Key Responsibilities and Skills Current NPPV3 Essential Develop and maintain deployment images using tools like Microsoft Endpoint Configuration Manager (MECM/SCCM), Intune, and Autopilot Collaborate with desktop support, cybersecurity, and infrastructure teams to ensure a seamless upgrade Perform application compatibility assessments and assist with remediation Monitor and troubleshoot deployment issues, providing support where necessary Strong experience deploying Windows More ❯
Key Responsibilities and Skills Current NPPV3 Essential Develop and maintain deployment images using tools like Microsoft Endpoint Configuration Manager (MECM/SCCM), Intune, and Autopilot Collaborate with desktop support, cybersecurity, and infrastructure teams to ensure a seamless upgrade Perform application compatibility assessments and assist with remediation Monitor and troubleshoot deployment issues, providing support where necessary Strong experience deploying Windows More ❯
Outside IR35 per day | 6-month contract Senior Software Engineer Type: Weekly Hybrid in Sheffield 6 months Contract Rate: Up to £600 per day Outside IR35 A renowned cybersecurity company is searching for a driven Senior Software Engineer to assist their financial end client in the development of services that are hosted on public cloud platforms. You will design and More ❯
Wokingham, Berkshire, England, United Kingdom Hybrid / WFH Options
Foresight Associates
work closely with technical teams and solution consultants to tailor offerings to client needs. Key Responsibilities: Identify, qualify, and nurture leads for IT products and services (e.g., cloud solutions, cybersecurity, infrastructure support, managed print). Build strategic relationships with IT managers, CTOs, and procurement professionals across various sectors. Collaborate with Pre-Sales Engineers and IT specialists to present tailored solutions. More ❯
An Information Communications Technician supports daily IT operations for staff and students. This role includes elements of cybersecurity, user accounts, troubleshooting technical issues, software & hardware installation and maintenance, and logging or escalating issues via service desk call management to ensure smooth and secure IT operations. Role Answering the telephone Assisting users with common issues relating to hardware, software, web applications More ❯
to provide technical software level expertise, and solutions to engineering problems. A key element of this role includes advocating for and designing products that meet the functional, performance and cybersecurity needs of our customers. A strong systems approach to product development will be necessary in this role. Our team plays a key role in building software products and features. You More ❯
to provide technical software level expertise, and solutions to engineering problems. A key element of this role includes advocating for and designing products that meet the functional, performance and cybersecurity needs of our customers. A strong systems approach to product development will be necessary in this role. You will spend your time as a hands-on engineer and a technical More ❯
authorities and external consultants. IT Infrastructure Coordination: Collaborate with the global IT department to ensure local technology needs are met. Oversee IT service delivery, system access, hardware deployment, and cybersecurity practices at the regional level. Support technology onboarding/offboarding processes and manage regional IT vendor relationships. Legal & Regulatory Compliance Support: Work closely with the Legal & Compliance team to enforce More ❯
12, The Wharf, 16 Bridge Street, Birmingham, England
EDUCATION & IT LIMITED
Maths GCSE, grade 4-9 (Essential) About the Employer EDUCATION & IT LIMITED Here at EDIT Ltd (registered as Education & IT Ltd), we offer IT services that include IT support, cybersecurity, disaster recovery solutions, mailing and productivity solutions, and more. Our bespoke software solutions have produced Entrée Visitor and Contractor Management, which is directing the company into the exciting area of More ❯
Cheltenham, Gloucestershire, South West, United Kingdom
Peregrine
a large component, feature, set of feature, whole feature area or entire embedded software product. Some areas of expertise may include, but is not limited to, networks, operating systems, cybersecurity, databases or applications. May be responsible for the creation of an entire product. Includes direct people management responsibility including staffing and performance development. Utilizes in-depth knowledge of a technical More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
CyberSecurity Engineer (DevSecOps) Security Clearance Required - DV ('Developed Vetting') Location: Huntingdon, UK (On-site 4/5 days a week) UNLEASH YOUR POTENTIAL At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers success. We empower our teams, contribute to our communities, and operate sustainably. Everything we do … our people, and our community. Our Mission, Vision, and Values guide the way we do business. Are your ready for your next challenge? We are in search for multiple CyberSecurity Engineers with varying technical backgrounds - Required to work at our customer site in Huntingdon, Cambridgeshire with occasional travel to other UK sites. In this role, you will working within … a team of engineers to ensure that the customer sites maintain a strong cybersecurity posture. CyberSecurity Engineers are responsible for providing cybersecurity engineering services for classified and unclassified networks of computer systems. The CyberSecurity Engineers will provide operational and engineering support. This position perform the following tasks: Develop creative solutions to complex technical issues and problems Work More ❯
