Job Title: Cyber Security Assurance Practitioner Location: Preston. We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular role. Salary: Circa £39,000 dependent on experience What you'll be doing: Conduct Cyber Security risk assessment of systems and services Deliver documentation to demonstrate compliance to internal … and external stakeholders. Conduct assessment and provision of control effectiveness in managing informationsecurity risk Perform health checks of controls and their effectiveness aligned with NIST (DFARS), DEFCON and HMG Secure by Design requirements to highlight key issues Support and implement service improvement for the assurance function Work with EIT Business Operation Teams to ensure findings/recommendations … stemming from Operational Assurance are highlighted, tracked, and remediated Your skills and experiences: Educated to degree level (or equivalent) preferably in a related technical discipline Understanding of cyber security technologies, their implementation and secure configuration CompTIA (A+, Network+, Security+)/NSCP Practitioner/CCSK/ISO27001 Practitioner (Lead Auditor etc.), CISM-P Cyber Security qualification - Desirable one or More ❯
Title: Infomation Security Engineer Contract: 8 month (Initially) Rate: Up to £625 Per Day (Inside IR35) Location: Remote! Are you passionate about embedding security into the heart of technology change? if so Our client is looking for an experienced Secure by Design Specialist to support their high-profile organisation in strengthening their security posture across major transformation … initiatives. This is a pivotal role where you'll work closely with delivery teams to ensure cyber security, data protection, and compliance frameworks are baked into every phase of the project lifecycle, right from ideation through to delivery. You'll act as the security conscience across multiple programmes, helping to identify risks early, reduce costly late-stage rework … and deliver robust, secure-by-default solutions. The Role: Provide subject matter expertise on cyber security and secure design across tech change programmes Work hand-in-hand with delivery managers to embed security controls from day one Review and guide third-party risk assessments and product security compliance Support DPIAs and ensure alignment with Cyber Essentials, ISO More ❯
Cyber Security Engineer (SecOps) Location: Central Bristol Job Type: Permanent, Hybrid (2–3 days in-office) Salary: Competitive (£60,000–£65,000) + Bonus + Benefits We’re recruiting for a SecOps Engineer to join a high-performing InformationSecurity & Resilience team within a well-established FTSE 100 company. Based in Bristol, this hybrid role offers exciting … variety—supporting projects from customer-facing platform builds to student experience improvements—all while helping safeguard digital assets and security posture. You’ll work collaboratively across technical and business teams to monitor, analyse, and respond to evolving cyber threats, lead forensic investigations, and support wider resilience initiatives. Key Responsibilities: Design, implement, and manage secure network architectures Perform vulnerability assessments … IT teams to embed secure coding and operational practices Maintain clear documentation of risk, incidents, and security configurations Contribute to evolving internal controls and support continuous improvement in InfoSec Required Skills & Experience: Strong knowledge and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
Cyber Security Engineer (SecOps) Location: Central Bristol Job Type: Permanent, Hybrid (2-3 days in-office) Salary: Competitive (£60,000-£65,000) + Bonus + Benefits We're recruiting for a SecOps Engineer to join a high-performing InformationSecurity & Resilience team within a well-established FTSE 100 company. Based in Bristol, this hybrid role offers exciting … variety-supporting projects from customer-facing platform builds to student experience improvements-all while helping safeguard digital assets and security posture. You'll work collaboratively across technical and business teams to monitor, analyse, and respond to evolving cyber threats, lead forensic investigations, and support wider resilience initiatives. Key Responsibilities: Design, implement, and manage secure network architectures Perform vulnerability assessments … IT teams to embed secure coding and operational practices Maintain clear documentation of risk, incidents, and security configurations Contribute to evolving internal controls and support continuous improvement in InfoSec Required Skills & Experience: Strong knowledge and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements More ❯
governance and strategic planning Assist continuous improvement in governance and reporting processes to align with agile best practices by identify and implement efficient practices to collect accurate and timely information for governance, progress reporting and finance requirements Drive governance towards operational excellence Oversee the gated review process which forms part of the Vocalink risk control framework for the delivery … to identify obstacles and creative thinking to find effective solutions. Required Qualifications: SAFe Agilist or equivalent certification SAFe LPM, AgilePM, PMP, or similar project/portfolio governance certifications Corporate Security Responsibility Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with … an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must: Abide by Mastercard's security policies and practices. Ensure the confidentiality and integrity of the information being accessed. Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with More ❯
