Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
and business assurance needs. 4. Proactively assess and communicate current state of risks and controls in technical areas such as zero trust (IAM), cloud risk, data security, software security, vulnerabilitymanagement, supply chain security, cyber risk, analytics, breach handling and investigations, and security testing. 5. Reviewing audit engagements ensuring delivery is to the required quality and efficiency standards …/developing staff and reviewing the quality of work produced by team members • Strong interpersonal, communication and team skills; ability to work and communicate effectively with all levels of management and staff • Demonstrated experience implementing and driving change in complex organisational structures • Ability to analyse, articulate and communicate complex topics effectively, to make informed decisions about appropriate corrective actions … strategic options available to the business. • Strong technology and/or change knowledge and experience. Qualifications: • Certified in one of the following: CISSP-ISSAP, CISA, SANS, CRISC • PMP (Project Management Professional) certificate are preferred • A recognised audit qualification More ❯
application security. Experience required: Consulting experience in application security architecture, preferably with exposure to public sector clients. Deep knowledge of OWASP Top 10, secure coding practices, threat modelling, and vulnerability management. Experience influencing design and security strategy across large programmes. Strong communication and client-facing skills; able to present to both technical and executive stakeholders. The package: Up to More ❯
solution 1. Bridging the gap between project and support teams through techno-functional expertise For a new business implementation project, drive the end to end process from business requirement management to integration & configuration and production deployment Check the feasibility of the new change requirements and provide optimal solution to the client with clear timelines Provide techno-functional solution support … and provide solutioning/advise to the client or internal teams accordingly Support on-site manager with the necessary details wrt any change and off-site support Mandatory Skills: VulnerabilityManagementMore ❯
building out something exciting, with a fantastic long term career path, then this is the role for you! Within this role you will: Lead and evolve the cybersecurity risk management framework, ensuring effective identification, assessment, and remediation of risks. Conduct detailed risk and control assessments across business units, projects, vendors, and IT systems, aligning with standards like ISO … NIST CSF, and CIS Controls. Manage and enhance Third-Party Risk Management, including cybersecurity assessments of external partners and suppliers. Collaborate with stakeholders to develop and track cyber risk treatment plans, implement corrective actions, and report on key risk indicators and control effectiveness. Drive continuous improvement of cybersecurity policies and practices, while fostering strong relationships to embed a risk … and PCI. Strong technical and analytical skills, with the ability to assess risks, identify gaps, and propose mitigation strategies across IT systems and third parties. Excellent communication and stakeholder management, including experience presenting risk insights to senior leadership and working across technical and business teams. Proven experience in cybersecurity disciplines, ideally 5-7 years in roles covering risk managementMore ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Sanderson Recruitment
building out something exciting, with a fantastic long term career path, then this is the role for you! Within this role you will: Lead and evolve the cybersecurity risk management framework, ensuring effective identification, assessment, and remediation of risks. Conduct detailed risk and control assessments across business units, projects, vendors, and IT systems, aligning with standards like ISO … NIST CSF, and CIS Controls. Manage and enhance Third-Party Risk Management, including cybersecurity assessments of external partners and suppliers. Collaborate with stakeholders to develop and track cyber risk treatment plans, implement corrective actions, and report on key risk indicators and control effectiveness. Drive continuous improvement of cybersecurity policies and practices, while fostering strong relationships to embed a risk … and PCI. Strong technical and analytical skills, with the ability to assess risks, identify gaps, and propose mitigation strategies across IT systems and third parties. Excellent communication and stakeholder management, including experience presenting risk insights to senior leadership and working across technical and business teams. Proven experience in cybersecurity disciplines, ideally 5-7 years in roles covering risk managementMore ❯
Watford, Hertfordshire, South East, United Kingdom
ECS
Server, Active Directory, networking, and cloud services . Support day-to-day operations of Azure IaaS/PaaS , Microsoft 365 , Exchange Online , and related platforms. Administer and improve endpoint management via Intune , SCCM , and Autopilot. Ensure security compliance through MFA , Microsoft Defender , and proactive vulnerability management. Collaborate with internal support teams and third-party vendors to drive service … Azure AD) , and Microsoft 365 services . Experience managing Windows Server environments , Active Directory , GPOs , Hyper-V , and networking (DNS, DHCP, VPN, firewalls) . Skilled in endpoint and device management tools such as Intune , SCCM , and Jamf (for macOS) . Scripting and automation ability (e.g., PowerShell ). Understanding of ITIL principles and familiarity with ITSM platforms like ServiceNow or More ❯
posture across diverse business models-including third-party and franchisee environments. Responsibilities: Lead incident response across multiple regions and business units. Drive security gap analysis and remediation strategies. Manage vulnerability detection and resolution using tools like Tenable, Nessus, and Microsoft Defender. Collaborate with internal teams, external vendors, and franchisees. Develop and refine security documentation and executive reporting. Contribute to … the evolution of a standardized incident response framework. Requirements: Hands-on experience in incident response and vulnerability management. Strong technical skills in Azure 365, Microsoft Defender, Sentinel, Tenable, and Nessus. Ability to translate complex technical issues into clear, actionable insights. Excellent stakeholder engagement and communication skills. Experience in Microsoft-centric environments and distributed/franchisee models is a plus. More ❯