We have an exciting opportunity for a Software Security Engineer to join our Global Healthcare client. As a Security Engineer, you’ll provide hands-on technical expertise to guide software development, delivery and continuous improvement focusing on risk and security. You’ll help evolve our client’s new Digital Platform so that it’s secure and compliant with … both internal and industry regulations. You’ll analyse new feature code to identify security risks and work with engineers to mitigate them, working and applying modern security standards such as OWASP CI/CD, DSOMM, SAMM and Cloud Security Posture management systems such as Azure Defender and Prisma Cloud. Our client empowers their people to balance their … DAST (preferred) ideally with HTTP APIs Ability to manage large scale software estates from a operational perspective (build, release, monitoring, rollbacks, high availability, etc) Hands on experience building automated security test suites JOB DESCRIPTION Analysing new feature code to identify security risks and working with engineers to mitigate Delivering improvements to our DSOMM score, either working with teams More ❯
Security Engineer Oliver James are partnered with a forward-thinking UK organisation that are embarking on the most radical and ambitious transformation programme in the history of its Healthcare business. In response to a changing UK health landscape, the rapid growth of the preventative wellbeing sector, and the need for bold simplification, this organisation is uniting several internal businesses … into a single, streamlined digital offering. The mission? To empower people to be the best version of themselves-with health and wellbeing at the core. As a Security Engineer , you'll be a key player in this journey-applying modern security practices across a newly developed Digital Platform that underpins the transformation. You'll work across agile engineering … teams to ensure security is embedded into every layer of the technology stack, from design through to deployment and monitoring. What You'll Be Doing: Security by Design: Collaborate with engineering teams to assess new features and services, identify potential vulnerabilities, and design secure solutions from the ground up. Code & Tooling Contribution: Play a hands-on role in More ❯
IT and Digital Procurement S2P experience. Understanding of software licensing models, including SaaS, perpetual, subscription, and cloud-based agreements Experienced with commercial IT and Digital contract negotiation. Familiar with informationsecurity, GDPR, and regulatory compliance as it applies to third party IT services Proven experience identifying and managing key suppliers mitigating risks, understand market trends and monitor supplier More ❯
members. With plenty of opportunities ahead, we're looking for a Security Operations Engineer who is eager to make an impact. You'll report to the Head of InfoSec and take ownership of Security Operations, helping to shape and strengthen our overall security landscape. You'll play a key role in shaping our growing security function … and contributing to the maturity of our security programme, building resilient systems, influencing engineering practices, and driving meaningful change in a supportive environment. What You'll Do Monitor, triage, and respond to security alerts and incidents-investigating and coordinating effective containment, resolution, and recovery Proactively identify and assess vulnerabilities, recommending and applying improvements to strengthen our defences Design … implement, and maintain security controls across cloud, network, and application environments Continuously improve how we work by developing and refining playbooks, automating processes, and reducing manual effort Collaborate closely with Engineering and IT teams to embed security at every stage of the development lifecycle Help maintain compliance with frameworks such as ISO 27001, GDPR, PCI DSS, and CIS More ❯
/from a range of internal and external systems Manipulate and link different data sets to inform space management activities and benchmarking Interpret and apply the Estates data and informationsecurity standards, policies and procedures to data management activities Perform space database queries across multiple tables to extract data for analysis Perform routine statistical analysis for estates reporting More ❯
yourself and further develop your skills to enable you to grow within the company and industry. You will be involved in: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with … the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList … and BlockList Conduct activities in line with SOC Maturity and continuous improvement Your skillset may include: Background in Cyber SecuritySecurity awareness Experience in Network Security, Infrastructure, and Operating Systems & Applications Knowledge of IT Security standard methodologies Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP More ❯
ensuring successful delivery of a strategically important project aligned to enhanced access controls and user permissions. While the project has some touch points with informationsecurity , deep InfoSec experience is not essential - but any awareness or exposure is a definite bonus. Key Requirements: Proven experience as a Senior Project Manager delivering complex business and technical projects within the … of project initiation , team mobilisation , and end-to-end delivery. Comfortable working in fast-paced, evolving transformation environments. Excellent stakeholder management and communication skills. Exposure to or understanding of informationsecurity principles is advantageous but not essential. This is a fantastic opportunity to join a highly engaged, collaborative team on their growth journey in an initial 6 month More ❯
ensuring successful delivery of a strategically important project aligned to enhanced access controls and user permissions. While the project has some touch points with informationsecurity , deep InfoSec experience is not essential - but any awareness or exposure is a definite bonus. Key Requirements: Proven experience as a Senior Project Manager delivering complex business and technical projects within the … of project initiation , team mobilisation , and end-to-end delivery. Comfortable working in fast-paced, evolving transformation environments. Excellent stakeholder management and communication skills. Exposure to or understanding of informationsecurity principles is advantageous but not essential. This is a fantastic opportunity to join a highly engaged, collaborative team on their growth journey in an initial 6 month More ❯
