our enterprise client's security is of paramount concern. Main tasks and responsibilities: Provide expertise on resolution that requires a higher level of resolution. Assist with Problem and Change management support for the resolution of incidents. Proactively identify opportunities of improvement from a technical perspective. Perform threat management, threat modelling, identify threat vectors and develop use cases for … security monitoring Pre-requisites: Experience of 9-12 years in advanced security technologies Strong security professional skilled in Security Information and Event Management (SIEM), VulnerabilityManagement and Security Intelligence, IDAM, Digital Rights Management (DRM), Anti-APT, Data Leak Prevention (DLP), Phishing simulation tools etc Further info: Competitive Basic/day rate London To apply: Please either More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Techwaka
with stakeholders to maintain compliance with industry standards such as ISO27001, Cyber Essentials Plus, PCI/DSS Stay ahead of cyber threats, maintaining and improving security monitoring and risk management processes Support vulnerabilitymanagement, penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks More ❯
Horsforth, Leeds, West Yorkshire, England, United Kingdom
TPP (The Phoenix Partnership)
The role involves: • Managing, maintaining and upgrading enterprise server and storage hardware • Providing internal support for office hardware including, PCs, laptops, mobile devices (Windows OS, iOS, MacOS and Android) • Vulnerabilitymanagement using scanning tools such as Nessus • Remediation/automation of software rollout using Ninite/PDQ • Configuring and monitoring of Anti-virus software & Mobile Device Management • Firewall/Switch management - Configuration, patching and upgrading • Administering Microsoft Active Directory, Exchange Server & Office 365 • Achieving recognised Cyber Security accreditation • Management of video conferencing • Management of enterprise level phone system • Monitoring and managing the availability and scalability of resources, including CPU usage, disk usage and storage systems including network troubleshooting • Continuously improving and keeping up More ❯
Trust in digital transactions and financial technologies is crucial for the smooth functioning of modern society. Neelam Kadbane, our next pathbreaker, Senior Vulnerability Analyst at Mastercard, identifies and addresses security vulnerabilities within Mastercard's environment & products by conducting network penetration tests. Neelam talks to Shyam Krishnamurthy fromThe Interview Portal about the innumerable challenges and the satisfacation of her work … . It was a significant achievement for me, especially since it's rare for companies to hire freshers directly into the InfoSec domain. At Qualys, I worked with the VulnerabilityManagement team, where we researched new CVEs and zero-day vulnerabilities, and developed signatures for vulnerability scanners. A zero-day vulnerability is a security flaw in … software or hardware that is unknown to the vendor or developer. Since the vendor is unaware of the vulnerability, no patch or fix is available, making it highly dangerous. The term "zero-day" comes from the fact that once the vulnerability is discovered by malicious actors, the vendor has zero days to fix it before it can be More ❯
ready to step up, guide analysts, and model high-integrity InfoSec practice What you’ll be doing: GRC ownership: maintain ISO27001 and SOC2 certifications, policies, and the Information Security Management System Third-party risk management: oversee supplier assessments, support junior analysts, and guide reviews via Panorays Security awareness & training: manage phishing simulations and content using Proofpoint Security architecture … Head of InfoSec when required Project support: direct InfoSec involvement in the U.S. banking expansion and business unit reviews Tech & tools you’ll use: Protecht – Enterprise risk and audit management Panorays – Third-party risk tooling Rapid7/Armis – Vulnerabilitymanagement and threat detection Proofpoint – Phishing and awareness platform Microsoft Purview – Data governance and compliance Azure & AWS – Cloud More ❯
ready to step up, guide analysts, and model high-integrity InfoSec practice What you’ll be doing: GRC ownership: maintain ISO27001 and SOC2 certifications, policies, and the Information Security Management System Third-party risk management: oversee supplier assessments, support junior analysts, and guide reviews via Panorays Security awareness & training: manage phishing simulations and content using Proofpoint Security architecture … Head of InfoSec when required Project support: direct InfoSec involvement in the U.S. banking expansion and business unit reviews Tech & tools you’ll use: Protecht – Enterprise risk and audit management Panorays – Third-party risk tooling Rapid7/Armis – Vulnerabilitymanagement and threat detection Proofpoint – Phishing and awareness platform Microsoft Purview – Data governance and compliance Azure & AWS – Cloud More ❯
work as part of a team providing a range of capabilities and may operate across one or more contexts including the following: Hosting environments and landing zone management. Security, management, governance and automation of DfE's centrally managed hosting environments and cloud landing zones. Includes design, build, operate and maintain core cloud computing IT infrastructure services, ensuring that they … and that they continue to meet requirements. Managed infrastructure service. Build, operate & maintain cloud and on-premises infrastructure resources for business applications. Updates and patching, back-up & restore, security vulnerabilitymanagement, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing IT infrastructure products, services or processes … Service (PaaS), and Infrastructure as a Service (IaaS) so that the Department and its partners can embrace the government's Cloud First policy. Create and sustain modern deployment and management standards, practices, and techniques for our cloud resources. Lead, support, coach, and mentor less experienced Infrastructure Engineers in managing, supporting and maintaining the Department's infrastructure. Advocate user-centric More ❯
