London, England, United Kingdom Hybrid / WFH Options
Focus on SAP
architecture, integrations, and platform governance while influencing strategic security decisions across the organisation. Key Responsibilities: Lead the architecture and design of ServiceNow SecOps capabilities, including: Security Incident Response (SIR) Vulnerability Response (VR) Threat Intelligence Configuration Compliance Define secure processes and automation across vulnerabilitymanagement and incident response. Integrate ServiceNow SecOps with cybersecurity platforms (SIEM, SOAR, EDR, CMDB … platform adoption and maturity. Key Skills: Proven background as a ServiceNow Architect with strong delivery experience across SecOps and/or IRM. Deep understanding of security operations , incident response, vulnerability lifecycle, and tool integrations. Hands-on expertise with ServiceNow configuration, scripting, workflows, CMDB, Discovery, and integrations (REST/SOAP, MID Server) . Experience supporting organisations with critical infrastructure (energy More ❯
Poole, Dorset, England, United Kingdom Hybrid / WFH Options
Mexa Solutions LTD
week in the office) Scope : Work across IT, application, cloud, and physical security, no siloed remits here Responsibility : Be the go-to person for penetration testing, compliance audits, and vulnerabilitymanagement Environment : Modern SaaS product environment, working alongside DevOps, engineering, and IT Growth : Get stuck into a wide variety of work, with support from leadership and autonomy to … make a real impact What you’ll be doing: Leading vulnerability assessments and coordinating regular penetration testing across systems and products Owning risk remediation actions, from security audits to PCI scans and compliance reporting Working across cloud (AWS), infrastructure, and software environments to ensure security best practices are embedded throughout Supporting the secure design of products and infrastructure, providing … ideally 2-3+ years), ideally across cloud and hybrid environments Strong penetration testing experience with confidence to act on the findings A solid grasp of access controls, identity management, and cloud security (especially AWS) Familiarity with secure software development practices and working alongside dev teams Understanding of key frameworks like ISO 27001, PCI-DSS, and GDPR Bonus points More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Reed
practices. You’ll work closely with IT, development, and project teams to embed security into every stage of the software development lifecycle and drive a risk-based approach to vulnerability management. Key Responsibilities Lead application security initiatives across cloud-native and enterprise environments. Promote secure design principles, threat modelling, and best practices across teams. Own and evolve the technical … vulnerabilitymanagement programme. Implement and support security controls, particularly within Azure cloud environments. Evaluate and deploy best-in-class application security tools. Mentor teams and deliver tailored security awareness programmes. Assist with incident response, security training, and supplier/client security assessments. What We’re Looking For Essential Skills & Experience: Proven experience in application security engineering. Strong knowledge More ❯
facing Security Architecture/Consulting roles, presenting to Senior Stakeholders Experience in the telecommunications sector (ideally on a global scale), working to GSMA standards Advanced Security Architecture & Threat Modeling Vulnerabilitymanagement Penetration testing & exploitation Cloud security (AWS, Azure, GCP) and container security (Docker, Kubernetes) Network security (firewalls, SIEM, IDS/IPS, packet analysis) Secure software development & code review … Incident response, digital forensics, malware analysis Identity & access management (IAM, Zero Trust, SSO/MFA) Security frameworks & compliance (NIST, CIS, SOC2) Interviews: October/November 2025 Start Date: January 2026 How to Apply: Apply to Gary Hargreaves at X4 Technology to learn more about the role or connect with me on LinkedIn to hear about regular job updates available More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Context
are patched and secure. Responsibilities: * Managing and optimising security tools and platforms (SIEM, XDR, IDAM policies etc.) * Monitoring vulnerabilities, investigating incidents and implementing corrective actions * Supporting patching compliance and vulnerability remediation * Ensuring security best practices are applied across networks, applications and systems * Participating in change reviews and advising on improvements to existing setups * Supporting compliance with frameworks such as … ISO 27001, Cyber Essentials Plus and CAF Requirements: * A solid background in IT infrastructure and/or network engineering * Some exposure to, or a growing focus on, cybersecurity and vulnerabilitymanagement * Understanding of network devices, configurations and security principles * Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) * Confidence to identify More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Project People