yourself and further develop your skills to enable you to grow within the company and industry. You will be involved in: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with … the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList … and BlockList Conduct activities in line with SOC Maturity and continuous improvement Your skillset may include: Background in Cyber SecuritySecurity awareness Experience in Network Security, Infrastructure, and Operating Systems & Applications Knowledge of IT Security standard methodologies Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP More ❯
Role: Bid Administrator (Information Technology) Location: Leeds, West Yorkshire Salary: £30,000 - £35,000 Plus 25 Days Holiday, Private Pension, Vendor Certifications and more! About the Company: Our client, a global leader in Sustainability Consulting, is seeking an IT Bid Administrator to join their dynamic team. This role will involve providing crucial IT and informationsecurity support … for client requests for information, ensuring all responses are accurate, comprehensive, and aligned with client requirements. The successful candidate will work in a fast-paced environment, assisting in the preparation of bid documents and responding to security and IT-related questionnaires. Position Overview: The IT Bid Administrator will work closely with the InformationSecurity and IT … teams to provide comprehensive support for client bids. You will ensure that all client requirements regarding IT and informationsecurity are met by reviewing and responding to client documentation, identifying potential risks, and highlighting exceptions. The ideal candidate will be detail-oriented, possess strong analytical skills, and have the ability to thrive in a fast-moving environment. Key More ❯
At ReversingLabs, our software supply chain security and threat intelligence solutions have become essential to advancing cybersecurity maturity around the globe. We're on a journey to expand adoption and accelerate growth by hiring top talent across the security industry. Notable breaches such as SolarWinds, CircleCI, and 3CX have elevated software supply chain security as a top … to grow your career A collaborative and innovative workplace where your ideas matter ReversingLabs was founded in 2009 with the mission to offer the ultimate threat detection solutions. Our security products are used by some of the largest organizations in the world, including 2 of the top 3 banks … of the top 6 software companies, and 2 of the top 6 insurance companies. We have been honored with numerous awards through the years including the 2023 Global InfoSec Award, 2022 CDM Global Infosec Awards, 2021 SC Media Trust Award for Best Threat Intelligence Technology, a 2020 Stevie Award, and the 2017 JPMorgan Chase Hall of Innovation Award for our More ❯
LS18, Rodley, City and Borough of Leeds, West Yorkshire, United Kingdom
Elevate Technology Group Ltd
Role: Bid Administrator (Information Technology) Location: Leeds, West Yorkshire Salary: £30,000 - £35,000 Plus 25 Days Holiday, Private Pension, Vendor Certifications and more! About the Company: Our client, a global leader in Sustainability Consulting, is seeking an IT Bid Administrator to join their dynamic team. This role will involve providing crucial IT and informationsecurity support … for client requests for information, ensuring all responses are accurate, comprehensive, and aligned with client requirements. The successful candidate will work in a fast-paced environment, assisting in the preparation of bid documents and responding to security and IT-related questionnaires. Position Overview: The IT Bid Administrator will work closely with the InformationSecurity and IT … teams to provide comprehensive support for client bids. You will ensure that all client requirements regarding IT and informationsecurity are met by reviewing and responding to client documentation, identifying potential risks, and highlighting exceptions. The ideal candidate will be detail-oriented, possess strong analytical skills, and have the ability to thrive in a fast-moving environment. Key More ❯
Develop and review NLP Generative AI engineering data models tailored to specific Systems Engineering use cases. Ensure compliance with customer Information Management (IM) and InformationSecurity (InfoSec) policies. Formalise, establish governance, and deploy PoC to derive harmonisation and consistency in requirement definition and Verification & Validation activities. Conclude and review the data model to decide on full deployment. More ❯
Develop and review NLP Generative AI engineering data models tailored to specific Systems Engineering use cases. Ensure compliance with customer Information Management (IM) and InformationSecurity (InfoSec) policies. Formalise, establish governance, and deploy PoC to derive harmonisation and consistency in requirement definition and Verification & Validation activities. Conclude and review the data model to decide on full deployment. More ❯
Develop and review NLP Generative AI engineering data models tailored to specific Systems Engineering use cases. Ensure compliance with customer Information Management (IM) and InformationSecurity (InfoSec) policies. Formalise, establish governance, and deploy PoC to derive harmonisation and consistency in requirement definition and Verification & Validation activities. Conclude and review the data model to decide on full deployment. More ❯
on with WANs, VPNs, Firewalls, and Wireless Networks Automate infrastructure tasks using tools like Terraform and Consul Maintain our Teams Telephony and core LAN/WAN services Collaborate with InfoSec to enhance security across our environments This Network Infrastructure Engineer will pay an annual salary up to £75,000, a 15% Annual Bonus, 15% Company Pension, Training Fund, Electric … Recruitment Agency, which means we do not discriminate on the basis of race, colour, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression. We celebrate diversity and are committed to create inclusive working environments for all our clients. More ❯
on with WANs, VPNs, Firewalls, and Wireless Networks Automate infrastructure tasks using tools like Terraform and Consul Maintain our Teams Telephony and core LAN/WAN services Collaborate with InfoSec to enhance security across our environments This Network Infrastructure Engineer will pay an annual salary up to £75,000, a 15% Annual Bonus, 15% Company Pension, Training Fund, Electric … Recruitment Agency, which means we do not discriminate on the basis of race, colour, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression. We celebrate diversity and are committed to create inclusive working environments for all our clients. More ❯
