drive initiatives to design and implement security solutions for Azure and M365 environments, ensuring adherence to industry best practices and regulatory standards. Supplier Security Assessment: Evaluate and ensure the security posture of Material IT Suppliers, ensuring compliance with security standards and contractual obligations. Risk Assessment: Conduct risk assessments … analyze vulnerability and penetration testing reports, and develop risk mitigation strategies. Access Management: Help develop and maintain a robust Role-Based Access Control Framework, ensuring efficient management of access rights. Key Skills & Experience: Ideally a Degree in Computer Science, Information Security, or related field (or equivalent experience). Advanced … of security frameworks (e.g., NIST, ISO27000 series). Expertise in network security protocols, Azure security solutions, firewalls, intrusion detection systems, VPNs, etc. Proficient in vulnerabilityassessment tools, incident response frameworks, and risk management methodologies. Ability to collaborate effectively with cross-functional teams. Analytical mindset to interpret security data More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
have experience designing and implementing security measures that protect sensitive information in complex environments. Your technical expertise spans areas such as encryption, access controls, vulnerability assessments and incident response. You have excellent problem-solving skills and a proactive mindset, enabling you to anticipate potential threats and address them effectively. More ❯
Employment Type: Permanent, Part Time, Work From Home
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
detection/prevention systems (IDS/IPS). Ensure compliance with industry regulations and best-practices (GDPR, HIPAA, PCI-DSS, CIS). Conduct regular vulnerability assessments and implement security patches and updates. Collaboration and Documentation Work closely with other IT teams across the business and across the wider organisation More ❯
South West London, London, United Kingdom Hybrid / WFH Options
Client Server
infrastructures across Python, C++, and Kotlin/Java environments, ensuring robust protection that supports high-speed, data-driven operations. You will conduct threat modelling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle and provide mentorship, guidance and More ❯
supporting bids and proposals. An operational cyber researcher has broad skills which generally involve, but are not limited to, the following activities: Exploratory Research Vulnerability & Technical Research Experimental Development Key Responsibilities Researchers undertaking exploratory research are expected to: Rapidly summarise and assess new domains Provide domain knowledge for technical … analysis, experimental development and subsequent engineering Researchers undertaking vulnerability & technical research are expected to: Know which pen-testing and reverse engineering tools and methodologies are appropriate to a given problem Have experience of advanced vulnerabilityassessment techniques such as fuzzing and code injection Researchers undertaking experimental development … experience in at least one of the areas below. An ideal candidate will cover several areas. Skills Technical Analysis: Network traffic analysis Reverse engineering Vulnerability analysis Exploit development Exploratory Research: OSINT and interacting with SMEs Developing new research skills as appropriate General: Technical Leadership Team management Knowledge Exploratory Research More ❯
such as JSP 440, 604 and Defence Standards (Def stans) Produce security documentation like RMADS, Security Assurance Document, Security Management Plan Conduct penetration testing, vulnerability assessments and remediation activities Your skillset may include: Understanding and application of risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/ More ❯
such as JSP 440, 604 and Defence Standards (Def stans) Produce security documentation like RMADS, Security Assurance Document, Security Management Plan Conduct penetration testing, vulnerability assessments and remediation activities Your skillset may include: Understanding and application of risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/ More ❯
such as JSP 440, 604 and Defence Standards (Def stans) Produce security documentation like RMADS, Security Assurance Document, Security Management Plan Conduct penetration testing, vulnerability assessments and remediation activities Your skillset may include: Understanding and application of risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/ More ❯
Monitoring and analysing security alerts: You'll keep an eye on our systems for any unusual activity and respond promptly to potential threats Conducting vulnerability assessments: You'll help identify weaknesses in our systems and recommend improvements to enhance security Participating in incident response: When a security incident occurs More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
meet regulatory and industry standards. The Role Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. … JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Somerset Bridge Group
and support.Security & Compliance Collaborate with IT Compliance to ensure infrastructure is secure and compliant with industry regulations. Manage regular security audits, patch management and vulnerability assessments in accordance with the Vulnerability Management framework.Stakeholder Management Develop and maintain strong relationships with key stakeholders across the organisation. Liaise with suppliers More ❯
Gloucester, Gloucestershire, South West, United Kingdom Hybrid / WFH Options
Anson Mccade
support the development of next-generation RF systems. This role involves contributing to a variety of secure, high-impact projects focused on RF communications, vulnerability analysis, and mission system design. The position provides exposure to the full RF engineering lifecycle, from circuit modelling and antenna design through to system … to meet specific system requirements Select and optimise antennas for specialised applications Perform real-time RF testing using spectrum and vector network analysers Conduct vulnerability assessments on embedded RF systems Develop specialist RF research and test tools Support system development and verification activities, including trial involvement Required Experience: Practical … with software-defined radios and associated development workflows Desirable Skills: Digital Signal Processing (DSP) and RF algorithm development Antenna optimisation and characterisation Embedded systems vulnerability analysis Working knowledge of tools such as OpenCPI, GnuRadio, VHDL, Python, C/C++ Development experience on Linux platforms and familiarity with Git-based More ❯
Gloucester, England, United Kingdom Hybrid / WFH Options
Anson McCade
support the development of next-generation RF systems. This role involves contributing to a variety of secure, high-impact projects focused on RF communications, vulnerability analysis, and mission system design. The position provides exposure to the full RF engineering lifecycle, from circuit modelling and antenna design through to system … to meet specific system requirements Select and optimise antennas for specialised applications Perform real-time RF testing using spectrum and vector network analysers Conduct vulnerability assessments on embedded RF systems Develop specialist RF research and test tools Support system development and verification activities, including trial involvement Required Experience: Practical … with software-defined radios and associated development workflows Desirable Skills: Digital Signal Processing (DSP) and RF algorithm development Antenna optimisation and characterisation Embedded systems vulnerability analysis Working knowledge of tools such as OpenCPI, GnuRadio, VHDL, Python, C/C++ Development experience on Linux platforms and familiarity with Git-based More ❯