have within the community. So, what’s your possible? About the Role: This position offers the unique opportunity to design, develop, and maintain cutting-edge infrastructure for naval platform management systems, including both surface ships and submarines. You will play a critical role in both the development of the product and the provision and maintenance of the development environment … itself, supporting mission-critical naval programmes. You will also be responsible for the management of IT assets within the development environment, ensuring compliance with company and regulatory standards such as ISO27001 and IEC62443. This role is ideal for engineers familiar with Windows Server domains, Red Hat Linux, virtualisation, industrial networking, and working within regulated environments such as defence, energy … Security: Design and manage robust industrial networking architectures (e.g., Profinet, Ethernet/IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. Platform Management Systems: Work closely with multidisciplinary teams to design and integrate ICS solutions into PMS, ensuring they meet rigorous naval requirements for performance, reliability, and security. Development Environment Provision & Maintenance More ❯
have within the community. So, what’s your possible? About the Role: This position offers the unique opportunity to design, develop, and maintain cutting-edge infrastructure for naval platform management systems, including both surface ships and submarines. You will play a critical role in both the development of the product and the provision and maintenance of the development environment … itself, supporting mission-critical naval programmes. You will also be responsible for the management of IT assets within the development environment, ensuring compliance with company and regulatory standards such as ISO27001 and IEC62443. This role is ideal for engineers familiar with Windows Server domains, Red Hat Linux, virtualisation, industrial networking, and working within regulated environments such as defence, energy … Security: Design and manage robust industrial networking architectures (e.g., Profinet, Ethernet/IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. Platform Management Systems: Work closely with multidisciplinary teams to design and integrate ICS solutions into PMS, ensuring they meet rigorous naval requirements for performance, reliability, and security. Development Environment Provision & Maintenance More ❯
london (new malden), south east england, united kingdom
Northrop Grumman UK
have within the community. So, what’s your possible? About the Role: This position offers the unique opportunity to design, develop, and maintain cutting-edge infrastructure for naval platform management systems, including both surface ships and submarines. You will play a critical role in both the development of the product and the provision and maintenance of the development environment … itself, supporting mission-critical naval programmes. You will also be responsible for the management of IT assets within the development environment, ensuring compliance with company and regulatory standards such as ISO27001 and IEC62443. This role is ideal for engineers familiar with Windows Server domains, Red Hat Linux, virtualisation, industrial networking, and working within regulated environments such as defence, energy … Security: Design and manage robust industrial networking architectures (e.g., Profinet, Ethernet/IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. Platform Management Systems: Work closely with multidisciplinary teams to design and integrate ICS solutions into PMS, ensuring they meet rigorous naval requirements for performance, reliability, and security. Development Environment Provision & Maintenance More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
We are partnering with a major UK energy organisation to find an experienced Cyber Threat Intelligence & VulnerabilityManagement Lead. This high-impact leadership role will oversee all aspects of cyber threat intelligence and vulnerabilitymanagement across the Group, helping protect critical infrastructure and enabling strategic security initiatives. About the Role: This position offers a unique opportunity … to influence the development of security capabilities within one of the UK's largest energy firms. You’ll lead the technical evolution of threat intelligence and vulnerability strategies, directly supporting senior leadership and contributing to the Group’s security maturity programme. As a subject matter expert, you will mentor and manage a specialist team, lead engagements with law enforcement … wide technical controls. The role plays a key part in aligning the organisation with emerging threats, regulatory requirements, and global best practices. Your Responsibilities: Lead Cyber Threat Intelligence and VulnerabilityManagement strategies Guide the rollout of technical controls, policies, and threat intelligence platforms Manage and develop a specialist team (including Analysts and Specialists) Represent cyber intelligence at leadership More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
