and other regulatory bodies to demonstrate compliance with stringent security and airworthiness standards. Key Responsibilities * Lead product-level cybersecurity assessments for UAV platforms, avionics, and Embedded payload systems. * Conduct vulnerability analysis and assurance activities across software, firmware, and communication interfaces. * Develop and maintain product security architectures, ensuring compliance with secure-by-design principles and recognised standards. * Support and participate … Development Lifecycle (SDL) processes. * Identify and mitigate cyber threats early in the product life cycle through threat modelling and risk analysis. * Drive continuous improvement in security testing, automation, and vulnerabilitymanagement practices. * Proficiency in one or more programming/Scripting languages: C, C++, Python, or Bash, preferably in Embedded or Linux environments. * Familiarity with relevant standards, including: o More ❯
Hands-on experience with security tools (OWASP Zap, Trivy, Dependabot) in CI/CD Cloud security expertise in AWS and Azure Strong scripting skills (Node.js, Python, Bash) Knowledge of vulnerabilitymanagement and secure DevOps practices Nice to Have IaC security knowledge Experience with defect tracking and automated testing frameworks Preferred Background Bachelor's in Computer Science or related More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Morson Edge
Operations - Windows & Linux administration - Regulatory - NIS/CAF and other assessment frameworks - Governance, process and documentation - Operational Technology/SCADA - Telecoms & Transport networks - Deployment of SIEMs, IDAM & PAM, and VulnerabilityManagement products - Legacy technologies Requirements • Skills and experience in understanding at a technical level security operation. • Awareness of key legislation and regulation impacting IT/OT General Control More ❯
Code) with Ansible, AAP VMware (upgrade, manage) Understanding of Networking Technologies Strong problem-solving skills with the ability to own, diagnose and resolve platforms Issues. Understanding of cybersecurity principles, vulnerabilitymanagement Experience of Python, Bash, API's Engineering mindset able to challenge the status quo and automate manual processes to deliver additional value. Exceptional communication & teamwork skills This More ❯
as Code) with Ansible, AAP VMware (upgrade, manage) Understanding of Networking Technologies Strong problem-solving skills with the ability to own, diagnose and resolve platformsIssues. Understanding of cybersecurity principles, vulnerabilitymanagement Experience of Python, Bash, API's Engineering mindset able to challenge the status quo and automate manual processesto deliver additional value. Exceptional communication & teamwork skills This is More ❯
geographically dispersed environment. Identify process and technical improvements for the environment Desirable Knowledge in a variety of endpoint solutions such as Sophos and/or Symantec AV Knowledge of VulnerabilityManagement and Risk Analysis AV policy enhancements for SACB solutions (Netskope) Vendor-specific AV/APT certifications Prior experience and/or training with regard to the ITIL More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
Azure Storage. Knowledge of immutable backups and secure data retention strategies. Experience with disaster recovery planning, including full restore testing. Expertise in multi-factor authentication (MFA) setup and testing. Vulnerabilitymanagement - scanning, prioritization, remediation validation. Ability to design and interpret security dashboards for monitoring and reporting Awareness of system throttling and its security implications. Ideally comfortable upskilling the More ❯
equally in fast-paced engineering environments but what matters is your capability and judgement. Must-haves include: Strong penetration testing experience from planning to execution and reporting Understanding of vulnerabilitymanagement and secure systems design Familiarity with DevSecOps tooling and scripting (e.g., Python, Jenkins, Ansible) Strong grasp of how to assess and break technical controls — and explain fixes More ❯
equally in fast-paced engineering environments but what matters is your capability and judgement. Must-haves include: Strong penetration testing experience from planning to execution and reporting Understanding of vulnerabilitymanagement and secure systems design Familiarity with DevSecOps tooling and scripting (e.g., Python, Jenkins, Ansible) Strong grasp of how to assess and break technical controls — and explain fixes More ❯
the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Cyber Threat and Vulnerability Manager to protect DIT and the wider UK government from cyber threats in a fast paced and exciting role, responsible for the VulnerabilityManagement and Threat Hunting More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Applause IT Recruitment Ltd
