Wokingham, Berkshire, England, United Kingdom Hybrid / WFH Options
KBC Technologies UK LTD
architect, and maintain network security infrastructure including Firewalls, IDPS, Proxies, Load Balancers, VPNs, and WAFs. Develop and manage firewall policies, network access controls, IAM solutions, MFA, RBAC, and privilege management . Ensure alignment of security measures with compliance standards (GDPR, HIPAA, PCI DSS). Conduct regular security audits and assessments to identify and remediate risks. Apply industry frameworks such … as NIST Cybersecurity Framework, ISO 27001, CIS Controls . Oversee and enhance security technologies: SIEM, vulnerabilitymanagement, cloud security (OCI/Azure/AWS), PKI, cryptography, web/email security, logging and monitoring . Monitor network traffic for anomalies and potential breaches. Collaborate with IT teams (network engineers, sysadmins, developers) to ensure a holistic approach to security. Communicate More ❯
Maidenhead, England, United Kingdom Hybrid / WFH Options
Audit & Risk Recruitment
managing and enhancing the IT and Information Security risk landscape. Reporting directly to the Head of Risk and Assurance, you will play a key role in embedding effective risk management practices across the company's technology and cybersecurity domains. As a Risk & Assurance Manager, you'll be responsible for and have ownership for: Partnering with senior IT, Security, and … business leaders to embed risk management practices into operational processes and strategic initiatives. Owning and maintaining IT Risk and Control Matrices (RCMs) , ensuring they remain current, comprehensive, and aligned with industry standards and audit expectations. Reviewing effectiveness of first line functions in testing and validation of key IT controls (e.g., access management, change control, incident response, vulnerabilitymanagement), ensuring effectiveness and consistency. Leading in the review and enhancement of IT and infosec risk and control frameworks (e.g., ISO 27001, ITIL, ISO22301, NIST), ensuring alignment with business objectives and regulatory requirements. Coordinating and representing IT risk in internal, external audits and certification processes (e.g., ISO 27001, Cyber Essentials, ISO22301, etc.), acting as the primary point of More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Oscar Associates (UK) Limited
for an Information Security Officer to lead the organisation's security strategy, operations, and compliance efforts. This hands-on role blends strategic security architecture with day-to-day operational management and regulatory compliance oversight. The ideal candidate will establish and maintain security standards across the product portfolio, oversee secure system environments, and act as the primary contact for ISO … for new features and system changes. Evaluate and recommend security technologies and tools. Operational (40%) Manage security environments across Azure and AWS infrastructure. Lead incident response efforts and coordinate vulnerability remediation activities. Manage continuous security monitoring, alerting, and detection systems. Administer vulnerabilitymanagement and penetration testing programs. Maintain strong identity, access, and privilege management controls. Compliance More ❯
through mentorship, training, and clear performance frameworks. Execution & Delivery: Translate business and product goals into clear engineering OKRs, milestones, and sprint objectives. Ensure timely delivery of features, technical debt management, and continuous improvement of development velocity. Implement effective engineering processes, agile practices, sprint planning, retrospectives, and release cycles. Collaborate with Product Management to balance feature delivery with technical … health, security, and infrastructure priorities. Manage vendor relationships and oversee outsourcing or partner engagements when needed. Security, Compliance & Reliability: Lead the adoption of secure coding standards , vulnerabilitymanagement, and security-by-design practices. Ensure compliance with relevant frameworks (ISO 27001, SOC 2, GDPR). Drive observability, monitoring, and incident response strategies to ensure reliability and uptime. Work closely … time data processing (Kafka, Spark, GraphDBs, etc.). Familiarity with AI/ML integration , large-scale data architecture, and analytics platforms is a strong plus. Strong communication and stakeholder management skills, able to work with executive leadership and external partners. Proven ability to deliver high-impact features in a start-up or growth-stage environment. Bachelor's or Master More ❯