Month Fixed Term Apprenticeship Sunderland City Council has an exciting opportunity for an enthusiastic individual to join the ICT Service as a Cyber Security Apprentice. Working as part of the informationsecurity team you will develop an understanding of Sunderland City Council's approach to cyber security and the critical role this plays supporting its strategic … goals. During the apprenticeship, you will monitor and detect potential security threats and escalate as necessary. You will also assist to support secure and uninterrupted business operations through the implementation of cyber security mechanisms and the application of cyber security procedures and controls. As a Cyber Security apprentice, you will undertake the Level 3 Cyber Security … a weekly basis. You will be supported through the apprenticeship by an assessor, and you will also receive regular mentoring in the workplace from your supervisor and team. More information on the apprenticeship is available using the following link: This post is exempt from the rehabilitation of Offenders Act 1974 and therefore will be subject to a DBS check More ❯
South West London, London, United Kingdom Hybrid / WFH Options
GNA Group
Job Title: Asset Information Delivery Technician Location: Central London Offices (Flexible Hybrid Option) Start Date: Aug 2025 Contract Duration: 8 months Salary: Competitive, based on experience About the Project: Join the Largest Nuclear Infrastructure Project in Europe, a transformative initiative delivering sustainable, zero-carbon energy for millions. This high-profile project drives innovation in engineering, construction, and commissioning, prioritizing … safety, quality, and collaboration. Job Purpose: We are seeking two Asset Information Delivery Technicians to join our central Data and Information Management Team for an 8-month contract. This delivery-focused role supports the rollout of a consistent Asset Information Framework (AIF) across the project and its tier 1 supply chain. You will develop practical asset information … align tasks with project priorities. Map and analyze asset data flows from platforms like EDRMS, EAMS, and CDE, including technical documentation (e.g., design specifications, operations manuals). Develop asset information products, including asset classifications, data dictionaries, breakdown structures, labelling requirements, and equipment catalogues. Configure asset data requirements, ensuring compliance with security, quality, and change management standards. Create templated More ❯
days left to apply) job requisition id 137415 End Date Friday 22 August 2025 Salary Range £90,440 - £106,400 We support flexible working - click here for more information on flexible working options Flexible Working Options Hybrid Working, Job Share Job Description Summary . Job Description JOB TITLE: Lead Infrastructure Engineer SALARY: £90,440 - £106,400 LOCATION: Edinburgh or … an office site About this opportunity At Lloyds Banking Group, we're moving to the next stages of our digital transformation, and it's our job within the Chief Security Office (CSO) to ensure that we keep our customers, colleagues and assets safe from threat! The Lead Infrastructure Engineer will lead a team of Engineers within the Security Operations Lab, being responsible for one or more technical products. This role is accountable for infrastructure and security strategy, as well as the technical product roadmaps across the Data Loss Management (DLM) feature team. A key focus will be on improving Data Loss Prevention (DLP) and Data Security Posture Management (DSPM) capabilities, ensuring alignment with business goals More ❯
assets, including employees, contractors, and third-party vendors. The position requires collaboration with cross-functional teams to mitigate risks of malicious, negligent, or unintentional insider actions that could cause security breaches, data loss, or reputational damage. It will also involve building strong relationships with internal stakeholders and driving continuous programme improvements. This role suits someone with strong investigative skills … Support the delivery of the insider threat programme, including developing tools, standards, and procedures to detect, prevent, and respond to insider threats. Utilise advanced detection tools, behavioural analytics, and security monitoring systems. Drive continuous improvement by applying lessons learned, industry best practices, and emerging threat intelligence. Partner with stakeholders to identify and mitigate potential insider risks across systems, networks … Produce reports on risks, incidents, and mitigation efforts for executive decision-making. Collaborate with intelligence teams to develop threat modelling deliverables. Experience & Skills Required 8+ years of experience in informationsecurity, preferably in Investigations, Analysis, Security Operations, Incident Response, or Threat Intelligence. 3+ years' experience specifically in Insider Threat or equivalent roles. Proficiency with insider threat detection More ❯
Act as primary contact for our private label partner as it relates to hotel operations Day-to-day operations management for our hotel partners Compliance: Work closely with Expedia Security … Servicing and Legal teams to manage our annual informationsecurity audit as well as ongoing compliance requests and escalations Find ways to optimize our partner compliance processes (Infosec and other audits, compliance requests, partner escalations, etc ) Manage partnership SLAs Work collaboratively with the partner to identify new business opportunities and drive new business Build strong long-term strategic … their respective owners. CST: -50 Employment opportunities and job offers at Expedia Group will always come from Expedia Group's Talent Acquisition and hiring teams. Never provide sensitive, personal information to someone unless you're confident who the recipient is. Expedia Group does not extend job offers via email or any other messaging tools to individuals with whom we More ❯
