Chelmsford, Essex, United Kingdom Hybrid / WFH Options
Brooks Automation, Inc
align technical and business stakeholders. Preferred Qualifications Experience in a global manufacturing organization. Relevant certifications (e.g., CISSP, CISM, CCSP). Familiarity with frameworks such as NIST CSF, ITIL, ISO27001, HIPAA, FedRamp. Work Location & Flexibility At Brooks, we aim to foster a collaborative and engaging environment while offering flexibility where possible. Work arrangements may include a More ❯
a range of stakeholders. Requirements: Experience in cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation, or regulatory compliance. Knowledge of standards and regulations such as NIST CSF, ISO27001, GDPR, NIS2, or NCSC CAF. Strong problem-solving skills, attention to detail, and excellent communication with both technical and business stakeholders. Relevant certifications (CISSP, CISM, CISA, M.Inst.ISP) or MSc in More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson McCade
a range of stakeholders. Requirements: Experience in cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation, or regulatory compliance. Knowledge of standards and regulations such as NIST CSF, ISO27001, GDPR, NIS2, or NCSC CAF. Strong problem-solving skills, attention to detail, and excellent communication with both technical and business stakeholders. Relevant certifications (CISSP, CISM, CISA, M.Inst.ISP) or MSc in More ❯
on prem and AWS environments. Lead incident response, vulnerability assessments and pentest co-ordination. Manage IAM systems and support Engineering teams with threat modelling and secure development practices. Own ISO27001, Cyber Essentials+, PCI-DSS and GDPR compliance. Manage physical security (access control etc) What experience do you need? 2+ years experience within Cyber Security – hands on experience with SIEM, Vulnerability More ❯
on prem and AWS environments. Lead incident response, vulnerability assessments and pentest co-ordination. Manage IAM systems and support Engineering teams with threat modelling and secure development practices. Own ISO27001, Cyber Essentials+, PCI-DSS and GDPR compliance. Manage physical security (access control etc) What experience do you need? 2+ years experience within Cyber Security hands on experience with SIEM, Vulnerability More ❯
Ipswich, Suffolk, East Anglia, United Kingdom Hybrid / WFH Options
Reed Technology
Active Directory, and Windows Server environments. Hands-on experience with Microsoft Endpoint Manager, Windows desktop support, and network administration. Understanding of cyber security standards and frameworks (e.g. Cyber Essentials, ISO27001). Excellent communication, problem-solving, and organisational skills. Strong understanding of IT governance, risk, and controls. Experience managing IT security and continuity processes. Ability to balance hands-on technical support More ❯
and digital transformation objectives Lead technology enabled change to improve operational efficiency and data driven decision making Oversee IT governance, risk management, and compliance with relevant standards (e.g., GDPR, ISO27001) Lead and develop a high performing IT team across multiple geographies, fostering a culture of innovation and data literacy Systems & Infrastructure Management Ensure the reliability, scalability, and security of IT More ❯
response . Implement and manage identity and access management (IAM) solutions using SailPoint, OKTA, and BeyondTrust. Collaborate with internal teams to ensure compliance with NIST, MITRE ATT&CK, and ISO27001 frameworks. Provide mentoring, documentation, and knowledge transfer to junior engineers and SOC analysts. Liaise with external vendors, clients, and cross-functional teams to resolve security issues. Essential Skills & Experience Proven … Check Point, and Juniper network security. Expertise in cloud security (Azure & AWS) . Demonstrated success leading or building CSOCs or security programmes . Strong documentation and design skills (HLD / LLD). Excellent communication, stakeholder management, and project leadership. Certifications (Highly Desirable) CISM - Certified Information Security Manager Microsoft Certified: Azure Security Engineer CCNP / CCIE (Security / R&S) CCSA / CCSE (Checkpoint) JNCIA (Juniper) CEH - Certified Ethical Hacker More ❯
response . Implement and manage identity and access management (IAM) solutions using SailPoint, OKTA, and BeyondTrust. Collaborate with internal teams to ensure compliance with NIST, MITRE ATT&CK, and ISO27001 frameworks. Provide mentoring, documentation, and knowledge transfer to junior engineers and SOC analysts. Liaise with external vendors, clients, and cross-functional teams to resolve security issues. Essential Skills & Experience Proven … Check Point, and Juniper network security. Expertise in cloud security (Azure & AWS) . Demonstrated success leading or building CSOCs or security programmes . Strong documentation and design skills (HLD / LLD). Excellent communication, stakeholder management, and project leadership. Certifications (Highly Desirable) CISM - Certified Information Security Manager Microsoft Certified: Azure Security Engineer CCNP / CCIE (Security / R&S) CCSA / CCSE (Checkpoint) JNCIA (Juniper) CEH - Certified Ethical Hacker More ❯
