strategy and transformation Knowledge of key frameworks and standards such as NIST CSF, ISO27001, GDPR, NIS2, or NCSC CAF Practical expertise in areas such as GRC, security architecture, threat management, or vulnerabilitymanagement Excellent communication skills with the ability to influence a wide range of stakeholders Proven project management and delivery experience in complex client environments More ❯
london, south east england, united kingdom Hybrid / WFH Options
Anson McCade
strategy and transformation Knowledge of key frameworks and standards such as NIST CSF, ISO27001, GDPR, NIS2, or NCSC CAF Practical expertise in areas such as GRC, security architecture, threat management, or vulnerabilitymanagement Excellent communication skills with the ability to influence a wide range of stakeholders Proven project management and delivery experience in complex client environments More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Anson McCade
strategy and transformation Knowledge of key frameworks and standards such as NIST CSF, ISO27001, GDPR, NIS2, or NCSC CAF Practical expertise in areas such as GRC, security architecture, threat management, or vulnerabilitymanagement Excellent communication skills with the ability to influence a wide range of stakeholders Proven project management and delivery experience in complex client environments More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Anson McCade
strategy and transformation Knowledge of key frameworks and standards such as NIST CSF, ISO27001, GDPR, NIS2, or NCSC CAF Practical expertise in areas such as GRC, security architecture, threat management, or vulnerabilitymanagement Excellent communication skills with the ability to influence a wide range of stakeholders Proven project management and delivery experience in complex client environments More ❯
architecture, with a robust foundational understanding of Public Key Infrastructure (PKI), application development, and certificate usage. This position requires a well-rounded knowledge of security tooling, identity and access management (IAM) technologies, and a proven track record in designing and implementing scalable, secure architectures. The successful candidate will collaborate closely with application development teams to identify use cases and … requirements Enterprise Architecture Development : Develop, maintain, and document PKI use cases for implementation onto a CyberArk/Venafi PKI platform. Security and PKI Expertise : Leverage knowledge of PKI, certificate management, and cryptographic protocols to design secure systems and guide application teams in the effective use of digital identities and certificates. Collaboration and Integration : Work closely with cross-functional application … Master's degree preferred. Minimum of 3 years of experience as an enterprise architect or in a closely related architectural role. Strong foundational understanding of PKI infrastructure, certificate lifecycle management, and secure key management practices. Hands-on experience with application development and deployment in enterprise environments (e.g., Java, .NET, Python, or similar platforms). Demonstrated knowledge of certificate More ❯
in cybersecurity 3+ years of experience in systems, network, or cloud administration Proven track record in IT networking, network security, cloud infrastructure, and SaaS tools Background in risk and vulnerabilitymanagement Strong written and verbal communication skills in English Experience building relationships in a professional, client-facing context Technical Skills: Network Security: Deep knowledge of network architectures, firewalls … and honeypots. Cloud Security: Understanding of cloud platform security measures (AWS, Azure, etc.) Security Frameworks: Advanced knowledge of frameworks such as MITRE ATT&CK, NIST, etc. Consulting Skills: Risk Management: Ability to assess, prioritize, and manage security risks aligned with client needs Strategic Planning: Capable of developing and executing end-to-end security strategies Communication: Strong ability to convey … complex security concepts to non-technical audiences Problem-Solving: Analytical mindset with a proactive approach to identifying and resolving issues Project Management: Skilled in managing and delivering on technical security projects Client Relationship Management: Adept at maintaining long-term client partnerships through trust and value delivery Training & Mentoring: Able to educate junior staff and clients on cybersecurity best More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
NTT Global Data Centers EMEA UK ltd
As our Information Security Management Specialist (m/f/d) , you'llprovide experienced support in the implementation and management of the Information Security Management System (ISMS) framework in alignment of current ISO 27001 standard and guidelines. With a focus on cybersecurity, this role involves leading risk assessments, ensuring alignment with industry standards and regulations, and following … systems are assessed against Information Security criteria and operate in compliance with the instructional Information Security documentation. Conduct company-wide gap assessment of ISMS clauses and control implementation. Ensure vulnerabilitymanagement, tracking and reporting. Collaborate with the IT department to set Information security standard for Cyber Security Support in preparing management Information Security reports and dashboards. Review … Multilingual skills are an advantage. Skilled proficiency in conducting risk assessments, analyzing security controls, and policy management. Excellent communication and interpersonal skills for collaborating with various stakeholders. Strong project management skills for handling security initiatives. Strong familiarity with aspects related to information security. Strong knowledge of ISO 27001 and further relevant standards. What we offer you An agile company More ❯
