About Bridewell One of the most exciting prospects in the UK cybersecurity sector today, Bridewell is a leading cybersecurity services company specialising in protecting and transforming critical business functions for some of the world's most trusted organisations. We are the trusted partner for operators of essential services and provide end-to-end cybersecurity capabilities that help our clients overcome their security challenges, allowing them to operate safely and securely. Bridewell holds the Gold level, Investors in People award which we feel solidifies and reflects on the outstanding calibre that makes us truly one team. Who are we looking for? We are looking for an experienced Project Manager who can … several projects at any one time, with proven experience engaging and managing relationships with various stakeholders, including clients, vendors, and internal teams. Ideally, you'll have worked with a CyberSecurity services provider or within a CyberSecurity function, with knowledge of CyberSecurity principles, standards, and technologies desirably resulting in at least a More ❯
Senior Security Consultant - Security Architecture About Bridewell One of the most exciting prospects in the UK cybersecurity sector today, Bridewell is a leading cybersecurity services company specialising in protecting and transforming critical business functions for some of the world's most trusted organisations. We are the trusted partner for operators of essential … services and provide end-to-end cybersecurity capabilities that help our clients overcome their security challenges, allowing them to operate safely and securely. Bridewell holds the Gold level, Investors in People award which we feel solidifies and reflects on the outstanding calibre that makes us truly one team. Who are we looking for? A passionate technology … focused individual, with an honest and empathic approach to customer conversations. You will have hands on experience in Security Architecture and Cloud Security and can deliver comprehensive and robust security solutions to different audiences. You will have owned, led and developed end to end solution architectures for projects which have high security requirements. What you'll More ❯
Radius colleagues. We've achieved big things already, but we're just getting started. This is where you come in... Job Description An opportunity has arisen for a Senior CyberSecurity Analyst , to become part of the Radius CyberSecurity Team. This is an excellent opportunity for a seasoned professional to contribute to a high-performing … Cyber Team in a fast-paced and evolving environment. The role will report to the Head of Cyber and will be located at our Emperor Court office in Crewe . This role is crucial to strengthening the organisation’s cyber resilience. As a Senior CyberSecurity Analyst, you will play a key role in protecting … systems, networks, and data against cyber threats. You will lead threat detection and incident response efforts, support the development of security policies and controls, and work closely with stakeholders to ensure compliance and security best practice across the business. You will also assist with maintaining and improving the company’s accredited Information Security Management System (ISMS More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
CyberSecurity Engineer (DevSecOps) Security Clearance Required - DV ('Developed Vetting') Location: Huntingdon, UK (On-site 4/5 days a week) UNLEASH YOUR POTENTIAL At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers success. We empower our teams, contribute to our communities, and operate sustainably. … our people, and our community. Our Mission, Vision, and Values guide the way we do business. Are your ready for your next challenge? We are in search for multiple CyberSecurity Engineers with varying technical backgrounds - Required to work at our customer site in Huntingdon, Cambridgeshire with occasional travel to other UK sites. In this role, you will … working within a team of engineers to ensure that the customer sites maintain a strong cybersecurity posture. CyberSecurity Engineers are responsible for providing cybersecurity engineering services for classified and unclassified networks of computer systems. The CyberSecurity Engineers will provide operational and engineering support. This position perform the following tasks: Develop creative More ❯
Senior Information Security Manager page is loaded Senior Information Security Manager Apply locations Great Britain - London time type Full time posted on Posted Yesterday job requisition id R5807 Job Description: Senior Information Security Manager Position Overview: We are seeking aSenior CyberSecurityPosture and Exposure Managerto lead and enhance our organization's securityposture and manage cyber exposure risks. This role will oversee a small team of highly skilled Security Engineers and will be responsible for developing, implementing, and maintaining strategies to identify, assess, and mitigate security vulnerabilities across the enterprise. The ideal candidate will have a strong technical background, leadership experience, and a proactive approach to … managing cyber risks in a dynamic technology environment. What You'll Do: Leadership and Team Management: Lead, mentor, and manage a team of Security Engineers, fostering a culture of collaboration, innovation, and continuous improvement. Define team goals, assign responsibilities, and ensure the successful execution of security initiatives. Conduct regular performance reviews and provide professional development opportunities for More ❯