response . Implement and manage identity and access management (IAM) solutions using SailPoint, OKTA, and BeyondTrust. Collaborate with internal teams to ensure compliance with NIST, MITRE ATT&CK, and ISO27001 frameworks. Provide mentoring, documentation, and knowledge transfer to junior engineers and SOC analysts. Liaise with external vendors, clients, and cross-functional teams to resolve security issues. Essential Skills & Experience Proven … Check Point, and Juniper network security. Expertise in cloud security (Azure & AWS) . Demonstrated success leading or building CSOCs or security programmes . Strong documentation and design skills (HLD / LLD). Excellent communication, stakeholder management, and project leadership. Certifications (Highly Desirable) CISM Certified Information Security Manager Microsoft Certified: Azure Security Engineer CCNP / CCIE (Security / R&S) CCSA / CCSE (Checkpoint) JNCIA (Juniper) CEH Certified Ethical Hacker More ❯
response . Implement and manage identity and access management (IAM) solutions using SailPoint, OKTA, and BeyondTrust. Collaborate with internal teams to ensure compliance with NIST, MITRE ATT&CK, and ISO27001 frameworks. Provide mentoring, documentation, and knowledge transfer to junior engineers and SOC analysts. Liaise with external vendors, clients, and cross-functional teams to resolve security issues. Essential Skills & Experience Proven … Check Point, and Juniper network security. Expertise in cloud security (Azure & AWS) . Demonstrated success leading or building CSOCs or security programmes . Strong documentation and design skills (HLD / LLD). Excellent communication, stakeholder management, and project leadership. Certifications (Highly Desirable) CISM - Certified Information Security Manager Microsoft Certified: Azure Security Engineer CCNP / CCIE (Security / R&S) CCSA / CCSE (Checkpoint) JNCIA (Juniper) CEH - Certified Ethical Hacker More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson McCade
in Cybersecurity. Relevant security certifications (CISSP, CISM etc.). Deep experience of security frameworks (i.e. NIST, ISO27001, TOGAF, SABSA) Strong technical exposure to AI / ML concepts, algorithms, models, regulations and controls. Involvement in pre-sales & commercials in a consulting capacity. Senior Security Consultant key details: Up to £115k salary 15% Performance bonus. £4k More ❯
in Cybersecurity. Relevant security certifications (CISSP, CISM etc.). Deep experience of security frameworks (i.e. NIST, ISO27001, TOGAF, SABSA) Strong technical exposure to AI / ML concepts, algorithms, models, regulations and controls. Involvement in pre-sales & commercials in a consulting capacity. Senior Security Consultant key details: Up to £115k salary 15% Performance bonus. £4k More ❯
london, south east england, united kingdom Hybrid / WFH Options
Anson McCade
in Cybersecurity. Relevant security certifications (CISSP, CISM etc.). Deep experience of security frameworks (i.e. NIST, ISO27001, TOGAF, SABSA) Strong technical exposure to AI / ML concepts, algorithms, models, regulations and controls. Involvement in pre-sales & commercials in a consulting capacity. Senior Security Consultant key details: Up to £115k salary 15% Performance bonus. £4k More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Anson McCade
in Cybersecurity. Relevant security certifications (CISSP, CISM etc.). Deep experience of security frameworks (i.e. NIST, ISO27001, TOGAF, SABSA) Strong technical exposure to AI / ML concepts, algorithms, models, regulations and controls. Involvement in pre-sales & commercials in a consulting capacity. Senior Security Consultant key details: Up to £115k salary 15% Performance bonus. £4k More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Anson McCade
in Cybersecurity. Relevant security certifications (CISSP, CISM etc.). Deep experience of security frameworks (i.e. NIST, ISO27001, TOGAF, SABSA) Strong technical exposure to AI / ML concepts, algorithms, models, regulations and controls. Involvement in pre-sales & commercials in a consulting capacity. Senior Security Consultant key details: Up to £115k salary 15% Performance bonus. £4k More ❯
major cyber vendors (e.g., Palo Alto, Fortinet, CrowdStrike, etc.). Experience with frameworks such as NIST, ISO27001 or ITIL. Experience with VAR, or MSP / MSSP-focused roles. If this role looks of interest and your currently looking for you next position then please send your CV now and call for more information. This More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Knowledge of identity and access management (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Familiarity with common regulatory and compliance frameworks (e.g. NIST, CIS Controls, ISO27001, Cyber Essentials Plus). Experience aligning infrastructure builds with cyber security standards such as … NCSC guidance, CIS benchmarks, or Microsoft Security Baselines. Experience implementing monitoring, logging, and alerting toolsets including SIEM and threat detection platforms. Understanding of data classification, encryption, and secure storage / access principles. Experience defining security configurations and collaborating with engineers to apply them consistently across the entire IT estate. Familiarity with endpoint protection platforms and vulnerability management tools. Experience More ❯
Poole, England, United Kingdom Hybrid / WFH Options
Peaple Talent
