security initiatives, influence secure design standards, and mentor colleagues in best practices. Key Responsibilities Lead application and cloud security initiatives, ensuring systems and software are secure by design. Drive vulnerabilitymanagement and implement a risk-based approach across the technology stack. Perform security testing (SAST, DAST, SCA) and work with developers to remediate findings. Support cloud security controls … hands-on experience in application and cloud security engineering. Deep understanding of web app vulnerabilities (OWASP Top 10, CWE) and secure coding practices. Proficiency with security testing tools and vulnerabilitymanagement platforms. Broad knowledge of network and infrastructure security concepts (WAFs, ACLs, VPNs, etc.). Familiarity with security frameworks and principles such as Zero Trust and risk-based More ❯
Crewe, England, United Kingdom Hybrid / WFH Options
DCS Technology
Security Analyst to play a key role in protecting our client’s systems, networks, and data. This is an exciting opportunity to lead on threat detection, incident response, and vulnerabilitymanagement , while driving continuous improvement across the organisation’s security posture. You’ll collaborate closely with infrastructure, development, and compliance teams to maintain high standards of cyber resilience … and uphold key frameworks such as ISO 27001 and Cyber Essentials Plus . Key Responsibilities: • Lead threat detection, incident response, and vulnerabilitymanagement activities • Strengthen cyber security posture across cloud, infrastructure, and applications • Provide expert guidance to development teams on secure SDLC practices • Maintain compliance with ISO 27001 and Cyber Essentials Plus standards • Mentor junior analysts and support More ❯
Crewe, Cheshire, England, United Kingdom Hybrid / WFH Options
DCS Recruitment
Security Analyst to play a key role in protecting our client's systems, networks, and data. This is an exciting opportunity to lead on threat detection, incident response, and vulnerabilitymanagement , while driving continuous improvement across the organisation's security posture. You'll collaborate closely with infrastructure, development, and compliance teams to maintain high standards of cyber resilience … and uphold key frameworks such as ISO 27001 and Cyber Essentials Plus . Key Responsibilities: * Lead threat detection, incident response, and vulnerabilitymanagement activities * Strengthen cyber security posture across cloud, infrastructure, and applications * Provide expert guidance to development teams on secure SDLC practices * Maintain compliance with ISO 27001 and Cyber Essentials Plus standards * Mentor junior analysts and support More ❯
West London, London, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
are effectively deployed, maintained and optimised, while driving efficiencies and ensuring secure, compliant infrastructure. This role requires a background and strong expertise in enterprise toolsets, automation technologies and patch management processes. Engagement via Umbrella Company Only; all taxes & NI deducted at source. General responsibilities Lead operations of enterprise tooling platforms including SCCM, Scorch, BMC, Ansible and MuleSoft. Define and … consistent monitoring, reporting and compliance dashboards are in up to date and in-place for patching and tooling. Work with security and governance teams to align patching schedules with vulnerabilitymanagement requirements. Provide operational reporting for Stakeholders, including compliance metrics. Manage vendor relationships and licensing agreements for tooling and middleware platforms. Required Skills & Experience Proven experience managing enterprise … operations tooling, middleware and patch management. Strong expertise with SCCM, Scorch, BMC, Ansible and MuleSoft platforms. Demonstrated experience in patch management, vulnerability remediation and compliance reporting. Hands-on knowledge of automation frameworks and orchestration platforms. ITIL Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built More ❯
Welwyn Garden City, England, United Kingdom Hybrid / WFH Options
PayPoint plc
development teams to optimize application performance and reliability • Maintain and improve backup, recovery, and disaster recovery procedures • Support incident response and root cause analysis for production issues • Manage configuration management and secrets management solutions • Optimize cloud resource utilization and cost management • Cover on-call rotation for production support (1 week out of 6) As well as making … improvements to: • Deployment automation and release management processes • Application and infrastructure monitoring and observability • Security scanning and vulnerabilitymanagement in pipelines • Performance optimization and capacity planning • Development team productivity through tooling and automation What we would like from you • Strong experience with CI/CD pipeline design and implementation (Azure DevOps, GitHub Actions) • Proficiency in Infrastructure as … great if you have the following • Experience with Azure DevOps administration • Knowledge of database deployment automation and migration strategies • Familiarity with microservices architecture and deployment patterns • Experience with API management and gateway solutions • Knowledge of network security and firewall management • Certification in Azure, AWS, or DevOps methodologies • Experience with chaos engineering and resilience testing • Familiarity with service mesh More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Love2shop