when you're inspired to think big and bring your ambition to work every day, which is why, at British Airways the sky is never the limit. The role: CyberSecurity Engineering Principal The CyberSecurity Engineering Principal is a highly experienced and skilled leader within the BA Cyber Team, reporting to the CyberSecurity Engineering Manager. This role plays a critical part in shaping and driving improvements in BA's Cybersecurity posture. As the line manager of a small team of CyberSecurity Engineers, you will provide both technical advice on BA's security products and foster a culture of continuous learning and development. You … of emerging threats and technologies by encouraging ongoing training, professional growth, and collaboration. Your leadership will be pivotal in building a resilient and knowledgeable team capable of tackling complex security challenges. What you'll do: Design and build security tools and capabilities to mitigate threats to British Airways, wherever they originate Understand BA's business objectives and incorporate More ❯
West Malling, Kent, United Kingdom Hybrid / WFH Options
Lumina Energy
CyberSecurity Engineer Location: West Malling, Kent/Hybrid Salary/package: £55,000 - £60,000 per annum Hours: Full time, 37.5 hours per week Help lead the charge in digital defence! We're looking for an experienced CyberSecurity Engineer to join us at Cantium Business Solutions, where you'll play a pivotal role in … strengthening and advancing our cybersecurity posture. This is your opportunity to bring your expertise to the table and drive impactful security strategies from day one. Who we are Cantium Business Solutions, part of the Commercial Services Group (CSG), delivers high-quality IT and back-office services to the education and public sectors. Our commitment to innovation … a dynamic and agile culture. We're proud to be part of CSG, the UK's largest local authority-owned trading organisation, supporting customers worldwide. Why this role matters Cyber threats are evolving, and our team is at the heart of protecting critical infrastructure and data. As a CyberSecurity Engineer, you'll help lead our proactive More ❯
Crewe, Cheshire, England, United Kingdom Hybrid / WFH Options
DCS Recruitment
Senior CyberSecurity Analyst Crewe | Hybrid | Up to £55,000 + Company bonus Join a thriving and growing tech business with a reputation for quality, flexibility, and career progression. This is a fantastic opportunity for a cybersecurity professional to step into a senior role with clear pathways for growth, a highly supportive team, and a … Paid annual leave Company pension Hybrid working Professional and personal wellbeing support schemes Strong progression within in a growing bonus What you'll be doing Drive improvements to cybersecurityposture across internal and customer-facing platforms Design and secure cloud-based infrastructure and customer applications Perform threat detection, incident response , and vulnerability remediation Maintain security architecture documentation and collaborate with third-party vendors Conduct threat intelligence research and recommend ongoing improvements What you'll need Strong technical background and extensive cybersecurity expertise Deep knowledge of application security and working within dev teams Hands-on experience with EDR/NDR technologies Familiar with standards like Cyber Essentials, ISO27001 Working knowledge More ❯
our office. Purpose of the Role Primark Technology is on a transformation journey supporting the business strategy which includes modernising our operating model as well as technology architecture and CyberSecurity and Risk posture. This role is key in building and improving Primark's CyberSecurity posture. Duties & Responsibilities Actively progress and improve Primark's cybersecurityposture with the delivery of agreed projects/initiatives aligned with industry best practice. Ensure project deliverables are aligned with the Cyber Roadmap with outcomes directly addressing strategic objectives/maturity gaps/audit points. Advise and lead on solutions with our internal teams/outsourced partners, having a 'hands on approach' including the … Agile delivery methodology and development methods Certified with appropriate qualifications is desirable, 1. Structured Project Management : Prince/PMP 2. Agile certification, such as Scrum, SaFe, AgilePM 3. Information Security/Data Protection certification An appropriate degree, equivalent qualification or experience Desirable Be a passionate and visionary technologist able to inspire others to challenge and disrupt the current reality More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
month contract in a Work from Office (WFO) role. This role will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code … IaC) using Terraform. Their ideal candidate will have a strong background in cloud security best practices, automation, and a proactive approach to integrating security across their software delivery lifecycle. A key part of this position will also involve mentoring an internal engineer, developing structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. … Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure Security: Architect and secure Azure-based infrastructure using Terraform, ensuring adherence to security best practices by developing, maintaining, and optimizing Terraform code. DevOps Pipeline Development and Maintenance: Design, develop, and optimize Azure DevOps pipelines More ❯