best practices Producing clear reports on incidents, issues, and improvements Supporting continuous improvement by recommending new technologies The Candidate: 2 years minimum IT Management Background IT Web / Application Hosting Windows Server 2016+ Office 365 admin (Azure AD, Exchange, Group Policies, MDT) Enterprise networking ITIL qualified Security conscious (SSL, PCI, CE+, ISO27001More ❯
above, I'd be especially interested in individuals who are Chartered Cyber Security Professionals and who hold CISSP and CISM qualifications. Experience required: Security assurance, working with JSP440, JSP604 / 453. Security accreditation. Implementation of Secure by Design. Implementing security standards and frameworks, such as ISO27001, NIST 800 and CAF. Conducting Cyber Security risk … SaaS. Working as a Security Assurance Co-Ordinator Working with various technical teams. Conducting Cyber Security assessments and gap analysis against various frameworks. Qualifications they look For: NIST Foundation / Practitioner CISM CRISC CISSP CISMP Senior Security Consultant – DV Cleared – up to £75,000 + bonus - Corsham - On-Site 2 days per week More ❯
Knowledge of identity and access management (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Familiarity with common regulatory and compliance frameworks (e.g. NIST, CIS Controls, ISO27001, Cyber Essentials Plus). Experience aligning infrastructure builds with cyber security standards such as … NCSC guidance, CIS benchmarks, or Microsoft Security Baselines. Experience implementing monitoring, logging, and alerting toolsets including SIEM and threat detection platforms. Understanding of data classification, encryption, and secure storage / access principles. Experience defining security configurations and collaborating with engineers to apply them consistently across the entire IT estate. Familiarity with endpoint protection platforms and vulnerability management tools. Experience More ❯
Knowledge of identity and access management (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Familiarity with common regulatory and compliance frameworks (e.g. NIST, CIS Controls, ISO27001, Cyber Essentials Plus). Experience aligning infrastructure builds with cyber security standards such as … NCSC guidance, CIS benchmarks, or Microsoft Security Baselines. Experience implementing monitoring, logging, and alerting toolsets including SIEM and threat detection platforms. Understanding of data classification, encryption, and secure storage / access principles. Experience defining security configurations and collaborating with engineers to apply them consistently across the entire IT estate. Familiarity with endpoint protection platforms and vulnerability management tools. Experience More ❯
Knowledge of identity and access management (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Familiarity with common regulatory and compliance frameworks (e.g. NIST, CIS Controls, ISO27001, Cyber Essentials Plus). Experience aligning infrastructure builds with cyber security standards such as … NCSC guidance, CIS benchmarks, or Microsoft Security Baselines. Experience implementing monitoring, logging, and alerting toolsets including SIEM and threat detection platforms. Understanding of data classification, encryption, and secure storage / access principles. Experience defining security configurations and collaborating with engineers to apply them consistently across the entire IT estate. Familiarity with endpoint protection platforms and vulnerability management tools. Experience More ❯
Knowledge of identity and access management (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Familiarity with common regulatory and compliance frameworks (e.g. NIST, CIS Controls, ISO27001, Cyber Essentials Plus). Experience aligning infrastructure builds with cyber security standards such as … NCSC guidance, CIS benchmarks, or Microsoft Security Baselines. Experience implementing monitoring, logging, and alerting toolsets including SIEM and threat detection platforms. Understanding of data classification, encryption, and secure storage / access principles. Experience defining security configurations and collaborating with engineers to apply them consistently across the entire IT estate. Familiarity with endpoint protection platforms and vulnerability management tools. Experience More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
sales? Let’s talk — we can offer fast progression and big opportunities. What’s In It For You?: Excellent company culture and training – check us out on Glassdoor – 4.5 / 5 stars! A supportive, positive, inspiring, and fun environment The opportunity to sell a best-in-class software / SaaS product in the high-growth cyber industry. Highly … competitive base salary plus £1,500 Christmas bonus. Realistically earn £10-20K commission / £35-50K OTE in your first year (depending on starting salary and target) Our top SDR's earn £60-70K OTE. Build up to £70-90K OTE in year 2-3+, as you progress to Account Executive and beyond. Great … office. Excellent training and significant opportunities for career progression. The Day to Day Role: Day to day you’ll seek out new business opportunities primarily through phone-based prospecting / cold-calling, as well as LinkedIn and email. You’ll speak with IT / technology leadership and heads of information security, with the view to arranging demos of More ❯