Newport, Gwent, United Kingdom Hybrid / WFH Options
Yolk Recruitment Ltd
into asset security while managing a small team of technical analysts and overseeing supplier relationships to drive successful outcomes. What You'll Bring: Proven experience in IT asset and vulnerabilitymanagement In-depth knowledge of asset discovery tools, vulnerability scanning and remediation techniques Solid understanding of the differences between IT and operational technology environments Awareness of attacker More ❯
IT Infrastructure Support Specialist - Systems & Patch Management Analyst We're seeking a detail-oriented and proactive Technical Infrastructure Analyst work an initial 3-month contract on our client's site in Suffolk. The candidate must therefore be a commutable distance Suffolk. This role is pivotal in maintaining the integrity, security, and performance of our client's enterprise systems. You … ll work closely with experienced Technical Analysts to apply patches, remediate vulnerabilities, and support life cycle management across both Windows and Linux environments. Key Responsibilities Patching & System Maintenance Install, configure, and maintain system software including operating systems and utilities. Apply security patches and updates in line with organisational policy and vendor guidance. Monitor patch compliance and report on remediation … progress. VulnerabilityManagement Investigate unauthorised access attempts and ensure compliance with relevant legislation. Collaborate with security teams to identify, assess, and remediate vulnerabilities. Support access control monitoring and incident response activities. Lifecycle & Infrastructure Operations Assist in the operation and control of IT infrastructure across hardware, software, and networks. Participate in change management processes for new or modified More ❯
translate them into technical controls, policies and run books. Audit & pen test lead - Coordinate external auditors, manage evidence collection, track remediation tickets and present technical posture to stakeholders. Threat & vulnerabilitymanagement - Run container image scanning (Snyk), dependency SBOM generation and orchestrate patch cycles across clusters. Incident readiness - Own on call playbooks, drill tabletop exercises, ensure logs/metrics … deep dive of existing CI/CD, Terraform and security policies. Shadow DPO on open compliance items to build context. Within three months, you will Lead the next quarterly vulnerability scan and deliver remediation plan. Introduce SBOM + container image scanning gates to GitHub Actions. Publish updated incident response runbook and run a tabletop drill. Within six months, you More ❯
translate them into technical controls, policies and run books. Audit & pen test lead - Coordinate external auditors, manage evidence collection, track remediation tickets and present technical posture to stakeholders. Threat & vulnerabilitymanagement - Run container image scanning (Snyk), dependency SBOM generation and orchestrate patch cycles across clusters. Incident readiness - Own on call playbooks, drill tabletop exercises, ensure logs/metrics … deep dive of existing CI/CD, Terraform and security policies. Shadow DPO on open compliance items to build context. Within three months, you will Lead the next quarterly vulnerability scan and deliver remediation plan. Introduce SBOM + container image scanning gates to GitHub Actions. Publish updated incident response runbook and run a tabletop drill. Within six months, you More ❯
across multiple UK energy generation and storage sites? We're looking for a Cyber Security OT Specialist with strong first-line technical skills and a solid grounding in risk management frameworks, ideally with experience in the energy sector. This is a key role within the cyber risk function, supporting critical infrastructure and helping shape secure and resilient OT environments … aligned with IEC62443 standards. Key Responsibilities Lead the implementation of new technical security controls across OT environments. Contribute to the assessment of OT network architecture, protocols, and change management processes. Lead incident response and remediation for cyber events detected by OT SIEM systems. Actively support vulnerabilitymanagement and ensure threat exposure is minimised. Provide hands-on leadership … in data and asset management, including backup and removable media deployments. Apply and track security metrics to ensure the ongoing effectiveness of controls. Deliver awareness training and cyber security guidance across OT engineering teams. Champion collaboration across cyber, IT, and engineering teams-bridging gaps between tech, process, and people. What We're Looking For The ability to work independently More ❯
Employment Type: Permanent
Salary: £57000 - £60000/annum Pension,Medical,Incentive Plan,25 Ho
Immingham, Lincolnshire, North East, United Kingdom
Rullion Limited
across multiple UK energy generation and storage sites? We're looking for a Cyber Security OT Specialist with strong first-line technical skills and a solid grounding in risk management frameworks, ideally with experience in the energy sector. This is a key role within the cyber risk function, supporting critical infrastructure and helping shape secure and resilient OT environments … aligned with IEC62443 standards. Key Responsibilities Lead the implementation of new technical security controls across OT environments. Contribute to the assessment of OT network architecture, protocols, and change management processes. Lead incident response and remediation for cyber events detected by OT SIEM systems. Actively support vulnerabilitymanagement and ensure threat exposure is minimised. Provide hands-on leadership … in data and asset management, including backup and removable media deployments. Apply and track security metrics to ensure the ongoing effectiveness of controls. Deliver awareness training and cyber security guidance across OT engineering teams. Champion collaboration across cyber, IT, and engineering teams-bridging gaps between tech, process, and people. What We're Looking For The ability to work independently More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Anson McCade
