architecture for IT security and end-user service domains, ensuring security is integrated into all aspects of the organisation's IT. Driving and facilitating vulnerabilitymanagement and secure the design of IT services. Monitoring, identifying, resolution activities, and reporting IT security KPI's and incidents. Liaising with the More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
ECS Resource Group Ltd
within an enterprise environment Knowledge of security frameworks like Cyber Essentials, ISO 27001, and GDPR Experience with Microsoft 365 security solutions, security operations, and vulnerabilitymanagement Strong analytical skills and the ability to communicate technical information to non-technical users This is a fantastic opportunity to join a More ❯
aligned with industry best practice and regulatory standards. Take the lead on third-party risk assessments and security audits. Collaborate with technical teams on vulnerabilitymanagement and remediation planning. Provide input on secure design and architecture of new systems and solutions. Monitor and enhance security tooling and incident More ❯
Kingston Upon Hull, East Riding of Yorkshire, United Kingdom
Principal IT
when required Create tickets to record technical issues and solutions, escalating issues to senior team members when necessary Responsible for the ongoing patch and vulnerabilitymanagement of many of the company devices Continually adding to the knowledge database to ensure all technical documentation is fully up to date More ❯
solving, and root-cause analytical (RCA) skills. Good working knowledge of Cisco Meraki and associated technologies. Practical knowledge of Continual Service Improvement (CSI) methodologies. Vulnerabilitymanagement and assessment. Intrusion detection and prevention analysis/frameworks. Solid exposure to cloud-based applications security and provisioning. Experience in writing policy More ❯
Information Security Operations team. Define, document, and maintain operational processes. Ensure the effective support and maintenance of security systems used by the team. Run vulnerabilitymanagement and penetration testing programs. Develop and implement strategies to enhance the scope and capability of the Security Operations function. Set and measure More ❯
Information Security Operations team. Define, document, and maintain operational processes. Ensure the effective support and maintenance of security systems used by the team. Run vulnerabilitymanagement and penetration testing programs. Develop and implement strategies to enhance the scope and capability of the Security Operations function. Set and measure More ❯
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team More ❯
record in DevOps or engineering roles, with expertise in cloud platforms (e.g., AWS) and Infrastructure as Code (e.g., Terraform) Knowledge of incident response processes, vulnerabilitymanagement, and incident triage Experience implementing security controls and maintaining security tools Familiarity with agile methodologies in fast-paced environments Calm, evidence-based More ❯
The Offensive Security Manager is responsible for the provision of penetration & red team testing services to the business, including leading teams, creating processes, and management of technologies & 3rd parties that make up the service. The role reports to the Director of Offensive Security. The position does not need to … be filled by a hands-on penetration/red tester, as organizational, leadership, relationship and supplier management skills are the key focuses of the role but will need to have a good understanding of security vulnerabilities and testing methodology to be able to understand the subject matter of the … service and manage quality. The role will work closely alongside the rest of the Cyber Team (e.g. VulnerabilityManagement), the wider Information & Cyber Security function (e.g. Project Assurance) and leaders in operational IT teams to ensure accurate detection, and the prioritized, timely and appropriate resolution of security vulnerabilities. More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Interact Consulting Ltd
/CD pipelines and integrating security tooling. Scripting Responsibilities: Lead efforts to assess the current security posture of Azure infrastructure, encompassing Azure resources, processes, vulnerabilitymanagement tools, and techniques. Collaborate with the wider Infosec team and any third-party consultants engaged by the client to provide recommendations based … into CI/CD pipelines. Maintain an active risk registry and devise a plan to address identified issues in order of priority, ensuring proactive management of security risks. More ❯
comprehensive, cloud-based cybersecurity solutions tailored for midmarket and enterprise organizations. Their platform offers end-to-end protection through continuous threat detection and response, vulnerabilitymanagement, and risk assessment. By leveraging advanced analytics, machine learning, and behavioural intelligence, they provide proactive monitoring, rapid incident response, and compliance assurance … security challenges. Key Responsibilities: New Business Acquisition: Identify, target, and secure new midmarket and enterprise clients, building a robust pipeline of opportunities. Sales Cycle Management: Oversee the entire sales process from prospecting and needs analysis to negotiation and deal closure, ensuring a seamless handover to our client’s implementation More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Sycurio
