actions as needed. Expert Coordination: Provide expert advice and coordinate on IM&T network and systems to solve complex business issues and maintain service continuity during disruptions. Daily Systems Management: Oversee the day-to-day management, support, and administration of the IM&T infrastructure, ensuring services meet SLAs. System Optimisation: Develop & implement system processes to enhance infrastructure performance. … Team Management: Coordinate additional technical support for issues that cannot be resolved within the team, including liaising with third-party suppliers. Plan and recommend enhancements to improve staff capacity and support processes. About us At NHS Resolution, we operate as an arms-length body under the Department of Health and Social Care. Our expertise lies in claims management … specialist experience and training. Certifications: Azure Fundamentals, Azure Administrator Associate, Microsoft 365 Fundamentals, Windows Server Hybrid Administrator Associate, or VMWare Certified Technical Associate or Professional, Prince 2. IT Systems Management: Experience acting as a single point of contact for a broad range of technologies across Infrastructure, Networking, and Cloud. Ensure the uptime of cloud-based systems, Servers, and web More ❯
prioritise tasks as part of the IT team Previous 1st and 2nd Line support experience Problem solver with the ability to generate new ideas and bring them to the management team Essential Skills/Knowledge Good understanding of IT & network security best practices Able to identify and escalate potential security threats in line with department procedures Working knowledge of … patch and vulnerabilitymanagement Excellent support experience with Windows 10 and above Windows Server (2016 and above) administration and maintenance Active Directory and group policy experience Experience supporting IT hardware including Servers, Desktops, Laptops, etc. Knowledge of network communication protocols such as TCP/IP, DNS & DHCP Experience working with WAN, LAN, and wireless environments Strong technical and … V & Failover Cluster environments Endpoint protection tools, firewalls, antivirus/SIEM/EDR solutions Knowledge of SAN technologies SQL Server & T-SQL understanding Linux server administration Experience with resort management tools Knowledge of Google Workspace environment Day-to-day duties Lead a team of on-site support technicians, serve as an escalation point for technical support, and work closely More ❯
via our website Role Overview We're looking for a pragmatic, risk focussed Information Security Manager to work within Nest and maintain our ISO 27001 certified corporation Information Security Management System (ISMS). We sit in the second line of defence and advise the business on security risks, incidents, audits, assurance and the implementation and monitoring of security controls … that protects Nest. You'll have a solid background in information security management systems, technology and love communicating technical concepts to non-technical people. Please note the minimum criteria for this role is: Practical experience of operating certified ISMS using ISO 27001/2, NIST CSF and other security standards in the design and management of information security … to audit and evidence compliance with security policies, standards etc. Understanding and experience of various Information Security domains including Security Architecture, Information Security Governance, Network Security, Data Protection, Risk Management, Identity & Access Management, VulnerabilityManagement, Anti-Malware, Mobile Device Management and Cloud Security We are open to discussing working patterns. We welcome all internal applicants More ❯
is ready to join our mission in creating a future! Our Cybersecurity Product Team is seeking an energetic, growth-oriented Senior Product Manager for Acronis RMM (Remote Monitoring and Management), a solution encompassing endpoint management, network monitoring, M365 security posture, SaaS security posture, and Center for Internet Security (CIS) compliance. As a key member of the product management … understanding of international regulatory compliance for MSPs is highly desirable. WHAT YOU'LL DO Shape Product Strategy : Assist in defining the vision and strategy for Acronis RMM, including endpoint management, network monitoring, M365 security posture, SaaS security posture, and compliance management, aligning with business goals and market trends. Engage Stakeholders : Collaborate with MSPs, customers, and internal teams to … performance and guide product iterations. Present insights and updates to stakeholders. Be a Product Advocate : Promote product features and benefits to clients and internal teams. WHAT YOU BRING Product Management Experience : 3+ years in product management, focusing on security, compliance, or IT governance tools, with a proven ability to identify opportunities and deliver impactful products. Expertise in Development More ❯
Role Overview As a Senior Network Engineer, you will be responsible for the design, implementation, management, and optimization of customer network environments, with a strong focus on network security and high availability. You will work closely with international teams to support operations across Europe, with regular travel to our European headquarters in Vienna, Austria. The ideal candidate will bring … manage firewalls (Palo Alto, Cisco), routers and switches (HPE, Cisco). Support and maintain Retail WAN networks using MPLS technology. Work closely with Security Operations (SecOps) team to ensure vulnerabilitymanagement is maintained. Provide technical leadership in network-related projects, including capacity planning, upgrades, and security enhancements. Monitor network performance, troubleshoot issues, and implement proactive solutions to minimize More ❯
