Equinox House Silver Fox Way, Cobalt Business Park, Newcastle Upon Tyne, England
CYBIT LIMITED
customers providing technical support and maintenance to all supported IT business users, systems, hardware, and applications. As well as our Managed Service division, we also have Data & Analytics and CyberSecurity specialist arms to the business, setting us apart from other IT consultancies. More ❯
Cobalt Business Park, Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom
QA
customers providing technical support and maintenance to all supported IT business users, systems, hardware, and applications. As well as our Managed Service division, we also have Data & Analytics and CyberSecurity specialist arms to the business, setting us apart from other IT consultancies. Overview: Rapid growth, huge opportunities and exciting challenges mean we're looking for brilliant people to join More ❯
North Cumbria Integrated Care NHS Foundation Trust
methodologies Healthcare Finance Specifying requirements Contract management Estimation methods for scheduling Quality management processes; metrics for processes and quality standards Development of stakeholder management and communications plans Information Governance & CyberSecurity requirements Skills & Aptitudes Essential Takes responsibility for own learning, development and behaviour - actively seeks to develop and demonstrate own competence Effective interpersonal and communication skills including facilitation, obtaining, providing More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Spiral Solutions Recruitment Limited
vendors and third-party providers to source and implement solutions. Strong knowledge of system and infrastructure design especially with modern workplace technologies. Experience with networks and firewalls Understanding of cybersecurity principles and data protection regulations. Familiarity with project management tools and methodologies, such as Agile or Scrum. Soft Skills Excellent problem-solving and analytical abilities. Strong communication and interpersonal skills. More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
Kickstart Your Career in CyberSecurity Are you fascinated by ethical hacking, cyber threats, and protecting systems from digital attacks? Looking to break into the fast-growing field of cybersecurity? This is your chance to turn your passion into a profession. We’re looking for a motivated and curious Graduate CyberSecurity Analyst to join our expert security team. … role, you’ll learn how to defend systems, investigate incidents, and help protect the organisation from cyber risks — all while being mentored by experienced professionals. Whether you’ve studied cybersecurity, computer science, or a related field — or completed a bootcamp or personal projects — we want to hear from you What You’ll Be Doing As a Graduate CyberSecurity … Incident Investigation : Support in analysing and documenting cyber incidents, learning how to trace root causes Research & Learning : Stay up to date on the latest threats, vulnerabilities, and trends in cybersecurity What We’re Looking For We’re not expecting years of experience — we’re looking for potential, enthusiasm, and a willingness to learn. Essential: A recent graduate (or soon More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
Kickstart Your Career in CyberSecurity Are you fascinated by ethical hacking, cyber threats, and protecting systems from digital attacks? Looking to break into the fast-growing field of cybersecurity? This is your chance to turn your passion into a profession. We’re looking for a motivated and curious Graduate CyberSecurity Analyst to join our expert security team. … role, you’ll learn how to defend systems, investigate incidents, and help protect the organisation from cyber risks — all while being mentored by experienced professionals. Whether you’ve studied cybersecurity, computer science, or a related field — or completed a bootcamp or personal projects — we want to hear from you What You’ll Be Doing As a Graduate CyberSecurity … Incident Investigation : Support in analysing and documenting cyber incidents, learning how to trace root causes Research & Learning : Stay up to date on the latest threats, vulnerabilities, and trends in cybersecurity What We’re Looking For We’re not expecting years of experience — we’re looking for potential, enthusiasm, and a willingness to learn. Essential: A recent graduate (or soon More ❯
looking for from you? An understanding of threat modelling frameworks and processes e.g. PASTA, OWASP Threat Dragon, DREAD, STRIDE-LM, OCTAVE, MITRE ATT&CK. Up to date knowledge of cybersecurity threats, threat actor motivation and capability, and relevant threat group TTPs. An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards More ❯
programmes to support improvement and change arising from NHS policy, clinical practice and other significant developments. The postholder will ensure the appropriate mechanisms are in place to effectively manage cybersecurity providing assurance to the board that all statutory requirements and proactive security measures are taken. As the prime technology authority and expert, the Chief Technical Officer is responsible for More ❯
understanding of Microsoft 365, SharePoint, and end-user computing.· Application support experience (ERP or similar business systems).· Good understanding of networks and infrastructure fundamentals.· Awareness of IT and cybersecurity risks and mitigation practices.· Proactive and customer-focused approach to IT delivery.· Excellent communication skills with the ability to train and support colleagues. This is a fantastic opportunity to More ❯
with Robotics Middleware (e.g., ROS) and distributed robotics systems Simulation, Robotics and Machine Learning knowledge Experience deploying robots and/or autonomous vehicles in real world environments Experience in cybersecurity and/or Secure by Design concepts Experience designing and implementing secure software solutions Experience with automating application deployment and environment configuration management Software verification and deployment techniques An understanding More ❯
Strong leadership and communication abilities; experience in cross-functional collaboration. Familiarity with agile development methodologies and tools. Experience with AI/ML applications in cardiology or diagnostics. Knowledge of cybersecurity and data privacy regulations (e.g., HIPAA, GDPR). Experience with international teams and global product launches. Attributes We Value Creative thinker, proactive problem solver, and passionate about improving patient care More ❯
90k Are you a data technologist looking for an opportunity to progress your career in a hands-on, impactful role with lots of ownership? You could be joining a Cybersecurity technology company and enjoying a huge range of perks and benefits from continual learning and self-development opportunities (including "buy any book" policy) through to health and well-being, enhanced More ❯