As our Information Security Management Specialist (m/f/d) , you'll provide experienced support in the implementation and management of the Information Security Management System (ISMS) framework in alignment of current ISO 27001 standard and guidelines. With a focus on cybersecurity, this role involves leading risk assessments, ensuring alignment with industry standards and regulations, and … systems are assessed against Information Security criteria and operate in compliance with the instructional Information Security documentation. Conduct company-wide gap assessment of ISMS clauses and control implementation. Ensure vulnerabilitymanagement, tracking and reporting. Collaborate with the IT department to set Information security standard for Cyber Security Support in preparing management Information Security reports and dashboards. Review … Multilingual skills are an advantage. Skilled proficiency in conducting risk assessments, analyzing security controls, and policy management. Excellent communication and interpersonal skills for collaborating with various stakeholders. Strong project management skills for handling security initiatives. Strong familiarity with aspects related to information security. Strong knowledge of ISO 27001 and further relevant standards. What we offer you An agile company More ❯
HP2, Hemel Hempstead, Hertfordshire, United Kingdom
NTT Ltd Group Services United Kingdom Limited
As our Information Security Management Specialist (m/f/d) , you'll provide experienced support in the implementation and management of the Information Security Management System (ISMS) framework in alignment of current ISO 27001 standard and guidelines. With a focus on cybersecurity, this role involves leading risk assessments, ensuring alignment with industry standards and regulations, and … systems are assessed against Information Security criteria and operate in compliance with the instructional Information Security documentation. Conduct company-wide gap assessment of ISMS clauses and control implementation. Ensure vulnerabilitymanagement, tracking and reporting. Collaborate with the IT department to set Information security standard for Cyber Security Support in preparing management Information Security reports and dashboards. Review … Multilingual skills are an advantage. Skilled proficiency in conducting risk assessments, analyzing security controls, and policy management. Excellent communication and interpersonal skills for collaborating with various stakeholders. Strong project management skills for handling security initiatives. Strong familiarity with aspects related to information security. Strong knowledge of ISO 27001 and further relevant standards. What we offer you An agile company More ❯
phase. Review any incidents created in the projects service now queue and involve the appropriate teams to help fix them. Stakeholder Engagement: Ability to forge strong relationship with change management, project management team members. Work with end users to fix any bugs post deployment of solutions. Essential Experience Proven experience working as security engineer on large scale programmes … experience deploying Data classification using Microsoft Purview for a large enterprise. Experience collaborating with the Security Operations Centre (SOC) to optimise security monitoring, response planning and execution. Understanding of vulnerabilitymanagement and threat landscape detection and remediation. Proven experience in being part of Disaster Recovery and Business continuity testing for critical applications. Ability to perform basic Active directory … administration tasks for project work such as user, group and Group policy updates. Essential Technical Skills & Qualifications Experience of the M365 security stack : Microsoft Purview, Microsoft Entra ID, Device management using Intune, Identity Governance. Cloud Security (Tenable, CyberArk, MDR,VPN) Knowledge of best practices and procedures related to Cyber Essentials, UK DPA/GDPR Desirable Experience Proficiency in configuring More ❯
and roadmap, ensuring our security posture meets the requirements of the NHS Data Security and Protection Toolkit (DSPT), Cyber Essentials Plus, ISO 27001:2022, and other relevant frameworks. Risk Management: Lead the information security risk management program, including the identification, assessment, mitigation, and monitoring of risks across all systems and operations. Policy and Governance: Support and oversee the … Technology Assessment Criteria (DTAC) and NCSC CAF. ISO 27001:2022 implementation & maintenance: Hands-on experience with the successful implementation, certification, and ongoing maintenance of an ISO 27001 Information Security Management System (ISMS), ideally to the 2022 standard. Security architecture & Secure by Design: Strong understanding and experience of secure software development lifecycles (SDLC) and embedding security by design into product … development processes, along with secure system architecture principles. Risk management: Demonstrated expertise in developing, implementing, and managing information security risk management frameworks, including risk assessment methodologies (eg OCTAVE, FAIR). Incident response: Proven track record in developing, leading, and managing security incident response plans, including experience with major incident handling and communication with regulatory bodies (eg NCSC, ICO More ❯
BA1, Bath, Bath and North East Somerset, Somerset, United Kingdom
YT Technologies
