L33, Knowsley, Merseyside, United Kingdom Hybrid / WFH Options
Curveball Solutions
Draft, maintain, and implement information security policies and Standard Operating Procedures (SOPs). Configure and oversee mobile security—MDM (MAM/BYOD)—to protect business continuity. Lead vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Author compelling tender responses, clearly demonstrating technical capability and strategic value. Enhance Microsoft 365 security—leveraging Purview, Conditional Access, MFA—to safeguard … through closure. Strong understanding of ITIL, CAB, and structured change management. Skilled in crafting and updating security policies, SOPs, and managing tender documentation. Hands-on expertise with MDM tools, penetrationtesting, and policy-based firewalls. Experience designing and delivering compliance aligned services across GDPR, Cyber Essentials, ISO 27001. Proficient in using Microsoft 365 security stack: Purview, Defender, Conditional More ❯
Cheshire, England, United Kingdom Hybrid / WFH Options
Morgan Law
of security incidents and policy violations Assist with risk assessments and security audits Implement and maintain security standards, and guidelines Work with third-party vendors and partners on pen testing and remediation activities Support awareness campaigns to improve cybersecurity hygiene among staff Assist in the development and implementation of disaster recovery and business continuity plans. Produce reports and metrics More ❯
As a Vulnerability Management Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & PenetrationTesting, along with Reporting. Key Responsibilities of Vulnerability Management Analyst role would include: Conducting Vulnerability Scanning with leading Tools Scheduling of Scanning across Business, ensuring Reporting Requirements are More ❯
knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetrationtesting Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success Will Be Measured By … and automation efficiency gains Noticeable improvement in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of a disaster recovery plan Positive user feedback on platform improvements Interested? Please Click Apply Now! Head of IT - Lead a Full-Stack Transformation More ❯
knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetrationtesting Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success Will Be Measured By … and automation efficiency gains Noticeable improvement in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of a disaster recovery plan Positive user feedback on platform improvements Interested? Please Click Apply Now! CTO - Lead a Full-Stack Transformation More ❯
architecture and solution design Strong understanding of security standards and regulations (e.g. NCSC, ISO, NIST, PCI, GDPR) Background in application architecture, software development, or infrastructure architecture Experience with security testing tools and techniques Familiarity with CI/CD pipelines and continuous security practices Knowledge of network security (OSI, TCP/IP), web application security (OWASP), and cryptographic controls (PKI … a strong understanding of client engagement and delivery dynamics Desirable Experience Identity management and authentication/authorization patterns Involvement in governance, risk, compliance, operational security, and secure user management Penetrationtesting certifications (e.g. OSCP, CREST, TIGER or equivalent) Active participation in knowledge sharing and community engagement Benefits Competitive salary and comprehensive benefits package Flexible working arrangements Opportunities to More ❯
Doncaster, South Yorkshire, England, United Kingdom
Lorien
Ability to develop and execute winning bid strategies in a fast-paced environment. Experience managing bid pipelines and reporting to senior stakeholders. Knowledge of cyber security services (e.g., Pen Testing, Risk Management, MSSP solutions) is highly desirable. Excellent communication, negotiation, and presentation skills. Proficiency in CRM and bid management tools. A strong professional network in IT or cyber security More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Stott and May
ML infrastructure across data collection, preprocessing, model training, and deployment. Implement privacy-preserving techniques such as encryption, anonymisation, and federated learning. Crypto & Blockchain Security Oversee smart contract security audits, testing, and deployment pipelines. Protect user assets across wallets, custody solutions, and crypto exchange mechanisms. Monitor on-chain activity for suspicious behaviour, including rug pulls and flash loan attacks. Partner … with external firms for protocol audits, bug bounty programmes, and penetration testing. Infrastructure & Application Security Implement best practices in cloud security (AWS, GCP, Azure), container security, and zero-trust networks. Harden DevSecOps pipelines to ensure secure software delivery. Collaborate with engineering teams to integrate security by design into products. Compliance & Risk Management Ensure regulatory compliance with GDPR, SOC2, ISO More ❯
Contract Pen Tester – SC Cleared 🚨 I'm on the search for a INF/APP or CSTM certified consultants to deliver ITHCs and penetration testing. 🔹 £700 p/d (Outside IR35) 🔹 6 months (with extension) 🔹 Manchester & Newcastle (mix of on-site + remote) 🔹 SC clearance required If you’re a seasoned tester with these certifications and strong AWS/ More ❯