Strategic Resources European Recruitment Consultants Ltd
MAIN ACTIVITIES: Implement Critical Requirements: Ensure compliance with CR GR SSI 001, CR GR SSI 023, GS EP INS 135, and L2-OPS-17-001 across all assets. Incident Management: Review, investigate, mitigate, and resolve cybersecurity incidents, anomalies, and threats promptly. Cyber Security Road Map: Assist in delivering key activities and act as a delegate for the Lead Cyber … out UK government cybersecurity self-assessment reports. Solution Support: Roll out HQ security solutions, including administration and troubleshooting. Audits: Conduct site audits, recommend improvements, and track actions to completion. VulnerabilityManagement: Manage the client industrial cybersecurity vulnerability process and ensure timely patching. Training: Develop and maintain industrial cybersecurity training materials and competence procedures. Emergency Response: Create and … REQUIREMENTS: Essential Qualifications/Knowledge Required: Education: Relevant degree in Instrumentation and Controls, Computer Science, or Cyber Security. Experience: Prior relevant industry experience. Knowledge: Understanding of offshore operations, project management, and UK industry regulations. Expertise: In-depth understanding of IEC/ISA 62443 and OG-86. Management Skills: Experience managing contractors, vendors, and service providers. Communication: Effective communicator More ❯
advancements in managed file transfer technologies, recommending enhancements or upgrades Provide technical support and guidance to end-users, assisting with file transfer-related inquiries and issues Perform patching and vulnerability fixes on Globalscape servers Essential Skills & Experience: Proven experience as a Globalscape MFT Developer or Administrator, with a strong understanding of managed file transfer concepts and technologies Knowledge of … patching and vulnerabilitymanagement in Globalscape servers Proficiency in scripting languages such as PowerShell, Python, or VBScript for automation and customization In-depth knowledge of file transfer protocols: FTP, SFTP, FTPS, AS2, HTTP/S Familiarity with security concepts including encryption, digital certificates, SSL/TLS, and access controls Experience integrating file transfer systems with enterprise applications, databases … with occasional on-call and after-hours support as required Desirable Skills: Experience in export control work Experience with Sterling or other middleware technologies Familiarity with ServiceNow tool Project management experience More ❯
expertise to strengthen the firm's security posture. Key responsibilities: Lead and support security incident response, including investigation, containment, and remediation. Deploy, manage, and continuously improve security tools, including vulnerabilitymanagement, identity management, and attack surface monitoring. Analyse emerging threats and vulnerabilities, leveraging threat intelligence to proactively mitigate risks Perform proactive threat hunting, research, and analysis, delivering More ❯
expertise to strengthen the firm's security posture. Key responsibilities: Lead and support security incident response, including investigation, containment, and remediation. Deploy, manage, and continuously improve security tools, including vulnerabilitymanagement, identity management, and attack surface monitoring. Analyse emerging threats and vulnerabilities, leveraging threat intelligence to proactively mitigate risks Perform proactive threat hunting, research, and analysis, delivering More ❯
hardware refreshes, system migrations, and software deployments. Cyber Security Act as a first responder to security incidents-triaging alerts, containing threats, and escalating to our SOC where appropriate. Support vulnerabilitymanagement through patching, configuration management, and reporting. Assist with endpoint detection and response (EDR) tools and threat monitoring platforms (e.g., Microsoft Defender for Endpoint). Work alongside More ❯
mid-size enterprises to household-name multinationals (ranging from 1,000 to 100,000+ employees). What You’ll Do: Assist with IT and cybersecurity consultancy projects including patching, vulnerabilitymanagement, automation, and transformation. Troubleshoot OS-level issues (Windows/macOS/Linux) and document solutions. Apply security best practices and problem-solving skills to customer challenges. Write … OS administration and troubleshooting. Knowledge of basic security principles (e.g. IAM, encryption). Scripting skills in Python, Bash, or PowerShell (essential). Understanding of networking fundamentals and patch/vulnerability management. Desirable: Exposure to Tanium or similar endpoint management tools, and automation with Ansible. What’s On Offer: Fully remote work £40k–£50k depending on experience 10% pension More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
writing a fuzzer for an undocumented network protocol or the grammar of a new programming language. Other responsibilities includes as below Scope and execute in-depth security assessments and vulnerability research across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to … for self-study, setting and achieving long term goals (for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances are not required, and active … or assisted review with code analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerabilitymanagement, risk assessments, bug bounty hunting, malware analysis, forensics OSCP, OSWE certification, or interest in achieving certification Experience navigating and working with extremely large codebases is also highly More ❯
with engineering, maintenance and central teams, you'll ensure robust protection of our electrical, automation, and industrial network systems. You'll also drive key initiatives like cyber hygiene programmes, vulnerability assessments, and network monitoring - keeping us ahead of threats and ready to respond. KEY RESPONSIBILITIES Ensure OT assets and industrial control systems are protected against cyber threats. Implement and … support cyber security tools and practices defined in our global OT Cyber Strategy. Lead cyber hygiene and vulnerabilitymanagement programmes, coordinating remediation where needed. Monitor OT network activity, detect insecure configurations or malicious activity, and take appropriate action. Own the site-level cyber incident response plan - coordinating with stakeholders and ensuring timely resolution. Support compliance efforts related to … and SCADA, and have strong knowledge of industrial networks. You have solid grounding in cyber security principles - TCP/IP, common protocols, OSI model, and cyber tooling such as vulnerability scanning, antivirus and endpoint protection. You can lead, influence and guide others - from site technicians to external contractors. You're confident working independently and as part of a broader More ❯
