Darlington, County Durham, England, United Kingdom Hybrid / WFH Options
Inspire People
at the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Threat and Vulnerability Manager to protect DIT and the wider UK government from cyber threats in a fast paced and exciting role, responsible for the VulnerabilityManagement and Threat Hunting … Salary is dependent on location and technical skills as assessed at interview. Flexible, hybrid working from London, Salford, Birmingham, Cardiff, Darlington, Edinburgh or Belfast. As the Cyber Threat and Vulnerability Manager you will be helping to protect DBT and the wider UK government from cyber threats in a fast paced and exciting role.? Reporting to the Head of Cyber … Security Operations, the Cyber Threat and Vulnerability Manager will manage and be responsible for the Threat and VulnerabilityManagement function within the SOC, by providing leadership on identification and improvement opportunities, and ensuring service owners are aware of weaknesses in their security posture and are empowered with the right information to take appropriate actions. A healthy curiosity More ❯
Security Operations and Governance Oversee SOC operations ensuring timely threat detection, response, and resolution Continuously improve detection and response capabilities using Cortex XDR, Abnormal Security, Splunk, and Nucleus Manage vulnerabilitymanagement end-to-end, from scanning and prioritisation to remediation tracking Coordinate with third-party partners such as Blazeguard and CCX to ensure effective service delivery Oversee secure … configuration, endpoint management, and patch compliance across hybrid environments including Azure and AWS Own the UK information security framework and assurance programs including ISO 27001, FCA standards, SOC audits, and lender assurances Maintain and evolve security policies, standards, and control frameworks Lead audit preparation, evidence collection, and control testing for certifications and partner reviews Collaboration and Culture Build strong … partnerships across engineering, IT, legal, HR, and operations to embed security in everyday practices Provide input on vendor assessments and third-party risk management Promote a culture of security awareness through training, phishing simulations, and education programs Report on cyber risk, maturity, and incidents to senior leadership with transparency and continuous improvement Key Skills Proven experience leading cyber security More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
PEXA Group
Security Operations and Governance Oversee SOC operations ensuring timely threat detection, response, and resolution Continuously improve detection and response capabilities using Cortex XDR, Abnormal Security, Splunk, and Nucleus Manage vulnerabilitymanagement end-to-end, from scanning and prioritisation to remediation tracking Coordinate with third-party partners such as Blazeguard and CCX to ensure effective service delivery Oversee secure … configuration, endpoint management, and patch compliance across hybrid environments including Azure and AWS Own the UK information security framework and assurance programs including ISO 27001, FCA standards, SOC audits, and lender assurances Maintain and evolve security policies, standards, and control frameworks Lead audit preparation, evidence collection, and control testing for certifications and partner reviews Collaboration and Culture Build strong … partnerships across engineering, IT, legal, HR, and operations to embed security in everyday practices Provide input on vendor assessments and third-party risk management Promote a culture of security awareness through training, phishing simulations, and education programs Report on cyber risk, maturity, and incidents to senior leadership with transparency and continuous improvement Key Skills Key Skills Proven experience leading More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Vallum Associates
experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … a comfortable level • Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies • Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity • Experience and understanding of both the roles and interlock between enterprise & solution architecture • Experience in both operational and transformation … cybersecurity roles or a clear working understanding of both perspectives • Experience working in large-scale IT transformation programmes Identity & Access Management • Secrets Management: Experience of designing solutions using SM tools such as HashiCorp Vault • Experience of developing secrets management patterns and championing designs through architecture governance forums • Experience of designing or implementing Workload Identity Frameworks within large More ❯
Crewe, England, United Kingdom Hybrid / WFH Options
DCS Technology
Security Analyst to play a key role in protecting our client’s systems, networks, and data. This is an exciting opportunity to lead on threat detection, incident response, and vulnerabilitymanagement , while driving continuous improvement across the organisation’s security posture. You’ll collaborate closely with infrastructure, development, and compliance teams to maintain high standards of cyber resilience … and uphold key frameworks such as ISO 27001 and Cyber Essentials Plus . Key Responsibilities: • Lead threat detection, incident response, and vulnerabilitymanagement activities • Strengthen cyber security posture across cloud, infrastructure, and applications • Provide expert guidance to development teams on secure SDLC practices • Maintain compliance with ISO 27001 and Cyber Essentials Plus standards • Mentor junior analysts and support More ❯
