Newcastle upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
street discounts! Main duties of the job Key Responsibilitie s: Leadership : Provide strategic leadership for the Security Architecture function within the DDaT department. Team Management : Manage the security architecture team and oversee key deliverables related to security architecture and posture. Consultancy : Offer advice, guidance, and consultancy on new and … Stakeholder Engagement : Facilitate collaborative approaches, prioritize requirements, and optimize resource utilization.Technical Expertise: Advise on standards, methods, tools, and applications to deliver optimal solutions. Blueprint Management : Control IT Security Blueprints, defining end state architecture, current state, and transition roadmaps. Roadmap Execution : Support the creation and execution of technology and service … Security Architecture requirements and capabilities to deliver on the strategic direction and to-be architecture in line with best practice and required standards. Ongoing management of staff including all line management responsibilities, performance management including embedding GROW, appraisals, disciplinary, and standard HR processes for Security Architecture.4. Working More ❯
dunfermline, north east scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
months Inside IR35 A small Edinburgh Financial Services organisation is currently seeking an experienced Information Security Analyst or Engineer with a strong background in vulnerabilitymanagement , to join their team on an initial 6 month Contract. The Contract will involve assessing vulnerability reports and collaborating with cross … functional teams to ensure timely mitigation & to be successful, key knowledge & experience should include: Recent experience working as a Security Analyst, Security Engineer or Vulnerability Analyst with strong experience with complex information security projects . In-depth knowledge & expertise of Information Security standards, technologies & methodologies etc (e.g., ISO27001 ). … Strong grasp of security best practices , risk management , and compliance . Particular focus on VulnerabilityManagement utilising SAST/DAST tools , especially Tenable . Familiarity with Azure DevOps for tracking work items. Ability to work independently and in agile teams. Excellent communication and stakeholder management skills More ❯
aberdeen, north east scotland, United Kingdom Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
newcastle-upon-tyne, tyne and wear, north east england, United Kingdom Hybrid / WFH Options
Logiq
Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and … s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why … industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber More ❯
dunfermline, north east scotland, United Kingdom Hybrid / WFH Options
Adam Appointments Limited
ensuring strong engagement with clients and internal teams 2-3 days per week in the office (Edinburgh or Glasgow.) Key Responsibilities:: Client Advisory & Relationship Management • Act as a trusted advisor to clients, providing expert cyber security guidance and ensuring compliance with industry regulations, frameworks, and best practices (e.g., FCA … a top business priority. • Identify key cyber security challenges and provide tailored solutions to mitigate risks and enhance resilience. • Support clients in cyber risk management, governance, and regulatory compliance, helping them to align their security strategies with business objectives and industry mandates. Strategic Leadership & Business Growth • Work closely with … clients, ensuring successful project delivery within agreed timelines and budgets. • Provide strategic oversight on a wide range of cyber security areas, including: Threat and vulnerabilitymanagement Identity and access management (IAM) Cloud security and data protection Cyber incident response and resilience Security architecture and digital transformation initiatives More ❯
aberdeen, north east scotland, United Kingdom Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable VulnerabilityManagement (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
newcastle-upon-tyne, tyne and wear, north east england, United Kingdom Hybrid / WFH Options
Ultima
the design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable VulnerabilityManagement (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/… be provided if required. Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management (PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
aberdeen, north east scotland, United Kingdom Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
newcastle-upon-tyne, tyne and wear, north east england, United Kingdom Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
DWP Digital
of Active Directory/Entra ID. Strong working knowledge and practical experience in 3rd/4th line knowledge of Windows Server Security, Monitoring and Vulnerability Management. Proven ability and experience of onboarding applications to Entra ID. Strong working knowledge and practical experience of SSO (Azure) & MFA. Significant demonstrable experience … of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management and CyberArk. Extensive experience and proven track record of working in a large enterprise and multi-supplier environment. You and your role We're the folks behind secure access to all …/7 for thousands of users. We manage everything from day-to-day support to long-term projects, including our custom-built Identity Management platform and integrations with ServiceNow. You will help us in pushing forward with cloud adoption across Azure, AWS, and Oracle Cloud. We're all about More ❯