with engineering, maintenance and central teams, you'll ensure robust protection of our electrical, automation, and industrial network systems. You'll also drive key initiatives like cyber hygiene programmes, vulnerability assessments, and network monitoring - keeping us ahead of threats and ready to respond. KEY RESPONSIBILITIES Ensure OT assets and industrial control systems are protected against cyber threats. Implement and … support cyber security tools and practices defined in our global OT Cyber Strategy. Lead cyber hygiene and vulnerabilitymanagement programmes, coordinating remediation where needed. Monitor OT network activity, detect insecure configurations or malicious activity, and take appropriate action. Own the site-level cyber incident response plan - coordinating with stakeholders and ensuring timely resolution. Support compliance efforts related to … and SCADA, and have strong knowledge of industrial networks. You have solid grounding in cyber security principles - TCP/IP, common protocols, OSI model, and cyber tooling such as vulnerability scanning, antivirus and endpoint protection. You can lead, influence and guide others - from site technicians to external contractors. You're confident working independently and as part of a broader More ❯
strategies ️ Collaborating with internal teams to enhance incident response and improve threat detection capabilities ️ Producing detailed threat reports, including indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs) ️ Supporting vulnerabilitymanagement and assisting with the development of security posture recommendations What We're Looking For: ️ Proven experience as a Threat Intelligence Analyst or in a similar role within More ❯
knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • VulnerabilityManagement and Patching • SIEM principles, products and More ❯
knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • VulnerabilityManagement and Patching • SIEM principles, products and More ❯
critical for our Monetary Analysis, Forecasting, and Modelling activities. The Platform Engineer will focus on creating a self-service, scalable, and reliable platform that streamlines development workflows, simplifies infrastructure management, and enhances overall productivity. This role requires a strong understanding of cloud computing (specifically Azure), infrastructure-as-code (IaC), DevOps practices, containerisation, orchestration, and a passion for building developer … Security & Compliance: Implement security best practices and controls within the platform infrastructure and CI/CD pipelines. Ensure compliance with relevant security standards and regulations. Implement security scanning and vulnerabilitymanagement processes. Documentation & Support: Develop and maintain comprehensive documentation for the platform, including API documentation, user guides, and troubleshooting guides. Provide support to users of the platform. Collaboration … concepts and security best practices. Excellent problem-solving and troubleshooting skills. Strong communication and collaboration skills. Experience with Azure Databricks and its integration with platform tooling. Experience with configuration management tools like Ansible, Puppet, or Chef. Experience building and maintaining internal developer platforms. Experience working in a regulated industry (e.g., financial services). Azure certifications (e.g., Azure DevOps Engineer More ❯
critical for our Monetary Analysis, Forecasting, and Modelling activities. The Platform Engineer will focus on creating a self-service, scalable, and reliable platform that streamlines development workflows, simplifies infrastructure management, and enhances overall productivity. This role requires a strong understanding of cloud computing (specifically Azure), infrastructure-as-code (IaC), DevOps practices, containerisation, orchestration, and a passion for building developer … Security & Compliance: Implement security best practices and controls within the platform infrastructure and CI/CD pipelines. Ensure compliance with relevant security standards and regulations. Implement security scanning and vulnerabilitymanagement processes. Documentation & Support: Develop and maintain comprehensive documentation for the platform, including API documentation, user guides, and troubleshooting guides. Provide support to users of the platform. Collaboration … concepts and security best practices. Excellent problem-solving and troubleshooting skills. Strong communication and collaboration skills. Experience with Azure Databricks and its integration with platform tooling. Experience with configuration management tools like Ansible, Puppet, or Chef. Experience building and maintaining internal developer platforms. Experience working in a regulated industry (e.g., financial services). Azure certifications (e.g., Azure DevOps Engineer More ❯
Establish and manage the Working Age Services security posture and initiatives, ensuring the protection of information assets from internal and external threats. Develop, manage, and enhance the fraud risk management framework to minimize the department's exposure to fraud risks. Oversee the implementation, management, and proper utilization of security tools such as intrusion detection systems, vulnerabilitymanagement … and data encryption. Assess and manage the identification and mitigation plans of existing and emerging security threats, vulnerabilities, and risks. Maintain awareness in information security technologies and fraud risk management methodologies, applying best practices and driving knowledge through Working Age Services. Lead security awareness and education programs to encourage all employees to maintain a high level of vigilance. An More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Searchability®
