Portsmouth, Hampshire, South East, United Kingdom Hybrid / WFH Options
Robert Half
Job Posting: Cyber Security Assurance Manager Location: Portsmouth (Hybrid) Salary: £50,000 - £65,000 DOE Are You Ready to Lead the Way in Cyber Security Assurance? Robert Half are seeking a dynamic, proactive, and experienced Cyber Security Assurance Manager to join a globally-scaled, fast-paced Security Operations Centre (SOC) environment. In this crucial role, you will … excellence, this opportunity is for you! What We're Looking For: Qualifications and Experience: Proven experience delivering and managing cybersecurity certifications (e.g., ISO/IEC 27001, SOC2 Type II, CyberEssentials Plus, CREST). A strong understanding of SOC operations and security assurance frameworks. Experience engaging with customers during audits and RFP/RFI processes, showcasing security-driven … abilities. Highly organised, able to manage multiple certifications and assurance projects simultaneously. Key Responsibilities Certification Leadership: Deliver and maintaincertifications such as ISO/IEC 27001, SOC 2 Type II, CyberEssentials Plus, and CREST accreditation. Manage sector-specific frameworks, like PCI DSS for payment card data and NCSC CIR/CHECK for secure operations. Proactively identify compliance gaps More ❯
Senior IT Security Specialist to lead and strengthen the cyber resilience of a complex public-sector programme. The postholder will play a pivotal role in developing, implementing, and governing security strategy, ensuring compliance with national standards, and embedding robust cyber practices across digital and IT estates. This is a senior strategic and technical leadership role, ideal for a … objectives and statutory duties. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprise architecture and digital transformation strategy. Advise senior management and boards on cyber risk posture, incidents, and mitigations. Identify and manage strategic risks — technical, legal, reputational, and financial. Evaluate emerging technologies (AI, RPA, cloud, hybrid infrastructure) from a security perspective. Policy, Procedure … and Guidance Oversight Review, update, and enforce security policies, standards, and guidance (e.g. Acceptable Use, Incident Response, Remote Access). Ensure compliance with NCSC, ISO 27001, NIST, CyberEssentials, and GDPR frameworks. Clarify security roles and responsibilities across departments. Support Information Governance and Data Protection teams on policy alignment and compliance. Technical Review and Oversight Lead or oversee More ❯
objectives and regulatory requirements. This position oversees the continuous improvement of security policies and standards, including technical standards, ensuring adherence across the enterprise. The role is accountable for measuring cyber maturity and driving compliance with internal and external requirements. It also includes oversight of the development and implementation of a comprehensive Operational Technology (OT) compliance framework, ensuring alignment with … broader Arriva and industry recognised cyber security standards. The Head of InfoSec GRC & Awareness manages the enterprise-wide information security risk management process, including the maintenance of the InfoSec Risk Register, oversight of residual risk declarations, and escalation of serious risks in accordance with the Arriva Risk Management framework. The role also includes risk reporting and the execution of … the wider European teams in the Netherlands and Mainland Europe business units. Maintains and develops Information Security Management System in line with ISO27001. Drives organisation-wide security governance and cyber maturity through standards compliance, assurance reviews, and gap analysis, be that Arriva policies and standards or industry recognised certifications such as ISO/IEC 27001, CyberEssentialsMore ❯
including Technical Security Audit (based on CIS security controls) and NIST Frameworks. Development and review of IT policies and procedures Lead internal (e.g. GMR, system) and external audits (e.g. CyberEssentials Plus) Infrastructure & Service Management Oversee the performance, maintenance, and security of IT infrastructure, including networks, servers, cloud platforms, and end-user devices Ensure robust disaster recovery and … liaison between the company and Group IT Director Build strong relationships with internal stakeholders to understand business needs and deliver effective technology solutions SKILLS, EXPERIENCE & QUALIFICATIONS An understanding of CyberEssentials Plus, CIS audits and NIST frameworks is also required to ensure the business meets the challenges of cyber security hygiene Hands on knowledge of Microsoft … tools (Teams, SharePoint etc.). A good knowledge of the security features of 365 (Entra/Azure AD) is required to ensure the business leverages the maximum potential of cyber hygiene and GDPR best practice Understanding the importance of Identity Threat Management Experience or understanding of SentinelOne MDR Experience in using third party SOC provision Experience or understanding of More ❯
