processes Support the agenda for our cloud first strategy and ensure any cloud solutions meet our security aspirations and requirements Take responsibility for incident management and lead our response to cyber security events, incidents and potential breaches Ensure our suppliers adequately monitor the IT estate for threats and alerts … technical area or equivalent industry experience Security domain specific experience showing progression through a number of roles with increasing responsibilities Strong technical leadership, stakeholder management and communication skills Experience working in a public body, particularly a local authority would be advantageous Experience of working through matrix management of … multi-disciplinary teams in complex infrastructure environments A strong technical background across Networks, Security, Firewall, VulnerabilityManagement, SIEM and EDR technologies Experience with cyber security concepts, such as Threat Modelling, Incident Response, Penetration Testing (external/internal) Advanced knowledge of cloud products and services e.g. Azure, Microsoft More ❯
Stevenage, Hertfordshire, South East, United Kingdom
Stevenage Borough Council
and deploy innovative ICT solutions in response to evolving business demands, contributing to organizational growth and resilience. Conduct regular security assessments, cyber risk assessments, vulnerability scans, and penetration tests to identify potential weaknesses and risks. Monitor network traffic for unusual activity and respond promptly to security incidents and breaches. … best practices and regulatory requirements, such as CAF, NIST, ISO27001. Key Skills Required: Knowledge of Fortigate Security Stack including Firewalls, FortiAnalyzer, FortiManager. Knowledge of vulnerabilitymanagement platforms (Tenable/Nessus/Qualys). Knowledge of threat intelligence, risk management, and cyber incident response frameworks. In-depth knowledge More ❯
companies that are Britain's economic engine - ambitious, entrepreneurially-spirited and high growth businesses that fuel the economy - and directly advise the owners and management teams that lead them. We'll broaden your horizons To ensure our services and applications are fit for the modern market, our IT team … join our team. You will have a strong background in software development, security, and operations. This role is required to support the Digital Product Management team in embedding security requirements and best practices into new Digital Products and Services. You will work closely with the Digital Product Management … etc. Collaborate with development teams to integrate security best practices into the secure software development lifecycle (SDLC) and ensure products are built securely Oversee vulnerabilitymanagement and remediation efforts, including leading responses to pen test findings and security assessments Experience conducting risk assessments and threat modelling for software More ❯
Strong troubleshooting abilities in systems, networking, and cloud environments Proven hands-on experience with tools like PAM, EDR, CASB, SIEM, DLP, email filtering , and vulnerabilitymanagement Proficient in cloud services , especially in environments using virtual machines, identity management, web apps , and networking components (e.g., virtual networks, security More ❯
real-world operations. You’ll be responsible for overseeing the delivery and integration of key security services — including penetration testing, threat modelling, logging, and vulnerability scanning — into enterprise platforms and workflows. You’ll work cross-functionally to align technical services with business and risk priorities, helping to unblock delivery … least 3 years of experience in a similar service delivery or cyber consultancy role Deep understanding of enterprise security services: Pen testing, threat modelling, vulnerabilitymanagement, logging & monitoring, incident response Strong communication and stakeholder engagement skills Excellent documentation and governance capability CISM or CISSP certification Degree in Computer … a related subject Full right to work in the UK (no sponsorship provided) Nice to Have: Cloud security certifications (AWS, Azure, or GCP) Service management or compliance certifications (e.g. ITIL, ISO27001) 🤝 What They Value Clear, respectful communication with colleagues and clients Self-motivation and accountability in remote-first roles More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead … clients and internal teams. Key Responsibilities Design, implement, and maintain security solutions to protect networks, applications, and data. Conduct security assessments, penetration testing, and vulnerability management. Monitor and respond to security incidents, ensuring swift mitigation and resolution. Develop and enforce security policies, procedures, and best practices. Perform security audits … regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerabilitymanagement, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting languages More ❯
risks. Key Responsibilities Develop and implement security strategy : aligning security plans with business goals. Own our security program: building and maintaining an information security management system. Promote security culture : working closely with IT to educate and enable teams across Attest. Support with compliance : partner with our Legal team to … framework . Hands-on expertise in network security, application security, IAM, and incident response . Proficiency with SIEM, IDS/IPS, WAFs, EDR, and vulnerabilitymanagement tools . Understanding of secure coding practices and ability to collaborate with engineering teams. Strong communication skills to articulate security risks effectively More ❯
investigates possible security exceptions Updating, maintaining and documenting security controls Participating in security operations support - Following up on information security related incidents Performing Patch & VulnerabilityManagement (Qualys) Identifying and advising on external risk (Bitsight) Participating in projects Consistently implementing security solutions at the business unit level Testing new More ❯