work as part of a team providing a range of capabilities and may operate across one or more contexts including the following: Hosting environments and landing zone management. Security, management, governance and automation of DfE's centrally managed hosting environments and cloud landing zones. Includes design, build, operate and maintain core cloud computing IT infrastructure services, ensuring that they … and that they continue to meet requirements. Managed infrastructure service. Build, operate & maintain cloud and on-premises infrastructure resources for business applications. Updates and patching, back-up & restore, security vulnerabilitymanagement, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing IT infrastructure products, services or processes … Service (PaaS), and Infrastructure as a Service (IaaS) so that the Department and its partners can embrace the government's Cloud First policy. Create and sustain modern deployment and management standards, practices, and techniques for our cloud resources. Lead, support, coach, and mentor less experienced Infrastructure Engineers in managing, supporting and maintaining the Department's infrastructure. Advocate user-centric More ❯
work as part of a team providing a range of capabilities and may operate across one or more contexts including the following: Hosting environments and landing zone management. Security, management, governance and automation of DfE's centrally managed hosting environments and cloud landing zones. Includes design, build, operate and maintain core cloud computing IT infrastructure services, ensuring that they … and that they continue to meet requirements. Managed infrastructure service. Build, operate & maintain cloud and on-premises infrastructure resources for business applications. Updates and patching, back-up & restore, security vulnerabilitymanagement, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing IT infrastructure products, services or processes … Service (PaaS), and Infrastructure as a Service (IaaS) so that the Department and its partners can embrace the government's Cloud First policy. Create and sustain modern deployment and management standards, practices, and techniques for our cloud resources. Lead, support, coach, and mentor less experienced Infrastructure Engineers in managing, supporting and maintaining the Department's infrastructure. Advocate user-centric More ❯
work as part of a team providing a range of capabilities and may operate across one or more contexts including the following: Hosting environments and landing zone management. Security, management, governance and automation of DfE's centrally managed hosting environments and cloud landing zones. Includes design, build, operate and maintain core cloud computing IT infrastructure services, ensuring that they … and that they continue to meet requirements. Managed infrastructure service. Build, operate & maintain cloud and on-premises infrastructure resources for business applications. Updates and patching, back-up & restore, security vulnerabilitymanagement, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing IT infrastructure products, services or processes … Service (PaaS), and Infrastructure as a Service (IaaS) so that the Department and its partners can embrace the government's Cloud First policy. Create and sustain modern deployment and management standards, practices, and techniques for our cloud resources. Lead, support, coach, and mentor less experienced Infrastructure Engineers in managing, supporting and maintaining the Department's infrastructure. Advocate user-centric More ❯
role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems and resolving … security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of … make an impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, VulnerabilityManagement, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
currently working with a leading organisation seeking an experienced Infrastructure Engineer to join their Workspace & Infrastructure team. This role offers the opportunity to take ownership of image builds, patch management, and vulnerability remediation across a diverse end-user estate. The successful candidate will work with technologies such as SCCM, Intune, Autopilot, and Jamf while collaborating closely with Infosec … and other IT teams to maintain a secure and efficient desktop environment. Key Responsibilities: Build, test, and maintain Windows 11 and Mac OS images Manage patching and vulnerability remediation across end-user devices Administer and maintain SCCM, Intune, Autopilot, and Jamf platforms Update image drivers and assist with transitions into BAU support Work closely with Infosec to ensure workspace … vulnerabilities are addressed Resolve incidents related to OS images, packaged and non-packaged applications, and anti-virus alerts Process new hardware requests, ensuring correct imaging, application deployment, and asset management Skills & Experience: Strong hands-on experience with SCCM, Intune, Autopilot, and Windows 10/11 PowerShell and VBScript knowledge Experience with Bitlocker and vulnerabilitymanagement Excellent communication More ❯
