Chesterfield, England, United Kingdom Hybrid / WFH Options
Hays
design effective controls. You will be leading the Cyber Security operations function, by providing strategic direction and coordinating day-to-day delivery of threat intelligence, threat detection, incident response, vulnerabilitymanagement, and ethical hacking capabilities. You will be leading a team of Infrastructure Engineers, ensuring strong data controls are in place, whilst working closely with key stakeholders to … experience of creating cyber security roadmaps Experience of building and implementing strong operational processes Excellent communication skills with the ability to translate business requirements into technical solutions Strong stakeholder management skills What you'll get in return This exciting position is paying between £70,000 and £80,000 negotiable on experience and offers an excellent work life balance including More ❯
Derbyshire, England, United Kingdom Hybrid / WFH Options
Hays
design effective controls. You will be leading the Cyber Security operations function, by providing strategic direction and coordinating day-to-day delivery of threat intelligence, threat detection, incident response, vulnerabilitymanagement, and ethical hacking capabilities. You will be leading a team of Infrastructure Engineers, ensuring strong data controls are in place, whilst working closely with key stakeholders to … experience of creating cyber security roadmaps Experience of building and implementing strong operational processes Excellent communication skills with the ability to translate business requirements into technical solutions Strong stakeholder management skills What you'll get in return This exciting position is paying between £70,000 and £80,000 negotiable on experience and offers an excellent work life balance including More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Hays Technology
design effective controls. You will be leading the Cyber Security operations function, by providing strategic direction and coordinating day-to-day delivery of threat intelligence, threat detection, incident response, vulnerabilitymanagement, and ethical hacking capabilities. You will be leading a team of Infrastructure Engineers, ensuring strong data controls are in place, whilst working closely with key stakeholders to … experience of creating cyber security roadmaps Experience of building and implementing strong operational processes Excellent communication skills with the ability to translate business requirements into technical solutions Strong stakeholder management skills What you'll get in return This exciting position is paying between £70,000 and £80,000 negotiable on experience and offers an excellent work life balance including More ❯
Employment Type: Permanent
Salary: £70000 - £80000/annum Up to £80,000+ Benefits
incidents. Perfect for someone who enjoys being in sole contributor and operating strategically and tactically. We're looking for candidates with experience in: Managing global security incidents at scale Vulnerabilitymanagement and remediation programs Frameworks like NIST and MITRE ATT&CK Cloud security (Azure preferred) Reporting and communicating with both technical teams and senior stakeholders Comfortable working closely More ❯
enhance the SOC's scalability, efficiency, and incident response readiness. Designed and fine-tune proactive and reactive detections in Sentinel - working closely with Threat Intelligence, IR, and Attack Surface Management teams. Partnered with SOC analysts to identify repetitive tasks and implement automation to boost day-to-day operational efficiency in areas like threat hunting and vulnerability management. Continuously More ❯
very hands on. Experience required Familiar with NIST, ISO 27001, ITIL Azure - 5 years experience Info Sec (Azure AD, Defender, Sentinel) PIM/PAM Audits and report writing Assessments VulnerabilityManagement and Pen Testing Zero Trust Architecture Automation (eg powershell, python More ❯
very hands on. Experience required Familiar with NIST, ISO 27001, ITIL Azure - 5 years experience Info Sec (Azure AD, Defender, Sentinel) PIM/PAM Audits and report writing Assessments VulnerabilityManagement and Pen Testing Zero Trust Architecture Automation (eg powershell, python More ❯
implementing changes accordingly. Establish and develop solution architecture for IT security and end-user service domains, ensuring security is integrated into all aspects of the organisation's IT. Oversee vulnerabilitymanagement and secure the design of IT services. Involvement in Monitoring, identification, resolution activities, and reporting of IT security KPI's and Incidents. Liaise with Data Protection Officer … in on-call and shift rotas. Attend training courses as identified and follow up with exams/qualifications if available. Implement IT Changes in line with the IT Change Management Procedure. Maintain high level of awareness in IT, Information, and Cyber Security and provide information and advice to others as necessary. Work with elevated account privileges and permissions in More ❯
and availability • Leading disaster recovery, backup, and business continuity processes • Collaborating with internal teams and external vendors on system upgrades, maintenance, and incident resolution • Contributing to security posture improvements, vulnerabilitymanagement, and compliance efforts Experience • 5+ years’ experience in infrastructure or systems engineering, preferably within trading, hedge funds, or financial services • Deep expertise with Windows Server, Active Directory … VMware or Hyper-V) • Strong scripting and automation skills, particularly with PowerShell • Hands-on experience with cloud platforms (Azure or AWS) and hybrid IT environments • Solid understanding of endpoint management, system hardening, and patching • Familiarity with security best practices in regulated or high-trust environments • A proactive, self-starting attitude with the ability to work independently in a high More ❯
You'll be at the heart of their SecOps function, helping to shape and improve their cyber capabilities. What they are looking for : Someone comfortable with SIEM, EDR, and vulnerabilitymanagement tooling (Rapid7, CrowdStrike, Qualys etc.) Scripting and automation Strong foundational IT and networking knowledge Familiarity with patching solutions and email security tools A proactive mindset and good More ❯
