a diverse and complex digital estate. You'll shape the direction of our security operations, optimise the use of key platforms, develop our threat management approach, and drive improvements in our incident response and vulnerabilitymanagement capabilities. You'll also take the lead in developing meaningful KPIs … Operations Centre (SOC), managing a team of analysts, engineers and external partners to ensure effective monitoring, detection, and response to cyber threats. Provide line management and leadership to the SOC team, including performance management, mentoring, and professional development, while fostering a collaborative and high-performing culture aligned with … escalation paths, and workflows. Define and report on KPIs, SLAs, and performance metrics to measure operational effectiveness and support strategic decision-making. Oversee threat management, SIEM optimisation, and vulnerabilitymanagement activities, ensuring tools and workflows are continually tuned for impact. Serve as the main point of contact More ❯
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerabilitymanagement programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 … Information Security Management System. Ensure cyber security compliance with company policies, standards, and obligations. What You'll Need to Succeed: 2 years + Experience in a cyber-security role Working knowledge of technical and cyber security standards Working knowledge of industry best practices (such as NIST Framework, OWASP top … ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerabilitymanagement tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to the ISO27001 standard Cloud More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
James Adams
as part of a wider tech transformation. As part of this growth, we’re looking for an Information Security Analyst (VM) to join their VulnerabilityManagement team. This role will play a pivotal part in protecting the business by owning the vulnerability scanning and assessment process, coordinating … third-party testing, and helping drive remediation plans. It’s a great opportunity for someone with hands-on technical experience in vulnerabilitymanagement who’s looking to deepen their expertise in a fast-paced, hybrid environment. Responsibilities: Conducting vulnerability scanning across all business endpoints using class-leading … tools Reviewing and assessing scan results through a risk-based lens Coordinating third-party vulnerability and penetration testing Acting as an escalation point for security issues within the business Liaising with technical and non-technical teams to explain risks and support remediation Contributing to audits and supporting compliance with More ❯
Assistant CISO will play a key role in rewriting and implementing information security standards, collaborating with key stakeholders to ensure alignment with organisational risk management practices, and fostering a proactive security culture across the company.As a key partner to the CISO, this role involves both strategic thinking and practical … industry best practices and align with legal, regulatory, and organisational requirements. Develop and implement guidelines for adherence to these standards across the company. Policy Management: Work closely with the CISO and other security leaders to create, update, and enforce information security policies. Ensure that security policies are effectively communicated … threats and vulnerabilities, and support JRC members in decision-making processes. Hands-On Security Experience: Take an active role in the day-to-day management of security operations, including incident response, threat hunting, vulnerabilitymanagement, and other proactive measures. Provide expertise in implementing technical security solutions and More ❯
Vulnerability Analyst - up to £50K - Manchester (3 days in office) *** We are currently recruiting for an well known consulting organisation, who are looking for an internal facing Vulnerability Analyst to join their team. This role will form part of a growing team, providing a crucial service to secure … their internal IT Estate. This is a Junior - Mid level position, so we're looking for a minimum of 2+ years of vulnerabilitymanagement experience. Key responsibilities are as follows: Identification and ongoing management of vulnerabilities within the IT estate. Analysing identified vulnerabilities through infrastructure scans and … penetration testing. They work with Tenable as their VM platform, but experience with any tooling is fine. Prioritisation of vulnerabilities. Stakeholder management, to engage with business and technical stakeholder to effectively mitigate/resolve issues. Participation in ongoing process improvement activities. This is a great opportunity to join a More ❯
will drive adoption of modern technology meeting HMRCs business driven need towards rationalised strategic platforms. In addition, you may be encouraged to undertake line management responsibilities developing and managing a team. You may be expected to own and develop CSTS capabilities and/or services. Person specification Ideal candidate … security controls and services. Focused expertise to develop and lead within one or many security technology domains aligning capability to security tooling. Key stakeholder management experience across senior business and technical environments including vendors, partners and other government departments. Able to demonstrate a proven history of delivering high value … Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and controls … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory … a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. More ❯
