to leverage your skills and make positive impact? We are looking for an experienced IT professional to join during the transition of legacy case management systems to modern, cloud-based solutions. Your role will focus on maintaining and supporting on prem legacy systems during ongoing transformation to cloud-based … support. Therefore we are looking for all-arounder, with good SQL knowledge. What You Will Do Provide expert support and maintenance for legacy case management systems (Extranet, CMS, DTS, EKS2, and ADMS) in collaboration with the IT teams. Ensure the legacy systems continue to run smoothly during the transition … patches, and general system maintenance for both legacy and cloud-based systems. What do you need to be successful? Strong experience in SQL server management and replication. Experience in writing and optimising SQL scripts for system management and troubleshooting. Strong knowledge of SharePoint (on-premise & cloud). Experience More ❯
london (city of london), south east england, United Kingdom Hybrid / WFH Options
Sarafin Partners
their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in … accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities … Collating security incident and event data to produce monthly exception and management reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and, where appropriate, resolving or escalating reported security incidents Monitoring More ❯
required physical, technical, and administrative controls as set out in the Group IT Governance Rules. The ideal candidate should have extensive security knowledge, project management skills, and excellent communication abilities. An understanding of Japanese culture and some Japanese skill would be advantageous. -------------------------------------- ELIGIBLE APPLICANTS: (O) Eligible visa: Permanent residence … infrastructure • Streamline operational processes and propose improvements • Support for implementing required physical, technical, and administrative controls • Design and propose security outsourcing services (e.g., ID management, network diagram maintenance, vulnerabilitymanagement, EoL management) for overseas branches and subsidiaries 3.Legal Compliance & Regulatory Requirements • Ensure adherence to relevant European … regulations (e.g., NIS2, EU AI Act) • Oversee necessary documentation, reporting, and audit coordination 4. Communication & Relationship Management • Facilitate effective communication with both domestic and international stakeholders, including managing time zone and language challenges • Collaborate with team members and internal/external partners to achieve objectives IT Security Analyst Ideal More ❯
established playbooks Escalating complex incidents to Tier 2 Incident Response Teams Reviewing and developing security controls in a growing technical environment Triaging and reviewing vulnerability scanning reports, providing feedback to technical teams Reviewing secure configurations and feeding back for remediations Generating recurring security reports for stakeholders Providing feedback for … a degree in Cyber Security, Computer Science, Networks, etc. Professional qualifications from organizations like CompTIA, ISACA, etc. Technical qualifications such as cloud computing, SIEM, vulnerabilitymanagement, etc. Experience (Nice to have) Understanding of concepts like cloud computing, incident management, risk management, information security (CIA), phishing, ransomware … and skilled IT professionals, committed to digital innovation. We excel in areas like Secure-by-Design, cloud computing, network design, rapid application development, cyber vulnerability mitigation, and intelligence systems. We offer independent consultancy and champion open-source technologies. A word on UK Security Clearance Due to the secure nature More ❯
london, south east england, United Kingdom Hybrid / WFH Options
CLS Group
in which everyone is encouraged to be open and forward-thinking. Job information: Functional title - AVP, IT Security Specialist Department – Security Governance and Risk Management Corporate level – Associate Vice President Report to – Director of Security Location - London, onsite 2 days per week About the role: The individual will be … consultation on remediation approaches to address gaps and continue ongoing monitoring of remediation, re-assess until reduced to an acceptable level. Supporting Cybersecurity Risk Management strategies based on security findings and observations. Including informing improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all … written communication skills to convey complex technical information clearly and effectively. Presenting data insights to non-technical stakeholders Base level understanding of security risk management and taxonomy principles, to reduce risk to an acceptable level. Knowledge of vulnerabilitymanagement and incident management practices. Ability to learn More ❯