in collaboration with developers, DevSecOps engineers, ensuring that security is seamlessly integrated into our CI/CD pipelines and all layers of infrastructure. Additionally, you will supervise security tool management and ensure cyber resiliency for consumer applications. A deep understanding of Google Cloud Security, Application Security, API security, and customer security systems is crucial. Key Responsibilities: Design and Implement … engaged and actively adopting industry-standard security designs Enforce Security Best Practices: Build and enforce security best practices across Google Cloud Platform (GCP) environments, ensuring robust identity and access management (IAM), network security, and encryption, in compliance with industry standards. Integrate Application Security: Drive the integration of application security practices, including secure coding and vulnerabilitymanagement, throughout … tools and processes to secure application development. Deep understanding of application security, including secure coding practices, OWASP Top 10, and API security standards. Knowledge of Customer Identity and Access Management (CIAM) solutions and API security frameworks. Knowledge of one or more programming languages with the ability to review and implement secure code. Strong understanding of security automation, orchestration, and More ❯
WiFi deployments (802.1X/Certificate-based) as well as guest and BYOD access requirements Familiar with firewall configuration fundamentals and advanced threat hunting Experience with security tools and general vulnerabilitymanagement, both at the perimeter and client Experience of backup methodologies and management Produce documentation for end users and the support desk IT Helpdesk Experience Bonus Skills More ❯
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics … and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerabilitymanagement, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented with the ability to multi-task and prioritize efforts - Ability to express More ❯
write automations in Python, Java, or Typescript Ability to write secure-by-default Terraform for cloud deployments Solid understanding of cloud and application security principles Knowledge of network protocols, vulnerabilitymanagement, and creation of Incident Response programs Willingness to learn and adapt to new security challenges and technologies Relevant certifications such as AWS Certified Security, GIAC GC*, ISC2 More ❯
write automations in Python, Java, or Typescript Ability to write secure-by-default Terraform for cloud deployments Solid understanding of cloud and application security principles Knowledge of network protocols, vulnerabilitymanagement, and creation of Incident Response programs Willingness to learn and adapt to new security challenges and technologies Relevant certifications such as AWS Certified Security, GIAC GC*, ISC2 More ❯
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics … and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerabilitymanagement, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented with the ability to multi-task and prioritize efforts - Ability to express More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Matchtech
concept to maintenance-ensuring alignment with customer and regulatory requirements. Key Responsibilities: Lead the definition, implementation, and governance of product security measures across the entire system lifecycle. Develop Security Management Plans, risk assessments, and mitigation strategies. Define and review security requirements for product teams. Support system accreditation, liaising with security accreditors and assurance teams. Prepare security documentation including Protection … Profiles, Security Targets, and TEMPEST Control Plans. Assist with platform lockdown, penetration testing, and vulnerability management. Lead incident response efforts and support product security training. Skills & Experience: Background in securing defence or commercial systems. Degree in engineering, computer science, or related field. Certified security professional (e.g. CISSP, NCSC Certified Professional). Familiar with UK/NATO IA standards (ISO More ❯
deployments. Provide technical support with risk assessments on PHI, and steering improvements to our environment in line with common standards such as NIST. Support External Penetration Testing and application vulnerability efforts, delivering assessments and prioritizing remediation activities across the organization. Be across Threat Intelligence relevant to our industry and geographic regions, and translating that to real world defenses for … Suite, Kali, Metasploit and such Scripting including the use of python, Powershell, bash or Javascript Securing networks, hosts, web applications and cloud native deployments Working with toolsets such as: vulnerabilitymanagement, firewalls, SIEM, PAM, IDS/IPS, EDR/XDR, WAF Working with code security controls such as SAST/DAST/IAST/RASP You should also More ❯
detections, SIEM rules, or EDR Significant experience with standard incident response processes Expertise in a broad range of information technologies, such as public cloud infrastructure (AWS, GCP), authentication systems, vulnerabilitymanagement solutions, network infrastructure, etc. Experience in dissecting attacker methodologies and techniques Comprehensive understanding of product and infrastructure logs from a security perspective Experience building and delivering projects More ❯
and automation in one or more of the following areas: Incident Response Email Security Data Protection/Governance Cybersecurity threat detection, monitoring, and reporting Cyber Intelligence and Threat Hunting VulnerabilityManagement Experience in Google Security Operations. Experience analyzing attack vectors, current threats, and security remediation strategies. Strong understanding of networking (including the OSI Model, TCP/IP, DNS More ❯
Hunting and Threat Intelligence (MITRE ATT&CK) Penetration Testing Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) VulnerabilityManagement (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Programming (Python, or other languages) What you can expect from us We More ❯
detections, SIEM rules, or EDR Significant experience with standard incident response processes Expertise in a broad range of information technologies, such as public cloud infrastructure (AWS,GCP), authentication systems, vulnerabilitymanagement solutions, network infrastructure, etc. Someone that has contributed to the development of detection and alerting pipelines Experience in dissecting attacker methodologies and techniques Comprehensive understanding of product More ❯
NIST, IPCI-DSS, ISO27001, ISO27701, ISO42001, NIST 800-53 Experience in internal enterprise or external customer-facing environment as a security technical lead Experience in Security operations such as vulnerabilitymanagement, security incident response, and large-scale compliance implementations. PREFERRED QUALIFICATIONS Deep experience in Cloud Security architecture design, build, deploy and maintenance Deep experience implementing and managing compliance More ❯