Why This Role Stands Out: Influence at Scale: You’ll shape the direction of a global enterprise’s technical infrastructure – both greenfield and legacy – as we modernise for scale, security, and resilience. Tech-First Culture: We value speed, outcomes, and smart autonomy. No red tape. No silos. Modern Stack, Complex Challenges: Hybrid multi-cloud (AWS, Azure, GCP), Palo Alto … Ansible, and more. What You’ll Own: Lead network architecture, engineering, and operations across global hybrid environments Design and implement highly available, secure, and observable infrastructure Collaborate with DevOps, InfoSec, and Engineering to evolve systems and standards Lead complex change initiatives, ensure uptime (target: 5 9s), and drive tech upgrades Define and implement network strategy, capacity planning, DR, and automation … background, experience, or identity. If you’re curious and passionate about doing meaningful work in a collaborative environment, we want to hear from you. Get in touch for full information - submit your CV, or contact Carol Donnelly on carol@vivatechtalent.com More ❯
location We are looking for a brilliant Vulnerability Analyst to join a constantly growing UK utilities company as they embark on a 5 year long transformation of their Cyber Security team while they help revolutionise the UK energy industry. As a UK Critical National Infrastructure provider, InformationSecurity is an integral part of their business operation, so … role is critical to the business. Within this role, you will be responsible for the OT vulnerabilities across the organisation’s estate. You will triage, assess, and prioritise identified security vulnerabilities, ensuring mitigating controls are identified and implemented where necessary. You will support security assessments and third parties’ cyber exercises that identify security vulnerabilities, while tracking remediation … risks, and exceptions. We are looking for an individual that has: Must have 2 years’ cyber security experience within an OT environment with strong OT/ICS knowledge about products, architectures and workflows. Experience or knowledge of vulnerability management tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance More ❯
location We are looking for a brilliant Vulnerability Analyst to join a constantly growing UK utilities company as they embark on a 5 year long transformation of their Cyber Security team while they help revolutionise the UK energy industry. As a UK Critical National Infrastructure provider, InformationSecurity is an integral part of their business operation, so … role is critical to the business. Within this role, you will be responsible for the OT vulnerabilities across the organisation's estate. You will triage, assess, and prioritise identified security vulnerabilities, ensuring mitigating controls are identified and implemented where necessary. You will support security assessments and third parties' cyber exercises that identify security vulnerabilities, while tracking remediation … risks, and exceptions. We are looking for an individual that has: Must have 2 years' cyber security experience within an OT environment with strong OT/ICS knowledge about products, architectures and workflows. Experience or knowledge of vulnerability management tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance More ❯
smooth IT operations and contribute to future IT strategies. Main duties of the job As an IT Engineer at Aria Healthcare, you will be responsible for delivering IT and informationsecurity projects, providing 3rd line support, and mentoring junior IT staff. You will need to have strong knowledge of IT infrastructure, Microsoft technologies, networking, and security, as … ensure smooth operations and contribute to future IT strategies. Key Responsibilities: Implement, Maintain and support IT infrastructure, devices, and networks Ensure high availability of IT systems Deliver IT and InformationSecurity projects Provide 3rd line support and mentor junior IT staff Ideal Candidate: Strong knowledge of IT infrastructure, Microsoft technologies, networking, and security Confident in client interaction More ❯
I'm supporting a West Midlands-based client in their search for an IT Audit Manager to take ownership of IT-related audits, informationsecurity audits, and SOx ITGC testing across the UK and EMEA region. This is a hybrid role and requires 2 days per week in the office. Why consider this role? Lead IT audits and … the annual assurance plan Perform SOx ITGC testing, assess deficiencies, and support remediation plans Work with Risk, Finance, and IT teams to enhance business controls across multiple territories Conduct informationsecurity audits and provide recommendations Support external auditors and liaise with regulators as needed Drive continuous improvement in IT assurance and control frameworks What we're looking for More ❯
Woodstock, Oxfordshire, South East, United Kingdom
Ridge & Partners LLP
and its subsequence updates are fully tested before entering the production environment Proactively look at ways of making improvements in all areas of the clients IT Apply knowledge of InformationSecurity to ensure all company data and systems are kept safe from threats Attend and/or host regular status meetings with the team and management Effectively communicate … IT or any other relevant information to colleagues in a timely manner Technical Skills Essential understanding of: Security Infrastructure Cyber Security best practices Windows Desktop environments, including the latest Windows Version Windows Server OS Microsoft 365 Cloud Platform Networking systems and services Virtualisation technologies such as VMware/Hyper-V InformationSecurity best practices ITIL More ❯
and experience working with R&D teams - Flair in connecting people and ideas; ability to operate in a matrix environment. - Right to work in the UK without restriction. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard’s security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard’s guidelines. More ❯
and experience working with R&D teams Flair in connecting people and ideas; ability to operate in a matrix environment. Right to work in the UK without restriction. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