Crewe, Cheshire, England, United Kingdom Hybrid / WFH Options
DCS Recruitment
Security Analyst to play a key role in protecting our client's systems, networks, and data. This is an exciting opportunity to lead on threat detection, incident response, and vulnerabilitymanagement , while driving continuous improvement across the organisation's security posture. You'll collaborate closely with infrastructure, development, and compliance teams to maintain high standards of cyber resilience … and uphold key frameworks such as ISO 27001 and Cyber Essentials Plus . Key Responsibilities: * Lead threat detection, incident response, and vulnerabilitymanagement activities * Strengthen cyber security posture across cloud, infrastructure, and applications * Provide expert guidance to development teams on secure SDLC practices * Maintain compliance with ISO 27001 and Cyber Essentials Plus standards * Mentor junior analysts and support More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Love2shop
development teams to optimize application performance and reliability • Maintain and improve backup, recovery, and disaster recovery procedures • Support incident response and root cause analysis for production issues • Manage configuration management and secrets management solutions • Optimize cloud resource utilization and cost management • Cover on-call rotation for production support (1 week out of 6) As well as making … improvements to: • Deployment automation and release management processes • Application and infrastructure monitoring and observability • Security scanning and vulnerabilitymanagement in pipelines • Performance optimization and capacity planning • Development team productivity through tooling and automation What we would like from you • Strong experience with CI/CD pipeline design and implementation (Azure DevOps, GitHub Actions) • Proficiency in Infrastructure as … great if you have the following • Experience with Azure DevOps administration • Knowledge of database deployment automation and migration strategies • Familiarity with microservices architecture and deployment patterns • Experience with API management and gateway solutions • Knowledge of network security and firewall management • Certification in Azure, AWS, or DevOps methodologies • Experience with chaos engineering and resilience testing • Familiarity with service mesh More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom Hybrid / WFH Options
Adroit People Limited (UK)
Greetings Greetings We are Hiring Lead Security Solution Architect(Privilege Password Management CyberArk ) Position in UK - Sheffield -JC: 106885 Client is looking for someone with strong ITSM knowledge Privilege Password Management CyberArk . Job Description Location: UK - Sheffield (Hybrid) Hybrid Model Job Profile – Lead Security Solution Architect Project Overview Client is working on a strategic Identity and Access … Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. Client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage … programme as subject matter expert. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
Lead Security Solution Architect Project Overview Client is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. Client is working on uplifting controls and capabilities in privileged access for the Group and introducing the … programme as subject matter expert. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Provides technical thought leadership to the Design Team and More ❯
Horsforth, Leeds, West Yorkshire, England, United Kingdom
TPP (The Phoenix Partnership)
The role involves: • Managing, maintaining and upgrading enterprise server and storage hardware • Providing internal support for office hardware including, PCs, laptops, mobile devices (Windows OS, iOS, MacOS and Android) • Vulnerabilitymanagement using scanning tools such as Nessus • Remediation/automation of software rollout using Ninite/PDQ • Configuring and monitoring of Anti-virus software & Mobile Device Management • Firewall/Switch management - Configuration, patching and upgrading • Administering Microsoft Active Directory, Exchange Server & Office 365 • Achieving recognised Cyber Security accreditation • Management of video conferencing • Management of enterprise level phone system • Monitoring and managing the availability and scalability of resources, including CPU usage, disk usage and storage systems including network troubleshooting • Continuously improving and keeping up More ❯
the end-to-end journey. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at More ❯
such as antivirus, content filtering, firewalls, and intrusion detection systems. *Proficiency in Microsoft Azure and associated cloud security services. *Familiarity with Windows and Linux operating systems. *Experience with log management and security monitoring platforms. *Critical thinking and problem-solving skills in complex technical environments. *Knowledge of ITIL practices and security compliance standards. *Must have access to own transport. *Willingness … Computer Science, Cybersecurity, or a related field. *Postgraduate qualification in an IT-related subject. *Professional certifications such as CISSP, CompTIA Security+, or equivalent. *Experience with governance frameworks and risk management tools. Key Responsibilities *Operate and maintain security systems including firewalls, antivirus, intrusion detection/prevention, and authentication platforms. *Monitor system logs and network traffic to identify suspicious activity and … potential threats. *Respond to security incidents and support forensic investigations. *Develop and maintain security protocols, policies, and procedures. *Conduct vulnerability assessments and recommend mitigation strategies. *Deliver cybersecurity awareness training and guidance to staff. *Maintain the information security risk register and support audit processes. *Collaborate with IT and operational teams to ensure secure system configurations. *Assist in compliance with frameworks More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Acumin