Act as a key liaison between internal stakeholders, managed service providers, and external vendors to ensure operational continuity and alignment with business objectives. Infrastructure Management Oversee the day-to-day performance and availability of core infrastructure systems, including networks, servers, storage, and cloud services. Monitor infrastructure platforms proactively to … units. Service Operations & Technical Support Provide third-line support across infrastructure layers, supporting internal users and IT service desk teams. Maintain and enforce access management protocols for infrastructure components and enterprise applications. Lead incident resolution efforts involving infrastructure systems, ensuring timely escalation to third-party experts when required. Vendor … enhance Microsoft 365 security posture across the organization. Manage the configuration and policy enforcement of Microsoft Intune, including compliance and device security baselines. Oversee vulnerabilitymanagement and endpoint patching activities in partnership with external security consultancies. Administer firewall configurations and ensure consistent deployment across all locations and platforms. More ❯
complex organisation, trading globally within a constantly evolving IT and information security threat environment. Impact of Role Implement governance framework to enable enforcement and management of IT and cyber policies across all JD entities. Help drive good security hygiene and the use of appropriate controls into the business culture … role resides in the Information Security Function and reports to the Global Head of Governance, Risk and Compliance. Direct Reports Individual contributor with possible management of a GRC Analyst and periodic oversight of seconded resources, contingent workers and systems integrators. Key Elements of the Role The job holder will … a company-wide consistent set of policies and standards used across all entities. Implement and maintain a robust policy development lifecycle ensuring effective policy management and review in line with compliance and technological advancements and changes. Analyse incidents and events to identify omissions and opportunities for improvement in accordance More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Suits Me Limited
evidence of controls and contributing to audit readiness activities. Collaborate with the compliance and risk teams to ensure IT operations meet regulatory obligations. Support vulnerabilitymanagement efforts, including patching and system hardening. Assist in maintaining secure and efficient identity and access management practices, including integration with M365 … respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. More ❯
experience as a SOC/Security Engineer within a cloud environment Strong CrowdStrike experience is needed Experience with a range of SIEM, SOAR and vulnerabilitymanagement tools Experience advising on security best practices and developing SOC playbooks Networking and infrastructure experience, including with Firewalls and IDS/IPS More ❯
Services , you're exactly the kind of person they want to speak with. Any hands-on background in DDoS, WAF, IDAM, EDR, MDM , or VulnerabilityManagement ? Even better. They're also super open to people who are coming from an operational security background and want to pivot into More ❯
social events throughout the year. About My Client: My client is an innovative leader in the tech industry, a?multi-award-winning risk-based vulnerabilitymanagement (RBVM) About the Role: We are looking for someone with experience in B2B tech marketing. You will be proactive in researching and More ❯
Security and Networking. Knowledge of SIEM, SOAR, or Managed Security Services is advantageous, particularly in areas like DDoS protection, WAF, IDAM, EDR, MDM, or Vulnerability Management. Multi-vendor knowledge, e.g. Fortinet, Palo Alto, CrowdStrike. Please apply now for immediate consideration More ❯
Security and Networking. Knowledge of SIEM, SOAR, or Managed Security Services is advantageous, particularly in areas like DDoS protection, WAF, IDAM, EDR, MDM, or Vulnerability Management. Multi-vendor knowledge, e.g. Fortinet, Palo Alto, CrowdStrike. Please apply now for immediate consideration More ❯
and third-party partners. Own SOC processes, KPIs, and reporting, ensuring effective service delivery and performance. Drive strategic initiatives in threat intelligence, SIEM, and vulnerability management. Collaborate across IT, business units, and the Deputy CISO to align security operations with organisational goals. What Were Looking For Proven experience leading … a SOC or cyber defence team. Strong expertise in incident response, SIEM, vulnerability and threat management. Experience managing outsourced security services and vendor SLAs. Excellent communication skills, with the ability to engage technical and non-technical stakeholders. A strategic mindset with the ability to balance long-term improvements and More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
DWP Digital
of Active Directory/Entra ID. Strong working knowledge and practical experience in 3rd/4th line knowledge of Windows Server Security, Monitoring and Vulnerability Management. Proven ability and experience of onboarding applications to Entra ID. Strong working knowledge and practical experience of SSO (Azure) & MFA. Significant demonstrable experience … of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management and CyberArk. Extensive experience and proven track record of working in a large enterprise and multi-supplier environment. You and your role We're the folks behind secure access to all …/7 for thousands of users. We manage everything from day-to-day support to long-term projects, including our custom-built Identity Management platform and integrations with ServiceNow. You will help us in pushing forward with cloud adoption across Azure, AWS, and Oracle Cloud. We're all about More ❯