development teams to optimize application performance and reliability • Maintain and improve backup, recovery, and disaster recovery procedures • Support incident response and root cause analysis for production issues • Manage configuration management and secrets management solutions • Optimize cloud resource utilization and cost management • Cover on-call rotation for production support (1 week out of 6) As well as making … improvements to: • Deployment automation and release management processes • Application and infrastructure monitoring and observability • Security scanning and vulnerabilitymanagement in pipelines • Performance optimization and capacity planning • Development team productivity through tooling and automation What we would like from you • Strong experience with CI/CD pipeline design and implementation (Azure DevOps, GitHub Actions) • Proficiency in Infrastructure as … great if you have the following • Experience with Azure DevOps administration • Knowledge of database deployment automation and migration strategies • Familiarity with microservices architecture and deployment patterns • Experience with API management and gateway solutions • Knowledge of network security and firewall management • Certification in Azure, AWS, or DevOps methodologies • Experience with chaos engineering and resilience testing • Familiarity with service mesh More ❯
leadership role where you’ll shape the future of security assurance across our platforms and products. You’ll lead a talented team of engineers and architects, driving innovation in vulnerabilitymanagement, application security, and adversarial testing. This is a pivotal cyber leadership role within Tesco Technology, shaping how we secure our platforms and products. You’ll be at … stakeholders across Tesco Technology to embed security into everything we do. 🧠 What You’ll Bring: Proven leadership in large-scale security engineering environments. Deep technical expertise in application security, vulnerabilitymanagement, and adversarial testing. Experience with modern security tooling and secure development practices. Strong communication and stakeholder engagement skills. A strategic mindset with hands-on execution ability. 🌟 Why More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom Hybrid / WFH Options
Adroit People Limited (UK)
Greetings Greetings We are Hiring Lead Security Solution Architect(Privilege Password Management CyberArk ) Position in UK - Sheffield -JC: 106885 Client is looking for someone with strong ITSM knowledge Privilege Password Management CyberArk . Job Description Location: UK - Sheffield (Hybrid) Hybrid Model Job Profile – Lead Security Solution Architect Project Overview Client is working on a strategic Identity and Access … Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. Client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage … programme as subject matter expert. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
Lead Security Solution Architect Project Overview Client is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. Client is working on uplifting controls and capabilities in privileged access for the Group and introducing the … programme as subject matter expert. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Provides technical thought leadership to the Design Team and More ❯
Cyber Security Engineer CyberSec Engineer/IT Security Specialist – Disaster Recovery, Resilience Testing, CyberSec Improvements, Vulnerability Scanning/Management, Infrastructure, Nutanix, Commvault, VMware, Azure, PowerShell, Python; Law Firm, Permanent, London/Hybrid (3/2). £80k - £95k (On Experience) +Bonus +Benefits Global Low Firm seeks experienced Cyber Security Engineer/IT Security Specialist to join the IT … infrastructure tooling and at least one scripting language (PowerShell or Python preferred). Experience with Nutanix, VMware, Commvault, and hybrid cloud platforms Azure (preferred), AWS or GCP. Understanding of vulnerabilitymanagement, monitoring, and orchestration tools. Relevant certifications such as Microsoft SC-200, Certified Ethical Hacker (CEH), CBCP/CBCI or equivalent. We are open to receiving applications from More ❯
Engineer/DevOps Engineer with strong expertise in AWS, Terraform, Azure DevOps, and Apigee. The ideal candidate should have a solid background in cloud architecture, automation, and secure platform management, ensuring reliable and compliant deployments. This role involves developing, deploying, and maintaining scalable systems, managing upgrades, and applying robust security controls across CI/CD pipelines and infrastructure. Candidate … services using AWS ECS, ECR, and Fargate, ensuring scalable and secure microservice environments. Use Docker for containerizing applications and improving deployment consistency. Manage and secure Apigee or similar API Management platforms, ensuring API governance, performance optimization, and compliance. Ensure security and compliance best practices across the platform, including secure coding, dependency management, and vulnerability scanning. Implement and … libraries. Collaborate with security teams to align architecture with compliance standards. Prepare and maintain detailed documentation for builds, deployments, and updates. Required Skills Expertise in implementing secure coding and vulnerabilitymanagement practices. Strong knowledge of API security, OAuth, JWT, and API Gateway policies. Experience in security audits, monitoring, and incident remediation. Familiarity with compliance frameworks (e.g., ISO, SOC More ❯