and availability • Leading disaster recovery, backup, and business continuity processes • Collaborating with internal teams and external vendors on system upgrades, maintenance, and incident resolution • Contributing to security posture improvements, vulnerabilitymanagement, and compliance efforts Experience • 5+ years’ experience in infrastructure or systems engineering, preferably within trading, hedge funds, or financial services • Deep expertise with Windows Server, Active Directory … VMware or Hyper-V) • Strong scripting and automation skills, particularly with PowerShell • Hands-on experience with cloud platforms (Azure or AWS) and hybrid IT environments • Solid understanding of endpoint management, system hardening, and patching • Familiarity with security best practices in regulated or high-trust environments • A proactive, self-starting attitude with the ability to work independently in a high More ❯
and availability • Leading disaster recovery, backup, and business continuity processes • Collaborating with internal teams and external vendors on system upgrades, maintenance, and incident resolution • Contributing to security posture improvements, vulnerabilitymanagement, and compliance efforts Experience • 5+ years’ experience in infrastructure or systems engineering, preferably within trading, hedge funds, or financial services • Deep expertise with Windows Server, Active Directory … VMware or Hyper-V) • Strong scripting and automation skills, particularly with PowerShell • Hands-on experience with cloud platforms (Azure or AWS) and hybrid IT environments • Solid understanding of endpoint management, system hardening, and patching • Familiarity with security best practices in regulated or high-trust environments • A proactive, self-starting attitude with the ability to work independently in a high More ❯
and availability • Leading disaster recovery, backup, and business continuity processes • Collaborating with internal teams and external vendors on system upgrades, maintenance, and incident resolution • Contributing to security posture improvements, vulnerabilitymanagement, and compliance efforts Experience • 5+ years’ experience in infrastructure or systems engineering, preferably within trading, hedge funds, or financial services • Deep expertise with Windows Server, Active Directory … VMware or Hyper-V) • Strong scripting and automation skills, particularly with PowerShell • Hands-on experience with cloud platforms (Azure or AWS) and hybrid IT environments • Solid understanding of endpoint management, system hardening, and patching • Familiarity with security best practices in regulated or high-trust environments • A proactive, self-starting attitude with the ability to work independently in a high More ❯
and availability • Leading disaster recovery, backup, and business continuity processes • Collaborating with internal teams and external vendors on system upgrades, maintenance, and incident resolution • Contributing to security posture improvements, vulnerabilitymanagement, and compliance efforts Experience • 5+ years’ experience in infrastructure or systems engineering, preferably within trading, hedge funds, or financial services • Deep expertise with Windows Server, Active Directory … VMware or Hyper-V) • Strong scripting and automation skills, particularly with PowerShell • Hands-on experience with cloud platforms (Azure or AWS) and hybrid IT environments • Solid understanding of endpoint management, system hardening, and patching • Familiarity with security best practices in regulated or high-trust environments • A proactive, self-starting attitude with the ability to work independently in a high More ❯
Gloucester, England, United Kingdom Hybrid / WFH Options
IMT Resourcing Solutions
reviews What they’re looking for: Strong understanding of Microsoft technologies – Azure, Defender, Intune, Entra ID Experience working in large-scale or regulated environments Familiarity with SIEM, endpoint protection, vulnerabilitymanagement A practical, collaborative approach to security What's on offer? Paying up to £49,500 per annum Enhanced pension up to 20% Hybrid working 1 day per More ❯
accordingly. Establishing and developing solution architecture for IT security and end-user service domains, ensuring security is integrated into all aspects of the organisation's IT. Driving and facilitating vulnerabilitymanagement and secure the design of IT services. Monitoring, identifying, resolution activities, and reporting IT security KPI's and incidents. Liaising with the Engineering Team on all aspects More ❯
major incidents to determine the affected/vulnerable systems, affected/vulnerable users Identify any business areas impacted and coordinate communications with all relevant stakeholders as per Major Incident Management process. Coordinate the remediation and containment activities as advised by either the NTT DATA SOC or Incident Response Team. Oversee, support, and manage through to completion the investigative and … Manager in review of any service delivery processes and workflows, identifying areas for optimization and implementing best practices. Co-ordinate the running and reporting of a risk-based vulnerabilities management including: Scanning systems, networks, and applications to detect potential security weaknesses. Prioritize vulnerabilities based on their risk level, potential impact, and the criticality of the affected assets, ensuring that … challenging projects and a work environment that supports the creation of tangible solutions that make an impact. You will need to have a broad experience of security service delivery management and have evidence of experience in a number of the following fields of expertise: At least 10 years of experience in providing technical support and advice for a Security More ❯
