Vulnerability Management Jobs in the UK

26 to 50 of 279 Vulnerability Management Jobs in the UK

Technical Security Delivery Manager

South East, United Kingdom
Anson Mccade
and enhance the operations of a high-performing Security Operations Centre (SOC). This is a leadership role at the sharp end of service delivery - managing complex security incidents, vulnerability management programmes, and client relationships across enterprise environments. What you'll be doing: Acting as the key liaison between the client and operational delivery teams Leading on incident … escalation and coordination with SOC and IR teams Managing post-incident investigations and reporting Supporting and driving improvements to vulnerability management workflows Overseeing IDS/IPS updates, firewall security, and policy alignment Running regular service reviews and ensuring SLA/KPI performance Collaborating with senior delivery leadership on best practice and optimisation What we're looking for: 10+ … years of experience in a SOC or technical security operations environment Proven track record in vulnerability management and incident response Strong understanding of IDS, IPS, and endpoint protection technologies Excellent stakeholder management and communication skills Ability to lead and coordinate teams through critical incidents UK SC clearance (or eligibility to obtain it) Relevant security certifications (e.g. CISSP More ❯
Employment Type: Permanent
Posted:

Hardware Engineering Manager - R10195963 (London)

London, UK
Hybrid / WFH Options
Northrop Grumman UK
to the modern backbone of the Royal Navy. We pioneer with fierce curiosity, dedication, and innovation, we seek to solve the worlds most challenging problems. Responsibilities Leadership and line management - Motivate and drive the Hardware function to meet key business and operational unit objectives. Develop an open and inclusive team culture that supports doing the right thing and achieving … excellence. Ensure behaviours in teams meet standards expected of NG employees. Influences others and supports colleagues through changes expected within a large multi-functional organisation. Capability Management - Management of capability needs in the Hardware function Career management of the Hardware function Resource management - Resource supply and demand, Capacity planning and recruitment, and outsource management. Functional delivery … as a Suitably qualified individual in either mechanical or electro-mechanical field of expertise. May be functional lead within projects/issues for most critical/complex needs. Process Management - Highlight process needs and work with the Technical Directorate to develop bespoke, efficient and fully integrated processes. Asset management - Identify tools and Management of tools Communication - Develop More ❯
Employment Type: Full-time
Posted:

SOC Lead

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Anson McCade
will act as a critical liaison between client stakeholders and internal operational teams, ensuring the delivery of world-class cyber security services. You’ll drive incident response coordination, lead vulnerability management efforts, and ensure service excellence through strategic oversight and hands-on technical engagement. What You’ll Be Doing Serve as the key point of contact and escalation … improvement initiatives. Support compliance with SLAs and ensure services meet contractual, operational, and quality standards. Lead service reviews and present performance reports to clients (weekly/monthly). Oversee vulnerability management efforts including scanning, prioritisation, risk communication, and remediation coordination. Ensure IDS/IPS systems are maintained and aligned with the latest threat intelligence. Work closely with the … Manager to identify process improvements and implement best practices. What You’ll Bring 10+ years of experience in technical support for SOC or Cyber Security operations. 5+ years of vulnerability management experience, with demonstrable risk-based prioritisation skills. Proven leadership in high-pressure, crisis-response situations. Strong client relationship management and stakeholder engagement skills. In-depth understanding More ❯
Posted:

Application and Security Management Analyst

London, United Kingdom
Experian Group
with technical and business teams to address security flaws and implement remediation plans. • Oversee application security tasks, ensuring alignment with audit requirements and internal policies. • Support change and incident management processes, with a focus on high-priority incidents (P1 & P2). • Provide guidance to development and support teams on security-related ticket requirements and process expectations, ensuring SLA compliance. … administrative functions, including audit preparation and policy development. • Compile and deliver regular reports, including weekly, monthly, and OSM-specific security metrics. Required Key Skills (Functional/Technical) Application Security & Vulnerability Management • Familiarity with Common Vulnerability Scoring System (CVSS) • Experience with tools like OWASP ZAP, Veracode, Rapid7 (on-prem), and Wiz.IO (cloud vulnerability management and CSPM … of network security principles and firewall configurations • Familiarity with SSO and MFA using OKTA, and directory services such as MS Active Directory • Experience with CyberArk PAM for privileged access management Security Information and Event Management (SIEM) • Use of Splunk SIEM for real-time threat detection and log analysis • Review and optimise SIEM use cases to enhance threat detection More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber and Information Security Specialist