such as ISO 27001 and SOC 2 Type II. This is a visible and strategic position - ideal for someone who enjoys combining technical depth with governance, audit, and risk management responsibilities. Key Responsibilities Develop and maintain the company's information security strategy, policies, and frameworks. Oversee day-to-day security operations including access control, patching, log review, and alert … Strong understanding of ISMS principles (ISO 27001) and audit support for SOC 2 Type II. Hands-on experience with security tools and controls - SIEM, IAM/PAM, endpoint protection, vulnerability management. Working knowledge of data-protection and privacy standards (GDPR, HIPAA). Excellent communication skills - able to collaborate across technical and non-technical teams. Relevant certifications welcomed - CISSP, CISM More ❯
with strong leadership and strategic planning capabilities. Key Responsibilities Security Leadership Define and implement the company's IT security strategy, policies, and frameworks. Lead risk assessments, threat modeling, and vulnerability management. Ensure compliance with ISO 27001, SOC 2, GDPR, HIPAA, and other relevant standards. Oversee incident response and monitoring to ensure rapid detection and remediation. Champion a security-first … detection/prevention systems. Experience supporting AI/ML platforms and GPU clusters is a plus. Familiarity with compliance frameworks (SOC 2, ISO 27001, FedRAMP). Excellent leadership, stakeholder management, and communication skills. Preferred Qualifications Advanced degree in Computer Science, Cybersecurity, or related field. Certifications such as CISSP, CISM, CCSP, or AWS Security Specialty. Experience in AI-focused or More ❯
in embedding security into IT platforms across both cloud and on-premises environments. You’ll advise on security design, implement and maintain controls, and contribute to incident response and vulnerability management. The role involves working closely with architects, infrastructure teams, and project managers to ensure systems are resilient, compliant, and aligned to best practice. You’ll also be involved … ll bring strong experience in cyber or IT infrastructure security, ideally within hybrid Microsoft-based environments. You should have hands-on expertise in areas such as identity and access management, encryption, monitoring tools, and vulnerability management. A sound knowledge of regulatory frameworks and industry security standards is important, along with the ability to balance technical detail with clear … endpoint protection. Familiarity with frameworks like NIST, CIS, ISO 27001, and Cyber Essentials Plus. Experience with monitoring and SIEM tools, threat detection, and incident response. Strong communication and stakeholder management skills. Desirable experience: Security certifications (e.g. CISSP, CISM, Microsoft security certs). Cloud security or architecture qualifications. Knowledge of automation, scripting, or SOAR platforms. Experience in OT or IoT More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Corecom Consulting
Leeds is seeking a Full-Stack PHP Developer to join its small but growing team. The business has evolved from dark web monitoring into a full External Attack Surface Management (EASM) platform. The role is focused on enhancing, maintaining, and scaling this SaaS platform while embedding secure coding practices. Key Responsibilities * Enhance and maintain the SaaS platform hosted in … and general cybersecurity principles. * Ability to communicate effectively with technical and non-technical stakeholders. * Experience working in small teams or start-up environments. Desirable Skills * Experience in cybersecurity SaaS, vulnerabilitymanagement, or EASM. * Familiarity with serverless AWS infrastructure and cloud-native architectures. * Exposure to AI/ML in the context of cybersecurity. * Knowledge of DevOps practices, CI/ More ❯
automation, and a mobile-first strategy across a global footprint. Duties and Responsibilities Platform Ownership & Strategy • Act as the primary owner for the Azure cloud environment, including governance, cost management, architecture, and operations. • Develop and maintain a scalable, secure, and resilient cloud platform aligned with the firm's digital transformation goals. • Drive and implement the roadmap for infrastructure upgrades … regardless of time of day is an essential. • Lead by example, setting clear expectations and holding individuals and teams accountable for high performance and ethical conduct. • Provide direct line management of individuals where appropriate, ensuring clear direction, regular development conversations, and alignment with team and business goals. Operational Management • Take full ownership of day-to-day BAU operations … ensuring the cloud platform's performance, reliability, security, and compliance. This includes patch management across all infrastructure services, as well as ensuring regular reporting is carried out for patch compliance and vulnerability management. Beyond operational stability, the role demands a continuous improvement mindset - proactively evaluating the platform and driving enhancements to optimise efficiency, resilience, and user experience. • Manage More ❯