We are partnering with a major UK energy organisation to find an experienced Cyber Threat Intelligence & VulnerabilityManagement Lead. This high-impact leadership role will oversee all aspects of cyber threat intelligence and vulnerabilitymanagement across the Group, helping protect critical infrastructure and enabling strategic security initiatives. About the Role: This position offers a unique opportunity … to influence the development of security capabilities within one of the UK's largest energy firms. You’ll lead the technical evolution of threat intelligence and vulnerability strategies, directly supporting senior leadership and contributing to the Group’s security maturity programme. As a subject matter expert, you will mentor and manage a specialist team, lead engagements with law enforcement … wide technical controls. The role plays a key part in aligning the organisation with emerging threats, regulatory requirements, and global best practices. Your Responsibilities: Lead Cyber Threat Intelligence and VulnerabilityManagement strategies Guide the rollout of technical controls, policies, and threat intelligence platforms Manage and develop a specialist team (including Analysts and Specialists) Represent cyber intelligence at leadership More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
We are partnering with a major UK energy organisation to find an experienced Cyber Threat Intelligence & VulnerabilityManagement Lead. This high-impact leadership role will oversee all aspects of cyber threat intelligence and vulnerabilitymanagement across the Group, helping protect critical infrastructure and enabling strategic security initiatives. About the Role: This position offers a unique opportunity … to influence the development of security capabilities within one of the UK's largest energy firms. You’ll lead the technical evolution of threat intelligence and vulnerability strategies, directly supporting senior leadership and contributing to the Group’s security maturity programme. As a subject matter expert, you will mentor and manage a specialist team, lead engagements with law enforcement … wide technical controls. The role plays a key part in aligning the organisation with emerging threats, regulatory requirements, and global best practices. Your Responsibilities: Lead Cyber Threat Intelligence and VulnerabilityManagement strategies Guide the rollout of technical controls, policies, and threat intelligence platforms Manage and develop a specialist team (including Analysts and Specialists) Represent cyber intelligence at leadership More ❯
native platform that helps security teams investigate, triage, and remediate vulnerabilities faster using LLMs and autonomous agents. The Role You’ll be the strategic owner of an AI-powered vulnerabilitymanagement product, accountable for ARR growth and POC conversion. This is an early hire with broad scope: define the vision, validate with customers, partner deeply with engineering, and … bring zero-to-one capabilities to market. What You’ll Do Own product strategy & roadmap for an agentic vulnerabilitymanagement platform; prioritize use cases that drive measurable revenue and customer value. Partner with engineering as true collaborators in discovery and delivery—enable research and iteration, not just handoffs. Ship zero-to-one : take concepts from idea to GA … output. Communicate technical depth : bridge AI agent capabilities and security workflows for both engineers and customers. What You’ll Bring Security domain expertise (must-have): hands-on familiarity with vulnerabilitymanagement, risk assessment, EDR/NDR, cloud security, or adjacent areas. 4–7 years in product management with shipped products that moved business metrics. Technical fluency across More ❯
native platform that helps security teams investigate, triage, and remediate vulnerabilities faster using LLMs and autonomous agents. The Role You’ll be the strategic owner of an AI-powered vulnerabilitymanagement product, accountable for ARR growth and POC conversion. This is an early hire with broad scope: define the vision, validate with customers, partner deeply with engineering, and … bring zero-to-one capabilities to market. What You’ll Do Own product strategy & roadmap for an agentic vulnerabilitymanagement platform; prioritize use cases that drive measurable revenue and customer value. Partner with engineering as true collaborators in discovery and delivery—enable research and iteration, not just handoffs. Ship zero-to-one : take concepts from idea to GA … output. Communicate technical depth : bridge AI agent capabilities and security workflows for both engineers and customers. What You’ll Bring Security domain expertise (must-have): hands-on familiarity with vulnerabilitymanagement, risk assessment, EDR/NDR, cloud security, or adjacent areas. 4–7 years in product management with shipped products that moved business metrics. Technical fluency across More ❯
native platform that helps security teams investigate, triage, and remediate vulnerabilities faster using LLMs and autonomous agents. The Role You’ll be the strategic owner of an AI-powered vulnerabilitymanagement product, accountable for ARR growth and POC conversion. This is an early hire with broad scope: define the vision, validate with customers, partner deeply with engineering, and … bring zero-to-one capabilities to market. What You’ll Do Own product strategy & roadmap for an agentic vulnerabilitymanagement platform; prioritize use cases that drive measurable revenue and customer value. Partner with engineering as true collaborators in discovery and delivery—enable research and iteration, not just handoffs. Ship zero-to-one : take concepts from idea to GA … output. Communicate technical depth : bridge AI agent capabilities and security workflows for both engineers and customers. What You’ll Bring Security domain expertise (must-have): hands-on familiarity with vulnerabilitymanagement, risk assessment, EDR/NDR, cloud security, or adjacent areas. 4–7 years in product management with shipped products that moved business metrics. Technical fluency across More ❯
london (city of london), south east england, united kingdom
Heart Mind Talent
