to support Security Consulting 'go to market' propositions and service offerings. Leading in the development and presentation of compelling client proposals collaborating with teams across our business. Strong stakeholder management and relationship building skills at senior levels that will enable consensus building in the shaping of secure client solutions Shaping, leading and delivering value through security advisory consultancy and … through guiding secure transformational delivery engagements. Providing security expertise across security standards and accreditations, measure and control the effectiveness of the security controls framework and maintain the Information Security Management System. Deriving and delivering documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies. Standards and guidelines Assiting with the identification … of identified risks and emerging cyber security vulnerabilities and threats. The subsequent analysis to quantify and lead risk mitigation plans Work with Service Management to ensure that partners and suppliers adhere to agreed standards, policies and verify/evidence appropriate compliance and security KPIs Work closely with 1st, 2nd and 3rd lines of defence on all matters relating to More ❯
a broad range of domains. The Senior Cyber Security Specialist will operate across Cyber Operations and GRC, ensuring UK-specific compliance and security resilience. Role: Security Incidents: Oversee incident management and response, including root cause analysis, impact assessment, and post-incident reviews. Threat Management: Develop and refine threat intelligence, threat hunting capabilities, and prevention/detection measures. Security … Technologies: Configure, maintain, and optimise security platforms (SIEM/XDR, EDR, vulnerabilitymanagement, Secure Email Gateway, Application Allowlisting etc.) Security Controls: Implement and maintain security controls, continuously improving detection, prevention, and remediation. Vendor Risk & Audit: Conduct vendor risk assessments, support internal and external audits (e.g. Cyber Essentials, ISO27001), and manage remediation actions. Cyber Security Program: Support the execution … Cyber Essentials, and any industry-specific security requirements. Skills and Experience: 5–7 years' experience in security operations, engineering, or cyber threat management. Strong knowledge of SIEM, XDR, EDR, vulnerabilitymanagement, firewalls, and network security. Hands-on experience in security control implementation and maintenance (e.g. ISO27001, Cyber Essentials). Familiarity with MITRE ATT&CK, incident response methodologies, and More ❯
Exeter, Devon, United Kingdom Hybrid / WFH Options
Met Office
The following content displays a map of the jobs location - Exeter We're looking for an exceptional VulnerabilityManagement Manager to help us make a difference to our planet. As our VulnerabilityManagement Manager, the job may be suitable for hybrid working, which is where an employee works part of the week in the office and … people are at the heart of what wedoand we'll do our best toagreea working pattern that works for everyone. World changingwork From science to technology, from meteorology to management, and from planning to communication, our expertise helps us stand out as the authority on weather accuracy and climate prediction. We help individuals, industries and government to make better … purpose at the heart ofdecision-making We'rebettertogether-understandingpartnerships and inclusivity make usgreater We keep evolving - pushing boundaries to make tomorrow better for ourcustomers Your world ofexpertise As theVulnerability Management Managerwithin the Security Operations team of the Met Office's Cyber Security Department you will be responsible for driving the vision and operational execution of the organisation's vulnerabilityMore ❯
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
You’ll Bring CISSP or equivalent + 6-7 years in InfoSec Experience maturing security programs & frameworks ( ISO27001, NIST CAF, OWASP ) Strong knowledge of SIEM, IDS/IPS, RBAC, vulnerabilitymanagement Understanding of cloud, COTS/SaaS platforms & IoT security Ability to communicate risks & strategies at executive level Full driving license & personal transport What’s On Offer Key More ❯
Bath, Somerset, South West, United Kingdom Hybrid / WFH Options
London & Country Mortgages
ensure these systems are fit for purpose and operational. Ideally youll have knowledge and experience with the following: 1. MS Azure knowledge, with experience of the following; Entra ID Management Azure storage accounts Azure Virtual Desktop (AVD) Azure Virtual machine management 2. MS 365 administration of; Teams Sharepoint Intune 3. On prem infrastructure experience i ncluding; Building and … when business needs change. Furthermore, whilst not essential, in addition to the Essential skills it would be desirable to have knowledge and experience of the following technologies; SSL certificate managementVulnerabilitymanagement SIEM experience (Ideally MS Sentinel) Infrastructure As Code (Ideally Terraform and Ansible) Powershell SQL Cisco Umbrella Nutanix Hyperconverged Infrastructure support Netapp Support Knowledge of and More ❯
objectives. Performance Monitoring : Continuously monitor, analyse, and enhance the reliability of large-scale distributed systems to ensure seamless uptime and operational efficiency. Automation Solutions : Develop automation solutions for configuration management, system provisioning, and deployment, significantly streamlining operations and minimising manual processes. Security Compliance : Implement and maintain robust security protocols, ensuring that systems comply with regulatory standards and best practises … including data encryption, access control, and vulnerability management. Incident Management : Lead efforts in resolving system outages or performance degradation, conduct root cause analysis, and implement preventive measures to mitigate future risks. Collaboration : Work closely with cross-functional teams, including software development, DevOps, and IT operations, to integrate solutions, troubleshoot issues, and enhance overall system performance. Capacity Planning : analyse More ❯
WiFi deployments (802.1X/Certificate-based) as well as guest and BYOD access requirements Familiar with firewall configuration fundamentals and advanced threat hunting Experience with security tools and general vulnerabilitymanagement, both at the perimeter and client Experience of backup methodologies and management Produce documentation for end users and the support desk IT Helpdesk Experience Bonus Skills More ❯