regulatory obligations. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprise architecture and digital strategy. Participate in board-level or senior management discussions around cyber risk. Identify and manage strategic security risks (technical, legal, reputational, financial). Evaluate and advise on emerging technologies (e.g. AI, RPA, cloud, hybrid infrastructure) from a security perspective. Policy … and update security policies, procedures, standards, and guidance regularly (e.g., acceptable use, remote access, incident response, etc.). Ensure alignment with frameworks such as NCSC guidance, ISO 27001, NIST, CyberEssentials, and GDPR. Develop and communicate clear roles and responsibilities for information security across departments. Support Information Governance and Data Protection with policy harmonisation and compliance efforts. Technical … external audits and security assessments. Track and report on compliance with standards and regulatory requirements. Work with internal and external partners to deliver accreditation or certification activities (e.g., PSN, CyberEssentials Plus, ISO 27001). Monitor and respond to findings from SIEM, threat intelligence feeds, or monitoring tools. Performance Monitoring and Reporting Define and monitor key security performance More ❯
regulatory obligations. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprise architecture and digital strategy. Participate in board-level or senior management discussions around cyber risk. Identify and manage strategic security risks (technical, legal, reputational, financial). Evaluate and advise on emerging technologies (e.g. AI, RPA, cloud, hybrid infrastructure) from a security perspective. Policy … and update security policies, procedures, standards, and guidance regularly (e.g., acceptable use, remote access, incident response, etc.). Ensure alignment with frameworks such as NCSC guidance, ISO 27001, NIST, CyberEssentials, and GDPR. Develop and communicate clear roles and responsibilities for information security across departments. Support Information Governance and Data Protection with policy harmonisation and compliance efforts. Technical … external audits and security assessments. Track and report on compliance with standards and regulatory requirements. Work with internal and external partners to deliver accreditation or certification activities (e.g., PSN, CyberEssentials Plus, ISO 27001). Monitor and respond to findings from SIEM, threat intelligence feeds, or monitoring tools. Performance Monitoring and Reporting Define and monitor key security performance More ❯
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Synergize Consulting Limited
Cyber Threat Intelligence Specialist - Contract role We are supporting our client, a leading IT services and solutions company, in their search for a Cyber Threat Intelligence Specialist in Hertfordshire. In this role, you'll be responsible for gathering, correlating, and interpreting data from multiple sources to deliver actionable threat intelligence. You'll assess how a wide range of … Term: 3 months (with strong potential for extension) Location: Hertfordshire Work Model: Hybrid Key Responsibilities Work with Threat Intelligence Platforms (TIPs), taking ownership of these platforms. Analyse and assess cyber threats, identifying patterns and trends. Apply the intelligence life cycle, from collection through to reporting. Ensure the Threat Intelligence Programme meets organisational aims. Influence and advise stakeholders on security … of such threats and their potential impact on the business. What We're Looking For Experience in Threat Intelligence and understanding of the intelligence life cycle. Experience in analysing cyber threats. Strong communication skills. Experience producing intelligence reports for varied audiences. Familiarity with cyber threats, threat actors, attack vectors, and vulnerabilities. Knowledge of information assurance standards and frameworks More ❯
bristol, south west england, united kingdom Hybrid / WFH Options
Logiq
response. Vulnerability Management Perform vulnerability assessments using Qualys and Tenable, driving remediation and continuous improvement. Compliance & Governance Align security controls with frameworks such as ISO 27001, NIST, CIS, and CyberEssentials, supporting audits and certification processes. What We're Looking For Proven experience in infrastructure or network security within complex enterprise environments. Strong knowledge of Microsoft technologies (Windows … on experience with MFA solutions, virtualisation platforms, and network security appliances. Understanding of SIEM operations, vulnerability management, and endpoint protection. Familiarity with recognised security frameworks (ISO 27001, NIST, CIS, CyberEssentials). Excellent problem-solving skills and ability to work under pressure. Strong communication skills to engage stakeholders and influence technical decisions. Why Join Logiq Work on impactful More ❯