location to perform storytelling. You will • Work with reporting and AI tools such as PowerBI and Databricks to produce insights from a range of cyber security tools such as vulnerabilitymanagement, identity management, detection and response and other cyber security tools to drive cyber security position. • Meet with managers and stakeholders regularly to understand and deliver and More ❯
Cyber Security Operations Manager to lead our Cyber Security Operations Centre; responsible for managing the day-to-day operations of the SOC team, overseeing incident detection and response, ensuring vulnerability scanning and remediation efforts across the organization. Role Overview: Job Title: SOC Manager/Cyber Security Operations Manager Location: Leeds/England/Remote Contract Type: Contract Duration … in Cybersecurity, Information Technology, or a related field (Master’s preferred). Minimum 5 years of experience in cybersecurity operations, with at least 2 years in a leadership or management role. Strong knowledge of SOC operations, incident response, and vulnerabilitymanagement best practices. Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel), vulnerability scanners (e.g. More ❯
and compliance with relevant laws, regulations, and industry best practices. Additionally, the role encompasses continuous monitoring, threat detection, and incident investigation to protect organisational assets, as well as leading vulnerabilitymanagement activities such as scanning, assessment, remediation coordination, and tracking of security weaknesses. About us We are Public Health Wales - the national public health agency in Wales. Our … technologies Experience Essential oDemonstrated experience in cyber security role(s). oGood understanding and experience with application and network security. oHands-on experience with SIEM (Security Information and Event Management) systems and vulnerability scanning tools oInvolvement in creating training materials, including phishing simulation exercises. . oExperience in providing technical/security support. Desirable oCloud Security experience (e.g Azure More ❯
cycles for cybersecurity solutions including prospecting, solution positioning, negotiation, and closure. Develop and execute strategic account plans for key enterprise clients, aligning cybersecurity solutions to their business and risk management goals. Build relationships with C-level executives (CISOs, CIOs, CTOs) and key stakeholders to uncover pain points and promote solution value. Apply solution selling and consultative selling methodologies to … sales, with at least 5+ years focused specifically on cybersecurity. Proven success in consistently achieving or surpassing million-plus euro quotas. Deep knowledge of cybersecurity domains including: Identity & Access Management Attack Surface Management Threat Intelligence & Digital Risk Protection VulnerabilityManagement Pen Testing & Red Teaming Strong understanding of security buyer personas and complex procurement processes. Excellent verbal More ❯
systems, subsystems, products and external interfaces, and may include a mixture of operational cybersecurity functions and governance, risk and compliance (GRC) activities. Key responsibilities include: Perform systems security risk management activities, including identifying security threats, analysing the risk exposure and presenting treatment options to mitigate security risk. Conduct asset management including maintaining accurate inventories of all hardware and … software configuration items. Maintain change management, through evaluation of system changes for cybersecurity impact and updating any affected security authorisation artefacts. Perform vulnerabilitymanagement, including conducting automated vulnerability scans, using the provided toolset, to identify any open vulnerabilities and ensure they are appropriately documented, tracked and remediated in the given timeframes. Present cybersecurity solutions to non More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
activities, including incident monitoring and response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits. Gap Assessments: Facilitate and/or conduct internal gap assessments and audit readiness … of compliance processes. Audit Findings: Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security Monitoring: Use tools such as … and implementing recommendations to improve the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. VulnerabilityManagement: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong expertise in audit and compliance More ❯
is represented in commercial proposals, assurance processes, and delivery planning. Maintain strong relationships with relevant external stakeholders (e.g. NCSC, NPSA), monitoring threat intelligence and security guidance. Operational Security & Risk Management Lead the design, implementation, and monitoring of controls across endpoint security, identity and access management, and cloud infrastructure (e.g., AWS). Own and improve the incident response framework … continuity planning. Run regular tabletop exercises and scenario testing to ensure operational preparedness for cyber-attacks and disruptions. Support secure architecture and infrastructure reviews across projects and services. Risk Management & Security Engineering Conduct and lead structured technical and procedural risk assessments, including threat modelling and security reviews for new projects or systems. Collaborate with IT and engineering teams to … identify, address, and continuously improve security control effectiveness. Oversee the management of external security assessments and ensure remediation plans are executed effectively. Maintain relevant security certifications such as Cyber Essentials/Plus and support the business in aligning with broader security frameworks (e.g., NIST CSF, CIS Controls). Awareness & Security Culture Lead internal training, briefings and onboarding sessions to More ❯
Bedford, Bedfordshire, England, United Kingdom Hybrid / WFH Options