Act as primary contact for our private label partner as it relates to hotel operations Day-to-day operations management for our hotel partners Compliance: Work closely with Expedia Security … Servicing and Legal teams to manage our annual informationsecurity audit as well as ongoing compliance requests and escalations Find ways to optimize our partner compliance processes (Infosec and other audits, compliance requests, partner escalations, etc ) Manage partnership SLAs Work collaboratively with the partner to identify new business opportunities and drive new business Build strong long-term strategic … their respective owners. CST: -50 Employment opportunities and job offers at Expedia Group will always come from Expedia Group's Talent Acquisition and hiring teams. Never provide sensitive, personal information to someone unless you're confident who the recipient is. Expedia Group does not extend job offers via email or any other messaging tools to individuals with whom we More ❯
an office site About this opportunity At Lloyds Banking Group, we're moving to the next stages of our digital transformation, and it's our job within the Chief Security Office (CSO) to ensure that we keep our customers, colleagues and assets safe from threat! The Lead Infrastructure Engineer will lead a team of Engineers within the Security Operations Lab, being responsible for one or more technical products. This role is accountable for infrastructure and security strategy, as well as the technical product roadmaps across the Data Loss Management (DLM) feature team. A key focus will be on improving Data Loss Prevention (DLP) and Data Security Posture Management (DSPM) capabilities, ensuring alignment with business goals … collaboration is crucial for building a resilient, scalable, and proactive data loss prevention strategy! What We're Looking For Strategic Leadership and Technical Direction Define and implement infrastructure and security strategies aligned with business and compliance objectives. Develop and maintain technical roadmaps for DLM, with a focus on DLP and DSPM capabilities. Collaborate closely with the DLM Product Owner More ❯
The Infrastructure Engineer (Vulnerability Management) is a hands-on technical role aimed at enhancing this banks security posture. Positioned within the IT Security team, this role is responsible for addressing open vulnerabilities and assurance findings. The Infrastructure Engineer will remediate vulnerabilities using change and release management methodologies and automate security updates using a suit of patch management … industry, known for its commitment to innovation and technological advancement. As a medium-sized company, it provides a collaborative environment that encourages technical expertise and problem-solving. Description Remediate security audit findings by implementing configuration changes to NBKI infrastructure. Collaborate with the Security Manager and the InformationSecurity Office to agree on remediation plans and actions. … to work on impactful projects within a skilled team. This is a fantastic opportunity for a Infrastructure Engineer looking to make an impact in a reputable organisation within a security environment. If you meet the qualifications and are interested in this role, we encourage you to apply today More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
N Consulting Limited
Possibility of remote work: Hybrid, 2 days/week WFO Contract duration: 3 months Location: Reading, UK - JOB DETAILS Role Title: Oracle Cloud Security Consultant Required Core Skills: Oracle Cloud Eco System/Security Services Minimum years of experience: 10+ years Detailed Job Description: • Extensive experience in Cloud Security services, Cybersecurity, InformationSecurity • Expertise in … designing, implementing, and managing robust security solutions across the Cloud ecosystem • Ability to Lead the team and perform the role of Design and Architect. • Expertise in Project Management, Client Management and vendor Management • Ability to lead business transformation and digital strategy initiatives • Expertise in enhancing operations and customer engagement More ❯
example with hands-on approaches to demonstrate product management excellence and share best practices • Demonstrate and drive Mastercard Way behaviours through their behaviour, (e.g. customer and stakeholder interactions) Corporate Security Responsibility Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with … an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must: • Abide by Mastercard's security policies and practices; • Ensure the confidentiality and integrity of the information being accessed; • Report any suspected informationsecurity violation or breach, and • Complete all periodic mandatory security training in accordance with More ❯