experience in IT security , ideally within a SOC/NOC environment. Strong knowledge and hands-on expertise with QRadar (other SIEM exposure beneficial). Solid understanding of DFIR principles, vulnerabilitymanagement, and ethical hacking. Strong grasp of network traffic flows, malware analysis, and reverse engineering. Excellent written and verbal communication skills for client interaction and reporting. Ability to More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
of experience in application security or secure software development. Strong knowledge of OWASP Top 10, secure coding principles, and threat modelling. Hands-on experience with SAST, DAST, SCA, and vulnerabilitymanagement tools. Familiarity with cloud platforms (Azure or AWS), CI/CD pipelines, and DevOps processes. Strong communication skills and the ability to collaborate effectively across teams. Understanding More ❯
of experience in application security or secure software development. Strong knowledge of OWASP Top 10, secure coding principles, and threat modelling. Hands-on experience with SAST, DAST, SCA, and vulnerabilitymanagement tools. Familiarity with cloud platforms (Azure or AWS), CI/CD pipelines, and DevOps processes. Strong communication skills and the ability to collaborate effectively across teams. Understanding More ❯
Defining and implementing the software security strategy in line with business goals Collaborating with developers to automate security testing and embed security requirements into the SDLC Supporting penetration testing, vulnerabilitymanagement, and remediation efforts Acting as a software security SME, advising teams on secure design, risk, and compliance Maintaining security documentation, training materials, and processes Reporting on compliance More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
Defining and implementing the software security strategy in line with business goals Collaborating with developers to automate security testing and embed security requirements into the SDLC Supporting penetration testing, vulnerabilitymanagement, and remediation efforts Acting as a software security SME, advising teams on secure design, risk, and compliance Maintaining security documentation, training materials, and processes Reporting on compliance More ❯
include: Defining and delivering a comprehensive cyber security strategy aligned with business goals and regulations Leading and developing the cyber security operations team Overseeing threat monitoring, incident response, and vulnerabilitymanagement Managing compliance with frameworks such as Cyber Essentials, NIST, ISO27001, GDPR, and GovAssure Acting as the primary point of contact for cyber matters internally and externally, including … regulators and industry forums Representing Cyber Security at board committees and senior management meetings Supporting bid and tender processes, providing risk-based advice and competitive responses About You Were looking for an experienced cyber security leader with a blend of strategic vision and operational expertise. You should bring: Proven experience defining and executing cyber security strategy at a senior … level Strong knowledge of governance, risk, compliance, and regulatory frameworks Leadership experience managing cyber security operations teams Excellent stakeholder management skills, including board-level engagement The ability to represent the organisation externally with authority and credibility Benefits Competitive salary and benefits package Hybrid/flexible working arrangements Generous annual leave and pension Inclusive, collaborative culture with senior-level visibility More ❯
include: Defining and delivering a comprehensive cyber security strategy aligned with business goals and regulations Leading and developing the cyber security operations team Overseeing threat monitoring, incident response, and vulnerabilitymanagement Managing compliance with frameworks such as Cyber Essentials, NIST, ISO27001, GDPR, and GovAssure Acting as the primary point of contact for cyber matters internally and externally, including … regulators and industry forums Representing Cyber Security at board committees and senior management meetings Supporting bid and tender processes, providing risk-based advice and competitive responses About You We’re looking for an experienced cyber security leader with a blend of strategic vision and operational expertise. You should bring: Proven experience defining and executing cyber security strategy at a … senior level Strong knowledge of governance, risk, compliance, and regulatory frameworks Leadership experience managing cyber security operations teams Excellent stakeholder management skills, including board-level engagement The ability to represent the organisation externally with authority and credibility Benefits Competitive salary and benefits package Hybrid/flexible working arrangements Generous annual leave and pension Inclusive, collaborative culture with senior-level More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