native platform that helps security teams investigate, triage, and remediate vulnerabilities faster using LLMs and autonomous agents. The Role You’ll be the strategic owner of an AI-powered vulnerabilitymanagement product, accountable for ARR growth and POC conversion. This is an early hire with broad scope: define the vision, validate with customers, partner deeply with engineering, and … bring zero-to-one capabilities to market. What You’ll Do Own product strategy & roadmap for an agentic vulnerabilitymanagement platform; prioritize use cases that drive measurable revenue and customer value. Partner with engineering as true collaborators in discovery and delivery—enable research and iteration, not just handoffs. Ship zero-to-one : take concepts from idea to GA … output. Communicate technical depth : bridge AI agent capabilities and security workflows for both engineers and customers. What You’ll Bring Security domain expertise (must-have): hands-on familiarity with vulnerabilitymanagement, risk assessment, EDR/NDR, cloud security, or adjacent areas. 4–7 years in product management with shipped products that moved business metrics. Technical fluency across More ❯
IT Infrastructure Operational Platform and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation's IT operations, ensuring the stability, continuity, security, and efficiency of its technology … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. Security, Compliance & Risk Management • Define and enforce cloud security policies, identity management, and … access controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. • Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such More ❯
We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & Access Management (IAM), and Data Loss Prevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable, and resilient identity and data protection services. The ideal candidate will combine … deep technical expertise with strong leadership skills to shape the future of cybersecurity, identity, and data protection within the organization. This position is designated as a Senior Management Function (SMF) under the Financial Conduct Authority regime, carrying personal accountability for compliance, operational resilience, and security effectiveness. The Role: Strategic Leadership Define and execute the global strategy for Cyber Engineering … NYDFS), Sarbanes-Oxyley (SOX), and the Financia Conduct Authority(FCA). Cyber Engineering Oversight Lead engineering teams responsible for core security platforms, including endpoint protection, cloud security, network defense, vulnerabilitymanagement, and DevSecOps integrations. Build and mature a comprehensive vulnerabilitymanagement program, including continuous scanning, risk-based prioritization, remediation tracking, and Board-level reporting. Drive innovation More ❯
Role Overview Ipsotek is seeking a strategic and hands-on Security Lead to own and evolve our security posture across the business. This pivotal role will oversee security strategy , vulnerabilitymanagement , and security operations (SecOps) , acting as the primary point of contact for all security-related matters within Ipsotek and externally with the Eviden Centre of Excellence . … s security strategy aligned with business and regulatory requirements. Liaise with the Eviden COO and Eviden Centre of Excellence to ensure alignment with group-wide security standards and initiatives. VulnerabilityManagement, Penetration Testing & PSIRT Lead vulnerability assessments and coordinate penetration testing activities with external vendors and internal teams. Track and manage remediation efforts across infrastructure, applications, and … Provide regular updates to leadership on risk posture and mitigation plans. Requirements Proven experience in a senior security role, ideally within a technology or SaaS environment. Strong understanding of vulnerabilitymanagement, penetration testing, SecOps, and cloud security. Experience establishing or contributing to PSIRT processes. Experience working with cross-functional teams including engineering, operations, and client services. Excellent communication More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Ipsotek, an Eviden business
Role Overview Ipsotek is seeking a strategic and hands-on Security Lead to own and evolve our security posture across the business. This pivotal role will oversee security strategy , vulnerabilitymanagement , and security operations (SecOps) , acting as the primary point of contact for all security-related matters within Ipsotek and externally with the Eviden Centre of Excellence . … s security strategy aligned with business and regulatory requirements. Liaise with the Eviden COO and Eviden Centre of Excellence to ensure alignment with group-wide security standards and initiatives. VulnerabilityManagement, Penetration Testing & PSIRT Lead vulnerability assessments and coordinate penetration testing activities with external vendors and internal teams. Track and manage remediation efforts across infrastructure, applications, and … Provide regular updates to leadership on risk posture and mitigation plans. Requirements Proven experience in a senior security role, ideally within a technology or SaaS environment. Strong understanding of vulnerabilitymanagement, penetration testing, SecOps, and cloud security. Experience establishing or contributing to PSIRT processes. Experience working with cross-functional teams including engineering, operations, and client services. Excellent communication More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
