improvement of operational processes. Implement and maintain monitoring alerts, dashboards, and metrics to ensure visibility into the messaging layer. Ensure compliance with security policies and participate in audits and vulnerability remediation. Maintain accurate documentation, including topology diagrams, runbooks, and configuration baselines. Support proprietary messaging APIs using C++, Java, Python, and C# programming languages. Provide support for proprietary cache and More ❯
using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls and identity management systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident response protocols Recommend enhancements to improve overall security posture Deliver security More ❯
Working hand-in-hand with developers, you'll weave security seamlessly into the software development lifecycle - from designing controls and integrating testing into CI/CD pipelines to supporting vulnerability management and remediation. Acting as the go-to expert for secure design, threat modelling, and compliance, you'll make sure teams have the knowledge, tools, and confidence to build More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Akkodis
Working hand-in-hand with developers, you'll weave security seamlessly into the software development lifecycle - from designing controls and integrating testing into CI/CD pipelines to supporting vulnerability management and remediation. Acting as the go-to expert for secure design, threat modelling, and compliance, you'll make sure teams have the knowledge, tools, and confidence to build More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls and identity management systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident response protocols Recommend enhancements to improve overall security posture Deliver security More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid/Remote Options
TXP
using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls and identity management systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident response protocols Recommend enhancements to improve overall security posture Deliver security More ❯
telemetry and observability to enable proactive threat detection and automated response. Apply SRE principles to improve reliability, performance, and maintainability of security services. Lead platform health, patching automation, and vulnerabilityremediation workflows. Define service level objectives (SLOs) and key performance indicators (KPIs) for all security services. Compliance, Governance & Risk Management: Ensure alignment with global compliance requirements such as More ❯
analytics to enhance integrations and documentation. Key skills for this role Security & Compliance:o Implement and enforce security best practices across the platform, includingsecure coding, dependency management, and vulnerability scanning.o Ensure API security and access control using OAuth, API keys, JWT, and othermechanisms.o Monitor and remediate security vulnerabilities in third-party packages andlibraries.o Collaborate with security teams to More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
of security incidents from detection to resolution. Ensure compliance with SLAs and escalation protocols. Maintain and enhance incident response plans and procedures. Direct threat intelligence collection and analysis. Manage vulnerability assessments and coordinate remediation. Monitor and analyse security events across multiple platforms. Identify, assess, and escalate threats and vulnerabilities. Maintain and evolve SOC operational documentation and processes. Deliver training More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Oscar Associates (UK) Limited
for new features and system changes. Evaluate and recommend security technologies and tools. Operational (40%) Manage security environments across Azure and AWS infrastructure. Lead incident response efforts and coordinate vulnerabilityremediation activities. Manage continuous security monitoring, alerting, and detection systems. Administer vulnerability management and penetration testing programs. Maintain strong identity, access, and privilege management controls. Compliance & Assurance More ❯
and other endpoints Deploy and manage applications across the endpoint estate Administer patching processes to maintain compliance and security standards Collaborate with the security team on device hardening and vulnerabilityremediation Monitor endpoint health, performance, and compliance, proactively addressing issues Provide technical support and escalation for endpoint-related incidents Recommend and implement improvements to existing endpoint solutions Maintain More ❯
for end users. Provide VIP and executive support ensuring confidentiality and responsiveness. Support VDI environments (AWS Workspaces, Azure Virtual Desktop). Apply OS updates, security patches, and manage endpoint vulnerability remediation. Assist in software packaging and deployments. Support network connectivity, Wi-Fi troubleshooting, and conference room technology. Technical Skills Strong Windows/macOS troubleshooting skills. Familiar with Active Directory More ❯
for end users. Provide VIP and executive support ensuring confidentiality and responsiveness. Support VDI environments (AWS Workspaces, Azure Virtual Desktop). Apply OS updates, security patches, and manage endpoint vulnerability remediation. Assist in software packaging and deployments. Support network connectivity, Wi-Fi troubleshooting, and conference room technology. Technical Skills Strong Windows/macOS troubleshooting skills. Familiar with Active Directory More ❯
methodologies, tools, and frameworks. Maintaining accurate and up-to-date documentation of security processes, procedures, and guidelines. Generating security reports and metrics to track security-related activities, vulnerabilities, and remediation efforts. What we are looking for in you: You'll already have experience developing complex software products in the Defence, Automotive, Aerospace or Telecoms sectors (or a similar field More ❯