Bath, Somerset, United Kingdom
Hybrid / WFH Options
Mayden
About The Role We are looking to appoint a highly experienced cyber and information security specialist to join our growing business. Mayden has a flat management structure and a coaching culture, with team members working together and supporting one another to make things happen. This means that job titles can look a little different, but also means our roles … public sector. You may already be operating at CISO level in a small company, or have ambitions to reach the next level in your career. Mayden's flagship patient management system, iaptus, is used by more than 200 mental health services in the UK, Australia and Canada. Theseus, our case management system for addiction and healthy lifestyle services … Compliance: Ensure the company's security posture meets the requirements of the NHS Data Security and Protection Toolkit (DSPT), Cyber Essentials Plus, ISO27001:2022 and other relevant frameworks. Risk management: Lead the information security risk management program, including identification, assessment, mitigation, and monitoring of information security risks across all systems, applications, and operations. Policy and procedure development: Support More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Infrastructure Engineer - InTune / M365 - Newcastle

Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
Hybrid / WFH Options
Circle Group
Newcastle *Be the M365 Subject Matter Expert* IT Deployment Engineer/IT Infrastructure Engineer, providing 3rd line IT/M365 Application support with excellent M365, InTune, Azure, Modern Device Management & IT Security experience is required by a leading company in central Newcastle You will be the subject matter expert for Microsoft and M365, working on a range of 3rd … Active Directory, firewall, VPN, iOS, and networking protocols (TCP/IP, DNS, DHCP, SMTP). - Strong client-service approach with excellent communication and teamwork skills. - Strong IT Security, Endpoint management and Vulnerability management experience - PowerShell Scripting experience within Microsoft Applications - Ability to prioritise, manage workload, and multitask effectively. Role Responsibilities: - 3rd line support and implement Intune, M365 … maintenance). - Assist in managing Microsoft Exchange, Mimecast security, Teams, and Autopilot. - Develop onboarding processes and provide feedback for service improvements. - Define the company's IT Security policies, including vulnerability management - Admin of Endpoint management tools - Stay updated on Microsoft 365 tools and roadmap. - Conduct monitoring and analysis, including storage and usage reports. - Own problem management More ❯
Employment Type: Permanent, Work From Home
Salary: £50,000
Posted:

Vulnerability Manager

Barrow-In-Furness, Cumbria, North West, United Kingdom
Hybrid / WFH Options
Deerfoot Recruitment Solutions
Vulnerability Manager - Barrow-in-Furness - Up to £50,000 + Hybrid Working Location: Barrow-in-Furness (Hybrid: 3 days onsite per week) Salary: Up to £50,000 Clearance Requirement: UK nationals only, SC eligible Deerfoot IT Recruitment is helping one of our trusted clients source a Vulnerability Manager to join a specialist cybersecurity team working on a high … profile programme. This is a fantastic opportunity for someone with a passion for cybersecurity, hands-on experience with vulnerability management tools, and strong communication skills to play a key role in enhancing security assurance across a complex IT estate. The role will involve: Conducting vulnerability analysis and impact assessments, including risk assessments. Using tools such as Nessus … governance, risk, and compliance activities related to security findings. Collaborating with wider teams and contributing to security training and mentoring initiatives. Ideal candidate profile: 2-3 years' experience in vulnerability management (3-5 years in wider cybersecurity desirable). Familiarity with vulnerability tools (e.g. Nessus, Tenable, Microsoft Defender, IBM QRadar). Relevant certifications such as CompTIA Security+ More ❯
Employment Type: Permanent, Work From Home
Salary: £50,000
Posted:

Senior Cyber Security Analyst

Manchester, Lancashire, United Kingdom
Old Moat
cause harm. This involves continuous monitoring and analysis of network traffic, system logs, and other data sources to identify unusual patterns or behaviours that may indicate a security threat. Vulnerability Management: Identify and address security weaknesses in our systems. Conduct regular vulnerability assessments, apply patches and updates, and implement security controls to mitigate risks. Defence Management … policies and processes to ensure that all technology remains secure and compliant. Ensuring that all security layers align against our Internal Security Standards and Statutory and Regulatory obligations. SIEM Management: Manage, monitor, and respond to security incidents and events using the Council's Security Incident and Event Monitoring (SIEM) platform. Ensure timely detection, analysis, and response to security incidents … experience and skills that include: IT Security Operations Experience: Recent experience as a senior member of a multi-disciplinary team managing operational security (firewall, content filtering, DMZ, Pen Testing, Vulnerability Management) and external managed service partners. Security Qualifications: Accredited to a recognised Security qualification (e.g., CISSP, CCP, CCSP). The successful candidate must be willing to work towards More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Project Manager - Cyber Security

