Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
4SQUARE RECRUITMENT LTD
to organizations of all sizes. The team supports a broad range of cutting-edge security technologies, helping customers secure their networks, applications, and infrastructure through proactive monitoring, management, and incident response. As demand for managed firewall and security services grows, my client is looking for a Network Engineer with strong networking fundamentals and a willingness to learn advanced security … Role Overview As a Network Engineer within the Security Operations Center (SOC), you will help manage and support customer network security environments. Youll work on firewall configurations, troubleshooting, and incidentresponse, while gaining exposure to SIEM tools and advanced security solutions. Full training and development opportunities will be provided. Key Responsibilities Monitor and manage client firewalls, VPNs, and More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
to organizations of all sizes. The team supports a broad range of cutting-edge security technologies, helping customers secure their networks, applications, and infrastructure through proactive monitoring, management, and incident response. As demand for managed firewall and security services grows, my client is looking for a Network Engineer with strong networking fundamentals and a willingness to learn advanced security … Overview As a Network Engineer within the Security Operations Center (SOC), you will help manage and support customer network security environments. You’ll work on firewall configurations, troubleshooting, and incidentresponse, while gaining exposure to SIEM tools and advanced security solutions. Full training and development opportunities will be provided. Key Responsibilities Monitor and manage client firewalls, VPNs, and More ❯
controls. You'll support the delivery of their Cyber Security Sub Strategy in line with the Cyber Assessment Framework, and contribute to the design and operation of threat intelligence, incidentresponse, vulnerability management, and ethical hacking capabilities. You'll work closely with internal stakeholders and external partners to ensure compliance with ISO27001, Cyber Essentials+, and other regulatory frameworks. More ❯
level. * Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. * SSH Key Management. * Certificate management * HSM configuration/installation/support * Incident management * Change management * ITIL * Ensure the integrity and availability of cryptographic and key management services to business functions and applications Key Accountabilities: * Cryptographic Hardware Management - including on site local … core geographic locations globally. * Management of Cryptographic infrastructure to include Out of Hours Support, production of Monthly management information and risk statements. * Adherence to Group IT Security Standards. * Problem, Incident & Change Management including root cause identification. * Procedure/process development. * Project delivery. * Cryptographic Hardware Management. * Auditable Record Management. * Excellent Risk and Control Maintenance * Ensure governance and clear record keeping … creation and maintenance. * Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality * Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. * Experience of SharePoint, Confluence and JIRA. * Unix/Windows O/S skills More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Investigo
activities Perform SSH key and certificate management Support cryptographic key lifecycle activities: generation, distribution, storage, recovery, and deletion Maintain accurate documentation and perform regular risk and compliance checks Handle incident, problem, and change management processes (aligned with ITIL best practices) Ensure strong governance, audit trails, and adherence to Barclays' IT Security Standards Contribute to automation and scripting efforts (e.g. … in security and/or project management Experience with Unix/Windows operating systems Proficiency in tools such as SharePoint, Confluence, and JIRA Understanding of compliance, data protection, and incidentresponse best practices Experience creating and maintaining operational documentation If you are interested and looking for your next role, please apply with a copy of your CV or More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
LTIMindtree
Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusion detection prevention systems as well as with SIEM tools and security incidentresponse Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse stakeholders More ❯
warrington, cheshire, north west england, united kingdom Hybrid / WFH Options
LTIMindtree
Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusion detection prevention systems as well as with SIEM tools and security incidentresponse Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse stakeholders More ❯
Sheffield, South Yorkshire, England, United Kingdom
Reed
security policies, regulatory requirements, and industry best practices. Conduct technical assessments and provide recommendations for IAM improvements. Support integration of IAM solutions with enterprise systems and applications. Participate in incidentresponse and troubleshooting related to IAM systems. Essential Experience: Proven experience in SailPoint IdentityIQ and SAP Identity Management (IDM). Strong understanding of IAM concepts including authentication, authorization More ❯
systems and its employees, indirectly we protect those who protect us - who serve in our military and rely on the products and services we create. Across Threat Intelligence, Detection, IncidentResponse and now Active Defence we work to evolve cyber operations as a world class capability. Why BAE Systems? This is a place where you'll be able More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. . SSH Key Management. . Certificate management . HSM configuration/installation/support . Incident management . Change management . ITIL . Ensure the integrity and availability of cryptographic and key management services to business functions and applications Key Accountabilities . Cryptographic Hardware Management … globally. . Management of Cryptographic infrastructure to include Out of Hours Support, production of Monthly management information and risk statements. . Adherence to Group IT Security Standards. . Problem, Incident & Change Management including root cause identification. . Procedure/process development. . Project delivery. . Cryptographic Hardware Management. . Auditable Record Management. . Excellent Risk and Control Maintenance . … maintenance. . Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality . Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. . Experience of Sharepoint, Confluence and JIRA. . Unix/Windows O/ More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Reed
security policies, regulatory requirements, and industry best practices. Conduct technical assessments and provide recommendations for IAM improvements. Support integration of IAM solutions with enterprise systems and applications. Participate in incidentresponse and troubleshooting related to IAM systems. Required Skills & Qualifications: Proven experience in SailPoint IdentityIQ and SAP Identity Management (IDM) . Strong understanding of IAM concepts including authentication More ❯
Principles & Technologies. Experience of Security Related Technical Investigations Hands-On Technical Experience of Conducting Vulnerability Scanning & Evaluating Results Commercial Awareness & (Ideally) Experience of PCI DSS (Current Version) Experience with IncidentResponse Procedures & Investigations Strong Verbal & Written Communication Skills High Attention to Detail Strong Team Player Searches: Vulnerability Management Analyst/VM Analyst/Information Security Analyst/Information More ❯
Gateshead, Tyne and Wear, England, United Kingdom Hybrid / WFH Options
Simpson Judge Ltd
clients, translating tech into business outcomes* Proactively monitoring systems, managing SLAs, and keeping documentation sharp* Collaborating with vendors, internal teams and stakeholders to resolve issues* Getting involved in maintenance, incidentresponse and occasional 24/7 supportMust haves:* 2+ years MIN technical consulting experience within a Managed Service Provider* Strong communicator who can simplify the complex for clients More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Curveball Solutions
DPA 2018), Cyber Essentials (Basic & Plus), and ISO 27001, supported by frameworks like NCSC and NIST. Operating around cybersecurity fundamentals: CIA (Confidentiality, Integrity, Availability), proactive threat prevention, and rapid incidentresponse About You You're naturally aligned with MSP-style work, deeply familiar with security frameworks, and thrive at the intersection of strategy and execution. In addition to More ❯
organisation. Key responsibilities include: Defining and delivering a comprehensive cyber security strategy aligned with business goals and regulations Leading and developing the cyber security operations team Overseeing threat monitoring, incidentresponse, and vulnerability management Managing compliance with frameworks such as Cyber Essentials, NIST, ISO27001, GDPR, and GovAssure Acting as the primary point of contact for cyber matters internally More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
Anson Mccade
infrastructure that supports high-performance applications and services Lead automation initiatives using tools like Terraform , Ansible , or scripting languages (e.g. PowerShell, Python) Drive improvements in infrastructure monitoring, observability, and incidentresponse Evaluate and introduce new technologies to improve scalability, availability, and security Support endpoint management and enterprise IT systems (e.g. Intune, SCCM, JAMF) Contribute to disaster recovery and More ❯