documentation for architectures, deployments, and operational procedures, fostering transparency and long-term maintainability. Security & Risk Management · Implement and maintain cybersecurity controls, including MFA, conditional access, endpoint protection, encryption, and vulnerability remediation. · Oversee secure authentication workflows and alignment with compliance frameworks across cloud and internal systems. · Lead incident response and post-incident reviews to strengthen operational resilience. · Conduct periodic security More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Quantum Technology Solutions Inc
documentation for architectures, deployments, and operational procedures, fostering transparency and long-term maintainability. Security & Risk Management · Implement and maintain cybersecurity controls, including MFA, conditional access, endpoint protection, encryption, and vulnerability remediation. · Oversee secure authentication workflows and alignment with compliance frameworks across cloud and internal systems. · Lead incident response and post-incident reviews to strengthen operational resilience. · Conduct periodic security More ❯
are patched and secure. Responsibilities: Managing and optimising security tools and platforms (SIEM, XDR, IDAM policies etc.) Monitoring vulnerabilities, investigating incidents and implementing corrective actions Supporting patching compliance and vulnerabilityremediation Ensuring security best practices are applied across networks, applications and systems Participating in change reviews and advising on improvements to existing setups Supporting compliance experience against frameworks … such as ISO27001, Cyber Essentials+ and CAF Requirements: A solid background in IT infrastructure and/or network engineering Some exposure to, or a growing focus on, cybersecurity and vulnerability management Understanding of network devices, configurations and security principles Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) Confidence to identify issues More ❯
Birmingham, West Midlands, United Kingdom Hybrid/Remote Options
Context
are patched and secure. Responsibilities: * Managing and optimising security tools and platforms (SIEM, XDR, IDAM policies etc.) * Monitoring vulnerabilities, investigating incidents and implementing corrective actions * Supporting patching compliance and vulnerabilityremediation * Ensuring security best practices are applied across networks, applications and systems * Participating in change reviews and advising on improvements to existing setups * Supporting compliance with frameworks such … ISO 27001, Cyber Essentials Plus and CAF Requirements: * A solid background in IT infrastructure and/or network engineering * Some exposure to, or a growing focus on, cybersecurity and vulnerability management * Understanding of network devices, configurations and security principles * Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) * Confidence to identify issues More ❯
Native platforms (Azure, AWS, GCP, OpenShift) Infrastructure-as-Code (Terraform, Ansible, Crossplane) Container orchestration, networking, and automation (Kubernetes, Docker) Scripting (Bash, Powershell, Python) Programming languages (Golang, Java, Ruby, Python) Vulnerabilityremediation and mitigation tools (BlackDuck, Snyk) We value your ability to adapt over deep specialization. In addition, we're currently seeking folks with strong experience in security and More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Container Solutions
Native platforms (Azure, AWS, GCP, OpenShift) Infrastructure-as-Code (Terraform, Ansible, Crossplane) Container orchestration, networking, and automation (Kubernetes, Docker) Scripting (Bash, Powershell, Python) Programming languages (Golang, Java, Ruby, Python) Vulnerabilityremediation and mitigation tools (BlackDuck, Snyk) We value your ability to adapt over deep specialization. In addition, we're currently seeking folks with strong experience in security and More ❯
into the industry, or to shape their existing skillset using the Microsoft Defender stack. Key Responsibilities Daily monitoring and analysis of security incidents, ensuring accurate logging and escalation. Lead remediation efforts for identified vulnerabilities in collaboration with technology teams. Respond to incidents alongside the Head of Information Security Work with the MSSP across incident response and proactive monitoring. Maintain More ❯
into the industry, or to shape their existing skillset using the Microsoft Defender stack. Key Responsibilities Daily monitoring and analysis of security incidents, ensuring accurate logging and escalation. Lead remediation efforts for identified vulnerabilities in collaboration with technology teams. Respond to incidents alongside the Head of Information Security Work with the MSSP across incident response and proactive monitoring. Maintain More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Immersum
SAST/DAST and dependency scanning. Collaborating with developers and product teams to promote DevSecOps practices, threat modelling and secure coding. Conducting security assessments, monitoring for vulnerabilities and leading remediation efforts. Operating and extending monitoring, logging and alerting systems for both performance and security. Managing DNS, CDN, caching, firewalls, load balancers and WAFs for secure web delivery. Responding to More ❯
SAST/DAST and dependency scanning. Collaborating with developers and product teams to promote DevSecOps practices, threat modelling and secure coding. Conducting security assessments, monitoring for vulnerabilities and leading remediation efforts. Operating and extending monitoring, logging and alerting systems for both performance and security. Managing DNS, CDN, caching, firewalls, load balancers and WAFs for secure web delivery. Responding to More ❯