90k Are you a data technologist looking for an opportunity to progress your career in a hands-on, impactful role with lots of ownership? You could be joining a Cybersecurity technology company and enjoying a huge range of perks and benefits from continual learning and self-development opportunities (including "buy any book" policy) through to health and well-being, enhanced More ❯
90k Are you a data technologist looking for an opportunity to progress your career in a hands-on, impactful role with lots of ownership? You could be joining a Cybersecurity technology company and enjoying a huge range of perks and benefits from continual learning and self-development opportunities (including "buy any book" policy) through to health and well-being, enhanced More ❯
thrive in a collaborative environment, we want to hear from you About Thinc We are an IT Solutions company providing cutting-edge finance software, ERP systems, managed IT support, cybersecurity solutions, and cloud management to unlock a business's full potential. We help ambitious SMEs scale up with over 30 years of experience across multiple leading platforms, offering independent More ❯
ensure quality and value for money. Ensure servers, storage, and networks remain secure, stable, and high-performing. Lead infrastructure projects such as system upgrades, migrations, and process enhancements. Promote cybersecurity best practices, ensuring compliance with internal policies and controls. Manage the helpdesk ticketing system and maintain accurate support documentation. Support facilities management to ensure physical and digital infrastructure needs are More ❯
Northwich, Marston, Cheshire West and Chester, Cheshire, United Kingdom
Adria Solutions Ltd
ensure quality and value for money. Ensure servers, storage, and networks remain secure, stable, and high-performing. Lead infrastructure projects such as system upgrades, migrations, and process enhancements. Promote cybersecurity best practices, ensuring compliance with internal policies and controls. Manage the helpdesk ticketing system and maintain accurate support documentation. Support facilities management to ensure physical and digital infrastructure needs are More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Encircle Solutions
IT support (1st Line, Service Desk, or similar) with a clear track record of solving technical issues in live business environments. Practical, hands-on experience with AWS infrastructure and cybersecurity tools — we’re looking for candidates who have actively worked with AWS environments, not just studied or experimented with them. A curious mindset and eagerness to learn new tools and More ❯
Job Description: Strategic Planning and Governance Develop, review, and maintain the IT Security Strategy in line with organisational goals and regulatory obligations. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprise architecture and digital strategy. Participate in board-level or senior management discussions around cyber risk. Identify and manage strategic security risks (technical, legal, reputational … project governance to embed security early in the lifecycle. Represent the organisation at regional and national forums (e.g., WARP, NCSC, iNetwork). Training, Awareness, and Culture Lead and support cybersecurity awareness and training campaigns. Build a security-conscious culture across the organisation. Work with HR and Learning & Development to embed cyber hygiene into inductions and role-based training. Incident Management More ❯
gross umbrella. Key Responsibilities Strategic Planning and Governance Develop, review, and maintain the IT Security Strategy aligned to organisational objectives and statutory duties. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprise architecture and digital transformation strategy. Advise senior management and boards on cyber risk posture, incidents, and mitigations. Identify and manage strategic risks — technical … threats and industry trends. Champion automation and innovation in security operations (e.g. SOAR, XDR). Drive security maturity assessments and roadmap development. Essential Experience Proven leadership in IT or cybersecurity at enterprise or local authority level. Strong understanding of security governance, risk management, and compliance. Hands-on experience with cloud, network, and identity security. Familiarity with UK public sector More ❯
Responsibilities and Activities Strategic Planning and Governance Develop, review, and maintain the IT Security Strategy in line with organisational goals and regulatory obligations. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprise architecture and digital strategy. Participate in board-level or senior management discussions around cyber risk. Identify and manage strategic security risks (technical, legal … project governance to embed security early in the lifecycle. Represent the organisation at regional and national forums (e.g., WARP, NCSC, iNetwork). Training, Awareness, and Culture Lead and support cybersecurity awareness and training campaigns. Build a security-conscious culture across the organisation. Work with HR and Learning & Development to embed cyber hygiene into inductions and role-based training. Incident Management More ❯
candidate will take ownership of server and network maintenance, manage system upgrades, oversee backups and disaster recovery, and administer Office 365 , Azure , and Intune environments. You will also support cybersecurity initiatives, assist in delivering long-term digital projects, and provide technical guidance to junior team members. Ideally looking for someone with at least five years of experience in IT More ❯
secure electronic records for the project. Manage and support the population of the Common Data Environment (CDE) for all stakeholders. Fulfil compliance requirements set forth in the Project Agreement. Cybersecurity Oversight: Implement measures to protect against potential security risks, including unauthorised access, malware, and other vulnerabilities. Ensure all third parties and subcontractors comply with established information security practices. Personnel Management More ❯
Role: QA Engineer Location: Manchester Are you an experienced QA Engineer looking for your next challenge within Defence and CyberSecurity? This is an exciting opportunity to join a growing technology team working on modern projects across the UK. We are seeking a QA Engineer with a passion for quality and innovation. You'll contribute to designing and developing automated More ❯
lifecycles, and releases. Identify opportunities for automation and integration to enhance workflows. · Coordinate and participate in product testing to validate changes. · Work closely with cross-functional teams (PMO, Architecture, CyberSecurity, Finance, Infrastructure). · Drive user adoption and engagement, measuring TCO, business value, and enablement. · Facilitate training sessions and create educational materials. · Document the iManage application landscape, integration points, data More ❯