the ISO27001, PCI-DSS, and SOC2 compliance. They are the subject matter expert on all things regarding security and compliance, owning the information risk management processes. They are the thought leader on all matters within the security and compliance domain such that the company remains secure against the ever … stakeholders, communicating the information security strategy to relevant parties and providing assurance of policies, procedures, and systems. Develop, maintain, and expand the information security management system ('ISMS') to optimise compliance for ISO27001, PCI-DSS, and SOC2. Identify gaps in the information security capability, both technical and operational, and propose … on containment and mitigation activities. Execute threat simulations. Assess emerging and potential security threats and act proactively to mitigate relevant threats. End-to-end vulnerability management. Manage the security toolset. Act as the security "face" of Sycurio to its customers, suppliers, and auditors, supporting both in-life and sales More ❯
are dedicated to building a complete suite of industry-leading products which provide a cohesive platform for our customers. Our range of solutions spans vulnerabilitymanagement, detection, automation, cloud security, and penetration testing; in order to build these products our teams work with an array of technologies including … our engineers are first class stakeholders in all parts of the development process. When required, partner with internal teams such as UX and Product Management who work deeply with our product to ensure we are understanding our customers needs. Continue to develop a deep understanding of our products in More ❯
for the represented network service capability. The network delivery lead represents all DXC Network Services seamlessly and provides a conduit between our DXC account management team, network operations, project, engineering, architecture, other DXC support groups, client counterparts and other third-party network service providers or suppliers where required. The … reporting line to the account delivery executive (ADE) directly or through the account run lead (ARL) and a hard line to the Network Delivery Management Organization. Practice 'extreme ownership' of everything DXC network services manage, to an extreme degree. Be responsible for not just those tasks which you directly … DXC GNS should be accompanied by a formal Risk Acceptance Form or similar signed by the persons who have accepted the risk. Ensure proactive management of network performance and operability. Work with ASO to ensure compliance with contractually agreed security vulnerabilitymanagement and or security report findings. More ❯
candidate will be working with a Telecoms end client across various projects. Key Responsibilities: Lead integration of security tools such as Qualys (UK) for vulnerabilitymanagement and CyberArk for privileged access security. Implement and support TrueSight for infrastructure and security monitoring. Ensure compliance and governance across multi-cloud More ❯
native applications. Familiarity with DevOps and CI/CD pipelines, and how to build security into them. A strong grasp of secure coding practices, vulnerabilitymanagement, and secure architecture principles. Relevant certifications (such as CSSLP, OSWE, CISSP, or CREST) are a strong plus. Bonus Points If You Have More ❯
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team More ❯
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response, as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team More ❯
Occasional UK travel for site support. Requirements: Strong technical skills in Microsoft technologies, endpoint protection, networking, and Intune. Good understanding of IT security and vulnerability management. Proactive troubleshooting and customer service focus. Independent work ethic and strong relationship-building skills. Full UK driving licence. Bonus: Microsoft/Azure certifications. More ❯
all racing toward our connected operations vision, and we intend to win-together. In this role, you will: Contribute to the development, deployment, and management of Samsara's enterprise security program, including endpoint detection and response, vulnerabilitymanagement, zero trust workflows, data loss prevention, and more. Be More ❯
security certifications (ISO 27001, SOC 2) and drive initiatives for future certifications (e.g., ISO 22301, DORA). Direct regular security audits, risk assessments, and vulnerability analyses, ensuring that findings are addressed effectively and efficiently. Lead security incident response efforts, including complex investigations and remediation, and develop robust incident response … in the regulatory landscape. Establish and maintain security awareness training programs, promoting a strong security culture across the organization. Oversee the design, implementation, and management of security systems and technologies, ensuring their effectiveness and integration. Collaborate with Engineering, Product, and other departments to integrate security into the software development … etc.), application security, and DevSecOps practices is a significant plus. Proven experience in developing and implementing security strategies and programs. Extensive experience with risk management, security audits, and vulnerability management. Excellent leadership, communication, and interpersonal skills, with the ability to influence and collaborate across all levels of the More ❯
NSX-T. Configure and maintain Linux (Ubuntu preferred) and Windows OS environments, including Active Directory. Implement security best practices, system hardening (CIS benchmarks), and vulnerabilitymanagement using Nessus. The Person: You should have experience in cloud infrastructure within defence, MOD, or government environments. Essential skills include: VMware Cloud … Foundation Core (vSphere, vCenter, vSAN, NSX-T). Experience with hyper-converged infrastructure (preferably Dell vXrail). Security hardening, compliance, and vulnerability scanning. Understanding of ITIL service management. Strong problem-solving and interpersonal skills to work directly with customers and stakeholders. Security Clearance: SC clearance required DV clearance beneficial More ❯