Only candidates that can meet this requirement should apply for this vacancy. This role is subject to: 2 references - where possible, we require 3 years' history BPSS (Baseline Personnel Security Standard) clearance - this post is subject to BPSS checks. You will therefore be required to consent to and comply with BPSS checking requirements prior to commencing in this post. … This check involves verification of identity; nationality and immigration status; employment history (past 3 years) and basic criminal record check. We are seeking a highly skilled Senior Cyber Security Analyst to join our proactive ICT Cyber Security and Compliance Service. This team provides operational security controls, guidance, assurance, and compliance activities that support all products and platforms … and availability of information. In this role, you will be at the forefront of our efforts to protect and defend against malicious cyber-attacks. Our modern, proactive operational Cyber Security team is dedicated to providing: Threat Hunting: Actively seek out potential threats before they can cause harm. This involves continuous monitoring and analysis of network traffic, system logs More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
AJ BELL BUSINESS SOLUTIONS LIMITED
To support the Chief Information Security Officer in managing and reporting the Information Security Risks faced by Technology Services (TS) in delivering AJ Bells systems and services. This role is responsible for facilitating the secure delivery of AJ Bells technology and business change. The Information Security Architect will play a lead role in designing and implementing security … Key to this is assisting and supporting our colleagues in achieving their goals, but in a secure manner. The key responsibilities of the role are: Subject matter expertise for security best practice, ensuring the maintenance of the confidentiality, integrity and availability of AJ Bells systems and data. Design and implementation of enterprise security technology controls and platforms, following … industry best practices. Supporting and advising on projects and change initiatives to ensure that there is no negative impact on our security posture Carrying out internal security reviews both on solutions we develop in house and third-party solutions. Supporting audit and due diligence activities within Technology Services Working with Information Security, Infrastructure and Architecture to define More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
AJ Bell
To support the Chief Information Security Officer in managing and reporting the Information Security Risks faced by Technology Services (TS) in delivering AJ Bell’s systems and services. This role is responsible for facilitating the secure delivery of AJ Bell’s technology and business change. The Information Security Architect will play a lead role in designing and … implementing security controls and processes. Key to this is assisting and supporting our colleagues in achieving their goals, but in a secure manner. The key responsibilities of the role are: Subject matter expertise for security best practice, ensuring the maintenance of the confidentiality, integrity and availability of AJ Bell’s systems and data. Design and implementation of enterprise … security technology controls and platforms, following industry best practices. Supporting and advising on projects and change initiatives to ensure that there is no negative impact on our security posture Carrying out internal security reviews both on solutions we develop in house and third-party solutions. Supporting audit and due diligence activities within Technology Services Working with Information More ❯
IT Security Analyst required to work remotely, however you will need to come into the nearest Centre occasionally at least once a month. Please note; only apply if you hare happy to undergo an enhanced DBS as you will be working around children. Duties and responsibilities Security Operations Securely manage M365 & Azure resources, implementing comprehensive security policies … and initiatives. Implement security measures and controls for EUC environments, including endpoint security, access controls, and device management. Vulnerability Management Conduct and oversee regular vulnerability assessments on systems, networks, and applications. Identify, analyse, and prioritise vulnerabilities based on risk and potential impact and utilise threat intelligence analysis to determine the risk posed by identified vulnerabilities. Collaborate with the … to develop and implement remediation plans, drive remediation efforts and identify improvements in the vulnerability management program. Monitor and track the status of identified vulnerabilities and ensure timely resolution. SecurityMonitoring and Incident Response Leverage Microsoft Defender EDR/XDR and other security tools to monitor, analyse, and respond to security threats. Investigate suspicious activity and More ❯
Croydon, England, United Kingdom; Manchester, England, United Kingdom Janes empowers military, government, and defence leaders to act with confidence in an increasingly complex world. Our trusted defence, security, and geopolitical information delivered through seamless digital platforms and system integrations-turns overwhelming data into clear, actionable intelligence and insight. By filling critical information gaps, Janes helps customers analyse threats, accelerate … decisions, and stay ahead of emerging challenges. Job purpose: We are seeking an experienced Security Compliance Specialist with expertise in implementing and maintaining securitymonitoring and compliance programmes. The must have a strong background working with development teams and cloud-based service providers. You will be working as part of a team based in either Croydon or … a natural problem solver, and used to operating independently. How you will contribute at Janes: Responsible for delivering the annual ISO27001 & Cyber Essentials programmes Own and co-ordinate the security testing roadmap, and provide key support to the overall Security strategy Conduct regular risk assessments to identify potential security threats and vulnerabilities and recommend appropriate mitigation strategies. More ❯