and roadmap, ensuring our security posture meets the requirements of the NHS Data Security and Protection Toolkit (DSPT), Cyber Essentials Plus, ISO 27001:2022, and other relevant frameworks. Risk Management: Lead the information security risk management program, including the identification, assessment, mitigation, and monitoring of risks across all systems and operations. Policy and Governance: Support and oversee the … Technology Assessment Criteria (DTAC) and NCSC CAF. ISO 27001:2022 implementation & maintenance: Hands-on experience with the successful implementation, certification, and ongoing maintenance of an ISO 27001 Information Security Management System (ISMS), ideally to the 2022 standard. Security architecture & Secure by Design: Strong understanding and experience of secure software development lifecycles (SDLC) and embedding security by design into product … development processes, along with secure system architecture principles. Risk management: Demonstrated expertise in developing, implementing, and managing information security risk management frameworks, including risk assessment methodologies (eg OCTAVE, FAIR). Incident response: Proven track record in developing, leading, and managing security incident response plans, including experience with major incident handling and communication with regulatory bodies (eg NCSC, ICO More ❯
Horsforth, Leeds, West Yorkshire, England, United Kingdom
TPP (The Phoenix Partnership)
The role involves: • Managing, maintaining and upgrading enterprise server and storage hardware • Providing internal support for office hardware including, PCs, laptops, mobile devices (Windows OS, iOS, MacOS and Android) • Vulnerabilitymanagement using scanning tools such as Nessus • Remediation/automation of software rollout using Ninite/PDQ • Configuring and monitoring of Anti-virus software & Mobile Device Management • Firewall/Switch management - Configuration, patching and upgrading • Administering Microsoft Active Directory, Exchange Server & Office 365 • Achieving recognised Cyber Security accreditation • Management of video conferencing • Management of enterprise level phone system • Monitoring and managing the availability and scalability of resources, including CPU usage, disk usage and storage systems including network troubleshooting • Continuously improving and keeping up More ❯
Leominster, Herefordshire, West Midlands, United Kingdom Hybrid / WFH Options
Kingspan
available, you will be able to commute to your nearest site ideally twice a week. As the Website Platform Manager you will be responsible for the end-to-end management, performance, and evolution of our global website platform, which combines a headless CMS with an integrated Logik-powered product hub. You will ensure the platform delivers a seamless, high … and meets enterprise performance, security, and scalability standards. Responsibilities of our Website Platform Manager Platform Ownership Serve as the primary owner for the global website platform, overseeing its content management system, product hub integration, and related services. Maintain the platform roadmap, balancing global business priorities, regional needs, and technical improvements. Business continuity planning. Technical Oversight Liaise with development partners … content publishing, quality standards, and approval workflows. Provide CMS training and support for global and regional content teams. Data privacy (GDPR/CCPA) and cookie & consent management. Domain & DNS Management (e.g SSL certification) Cyber security operations including vulnerabilitymanagement and penetration testing. Regulatory compliance in local markets. Code quality & security including release management and change controls. More ❯
to ensuring services are 'secure by design' and compliant with government standards. Work will include: Completed secure-by-design self-assessment trackers Risk assessment papers and treatment plans Security management and assurance documentation Reports to demonstrate compliance with relevant frameworks and processes I am keen to speak with candidates with: Strong background in cyber security, ideally with experience in … government/public sector programmes Ability to work across delivery, technical and risk teams, translating security requirements into practical actions Knowledge of secure-by-design approaches, threat assessment, risk management and vulnerabilitymanagement Excellent communication skills, able to provide clear updates and advice to both technical and non-technical stakeholders This is a hands-on role that More ❯
role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems and resolving … security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of … make an impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, VulnerabilityManagement, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection … incident response, and the cyber kill chain. Familiarity with frameworks including MITRE ATT&CK, NIST, and CIS. Strong communication, analytical, and presentation skills. Solid understanding of network traffic flows, vulnerabilitymanagement, and penetration testing principles. Knowledge of ITIL processes (Incident, Problem, Change Management). Ability to work independently and thrive in a 24/7 on-call More ❯
initiatives What you'll be doing You'll join a collaborative Cyber Security Operations team and get involved with: Handling Tier II-IV incidents and troubleshooting Change and configuration management Policy optimisation and risk reduction Patch, OS and capacity management Event monitoring and vulnerabilitymanagement Security incident response and project support What we're looking for More ❯