ensuring mitigation plans are in place. Support the development and maintenance of security policies and standards. Assist with third-party security reviews and supplier risk management. Provide oversight of vulnerability assessments. Conduct architecture reviews for new systems and services. Evaluate technical controls and recommend improvements. Support the rollout of new security tools and technologies. Provide input into incident management and security metrics reporting. About You: 2+ years' experience in an security role. Strong understanding of risk assessment methodologies. Knowledge of frameworks such as ISO 27001. Experience with vulnerabilitymanagement and technical controls. Excellent problem-solving skills with strong attention to detail. Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is More ❯
ensuring mitigation plans are in place. Support the development and maintenance of security policies and standards. Assist with third-party security reviews and supplier risk management. Provide oversight of vulnerability assessments. Conduct architecture reviews for new systems and services. Evaluate technical controls and recommend improvements. Support the rollout of new security tools and technologies. Provide input into incident management and security metrics reporting. About You: 2+ years' experience in an security role. Strong understanding of risk assessment methodologies. Knowledge of frameworks such as ISO 27001. Experience with vulnerabilitymanagement and technical controls. Excellent problem-solving skills with strong attention to detail. Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is More ❯
ensuring mitigation plans are in place.· Support the development and maintenance of security policies and standards.· Assist with third-party security reviews and supplier risk management.· Provide oversight of vulnerability assessments.· Conduct architecture reviews for new systems and services.· Evaluate technical controls and recommend improvements.· Support the rollout of new security tools and technologies.· Provide input into incident management and security metrics reporting. About You: · 2+ years' experience in an security role.· Strong understanding of risk assessment methodologies.· Knowledge of frameworks such as ISO 27001.· Experience with vulnerabilitymanagement and technical controls.· Excellent problem-solving skills with strong attention to detail.· Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is More ❯
threat detection, incident response, and security improvements, working closely with teams across the business to maintain compliance and best practice. What you'll do: Lead threat detection, incident response & vulnerabilitymanagement Strengthen cyber security posture across cloud, infrastructure & applications Advise development teams on security best practice (SDLC) Maintain ISO 27001 & Cyber Essentials Plus standards Mentor junior analysts & develop More ❯
Employment Type: Permanent
Salary: £45000 - £50000/annum discretionary bonus and more
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
role where youll play a key part in strengthening the organisations cyber defence posture by collecting, analysing, and disseminating actionable intelligence. Youll work closely with incident response, security operations, vulnerabilitymanagement, and leadership teams to anticipate threats, mitigate risks, and improve resilience. Key Responsibilities: Collect and analyse intelligence to address high-priority security requirements. Produce and share actionable More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Stackstudio Digital Ltd
to): Microsoft Defender for Endpoint Microsoft Defender for O365 Microsoft Defender for Identity Microsoft 365 Defender Microsoft Cloud App Security Good knowledge around Endpoint Detection and Response (EDR), Threat & VulnerabilityManagement (TVM), Attack Surface Reduction (ASR), and Auto Investigation and Remediation (AIR). Experience with Symantec Endpoint Protection (SEPM). Experience in McAfee/Windows Defender Antivirus Policy More ❯
s ecurity controls mapping and c ompliance checking automation MoD Cyber Operations: SOC tool evaluation support, SIEM use case development, Metrics and reporting frameworks, and Technology integration assessment. Cyber Vulnerability Investigations Identity & Access: IAM architecture reviews, p rivileged access solutions, authentication technology assessment, and Zero Trust implementation planning OT Security OT Risk Assessment/Assurance and OT VulnerabilityManagement Key Strengths Detail-oriented with a strong focus on quality Well-organised and committed to developing customer service skills Enthusiastic about working in a team environment while developing individual capabilities 25 days of Annual leave + an option to purchase more through our Flexible Benefits Flex benefits system - exciting opportunity to choose your own benefits Pension - matching More ❯
Bletchley, Buckinghamshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
background in delivery Security Assurance support, with the following skills and experience: Experience of producing Secure-By-Design assessments (Risk Assessment Papers, Risk Treatment Plan, Risk Business Case & Security Management Plan). Experience of implementing vulnerabilitymanagement processes. Experience of security assurance and the measurement of controls. Experience in risk and threat modelling within a high-threat More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
SUMMER-BROWNING ASSOCIATES LIMITED
background in delivery Security Assurance support, with the following skills and experience: Experience of producing Secure-By-Design assessments (Risk Assessment Papers, Risk Treatment Plan, Risk Business Case & Security Management Plan). Experience of implementing vulnerabilitymanagement processes. Experience of security assurance and the measurement of controls. Experience in risk and threat modelling within a high-threat More ❯