risk, ensuring compliance with regulatory requirements, and maintaining corporate controls. This role will be primarily responsible for leading efforts related to third-party risk management, client due diligence, awareness training, and regulatory compliance. The ideal candidate will have a strong grasp of cybersecurity threats and hands-on experience. Key … Responsibilities Governance Risk and Compliance Advise project teams, application owners, infrastructure services, and other IT teams on information security controls, such as access management, incident handling, business continuity, system development lifecycle, threat and vulnerabilitymanagement, and data protection. Identify and manage risks and vulnerabilities, providing strategic mitigation … recommendations. Continuously improve policies and procedures related to controls and operational processes. Develop and deliver precise and timely metrics and reports. Third-Party Risk Management: Conduct risk assessments of new and existing third-party vendors to ensure compliance with company policies and regulatory requirements. This includes reviewing security controls More ❯
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … on vulnerabilitymanagement , endpoint security (EDR/XDR) , and cloud compliance . Good understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged access management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits. Gap Assessments: Facilitate and/or conduct internal … Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security … the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. VulnerabilityManagement: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong More ❯
across various platforms. The consultant will play a critical role in evaluating and strengthening our clients' cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with … develop, document, and implement security policies, standards, and guidelines aligned with industry standards (e.g., ISO 27001, NIST). Assist in the deployment, configuration, and management of security infrastructure and technologies, including firewalls, intrusion detection/prevention systems, and secure network architectures. Provide guidance and support on Azure security practices … including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerabilitymanagement, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit More ❯
for security breaches, and responding to incidents. They also work to educate employees on best practices for information security. Main Responsibilities Security Implementation and Management Deploy and optimise security solutions to safeguard IT services and infrastructure. Lead security assessments including vulnerability testing and risk analysis to identify and … and effective action. Develop comprehensive incident response plans to maintain organisational resilience against threats. Oversee operational security processes with tools like SIEM, EDR, and VulnerabilityManagement, continuously enhancing capabilities. Network and System Security Manage advanced security tools such as firewalls and IDS/IPS to protect network integrity. … organisation. Cloud and Application Security Enhance the security of cloud services (SaaS, PaaS, IaaS) and enterprise applications through advanced security measures and identity access management (IAM). Education & Competencies University Degree or equivalent preferred A minimum of 3 years' experience in a similar role. Strong and demonstrable experience of More ❯
Stroud, south east england, United Kingdom Hybrid / WFH Options
Ecotricity
Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Linux Operating Systems On-Premise Active Directory Networking - Cisco/Fortigate Penetration Testing & VulnerabilityManagement Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate for this … be working towards a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (ie. NIST or Cyber Security Essentials). Knowledge of vulnerability databases (ie. NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tooling. Experience using Code Security scanning More ❯
Response: Monitor and analyze security events to detect potential threats or breaches. Respond to security incidents, conduct root cause analysis, and implement corrective actions. VulnerabilityManagement: Perform regular security assessments, including penetration testing and vulnerability scanning. Collaborate with development teams to address vulnerabilities and enforce remediation timelines. … or a similar role. Strong understanding of security principles, cryptography, and network protocols. Hands-on experience with security tools (e.g., SIEM, IDS/IPS, vulnerability scanners). Familiarity with cloud platforms (e.g., AWS, Azure, GCP) and their security frameworks. Knowledge of secure coding practices and common vulnerabilities (e.g., OWASP More ❯
Farnborough, Hampshire, United Kingdom Hybrid / WFH Options
Thebusinessyear
expertise and strategic planning to prevent attacks and vulnerabilities. Your responsibilities include planning and implementing security controls to safeguard information. Key functions/outputs: Vulnerability Scanning & Reporting Change Work Participation in Regular Meetings Documentation Main Objectives: Vulnerability Scanning & Reporting Conduct regular vulnerability scans, generate reports, and ensure … tools are current to identify system weaknesses. Perform code scans, vulnerabilitymanagement scans, and assist in reporting to the cyber security team. Update endpoint protection, ensure antivirus and anti-malware are current, and audit network controls and access permissions. Recognize and respond to potential incidents, including containment and … SITT and perform security testing and assurance activities during planning phases. Participation in Regular Meetings: Lead or attend meetings such as Security Working Groups, Vulnerability Triage, Security Workshops, PI Planning, and Daily Standups, providing cybersecurity input. Documentation: Create and maintain detailed security documentation including design documents, SOPs, and compliance More ❯