United Kingdom
Hybrid / WFH Options
Bridewell Consulting Limited
a crucial role in leading and managing complex Cyber Security projects, ensuring the successful execution of initiatives that safeguard our clients' organisations against evolving threats. Leveraging your extensive project management expertise and technical knowledge, you will partner with and contribute to the enhancement of the overall Cyber Security posture and resilience of our clients, collaborating with cross-functional teams … and resource allocation approaches. Conduct comprehensive risk assessments and develop mitigation strategies to address potential security threats and project risks. Utilise industry frameworks and standards to ensure robust risk management practices. Oversee and manage projects end-to-end in line with the Association for Project Management guidance. Manage projects such as Security Framework Audits and Implementation, Cyber Strategy … Cyber Risk Management, Data Privacy, Offensive Security, Security Architecture, and Cloud Security & Engineering. Lead the onboarding process for Managed Security Services including Managed Detection & Response, Cyber Threat Intelligence, and Vulnerability Management Services. Collaborate with technical teams to ensure seamless integration of managed services within clients' environments. Build and maintain strong relationships with internal teams and clients, serving More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SOC and Vulnerability Analyst

Greater Bristol Area, United Kingdom
Logiq
SOC and Vulnerability Analyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload, but … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and Vulnerability Analyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality and More ❯
Posted:

Network Security Engineer

Manchester, Lancashire, United Kingdom
Cloud Decisions
control traffic flow. - Collaborate with other teams to define and enforce network access policies, ensuring that only authorized personnel and devices have appropriate access rights. Proactive Security Testing and Vulnerability Management: - Conduct and organise regular security assessments, including vulnerability scanning and testing, to identify weaknesses in the network infrastructure. - Collaborate with system administrators and application owners to … address identified vulnerabilities and implement necessary patches or configuration changes. - Develop and maintain a comprehensive vulnerability management program, including vulnerability tracking, risk assessment, and remediation planning. Stakeholder Collaboration: - Act as a stakeholder for the response team, providing expert guidance on security-related alerts, incidents, and potential improvements. - Collaborate with cross-functional teams, including network engineers, system administrators More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Information Security Manager

London, United Kingdom
Hybrid / WFH Options
Mimecast Services Ltd
candidate will have a strong technical background, leadership experience, and a proactive approach to managing cyber risks in a dynamic technology environment. What You'll Do: Leadership and Team Management: Lead, mentor, and manage a team of Security Engineers, fostering a culture of collaboration, innovation, and continuous improvement. Define team goals, assign responsibilities, and ensure the successful execution of … security initiatives. Conduct regular performance reviews and provide professional development opportunities for team members. Ability to work across the organisation and communicate at all levels Security Posture Management: Develop and maintain a comprehensive security posture management program to proactively identify and address vulnerabilities. Continuously assess the organization's security posture through vulnerability assessments, penetration testing, and threat … modelling. Collaborate with cross-functional teams to implement security best practices and ensure compliance with industry standards and regulations. Cyber Exposure Risk Management: Identify, analyse, and prioritize cyber exposure risks across the organization's infrastructure, applications, and systems. Develop and implement strategies to mitigate risks, including patch management, configuration management, and secure coding practices. Monitor and respond More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Threat Intelligence Lead

Leeds, England, United Kingdom
Anson McCade
be eligible for DV clearance. Are you ready to lead in one of the most critical roles in the cybersecurity industry? We are seeking a Cyber Threat Intelligence and Vulnerability Lead to play a pivotal role in the operation and improvement of a Security Operations Centre (SOC) dedicated to safeguarding a major UK organisation. This position offers an opportunity … to make a tangible impact in protecting the systems that power the nation. About the Role As the Cyber Threat Intelligence and Vulnerability Lead, you will: Take accountability for detecting, triaging, and reporting potential cyber threats and key vulnerabilities daily. Oversee the delivery and quality of all threat intelligence and vulnerability products, ensuring deadlines are met with excellence. … support threat mitigation. Assess and enhance the maturity of the SOC's existing functions, driving continuous improvement. Lead, mentor, and develop a high-performing team of threat intelligence and vulnerability professionals. Key Responsibilities Selection and analysis of key threat actors posing the greatest risk to the client. Regularly review and document processes, ensuring efficiency and relevance. Deliver top-quality More ❯
Posted:

