telephony/contact center platforms, and cloud data services. • Define correlation rules and alerts for proactive incident detection and response. Application Security: • Conduct secure code reviews, threat modelling, and vulnerability assessments. • Work with development and operations teams to integrate security into the SDLC and CI/CD pipelines. More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
encryption. * Ensure the security and integrity of the organisation's network infrastructure. * Collaborate with various departments to develop and enforce network security policies and procedures. * Conduct security assessments and vulnerability assessments to identify and mitigate potential risks. * Development of OT security solutions * Stay up to date with the latest industry trends and emerging technologies in network security. * Provide support More ❯
encryption. Ensure the security and integrity of the organisation’s network infrastructure. Collaborate with various departments to develop and enforce network security policies and procedures. Conduct security assessments and vulnerability assessments to identify and mitigate potential risks. Development of OT security solutions Stay up to date with the latest industry trends and emerging technologies in network security. Provide support More ❯
for a driven technology auditor who wants to play a role in audit execution which focuses on the review of technology processes, the analysis of risks involved, and the assessment of the design and operating effectiveness of the controls implemented to mitigate the risk. Audits may include the assessment of areas such as access management, IT operations, job … scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerabilityassessment and penetration testing, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology consulting or other relevant industry experience Basic understanding of software More ❯
those risks. Audits may include areas such as access management, IT operations, job scheduling/monitoring, data transfer (ensuring completeness and accuracy), network security, cybersecurity, system development and testing, vulnerability assessments, penetration testing, and operational resilience. This is a contract-to-hire position under Inside IR35, onsite in Birmingham 5 days a week. MUST HAVES: Experience as a technology … application development, information security, technology consulting, or relevant industry experience Basic understanding of software development concepts, system architecture, databases, operating systems, and messaging Proven experience in risk identification and assessment Ability to prepare and present audit conclusions and findings to senior management and stakeholders Knowledge of data analysis using Excel A strong interest in building a long-term career More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
RSM
Cyber Security Consultant to join our team at RSM UK. You will work alongside our specialists to deliver offensive security services including digital footprint reconnaissance, social engineering, penetration testing, vulnerability assessments, and more to high-profile clients across various industries. The role involves delivering cyber risk and control assessments, developing cyber programs, and conducting offensive security services such as … vulnerability assessments and cyber incident response exercises. You will receive ongoing coaching, career mentoring, and support through our career pathway, with opportunities to develop market-leading skills and professional growth. Key Responsibilities: Supporting technical scoping activities for client assignments. Delivering fieldwork and preparing reports. Managing tasks effectively to completion. Staying updated on the latest cyber threats and technology trends. More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
policies, and procedures to ensure clear understanding across the organisation. * Stay up-to-date with the latest security trends, technologies, and regulations to continuously improve our security practices. * Conduct vulnerability assessments and risk analysis. * Conduct Security Audits and Assessments: Perform regular security assessments to ensure compliance with industry standards. * Create and maintain security policies to ensure data confidentiality, integrity More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯
the delivery of high-impact solutions. What You’ll Be Doing: Lead the delivery of complex OT cyber projects, from design and planning to execution. Conduct OT/ICS vulnerability assessments and support remediation efforts. Provide expert advice on secure design and implementation of industrial systems (SCADA, ICS, DCS). Work across technical and non-technical teams, translating complex More ❯
exposure in identifying, preventing, and responding to digital threats while learning key tools and best practices in IT security. Responsibilities: ️ Assist in monitoring networks for security breaches ️ Help conduct vulnerability assessments and audits ️ Research the latest cybersecurity threats and trends ️ Support the implementation of security tools and protocols ️ Participate in phishing simulations and awareness training ️ Document and analyze incidents More ❯
Birmingham, West Midlands, England, United Kingdom
James Andrew Recruitment Solutions (JAR Solutions)
organisation Analyse future AI possibilities to drive operational efficiencies Identify and mitigate emerging technology challenges Security & Compliance: Ensure robust GDPR practices and data protection protocols Manage cybersecurity frameworks and vulnerability assessments Develop and test business continuity and disaster recovery plans Maintain IT policies and procedures for new technologies Operational Excellence: Coordinate with third-party IT providers for seamless service More ❯