Cyber Essentials Plus assessments, including practical remediation support (certification as a Cyber Essentials Plus Assessor or similar qualifications with the intention to certify is highly advantageous) Practical experience conducting vulnerability assessments across infrastructure, networks, and applications Working knowledge of threat and vulnerabilitymanagement platforms such as Qualys Strong written and verbal communication skills, with the ability to More ❯
Cyber Essentials Plus assessments, including practical remediation support (certification as a Cyber Essentials Plus Assessor or similar qualifications with the intention to certify is highly advantageous) Practical experience conducting vulnerability assessments across infrastructure, networks, and applications Working knowledge of threat and vulnerabilitymanagement platforms such as Qualys Strong written and verbal communication skills, with the ability to More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Searchability®
Cyber Essentials Plus assessments, including practical remediation support (certification as a Cyber Essentials Plus Assessor or similar qualifications with the intention to certify is highly advantageous) Practical experience conducting vulnerability assessments across infrastructure, networks, and applications Working knowledge of threat and vulnerabilitymanagement platforms such as Qualys Strong written and verbal communication skills, with the ability to More ❯
the Role: The Applications Engineer will be part of the Applications Squad, and is responsible for the installation, maintenance, support, and optimization of business applications. This role involves lifecycle management, troubleshooting issues, working closely with end-users, and collaborating with development teams to ensure seamless application performance. The role reports directly to the Applications LBPL, with cross-functional responsibilities … to members of the Applications Management Leadership Team, the IS Project Management Group and senior Business Sponsors. Service Offers: Project Management and Solution delivery for Applications Functional Consulting Services for Applications Application Support Services for Applications Lifecycle Management Services for Applications Principal Relationships (beyond the UK IS team): Application Vendors and 3rd Party Support Management … initiative to propose alternative solutions. Skills/Experience Essential Experience of installing, configuring and supporting applications and tools for enterprise Server administration on Linux/Windows System security e.g. vulnerabilitymanagement, SSL certificate renewal, application hardening/code review, application risk reviews, penetration testing, application patching and alert monitoring Knowledge of scheduling tools Familiarity with ERP & PLM systems More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Barclay Simpson
the root cause of incidents and deliver clear, comprehensive reports tailored for both technical and non-technical stakeholders, including Senior Leadership. Ensure Vulnerabilities highlighted by the CTI team or VulnerabilityManagement team are correctly triaged and if required prepare a remediation plan and ensure an incident is stood up to coordinate this including any required detection rules to More ❯
Practice Leads and technical specialists. This role requires true Operational Technology Consulting experience and exposure to/hands-on experience with Cisco Cyber Vision. Role Requirements Conduct cybersecurity and vulnerability criticality assessments of OT systems, categorising risks and recommending appropriate mitigation measures based on assessment findings. Benchmarking cybersecurity posture of OT environments against industry standards (e.g. ISA/IEC … SP 800-82, ONG-C2M2, and NERC-CIP. Technical Experience with: Cisco CyberVision or Claroty Security Orchestration, Automation, and Response (SOAR) platforms OT asset inventory and change detection tools Vulnerabilitymanagement solutions OT network and communications monitoring tools Familiarity with the Purdue Enterprise Reference Architecture (ISA-95) For more information or immediate consideration for this opportunity, please contact More ❯
London, England, United Kingdom Hybrid / WFH Options
CPS Group (UK) Limited
Practice Leads and technical specialists. This role requires true Operational Technology Consulting experience and exposure to/hands-on experience with Cisco Cyber Vision. Role Requirements Conduct cybersecurity and vulnerability criticality assessments of OT systems, categorising risks and recommending appropriate mitigation measures based on assessment findings. Benchmarking cybersecurity posture of OT environments against industry standards (e.g. ISA/IEC … SP 800-82, ONG-C2M2, and NERC-CIP. Technical Experience with: Cisco CyberVision or Claroty Security Orchestration, Automation, and Response (SOAR) platforms OT asset inventory and change detection tools Vulnerabilitymanagement solutions OT network and communications monitoring tools Familiarity with the Purdue Enterprise Reference Architecture (ISA-95) For more information or immediate consideration for this opportunity, please contact More ❯
Warwick, Warwickshire, West Midlands, United Kingdom
Tata Technologies Europe Ltd
Automotive SPICE (ASPICE) process framework, including systems engineering, software engineering, coding, and all levels of functional testing. Beyond core development, ESS also integrates critical supporting processes such as project management, risk assessment, functional safety, and cybersecurity, ensuring compliance with ASPICE standards and delivering reliable, secure, and high-quality embedded systems & solutions. The Role: The Junior Cybersecurity Engineer will support … secure software development lifecycle Ability to read and interpret system architecture and interface specifications Familiarity with Agile tools and methodologies (e.g., Jira, Confluence) Basic awareness of risk analysis and vulnerabilitymanagement Experience with version control systems (e.g., Git) for code management Understanding of cryptographic primitives and secure communication concepts Desirable: Awareness of standards such as ISO/… SAE 21434 and UNECE R155 Experience with CANoe, Wireshark, or other network diagnostic tools Exposure to security functions like Secure Boot, Secure Diagnostics, Key Management Understanding of backend/cloud security integrations (TLS, PKI, APIs) Familiarity with security testing, threat modelling, or attack tree tools Qualifications: Bachelors degree in computer science, Electronics, Electrical Engineering, Information Security, or equivalent Optional More ❯