government programmes. The role will involve: Designing and implementing secure architectures across complex environments Leading technical teams and advising on security controls and risk management Shaping cloud and DevSecOps security strategies (AWS/Azure/GCP) Supporting accreditation and compliance with security frameworks (ISO 27001, NIST, JSP 440, Secure … Architecture role Knowledge of frameworks such as ISO 27001, NIST, CIS Familiarity with TOGAF/SABSA methodology Understanding of SIEM, firewalls, IDS/IPS, vulnerabilitymanagement Cloud security expertise – AWS, Azure, or Google Cloud DevSecOps knowledge, CI/CD, automation tooling Background in defence, government or critical national More ❯
government programmes. The role will involve: Designing and implementing secure architectures across complex environments Leading technical teams and advising on security controls and risk management Shaping cloud and DevSecOps security strategies (AWS/Azure/GCP) Supporting accreditation and compliance with security frameworks (ISO 27001, NIST, JSP 440, Secure … Architecture role Knowledge of frameworks such as ISO 27001, NIST, CIS Familiarity with TOGAF/SABSA methodology Understanding of SIEM, firewalls, IDS/IPS, vulnerabilitymanagement Cloud security expertise – AWS, Azure, or Google Cloud DevSecOps knowledge, CI/CD, automation tooling Background in defence, government or critical national More ❯
findings) while maintaining the confidence of the client through clear communication and good project management. Provide flexible and responsive support as and when crisis management support is required and can be provided. Business Development Developing proposals for future client work. Project scoping and planning, to support pricing. Contributing to … but is not limited to: Security engineering, designing IT and security architecture, implementing IAM/PAM technologies, building robust backup and recovery capabilities, delivering vulnerabilitymanagement solutions, implementing data loss prevention controls. Experience in delivering cyber security risk assessments against industry standards (NIST CSF, 800-53 and ISO27001 More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Net Talent
in-depth technical support for the identification, investigation, and resolution of security vulnerabilities and threats Work with internal support teams to advise and guide vulnerability remediation , improving organisational resilience Collaborate with the Group and the Information Security Leader to support key security processes and contribute to agreed security objectives … timely response, mitigation, and lessons learned 🧠 Skills & Experience Required Strong background in technical information security, with a focus on security controls, system hardening, and vulnerabilitymanagement Demonstrated experience managing and operating enterprise-grade security tools and platforms (e.g., SIEM, DLP, endpoint protection, identity & access management) Familiarity with More ❯
architectures (e.g. microservice, distributed, monolithic) Infrastructure technologies such as load balancers, firewalls/WAFs, routers/routing, directory services, DNS Development tooling: Development work management (Azure DevOps Boards) Source control management (Azure DevOps, TFS, Git) Deployment (Azure DevOps Pipelines, Octopus Deploy) Code quality and vulnerabilitymanagement (SonarQube, Snyk, Qualys) Containerisation (Docker, Kubernetes) Infrastructure as code (Terraform) Development languages, frameworks and platforms: Web content management systems (Sitefinity, WordPress) C#/.NET Framework/.NET Core JavaScript & JavaScript frameworks Structured Query Language (SQL) PowerShell Web protocols and internet-based technologies - HTTP, XML, JSON, REST, JavaScript, LTI … TLS, API management Testing tools such as Selenium and JMeter Establishing and refining test strategies and methods across the development lifecycle, including: unit, acceptance, regression, security, automation, functional, and performance testing Proven track record developing or working on the following types of applications: Ecommerce and portal websites Enterprise resource More ❯
technologies to strengthen the organisation's defenses. Essential functions of the job: SOC operations: perform incident triaging, threat detection, and response activities. SIEM & EDR management: advance and configure SIEM and EDR systems to optimise threat detection and response in Azure environments. Incident response: investigate and mitigate security incidents, applying … delivering innovative security solutions. Experience required: Relevant certifications in public cloud security and experience managing Azure cloud infrastructure. Proven expertise in security testing, IAM, vulnerabilitymanagement, and SIEM configuration. Strong grasp of networking fundamentals, including DNS, WAF, and ingress, paired with experience in CPSM. Familiarity with GIT/ More ❯
reigate, south east england, United Kingdom Hybrid / WFH Options
Client Server
automation, IaC and security by design. There's a broad range of responsibilities including handling requests related to system administration, operations governance, Azure subscription management (they have 85 subscriptions), threat/vulnerabilitymanagement and incident response, you'll collaborate with engineering teams to evaluate and identify optimal … have experience of designing, supporting, securing and building Azure cloud solutions; ideally with AZ-104 certification although it's not necessary You understand subscription management structures and have experience of managing Azure subscriptions You have a good knowledge of DevOps and IaC concepts You're familiar with cloud based … security (e.g. ISO27001, NIST, CIS, OWASP, SOC2) and Identity and Access Management (IAM) within Azure You're familiar with ARM templates and/or Pulumi Ideally you will have automation and scripting (PowerShell or similar) skills You're collaborative with great communication skills What's in it for you More ❯
