in large-scale Financial Services organisations. Proven expertise in designing and implementing secure architectures within Azure public cloud solutions. Strong knowledge of securing Azure infrastructure, including identity and access management, network security, and data protection. Comprehensive understanding of security architecture frameworks and best practices (e.g., SABSA, TOGAF). Hands-on experience with security tools and processes, such as SIEM … vulnerabilitymanagement, and incident response within Azure environments. The ability to engage and communicate effectively with senior security stakeholders and technical security departments. Capability to engage with finance stakeholders to analyse and map business needs and processes. Experience in leading the development and implementation of business applications and financial solutions. A solid understanding of security architecture reviews and More ❯
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, VulnerabilityManagement, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, VulnerabilityManagement, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Holland & Barrett International Limited
experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python, JavaScript … GoLang, Terraform, CloudFormation (AWS), and AWS CDK. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Desired: Ability to work independently, take initiative, and maintain a keen attention to detail, ensuring high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. Why More ❯
no umbrella company admin fees) Requirements Extensive experience as an Enterprise or Security Architect in large-scale financial services organisationsDeep expertise in Azure security architecture, including identity and access management, network security, encryption, and data protectionStrong knowledge of secure application design and cloud migration (re-architect, re-platform, and re-factor models)Comprehensive understanding of enterprise security architecture frameworks … and best practices (e.g., SABSA, TOGAF)Hands-on experience with enterprise security controls and tooling - SIEM, vulnerabilitymanagement, incident response, IAM solutionsProven experience embedding security into architecture governance, SDLC, and acquisition/delivery processesSkilled in stakeholder engagement at senior levels, including finance and technology leadershipExperience advising, defining, and reviewing enterprise security architecture in cloud transformation programmesComfortable contributing to More ❯
Epsom, Surrey, United Kingdom Hybrid / WFH Options
Lloyd Recruitment - Epsom
the business. Key Responsibilities: Log, prioritise, and resolve technical issues and requests Deliver excellent customer service across multiple channels Escalate and manage major incidents appropriately Support change and problem management processes Assist with projects and improve internal tools like Power Apps Maintain accurate documentation and asset records Participate in shift patterns, including some weekend/on-call work What … focus Ability to manage competing priorities in a fast-paced environment ITIL knowledge and experience working to SLAs Nice to Have: Experience in the financial services sector Familiarity with vulnerabilitymanagement tools (e.g., Qualys) Knowledge of remote support tools and collaboration platforms Experience with Power Apps and automating service processes Refer a friend and earn a retail voucher More ❯
DSS and secure practices Scripting and automation skills (Bash, Python, Ansible) Strong troubleshooting and documentation abilities Preferred Skills RHCSA or higher certification CCNA certification Experience with monitoring and config management tools Familiarity with Git and CI/CD pipelines Knowledge of virtualization (VMware, KVM) Exposure to security hardening and vulnerabilitymanagement Interested? Apply today or contact Chelsea More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Group Policy, M365; Azure/Entra/Intune exposure VMware vSphere experience (VxRail a plus) Hands-on networking and security: LAN/WAN/Wi-Fi, VPN/firewalls, vulnerabilitymanagement and patching Comfortable with incident/change processes, writing clear docs and pitching in for occasional out-of-hours cover Nice to have: Juniper Mist or similar More ❯
Kingston Upon Hull, East Riding of Yorkshire, United Kingdom
Principal IT
on the system as and when required Create tickets to record technical issues and solutions, escalating issues to senior team members when necessary Responsible for the ongoing patch and vulnerabilitymanagement of many of the company devices Continually adding to the knowledge database to ensure all technical documentation is fully up to date and relevant Requirements: Proven work More ❯
implement, and maintain information security policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards ISO 27001 & Cyber Essentials.- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage … risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information Security, Computer Science, or a related field. … Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor.- Proven experience in information security management and conducting security audits.- Strong knowledge of information security frameworks and standards.- Excellent analytical and problem-solving skills.- Strong communication and interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX.- Familiarity with security tools and technologies More ❯
implement, and maintain information security policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001).- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage … risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information Security, Computer Science, or a related field. … Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor.- Proven experience in information security management and conducting security audits.- Strong knowledge of information security frameworks and standards.- Excellent analytical and problem-solving skills.- Strong communication and interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX.- Familiarity with security tools and technologies More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
Public Sectors. The Roles Involve: Incident Response : Enhance coordination, assess impact, inform guidance, and develop playbooks. Threat Intelligence : Deliver tailored intelligence, monitorTTPs, and manage tooling (OpenCTI, MISP, sandboxes). VulnerabilityManagement : Identify and triage vulnerabilities, support remediation, and improve disclosure schemes. Requirements : Proven experience in SOC environments and incident response. Deep understanding of threat actors and intelligence platforms. … Expertise in vulnerability scanning and remediation. Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome applications from people of all backgrounds and perspectives. Our success is driven by our people, united by the spirit of partnership to deliver the best resourcing solutions for More ❯
Success organization that supports customer onboarding and implementation projects. Implementation Engineers are instrumental in delivering Nucleus products in the post sales cycle. This technical role is responsible for deploying vulnerabilitymanagement solutions to our rapidly growing customer base. The Nucleus Implementation team is staffed with security architects with software development experience who can manage customer stakeholders to drive … to enhance our post-sales motion Understand how integrations work end to end to be able to clearly articulate complex problems and solutions to less technical stakeholders Design vuln management solution architecture for different asset classes and environment sizes Manage containerization and modern cloud infrastructure Required Qualifications: Cybersecurity concepts (attack vectors, kill chain) Compliance understanding (NIST, ISO, custom policies … Customer/stakeholder engagement (technical project management, consulting) Programming (we use Python, any oop is fine) Configuring & deploying software integrations High capacity to learn quickly Creative problem-solving skills Preferred Qualifications: Security tools or other VM platforms (SIEM, SOAR, IDS) Data ingest pipelines (ETL, automation) Cloud concepts (containerization, PaaS) ServiceNow (configuration, end user experience) Enterprise customer tech integration exposure More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Holland & Barrett International Limited
Requirements: Essential: 5+ years of experience in application security, with at least 3+ years in software development. Strong understanding of application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, and API Security (including authentication and authorization). Proficiency in programming languages such as Python, Java, JavaScript … GoLang, and Rust. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to oversee multiple security projects simultaneously. Desired: Independent, proactive, and detail-oriented, with a commitment to maintaining high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. We support flexibility and productivity of our employees by More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Gloucestershire, South West, United Kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
to Microsoft Defender. Proven AV migration experience in complex environments. Strong knowledge of Microsoft security tools (Defender for Endpoint, O365, Identity, Cloud App Security). Expertise in EDR, Threat & VulnerabilityManagement, Attack Surface Reduction, and Auto Remediation. Experience with Symantec Endpoint Protection and McAfee. Strong Windows (7/8/10, Server 2008-2016) and RHEL Linux knowledge. More ❯
Normanton, West Yorkshire, UK Hybrid / WFH Options
Stott & May Professional Search Limited
to Microsoft Defender. Proven AV migration experience in complex environments. Strong knowledge of Microsoft security tools (Defender for Endpoint, O365, Identity, Cloud App Security). Expertise in EDR, Threat & VulnerabilityManagement, Attack Surface Reduction, and Auto Remediation. Experience with Symantec Endpoint Protection and McAfee. Strong Windows (7/8/10, Server 2008-2016) and RHEL Linux knowledge. More ❯