meet diverse security needs. Our commitment to innovation, imaging excellence, and quality ensures our systems consistently deliver superior performance, reliability, and user satisfaction Role Overview Weare seeking a skilled CyberSecurity Manager to lead the operations of our cybersecurity testing lab and oversee the development of product security documentation. This role works closely with the Cargo Engineering Software Team … to manage cyber risks across our Cargo X-ray software suite and is integrated into the broader OSI Systems corporate cybersecurity team. Responsibilities CyberSecurity Design Ownership Define and maintain cybersecurity design requirements and documentation within a standardized security framework. Risk Management Identify, analyze, and report on security risks. Recommend and support the implementation of security enhancements. Education … Awareness Promote cybersecurity awareness among product design teams and stakeholders, emphasizing its impact on product development and support. Innovative Security Solutions Develop forward-thinking strategies to secure long-lifecycle, networked products deployed in diverse environments. Product Testing Protocols Contribute to the creation and execution of test protocols to identify vulnerabilities. Collaborate with engineering teams to propose remediation strategies. Cross More ❯
assets through proactive security measures, advanced threat intelligence, and world-class support. Join a dynamic, innovation-driven team where your skills make a real impact. Your Mission: As a CyberSecurity Engineer, you’ll take charge of designing and implementing advanced security systems, supporting clients in improving their security posture, and staying ahead of emerging cyber threats. You’ll play … and external teams, including partner engagements. Research emerging threats and recommend security framework enhancements. Mentor and support junior security team members. What We’re Looking For: A degree in Cybersecurity, IT, or equivalent experience. 4+ years in a cybersecurity role, preferably within an MSP or fast-paced environment. Strong hands-on experience with SIEM, EDR, VPNs, firewalls, and cloud platforms More ❯
Corsham, England, United Kingdom Hybrid / WFH Options
Paradigm Tech
Senior CyberSecurity Consultant | Principal CyberSecurity Consultant | Information Assurance | Risk Management | Security Cleared Senior CyberSecurity Consultant required for a leading CyberSecurity Consultancy with a specialism in the Defence & Central Government sectors. This is a full-time, permanent position based from home with 1 day a week on-site with clients located in the South of the Country … able to achieve this. They'e paying between £65,000 - £85,000 + bonus and benefits. Please apply and I - Ben Griffiths - will be in touch to discuss. Senior CyberSecurity Consultant | Principal CyberSecurity Consultant | Information Assurance | Risk Management | Security Cleared More ❯
Ready to Make an Impact in Cybersecurity? Information Security Analyst - 6-Month FTC Global Law Firm London/Hybrid Our client, a leading global law firm , is looking for an experienced Information Security Analyst to join their London team on a 6-month fixed-term contract . This is a fantastic opportunity to work in a high-impact role where More ❯
Pirton, Hertfordshire, United Kingdom Hybrid / WFH Options
Picture More Ltd
Ready to Make an Impact in Cybersecurity? Information Security Analyst - 6-Month FTC Global Law Firm London/Hybrid Our client, a leading global law firm , is looking for an experienced Information Security Analyst to join their London team on a 6-month fixed-term contract . This is a fantastic opportunity to work in a high-impact role where More ❯
Milton Keynes, England, United Kingdom Hybrid / WFH Options
MHA
employee is not only a confident user of our systems but also a proactive first-line defender of our digital estate. Qualification and Essential Skills Qualifications: Demonstrable interest in cybersecurity and user education, with some hands-on experience supporting IT or security training initiatives. Working knowledge of key security concepts such as phishing, MFA, secure remote access, and data protection. More ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
identify critical cyber assets and determine their impact on business operations. Qualifications: ISO 22301 related qualification or certification. ITIL v4 foundation or higher Proven experience in business continuity or cybersecurity roles, with a focus on business continuity planning. Experience of working in a disaster recovery role or similar Strong knowledge of cyber threats, vulnerabilities and incident response planning. Excellent More ❯
identify critical cyber assets and determine their impact on business operations. Qualifications: ISO 22301 related qualification or certification. ITIL v4 foundation or higher Proven experience in business continuity or cybersecurity roles, with a focus on business continuity planning. Experience of working in a disaster recovery role or similar Strong knowledge of cyber threats, vulnerabilities and incident response planning. Excellent More ❯
a poor service and not put things right. Our service is free for everyone. About the role As the Information Security Manager, you will lead on operational information and cybersecurity within PHSO. You will play a key role in protecting the information of people who work for or with us and for the public whose complaints we handle. You More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Jisc
your skills and shape a career that excites you. The role: The Professional Security services co-ordinator works within the Professional security services team which is part of the Cybersecurity division. The Division is responsible for the full life cycle of security services including inception, introduction, management and development. The co-ordinator will assist in the co-ordination of More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Catorfaen
on experts to expand our knowledge base and technical skills, building a portfolio of accreditations and we've developed important relationships with our vendors. SEP2 are an award-winning cyber-security specialist, whose success is built on five values: Passion People Powered Committed to Doing Good Every SEP2 colleague lives these values every day. We have a culture of passionate More ❯