Engineer/DevOps Engineer with strong expertise in AWS, Terraform, Azure DevOps, and Apigee. The ideal candidate should have a solid background in cloud architecture, automation, and secure platform management, ensuring reliable and compliant deployments. This role involves developing, deploying, and maintaining scalable systems, managing upgrades, and applying robust security controls across CI/CD pipelines and infrastructure. Candidate … services using AWS ECS, ECR, and Fargate, ensuring scalable and secure microservice environments. Use Docker for containerizing applications and improving deployment consistency. Manage and secure Apigee or similar API Management platforms, ensuring API governance, performance optimization, and compliance. Ensure security and compliance best practices across the platform, including secure coding, dependency management, and vulnerability scanning. Implement and … libraries. Collaborate with security teams to align architecture with compliance standards. Prepare and maintain detailed documentation for builds, deployments, and updates. Required Skills Expertise in implementing secure coding and vulnerabilitymanagement practices. Strong knowledge of API security, OAuth, JWT, and API Gateway policies. Experience in security audits, monitoring, and incident remediation. Familiarity with compliance frameworks (e.g., ISO, SOC More ❯
not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerabilitymanagement, identity & access management, and network security. Develop and manage project plans, milestones, risks, and budgets. Coordinate delivery across regional teams, ensuring consistency and practicality. Manage third … progress. Essential Skills & Experience Proven experience managing complex cyber security projects within multi-region or federated organisations. Strong technical understanding across key cyber domains within Microsoft environments. Excellent stakeholder management and communication skills. Familiarity with structured project management methodologies (e.g. PRINCE2, PMP, Agile). Relevant security certifications such as CISSP, CISM, CompTIA Security+, or AWS/Azure Security More ❯
not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerabilitymanagement, identity & access management, and network security. Develop and manage project plans, milestones, risks, and budgets. Coordinate delivery across regional teams, ensuring consistency and practicality. Manage third … progress. Essential Skills & Experience Proven experience managing complex cyber security projects within multi-region or federated organisations. Strong technical understanding across key cyber domains within Microsoft environments. Excellent stakeholder management and communication skills. Familiarity with structured project management methodologies (e.g. PRINCE2, PMP, Agile). Relevant security certifications such as CISSP, CISM, CompTIA Security+, or AWS/Azure Security More ❯
City of London, London, United Kingdom Hybrid / WFH Options
TRIA
not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerabilitymanagement, identity & access management, and network security. Develop and manage project plans, milestones, risks, and budgets. Coordinate delivery across regional teams, ensuring consistency and practicality. Manage third … progress. Essential Skills & Experience Proven experience managing complex cyber security projects within multi-region or federated organisations. Strong technical understanding across key cyber domains within Microsoft environments. Excellent stakeholder management and communication skills. Familiarity with structured project management methodologies (e.g. PRINCE2, PMP, Agile). Relevant security certifications such as CISSP, CISM, CompTIA Security+, or AWS/Azure Security More ❯
Horsforth, Leeds, West Yorkshire, England, United Kingdom
TPP (The Phoenix Partnership)
The role involves: • Managing, maintaining and upgrading enterprise server and storage hardware • Providing internal support for office hardware including, PCs, laptops, mobile devices (Windows OS, iOS, MacOS and Android) • Vulnerabilitymanagement using scanning tools such as Nessus • Remediation/automation of software rollout using Ninite/PDQ • Configuring and monitoring of Anti-virus software & Mobile Device Management • Firewall/Switch management - Configuration, patching and upgrading • Administering Microsoft Active Directory, Exchange Server & Office 365 • Achieving recognised Cyber Security accreditation • Management of video conferencing • Management of enterprise level phone system • Monitoring and managing the availability and scalability of resources, including CPU usage, disk usage and storage systems including network troubleshooting • Continuously improving and keeping up More ❯
of Security Operations. At least three years of Linux Administration. At least two years of Cloud (AWS or Azure) Administration. Must-Have Skills Linux and Windows OS. DNS. Certificate Management: Digicert, AppViewX. Experience with ticket management solutions: Dynamics 365, ServiceNow, Remedy, etc. Experience with PMO tools such as Jira, Smartsheet, Monday.com, etc. Microsoft O365 products (Excel, PowerPoint, etc. … . SEIM and SOAR technologies (Splunk, Cribl, Azure Sentinel). Configure and troubleshoot EDR/Microsoft Defender for Endpoint, vulnerabilitymanagement, and threat detection systems, with focus on Linux OS. Azure Security Center and Office365 Compliance Portal. AWS and Azure (IAM, IaaS, PaaS). Knowledge in KQL queries in Sentinel and/or SPL in Splunk for developing More ❯
