Prolific is not just another player in the AI space-we are the architects of the human data infrastructure that's reshaping the landscape of AI development. In a world where foundational AI technologies are increasingly commoditized, it's the More ❯
fault finding and liaising with suppliers Experience using IT service management tools, ideally ServiceNow, for logging, tracking, and resolving support tickets in line with SLAs Security awareness: Understanding of cybersecurity best practices, such as MFA, phishing prevention, and endpoint security Ability to create and maintain technical documentation, user guides, and knowledge base articles Excellent communication skills, with the ability to More ❯
Leicester, Leicestershire, United Kingdom Hybrid / WFH Options
Publitek
teams to align tech support and CX goals. Represent support and IT in leadership meetings, contributing to business continuity and tech roadmap planning. Ensure compliance with data protection and cybersecurity best practices. Y ou will bring: 5+ years of experience in a combined customer support and IT management role. Deep knowledge of helpdesk operations, preferably in an e-commerce or More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Capgemini
mindset, meaning you will have countless training and development opportunities from thinktanks to hackathons, and access to 250,000 courses with numerous external certifications from AWS, Microsoft, Harvard ManageMentor, Cybersecurity qualifications and much more. You'll be bringing your unique skills and perspectives to the team, inspiring and taking inspiration from your teammates as you unlock value in everything you More ❯
The driving force behind our Machine Learning and Data Science infrastructure at Mimecast Embrace the incredible opportunities that lie within Mimecast, where innovation and impact converge. The cybersecurity industry is experiencing exponential growth, and by joining us, you'll be at the forefront of this ever-evolving landscape. The field is rapidly changing, as threat actors employ AI to scale … amongst the most senior roles in the team, directly reporting to the Director of Data Science. Join us on this exhilarating journey, where you'll shape the future of cybersecurity by developing large-scale data products for ML models that push the boundaries of innovation and make an indelible impact in protecting our digital world." - Hiring Manager Responsibilities Design and … and creativity within and between teams Introduces employees to priorities outside of their immediate realm Ensures important interpersonal relationships and connections with one another and our community! DEI Statement Cybersecurity is a community effort. That's why we're committed to building an inclusive, diverse community that celebrates and welcomes everyone - unless they're a cybercriminal, of course. We're More ❯
measures, and alignment with industry-recognised security standards (e.g. ISO 27001, NIST, CIS). Collaborate with the Information Security and Compliance teams to ensure DR aligns with the broader cybersecurity strategy and meets regulatory expectations. Knowledge, Skills and Experience Proven experience leading Disaster Recovery strategy, documentation, and implementation within enterprise-scale organisations. Hands-on expertise in building DR runbooks, governance More ❯
Scientist | Lead Data Scientist | Senior Data Engineer | Lead Data Engineer | Data Architect I am currently working with a brilliant consultancy with deep expertise in their field of Data and CyberSecurity solutions, predominantly with Central Government organisations but they also have strong ties with Defence and Telco. They have experienced impressive growth over the last few years and as a More ❯
Scientist | Lead Data Scientist | Senior Data Engineer | Lead Data Engineer | Data Architect I am currently working with a brilliant consultancy with deep expertise in their field of Data and CyberSecurity solutions, predominantly with Central Government organisations but they also have strong ties with Defence and Telco. They have experienced impressive growth over the last few years and as a More ❯
Participate in HAZOP (Hazard and Operability) studies and risk assessments, including Layers of Protection Analysis (LOPA). Maintain accurate documentation of control systems and modifications. Implement and manage OT cybersecurity measures to protect control systems from cyber threats, ensuring compliance with IEC 62443 standards. Develop and maintain safety programming on PCS7, ensuring compliance with IEC 61511 standards. Manage alarm systems More ❯
governmental stakeholders, ensuring requirements are met and issues resolved promptly. Documentation & Compliance Maintain project dashboards, BoMs, LCA inputs and certification plans (CE, FCC, GCF, PTCRB). Ensure projects embed cyber-security best practice and, where relevant, quantum-safe readiness. Essential Qualifications & Experience BEng/MSc (or higher) in Electrical, RF, Telecommunications, Aerospace or related discipline. 5 + years managing complex More ❯
Ewloe, Flintshire, United Kingdom Hybrid / WFH Options
ARO
Cloud services or infrastructure solutions Mobile Device Management (MDM) Hosted telephony and unified communications Who are we? ARO has 25 years' experience in Collaboration, Connectivity, Cloud and Infrastructure and CyberSecurity services both in the UK and Internationally and has a nationwide presence with offices across the UK. As one of the UK's leading independent IT and communication experts More ❯
PCs and networked production equipment Support ERP integrations Ensure high availability of systems supporting production lines, including real-time monitoring and rapid incident response Implement and manage highly effective cybersecurity measures across all IT and associated equipment infrastructure Lead system upgrades and patching with minimal disruption to production schedules Collaborate with engineering and operations teams to align IT systems with More ❯
Leatherhead, Surrey, England, United Kingdom Hybrid / WFH Options
Optima Recruitment