automation, and a mobile-first strategy across a global footprint. Duties and Responsibilities Platform Ownership & Strategy • Act as the primary owner for the Azure cloud environment, including governance, cost management, architecture, and operations. • Develop and maintain a scalable, secure, and resilient cloud platform aligned with the firm's digital transformation goals. • Drive and implement the roadmap for infrastructure upgrades … regardless of time of day is an essential. • Lead by example, setting clear expectations and holding individuals and teams accountable for high performance and ethical conduct. • Provide direct line management of individuals where appropriate, ensuring clear direction, regular development conversations, and alignment with team and business goals. Operational Management • Take full ownership of day-to-day BAU operations … ensuring the cloud platform's performance, reliability, security, and compliance. This includes patch management across all infrastructure services, as well as ensuring regular reporting is carried out for patch compliance and vulnerability management. Beyond operational stability, the role demands a continuous improvement mindset - proactively evaluating the platform and driving enhancements to optimise efficiency, resilience, and user experience. • Manage More ❯
of Infrastructure as Code, Containers and CI/CD concepts. In-depth knowledge of SAST/DAST tooling and concepts and how best to utilize it to enhance the VulnerabilityManagement and wider IAC capabilities. Significant knowledge of AWS environments and implementing AWS Well Architected Security pillar. Experience building and fine-tuning security tooling to be deployed in More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Alexander Mae (Bristol) Ltd
desk Assist with pre-sales technical support Providing technical support by way of support tickets and emails Answering the phone when needed Completing business as usual activities such as vulnerabilitymanagement, patching, backend systems troubleshooting Acting as primary technical lead Training other members of the desk, or assisting non technical staff with support issues Answering to the service More ❯
BAE Systems, 1st Floor, Main Shipyard Offices, Barrow-in-Furness, Cumbria, England
BAE SYSTEMS PLC
risks and issues to business managers and other stakeholders and then applies and maintains specific security controls as required by organisational policy and local risk assessments Supporting incidents and vulnerabilitymanagement Supports the Investigation of minor security breaches in accordance with established procedures Assists users in defining their access rights and privileges Performs non-standard security administration tasks More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Nomios
Netskope, Zscaler, CrowdStrike. We would also love to receive applications from people with skills solutioning SIEM, SOAR, or Managed Security Services (experience in DDoS, WAF, IDAM, EDR, MDM or VulnerabilityManagement is a plus). We are also interested to hear from candidates with operational expertise in these areas, who are looking to take their first step into More ❯
them to real-world solutions. Strong background in web services, RESTful APIs, and event-driven architectures (MSMQ, RabbitMQ, Kafka). Security-first mindset with experience in threat modelling and vulnerability management. This is a super technical role with very complex software so your problem solving skills will be challenged every day. The Perks Salary: Up to More ❯
automation, and a mobile-first strategy across a global footprint. Key Responsibilities Platform Ownership s Strategy Act as the primary owner for the Azure cloud environment, including governance, cost management, architecture, and operations. Develop and maintain a scalable, secure, and resilient cloud platform aligned with the firm’s digital transformation goals. Drive and implement the roadmap for infrastructure upgrades … expectation of flexibility and responsiveness during critical incidents. Lead by example, setting clear expectations and holding individuals and teams accountable for high performance and ethical conduct. Provide direct line management of individuals where appropriate, ensuring clear direction, regular development conversations, and alignment with team and business goals. This role requires you to remain hands on as well as take … on leadership responsibilities. Operational Management Take full ownership of day-to-day BAU operations, ensuring the cloud platform’s performance, reliability, security, and compliance. This includes patch management across all infrastructure services, as well as ensuring regular reporting is carried out for patch compliance and vulnerability management. Beyond operational stability, the role demands a continuous improvement mindset More ❯