a diverse and complex digital estate. You'll shape the direction of our security operations, optimise the use of key platforms, develop our threat management approach, and drive improvements in our incident response and vulnerabilitymanagement capabilities. You'll also take the lead in developing meaningful KPIs … Operations Centre (SOC), managing a team of analysts, engineers and external partners to ensure effective monitoring, detection, and response to cyber threats. Provide line management and leadership to the SOC team, including performance management, mentoring, and professional development, while fostering a collaborative and high-performing culture aligned with … escalation paths, and workflows. Define and report on KPIs, SLAs, and performance metrics to measure operational effectiveness and support strategic decision-making. Oversee threat management, SIEM optimisation, and vulnerabilitymanagement activities, ensuring tools and workflows are continually tuned for impact. Serve as the main point of contact More ❯
as part of a wider tech transformation. As part of this growth, we’re looking for an Information Security Analyst (VM) to join their VulnerabilityManagement team. This role will play a pivotal part in protecting the business by owning the vulnerability scanning and assessment process, coordinating … third-party testing, and helping drive remediation plans. It’s a great opportunity for someone with hands-on technical experience in vulnerabilitymanagement who’s looking to deepen their expertise in a fast-paced, hybrid environment. Responsibilities: Conducting vulnerability scanning across all business endpoints using class-leading … tools Reviewing and assessing scan results through a risk-based lens Coordinating third-party vulnerability and penetration testing Acting as an escalation point for security issues within the business Liaising with technical and non-technical teams to explain risks and support remediation Contributing to audits and supporting compliance with More ❯
manchester, north west england, United Kingdom Hybrid / WFH Options
James Adams
as part of a wider tech transformation. As part of this growth, we’re looking for an Information Security Analyst (VM) to join their VulnerabilityManagement team. This role will play a pivotal part in protecting the business by owning the vulnerability scanning and assessment process, coordinating … third-party testing, and helping drive remediation plans. It’s a great opportunity for someone with hands-on technical experience in vulnerabilitymanagement who’s looking to deepen their expertise in a fast-paced, hybrid environment. Responsibilities: Conducting vulnerability scanning across all business endpoints using class-leading … tools Reviewing and assessing scan results through a risk-based lens Coordinating third-party vulnerability and penetration testing Acting as an escalation point for security issues within the business Liaising with technical and non-technical teams to explain risks and support remediation Contributing to audits and supporting compliance with More ❯
bolton, greater manchester, north west england, United Kingdom Hybrid / WFH Options
James Adams
as part of a wider tech transformation. As part of this growth, we’re looking for an Information Security Analyst (VM) to join their VulnerabilityManagement team. This role will play a pivotal part in protecting the business by owning the vulnerability scanning and assessment process, coordinating … third-party testing, and helping drive remediation plans. It’s a great opportunity for someone with hands-on technical experience in vulnerabilitymanagement who’s looking to deepen their expertise in a fast-paced, hybrid environment. Responsibilities: Conducting vulnerability scanning across all business endpoints using class-leading … tools Reviewing and assessing scan results through a risk-based lens Coordinating third-party vulnerability and penetration testing Acting as an escalation point for security issues within the business Liaising with technical and non-technical teams to explain risks and support remediation Contributing to audits and supporting compliance with More ❯
is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerabilitymanagement programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 … Information Security Management System. Ensure cyber security compliance with company policies, standards, and obligations. What You'll Need to Succeed: 2 years + Experience in a cyber-security role Working knowledge of technical and cyber security standards Working knowledge of industry best practices (such as NIST Framework, OWASP top … ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerabilitymanagement tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to the ISO27001 standard Cloud More ❯
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerabilitymanagement programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 … Information Security Management System. Ensure cyber security compliance with company policies, standards, and obligations. What You'll Need to Succeed: 2 years + Experience in a cyber-security role Working knowledge of technical and cyber security standards Working knowledge of industry best practices (such as NIST Framework, OWASP top … ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerabilitymanagement tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to the ISO27001 standard Cloud More ❯
bolton, greater manchester, north west england, United Kingdom
SearchWorks