Word, PowerPoint) My client is committed to supporting the professional development of their employees. As a trainee, you will receive comprehensive training in various areas, including IT, Project Management, CyberSecurity etc... As you progress in your role, you will have opportunities to take on more responsibility and work on more complex projects. If you are a recent graduate looking More ❯
PCs and networked production equipment Support ERP integrations Ensure high availability of systems supporting production lines, including real-time monitoring and rapid incident response Implement and manage highly effective cybersecurity measures across all IT and associated equipment infrastructure Lead system upgrades and patching with minimal disruption to production schedules Collaborate with engineering and operations teams to align IT systems with More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
VIQU IT Recruitment
Proficient in SQL TSQL and PowerShell scripting for data management and automation tasks Familiarity with Active Directory Group Policy Microsoft Entra ID and Microsoft Server patching processes Understanding of cybersecurity standards such as Cyber Essentials or ISO27001 is desirable Strong communication skills and ability to work both independently and within a team Legal Applications Analyst with iManage Experience 12 Month More ❯
broad spectrum of clients across the Bournemouth area (typically SMEs 1-250 users). The company has a full range of support and maintenance offerings, together with Cloud systems, CyberSecurity, and new network installation capabilities. Location: To begin with, the role will be office based, as you get up to speed, but going forward there is the option to More ❯
Epsom, Surrey, United Kingdom Hybrid / WFH Options
Lloyd Recruitment - Epsom
offering a varied and engaging environment. The IT Team: You'll be part of the Business Technology Services function, which delivers technology and change support across governance, technical operations, cybersecurity, and more. The team supports UK and European operations, ensuring technology enables and protects the wider business. Key Responsibilities: Log, prioritise and resolve technical issues and requests Deliver excellent More ❯
accreditations in the UK. About The Company Since 2002, the company has been providing comprehensive IT support and technology solutions, including cloud services, managed print, telephony, Office 365 applications, cybersecurity, and data recovery. As part of a wider group, they are supported by a leading technology services and solutions provider and are proud to be the most awarded Microsoft More ❯
industry is in the midst of unprecedented transformation through changing business models, cost reduction pressure, constrained capital, climate resilience initiatives (electric grid and water infrastructure modernization, transportation electrification), increasing cybersecurity threats, and they are looking to the cloud to modernize and transform their operations. We are looking for a Business Development leader who understands the core business domains - generation, transmission More ❯
Angel House Unit 5, Drum Industrial Estate, Chester Le Street, England
I.T. PROFESSIONAL SERVICES LIMITED
and new ways of thinking as a trusted IT partner. With 26 years of experience, we partner with companies across the public and private sector to deliver data centre, cybersecurity, cloud, data and analytics, network services and managed services solutions. Our highly accredited and experienced engineering teams combined with our strategic relationships with partners such as Microsoft and Cisco More ❯
and deployment of core IT systems and services: o Platforms ?" Physical hosts, virtual hosts (ESXi), Storage & Databases, SAAS Solutions, Monitoring, & backups. Networks ?" WAN, LAN, VPN, Wi-Fi, Firewalls, & Filtering. CyberSecurity ?" Protection, Education, Audit, Disaster Recovery, & Business Continuity. Review, develop and enhance the continued delivery of 1st class student learning through IT. Identify and design solutions to enhance operations and More ❯
telecom (e.g., Kubernetes, OpenStack) Wireless or wireline technologies (e.g., 5G, LTE, Fiber Optics) Network function virtualization (NFV) or software-defined networking (SDN) Real-time embedded systems experience in telecom Cybersecurity best practices knowledge in telecommunications networks AI/ML applications experience in network automation Microservices architecture and development experience Scrum master experience facilitating skilled development teams SDN/SD-WAN … as part of their tasks. Technology Solutions We're into seeing where technology can take us, so if you have ever imagined what the future of supply chain management, cybersecurity, the cloud and Internet of Things will look like, we want you to be part of the team that makes it happen. We are honoured to be recognized 5G TELUS More ❯
Thrive is an innovative technology solutions provider focused on CyberSecurity, Hybrid Cloud, Global Network Management, Disaster Recovery, and traditional Managed Services. Our corporate culture, engineering talent, customer-centric approach, and focus on NextGen services help us stand out among our peers. Thrive seeks individuals who view their weekdays not just as 'a job' but as an opportunity to develop More ❯
Us Different: Purpose: you can use your passion and abilities at Leidos to keep the people you care about safe. We are at the forefront of machine learning, AI, cybersecurity and solutions. Using your skills in the technology frontline by helping to build a safer world. You can inspire change. Collaboration: having flexibility to do your job is one More ❯
Sittingbourne, Kent, South East, United Kingdom Hybrid / WFH Options
Southern Housing
Sittingbourne hybrid working, required to travel to Farringdon office once a week. We are looking for an End User Computing Analyst to join our CyberSecurity team in Sittingbourne. The EUC Analyst is responsible for managing all aspects of EUC management and compliance and will collaborate with other teams to define and deploy device builds, applications, and policies. Leveraging existing More ❯