of Security Operations. At least three years of Linux Administration. At least two years of Cloud (AWS or Azure) Administration. Must-Have Skills Linux and Windows OS. DNS. Certificate Management: Digicert, AppViewX. Experience with ticket management solutions: Dynamics 365, ServiceNow, Remedy, etc. Experience with PMO tools such as Jira, Smartsheet, Monday.com, etc. Microsoft O365 products (Excel, PowerPoint, etc. … . SEIM and SOAR technologies (Splunk, Cribl, Azure Sentinel). Configure and troubleshoot EDR/Microsoft Defender for Endpoint, vulnerabilitymanagement, and threat detection systems, with focus on Linux OS. Azure Security Center and Office365 Compliance Portal. AWS and Azure (IAM, IaaS, PaaS). Knowledge in KQL queries in Sentinel and/or SPL in Splunk for developing More ❯
City of London, London, United Kingdom Hybrid / WFH Options
MFK Recruitment
and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. … and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerabilitymanagement, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement More ❯
and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. … and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerabilitymanagement, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
MFK Recruitment
and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. … and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerabilitymanagement, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Travelfusion
and security alerts for suspicious activity and potential security breaches. Incident Response: Act as a first responder to security incidents, investigating breaches, containing threats and helping to restore systems. VulnerabilityManagement: Conduct regular vulnerability assessments and penetration tests to identify weaknesses in systems and implement necessary improvements. Security Implementation: Improve Security measures. Data Protection & Compliance: Ensure that … Mindset: The ability to analyzs large amounts of data to identify anomalies and potential risks. Technical Proficiency: Knowledge of operating systems, firewalls, encryption, VPNs and security information and event management (SIEM) systems. Attention to Detail: Meticulous in reviewing data and systems to catch even minor security flaws. Strong Communication: Ability to clearly communicate findings and recommendations to both technical More ❯
and security alerts for suspicious activity and potential security breaches. Incident Response: Act as a first responder to security incidents, investigating breaches, containing threats and helping to restore systems. VulnerabilityManagement: Conduct regular vulnerability assessments and penetration tests to identify weaknesses in systems and implement necessary improvements. Security Implementation: Improve Security measures. Data Protection & Compliance: Ensure that … Mindset: The ability to analyzs large amounts of data to identify anomalies and potential risks. Technical Proficiency: Knowledge of operating systems, firewalls, encryption, VPNs and security information and event management (SIEM) systems. Attention to Detail: Meticulous in reviewing data and systems to catch even minor security flaws. Strong Communication: Ability to clearly communicate findings and recommendations to both technical More ❯
maintain compliance through practical Consulting and Managed Services. Our suite of services blends together best-in-breed technologies to provide real time 24×7 monitoring, triage, remediation, threat assessment, vulnerabilitymanagement, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our Security Operations Centre (SOC) delivers an array of services … to maintain or improve the levels of service. Collaboration with the Customer at both technical and business levels to underpin the activities of sub-contractors or service provisioning teams. Management of small enhancement projects utilising capabilities within the service team. Management of the handling of incidents, problems and change in their area of service. Preparation of service delivery … improve levels of service. Monitoring of performance, collection of performance data and investigation of problems and trends. Resolution or escalation of problems, implementation of service improvement actions and programmes, management of these to agreed timelines and ownership of communication to both the Customer and internal management teams. Provision of feedback on service portfolio components based on industry trends More ❯
Why we need this role? This role is critical to protecting both internal telecom infrastructure and customer-facing security services. It ensures the secure deployment and management of technologies across backbone, edge, and cloud environments, while supporting the delivery and integration of managed security solutions for customers. The role plays a key part in incident response, vulnerabilitymanagement … to secure IP/MPLS transport, SDN platforms, automation tools, and cloud workloads. Monitor and analyse security events and alerts, responding to incidents and escalating as appropriate. Assist with vulnerability assessments, patch management validation, and configuration hardening. Document and maintain infrastructure security standards, configurations, and runbooks. Support & Collaboration: Participate in security incident response, root cause analysis, and remediation … IP, routing, firewalls, VPN, and network segmentation principles. Hands-on experience with security tools such as firewalls (Fortinet, Palo Alto, etc.), SIEM/SOAR, IDS/IPS, EDR, or vulnerability scanners. Familiarity with Linux, scripting (Python, Bash), and infrastructure-as-code concepts. Knowledge of secure configuration standards (e.g., CIS benchmarks) and common protocols (e.g., BGP, DNS, SNMP). Experience More ❯