Run phishing simulations, incident playbooks and device-compliance audits. Collaborate with the IT Manager on threat monitoring, investigations and ISO 27001 compliance. Ensure alignment with BW’s commitment to CyberEssentials Plus and information security best practice. Change & Roll-out Plan and execute application upgrades, Intune policy changes and security updates with minimal user disruption. Document and communicate … into reporting tools such as Power BI. Experience supporting mobile device management (iOS/iPadOS, rugged devices). Hands-on understanding of cybersecurity frameworks (ISO 27001:2022, ISO 22301, CyberEssentials Plus, CIS controls). Proven ability to manage service desks, incidents, and SLAs using ITIL best practices. Strong communication and coaching skills — able to support colleagues at More ❯
Run phishing simulations, incident playbooks and device-compliance audits. Collaborate with the IT Manager on threat monitoring, investigations and ISO 27001 compliance. Ensure alignment with BW’s commitment to CyberEssentials Plus and information security best practice. Change & Roll-out Plan and execute application upgrades, Intune policy changes and security updates with minimal user disruption. Document and communicate … into reporting tools such as Power BI. Experience supporting mobile device management (iOS/iPadOS, rugged devices). Hands-on understanding of cybersecurity frameworks (ISO 27001:2022, ISO 22301, CyberEssentials Plus, CIS controls). Proven ability to manage service desks, incidents, and SLAs using ITIL best practices. Strong communication and coaching skills — able to support colleagues at More ❯
Run phishing simulations, incident playbooks and device-compliance audits. Collaborate with the IT Manager on threat monitoring, investigations and ISO 27001 compliance. Ensure alignment with BW’s commitment to CyberEssentials Plus and information security best practice. Change & Roll-out Plan and execute application upgrades, Intune policy changes and security updates with minimal user disruption. Document and communicate … into reporting tools such as Power BI. Experience supporting mobile device management (iOS/iPadOS, rugged devices). Hands-on understanding of cybersecurity frameworks (ISO 27001:2022, ISO 22301, CyberEssentials Plus, CIS controls). Proven ability to manage service desks, incidents, and SLAs using ITIL best practices. Strong communication and coaching skills — able to support colleagues at More ❯
london (city of london), south east england, united kingdom
BW: Workplace Experts
Run phishing simulations, incident playbooks and device-compliance audits. Collaborate with the IT Manager on threat monitoring, investigations and ISO 27001 compliance. Ensure alignment with BW’s commitment to CyberEssentials Plus and information security best practice. Change & Roll-out Plan and execute application upgrades, Intune policy changes and security updates with minimal user disruption. Document and communicate … into reporting tools such as Power BI. Experience supporting mobile device management (iOS/iPadOS, rugged devices). Hands-on understanding of cybersecurity frameworks (ISO 27001:2022, ISO 22301, CyberEssentials Plus, CIS controls). Proven ability to manage service desks, incidents, and SLAs using ITIL best practices. Strong communication and coaching skills — able to support colleagues at More ❯
Run phishing simulations, incident playbooks and device-compliance audits. Collaborate with the IT Manager on threat monitoring, investigations and ISO 27001 compliance. Ensure alignment with BW’s commitment to CyberEssentials Plus and information security best practice. Change & Roll-out Plan and execute application upgrades, Intune policy changes and security updates with minimal user disruption. Document and communicate … into reporting tools such as Power BI. Experience supporting mobile device management (iOS/iPadOS, rugged devices). Hands-on understanding of cybersecurity frameworks (ISO 27001:2022, ISO 22301, CyberEssentials Plus, CIS controls). Proven ability to manage service desks, incidents, and SLAs using ITIL best practices. Strong communication and coaching skills — able to support colleagues at More ❯
Hyper-V Experience in site-to-site networking, including VPNs, subnets, and VLANs Expertise in firewalls and secure boundary design Knowledge of patch management and vulnerability remediation Aware of CyberEssentials and MoD/Defence security compliance standards Comfortable working in air-gapped and secure environments Key Responsibilities: Full lifecycle IT infrastructure delivery, including design, deployment, configuration, documentation … VMware, Hyper-V), firewalls (e.g., Cisco ASA, Fortinet, Palo Alto), and networking (site-to-site VPNs, LAN/WAN configuration) Perform regular health checks and system hardening aligned with cyber security standards Liaise with clients across the Southwest, requiring local travel Contribute to strategic planning with the Business Unit Director and Delivery Teams Support the setup and improvement of … DNS, DHCP, Windows Server) Virtualisation (VMware or Hyper-V) Site-to-site networking, including VPNs, subnets, VLANs Firewalls and secure boundary design Patch management and vulnerability remediation Awareness of CyberEssentials/MoD/Defence security compliance standards Comfortable working in air-gapped/secure environments Soft Skills: Excellent communicator (both internally and client-facing) Team player, willing More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