the implementation and monitoring of cyber security best practices across the business. Administer security tools, including , multi-factor authentication (MFA), mail filtering and Anti-Virus software . Participate in vulnerabilitymanagement, incident response coordination, and system security reviews. Help maintain system documentation, asset registers, and compliance records in line with IT policies and data protection regulations. Project Support … and ongoing system enhancements. Process & Documentation Maintain up-to-date documentation of IT systems, configurations, procedures, and security protocols. Support the continuous improvement of IT operational processes and incident management workflows. Skills & Experience Required Proven experience in a Systems Analyst, IT Support Analyst, or Desktop Support role, ideally within a retail, luxury, or manufacturing business environment. Strong hands-on … experience supporting Microsoft 365 environments (essential) — including Exchange, Entra, SharePoint, Teams, OneDrive. Solid understanding of cyber security fundamentals — including access management, endpoint protection, MFA, secure cloud configuration, and vulnerability management. Exposure to, and understanding of compliance standards such as PCI and GDPR Experience supporting Windows 10/11, Active Directory, Mac OS, iOS, Print and network technology . More ❯
transformation with our people and our customers at its heart. As Cornerstone’s Information Security Manager, you will lead the development, implementation, and continuous improvement of our Information Security Management System (ISMS), ensuring alignment with ISO 27001:2022. You will be responsible for safeguarding our digital infrastructure, managing cyber risk, and embedding a security-first culture across the organisation. … we meet our obligations to customers and regulatory standards Delivery ISMS Leadership: Own and maintain the ISMS, ensuring it meets ISO 27001:2022 requirements and supports business objectives. Risk Management: Identify, evaluate, and mitigate information security risks across systems, suppliers, and processes. Maintain visibility over key cyber risks and report to senior leadership. Incident Response: Lead the response to … the project lifecycle, from initial design through to deployment and ongoing maintenance Role Expertise The successful candidate will possess substantial experience in managing and maintaining an enterprise Information Security Management System (ISMS), with a demonstrable track record of leading and supporting external ISO 27001 audits and implementing and managing robust security frameworks. They will have a comprehensive understanding of More ❯
Defender, CrowdStrike, Elastic). Expertise in building and tuning detection rules, dashboards, and automation playbooks. Proficiency in scripting or automation (KQL, PowerShell, Python, or similar). Knowledge of log management, APIs, data normalisation, and cloud security (Azure, AWS, or M365). Solid understanding of network, system, and identity security fundamentals. Excellent problem-solving skills and a passion for continuous … Cortex XSOAR, Splunk SOAR). Knowledge of MITRE ATT&CK mapping and detection engineering frameworks. Infrastructure-as-Code experience (Terraform, Bicep, or ARM templates). Exposure to threat hunting, vulnerabilitymanagement, or integrations with ServiceNow/ITSM tools. Services offered by Computappoint Limited are those of an Employment Business and/or Employment Agency in relation to this More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
respond to Cyber Security Incidents Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others. Run Vulnerability Assessment tools to measure compliance with security updates and security patches. Member of a Team who are responsible for making multiple daily CSOC checks to detect and respond to … XDR and Microsoft Defender variants, and Elastic Security, or displays aptitude to learn how to work with a SIEM. Experience and knowledge of SIEM tools, Cyber Security Incident Response, VulnerabilityManagement and Cyber Threat Intelligence. Experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at More ❯
templates, and standards. Assist in the development and localisation of standard test scripts, ensuring they are tailored to specific control environments and aligned with the organisation's Enterprise Risk Management Framework. Conduct control testing activities to evaluate the design and operational effectiveness of cybersecurity controls, documenting results clearly and raising issues where appropriate. Ensure timely delivery of assigned control … role, the essential criteria you'll need are Proven experience in performing cybersecurity control assessments, including evaluating design and operational effectiveness. Strong understanding of information security principles, cyber risk management, and control frameworks. Experience in IT, OT and Cloud environments, with a focus on cybersecurity controls. Clear and professional verbal and written communication, including the ability to explain cybersecurity … with minimal supervision, taking ownership of assigned tasks and driving them to completion while maintaining high standards of quality and accuracy. Strong understanding of Cybersecurity Domains, including Threat Intelligence, VulnerabilityManagement, Security Testing, Security Architecture, Infrastructure Protection, Application Security, Identity and Access Management, Incident Investigation & Response and Cryptography. Additional skills and experiences would be great to have More ❯
