Newcastle upon Tyne, Tyne and Wear, Tyne & Wear, United Kingdom
Akkodis
issues. * Collaboration: Work closely with software developers, network engineers, and product managers to troubleshoot issues and optimize performance * Security: Integrate security best practices (DevSecOps) into the development lifecycle, including vulnerabilityscanning, static code analysis, and compliance checks. The Requirements * Hands-on experience in a DevOps, SRE, or similar role. * Strong proficiency with at least one major cloud provider More ❯
Kingston Upon Hull, East Riding of Yorkshire, United Kingdom
Akkodis
issues. * Collaboration: Work closely with software developers, network engineers, and product managers to troubleshoot issues and optimize performance * Security: Integrate security best practices (DevSecOps) into the development lifecycle, including vulnerabilityscanning, static code analysis, and compliance checks. The Requirements * Hands-on experience in a DevOps, SRE, or similar role. * Strong proficiency with at least one major cloud provider More ❯
the day-to-day operation of security systems and tools, including firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus, anti-malware, SIEM (Security Information and Event Management), vulnerability scanners, and data encryption solutions. Manage vulnerability management programs, including regular scanning, penetration testing, and remediation of identified weaknesses. Lead and manage security incident response, including detection … Strong understanding of information security principles, frameworks (e.g., ISO 27001, NIST, Cyber Essentials), and best practices. Hands-on experience with security technologies such as firewalls, SIEM, IDS/IPS, vulnerability scanners, endpoint detection and response (EDR), and identity management solutions. Experience with cloud security (e.g., Azure Security). Proven experience in managing security incidents and conducting incident response. Familiarity More ❯
in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, Sentinel, ELK, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in Protective Monitoring & SOC operation Experience in network security principles, firewalls, and access control mechanisms. Preferred Qualifications: - Industry certifications such as CompTIA Security+, CISSP, CISM, CEH, or More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Fdo Consulting Limited
CMMC, ISO27001, CCPA, Cyber Essentials Plus 5 years plus experience in a similar Cyber Security role. Good understanding of networking ports, protocols, traffic flow, system administration, etc Experience with vulnerabilityscanning solutions. Advanced certifications such as SANS GIAC/CGIA/GCIH, CISSP is an advantage. Knowledge of working with MOD and DOD also an advantage. This is More ❯
Terraform/Bicep for AKS, container registries, application services, and networking Implement monitoring, alerting, and observability frameworks with SLOs and diagnostic tools Enforce security through access controls, secrets management, vulnerabilityscanning, and policy-as-code Manage environment consistency and optimise cloud costs through performance monitoring and capacity planning Create reusable automation tools, templates, and documentation for developer self More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Computappoint
Terraform/Bicep for AKS, container registries, application services, and networking Implement monitoring, alerting, and observability frameworks with SLOs and diagnostic tools Enforce security through access controls, secrets management, vulnerabilityscanning, and policy-as-code Manage environment consistency and optimise cloud costs through performance monitoring and capacity planning Create reusable automation tools, templates, and documentation for developer self More ❯
Technical Security Architect role Strong background in network infrastructure design and review , with a focus on security. Proven experience designing and documenting security architectures and solutions . Expertise in vulnerabilityscanning design and implementation . Ability to evaluate and integrate new technologies and innovations under tight delivery schedules. Excellent communication and presentation skills when engaging at all levels. More ❯
robust monitoring and alerting solutions Contributing to and maintaining CI/CD pipelines Driving ISO 27000 implementation and supporting ongoing compliance initiatives Introducing and managing cybersecurity tools such as vulnerability scanners, endpoint protection, SIEM, and cloud security monitoring solutions Requirements: Extensive experience in a DevOps team lead role using AWS, (IAM, S3, EKS). Experience with IaC such as More ❯
robust monitoring and alerting solutions Contributing to and maintaining CI/CD pipelines Driving ISO 27000 implementation and supporting ongoing compliance initiatives Introducing and managing cybersecurity tools such as vulnerability scanners, endpoint protection, SIEM, and cloud security monitoring solutions Requirements: Extensive experience in a DevOps team lead role using AWS, (IAM, S3, EKS). Experience with IaC such as More ❯
Birmingham, West Midlands, United Kingdom Hybrid/Remote Options
Oscar Associates (UK) Limited
robust monitoring and alerting solutions Contributing to and maintaining CI/CD pipelines Driving ISO 27000 implementation and supporting ongoing compliance initiatives Introducing and managing cybersecurity tools such as vulnerability scanners, endpoint protection, SIEM, and cloud security monitoring solutions Requirements: Extensive experience in a DevOps team lead role using AWS, (IAM, S3, EKS). Experience with IaC such as More ❯
Doncaster, South Yorkshire, Yorkshire, United Kingdom
DFS Furniture Ltd