About Us: Beazley Security is a global cybersecurity firm committed to helping clients enable advanced cyber defences that reduce risk with quantifiable results. We’re comprised of top talent from private industry, government, intelligence, and law enforcement who are specialists in threat detection, incident response, digital forensics, offensive security, risk management, and cyber resilience. As a subsidiary of … Beazley Insurance, we’ve been at the forefront of cyber insurance management and breach response activities for business clients in the US, UK, and Europe since 2017. As Beazley Security, the company will have an expanded scope, leveraging nearly two decades of cyber incident experience, a strong services division, and a business strategy focused on growth, to realize our … We believe these values are essential to creating a strong and inclusive workplace culture, as well as to delivering world-class cybersecurity solutions to our clients worldwide. As Beazley Security, these values will continue to thrive, with an extra emphasis on the expansion of our capabilities and capacity to help solve unique client challenges. Summary: We are seeking a More ❯
My client within the wealth management space I currently looking to bring in a Security Vulnerability Management Analyst on 6 month rolling contract. Please see below. Requirements: Strong understanding of vulnerability management processes, procedures and principles Exposure to application security best practices such as secure coding, security testing techniques Expert knowledge of Security Policies and Standards … Expert knowledge of InformationSecurity practices Knowledge of compliance, audit and privacy policies and regulations General knowledge of security technology Logistics: 6 Month Rolling contract £470 p/d inside IR35 via Umbrella Company Hybrid Please click here to find out more about our Key Information Documents. Please note that the documents provided contain generic information. … If we are successful in finding you an assignment, you will receive a Key Information Document which will be specific to the vendor set-up you have chosen and your placement. To find out more about Huxley, please visit Huxley, a trading division of SThree Partnership LLP is acting as an Employment Business in relation to this vacancy Registered More ❯
Nuneaton, Warwickshire, West Midlands, United Kingdom
Intercity Technology Limited
Be the Backbone of Secure IT Operations as a Linux Security Engineer! Intercity Technology is on the lookout for a driven and detail-oriented Linux Security Engineer to play a pivotal role in delivering secure, compliant, and high-performing IT services at a major customer site in Nuneaton . This is more than just a support role it … s your opportunity to be at the heart of technical operations, project delivery, and IT compliance, working closely with a high-performing team and a security-conscious client. If you're passionate about IT infrastructure, thrive in customer-facing environments, and love solving complex problems with precision and discretion, this is your chance to make a real impact. What … Youll Be Doing as a Linux Security Engineer: Technical Support & Compliance Deliver hands-on support for Linux and Windows environments. Maintain a compliant, secure network infrastructure. Troubleshoot and resolve support tickets while meeting SLAs. Keep helpdesk systems updated in real time with meaningful insights. Project Delivery & Stakeholder Engagement Lead IT projects from planning to execution. Configure, install, and test More ❯
about the role Orange Cyberdefense is the expert cyber security business unit of the Orange Group, providing security consulting, solutions and services to organisations around the globe. We strive to protect freedom and build a safer digital society. We are looking for a Senior SecurityConsultant ( SASE )to join our team in the UK. Working as a Senior SecurityConsultant … SASE ) We are seeking a skilled and experienced Senior Security Consultant to join our Presales team.This role requires a strong understanding of cybersecurity, with expertise in SASE (Secure Access Service Edge) and Next Generation Firewall (NGFW) solutions, particularly across Netskope, ZScaler, Palo Alto SASE products (Prisma Access, Prisma SD-WAN), and firewalls including Checkpoint, Fortinet, and Palo Alto. The … ideal candidate will have at least 5 years of experience in a similar role, a firm grasp of the security industry and threat landscape, and the ability to support and lead enterprise accounts. You will possess a consultative approach to solutioning, demonstratingcomprehensive knowledge of our portfolio and the ability to articulate all services to clients effectively. Key responsibilities: Lead More ❯
you can #BeKnown for whoever you are. Join us. What will you #BeKnown for? Job description Job responsibilities Please see full job description and person specification attached for more information on job role and responsibilities. Person Specification Education & Qualifications Essential Degree in computer science, digital communications or informatics; or equivalent experience. Network Administration Qualification (e.g. Extreme, Check Point, Cisco … Check Point Firewalls Cisco Switches HSCN MPLS Experience with Unify VoIP solutions, including Unified Communications and SIP technologies. Experience with analogue PBX Telephone systems. Knowledge and experience of NHS informationsecurity policies, Information Governance policies and GDPR. Experience with Microsoft server operating system network technologies. Experience with Microsoft client operating system networking technologies. Experience working within an … documentation, including topology diagrams, network configurations and patching records. Highly developed physical skills for precise and tidy working on network cabinets, devices and cabling. Good awareness of network and information security. Ability to prioritise work streams as required by unexpected events. Aptitude for sharing knowledge with other ICT team members. Must be able to follow policies and procedures Strong More ❯