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics … and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerabilitymanagement, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented with the ability to multi-task and prioritize efforts - Ability to express More ❯
Bath, Somerset, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Infrastructure Security Analyst, SCCM, Vulnerability, Patch management, Qualys/Nessus Our client, a leading private sector business based in Bath, is looking to hire contractor with a background in infrastructure and related security. The successful candidate will be responsible for ensuring security and integrity for our clients IT infrastructure, taking responsibility for patching and vulnerability remediation for … patches to Windows servers to address vulnerabilities, ensuring compliance with security policies. Manage patching windows and downtime coordination with various business units to minimize disruption during updates. Monitor patch management systems to ensure all systems are up to date and protected from security threats. Server hardening to Windows systems, both physical and virtual. Maintain accurate documentation of remediation activities … incident response by applying emergency patches and remediations Contribute to disaster recovery and business continuity plans Skills and experience required: - Windows server including patching processes Server/security hardening. Vulnerabilitymanagement tools e.g. Nessus, Qualys, for conducting vulnerability assessments Hands-on experience in patch management systems - SCCM, WSUS, or Azure Update Management - for deploying patches More ❯
systems, subsystems, products and external interfaces, and may include a mixture of operational cybersecurity functions and governance, risk and compliance (GRC) activities. Key responsibilities include: Perform systems security risk management activities, including identifying security threats, analysing the risk exposure and presenting treatment options to mitigate security risk. Conduct asset management including maintaining accurate inventories of all hardware and … software configuration items. Maintain change management, through evaluation of system changes for cybersecurity impact and updating any affected security authorisation artefacts. Perform vulnerabilitymanagement, including conducting automated vulnerability scans, using the provided toolset, to identify any open vulnerabilities and ensure they are appropriately documented, tracked and remediated in the given timeframes. Present cybersecurity solutions to non More ❯
safeguard national interests What We're Looking For 1-3 years of practical experience in Cyber Security Good understanding of core security principles and tools Exposure to network security, vulnerabilitymanagement, or risk assessments (preferred) Familiarity with security frameworks such as ISO 27001, NIST, or PCI DSS (preferred) Professional certifications like Security+, CEH, or CISSP are desirable Analytical … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Employment Type: Permanent
Salary: £45000 - £55000/annum Excellent Training and Benefits
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
safeguard national interests What We're Looking For 1-3 years of practical experience in Cyber Security Good understanding of core security principles and tools Exposure to network security, vulnerabilitymanagement, or risk assessments (preferred) Familiarity with security frameworks such as ISO 27001, NIST, or PCI DSS (preferred) Professional certifications like Security+, CEH, or CISSP are desirable Analytical … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Experis UK
safeguard national interests What We're Looking For 1-3 years of practical experience in Cyber Security Good understanding of core security principles and tools Exposure to network security, vulnerabilitymanagement, or risk assessments (preferred) Familiarity with security frameworks such as ISO 27001, NIST, or PCI DSS (preferred) Professional certifications like Security+, CEH, or CISSP are desirable Analytical … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
Benefact Group plc
of the business, helping guide solutions that align with security and project requirements by articulating the real-world cyber security risks associated. You will also be responsible for our VulnerabilityManagement program ensuring that agreed SLAs are achieved and provide consultation when solutions are not straight forward. As the Senior Cyber Security Consultant, you will be providing mentorship … requests, you will provide subject matter expertise for internal projects and stakeholders, identifying risks and advising on the correct approach to mitigate those risks You will have responsibility for VulnerabilityManagement managing outputs from internal tooling and external vendors in order to prioritise remediation by relevant internal parties in order to ensure the identified risks are mitigated You … of the Team, fostering an inclusive, supportive and engaged learning environment, being a key contributor to a high performing and professional Security Team. Knowledge, skills and experience Strong stakeholder management skills A strong understanding of enterprise ICT and security principles A strong understanding of cloud security concepts and technologies Understanding of the CI/CD process and security integrations More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
EDF Energy
security engineer role, operating or maintaining network infrastructure. You'll have a strong working knowledge of next-generation firewalls and SASE platforms, exposure to email gateways, load balancers, and vulnerabilitymanagement tools in a complex enterprise environment would be a big plus. You'll be someone who takes pride in delivering exceptional customer service, with a background in More ❯
knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • VulnerabilityManagement and Patching • SIEM principles, products and More ❯
L1/L2 Security Analyst to work onsite 5 days a week in Corsham. Experience in the following is required: Proven experience operating in a SOC environment. Exposure to vulnerability management. Experience using Splunk and/or other SIEM tools for security monitoring and analysis. Familiarity with security technologies, network protocols, firewalls, and intrusion detection/prevention systems. Knowledge More ❯