architectures in hybrid and cloud (AWS/Azure) environments. Strong hands-on expertise with enterprise security platforms – including Endpoint Protection, Cloud Security, Network Security, DevSecOps, SIEM/SOAR, and vulnerability management. Deep understanding of secure design principles, IAM, encryption, API security, and application security. Experience performing threat modelling, security risk assessments, and control design validation. In-depth knowledge of More ❯
through our comprehensive suite of cloud-native solutions. With over 100,000 customers across 135 countries, we deliver mission-critical software spanning accountancy and finance, HR and payroll, education management, and business operations. Our impact reaches deep into communities: over 4 million UK families connect with their children’s schools through our education apps, nearly 5 million employees globally … team, comprehensive learning opportunities, and a vibrant technical community committed to creating exceptional solutions that make a real difference in how our customers operate and succeed. Main Responsibilities : Delivery Management (40%) Ensure projects are scoped, prioritised, and delivered on time with clear alignment to business goals and quarterly OKRs Drive predictability, velocity, and quality through effective agile practices and … Provide strategic technical leadership through architectural guidance and critical technical decisions, with selective hands-on contributions Define technical decisions and maintain system health through architectural oversight and technical debt management Establish and drive comprehensive quality culture including TDD/BDD practices, testing standards, automated quality gates, and team code review excellence Define team security standards ensure team compliance governance More ❯
through our comprehensive suite of cloud-native solutions. With over 100,000 customers across 135 countries, we deliver mission-critical software spanning accountancy and finance, HR and payroll, education management, and business operations. Our impact reaches deep into communities: over 4 million UK families connect with their children’s schools through our education apps, nearly 5 million employees globally … team, comprehensive learning opportunities, and a vibrant technical community committed to creating exceptional solutions that make a real difference in how our customers operate and succeed. Main Responsibilities : Delivery Management (40%) Ensure projects are scoped, prioritised, and delivered on time with clear alignment to business goals and quarterly OKRs Drive predictability, velocity, and quality through effective agile practices and … Provide strategic technical leadership through architectural guidance and critical technical decisions, with selective hands-on contributions Define technical decisions and maintain system health through architectural oversight and technical debt management Establish and drive comprehensive quality culture including TDD/BDD practices, testing standards, automated quality gates, and team code review excellence Define team security standards ensure team compliance governance More ❯
Information Security Officer - Risk. - Hybrid - Lancashire £61,500 10.5% bonus 14% pension healthcare plus additional benefits. Information Security Officer with Risk management and risk register experience needed as part of an extremely well-funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As the Information Security Officer for Risk your primary purpose … will be to become a trusted cyber security risk advisor, ensuring the business is compliant against security policy, acting as advisory, collaborating with stakeholders and management to assess risks, review and advise ratings for IT/OT/Physical Cyber risks and support business coordinators in assessing their risk position. As the Information Security Officer for Risk, you will … build strong relationships with business and technology functions as well as 3rd parties offering real world experience of cyber security risk management In this role you will act in an advisory capacity to the business day-to-day basis monitoring cyber security risk, compliance across diverse business functions, supporting business area coordinators. Reviewing risks to ensure they are clear More ❯
Information Security Officer - Risk. - Hybrid - Lancashire £61,500 10.5% bonus 14% pension healthcare plus additional benefits. Information Security Officer with Risk management and risk register experience needed as part of an extremely well-funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As the Information Security Officer for Risk your primary purpose … will be to become a trusted cyber security risk advisor, ensuring the business is compliant against security policy, acting as advisory, collaborating with stakeholders and management to assess risks, review and advise ratings for IT/OT/Physical Cyber risks and support business coordinators in assessing their risk position. As the Information Security Officer for Risk, you will … build strong relationships with business and technology functions as well as 3rd parties offering real world experience of cyber security risk management In this role you will act in an advisory capacity to the business day-to-day basis monitoring cyber security risk, compliance across diverse business functions, supporting business area coordinators. Reviewing risks to ensure they are clear More ❯