A Career with Point72's Global Information Security Team Our Global Information Security team's mission is to ensure the development, implementation, and management of a comprehensive program that effectively protects the confidentiality, integrity, and availability of Point72 information assets. Our team is comprised of security professionals with expertise … metal, VMware and public cloud (AWS, Azure, GCP) Collaborate with Endpoint Engineering teams to secure Windows endpoints using solutions including SCCM and InTune Configuration management for Windows Firewall and ASR rules across our endpoint estate Help to monitor and mature our Windows patching and vulnerabilitymanagement program … audits of Windows infrastructure Monitor and respond to security incidents related to Windows infrastructure Collaborate with infrastructure and security teams on identity and access management initiatives What's required Bachelor's degree in Computer Science, Information Security, or related field 7+ years of experience in Windows Server administration and More ❯
technologies (firewalls, IDS/IPS, SIEM, etc.). Experience with security tools such as SIEM/SOAR platforms, endpoint detection and response (EDR) solutions, vulnerabilitymanagement, detection and response/remediation (VMDR) solutions and threat intelligence platforms. Knowledge of security standards and frameworks (e.g., NIST, CIS Controls, ISO More ❯
Team collaborates closely with cross-functional teams across the Information Security organization and external partners. We lead key initiatives, including security monitoring, incident response, vulnerabilitymanagement, and threat intelligence, all aimed at strengthening our security posture and ensuring resilience against emerging threats. About the role & what you'll More ❯
Glasgow, Renfrewshire, United Kingdom Hybrid / WFH Options
Hymans Robertson LLP
in advisory capacity, to external audits and due diligence questionnaires. Key Technologies: Strong practical knowledge of M365 stack from a security perspective (Defender, Azure) VulnerabilityManagement Web Application Filtering DLP Cloudflare Secure File Transfer Firewalls Remote Access/VPN PKI Infrastructure DNS Email Gateways Security Audits ISO27001 Azure More ❯
for this role. We're on the hunt for a motivated, engaged Security Operations Analyst to support, maintain and improve/contribute to the management of real time security operations, including real time analysis and ongoing security management across Vix's application suite. This opportunity will suit someone … judgment when working with sensitive information Experience with application/device security monitoring (i.e., Firewalls, IDS/IPS, Anti-Virus) Experience with SIEM tools & VulnerabilityManagement (AlienVault, Nessus, Qualys) Demonstrated ability to work as part of a team to deliver project outcomes within specified parameters including timeframes and More ❯
largest organisations, our mission is to enable organisations to continuously understand how an attacker would successfully compromise their business - with cutting-edge Attack Surface Management and Continuous Automated Red Teaming technology. watchTowr was named within Gartner's Emerging Tech Impact Radar report in 2023, in Gartner's Innovation Impact … going steps further where relevant due to watchTowr's unique threat model. You will oversee security monitoring, threat analysis, threat hunting, penetration testing, and vulnerabilitymanagement to align cyber risk management with the company's risk strategy. You will support the watchTowr Commercial team to respond to More ❯
deploy and manage cloud environments and integrate technologies that are part of customer stacks, to accurately replicate and resolve customer issues Knowledge of SIEM, vulnerabilitymanagement tools, firewalls, malware, exploits, operating system structure and behavior Strong consulting and project management skills, with validated results working as a More ❯
deploy and manage cloud environments and integrate technologies that are part of customer stacks, to accurately replicate and resolve customer issues Knowledge of SIEM, vulnerabilitymanagement tools, firewalls, malware, exploits, operating system structure and behavior Strong consulting and project management skills, with validated results working as a More ❯
Reigate, Surrey, United Kingdom Hybrid / WFH Options
Willis Towers Watson
Runbooks and SQL Servers (IaaS and PaaS) Day to day handling of requests, covering system administration, operations governance, Azure B2B Tenant issues, threat/vulnerabilitymanagement and incident response Maintain the Customised PowerShell functions/modules Administrate the Pipelines, Repo, Test Plan including ADO Project Management Collaborate … DevOps concept in a cloud environment Experience of Host, Network and Permitter Security design and implementation. Have a working knowledge of Identify and Access Management within Azure. Should have sound knowledge on multi-Tenant environments along with Azure B2B and Entra Tenants. Familiar with Pulumi, ARM templates or other More ❯
Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Frontier Resourcing
by embedding robust security controls throughout the development lifecycle, identifying and mitigating risks, and ensuring compliance with defence-grade standards. Key Responsibilities Risk Assessments & VulnerabilityManagement Conduct comprehensive security risk assessments at each product phase (design, implementation, deployment). Identify vulnerabilities in architectures, codebases, and configurations; drive remediation …/53, JSP 440/604, Def Stan 05-series). Lead the creation and maintenance of security documentation (RMADS, Security Assurance Documents, Security Management Plans). Testing & Assurance Design and execute penetration tests and automated vulnerability scans; validate fixes. Oversee third-party security assessments as required. Continuous … across teams. Qualifications & Experience Proven experience (5+ years) in product or application security within defence, government, or security-cleared environments. Deep knowledge of risk management frameworks (ISO 27001/2/5/31000, NIST 800-series) and Defence Standards (JSPs, Def Stan 05-138/139). Hands More ❯