of cyber security within one of the UK's most dynamic digital infrastructure organisations? We're looking for an Information Security Manager to own and evolve our Information Security Management System (ISMS) and drive alignment with ISO 27001:2022 . This is your chance to combine strategic influence with hands on impact - protecting critical assets, leading transformation, and championing … a security first culture across the business. You'll collaborate closely with teams across IT, Legal, Procurement, and Operations , acting as the go to expert for information assurance, incident management, and regulatory compliance . What You'll Be Doing Lead and continuously improve our ISMS Manage ISO 27001 certification, surveillance audits, and compliance activities Oversee cyber risk management … an enterprise ISMS and leading ISO 27001 audits Strong understanding of cyber threats and cloud security (Azure/M365) Sound knowledge of GDPR and relevant regulatory frameworks Experience in vulnerabilitymanagement, penetration testing, and supplier assurance Excellent communication skills with the ability to influence and engage stakeholders Confident leading governance forums and promoting a security first mindset Familiarity More ❯
You’ll Do Lead and investigate high-impact cyber security incidents across global customer environments. Proactively hunt for threats, triage alerts, and identify anomalous behaviours before they escalate. Manage vulnerability assessments end-to-end, driving remediation outcomes with customers and internal teams. Optimise the Microsoft Security Stack: Sentinel, Defender (for Endpoint/Identity), Purview, and XDR. Support Zero Trust … build detections, correlations, and meaningful insights. Experience centralising log sources and onboarding new tools and data feeds into a SIEM/SOAR platform. Strong understanding of threat hunting methodologies, vulnerabilitymanagement, and incident response. Knowledge of frameworks: ISO27001, NIST CSF, SOC2, Cyber Essentials Plus. Comfortable adapting to unfamiliar tooling and integrating new technologies quickly. Why Join? Work at More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
it's a mission-critical role at the heart of our cyber security strategy. As Operational Security Manager, you'll take ownership of our security operations, overseeing threat intelligence, vulnerabilitymanagement, incident response and the performance of our outsourced 24/7 SOC. You'll work closely with internal technology teams to embed security into every aspect of More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Career Legal
days in London per week* What You’ll Do Build the SecOps team from the ground up and manage/mentor the team. Lead the implementation, optimisation, and management of cutting-edge security tools like CrowdStrike, Palo Alto, and Mimecast. Take ownership of our cyber defence posture from incident response and vulnerabilitymanagement to WAFs, DDoS protection More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Reed
practices. You’ll work closely with IT, development, and project teams to embed security into every stage of the software development lifecycle and drive a risk-based approach to vulnerability management. Key Responsibilities Lead application security initiatives across cloud-native and enterprise environments. Promote secure design principles, threat modelling, and best practices across teams. Own and evolve the technical … vulnerabilitymanagement programme. Implement and support security controls, particularly within Azure cloud environments. Evaluate and deploy best-in-class application security tools. Mentor teams and deliver tailored security awareness programmes. Assist with incident response, security training, and supplier/client security assessments. What We’re Looking For Essential Skills & Experience: Proven experience in application security engineering. Strong knowledge More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Project People
We’re seeking an experienced Information Security Manager to lead, develop, and continuously improve our Information Security Management System (ISMS) , ensuring compliance with ISO 27001:2022 and protecting the digital infrastructure. In this strategic yet hands-on role, you’ll manage cyber risk , drive security governance , and embed a security-first culture across the organisation. You’ll also act … we’re looking for: Proven experience managing an enterprise ISMS and ISO 27001 audits. Strong knowledge of cyber threats, cloud security (Azure, M365), and GDPR. Hands-on experience in vulnerabilitymanagement, supplier assurance, and incident response. Excellent communication and stakeholder management skills. Benefits: Competitive salary with bonus scheme Very generous holiday allowance Hybrid working – 3 days per More ❯
and external audits. * Oversee incident response, including investigation, containment, and recovery. * Conduct vendor security assessments and review contractual security requirements. * Lead day-to-day security operations, including access control, vulnerabilitymanagement, and endpoint protection. * Build and mentor a new security team while driving organisation-wide security awareness. Key experience:* Extensive experience in information security within regulated financial services. More ❯
