Security: Endpoint Protection: perform regular updates More ❯
security posture of our commercial business units in alignment with the ISO-27001 security framework. The ideal candidate will have practical experience in various information security responsibilities, such as vulnerabilitymanagement, infrastructure hardening, security investigation, and security governance. This role requires an inquisitive personality with problem-solving capabilities to guide and support our commercial business unit's security … posture in enabling our customer's needs. Responsibilities Review and analyse outputs from Qualys, or equivalent, vulnerability and compliance scans. Actively monitor and respond to alerts from our SIEM (Security Information and Event Management) platform. Monitor and react to activity from Antivirus and EDR (Endpoint Detection and Response) tools. Define and document security requirements for new development efforts. More ❯
or locally based and looking for your next job opportunity? We are seeking an experienced Security Engineer with expertise in Endpoint Protection tools such as VMware Carbon Black, Nessus vulnerability platform, and within a Hyperconverged Infrastructure environment (HCI). The ideal candidate will possess strong technical skills within a scalable environment and demonstrate the ability to design, implement, and … you'll be doing: Work with the Security Architecture Team to implement solutions to protect against cyber threats, vulnerabilities, and insider risks. Configure and maintain the tooling associated with vulnerabilitymanagement and incident response. You will liaise with Operational Security to assist them with incident response activities, including incident triage, containment, eradication, and recovery, in collaboration with cross … functional teams. What you’ll bring: Security Certifications (CISSP, CISM) Security Best Practices VMware Carbon Black for EndPoint Protection Nessus vulnerability tooling BloodHound for Windows AD It would be great if you had: Privileged Access Management concepts Excellent verbal and written communication skills If you are interested in this role but not sure if your skills and experience More ❯
/eCAF framework while helping safeguard our digital assets across a variety of exciting projects. If you're ready to make a lasting impact, and have experience in SIEM, VulnerabilityManagement, Threat Intelligence and IAM, we want you on our team! What will you be doing? Key Responsibilities Executing a cyber improvement programme to enhance Portsmouth Waters security … years of experience in cyber security roles, with demonstrable involvement in implementing security frameworks (e.g. NIST, eCAF, ISO) and implementing technical projects (Essential) Prior hands-on experience with SIEM, VulnerabilityManagement, Threat Intelligence, and IAM systems (Essential) Experience contributing to enterprise-level security initiatives, preferably in environments that required alignment with industry standards and certifications (CAF/eCAF … Cyber Essentials Plus, ISO27001). (Essential) Proven experience in collaborating with IT Operations teams including third-party vendors. (Essential) Proven experience generating management reports on security incidents and vulnerabilities (Preferred) We recognise people want to work in a variety of different ways, this means we are happy to consider flexible working arrangements. Please talk to us at the interview More ❯
Havant, Hampshire, United Kingdom Hybrid / WFH Options
Reed Technology
month FTC (with likely extension to permanent) Salary: 50 - 53K plus benefits We are seeking a Cyber Security Specialist to lead the implementation of a new Information Security Management System (ISMS) and ensure compliance with security standards. This role is crucial in driving security improvements, managing risks, and maintaining regulatory compliance within a dynamic IT environment of circa … IT users. Key Accountabilities: * Lead the implementation of a new ISMS, ensuring alignment with industry security standards. * Develop and maintain cyber security policies, procedures, and risk management frameworks. * Manage compliance with cyber security regulations, standards, and frameworks (ISO27001, CAF/eCAF, Cyber Essentials Plus). * Implement and manage security monitoring tools to detect and respond to security events. * Identify … with hands-on involvement in ensuring compliance to security frameworks (ISO27001, NIST, eCAF). * Proven experience in implementing security systems and/or monitoring tools. * Strong knowledge of SIEM, VulnerabilityManagement, Threat Intelligence, and IAM systems. * Experience contributing to enterprise-level security initiatives and aligning with industry standards. * Strong collaboration skills, including experience working with IT Operations teams More ❯
Havant, Hampshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
month FTC (with likely extension to permanent) Salary: 50 - 53K plus benefits We are seeking a Cyber Security Specialist to lead the implementation of a new Information Security Management System (ISMS) and ensure compliance with security standards. This role is crucial in driving security improvements, managing risks, and maintaining regulatory compliance within a dynamic IT environment of circa … IT users. Key Accountabilities: * Lead the implementation of a new ISMS, ensuring alignment with industry security standards. * Develop and maintain cyber security policies, procedures, and risk management frameworks. * Manage compliance with cyber security regulations, standards, and frameworks (ISO27001, CAF/eCAF, Cyber Essentials Plus). * Implement and manage security monitoring tools to detect and respond to security events. * Identify … with hands-on involvement in ensuring compliance to security frameworks (ISO27001, NIST, eCAF). * Proven experience in implementing security systems and/or monitoring tools. * Strong knowledge of SIEM, VulnerabilityManagement, Threat Intelligence, and IAM systems. * Experience contributing to enterprise-level security initiatives and aligning with industry standards. * Strong collaboration skills, including experience working with IT Operations teams More ❯
