with global business risk/objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security … security services and deploy new tools in support of the security roadmap. Must be capable of interacting effectively with various internal teams, peers, and management staff. Support the information security manager with creating information security metrics for the respective supported security products. This will be done monthly. Deploy new … processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security operations, legal, compliance, incident response teams More ❯
luton, bedfordshire, east anglia, united kingdom Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
ARM
with infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerabilitymanagement Your skillset may include: Proven experience as a Security Architect supporting major infrastructure transformation … with cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation, communication, and stakeholder engagement … Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including More ❯
luton, bedfordshire, east anglia, united kingdom Hybrid / WFH Options
Infinigate Group
role, you will wield a broad range of skills and deep understanding within Cloud network and security architecture (Azure), and excellent communication and stakeholder management skills. This role will see you taking ownership of for the delivery of security solutions within the group to support and enhance our security … and monitoring security tools and software, such as antivirus, encryption, authentication, SIEM etc. Evaluate, research and manage emerging cyber security threats. Support the incident management process, through Root Cause Analysis. Responding to and resolving security incidents and events, such as malware infections, phishing attempts, denial-of-service attacks, data … relating to information security. Conducting security awareness training and education for staff and users on best practices and emerging trends in cyber security. Use vulnerabilitymanagement to improve Infinigate’s security landscape. Performing risk assessments and vulnerability scans to identify and mitigate potential threats to the network More ❯
Luton, England, United Kingdom Hybrid / WFH Options
Advanced Resource Managers
with infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerabilitymanagement Your skillset may include: Proven experience as a Security Architect supporting major infrastructure transformation … with cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation, communication, and stakeholder engagement More ❯
luton, bedfordshire, east anglia, united kingdom Hybrid / WFH Options
Advanced Resource Managers
with infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerabilitymanagement Your skillset may include: Proven experience as a Security Architect supporting major infrastructure transformation … with cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation, communication, and stakeholder engagement More ❯
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerabilitymanagement tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
luton, bedfordshire, east anglia, united kingdom Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable VulnerabilityManagement (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
some of the brightest minds in the industry. Desired Experience (full job spec available): 5+ years experience in a technical security role Experience in vulnerability assessment, penetration testing, and vulnerabilitymanagement processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate More ❯
with incorporated flexibility Currently support the x2 Directors we have onboarded for a global professional services brand onboard a Cloud Security Analyst within there Vulnerability & SecOps team (Azure). Skills needed: - Experience of working in enterprise/complex environment; they have 1000's of VM's, active subscriptions, tenants … etc. - Proficiency with Microsoft Security suite products, including Microsoft Defender for Cloud, Sentinel, Azure Update Manager, and Azure cloud services. - Experienced in vulnerabilitymanagement, threat assessment, countermeasure implementation, and patch management within cloud-based infrastructures and services. - Certifications such as CISSP, AZ-500, etc would be favourable More ❯
including GRC and Cyber Defence, to analyse, escalate, and manage security incidents effectively Utilise a range of security tools such as SIEM, IDS, antivirus, vulnerability scanners, and Microsoft Azure security solutions to detect and assess threats Contribute to the continuous improvement of SOC processes and capabilities, with opportunities for … and VPNs Knowledge of Windows domain services such as Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerabilitymanagement platforms, and Microsoft Azure security solutions Familiarity with the MITRE ATT&CK framework Experience working in an ITIL-based service managementMore ❯
to enable secure coding and privacy by design Drive adoption of secure development standards and practices across the org Operate and evolve our software vulnerabilitymanagement and bug bounty programs Work cross-functionally to identify risks and improve security posture continuously Support cloud-native app and ML security More ❯
and SD-WAN. Understanding of Zero Trust Architecture, microsegmentation, and secure cloud networking (e.g., Azure, AWS, GCP). Experience with security information and event management (SIEM), threat intelligence, and vulnerability management. Excellent communication and documentation skills, with the ability to influence and educate stakeholders. Relevant certifications strongly preferred More ❯
and SD-WAN. Understanding of Zero Trust Architecture, microsegmentation, and secure cloud networking (e.g., Azure, AWS, GCP). Experience with security information and event management (SIEM), threat intelligence, and vulnerability management. Excellent communication and documentation skills, with the ability to influence and educate stakeholders. Relevant certifications strongly preferred More ❯
and stakeholders. Does the work get challenging at times? Yes! But you’ll collaborate with a diverse group of talented people and gain invaluable management and organizational skills, which will come in handy as you move forward in your career. Your future at Kyndryl Every position at Kyndryl offers … operations Experience with Mainframe product installation Willing to learn and grow future Mainframe Skills Eligible for UK Security Clearance (must have) Nice to have: Vulnerabilitymanagement expertise Familiarity with ticketing tools (SM9, ServiceNow) Mainframe-related certifications are a plus More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Matchtech
with customer and regulatory requirements. Key Responsibilities: Lead the definition, implementation, and governance of product security measures across the entire system lifecycle. Develop Security Management Plans, risk assessments, and mitigation strategies. Define and review security requirements for product teams. Support system accreditation, liaising with security accreditors and assurance teams. … Prepare security documentation including Protection Profiles, Security Targets, and TEMPEST Control Plans. Assist with platform lockdown, penetration testing, and vulnerability management. Lead incident response efforts and support product security training. Skills & Experience: Background in securing defence or commercial systems. Degree in engineering, computer science, or related field. Certified security More ❯
Luton, Bedfordshire, South East, United Kingdom Hybrid / WFH Options
Defence
with customer and regulatory requirements. Key Responsibilities: Lead the definition, implementation, and governance of product security measures across the entire system lifecycle. Develop Security Management Plans, risk assessments, and mitigation strategies. Define and review security requirements for product teams. Support system accreditation, liaising with security accreditors and assurance teams. … Prepare security documentation including Protection Profiles, Security Targets, and TEMPEST Control Plans. Assist with platform lockdown, penetration testing, and vulnerability management. Lead incident response efforts and support product security training. Skills & Experience: Background in securing defence or commercial systems. Degree in engineering, computer science, or related field. Certified security More ❯
luton, bedfordshire, east anglia, united kingdom Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
Luton, England, United Kingdom Hybrid / WFH Options
Matchtech
with customer and regulatory requirements. Key Responsibilities: Lead the definition, implementation, and governance of product security measures across the entire system lifecycle. Develop Security Management Plans, risk assessments, and mitigation strategies. Define and review security requirements for product teams. Support system accreditation, liaising with security accreditors and assurance teams. … Prepare security documentation including Protection Profiles, Security Targets, and TEMPEST Control Plans. Assist with platform lockdown, penetration testing, and vulnerability management. Lead incident response efforts and support product security training. Skills & Experience: Background in securing defence or commercial systems. Degree in engineering, computer science, or related field. Certified security More ❯