around 4,500 of which are successful! There's a business in Leeds that has developed a piece of software that prevents these attacks from happening! The global cyber security market is projected to grow from $165.78 billion in 2021 to $366.10 billion in 2028 - there's no better time to be getting into this sector! Founded in … include prospecting new potential clients through a number of outreach methods such as cold calling, email, and LinkedIn. You'll speak with IT/technology leadership and Heads of InformationSecurity, with the view to arranging demos of the software or trials of the service. Learning and developing about the cyber security sector whilst producing 15 client … who earn around £60k-£90k OTE per year. Communication - It is important you have strong written and verbal communication skills as you will be conversing with Senior Heads of Security/Information daily. Intelligence - Ideally evidenced through a university degree. If you did not go to university, that's completely fine - we would still like to hear from More ❯
Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading informationsecurity company. Specializing in penetration testing and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow … professionally. Dionach by Nomios holds impressive certifications, including CREST, CHECK, PCI QSA, and ISO 27001. With our focus on enhancing customers' security and fostering team development,be joining a company that prioritizes both your growth and the safety of our clients. We're in an exciting phase of expansion and are looking for self-motivated individuals ready to thrive … our employees. If you require accommodations during the application process, let us know, and we'll work to meet your needs. What We're Looking For Experience with leading security assessments and penetration tests within OT/ICS environments. Experience with testing and reviewing OT architectures and related network device configurations. Experience with testing Critical National Infrastructure environments. Experience More ❯
a highly skilled and experienced Specialist CyberArk Senior Designer to join our cybersecurity team. The ideal candidate will be responsible for designing, implementing, and maintaining CyberArk solutions, ensuring the security and integrity of our organization's privileged access management infrastructure. The Specialist CyberArk Designer will collaborate with cross-functional teams to assess security risks, develop strategies, and implement … solutions that protect our critical assets and sensitive data from unauthorized access. Your responsibilities & duties Design, implement, and manage CyberArk solutions to meet organizational security requirements. Develop and maintain architectural design documents, including technical diagrams, process flows, and system configurations. Collaborate with stakeholders to gather requirements and translate them into CyberArk solution designs and system requirements. Conduct security … Implement and enforce privileged access management best practices, policies, and procedures. Stay up-to-date with the latest cybersecurity trends, technologies, and threats, and recommend appropriate measures to enhance security posture. Collaborate with cross-functional teams, including IT operations, network security, and compliance, to ensure alignment of security initiatives and adherence to regulatory requirements. Support the CyberArk More ❯
Job Title: Cyber Security Operational Technology (OT) Specialist Location: Immingham, Travel to other sites as required Salary: £57K - 60K A leading UK-based power generation company is seeking a Cyber Security Operational Technology (OT) Specialist with experience of developing and implementing security enhancements across OT networks, ideally within the energy sector. The role will report into the … Chief InformationSecurity Officer (CISO) and will play a key role within an OT risk management framework which covers multiple generation and storage sites. The role can be based from Immingham or London offices. Regular travel to sites will be required. The Role Are you passionate about OT Cyber Security and ready to make a tangible impact … across multiple UK energy generation and storage sites? We're looking for a Cyber Security OT Specialist with strong first-line technical skills and a solid grounding in risk management frameworks, ideally with experience in the energy sector. This is a key role within our cyber risk function, supporting our sites' critical infrastructure and helping shape secure and resilient More ❯
Employment Type: Permanent
Salary: £57000 - £60000/annum Pension,Medical,Incentive plan,25 Ho
Immingham, Lincolnshire, North East, United Kingdom
Rullion Limited
Job Title: Cyber Security Operational Technology (OT) Specialist Location: Immingham, Travel to other sites as required Salary: £57K - 60K A leading UK-based power generation company is seeking a Cyber Security Operational Technology (OT) Specialist with experience of developing and implementing security enhancements across OT networks, ideally within the energy sector. The role will report into the … Chief InformationSecurity Officer (CISO) and will play a key role within an OT risk management framework which covers multiple generation and storage sites. The role can be based from Immingham or London offices. Regular travel to sites will be required. The Role Are you passionate about OT Cyber Security and ready to make a tangible impact … across multiple UK energy generation and storage sites? We're looking for a Cyber Security OT Specialist with strong first-line technical skills and a solid grounding in risk management frameworks, ideally with experience in the energy sector. This is a key role within our cyber risk function, supporting our sites' critical infrastructure and helping shape secure and resilient More ❯