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerabilitymanagement programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 … Information Security Management System. Ensure cyber security compliance with company policies, standards, and obligations. What You'll Need to Succeed: 2 years + Experience in a cyber-security role Working knowledge of technical and cyber security standards Working knowledge of industry best practices (such as NIST Framework, OWASP top … ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerabilitymanagement tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to the ISO27001 standard Cloud More ❯
Assistant CISO will play a key role in rewriting and implementing information security standards, collaborating with key stakeholders to ensure alignment with organisational risk management practices, and fostering a proactive security culture across the company.As a key partner to the CISO, this role involves both strategic thinking and practical … industry best practices and align with legal, regulatory, and organisational requirements. Develop and implement guidelines for adherence to these standards across the company. Policy Management: Work closely with the CISO and other security leaders to create, update, and enforce information security policies. Ensure that security policies are effectively communicated … threats and vulnerabilities, and support JRC members in decision-making processes. Hands-On Security Experience: Take an active role in the day-to-day management of security operations, including incident response, threat hunting, vulnerabilitymanagement, and other proactive measures. Provide expertise in implementing technical security solutions and More ❯
Vulnerability Analyst - up to £50K - Manchester (3 days in office) *** We are currently recruiting for an well known consulting organisation, who are looking for an internal facing Vulnerability Analyst to join their team. This role will form part of a growing team, providing a crucial service to secure … their internal IT Estate. This is a Junior - Mid level position, so we're looking for a minimum of 2+ years of vulnerabilitymanagement experience. Key responsibilities are as follows: Identification and ongoing management of vulnerabilities within the IT estate. Analysing identified vulnerabilities through infrastructure scans and … penetration testing. They work with Tenable as their VM platform, but experience with any tooling is fine. Prioritisation of vulnerabilities. Stakeholder management, to engage with business and technical stakeholder to effectively mitigate/resolve issues. Participation in ongoing process improvement activities. This is a great opportunity to join a More ❯
Vulnerability Analyst - up to £50K - Manchester (3 days in office) *** We are currently recruiting for an well known consulting organisation, who are looking for an internal facing Vulnerability Analyst to join their team. This role will form part of a growing team, providing a crucial service to secure … their internal IT Estate. This is a Junior - Mid level position, so we're looking for a minimum of 2+ years of vulnerabilitymanagement experience. Key responsibilities are as follows: Identification and ongoing management of vulnerabilities within the IT estate. Analysing identified vulnerabilities through infrastructure scans and … penetration testing. They work with Tenable as their VM platform, but experience with any tooling is fine. Prioritisation of vulnerabilities. Stakeholder management, to engage with business and technical stakeholder to effectively mitigate/resolve issues. Participation in ongoing process improvement activities. This is a great opportunity to join a More ❯
bolton, greater manchester, north west england, United Kingdom
Searchstone Ltd
Vulnerability Analyst - up to £50K - Manchester (3 days in office) *** We are currently recruiting for an well known consulting organisation, who are looking for an internal facing Vulnerability Analyst to join their team. This role will form part of a growing team, providing a crucial service to secure … their internal IT Estate. This is a Junior - Mid level position, so we're looking for a minimum of 2+ years of vulnerabilitymanagement experience. Key responsibilities are as follows: Identification and ongoing management of vulnerabilities within the IT estate. Analysing identified vulnerabilities through infrastructure scans and … penetration testing. They work with Tenable as their VM platform, but experience with any tooling is fine. Prioritisation of vulnerabilities. Stakeholder management, to engage with business and technical stakeholder to effectively mitigate/resolve issues. Participation in ongoing process improvement activities. This is a great opportunity to join a More ❯
will drive adoption of modern technology meeting HMRCs business driven need towards rationalised strategic platforms. In addition, you may be encouraged to undertake line management responsibilities developing and managing a team. You may be expected to own and develop CSTS capabilities and/or services. Person specification Ideal candidate … security controls and services. Focused expertise to develop and lead within one or many security technology domains aligning capability to security tooling. Key stakeholder management experience across senior business and technical environments including vendors, partners and other government departments. Able to demonstrate a proven history of delivering high value … Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and controls … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory … a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. More ❯
