for efficient, repeatable infrastructure provisioning DevSecOps Integration Incorporate security controls and governance into CI/CD pipelines and infrastructure designs in line with defence-grade standards Monitoring, Logging and IncidentResponse Configure and manage tools like CloudWatch and ELK Stack to maintain visibility, resilience, and incident support capabilities Stakeholder Collaboration Work closely with solution architects, engineers and More ❯
years of experience in Threat Intelligence, Vulnerability Management, or cyber research. Strong understanding of adversary TTPs and the threat landscape, especially in CNI/Gov environments. Experience in technical incidentresponse and cloud-based security operations. Proficiency in open-source intelligence (OSINT) and deep technical analysis. Knowledge of Windows/Linux internals, networking, and cloud platforms (e.g. Azure More ❯
innovative ideas/approaches, both internally and externally, and manage their implementation in the given business area Oversee the Security Operations Centre (SOC) and manage threat detection, monitoring, and response Technical Skills & Experience Considerable experience of operating Information Technology Information Library (ITIL) and Cyber Security IncidentResponse Team (CSIRT) processes and standards. Extensive working knowledge of available More ❯
innovative ideas/approaches, both internally and externally, and manage their implementation in the given business area Oversee the Security Operations Centre (SOC) and manage threat detection, monitoring, and response Technical Skills & Experience Considerable experience of operating Information Technology Information Library (ITIL) and Cyber Security IncidentResponse Team (CSIRT) processes and standards. Extensive working knowledge of available More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management, Certificate management, HSM configuration/installation/support Incident management, Change management, ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications Ensure governance and clear record keeping of activities undertaken … site local configuration activities Management of Cryptographic infrastructure to include Out of Hours Support, production of Monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development, Project delivery. Auditable Record Management. Excellent Risk and Control Maintenance Experience in Cryptography/Information Security ITIL Foundation Batchelor … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
Cyber Essentials, ISO 27001, NIST, and GDPR Configure and deploy essential tools: firewalls, IDS/IPS, endpoint protection, and encryption Overhaul Active Directory, Group Policies, and server configurations Lead incidentresponse, forensic analysis, and threat mitigation Monitor and adapt to new threats with continuous improvement initiatives About You: Proven experience delivering security solutions in cloud, on-prem, and More ❯
Cyber Essentials, ISO 27001, NIST, and GDPR Configure and deploy essential tools: firewalls, IDS/IPS, endpoint protection, and encryption Overhaul Active Directory, Group Policies, and server configurations Lead incidentresponse, forensic analysis, and threat mitigation Monitor and adapt to new threats with continuous improvement initiatives About You: Proven experience delivering security solutions in cloud, on-prem, and More ❯
Cyber Essentials, ISO 27001, NIST, and GDPR Configure and deploy essential tools: firewalls, IDS/IPS, endpoint protection, and encryption Overhaul Active Directory, Group Policies, and server configurations Lead incidentresponse, forensic analysis, and threat mitigation Monitor and adapt to new threats with continuous improvement initiatives About You: Proven experience delivering security solutions in cloud, on-prem, and More ❯
Middlesbrough, North Yorkshire, North East, United Kingdom Hybrid / WFH Options
Reed Technology
and review of data protection policies and procedures. Support data classification initiatives and ensure appropriate access controls are in place. Collaborate on information security projects, including risk assessments and incidentresponse planning. Liaise with internal teams to provide guidance on compliance and data protection matters. Help respond to data subject access requests (DSARs) and regulatory queries. What We More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
British Business Bank
Banks security posture through governance, assurance, architecture, and operations. Manage the relationship and performance of our Managed Security Services Provider (MSSP). Oversee security operations including monitoring, threat detection, incidentresponse, and threat hunting. Lead investigations, forensic analysis, and ensure lessons learned from incidents. Drive project delivery to mitigate key risks and ensure audit-readiness. Deliver effective risk More ❯
Sheffield, Yorkshire, United Kingdom Hybrid / WFH Options
British Business Bank plc
s security posture through governance, assurance, architecture, and operations. Manage the relationship and performance of our Managed Security Services Provider (MSSP). Oversee security operations including monitoring, threat detection, incidentresponse, and threat hunting. Lead investigations, forensic analysis, and ensure lessons learned from incidents. Drive project delivery to mitigate key risks and ensure audit-readiness. Deliver effective risk More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
British Business Bank
Banks security posture through governance, assurance, architecture, and operations. Manage the relationship and performance of our Managed Security Services Provider (MSSP). Oversee security operations including monitoring, threat detection, incidentresponse, and threat hunting. Lead investigations, forensic analysis, and ensure lessons learned from incidents. Drive project delivery to mitigate key risks and ensure audit-readiness. Deliver effective risk More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
BAE Systems (New)
working arrangements available. Please consult your recruiter for details. Grade: GG10 - GG11 Referral Bonus: £5,000 Job Description Serve as the point of escalation for intrusion analysis, forensics, and incidentresponse queries. Provide root cause analysis for complex, non-standard findings and anomalies without existing playbooks. Mentor team members and share knowledge proactively. Contribute to the SOC Knowledge More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Junglee Games India Private Limited