We’re seeking an experienced Information Security Manager to lead, develop, and continuously improve our Information Security Management System (ISMS) , ensuring compliance with ISO 27001:2022 and protecting the digital infrastructure. In this strategic yet hands-on role, you’ll manage cyber risk , drive security governance , and embed a security-first culture across the organisation. You’ll also act … we’re looking for: Proven experience managing an enterprise ISMS and ISO 27001 audits. Strong knowledge of cyber threats, cloud security (Azure, M365), and GDPR. Hands-on experience in vulnerabilitymanagement, supplier assurance, and incident response. Excellent communication and stakeholder management skills. Benefits: Competitive salary with bonus scheme Very generous holiday allowance Hybrid working – 3 days per More ❯
through our comprehensive suite of cloud-native solutions. With over 100,000 customers across 135 countries, we deliver mission-critical software spanning accountancy and finance, HR and payroll, education management, and business operations. Our impact reaches deep into communities: over 4 million UK families connect with their children’s schools through our education apps, nearly 5 million employees globally … team, comprehensive learning opportunities, and a vibrant technical community committed to creating exceptional solutions that make a real difference in how our customers operate and succeed. Main Responsibilities : Delivery Management (40%) Ensure projects are scoped, prioritised, and delivered on time with clear alignment to business goals and quarterly OKRs Drive predictability, velocity, and quality through effective agile practices and … Provide strategic technical leadership through architectural guidance and critical technical decisions, with selective hands-on contributions Define technical decisions and maintain system health through architectural oversight and technical debt management Establish and drive comprehensive quality culture including TDD/BDD practices, testing standards, automated quality gates, and team code review excellence Define team security standards ensure team compliance governance More ❯
through our comprehensive suite of cloud-native solutions. With over 100,000 customers across 135 countries, we deliver mission-critical software spanning accountancy and finance, HR and payroll, education management, and business operations. Our impact reaches deep into communities: over 4 million UK families connect with their children’s schools through our education apps, nearly 5 million employees globally … team, comprehensive learning opportunities, and a vibrant technical community committed to creating exceptional solutions that make a real difference in how our customers operate and succeed. Main Responsibilities : Delivery Management (40%) Ensure projects are scoped, prioritised, and delivered on time with clear alignment to business goals and quarterly OKRs Drive predictability, velocity, and quality through effective agile practices and … Provide strategic technical leadership through architectural guidance and critical technical decisions, with selective hands-on contributions Define technical decisions and maintain system health through architectural oversight and technical debt management Establish and drive comprehensive quality culture including TDD/BDD practices, testing standards, automated quality gates, and team code review excellence Define team security standards ensure team compliance governance More ❯
Information Security Officer - Risk. - Hybrid - Lancashire £61,500 10.5% bonus 14% pension healthcare plus additional benefits. Information Security Officer with Risk management and risk register experience needed as part of an extremely well-funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As the Information Security Officer for Risk your primary purpose … will be to become a trusted cyber security risk advisor, ensuring the business is compliant against security policy, acting as advisory, collaborating with stakeholders and management to assess risks, review and advise ratings for IT/OT/Physical Cyber risks and support business coordinators in assessing their risk position. As the Information Security Officer for Risk, you will … build strong relationships with business and technology functions as well as 3rd parties offering real world experience of cyber security risk management In this role you will act in an advisory capacity to the business day-to-day basis monitoring cyber security risk, compliance across diverse business functions, supporting business area coordinators. Reviewing risks to ensure they are clear More ❯
Information Security Officer - Risk. - Hybrid - Lancashire £61,500 10.5% bonus 14% pension healthcare plus additional benefits. Information Security Officer with Risk management and risk register experience needed as part of an extremely well-funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As the Information Security Officer for Risk your primary purpose … will be to become a trusted cyber security risk advisor, ensuring the business is compliant against security policy, acting as advisory, collaborating with stakeholders and management to assess risks, review and advise ratings for IT/OT/Physical Cyber risks and support business coordinators in assessing their risk position. As the Information Security Officer for Risk, you will … build strong relationships with business and technology functions as well as 3rd parties offering real world experience of cyber security risk management In this role you will act in an advisory capacity to the business day-to-day basis monitoring cyber security risk, compliance across diverse business functions, supporting business area coordinators. Reviewing risks to ensure they are clear More ❯