Cyber Threat Intelligence Lead

Yorkshire, United Kingdom
Anson Mccade
therefore must be British-born. Are you ready to lead in one of the most critical roles in the cybersecurity industry? We are seeking a Cyber Threat Intelligence and Vulnerability Lead to play a pivotal role in the operation and improvement of a Security Operations Centre (SOC) dedicated to safeguarding a major UK organisation. This position offers an opportunity … to make a tangible impact in protecting the systems that power the nation. About the Role As the Cyber Threat Intelligence and Vulnerability Lead, you will: Take accountability for detecting, triaging, and reporting potential cyber threats and key vulnerabilities daily. Oversee the delivery and quality of all threat intelligence and vulnerability products, ensuring deadlines are met with excellence. … support threat mitigation. Assess and enhance the maturity of the SOC's existing functions, driving continuous improvement. Lead, mentor, and develop a high-performing team of threat intelligence and vulnerability professionals. Key Responsibilities Selection and analysis of key threat actors posing the greatest risk to the client. Regularly review and document processes, ensuring efficiency and relevance. Deliver top-quality More ❯
Employment Type: Permanent
Posted:

19 Jun 2025 BBBH58530 Cyber Security Third Party Risk Management Lead €80000 - €82000 per annum ...

Belfast, United Kingdom
MCS Group
MCS Group is seeking a Cyber Security Third Party Risk Management Lead to join their client, a thriving and well-established organisation with headquarters in Dublin. This position is a 12 month Fixed Term Contract into permanency as is standard in the organisation. With multiple projects in the pipeline and a growing team, this is a fantastic opportunity for … an experienced Risk Management professional to join a successful team in a newly created position. The Third-Party Risk Management (TPRM) Lead will be responsible for designing, implementing, and overseeing a robust third-party risk management programme. This role ensures that all external vendors, suppliers, and partners align with the organisation's security, compliance, and operational risk … procurement, legal, IT, the cyber team, and other business units, the TPRM Lead will assess, monitor, and mitigate third-party risks. This position is part of a growing risk management function, playing a key role in safeguarding the organisation against external threats. The successful candidate will be afforded public sector benefits - increased holidays, fantastic pension and unmatched job security More ❯
Employment Type: Permanent
Salary: GBP 80,000 - 82,000 Annual
Posted:

Cloud Security Engineer - Sunderland (Hybrid) Sunderland, UK

Sunderland, United Kingdom
Hybrid / WFH Options
Tombola
infrastructure. You'll be hands-on, designing, implementing, and managing top-notch security solutions across all our cloud environments. You'll also play a key part in developing our vulnerability management program, working closely with our operational support, infrastructure, and development teams. Plus, you'll be right in the thick of security event monitoring, threat intelligence, and incident … management - keeping us one step ahead! What you'll be doing: Delivering SOC Capabilities: You'll be a key team member in delivering ongoing Security Operations Centre (SOC) capabilities for the business. Driving Automation: You'll push for security automation wherever possible and play a big part in evolving our security tooling and services. Policy & Standards: You'll champion … firewalls, WAF, anti-virus, and O365 compliance & security centre . Familiarity with NIST (CSF Framework 2.0), ISO 27001, PCI-DSS, and GDPR . Experience operating and managing SIEM solutions , vulnerability management tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and/or SecOps oriented teams More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Infrastructure Engineer - JS11154CF