engineering teamsproviding hands-on guidance, resolving concerns, and fostering a security-first mindset. DevSecOps Enablement : Promote and implement secure development practices across CI/CD pipelines, secrets and key management, dependency management, and secure design. VulnerabilityManagement : Lead vulnerability remediation effortstriaging findings, prioritizing risks, and partnering with teams to deliver effective, pragmatic fixes. Tooling & Automation … Hands-on experience with secure CI/CD practices, DevSecOps methodologies, GitHub workflows, and Terraform. Deep understanding of cloud security principles in AWS and Azure, particularly around IAM, secrets management, and networking. Proficient in secure coding practices, threat modeling, and vulnerability remediation. Familiar with a range of security tooling including static and dynamic analysis, software composition analysis, and More ❯
Key Responsibilities - Develop, implement, and maintain information security assurance programs. Ensure compliance with regulatory requirements and standards (e.g., ISO 27000, NIST SP800 series, CSF). Conduct risk assessments and vulnerabilitymanagement activities. Maintain robust security controls across enterprise assets, software, networks, and applications. Support incident response and recovery processes, including penetration testing and audit log management. Deliver training … expert advice on secure configurations, malware defences, and network monitoring strategies. Qualifications & Experience - Mandatory: At least 5 years' experience in information security assurance roles. Proven experience with information security management frameworks and regulatory compliance (e.g., ISO 27000, NIST). Strong understanding of security controls across data, networks, applications, devices, and users. Desirable: Familiarity with regulations in the Nuclear industry … and ability to engage with diverse stakeholders. A proactive, curious, and analytical mindset with strong problem-solving skills. Technical Skills: Comprehensive knowledge of security controls, including: Data Protection, Account Management, and Access Control Management. Continuous VulnerabilityManagement and Incident Response. Penetration Testing and Security Awareness Training. Secure Configuration and Network Monitoring. More ❯
Key Responsibilities - Develop, implement, and maintain information security assurance programs. Ensure compliance with regulatory requirements and standards (e.g., ISO 27000, NIST SP800 series, CSF). Conduct risk assessments and vulnerabilitymanagement activities. Maintain robust security controls across enterprise assets, software, networks, and applications. Support incident response and recovery processes, including penetration testing and audit log management. Deliver training … expert advice on secure configurations, malware defences, and network monitoring strategies. Qualifications & Experience - Mandatory: At least 5 years' experience in information security assurance roles. Proven experience with information security management frameworks and regulatory compliance (e.g., ISO 27000, NIST). Strong understanding of security controls across data, networks, applications, devices, and users. Desirable: Familiarity with regulations in the Nuclear industry … and ability to engage with diverse stakeholders. A proactive, curious, and analytical mindset with strong problem-solving skills. Technical Skills: Comprehensive knowledge of security controls, including: Data Protection, Account Management, and Access Control Management. Continuous VulnerabilityManagement and Incident Response. Penetration Testing and Security Awareness Training. Secure Configuration and Network Monitoring. More ❯
security initiatives, influence secure design standards, and mentor colleagues in best practices. Key Responsibilities Lead application and cloud security initiatives, ensuring systems and software are secure by design. Drive vulnerabilitymanagement and implement a risk-based approach across the technology stack. Perform security testing (SAST, DAST, SCA) and work with developers to remediate findings. Support cloud security controls … hands-on experience in application and cloud security engineering. Deep understanding of web app vulnerabilities (OWASP Top 10, CWE) and secure coding practices. Proficiency with security testing tools and vulnerabilitymanagement platforms. Broad knowledge of network and infrastructure security concepts (WAFs, ACLs, VPNs, etc.). Familiarity with security frameworks and principles such as Zero Trust and risk-based More ❯
security initiatives, influence secure design standards, and mentor colleagues in best practices. Key Responsibilities Lead application and cloud security initiatives, ensuring systems and software are secure by design. Drive vulnerabilitymanagement and implement a risk-based approach across the technology stack. Perform security testing (SAST, DAST, SCA) and work with developers to remediate findings. Support cloud security controls … hands-on experience in application and cloud security engineering. Deep understanding of web app vulnerabilities (OWASP Top 10, CWE) and secure coding practices. Proficiency with security testing tools and vulnerabilitymanagement platforms. Broad knowledge of network and infrastructure security concepts (WAFs, ACLs, VPNs, etc.). Familiarity with security frameworks and principles such as Zero Trust and risk-based More ❯
London, Hyde Park, United Kingdom Hybrid / WFH Options
The Bridge IT Recruitment