Bath, Somerset, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Infrastructure Security Analyst, SCCM, Vulnerability, Patch management, Qualys/Nessus Our client, a leading private sector business based in Bath, is looking to hire contractor with a background in infrastructure and related security. The successful candidate will be responsible for ensuring security and integrity for our clients IT infrastructure, taking responsibility for patching and vulnerability remediation for … patches to Windows servers to address vulnerabilities, ensuring compliance with security policies. Manage patching windows and downtime coordination with various business units to minimize disruption during updates. Monitor patch management systems to ensure all systems are up to date and protected from security threats. Server hardening to Windows systems, both physical and virtual. Maintain accurate documentation of remediation activities … incident response by applying emergency patches and remediations Contribute to disaster recovery and business continuity plans Skills and experience required: - Windows server including patching processes Server/security hardening. Vulnerabilitymanagement tools e.g. Nessus, Qualys, for conducting vulnerability assessments Hands-on experience in patch management systems - SCCM, WSUS, or Azure Update Management - for deploying patches More ❯
Surrey - 2 days per week with incorporated flexibility Currently support the x2 Directors we have onboarded for a global professional services brand onboard a Cloud Security Analyst within there Vulnerability & SecOps team (Azure). Skills needed: - Experience of working in enterprise/complex environment; they have 1000's of VM's, active subscriptions, tenants, etc. - Proficiency with Microsoft Security … suite products, including Microsoft Defender for Cloud, Sentinel, Azure Update Manager, and Azure cloud services. - Experienced in vulnerabilitymanagement, threat assessment, countermeasure implementation, and patch management within cloud-based infrastructures and services. - Certifications such as CISSP, AZ-500, etc would be favourable but are not essential. Note - this is not a SOC role; the business have an More ❯
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK Head of Security and consulting … Skills & Experience Required: 4+ years of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK Head of Security and consulting … Skills & Experience Required: 2+ years of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom
The Bridge (IT Recruitment) Limited
teaming, and security assessments. Driving the integration of secure development practices and automation within CI/CD workflows. Supporting compliance and audit activities through structured documentation and reporting. Coordinating vulnerabilitymanagement and helping teams meet security SLAs. Collaborating with cross-functional stakeholders to embed security into engineering culture and processes. Owning and improving security tooling roadmaps and BAU … delivery capacity. What we're looking for: Demonstrable experience of effective and efficient cyber security delivery, project management or security engineering. Strong understanding of vulnerabilitymanagement, secure software development, and compliance frameworks (NIST CSF 2.0, GDPR, ISO 27001). Strong examples of cross-functional stakeholder management, being a knowledgeable bridge between technical cyber security teams and … red teaming and security tool implementations. Strong knowledge and experience of integrating security into agile development environments and workflows. Experience with tools like Jira, Confluence, SharePoint or similar project management tools. Preferred certifications: CISA, CISM, Security+, PMP, Prince 2. More ❯
of our growing team, you'll have the opportunity to shape our DevOps culture and practices. You'll collaborate with our engineering team to establish best practices for infrastructure management, security protocols, and deployment strategies. Your expertise in startup environments and medical technology will be crucial in building scalable, compliant solutions that support our rapid growth while maintaining the … maintain security controls and monitoring systems aligned with ISO27001 requirements Build and maintain CI/CD pipelines with integrated security testing and compliance checks Implement automated security scanning and vulnerabilitymanagement processes Develop and maintain disaster recovery and backup solutions for critical systems Configure and manage secure cloud environments in Azure, focusing on Web Apps and Functions Implement … of cloud security best practices and implementing Zero Trust architecture Experience with healthcare compliance requirements (ISO27001, ISO13485, HIPAA) and security controls Proven track record implementing automated security testing and vulnerabilitymanagement Strong knowledge of monitoring and observability tools (Azure Monitor, Application Insights) Experience implementing secure networking and identity management solutions in Azure Strong communication skills with ability More ❯
of our growing team, you'll have the opportunity to shape our DevOps culture and practices. You'll collaborate with our engineering team to establish best practices for infrastructure management, security protocols, and deployment strategies. Your expertise in startup environments and medical technology will be crucial in building scalable, compliant solutions that support our rapid growth while maintaining the … maintain security controls and monitoring systems aligned with ISO27001 requirements Build and maintain CI/CD pipelines with integrated security testing and compliance checks Implement automated security scanning and vulnerabilitymanagement processes Develop and maintain disaster recovery and backup solutions for critical systems Configure and manage secure cloud environments in Azure, focusing on Web Apps and Functions Implement … of cloud security best practices and implementing Zero Trust architecture Experience with healthcare compliance requirements (ISO27001, ISO13485, HIPAA) and security controls Proven track record implementing automated security testing and vulnerabilitymanagement Strong knowledge of monitoring and observability tools (Azure Monitor, Application Insights) Experience implementing secure networking and identity management solutions in Azure Strong communication skills with ability More ❯