Andover, Hampshire, United Kingdom Hybrid / WFH Options
Deloitte - Recruitment
SOC SIEM tool. Focus on insider threat and Data Loss Prevention use case to demonstrate the process used by SOC analysts. Cyber Security Incident Management Plan (SIMP) - Develop the Cyber Incident Response Plan in line with NIST and SANS guidance and incorporating the wider teams. Create supporting documentation and … Review existing documentation for the SOC BCDR and develop process/plan that feeds into the wider process. Cyber Incident Investigation/Escalation - Reviewing vulnerability event channels and identifying issues for escalation to different teams. Training and development - Mentor existing SOC team and develop playbooks and training and development … and potential future requirements for this requirement: Strong knowledge of Cyber Security, with a focus on operational security, such as security monitoring and alerting, vulnerabilitymanagement and incident response. Producing supporting security documentation in coordination with stakeholders. A good all-round knowledge of IT systems and Networking. Experienced More ❯
some of the brightest minds in the industry. Desired Experience (full job spec available): 5+ years experience in a technical security role Experience in vulnerability assessment, penetration testing, and vulnerabilitymanagement processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate More ❯
deploy and manage cloud environments and integrate technologies that are part of customer stacks, to accurately replicate and resolve customer issues Knowledge of SIEM, vulnerabilitymanagement tools, firewalls, malware, exploits, operating system structure and behavior Strong consulting and project management skills, with validated results working as a More ❯
london (battersea), south east england, United Kingdom
Databarracks
can make a genuine impact on customers’ data security and business continuity, then keep reading. The Role: What You’ll Do Here: - Azure Infrastructure Management: Design, deploy, and manage scalable Azure-based infrastructure services including IaaS, PaaS, networking, and security components. - Virtualisation VMware & Hyper-v. Management of environments … Compliance: Implement and maintain infrastructure security policies and controls aligned with industry standards (e.g., ISO 27001, NIST, CIS). Collaborate with InfoSec teams on vulnerabilitymanagement and risk mitigation. - Infrastructure Automation & Optimization: Automate infrastructure deployment and configuration using tools such as PowerShell, ARM templates, or Terraform. Drive continuous More ❯
SOC) , with one analyst reporting to you Oversee incident response , manage security incidents from detection to resolution Work closely with the compliance manager on vulnerabilitymanagement Architect secure solutions, validate baseline configurations, and recommend improvements to stay compliant Collaborate with key stakeholders including Compliance and Infrastructure teams Required More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Totum Partners
from a legal or financial environment. Hands-on technical skills in the following; MS Defender, Azure Security Centre, Intune, Entra ID, CrowdStrike, Azure, M365, VulnerabilityManagement, PowerShell, SIEM Solutions & an understanding of ISO27001. Any Azure or Security certification would be desirable. This role offers hybrid working - 2 days More ❯
all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerabilitymanagement (tenable is tool used) and patching More ❯
Portsmouth, Hampshire, United Kingdom Hybrid / WFH Options
G2 Ops, Inc
plus benefits Openings: 2 Full-Time Roles Knowledge Requirements: Understanding of C4ISR architectures and information-assurance principles Familiarity with DoD Risk Management Framework (RMF) and accreditation processes Experience with system and network security analysis on NIPRNet, SIPRNet, etc. Knowledge of DoD 8570.01-M IAT requirements Proficiency with cybersecurity tools … a motivated, team-oriented Information Systems Security Engineer to work on cybersecurity governance, risk, and compliance, supporting DoD projects involving security controls, risk assessments, vulnerabilitymanagement, cloud security, policy development, and system analysis. Must have or be eligible for a DoD Secret clearance and IA Technical II certification More ❯
Information Security Analyst working as part of a central team supporting a mixture of security operations ensuring compliance with business needs. This will involve vulnerabilitymanagement, making sure security controls are functioning, mentorship of more junior members and working as part of a 24 x 7 remote support More ❯