measures What you'll bring: Knowledge of frameworks such as NIST CSF, NIST 800-53, and NCSC CAF Strong understanding of networking, cloud security (AWS/Azure), IAM, and vulnerabilitymanagement Familiarity with ISO 27001/27002 and related standards Awareness of modern threats, malware, and security analytics Experience (5+ years) in cyber security roles preferred Desirable certifications More ❯
Hatfield, Hertfordshire, South East, United Kingdom
Affinity Water Limited
ensuring the resilience of OT systems. What you'll be doing: Implement and manage OT security controls, measures, and technologies to protect critical assets and systems. Conduct risk assessments, vulnerabilitymanagement, and security testing. Develop and implement incident response plans and ensure compliance with regulations. Conduct proactive threat hunting and reactive incident response. Provide regular reports on security … industrial control systems (ICS) and SCADA systems. Strong problem-solving skills and attention to detail. Proven experience with OT and IT security technologies, including firewalls, intrusion detection systems (IDS), vulnerability detection, network discovery, log collection systems, and security information and event management (SIEM) solutions. UK Driving Licence. About Us Affinity Water is the UKs largest water-only supplier More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
IO Associates
to solve problems and push boundaries. Progression: As the function expands, you'll have the chance to build your own specialism or sub-function, whether that's automation, exposure management, or advanced threat engineering. What You'll Be Doing Deliver hands-on security engineering and automation projects for enterprise clients. Build custom integrations, playbooks, and scripts to streamline SOC … operations. Optimise SIEM detection logic and vulnerabilitymanagement workflows. Collaborate with technical teams on innovation, labs, and roadmap projects. Act as a trusted consultant - parachuting in, solving problems fast, and moving on to the next challenge. What We're Looking For Background in SOC, Security Engineering, or Automation - ideally customer-facing. Python/PowerShell/REST API scripting More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
ensure the products they deliver are secure by design. You'll work closely with developers, architects, and business stakeholders to create an environment where secure coding and proactive risk management come naturally. What you'll be doing You'll play a leading role in driving a security-first culture across agile product teams, defining and delivering a clear application … Working hand-in-hand with developers, you'll weave security seamlessly into the software development lifecycle - from designing controls and integrating testing into CI/CD pipelines to supporting vulnerabilitymanagement and remediation. Acting as the go-to expert for secure design, threat modelling, and compliance, you'll make sure teams have the knowledge, tools, and confidence to More ❯
penetration testing with strong understanding of adversarial tactics and threat intelligence Expertise across network, cryptography, vulnerabilities, and attack vectors Strong communication and reporting skills Experience with Breach Attack Simulation, vulnerabilitymanagement, cloud security reviews (AWS/Azure/GCP), or frameworks like ISO 27001 Certifications such as CISM, CISSP, ECSA, CREST CCT Eligible for UK SC Clearance is More ❯
ATT&CK and network/cloud security principles. Strong analytical and communication skills. Bonus points for: Scripting or automation experience (KQL, PowerShell, Python). Background in threat hunting or vulnerability management. Why apply? Hybrid flexibility, funded certifications, cutting-edge tooling, and clear development paths into leadership or specialist roles. If you’re ready to step up and help evolve More ❯
ATT&CK and network/cloud security principles. Strong analytical and communication skills. Bonus points for: Scripting or automation experience (KQL, PowerShell, Python). Background in threat hunting or vulnerability management. Why apply? Hybrid flexibility, funded certifications, cutting-edge tooling, and clear development paths into leadership or specialist roles. If you’re ready to step up and help evolve More ❯
chance to lead security operations, respond to real-world threats, and shape the future of cybersecurity in a dynamic, multi-entity environment. Requirements: Proven experience in incident response and vulnerability management. Hands-on with Microsoft Defender, Sentinel, Azure 365, and related tools. Strong communicator—able to engage technical and non-technical stakeholders. Experience in distributed or franchisee-based environments … plus. Certifications like CISSP, CISM, GIAC, or Azure Security Engineer are highly valued. Responsibilities: Be the go-to expert for security incidents—detect, respond, and remediate across regions. Drive vulnerabilitymanagement using top-tier tools like Tenable, Nessus, and Microsoft Defender. Collaborate with franchisees, vendors, and internal teams to close security gaps and elevate resilience. Translate complex threats More ❯