to protect customer’s IT networks from cyber attack. Responsibilities : Monitor and analyse Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, and Security Incident and Event Management (SIEM) toolset event logs to identify security attacks and threats for remediation/suppression. Assist in Computer Security Incident Response activities for large organisations as a 1st line security … operational effectiveness and efficiency. Qualifications: Broad experience of technologies including but not limited to; Firewalls, IPS & IDS, Active Directory, Windows Server, Linux, TCP/IP, Networks, AWS, CDN's, Vulnerabilitymanagement and SIEM, DRM. At least basic knowledge the fundamentals of cyber security Security Administration Incident containment, recovery and mitigation Excellent customer service skills Strong analytical and problem More ❯
continuously expanding its global footprint with around 2,500 colleagues in 12 countries, and more than 170 clients in 35 countries. We are an industry-leading provider of wealth management technology and services for financial institutions around the world, including private banks and wealth managers, investment managers, as well as retail and neo banks. Our research led approach and … company professionally in meetings, while maintaining clear boundaries and ensuring discussions remain aligned with agreed project scope and priorities Experience with security tools and technologies such as SIEM (Splunk), vulnerabilitymanagement (Tenable), and PAM Strong understanding of security frameworks and standards (e.g., ISO 27001, NIST), as well as asset management and risk assessment solutions It would be More ❯
Investigate & Respond: Monitor and triage alerts across a range of SIEM, EDR, and XDR platforms. Perform in-depth investigations and escalate critical incidents as needed. Conduct threat hunting and vulnerability analysis activities. Prepare reports and updates on customer security posture. Improve & Evolve: Participate in continuous improvement projects focused on tooling, process efficiency, and SOC coverage. Collaborate with senior analysts … Working knowledge of EDR/XDR tools such as CrowdStrike, SentinelOne, Palo Alto Cortex, or Microsoft Defender. Understanding of incident response frameworks (MITRE ATT&CK preferred). Experience with vulnerabilitymanagement platforms such as Rapid7 or Tenable. Exposure to Cyber Threat Intelligence and its application within SOC workflows. Experience with ticketing systems (ServiceNow, JIRA, Salesforce) and ITIL-aligned More ❯
and external audits. * Oversee incident response, including investigation, containment, and recovery. * Conduct vendor security assessments and review contractual security requirements. * Lead day-to-day security operations, including access control, vulnerabilitymanagement, and endpoint protection. * Build and mentor a new security team while driving organisation-wide security awareness. Key experience:* Extensive experience in information security within regulated financial services. More ❯
measures What you'll bring: Knowledge of frameworks such as NIST CSF, NIST 800-53, and NCSC CAF Strong understanding of networking, cloud security (AWS/Azure), IAM, and vulnerabilitymanagement Familiarity with ISO 27001/27002 and related standards Awareness of modern threats, malware, and security analytics Experience (5+ years) in cyber security roles preferred Desirable certifications More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
Analyse and prioritise incoming security tickets Perform initial investigation and escalation of suspicious activity or confirmed incidents Document incidents, investigation steps, and resolutions in accordance with internal processes Support vulnerabilitymanagement, patching, and threat monitoring activities Assist in maintaining and improving SOC runbooks, playbooks, and standard operating procedures Collaborate with IT teams and other stakeholders to remediate security More ❯
network protocols (TCP/IP) and security practices (IPSec, SSL-VPN, NAT, GRE) Hands-on experience with cloud infrastructure operations and troubleshooting customer tech stacks. Familiarity with SIEM tools, vulnerabilitymanagement, malware analysis, and firewall configurations Ability to communicate complex technical solutions to a wide range of audiences, both technical and non-technical Skilled in Python, JSON, YAML More ❯
network protocols (TCP/IP) and security practices (IPSec, SSL-VPN, NAT, GRE) Hands-on experience with cloud infrastructure operations and troubleshooting customer tech stacks. Familiarity with SIEM tools, vulnerabilitymanagement, malware analysis, and firewall configurations Ability to communicate complex technical solutions to a wide range of audiences, both technical and non-technical Skilled in Python, JSON, YAML More ❯
Hatfield, Hertfordshire, South East, United Kingdom
Affinity Water Limited
ensuring the resilience of OT systems. What you'll be doing: Implement and manage OT security controls, measures, and technologies to protect critical assets and systems. Conduct risk assessments, vulnerabilitymanagement, and security testing. Develop and implement incident response plans and ensure compliance with regulations. Conduct proactive threat hunting and reactive incident response. Provide regular reports on security … industrial control systems (ICS) and SCADA systems. Strong problem-solving skills and attention to detail. Proven experience with OT and IT security technologies, including firewalls, intrusion detection systems (IDS), vulnerability detection, network discovery, log collection systems, and security information and event management (SIEM) solutions. UK Driving Licence. About Us Affinity Water is the UKs largest water-only supplier More ❯