maintaining security. Continuously assess the program's maturity across brands and implement improvements to process or technology to elevate weaker areas. The role also entails planning for product-related incidentresponse and disaster recovery - ensuring that teams are prepared to handle a security incident. Project and Vendor Management: Oversee Secure by Design project execution and coordinate with project More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
aligned with financial services compliance standards (e.g., ISO 27001, SOC 2, PCI-DSS). Collaborate with DevOps, Security, and Application teams to support CI/CD pipelines, monitoring, and incident response. Optimize cloud costs and performance through resource governance, tagging strategies, and usage analytics. Develop and maintain documentation for infrastructure standards, procedures, and best practices. Participate in disaster recovery More ❯
In-depth knowledge of networking, security protocols, and firewall configurations. Experience with database management and performance optimisation strategies. Familiarity with software development methodologies, including Agile and Waterfall. Experience in incidentresponse and disaster recovery planning. Certara bases all employment-related decision on merit, taking into consideration qualifications, skills, achievement, and performance. We treat all applicants and employees without More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management. HSM configuration/installation/support. Incident management. Change management. ITIL. Ensure the integrity and availability of cryptographic and key management services to business functions and applications. Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of Monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance. Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality. Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills. More ❯
Sheffield, South Yorkshire, England, United Kingdom
Opus Recruitment Solutions Ltd
and security reviews across cloud-native platforms. Collaborate with DevOps, engineering, and compliance teams to embed security best practices. Define and maintain security policies, standards, and reference architectures. Support incidentresponse and cloud forensics as needed. Ensure alignment with security frameworks (e.g., ISO 27001, NIST, CIS). Essential Skills 5+ years in security architecture roles, with a strong More ❯
Free secure on-site parking, Access to Employee assistance programmes with a range of discounts. What will you be doing? You will be leading 24x7 OT cybersecurity monitoring and incidentresponse, Managing cybersecurity service providers, Collaborate to enhance compliance and risk management, Deliver cyber security awareness campaigns. Where will you be doing it? Our client is a key More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Maxwell Bond
Design, implement, and support resilient hybrid infrastructure solutions across Azure and traditional platforms. Collaborate with DevOps, SecOps, and development teams to support deployments and maintain secure, reliable environments. Support incidentresponse and perform root cause analysis of infrastructure-related issues. Contribute to disaster recovery and business continuity planning. Lead infrastructure product evaluations and take part in implementing new More ❯
backed by thorough testing (unit, integration, performance) Engage in CI/CD practices to ensure seamless deployment and operation of services Contribute to operational excellence through monitoring, alerting, and incidentresponse Participate in a 24/7 on-call rotation for mission-critical services used by millions of users Foster a culture of engineering excellence through code reviews More ❯
webhooks and Docker). Act as DB SME for the trust organization, interact with internal Roku teams to advise them on security best practices, DB architectures, and assist in incidentresponse and other security investigations. Developing (or extending OSS) security automation tooling. This can range from detection tooling to security process automation, or a fuzzing infrastructure to find More ❯
backed by thorough testing (unit, integration, performance) Engage in CI/CD practices to ensure seamless deployment and operation of services Contribute to operational excellence through monitoring, alerting, and incidentresponse Participate in a 24/7 on-call rotation for mission-critical services used by millions of users Foster a culture of engineering excellence through code reviews More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
William Hill PLC
through software delivery pipelines using Infrastructure as Code Maintaining and Developing Infrastructure - Curate the Container Orchestration, Monitoring, Messaging and Data Storage Platforms, developing any necessary integration Supporting Incidents - Assist Incident Management in Production all the way through impact assessment, service restoration and post-mortems, including being part of the SRE on call rotation Sharing Knowledge - Enabling development teams within … gambling, and we are looking for people who can support our ethos. To apply to this post, you will have: A base in Leeds with working experience of an incidentresponse model and fluency with observability and monitoring (Prometheus, Grafana) Experience defining alerts and implementing dashboards from existing monitoring and logging data Relentless focus on customer experience with More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Develop
support solution development Execution & Delivery Work closely with engineering managers to plan implementation strategies Assist teams during execution through prototyping, pair programming, and code reviews Engage in diagnostics and incidentresponse for platform reliability Continuous Improvement & Knowledge Sharing Maintain clear technical documentation Share knowledge across engineering, service, and compliance teams Contribute to hiring, onboarding, and mentoring to grow More ❯