manchester, north west england, United Kingdom Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
stockport, north west england, United Kingdom Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
bolton, greater manchester, north west england, United Kingdom Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
Act as a key liaison between internal stakeholders, managed service providers, and external vendors to ensure operational continuity and alignment with business objectives. Infrastructure Management Oversee the day-to-day performance and availability of core infrastructure systems, including networks, servers, storage, and cloud services. Monitor infrastructure platforms proactively to … units. Service Operations & Technical Support Provide third-line support across infrastructure layers, supporting internal users and IT service desk teams. Maintain and enforce access management protocols for infrastructure components and enterprise applications. Lead incident resolution efforts involving infrastructure systems, ensuring timely escalation to third-party experts when required. Vendor … enhance Microsoft 365 security posture across the organization. Manage the configuration and policy enforcement of Microsoft Intune, including compliance and device security baselines. Oversee vulnerabilitymanagement and endpoint patching activities in partnership with external security consultancies. Administer firewall configurations and ensure consistent deployment across all locations and platforms. More ❯
Act as a key liaison between internal stakeholders, managed service providers, and external vendors to ensure operational continuity and alignment with business objectives. Infrastructure Management Oversee the day-to-day performance and availability of core infrastructure systems, including networks, servers, storage, and cloud services. Monitor infrastructure platforms proactively to … units. Service Operations & Technical Support Provide third-line support across infrastructure layers, supporting internal users and IT service desk teams. Maintain and enforce access management protocols for infrastructure components and enterprise applications. Lead incident resolution efforts involving infrastructure systems, ensuring timely escalation to third-party experts when required. Vendor … enhance Microsoft 365 security posture across the organization. Manage the configuration and policy enforcement of Microsoft Intune, including compliance and device security baselines. Oversee vulnerabilitymanagement and endpoint patching activities in partnership with external security consultancies. Administer firewall configurations and ensure consistent deployment across all locations and platforms. More ❯
bolton, greater manchester, north west england, United Kingdom
Stelvio Group
Act as a key liaison between internal stakeholders, managed service providers, and external vendors to ensure operational continuity and alignment with business objectives. Infrastructure Management Oversee the day-to-day performance and availability of core infrastructure systems, including networks, servers, storage, and cloud services. Monitor infrastructure platforms proactively to … units. Service Operations & Technical Support Provide third-line support across infrastructure layers, supporting internal users and IT service desk teams. Maintain and enforce access management protocols for infrastructure components and enterprise applications. Lead incident resolution efforts involving infrastructure systems, ensuring timely escalation to third-party experts when required. Vendor … enhance Microsoft 365 security posture across the organization. Manage the configuration and policy enforcement of Microsoft Intune, including compliance and device security baselines. Oversee vulnerabilitymanagement and endpoint patching activities in partnership with external security consultancies. Administer firewall configurations and ensure consistent deployment across all locations and platforms. More ❯
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerabilitymanagement tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerabilitymanagement tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
bolton, greater manchester, north west england, United Kingdom
Emeria
policies, configurations, and incident response procedures. Collaborate with the IT Security Manager and other stakeholders to align security practices with the organisation's risk management strategy. Stay updated on the latest Microsoft security technologies, threats, and best practices, and proactively suggest improvements to the current security framework. Person Specification … Proven ability to monitor and respond to security incidents, including incident analysis and resolution. Demonstrated proficiency in identifying and remediating vulnerabilities, with knowledge of vulnerabilitymanagement tools and frameworks. Experience collaborating with governance and compliance teams to align technical controls with security standards (e.g., ISO 27001). Excellent More ❯
stockport, north west england, United Kingdom Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable VulnerabilityManagement (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
manchester, north west england, United Kingdom Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable VulnerabilityManagement (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