Skills & Experience Proven experience as a ServiceNow Architect , with strong hands-on delivery in SecOps and/or IRM modules . Deep understanding of security operations , incident response , and vulnerabilitymanagement . Expertise in ServiceNow workflows , scripting , CMDB , Discovery , and system integrations (REST/SOAP, MID Server). Experience integrating ServiceNow with cybersecurity tools (e.g., SIEM, EDR, SOAR … . Strong stakeholder management and communication skills. Background supporting critical infrastructure , preferably within the energy or utilities sector . Knowledge of security frameworks and compliance mandates (e.g., NIST, ISO 27001, NIS2). ServiceNow SecOps certification (Certified Implementation Specialist – SecOps or equivalent). Desirable Skills Knowledge of OT/ICS security and industrial communication protocols (e.g., Modbus, DNP3, IEC More ❯
Skills & Experience Proven experience as a ServiceNow Architect , with strong hands-on delivery in SecOps and/or IRM modules . Deep understanding of security operations , incident response , and vulnerabilitymanagement . Expertise in ServiceNow workflows , scripting , CMDB , Discovery , and system integrations (REST/SOAP, MID Server). Experience integrating ServiceNow with cybersecurity tools (e.g., SIEM, EDR, SOAR … . Strong stakeholder management and communication skills. Background supporting critical infrastructure , preferably within the energy or utilities sector . Knowledge of security frameworks and compliance mandates (e.g., NIST, ISO 27001, NIS2). ServiceNow SecOps certification (Certified Implementation Specialist – SecOps or equivalent). Desirable Skills Knowledge of OT/ICS security and industrial communication protocols (e.g., Modbus, DNP3, IEC More ❯
Bromsgrove, Worcestershire, United Kingdom Hybrid / WFH Options
First Choice Recruitment Services
working to protect the company from a range of cyber and security threats. Candidates will need 2/3 years’ experience of working as a Security Analyst, including monitoring vulnerability and threats, risk mitigation and implementation of robust security policies. This role is to be based at the Bromsgrove office but regular travel to Tewkesbury as required. Hybrid working … to contain and resolve threats. Keep incident logs, reports, and tickets updated within incident tracking systems. Assist in threat intelligence gathering and analysis to enhance detection capabilities. Participate in vulnerabilitymanagement activities. Update and oversee the software inventory. Support compliance reporting and audits. Assist in IT service desk activities. Stay updated with emerging cyber threats, attack techniques, and … security trends. Perform any additional duties delegated by the IT Manager to ensure efficient management of the Company. Key skills: Candidates will need recent work history of working in a similar role. Degree Educated would be an advantage A strong understanding of firewalls, intrusion detection systems and other security technologies is essential. Familiar with ethical hacking and penetration testing More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
IO Associates
to solve problems and push boundaries. Progression: As the function expands, you'll have the chance to build your own specialism or sub-function, whether that's automation, exposure management, or advanced threat engineering. What You'll Be Doing Deliver hands-on security engineering and automation projects for enterprise clients. Build custom integrations, playbooks, and scripts to streamline SOC … operations. Optimise SIEM detection logic and vulnerabilitymanagement workflows. Collaborate with technical teams on innovation, labs, and roadmap projects. Act as a trusted consultant - parachuting in, solving problems fast, and moving on to the next challenge. What We're Looking For Background in SOC, Security Engineering, or Automation - ideally customer-facing. Python/PowerShell/REST API scripting More ❯
ensure the products they deliver are secure by design. You'll work closely with developers, architects, and business stakeholders to create an environment where secure coding and proactive risk management come naturally. What you'll be doing You'll play a leading role in driving a security-first culture across agile product teams, defining and delivering a clear application … Working hand-in-hand with developers, you'll weave security seamlessly into the software development lifecycle - from designing controls and integrating testing into CI/CD pipelines to supporting vulnerabilitymanagement and remediation. Acting as the go-to expert for secure design, threat modelling, and compliance, you'll make sure teams have the knowledge, tools, and confidence to More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
ensure the products they deliver are secure by design. You'll work closely with developers, architects, and business stakeholders to create an environment where secure coding and proactive risk management come naturally. What you'll be doing You'll play a leading role in driving a security-first culture across agile product teams, defining and delivering a clear application … Working hand-in-hand with developers, you'll weave security seamlessly into the software development lifecycle - from designing controls and integrating testing into CI/CD pipelines to supporting vulnerabilitymanagement and remediation. Acting as the go-to expert for secure design, threat modelling, and compliance, you'll make sure teams have the knowledge, tools, and confidence to More ❯