to protect customer’s IT networks from cyber attack. Responsibilities : Monitor and analyse Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, and Security Incident and Event Management (SIEM) toolset event logs to identify security attacks and threats for remediation/suppression. Assist in Computer Security Incident Response activities for large organisations as a 1st line security … operational effectiveness and efficiency. Qualifications: Broad experience of technologies including but not limited to; Firewalls, IPS & IDS, Active Directory, Windows Server, Linux, TCP/IP, Networks, AWS, CDN's, Vulnerabilitymanagement and SIEM, DRM. At least basic knowledge the fundamentals of cyber security Security Administration Incident containment, recovery and mitigation Excellent customer service skills Strong analytical and problem More ❯
our client's internal security posture and you'll be working closely with the engineering and product teams to enable security across the company. Key Requirements: AWS - Cloud Security VulnerabilityManagement Tools IAM CPSM Incident Response/small amounts of ISO27001 This role is 5 days a week on-site , you’ll enjoy the perks of a sleek More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Found Talent
managing IT security operations and driving improvements across infrastructure and processes? This Manchester based organisation is looking for an IT Security Manager to take ownership of information security, risk management and ongoing security enhancement activities. You’ll work closely with Senior Leadership, leading key initiatives to protect systems, data and users while helping shape the organisation’s security posture. … ISO27001 or similar What you’ll need: Proven experience managing IT security or information security functions Strong technical knowledge of Microsoft environments and security controls Experience with incident response, vulnerabilitymanagement, and security risk mitigation Confident working with both technical teams and business stakeholders Solid understanding of security frameworks and compliance standards Ability to lead projects and drive … security improvements proactively What’s in it for you: A key management role focused on shaping and improving security within a collaborative IT leadership team Hybrid working Annual bonus and regular salary reviews Company pension scheme More ❯
in Cyber Security, PCI DSS within a cloud environment Have good Security architecture experience, ideally with a DevSecOps environment Excellent experience with PCI DSS and able to lead design Vulnerabilitymanagement & Compliance Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, and NIST Confidence when speaking with More ❯
intrusion prevention) are correctly configured and maintained. Participate in resilience planning, including disaster recovery and business continuity exercises, ensuring network components meet required redundancy and failover standards. Assist in vulnerabilitymanagement activities by reviewing and remediating network-related findings. Maintain compliance with NHS Digital, DSP Toolkit, and Cyber Essentials Plus standards as they apply to network operations. About … configuring cyber systems and associated functionality Significant knowledge of working practices within technical/cyber security Significant experience of Cisco networking hardware Experience of LAN, WLAN troubleshooting, implementation and management Working with suppliers Defining Trust security requirements and interpreting them to system suppliers Advanced knowledge of Microsoft Office applications Person Specification Qualifications Essential Please click 'apply now' to view More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Corecom Consulting
coding principles and web application security. Comfortable working end-to-end across the stack in a small, fast-moving team. Desirable: Professional experience in cybersecurity SaaS, threat intelligence, or vulnerability management. Familiarity with AI/ML technologies, particularly around data classification or automation. Experience with CI/CD, containerisation, and serverless architectures. Front-end experience with React and TypeScript. More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
iO Associates
architecture or engineering) Strong communication and presentation skills, with the confidence to engage at all levels Hands-on experience with security tools such as SIEM, SOAR, EDR, WAF or vulnerabilitymanagement A desire to move into a solutions or pre-sales role , combining your technical expertise with commercial awareness Energy, curiosity and a genuine passion for helping customers More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
Azure Storage. Knowledge of immutable backups and secure data retention strategies. Experience with disaster recovery planning, including full restore testing. Expertise in multi-factor authentication (MFA) setup and testing. Vulnerabilitymanagement - scanning, prioritization, remediation validation. Ability to design and interpret security dashboards for monitoring and reporting Awareness of system throttling and its security implications. Ideally comfortable upskilling the More ❯