and risk assessments for new features and system changes Evaluate and recommend security technologies and tools Manage security environments across Azure and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerabilityassessment and penetration testing programs Maintain identity and access management controls Maintain ISO27001 certification and manage audit More ❯
will: Lead cyber incident investigations with SOC and client teams Triage and analyse alerts across email, cloud, and hybrid systems Perform threat hunting and develop detection use cases Manage vulnerability assessments and remediation efforts Maintain and optimise DLP tools and incident response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident More ❯
Cyber Security Engineer to join their Service and Support team. The role involves designing and securing OT networks across various critical industries, conducting advanced threat analysis, penetration testing, and vulnerability assessments. The engineer will develop and implement cybersecurity solutions, lead risk mitigation efforts, mentor junior team members, and support project management and business development activities. The position requires travel More ❯
sites and the Stone office. Key Responsibilities of the Senior ICS OT Cyber Security Engineer: Design and secure OT/ICS networks and cross-domain communications. Conduct threat modelling, vulnerability assessments, and red team exercises. Implement cybersecurity solutions, audit systems, and ensure compliance with relevant frameworks. Mentor junior team members and support project delivery. Maintain strong client and stakeholder More ❯
Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
Russell Taylor Group Ltd
within OT/ICS environments, leveraging frameworks such as MITRE ATT&CK for ICS and modelling using Bow-Tie Analysis to proactively identify and exploit vulnerabilities. You'll conduct vulnerability assessments and administrative audits on client computer systems and network devices considering the sensitivity of Operational Technology testing. You'll lead collaboration efforts with other cybersecurity experts on team More ❯
Nottinghamshire, England, United Kingdom Hybrid / WFH Options
Digital Waffle
response plans, ensuring continuous improvements Integrate security practices seamlessly into the DevOps pipeline Manage and optimise monitoring tools to provide real-time threat visibility Carry out regular threat and vulnerability assessments, applying effective remediation strategies Coach and mentor colleagues, keeping the team ahead of evolving risks and technologies What you bring: Significant experience in security operations across both cloud More ❯
nottingham, midlands, united kingdom Hybrid / WFH Options
Digital Waffle
response plans, ensuring continuous improvements Integrate security practices seamlessly into the DevOps pipeline Manage and optimise monitoring tools to provide real-time threat visibility Carry out regular threat and vulnerability assessments, applying effective remediation strategies Coach and mentor colleagues, keeping the team ahead of evolving risks and technologies What you bring: Significant experience in security operations across both cloud More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners Vulnerability Assessments : Help run scans to identify weaknesses in systems and recommend remediation actions Policy and Compliance Support : Assist in ensuring the organisation meets security standards (e.g. More ❯
Nottingham, Nottinghamshire, England, United Kingdom Hybrid / WFH Options
Digital Waffle
response plans, ensuring continuous improvements Integrate security practices seamlessly into the DevOps pipeline Manage and optimise monitoring tools to provide real-time threat visibility Carry out regular threat and vulnerability assessments, applying effective remediation strategies Coach and mentor colleagues, keeping the team ahead of evolving risks and technologies What you bring: Significant experience in security operations across both cloud More ❯
strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security practices. Manage the relationship with the external SOC, ensuring proactive threat detection and response. Stay updated on industry More ❯
Birmingham, Chelmsley Wood, West Midlands (County), United Kingdom
SSR General & Management
strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security practices. Manage the relationship with the external SOC, ensuring proactive threat detection and response. Stay updated on industry More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
NLB Services
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
leicester, midlands, united kingdom Hybrid / WFH Options
NLB Services
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
binley, midlands, united kingdom Hybrid / WFH Options
NLB Services
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
West Midlands Ambulance Service University NHS Foundation Trust
maintained Disability Confident Leader status and as part of our commitments to this we guarantee to invite all applicants who meet the essential criteria for a role to attend assessment or interview. If you have a disability or learning difficulty, and prefer to disclose it, please feel free to do so in your application. You can also contact the … out complex projects pertinent to the work of the Trust under the direction of the Head of IT Security, assisting the production of management information, reports and recommendations. Conduct vulnerability assessments and other associated activities as appropriate underpinned by theoretical knowledge and relevant practical experience. within the Trust to Identify, remediate and mitigate risks to the Trust. Liaise with … NHS England, NCSC and other relevant bodies as required ensuring IT Security advisories, directives and notifications are actioned and logged. This includes but is not limited to threat & vulnerability alerts, vendor and other specialist threat intelligence feeds. Ensure all systems and applications where applicable are kept up to date and are encompassed in the patch management routine as detailed More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
RSM UK
enthusiastic Cyber Security Consultant to join our team. Working alongside our experienced team of specialists, you'll deliver offensive security services including digital footprint reconnaissance, social engineering, penetration testing, vulnerability assessments, and more to high-profile clients across all industries. The purpose of this role is to deliver offensive security services such as digital footprint reconnaissance, social engineering, vulnerabilityMore ❯