London, United Kingdom
Proactive.IT Appointments Limited
JS11154CF £450 - 500 per day Infrastructure Engineer Location: London (4 days a week onsite) Type: Contract Our client is seeking an experienced Infrastructure Engineer with strong vulnerability management experience to join their dynamic IT team. This is a fantastic opportunity to play a key role in strengthening the organisation's cyber resilience and ensuring a secure, compliant IT … environment. Key Responsibilities: Automate patch management across servers, endpoints, appliances, and network equipment using tools like SCCM, Intune, and ManageEngine. Analyse vulnerabilities from Tenable scans, determine effective remediation strategies, and implement solutions. Lead the technical implementation of a new patch management platform and drive resolution of vulnerabilities outside SLA. Prepare risk acceptance submissions when direct fixes are not … feasible. Skills & Experience Required: Hands-on experience patching and hardening IT systems, including configuration-level vulnerability remediation. Strong knowledge of Microsoft technologies including Windows Server, SQL Server, Windows 10, Microsoft 365, and Azure. Experience managing GPOs, Azure Policies, and various patch management tools (e.g., SCCM, Intune, Ivanti). Familiarity with scripting, vulnerability management, and security tooling. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Analyst

Peterborough, Cambridgeshire, England, United Kingdom
INTEC SELECT LIMITED
opportunity has arisen with a global brand for a Security Analyst/SOC Analyst on a 6-month Contract basis. You’ll play a key role in security operations, vulnerability management, compliance auditing, and incident response, ensuring robust security for cloud services across UK data centres. Role and Responsibilities Manage vulnerability assessments using Tenable.io, including triage, exception … tracking, and remediation Handle EDR alert triage (CrowdStrike) and escalate incidents as needed Conduct system audits for ISO 27001 compliance and review pen test/vulnerability scan outputs Perform log analysis, assist with threat hunting, and escalate risks or unusual activity Develop incident reports and track system impacts for analysis and improvement Collaborate with clients on infrastructure hardening and … identify security gaps Support incident response, forensic analysis, and document findings for knowledge sharing Maintain internal guides and playbooks for security operations Skills and Experience Strong understanding of vulnerability management (Tenable.io) and EDR platforms (CrowdStrike) Experience with ISO 27001 audits, system audits, and compliance validation Knowledge of SIEM platforms (Elastic SIEM) and log analysis Hands-on experience with More ❯
Employment Type: Contractor
Rate: Salary negotiable
Posted:

Senior Security Engineer - Application & Product Security

England, United Kingdom
Cerebras
CaptivateIQ is the leading Sales Performance Management solution, recognized by Forrester and G2, and trusted by customers including Affirm, Gong, and Figma. With solutions for Sales Planning and Incentives, we help revenue teams automate processes, hit revenue targets, and adapt with business change, ultimately driving efficient growth. It's time to rethink ROI - your return on incentives - with CaptivateIQ. … offensive security testing . You will lead manual and automated penetration testing, manage AppSec tooling (SAST, DAST, SCA), and build developer enablement programs. You'll also be responsible for vulnerability management, incident response for application-layer events, and ensuring compliance alignment for SOC 2, ISO 27001, and privacy requirements. This role blends offensive and defensive expertise with strategic … Simulate adversary attack scenarios to validate controls and identify gaps. Secure SDLC Integration Embed security into every stage of development; implement automated security tooling in CI/CD pipelines. Vulnerability Management Triage and prioritize application-layer vulnerabilities and guide engineering teams through remediation. Developer Enablemen t Deliver secure development and coding training; create resources to reduce recurring vulnerabilities. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Engineer

England, United Kingdom
Hybrid / WFH Options
Oak Engage limited
by design, resilient to threats, and aligned with best-in-class standards (including ISO 27001 and SOC 2). You'll play a key role in monitoring, incident response, vulnerability management, and secure DevOps practices-helping us maintain customer trust and regulatory compliance as we scale. What You'll Do Monitor systems and infrastructure for potential vulnerabilities, threats … and breaches Own and improve incident detection, response, and recovery processes Implement and manage SIEM, intrusion detection, vulnerability scanners, and other security tooling Collaborate with DevOps and Engineering to embed security into CI/CD pipelines and cloud infrastructure (Azure) Manage processes for regular vulnerability assessments and penetration testing (internal or third-party) Support internal audits, ISO … best practices What We're Looking For Extensive experience in security operations roles, preferably in SaaS or cloud-native environments Proficiency in security monitoring tools such as SIEM, EDR, vulnerability management tools, and log aggregation platforms Strong knowledge of security frameworks, standards, and best practices (ISO 27001, SOC 2, GDPR) Proven incident response, threat detection, and investigation experience More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cloud and Infrastructure Architect

