Salford, Greater Manchester, North West, United Kingdom
Inspire People
/Kubernetes), cloud platforms (AWS preferred), and infrastructure-as-code (e.g. Terraform). Familiarity with observability and performance testing tools (Datadog, ELK, Grafana, Locust, JMeter), plus an understanding of cybersecurity testing principles and logging requirements. Ability to coach multidisciplinary teams, embed quality practices in agile delivery, and apply FinOps-aware testing approaches (e.g. cost-impact validation, resource optimisation). More ❯
the business and early in projects Assist in 3rd party assurance Skills, Experience and Knowledge: Strong experience as a technical security expert. Excellent Infrastructure Knowledge specifically around Server Technology. Cybersecurity experience within a large complex corporate environment working with multiple partners. Proven knowledge and experience of IT and information security policies, practices and standards. Knowledge of current technologies in More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Gerrard White
the business and early in projects Assist in 3rd party assurance Skills, Experience and Knowledge: Strong experience as a technical security expert. Excellent Infrastructure Knowledge specifically around Server Technology. Cybersecurity experience within a large complex corporate environment working with multiple partners. Proven knowledge and experience of IT and information security policies, practices and standards. Knowledge of current technologies in More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
AJ BELL BUSINESS SOLUTIONS LIMITED
We're now recruiting a senior cybersecurity analyst support the Security Operations Manager in responding, managing and reporting the Information Security Risks faced by Technology Services (TS) in delivering AJ Bells systems and services.Key to this is maintaining the confidentiality, integrity and availability of the data that resides upon those systems. This role will be key to understanding the … with the latest security trends, threats, and technology solutions. Essential experience, knowledge and skills: Strong understanding and knowledge of Information Security risk management tools and techniques A passion for cybersecurity and active interest in technology Experience of Information Security standards and frameworks Awareness and understanding of the Information Security threat landscape Understanding of Information Security solutions e.g. email/ More ❯
leads and payments to communications and workflow automation. With strong foundations in place (PHP 8+, MySQL 8, Redis, AWS), the next step is transformation: AI/ML-powered automation Cybersecurity hardening Platform integration and performance optimisation The successful candidate will help position the business for scale, operational efficiency, and a potential future exit. What You'll Be Doing: AI/… Lead rollout of 30+ AI/ML features including voice AI, automation, and predictive tools Overhaul the legacy CRM's UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and … tech-driven or scaling businesses Deep knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetration testing Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success More ❯
on strategic, operational and regulatory objectives. Develop and deliver the technical strategy for the Trust in conjunction with the Head of Enterprise Architecture including, systems and security architecture, integration, cyber-security posture, Effective management, reporting, accountability and compliance for all aspects of Cyber & IT Security including compliance with law and guidance, and resolution of Cyber & IT security risks and law … level or equivalent, Degree or Equivalent in IT, ITSM Evidence of management development through Continuous Professional Development and/or formal management course Specialist training in areas such as: CyberSecurity, Risk Management, PRINCE2, MSP Professional Registration Relevant professional body registration Knowledge, Training & Experience Significant relevant experience within IT operations environment including management of a significant Service with a high More ❯