About the Role: We are seeking an experienced Cyber Risk Management Specialist with a strong background in in evaluating and quantifying potential risks to the organisation's cybersecurity posture. This role involves assessing vulnerabilities, identifying threats, quantifying business impacts and developing strategies for risk mitigation. Reporting to the Cyber Risk Management Manager this role will … ensure that the business maintains a proactive and effective approach to managing its cyber risks and meeting strict regulatory requirements for risk management. Key Responsibilities: (not limited to) Conduct comprehensive, structured cyber risk assessments to identify potential threats, vulnerabilities and impacts to information and operational systems. Collaborate with colleagues across the business to gather detailed information on applications … systems and business processes. Employ appropriate tools and methodologies to identify, assess and prioritise cyber risks across the IT and OT estate. Collaborate with stakeholders to assign appropriate risk levels and priorities for remediation. Work closely with internal colleagues and external teams to understand and assess the effectiveness of existing security controls. Provide recommendations for improving securityMore ❯
Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Yolk Recruitment
Asset Security Manager ?? South Wales (Hybrid Working) ?? Up to £70,000 + Excellent Benefits What You'll Do: You'll lead the strategy and delivery for identifying and managing vulnerabilities across the organisation's IT and OT asset estate. From building and maintaining a complete asset register to defining how vulnerabilities are prioritised and addressed, you'll be the … key figure ensuring the organisation's cybersecurityposture is understood and controlled. Collaborating with penetration testers, risk assessors and internal teams, you'll provide accurate insights into asset security while managing a small team of technical analysts and overseeing supplier relationships to drive successful outcomes. What You'll Bring: Proven experience in IT asset … work in utilities or critical national infrastructure environments is a strong advantage Why You Should Apply: This is a high-impact role where you'll help shape a critical cybersecurity function. You'll work in a collaborative environment, receive full support for personal development, and gain exposure to both IT and OT security within a key More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
a lifeline. Are you a skilled cybersecurity professional with a passion for aviation or mission-driven charity work? In this role, you'll be responsible for implementing and managing security infrastructure, responding to threats, and ensuring compliance across systems. You'll work with various cybersecurity solutions while driving security best practices and incident response. If … Based Role - Ashford, (Kent) UK or Cairns, Australia. UK - £43,800 per annum (dependent on experience) Australia - $85,000 AUD per annum (dependent on experience) Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint … detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your expertise in network security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to More ❯
CyberSecurity Consultant - Temporary & Part-Time Job Specification: CyberSecurity … Consultant Context: Preparing for ICE Clearing membership; cloud-based using Windows 365 Cloud PCs; aiming for ISO 27001 compliance. Purpose of Role: To provide expert guidance on strengthening cybersecurityposture, achieving ISO/IEC 27001 compliance, and supporting readiness for ICE Clearing membership. Key Responsibilities: Assess current security infrastructure and risks. Develop and guide ISO 27001 implementation … roadmap. Review and help draft security policies and procedures. Advise on securing Microsoft 365 Cloud PC environment. Support compliance with financial sector regulations. Establish incident response, business continuity, and governance frameworks. Requirements: Proven cybersecurity consultancy experience. Strong knowledge of ISO 27001 (preferably certified). Experience with Microsoft 365 security features (Intune, Defender, etc.). Understanding of financial regulatory More ❯
the Chief Information Officer, this pivotal role leads the delivery of robust, secure, and scalable IT infrastructure and support services across the university. You will oversee critical areas including cybersecurity, cloud platforms, infrastructure, collaboration technologies, and end-user computing. Working closely with the Head of Enterprise Applications and Data, you will act as deputy to the CIO … Technology Services team (~16 staff), fostering innovation and service excellence. Oversee infrastructure, networks, systems, and user support to ensure secure, scalable, and highly available services. Maintain a strong institutional cybersecurityposture, including tested incident response plans. Collaborate with academic and professional service teams to align technology capabilities with institutional KPIs. Drive digital transformation initiatives, including … cloud adoption, cybersecurity enhancements, and hybrid learning technologies. Ensure compliance with data protection, accessibility, and IT governance standards (Cyber Essentials, ISO27001, ITIL). Manage operational and capital budgets, procurement processes, and vendor relationships to deliver value and efficiency. The Candidate Were looking for a dynamic leader with: Proven experience in IT leadership and service management within complex environmentsideally in More ❯