and embed secure-by-design principles across the organisation. What you'll be doing Act as the primary contact for all security and data protection matters Lead incident management, cyber risk tracking, and reporting Oversee Microsoft 365 and Google Workspace security controls Manage supplier compliance and ensure consistent standards across providers Maintain CyberEssentials certification and monitor … best practice initiatives What we're looking for Strong working knowledge of Microsoft 365 and Google Workspace security Experience managing or working with managed service providers (MSPs) Familiarity with CyberEssentials , NCSC guidance , or ISO 27001 principles Understanding of GDPR and data protection responsibilities Relevant certification (e.g. CompTIA Security+ , CISMP ) or equivalent experience Excellent communication skills, especially with More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
Kickstart Your Career in Cyber Security Are you fascinated by ethical hacking, cyber threats, and protecting systems from digital attacks? Looking to break into the fast-growing field of cyber security? This is your chance to turn your passion into a profession. We’re looking for a motivated and curious Graduate Cyber Security Analyst to join … our expert security team. In this role, you’ll learn how to defend systems, investigate incidents, and help protect the organisation from cyber risks — all while being mentored by experienced professionals. Whether you’ve studied cyber security, computer science, or a related field — or completed a bootcamp or personal projects — we want to hear from you What You … ll Be Doing As a Graduate Cyber Security Analyst, you’ll work on real challenges and grow your expertise in: Monitoring and Responding to Threats : Assist in identifying suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
Kickstart Your Career in Cyber Security Are you fascinated by ethical hacking, cyber threats, and protecting systems from digital attacks? Looking to break into the fast-growing field of cyber security? This is your chance to turn your passion into a profession. We’re looking for a motivated and curious Graduate Cyber Security Analyst to join … our expert security team. In this role, you’ll learn how to defend systems, investigate incidents, and help protect the organisation from cyber risks — all while being mentored by experienced professionals. Whether you’ve studied cyber security, computer science, or a related field — or completed a bootcamp or personal projects — we want to hear from you What You … ll Be Doing As a Graduate Cyber Security Analyst, you’ll work on real challenges and grow your expertise in: Monitoring and Responding to Threats : Assist in identifying suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
Kickstart Your Career in Cyber Security Are you fascinated by ethical hacking, cyber threats, and protecting systems from digital attacks? Looking to break into the fast-growing field of cyber security? This is your chance to turn your passion into a profession. We’re looking for a motivated and curious Graduate Cyber Security Analyst to join … our expert security team. In this role, you’ll learn how to defend systems, investigate incidents, and help protect the organisation from cyber risks — all while being mentored by experienced professionals. Whether you’ve studied cyber security, computer science, or a related field — or completed a bootcamp or personal projects — we want to hear from you What You … ll Be Doing As a Graduate Cyber Security Analyst, you’ll work on real challenges and grow your expertise in: Monitoring and Responding to Threats : Assist in identifying suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
Kickstart Your Career in Cyber Security Are you fascinated by ethical hacking, cyber threats, and protecting systems from digital attacks? Looking to break into the fast-growing field of cyber security? This is your chance to turn your passion into a profession. We’re looking for a motivated and curious Graduate Cyber Security Analyst to join … our expert security team. In this role, you’ll learn how to defend systems, investigate incidents, and help protect the organisation from cyber risks — all while being mentored by experienced professionals. Whether you’ve studied cyber security, computer science, or a related field — or completed a bootcamp or personal projects — we want to hear from you What You … ll Be Doing As a Graduate Cyber Security Analyst, you’ll work on real challenges and grow your expertise in: Monitoring and Responding to Threats : Assist in identifying suspicious activity and responding to security incidents in real time Security Tools and Technologies : Gain hands-on experience with firewalls, SIEM tools (e.g., Splunk, Microsoft Sentinel), endpoint protection, and vulnerability scanners More ❯
Cheshire, England, United Kingdom Hybrid / WFH Options
Morgan Law