infrastructure. Knowledge of CI/CD tools such as GitHub Actions or Cloud Build. The ability to integrate security and compliance requirements into cloud solutions, including IAM, encryption and vulnerability scanning. Experience setting up cloud native monitoring and logging tools, such as Google Cloud Operations or Prometheus. Proficiency in a scripting language such as Python or Bash to support More ❯
Banbury, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
wide range of internal teams, from IT colleagues to Train Engineers, to ensure security best practices are understood and integrated into their processes and systems. Key Accountabilities Threat and Vulnerability Management Develop incidence response and security measures for protection. Complete risk and exploitability assessments against vulnerabilities and live threats. Serve as a subject matter expert in vulnerability management … tools and technologies such as SIEM, DLP, network protection, threat detection, and endpoint protection. An understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, Intrusion Detection, and vulnerability scanning. Understanding of IT and cyber security frameworks, standards, and regulations (examples: ISO27001, NIS2, GDPR, and CAF). Understanding of the Cyber Kill Chain and MITRE ATT&CK frameworks. More ❯
Hook Norton, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
wide range of internal teams, from IT colleagues to Train Engineers, to ensure security best practices are understood and integrated into their processes and systems. Key Accountabilities Threat and Vulnerability Management Develop incidence response and security measures for protection. Complete risk and exploitability assessments against vulnerabilities and live threats. Serve as a subject matter expert in vulnerability management … tools and technologies such as SIEM, DLP, network protection, threat detection, and endpoint protection. An understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, Intrusion Detection, and vulnerability scanning. Understanding of IT and cyber security frameworks, standards, and regulations (examples: ISO27001, NIS2, GDPR, and CAF). Understanding of the Cyber Kill Chain and MITRE ATT&CK frameworks. More ❯
City, London, United Kingdom Hybrid/Remote Options
The Bridge IT Recruitment
Investigate and resolve cyber incidents promptly and effectively. Implement and manage security measures including firewalls, encryption, and endpoint protection. Maintain clear documentation of breaches, assessments, and remediation actions. Conduct vulnerability testing, penetration testing, and risk assessments. Collaborate with the IT Security Manager to identify and mitigate network vulnerabilities. Analyse logs from multiple sources to detect and respond to abnormal … a SOC (Security Operations Centre) or NOC (Network Operations Centre). Strong understanding of incident response methodologies and the MITRE ATT&CK framework. Experience using SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. Technical expertise in Microsoft Defender, EDR (Endpoint Detection and Response), and network architecture. Practical experience managing cyber incidents and implementing secure configurations. Excellent analytical More ❯
London, Fleet Street, United Kingdom Hybrid/Remote Options
The Bridge IT Recruitment
Investigate and resolve cyber incidents promptly and effectively. Implement and manage security measures including firewalls, encryption, and endpoint protection. Maintain clear documentation of breaches, assessments, and remediation actions. Conduct vulnerability testing, penetration testing, and risk assessments. Collaborate with the IT Security Manager to identify and mitigate network vulnerabilities. Analyse logs from multiple sources to detect and respond to abnormal … a SOC (Security Operations Centre) or NOC (Network Operations Centre). Strong understanding of incident response methodologies and the MITRE ATT&CK framework. Experience using SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. Technical expertise in Microsoft Defender, EDR (Endpoint Detection and Response), and network architecture. Practical experience managing cyber incidents and implementing secure configurations. Excellent analytical More ❯
systems proactively for suspicious activity. Maintain and update cyber security procedures and documentation. Provide IT support when required, including first, second, and third line assistance. Attend monthly cyber/vulnerability meetings and contribute expertise as needed. Essential Skills & Experience: Minimum 2 years' experience in an IT security-related role ???. Experience with vulnerability management and reporting tools. Strong … verbal communication skills to explain risks to both technical and non-technical stakeholders. CompTIA Security+ or equivalent qualification ??. Desirable: Experience with SIEM systems, EDR, IDS/IPS, and vulnerability scanners. Previous experience in a law firm or professional services environment. Familiarity with Practice Management Systems (PMS) and Document Management Systems (DMS). Personal Attributes: Methodical, thorough, and detail More ❯
principles. Implement proactive security measures and controls to prevent security breaches and minimize potential impact, including managing and implementing various security technologies and tools (e.g., SIEM, IDS/IPS, vulnerability scanners). Lead the cloud security strategy, ensuring robust configuration, monitoring, and protection of our client's cloud infrastructure and services. Financial Management and Justification: Develop business cases that … and implement security awareness training programs for all staff. Metrics and KPIs: Develop and track relevant Key Performance Indicators (KPIs) such as incident response times, compliance audit results, and vulnerability management metrics. Cross-functional Collaboration: Work closely with the Engineering team and other technical departments to ensure security is integrated into all development and operational processes. More ❯