Chief Information Officer, this pivotal role leads the delivery of robust, secure, and scalable IT infrastructure and support services across the university. The postholder will oversee critical areas including cybersecurity, cloud platforms, infrastructure, collaboration technologies, and end-user computing. Working closely with the Head of Enterprise Applications and Data, you will act as deputy to the CIO … Technology Services team (:16 staff), fostering innovation and service excellence. Oversee infrastructure, networks, systems, and user support to ensure secure, scalable, and highly available services. Maintain a strong institutional cybersecurityposture, including tested incident response plans. Collaborate with academic and professional service teams to align technology capabilities with institutional KPIs. Drive digital transformation initiatives, including … cloud adoption, cybersecurity enhancements, and hybrid learning technologies. Ensure compliance with data protection, accessibility, and IT governance standards (Cyber Essentials, ISO27001, ITIL). Manage operational and capital budgets, procurement processes, and vendor relationships to deliver value and efficiency. The Candidate Were looking for a dynamic leader with: Proven experience in IT leadership and service management within complex environmentsideally in More ❯
Chief Information Officer, this pivotal role leads the delivery of robust, secure, and scalable IT infrastructure and support services across the university. The postholder will oversee critical areas including cybersecurity, cloud platforms, infrastructure, collaboration technologies, and end-user computing. Working closely with the Head of Enterprise Applications and Data, you will act as deputy to the CIO … Technology Services team (~16 staff), fostering innovation and service excellence. Oversee infrastructure, networks, systems, and user support to ensure secure, scalable, and highly available services. Maintain a strong institutional cybersecurityposture, including tested incident response plans. Collaborate with academic and professional service teams to align technology capabilities with institutional KPIs. Drive digital transformation initiatives, including … cloud adoption, cybersecurity enhancements, and hybrid learning technologies. Ensure compliance with data protection, accessibility, and IT governance standards (Cyber Essentials, ISO27001, ITIL). Manage operational and capital budgets, procurement processes, and vendor relationships to deliver value and efficiency. The Candidate Were looking for a dynamic leader with: Proven experience in IT leadership and service management within complex environmentsideally in More ❯
East Grinstead, Sussex, United Kingdom Hybrid / WFH Options
Spectrum IT Recruitment
Lead, develop, and transform the IT infrastructure and security operations at one of the UK's leading fulfilment and logistics providers, with an ambitious growth strategy supported by cutting-edge technology You will be part of a dynamic, innovative environment where your leadership will directly influence customer service, operational efficiency, and scalability. Location: East Grinstead Hybrid: 2-3 days … stamp on the role. Exposure to a Growing Business: Join a forward-looking, recently acquired organisation and contribute to its ambitious growth journey. Variety of Responsibilities: Oversee infrastructure and security management alongside user support, ensuring a broad and engaging remit. Career Development Potential: Reporting directly to the CIO, you will have access to senior leadership, opening doors to further … engage directly with teams across locations, ideal for someone who enjoys building connections on the ground. Purpose of the Role You will be responsible for the stability, performance, and security of enterprise-wide technology platforms. This role combines strategic planning, operational leadership, and team development to support growth and drive innovation. Key Responsibilities Infrastructure & Cybersecurity Lead the design, implementation More ❯
East Grinstead, West Sussex, South East, United Kingdom Hybrid / WFH Options
Spectrum It Recruitment Limited
Lead, develop, and transform the IT infrastructure and security operations at one of the UK's leading fulfilment and logistics providers, with an ambitious growth strategy supported by cutting-edge technology You will be part of a dynamic, innovative environment where your leadership will directly influence customer service, operational efficiency, and scalability. Location: East Grinstead Hybrid: 2-3 days … stamp on the role. Exposure to a Growing Business: Join a forward-looking, recently acquired organisation and contribute to its ambitious growth journey. Variety of Responsibilities: Oversee infrastructure and security management alongside user support, ensuring a broad and engaging remit. Career Development Potential: Reporting directly to the CIO, you will have access to senior leadership, opening doors to further … engage directly with teams across locations, ideal for someone who enjoys building connections on the ground. Purpose of the Role You will be responsible for the stability, performance, and security of enterprise-wide technology platforms. This role combines strategic planning, operational leadership, and team development to support growth and drive innovation. Key Responsibilities Infrastructure & Cybersecurity Lead the design, implementation More ❯
tomorrow. So, ready to dive in? Your journey begins with that application - and who knows where it could take you in our vibrant team! Position The Role The Information Security Manager will be responsible for developing, implementing, and managing best practices in information security across M247. This role requires a deep understanding of data management, information security frameworks, and regulatory compliance. The ideal candidate will have a proven track record in creating efficient security processes and play a key role in fostering a culture of security awareness throughout the organisation. Security Strategy Development: Design and implement a comprehensive information security strategy that aligns with business objectives and complies with ISO 27001 standards. … Operational Efficiency: Identify opportunities to consolidate security processes and improve efficiencies across various departments, driving best practices organisation-wide. Cybersecurity Management: Manage and monitor the organisation's cybersecurityposture, implementing measures to detect, respond to, and recover from security incidents. Compliance Oversight: Ensure adherence to relevant regulatory requirements and industry standards, facilitating audits and assessments as More ❯
