a pivotal role in shaping the future of our IT operations. What You'll Be Doing Lead and mentor a team of off-shore infrastructure engineers. Own patch and vulnerabilitymanagement (Ivanti), application upgrades, and service availability. Oversee infrastructure across on-prem and cloud (Azure) environments. Act as escalation point for 2nd/3rd line incidents and out … understanding of security tools (e.g. Rapid7, Crowdstrike). Excellent troubleshooting, documentation, and communication skills. Desirable: Exposure to AVD, Linux, Windows 11 build processes. Knowledge of Microsoft Entra, Azure resource management, and PRTG monitoring. Experience in financial services or regulated environments. Certifications such as MCSE, VCP, or Cisco are a plus. What You're Like Calm under pressure, with a More ❯
and briefing system within WTW to ensure technology teams are aware of threats and become accountable for addressing them within the technologies they manage. Integrate Threat Intelligence to the vulnerabilitymanagement program to ensure new vulnerabilities are remediated Provide senior stakeholder and board level briefings. Overall, bring Threat Intelligence to the top of all processes to ensure WTW More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ashdown Group
Duties will include: - Working with the wider business on ISO27001 and Cyber Essentials - Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Deploy SIEM - Support ongoing improvements to internal defence - Oversee policies and procedures - Support data protection initiatives - Security projects - Develop disaster recovery plans - Establish and improve vulnerabilitymanagementMore ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ashdown Group
Duties will include: - Working with the wider business on ISO27001 and Cyber Essentials - Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Deploy SIEM - Support ongoing improvements to internal defence - Oversee policies and procedures - Support data protection initiatives - Security projects - Develop disaster recovery plans - Establish and improve vulnerabilitymanagementMore ❯
experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python, JavaScript … GoLang, Terraform, CloudFormation (AWS), and AWS CDK. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Desired: Ability to work independently, take initiative, and maintain a keen attention to detail, ensuring high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. Why More ❯
Oxford, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Robert Half
considered throughout the product and software development lifecycle Provide security best practice, build security design patterns, complete security architecture reviews Support on-going BAU software development processes and champion vulnerabilitymanagement Provide internal security consultancy and lead on audit engagements, risk activities Skills & Experience Understanding of securing micro-service architectures Working knowledge of modern secure SDLC practices - embedding More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Talent Locker
or HP networking tech (CLI preferred), plus Check Point or similar firewalls Familiarity with tools such as Microsoft Defender XDR, Sentinel, iBoss, Cisco ISE or Secure Access Awareness of vulnerabilitymanagement, threat prevention, and SOC tooling Ability to investigate and troubleshoot under pressure with a methodical, root-cause approach Previous experience in an ITIL-aligned environment Why this More ❯
Requirements: Essential: 5+ years of experience in application security, with at least 3+ years in software development. Strong understanding of application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, and API Security (including authentication and authorization). Proficiency in programming languages such as Python, Java, JavaScript … GoLang, and Rust. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to oversee multiple security projects simultaneously. Desired: Independent, proactive, and detail-oriented, with a commitment to maintaining high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. What we offer: Pension company contribution = 3% Incentive scheme More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
controls , including host firewalls , SELinux , and intrusion detection. Knowledge of networking fundamentals , especially from a security perspective. Experience working in highly governed environments with tight SLAs. Skilled in patch management and system update procedures. It would be great if you had: Experience with secure environments and familiarity with JSP 440 and SCIDA requirements. Proficiency in scripting (e.g., Bash , Python … for secure automation. Familiarity with vulnerabilitymanagement tools such as OpenSCAP and Nessus . Exposure to Red Hat deployment tools and secure system state management. If you are interested in this role but not sure if your skills and experience are exactly what were looking for, please do apply, wed love to hear from you! Employment Type: Full More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Talent Locker
for someone who enjoys hands-on engineering, improving SOC effectiveness, and shaping threat detection capabilities at scale. What you'll be doing Deploying and configuring security tools including SIEM, vulnerability scanning and endpoint monitoring Developing use cases, alerts, and dashboards to support active threat detection Writing and maintaining SOC playbooks and triage workflows Performing 2nd line security monitoring, incident … have: Familiarity with MOD policy (e.g. JSP 440, JSP 604) and assurance practices Experience with CI/CD tools, Kubernetes and modern DevSecOps approaches Knowledge of Tenable/Nessus, vulnerabilitymanagement and SOC operations Exposure to working within a defence, security or mission-critical environment Looking for a role where your expertise has real-world impact in a More ❯
within regulated sectors such as Defence, Aerospace, or Industrial Engineering. Strong understanding of enterprise security frameworks, secure system design, and risk management. Experience with cloud security, identity and access management, and secure integration patterns. Familiarity with cybersecurity tools and platforms including SIEM, endpoint protection, IAM, and vulnerability management. Excellent communication and stakeholder engagement skills. UK citizenship and eligibility More ❯
building out something exciting, with a fantastic long term career path, then this is the role for you! Within this role you will: Lead and evolve the cybersecurity risk management framework, ensuring effective identification, assessment, and remediation of risks. Conduct detailed risk and control assessments across business units, projects, vendors, and IT systems, aligning with standards like ISO … NIST CSF, and CIS Controls. Manage and enhance Third-Party Risk Management, including cybersecurity assessments of external partners and suppliers. Collaborate with stakeholders to develop and track cyber risk treatment plans, implement corrective actions, and report on key risk indicators and control effectiveness. Drive continuous improvement of cybersecurity policies and practices, while fostering strong relationships to embed a risk … and PCI. Strong technical and analytical skills, with the ability to assess risks, identify gaps, and propose mitigation strategies across IT systems and third parties. Excellent communication and stakeholder management, including experience presenting risk insights to senior leadership and working across technical and business teams. Proven experience in cybersecurity disciplines, ideally 5-7 years in roles covering risk managementMore ❯
building out something exciting, with a fantastic long term career path, then this is the role for you! Within this role you will: Lead and evolve the cybersecurity risk management framework, ensuring effective identification, assessment, and remediation of risks. Conduct detailed risk and control assessments across business units, projects, vendors, and IT systems, aligning with standards like ISO … NIST CSF, and CIS Controls. Manage and enhance Third-Party Risk Management, including cybersecurity assessments of external partners and suppliers. Collaborate with stakeholders to develop and track cyber risk treatment plans, implement corrective actions, and report on key risk indicators and control effectiveness. Drive continuous improvement of cybersecurity policies and practices, while fostering strong relationships to embed a risk … and PCI. Strong technical and analytical skills, with the ability to assess risks, identify gaps, and propose mitigation strategies across IT systems and third parties. Excellent communication and stakeholder management, including experience presenting risk insights to senior leadership and working across technical and business teams. Proven experience in cybersecurity disciplines, ideally 5-7 years in roles covering risk managementMore ❯
SDLC) practices. Advise and offer guidance on: * Design, implement, and maintaining secure CI/CD pipelines.* Integrate security tools and practices into DevOps workflows (e.g., SAST, DAST, SCA, secrets management).* Collaborate with development, operations, and security teams to implement and ensure secure coding and deployment practices.* Advise on threat modeling, risk assessments, and vulnerability management.* Provide expert More ❯