Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
BT Group
platform environments. Relevant certifications (e.g., CISSP, CISM) are a plus. Experience in security architecture, especially in networks and hosting platforms. Strong knowledge of network security protocols, firewalls, VPNs, and intrusiondetection systems. Excellent analytical and problem-solving skills. Ability to communicate complex security concepts to non-technical stakeholders. Additional benefits include family leave, women's health support, annual More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Robert Walters
new solutions as required. Contribute to the deployment of advanced security tools and technologies that enhance the organisation's overall cyber resilience. Oversee the incident management process by supporting detection, response, reporting, and resolution of security incidents. Prepare clear security metrics reports for stakeholders at all levels to inform decision-making and demonstrate progress against objectives. Promote a culture … highly valued. Recognised information security frameworks such as ISO 27001 or NIST ensures you can contribute meaningfully to policy development. A solid understanding of core security technologies-including firewalls, intrusiondetection systems, endpoint protection platforms-and their practical application is important. Experience supporting vulnerability management processes from identification through remediation demonstrates your ability to manage risk proactively. Proficiency More ❯
DE23 8NX, Derby, Derbyshire, United Kingdom Hybrid / WFH Options
Rolls Royce
and the technical skills required to develop, implement, and secure such cyber-physical systems. Experience or interest in cybersecurity and cyber threats (ie - designing secure products, systems, and applications; intrusiondetection; digital forensics; system recovery; risk assessment tools and methods; security solutions, policies, standards, and procedures, etc.). Knowledge and/or experience in applying Product Security policies More ❯