for OT environments in accordance with IEC(phone number removed)-2. Manage NIS compliance for OT Networks and produce the NIS annual report. Collaborate withOT Engineers to manage security controls for ICS, SCADA, and other OT systems. Oversee incident response and recovery … procedures for OT-related cyber events reported by 24/7 OT SOC. Develop and deliver OT cybersecurity awareness and training programs. Monitor and report on OT cybersecurityposture and KPIs to senior leadership. Represent OT Cybersecurity in the Refinery change control process. Job Requirements: A bachelor's degree in Cybersecurity, Computer Science, Engineering, or a related … risk environments Ability to manage OT Cybersecurity projects Collaborative mindset across multidisciplinary teams Desirable Experience: Experience in oil & gas, energy, utilities, or manufacturing sectors. Hands-on experience with OT security tools (e.g., Claroty, Dragos). Participation in cyber incident simulations or red/blue team exercises. More ❯
Kingdom, and Australia. Together, they will deliver a unique 24/7 all-weather capability, tracking objects in geosynchronous orbit - a testament to Northrop Grumman's commitment to enhancing security and safety in deep space on a global scale. Your Role The Information Systems Security Officer (ISSO) is responsible for the day-to-day onsite execution of the Systems Security Engineering activities required for the ongoing maintenance and uplift of the cybersecurityposture within the project. This spans systems, subsystems, products and external interfaces, and may include a mixture of operational cybersecurity functions and governance, risk and compliance (GRC) activities. Key … responsibilities include: Perform systems security risk management activities, including identifying security threats, analysing the risk exposure and presenting treatment options to mitigate security risk. Conduct asset management including maintaining accurate inventories of all hardware and software configuration items. Maintain change management, through evaluation of system changes for cybersecurity impact and updating any affected security authorisation artefacts. More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. Incident Response - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop and fine-tune detection … rules and alerts to identify malicious activities. Security Reporting - Generate reports on security events, trends, and system performance. Collaboration - Work with IT and security teams to improve overall cybersecurity posture. Required Skills & Qualifications Technical Expertise - Strong knowledge of SIEM platforms, network security, and cybersecurity frameworks. Certifications - CISSP, CEH, GIAC, or vendor-specific SIEM certifications. Programming & Scripting … Familiarity with Python, PowerShell, or other scripting languages. Analytical Thinking - Ability to analyze large datasets and identify security threats. Communication Skills - Ability to document findings and communicate effectively with stakeholders All profiles will be reviewed against the required skills and experience. Due to the high number of applications we will only be able to respond to successful applicants in More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. Incident Response - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop and fine-tune detection … rules and alerts to identify malicious activities. Security Reporting - Generate reports on security events, trends, and system performance. Collaboration - Work with IT and security teams to improve overall cybersecurity posture. Required Skills & Qualifications Technical Expertise - Strong knowledge of SIEM platforms, network security, and cybersecurity frameworks. Certifications - CISSP, CEH, GIAC, or vendor-specific SIEM certifications. Programming & Scripting … Familiarity with Python, PowerShell, or other scripting languages. Analytical Thinking - Ability to analyze large datasets and identify security threats. Communication Skills - Ability to document findings and communicate effectively with stakeholders All profiles will be reviewed against the required skills and experience. Due to the high number of applications we will only be able to respond to successful applicants in More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis
Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. Incident Response - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop and fine-tune detection … rules and alerts to identify malicious activities. Security Reporting - Generate reports on security events, trends, and system performance. Collaboration - Work with IT and security teams to improve overall cybersecurity posture. Required Skills & Qualifications Technical Expertise - Strong knowledge of SIEM platforms, network security, and cybersecurity frameworks. Certifications - CISSP, CEH, GIAC, or vendor-specific SIEM certifications. Programming & Scripting … Familiarity with Python, PowerShell, or other scripting languages. Analytical Thinking - Ability to analyze large datasets and identify security threats. Communication Skills - Ability to document findings and communicate effectively with stakeholders All profiles will be reviewed against the required skills and experience. Due to the high number of applications we will only be able to respond to successful applicants in More ❯