Reed Talent Solutions
advice to the organisation, ensuring compliance with appropriate regulations and, generally, on information risk Experience of optimising security and IAM toolsets – including antivirus (Windows Defender), Office 365 Security & Compliance, vulnerabilitymanagement and patching. Entra ID management and improvements. Understanding of a broad range of security tools using Microsoft security tooling where possible, including but not limited to … to date with changes in cybersecurity and IAM improvements in technologies. Build and maintain methodology and technology used to implement Identity Governance and Administration (IGA) and Identity and Access Management (IAM) systems including SSO. MFA, Provisioning/Reconciliation, Federations, Access reviews. In-depth knowledge of multifactor authentication (MFA) architectures, Role-based Access Control (RBAC) and Attribute-based access control … cybersecurity audit findings and recommendations. Ability to work independently and as part of a team when required. Work collaboratively within Infrastructure Services and other IT functions to ensure effective management and delivery of Security and Identity and Access Management services. Provide a clear documentation for services and projects. You will need to demonstrate the following skills and experience More ❯
secure design interventions - by adding capacity and capability to the team. Reports to: Senior Manager - Secure Design Key Relationships Business Aligned Principal Security Architects CyberSecurity Engineering CyberSecurity Testing and VulnerabilityManagement Cloud Security Identity Management Security Architecture Design Forum (member) Project teams BISOs Key Responsibilities Develop Security Architecture Design Patterns and Standards to comply with group security … information security, as needed. Contributes to the development of metrics and their monitoring to report the effectiveness and efficiency of the Security Architecture function. Contributes to the content and management of the Security Architecture intranet presence. Team Responsibilities Guiding and mentoring other team members as required Deputising for Senior Manager - Secure Design when required Critical Deliverables Developing and prioritising … and reporting of metrics for the Secure Design team, within the broader Security Architecture function Impact This is a group-wide role which is key to effective and efficient management of security risks associated with business technology systems. The success of the post holder will be in balancing the major aspects of the role: the ability to work effectively More ❯
cyber security leadership role within complex, high-security environments. In-depth understanding of the current security landscape and cyber security consulting principles. Strong experience managing cyber security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity management and federation, firewalls, SIEM, vulnerability scanning … and cryptography. Experience overseeing incident response, vulnerabilitymanagement, and security service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable guidance for stakeholders at all levels. Skilled in relationship management, with the confidence to challenge and influence suppliers to ensure security outcomes are realistic, achievable, and deliver value for money. This More ❯
cyber security leadership role within complex, high-security environments. In-depth understanding of the current security landscape and cyber security consulting principles. Strong experience managing cyber security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity management and federation, firewalls, SIEM, vulnerability scanning … and cryptography. Experience overseeing incident response, vulnerabilitymanagement, and security service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable guidance for stakeholders at all levels. Skilled in relationship management, with the confidence to challenge and influence suppliers to ensure security outcomes are realistic, achievable, and deliver value for money. This More ❯
Cyber Threat Intelligence & Vulnerability Lead £65,000 GBP 10% bonus + £7,000 DV Clearance Bonus (once obtained) Hybrid WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Location: Leeds, UK (100% office-based) Salary: up to £65,000 + 10% bonus + £7,000 DV clearance bonus once obtained. Security Clearance Required … to shape the future of cyber defence in a role that demands technical excellence, strategic thinking, and strong leadership. What You'll Be Doing As the Cyber Threat Intelligence & Vulnerability Lead, you will: Oversee the detection, triage, and reporting of cyber threats and vulnerabilities. Deliver high-quality intelligence and vulnerability reports on time, every time. Select and monitor … PIRs) and collection plans. Ensure all processes are documented, reviewed, and continuously improved. Provide expert analysis, context, and forward-looking threat assessments. Drive the maturity of threat intelligence and vulnerability functions. Lead and mentor a high-performing team, ensuring consistent delivery even during reduced capacity. What We're Looking For Technical Expertise 5+ years in threat intelligence, vulnerabilityMore ❯
is for you. What you will do: Develop and implement proactive security strategies, policies, and procedures to protect our systems, networks, and data assets. Lead regular security assessments, including vulnerability scans and penetration tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents … the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong capability … in risk assessment, vulnerabilitymanagement, and data informed decision-making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in scripting and programming (i.e., Python More ❯