major incidents to determine the affected/vulnerable systems, affected/vulnerable users Identify any business areas impacted and coordinate communications with all relevant stakeholders as per Major Incident Management process. Coordinate the remediation and containment activities as advised by either the NTT DATA SOC or Incident Response Team. Oversee, support, and manage through to completion the investigative and … Manager in review of any service delivery processes and workflows, identifying areas for optimization and implementing best practices. Co-ordinate the running and reporting of a risk-based vulnerabilities management including: Scanning systems, networks, and applications to detect potential security weaknesses. Prioritize vulnerabilities based on their risk level, potential impact, and the criticality of the affected assets, ensuring that … challenging projects and a work environment that supports the creation of tangible solutions that make an impact. You will need to have a broad experience of security service delivery management and have evidence of experience in a number of the following fields of expertise: At least 10 years of experience in providing technical support and advice for a Security More ❯
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
and services. Ensure project designs comply with Baseline Security Requirements and security policy. Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & Access Management, SIEM and Vulnerability Management. Ensure internal customers, external suppliers and delivery partners are aware of security standards and future strategy to influence development roadmaps. … to deliver a wide range of IT and telecommunications solutions. Competent in applying security policies and principles defined in security architecture to real world scenarios. Understands and applies risk management principles. Effective communication skills to influence stakeholders and explain complex security requirements in simple terms. Stakeholder Management - established as the go-to person for any project issues impacting More ❯
some of the world's largest organisations, our mission is to enable organisations to continuously understand how an attacker would successfully compromise their business - with cutting-edge Attack Surface Management and Continuous Automated Red Teaming technology. watchTowr was named within Gartner's Emerging Tech Impact Radar report in 2023, in Gartner's Innovation Impact report for ASM in … and SOC2 Type 2, while going steps further where relevant due to watchTowr's unique threat model. You will oversee security monitoring, threat analysis, threat hunting, penetration testing, and vulnerabilitymanagement to align cyber risk management with the company's risk strategy. You will support the watchTowr Commercial team to respond to client and partner queries about More ❯
identify emerging threats and vulnerabilities. Track and profile threat actors, malware campaigns, and attack techniques relevant to our industry and assets, participating in confidential security investigations. Collaborate with incident management, SOC, and security engineering teams to enhance detections and improve threat response effectiveness. Produce high-quality, actionable intelligence reports to inform stakeholders and support proactive security decisions. Enhance team … to reduce false positives and strengthen protections. Strong experience with SIEM solutions such as Splunk or Kibana. Proficiency in maintaining and troubleshooting IAM platforms, including SSO integration. Experience with vulnerabilitymanagement and scanning solutions. Proficient with XDR platforms, ensuring continuous improvement in detection and response capabilities, including automation playbooks. Ability to plan and execute migration activities from legacy More ❯
Brighton, Sussex, United Kingdom Hybrid / WFH Options
Hays Technology
a key member of the newly formed Cyber Security team, and you will play a big part in upcoming projects, providing experience and expertise in Microsoft Defender, Sentinel, and vulnerabilitymanagement, amongst others. What you'll need to succeed Technical skills and strong communication skills Strong experience in a similar role, ideally with experience within Microsoft infrastructures. Experience More ❯
Brighton, East Sussex, United Kingdom Hybrid / WFH Options
Hays Technology
a key member of the newly formed Cyber Security team, and you will play a big part in upcoming projects, providing experience and expertise in Microsoft Defender, Sentinel, and vulnerabilitymanagement, amongst others. What you'll need to succeed Technical skills and strong communication skills Strong experience in a similar role, ideally with experience within Microsoft infrastructures. Experience More ❯
Your role and responsibilities As a Cybersecurity Architect, you will specialize in DevSecOps, integrating security into the software development lifecycle, automating security practices, and ensuring robust threat modeling and vulnerability management. Your primary focus will be on cloud-native and on-premises environments, with a strong emphasis on application security, infrastructure as code (IaC) security, and cloud security posture … management. Additionally, you will contribute to data security efforts, securing data at rest, managing key management systems, and ensuring strong governance across data access. Responsibilities: Integrate security into the software development lifecycle, automating security practices into CI/CD pipelines. Implement automated security testing (SCA, SAST, DAST) to identify and remediate vulnerabilities at every stage of development. Secure IaC … configurations, ensuring secure provisioning, configuration management, and continuous monitoring of infrastructure. Utilize CNAPP and CSPM tools to secure cloud-native environments, focusing on application security and cloud posture management. Design and deploy PKI solutions for secure key management, including key generation, key ceremonies, and certificate management. Required education None Preferred education Bachelor's Degree Required technical and professional More ❯
and implementation. Excellent troubleshooting, problem solving, and root-cause analytical (RCA) skills. Good working knowledge of Cisco Meraki and associated technologies. Practical knowledge of Continual Service Improvement (CSI) methodologies. Vulnerabilitymanagement and assessment. Intrusion detection and prevention analysis/frameworks. Solid exposure to cloud based applications security and provisioning. Experience in writing policy, process, and standard playbooks. Experience More ❯