London, United Kingdom
Hybrid / WFH Options
Experis - ManpowerGroup
GCP) Hands-on with IaC tools (Terraform, Bicep, CloudFormation) and CI/CD pipelines Proficient in Python or Bash scripting Knowledge of cloud security best practices (e.g. IAM, encryption, vulnerability management) Familiar with Docker, Kubernetes, serverless, and event-driven architectures Comfortable working with both SQL and NoSQL databases A passion for engineering excellence and staying on top of … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Specialist Engineer (OSS)

Crawley, West Sussex, South East, United Kingdom
Hybrid / WFH Options
M Group Telecom
the nature of the on call, you must hold a valid drivers licence with reasonable means to a vehicle. What will you be doing? Youll have day to day management of the OSS suite of services and underlying infrastructure as part of a 2nd Line team. Youll be proactive and Reactive within Incident Management Youll have user Access … Management & Vulnerability Management System Governance to ensure the effective operation of the services Providing Out of Hours Support via an On-Call Rota. What youll bring Youll bring experiencewith supporting OSS applications from a 2nd and 3rd Line level Youll have the experience of working with developers/vendors implementing fixes or improvements to systems Experience of More ❯
Employment Type: Permanent, Work From Home
Posted:

Cyber Security Consultant

City of London, London, United Kingdom
Hybrid / WFH Options
Anson McCade
cyber security into business operations Work across a range of industries and environments to solve real-world security challenges Key Skills & Experience Cyber Security: Experience in cyber strategy, risk management, security architecture, transformation programmes, and regulatory compliance Knowledge of relevant standards: NIST CSF, ISO27001, NCSC CAF, GDPR, NIS2, etc. Certifications such as CISSP, CISM, CISA, M.Inst.ISP, or MSc in … Cyber Security Hands-on experience in areas like GRC, cyber threat management, vulnerability management Strong communication skills – written and verbal – with the ability to present to both technical and business stakeholders Consulting: Proven project delivery using Agile and Waterfall methodologies Team leadership across on-site and remote teams Strong client stakeholder engagement from technical teams to board More ❯
Posted:

Cyber Security Consultant

London Area, United Kingdom
Hybrid / WFH Options
Anson McCade
cyber security into business operations Work across a range of industries and environments to solve real-world security challenges Key Skills & Experience Cyber Security: Experience in cyber strategy, risk management, security architecture, transformation programmes, and regulatory compliance Knowledge of relevant standards: NIST CSF, ISO27001, NCSC CAF, GDPR, NIS2, etc. Certifications such as CISSP, CISM, CISA, M.Inst.ISP, or MSc in … Cyber Security Hands-on experience in areas like GRC, cyber threat management, vulnerability management Strong communication skills – written and verbal – with the ability to present to both technical and business stakeholders Consulting: Proven project delivery using Agile and Waterfall methodologies Team leadership across on-site and remote teams Strong client stakeholder engagement from technical teams to board More ❯
Posted:

Security Architect

Reading, Berkshire, South East, United Kingdom
LA International Computer Consultants Ltd
proposing effective controls, and ensuring adherence to security policies. Drive the selection and integration of security technologies and services within cloud ecosystems (AWS, Azure, GCP preferred). Risk & Compliance Management: Lead threat modeling, risk assessments, and security posture management across cloud environments. Ensure architectural designs meet stringent regulatory compliance requirements relevant to the financial industry in Europe (e.g. … security, including understanding of common threats, European regulatory requirements (e.g., PSD2, DORA, EBA guidelines), and data privacy mandates (GDPR). Extensive knowledge of security architecture principles for: Identity & Access Management (IAM) in cloud (e.g., AWS IAM, Azure AD, GCP IAM). Network Security (VPCs, firewalls, WAFs, micro-segmentation, private connectivity). Data Security (encryption at rest/in transit … KMS, data classification, DLP). Application Security (secure coding, API security, SAST/DAST, WAF integration). Container Security (Kubernetes, Docker, service mesh). Security Information and Event Management (SIEM) and logging strategies. Zero Trust Architecture principles. Proven experience with DevSecOps methodologies and securing CI/CD pipelines. Strong understanding of security frameworks such as NIST CSF, ISO More ❯
Employment Type: Contract
Rate: £700 - £800 per day
Posted:
Vulnerability Management
10th Percentile
£32,875
25th Percentile
£47,500
Median
£57,500
75th Percentile
£81,438
90th Percentile
£92,500