to a sustainable, net zero world. We’re looking for a Head of I&T Service Operations. Based at our Paddington site, you’ll be responsible for the definition, management, implementation and delivery of I&T Operations and Service Management across the URENCO Group incorporating: • Delivering iterative Service Strategy and Innovation focussed on how a best in class … IT Operations function works in modern enterprises • Lead on IT Service Continuity planning and testing with multiple outsourced service providers • Manage relationships with partners and service providers including contract management and continual service improvement • Leadership grounded in ITIL/ISO global standards for all I&T operational services • Stakeholder management specifically in reference to Service Outages, Testing Services … and Project Transition to Service • Service Protection in direct delivery of appropriate vulnerabilitymanagement, risk management and patching services • Lead the management and operation of cloud and SaaS based subscription services • Financial planning for all Operational Services including renewals and upgrades of infrastructure and applications as required • Accountability for Monthly Global Service Reviews for all suppliers More ❯
West London, London, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
are effectively deployed, maintained and optimised, while driving efficiencies and ensuring secure, compliant infrastructure. This role requires a background and strong expertise in enterprise toolsets, automation technologies and patch management processes. Engagement via Umbrella Company Only; all taxes & NI deducted at source. General responsibilities Lead operations of enterprise tooling platforms including SCCM, Scorch, BMC, Ansible and MuleSoft. Define and … consistent monitoring, reporting and compliance dashboards are in up to date and in-place for patching and tooling. Work with security and governance teams to align patching schedules with vulnerabilitymanagement requirements. Provide operational reporting for Stakeholders, including compliance metrics. Manage vendor relationships and licensing agreements for tooling and middleware platforms. Required Skills & Experience Proven experience managing enterprise … operations tooling, middleware and patch management. Strong expertise with SCCM, Scorch, BMC, Ansible and MuleSoft platforms. Demonstrated experience in patch management, vulnerability remediation and compliance reporting. Hands-on knowledge of automation frameworks and orchestration platforms. ITIL Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built More ❯
and mature the control stack across cloud and on-prem environments Lead the transition from an external SOC provider to an internal security operations function Design and implement a vulnerabilitymanagement strategy from the ground up Build out the testing and assurance programme (you’ll manage the pentest lifecycle, not conduct the testing yourself) Introduce aggregation and reporting … etc.) Drive a process-led culture — prioritising governance, visibility, and accountability over pure tooling What you’ll bring Experience building and/or running a SOC. A background in vulnerabilitymanagement, security engineering, and operational controls Strong understanding of cloud environments and how to secure them Proven ability to create structure and maturity in growing or complex organisations More ❯
and mature the control stack across cloud and on-prem environments Lead the transition from an external SOC provider to an internal security operations function Design and implement a vulnerabilitymanagement strategy from the ground up Build out the testing and assurance programme (you’ll manage the pentest lifecycle, not conduct the testing yourself) Introduce aggregation and reporting … etc.) Drive a process-led culture — prioritising governance, visibility, and accountability over pure tooling What you’ll bring Experience building and/or running a SOC. A background in vulnerabilitymanagement, security engineering, and operational controls Strong understanding of cloud environments and how to secure them Proven ability to create structure and maturity in growing or complex organisations More ❯
and mature the control stack across cloud and on-prem environments Lead the transition from an external SOC provider to an internal security operations function Design and implement a vulnerabilitymanagement strategy from the ground up Build out the testing and assurance programme (you’ll manage the pentest lifecycle, not conduct the testing yourself) Introduce aggregation and reporting … etc.) Drive a process-led culture — prioritising governance, visibility, and accountability over pure tooling What you’ll bring Experience building and/or running a SOC. A background in vulnerabilitymanagement, security engineering, and operational controls Strong understanding of cloud environments and how to secure them Proven ability to create structure and maturity in growing or complex organisations More ❯
london (city of london), south east england, united kingdom
La Fosse
and mature the control stack across cloud and on-prem environments Lead the transition from an external SOC provider to an internal security operations function Design and implement a vulnerabilitymanagement strategy from the ground up Build out the testing and assurance programme (you’ll manage the pentest lifecycle, not conduct the testing yourself) Introduce aggregation and reporting … etc.) Drive a process-led culture — prioritising governance, visibility, and accountability over pure tooling What you’ll bring Experience building and/or running a SOC. A background in vulnerabilitymanagement, security engineering, and operational controls Strong understanding of cloud environments and how to secure them Proven ability to create structure and maturity in growing or complex organisations More ❯