Role Overview We are working with a Charity who are seeking a proactive and detail-oriented Cyber Security Analyst to support the ongoing protection of their digital assets, systems, and data.This home-based role will be instrumental in monitoring threats, identifying risk, assessing vulnerabilities, and improving their security posture across the organisation.You'll work closely with the IT Security … recovery and business continuity plans. Produce reports and metrics for senior IT and governance stakeholders Stay updated with the latest threats, trends, and compliance requirements (e.g., GDPR, PCI DSS, CyberEssentials) Person Specification Essential: Demonstrable experience in a related role Excellent problem-solving, analytical, and communication skills An appetite for keeping up to date with the latest developments … Industry certifications (e.g., CompTIA Security+, SSCP) Experience in the charity or non-profit sector Familiarity with Microsoft Azure cloud platforms and identity management Experience with compliance frameworks (PCI DSS, CyberEssentials) Experience with auditing and compliance Experience of BCP/DR More ❯
areas of Cybersecurity.. Key Responsibilities Conduct detailed risk assessments and gap analysis for client environments Deliver control reviews and maturity assessments aligned to relevant frameworks (ISO 27001, NIST, CIS, CyberEssentials/Plus) Perform vulnerability assessments and develop mitigation strategies Support the deployment of Managed Detection and Response (MDR), Penetration Testing, and Data Loss Prevention (DLP) solutions Advise … response, and security awareness training Skills & Experience Proven experience in a Cybersecurity consultancy role Professional certifications such as CISSP or CISM Strong working knowledge of ISO 27001, NIST and CyberEssentials/Plus Proficiency with vulnerability management, endpoint protection and SIEM tools The role is genuinely exciting with a forward thinking business who have their employees careers at More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
NCC
Knowledge of common information security management frameworks, such as ISO/IEC 27001, as well as those from NIST, including 800-53 and Cybersecurity Framework Desirable: Relevant accreditations including CyberEssentials, Cyber Assured, etc. In terms of personal qualities, we will look for a high level of personal integrity, as well as the ability to professionally handle More ❯
awareness across teams, this is a brilliant opportunity to make a real impact. You’ll be responsible for managing our information security operations, governance and certifications, including ISO27001 and CyberEssentials Plus. Working closely with IT leadership and stakeholders across the business, you’ll ensure our systems and processes meet the highest standards while fostering a culture of … company-wide security awareness and training Acting as Incident Response Manager for security events What we're looking for: 5+ years’ experience in information security Strong knowledge of ISO27001, CyberEssentials Plus and risk management CISSP or equivalent certification Excellent communication and stakeholder engagement skills Why Reassured What you do at Reassured makes a real impact. You’ll More ❯
awareness across teams, this is a brilliant opportunity to make a real impact. You’ll be responsible for managing our information security operations, governance and certifications, including ISO27001 and CyberEssentials Plus. Working closely with IT leadership and stakeholders across the business, you’ll ensure our systems and processes meet the highest standards while fostering a culture of … company-wide security awareness and training Acting as Incident Response Manager for security events What we're looking for: 5+ years’ experience in information security Strong knowledge of ISO27001, CyberEssentials Plus and risk management CISSP or equivalent certification Excellent communication and stakeholder engagement skills Why Reassured What you do at Reassured makes a real impact. You’ll More ❯
team. This is a fantastic opportunity for someone with 25 years of relevant experience to play a key role in maintaining and improving IT systems and ensuring compliance with CyberEssentials Plus standards. Key Responsibilities Manage patching and vulnerability processes, using multiple scanning tools to identify and resolve security gaps. Coordinate and deploy updates across software and operating … Monitor system performance and availability using the companys chosen monitoring tools. Identify and resolve potential security breaches using centralised logging, alerting, and monitoring platforms. Support preparation and maintenance for CyberEssentials Plus certification. Provide 1st and 2nd line support to internal teams and customers, ensuring tickets are accurately maintained and incidents managed effectively. Collaborate with cross-functional teams … routers, VPNs, and IP subnetting. Familiarity with directory services (e.g. Active Directory). Exposure to cloud platforms such as AWS or Azure (desirable but not essential). Experience with cyber security tools, including endpoint protection and data loss prevention (DLP) solutions. Excellent communication and documentation skills, with the ability to engage stakeholders at all levels. If youre looking to More ❯