Collaborate with internal cyber teams, including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for career development and internal progression … including TCP/IP, DNS and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerabilitymanagement platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service management environment How you’ll be More ❯
DevSecOps pipelines Collaborate with developers to enable secure coding and privacy by design Drive adoption of secure development standards and practices across the org Operate and evolve our software vulnerabilitymanagement and bug bounty programs Work cross-functionally to identify risks and improve security posture continuously Support cloud-native app and ML security efforts across Azure and AWS More ❯
DevSecOps pipelines Collaborate with developers to enable secure coding and privacy by design Drive adoption of secure development standards and practices across the org Operate and evolve our software vulnerabilitymanagement and bug bounty programs Work cross-functionally to identify risks and improve security posture continuously Support cloud-native app and ML security efforts across Azure and AWS More ❯
utilities sector. This is a hands-on role focused on improving cyber posture, ensuring compliance, and protecting critical infrastructure. Key Responsibilities Manage cyber security tools (SIEM, IAM, Threat Intel, Vulnerability Mgmt) Monitor and respond to threats and incidents Support audits and create security policies Align with frameworks like NIST, ISO27001, and CAF/eCAF What You'll Need … years in cyber security roles Experience with SIEM, IAM, and vulnerability tools Familiarity with security frameworks and standards Strong reporting and stakeholder communication skills Perks Up to 6% bonus 27 days holiday + bank hols 15% pension, private medical, life assurance Flexible working, employee perks & more More ❯
Security Architect - VulnerabilityManagement IOVENDO Southampton, England, United Kingdom Join or sign in to find your next job Join to apply for the Security Architect - VulnerabilityManagement role at IOVENDO Security Architect - VulnerabilityManagement IOVENDO Southampton, England, United Kingdom 3 weeks ago Be among the first 25 applicants Join to apply for the Security … Architect - VulnerabilityManagement role at IOVENDO Get AI-powered advice on this job and more exclusive features. Security Architect Tenable or Qualys BPSS min requirement We are looking for a Security Architect, min requirement is to be BPSS cleared and happy to go through Security Clearance. We need someone with experience of VulnerabilityManagement solutions such … as Tenable or Qualys with a strong knowledge of network security solutions, ITIL and Service Management all within a Cisco environment. The project is a large-scale network refresh based in Southampton that will be based onsite for the first 4-6 weeks and then revert to 1 day per week in the office. Required Skills And Experience Strong More ❯
place for any noncompliance. Monitor and manage customer IT Health Checks and associated remediation activities. Deliver and implement security information assurance work packages. Lead and manage an Information Security Management System to ISO27001 standards. Handle VulnerabilityManagement, Security Incident Management, and Security Risk Management. Manage documentation and guide junior team members, reviewing their work. Preferred Qualifications … security design and architecture fundamentals. Experience working directly with large organisations on complex technical delivery projects. Additional Information Seniority level: Mid-Senior level. Employment type: Contract. Job functions include Management and Manufacturing. Industry: Staffing and Recruiting. #J-18808-Ljbffr More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
GTT
to jointly develop and support viable plans for delivering industry leading solutions on top of standard services and delivering in life support of GTT Enterprise customers. GTT’s Technical Management offering is a consultative, value-add professional services that provides a tailored experience to their client base. As a Technical Manager you will own the technical integrity of a … customer solution, understand the wider context of the solution with the customer and how it aligns with their business, bringing a holistic ITIL based Service Management structure to some of GTT’s most important Managed Customers. At any one time you will work on multiple client accounts and must have the ability to develop and present client solutions to … experience by displaying flexibility, technical excellence, agility, ownership, and responsibility. Becoming an invaluable partner to the client. Monitor industry networking updates, technologies, and best practices to improve overall network management and to remain informed of new technical developments and trends in the industry. Own the customer solution lifecycle from initial customer order onwards, highlighting and managing risks, issues, and More ❯
We are seeking a dynamic and detail-oriented Cyber Security Business Analyst to join our clients team for an OT Asset & Vulnerability Project. This pivotal initiative aims to enhance our operational technology infrastructure by improving asset management and vulnerability processes. The project is preparing to enter the pilot phase in the coming month, followed by a rollout … will involve refining processes, gathering feedback, and driving improvements during the implementation phase. Key Responsibilities Collaborate with stakeholders to define project objectives, scope, and deliverables for the OT Asset & Vulnerability Project. Conduct requirements gathering sessions with users and translate these into detailed functional specifications. Analyze current workflows and identify areas for improvement in asset and vulnerabilitymanagement … issues proactively. Assist in user onboarding and training activities during the rollout phase. Skills and Qualifications Experience: 10+ years as a Business Analyst, preferably in OT, IT security, or vulnerabilitymanagement projects. Technical Understanding: Familiarity with operational technology environments, asset management, and vulnerability assessment processes. Analytical Skills: Ability to analyze complex systems, identify gaps, and propose More ❯