initiatives What you'll be doing You'll join a collaborative Cyber Security Operations team and get involved with: Handling Tier II-IV incidents and troubleshooting Change and configuration management Policy optimisation and risk reduction Patch, OS and capacity management Event monitoring and vulnerabilitymanagement Security incident response and project support What we're looking for More ❯
with clients. You’ll play a key part in helping the business and its clients stay secure by managing vulnerabilities and supporting compliance activities. Key Responsibilities Perform and manage vulnerability assessments across internal and client systems. Support remediation activities and ensure systems remain secure and compliant. Collaborate with internal IT and client teams to ensure systems are patched and … ISO 27001, GDPR, HIPAA . Stay current with evolving cyber threats, tools, and industry best practices. Provide helpdesk support to staff and clients when required. Skills & Experience Experience in vulnerabilitymanagement and remediation across Windows/Linux systems. Hands-on with vulnerability scanning tools and ideally some penetration testing exposure. Strong knowledge of cybersecurity principles and best More ❯
with clients. You’ll play a key part in helping the business and its clients stay secure by managing vulnerabilities and supporting compliance activities. Key Responsibilities Perform and manage vulnerability assessments across internal and client systems. Support remediation activities and ensure systems remain secure and compliant. Collaborate with internal IT and client teams to ensure systems are patched and … ISO 27001, GDPR, HIPAA . Stay current with evolving cyber threats, tools, and industry best practices. Provide helpdesk support to staff and clients when required. Skills & Experience Experience in vulnerabilitymanagement and remediation across Windows/Linux systems. Hands-on with vulnerability scanning tools and ideally some penetration testing exposure. Strong knowledge of cybersecurity principles and best More ❯
watford, hertfordshire, east anglia, united kingdom
Maxwell Bond
with clients. You’ll play a key part in helping the business and its clients stay secure by managing vulnerabilities and supporting compliance activities. Key Responsibilities Perform and manage vulnerability assessments across internal and client systems. Support remediation activities and ensure systems remain secure and compliant. Collaborate with internal IT and client teams to ensure systems are patched and … ISO 27001, GDPR, HIPAA . Stay current with evolving cyber threats, tools, and industry best practices. Provide helpdesk support to staff and clients when required. Skills & Experience Experience in vulnerabilitymanagement and remediation across Windows/Linux systems. Hands-on with vulnerability scanning tools and ideally some penetration testing exposure. Strong knowledge of cybersecurity principles and best More ❯
ll support the delivery of their Cyber Security Sub Strategy in line with the Cyber Assessment Framework, and contribute to the design and operation of threat intelligence, incident response, vulnerabilitymanagement, and ethical hacking capabilities. You'll work closely with internal stakeholders and external partners to ensure compliance with ISO27001, Cyber Essentials+, and other regulatory frameworks. This role … Microsoft security tools (Defender, Sentinel, Intune, Autopilot). Strong understanding of cyber security frameworks including ISO27001, Cyber Essentials+, and the Cyber Assessment Framework. Proven experience in identity and access management, end-user device management, and working with external SOCs. Ability to deliver against cyber security roadmaps, respond to incidents, and remediate vulnerabilities. Experience in building Power BI dashboards More ❯
You'll be instrumental in designing and implementing advanced detection and response strategies, working closely with cross-functional teams and contributing to continual service improvement. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain IBM QRadar SIEM platform Onboard and normalize diverse log sources across hybrid environments Develop and tune analytical rules for threat detection and behavioural analysis Playbook … automation and enrichment Deep knowledge of threat detection, incident response, and cyber kill chain Familiarity with MITRE ATT&CK, NIST, and CIS frameworks Understanding of network traffic flows and vulnerabilitymanagement Exposure to ethical hacking and penetration testing Knowledge of ITIL disciplines (Incident, Problem, Change Management) Experience with ServiceNow Security Suite Cloud experience (AWS and/or More ❯
Cyber Security Analyst (VP) - Investment Management - London Our client, a leading investment management firm, is seeking a Cyber Security Analyst (VP level) to join their London office. This role sits within the compliance function and plays a critical part in supporting external audits, particularly SOC 1 Type II and SOC 2. It combines hands-on security monitoring and … closely with IT, compliance, and external auditors to provide control evidence, enhance processes, and strengthen the firm's overall security posture. Responsibilities include monitoring and investigating security alerts, supporting vulnerabilitymanagement and patching, and maintaining a forward-looking 6-12 month roadmap to align emerging requirements with timely policy updates. Key Skills & Experience: Strong understanding of core cybersecurity … principles including network security, identity management, and threat detection Hands-on experience with security and IT monitoring tools such as SIEM, Network Configuration Manager, Zabbix, HALO, DarkTrace, and Fortinet firewalls Familiarity with IT access controls and their application in regulated environments Proven experience supporting or participating in SOC 1 Type II and SOC 2 audits Excellent documentation and evidence More ❯