level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
Stevenage, Hertfordshire, England, United Kingdom Hybrid / WFH Options
MBDA
our forward thinking team as a Network Security Engineer, where you will play a key role in safeguarding our organisations' network infrastructure as part of the 24x7 Internal Security Response (ISR) team. When not involved in incidentresponse and triage activity with the SOC team, you will be responsible for designing, implementing and maintaining robust security solutions More ❯
Principles & Technologies. Experience of Security Related Technical Investigations Hands-On Technical Experience of Conducting Vulnerability Scanning & Evaluating Results Commercial Awareness & (Ideally) Experience of PCI DSS (Current Version) Experience with IncidentResponse Procedures & Investigations Strong Verbal & Written Communication Skills High Attention to Detail Strong Team Player Searches: Vulnerability Management Analyst/VM Analyst/Information Security Analyst/Information More ❯
Principles & Technologies. Experience of Security Related Technical Investigations Hands-On Technical Experience of Conducting Vulnerability Scanning & Evaluating Results Commercial Awareness & (Ideally) Experience of PCI DSS (Current Version) Experience with IncidentResponse Procedures & Investigations Strong Verbal & Written Communication Skills High Attention to Detail Strong Team Player Searches: Vulnerability Management Analyst/VM Analyst/Information Security Analyst/Information More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Pontoon
measures into development processes. Stay updated on the latest security trends and technologies to enhance our security posture. Provide guidance and mentorship to junior security team members. Engage in incidentresponse activities, ensuring swift resolution of security incidents. What We're Looking For : Proven experience as a Security Architect or similar role in the engineering sector. Strong knowledge More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Pontoon
measures into development processes. Stay updated on the latest security trends and technologies to enhance our security posture. Provide guidance and mentorship to junior security team members. Engage in incidentresponse activities, ensuring swift resolution of security incidents. What We're Looking For : Proven experience as a Security Architect or similar role in the engineering sector. Strong knowledge More ❯
Gateshead, Tyne and Wear, England, United Kingdom Hybrid / WFH Options
Simpson Judge Ltd
clients, translating tech into business outcomes* Proactively monitoring systems, managing SLAs, and keeping documentation sharp* Collaborating with vendors, internal teams and stakeholders to resolve issues* Getting involved in maintenance, incidentresponse and occasional 24/7 supportMust haves:* 2+ years MIN technical consulting experience within a Managed Service Provider* Strong communicator who can simplify the complex for clients More ❯
aligned with business goals and regulatory requirements. Oversee long-term digital infrastructure planning to support growth, scalability, and operational efficiency. Lead on cybersecurity and risk management, ensuring proactive monitoring, incidentresponse, and data protection. Champion the adoption of AI, automation, and emerging technologies to drive innovation and reduce manual processes. Business Continuity & Risk Own and maintain the IT More ❯
L33, Knowsley, Merseyside, United Kingdom Hybrid / WFH Options
Curveball Solutions
DPA 2018), Cyber Essentials (Basic & Plus), and ISO 27001, supported by frameworks like NCSC and NIST. Operating around cybersecurity fundamentals: CIA (Confidentiality, Integrity, Availability), proactive threat prevention, and rapid incidentresponse About You You’re naturally aligned with MSP-style work, deeply familiar with security frameworks, and thrive at the intersection of strategy and execution. In addition to More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Curveball Solutions
DPA 2018), Cyber Essentials (Basic & Plus), and ISO 27001, supported by frameworks like NCSC and NIST. Operating around cybersecurity fundamentals: CIA (Confidentiality, Integrity, Availability), proactive threat prevention, and rapid incidentresponse About You You're naturally aligned with MSP-style work, deeply familiar with security frameworks, and thrive at the intersection of strategy and execution. In addition to More ❯
actionable reporting. Skills & experience sought: Strong background in IT Security, Cyber Assurance, or IT Audit. Hands-on knowledge across areas such as governance, IAM, threat management, vulnerability management, and incident response. Good understanding of security frameworks (e.g. ISO27001, NIST, PCI-DSS, SOX). Experience engaging with senior stakeholders within complex environments. Relevant certifications (CISSP, CISM, CISA, CRISC) desirable. This More ❯
compliance with and company adherence to relevant regulations and control frameworks e.g. NCSC CAF, ONR SyAPs, ISO27001. Proven knowledge of adversary TTPs and frameworks like MITRE ATT&CK. Strong incidentresponse, investigation, analysis, logging and reporting skills. Excellent communication and stakeholder management skills with the ability to translate complex technical threats and attack paths to non-technical audiences. … Nice to have: GIAC Certified Incident Handler (GCIH) Certification or similar. Immediate availability. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at hays.co.uk More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Context Recruitment Limited
significant investment into its SOC-as-a-Service offering, positioning itself at the forefront of managed security solutions and enabling clients to benefit from cutting-edge threat detection and response capabilities. Key Responsibilities: Serve as a vCISO for clients, providing strategic guidance on security posture and compliance Lead the development and implementation of security policies, procedures, and controls Manage … ISO27001 compliance, including internal and external audits Conduct risk assessments and oversee incidentresponse planning Collaborate with technical teams to ensure security is embedded across services Advise on regulatory requirements and emerging threats Candidate Profile: Extensive experience in information security within an MSP or MSSP CISSP certified Strong working knowledge of GRC frameworks, including ISO27001 Demonstrated experience in More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Clarke Recruitment Solutions
build, scale, and automate the infrastructure behind our digital platforms. This isn’t just another cloud role. The platforms you’ll help design and run are mission-critical, rapid-response systems that genuinely change people’s lives for the better. Reliability, security, and speed aren’t just nice-to-haves, they’re what make the difference when it matters … Setting up and managing observability with Datadog, CloudWatch, Prometheus/Grafana Automating deployments and improving recovery, redundancy, and capacity planning Supporting Linux environments (Ubuntu/CentOS) Getting involved in incidentresponse and helping us prevent problems before they happen What we’re looking for Solid background in DevOps, SRE, or Platform Engineering Strong AWS experience (VPC, EC2, ECS More ❯
z2ez0 Manage NIS compliance for OT Networks and produce the NIS annual report. Collaborate withOT Engineers to manage security controls for ICS, SCADA, and other OT systems. Oversee incidentresponse and recovery procedures for OT-related cyber events reported by 24/7 OT SOC. Develop and deliver OT cybersecurity awareness and training programs. Monitor and report on … mindset across multidisciplinary teams Desirable Experience: Experience in oil & gas, energy, utilities, or manufacturing sectors. Hands-on experience with OT security tools (e.g., Claroty, Dragos). Participation in cyber incident simulations or red/blue team exercises. More ❯
and configuring SIEM platforms. Strong skills in log collection, analysis, and alerting rule development. Familiarity with integrating EDR, IPS, Firewalls, and audit systems with SIEM/SOC. Understanding of incidentresponse processes and supporting toolsets. Knowledge of the NIST Cybersecurity Framework. Ability to communicate technical insights to both technical and non-technical stakeholders. Comfortable working in a fast More ❯
in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity management and federation, firewalls, SIEM, vulnerability scanning, and cryptography. Experience overseeing incidentresponse, vulnerability management, and security service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable guidance for stakeholders at all levels. Skilled More ❯
in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity management and federation, firewalls, SIEM, vulnerability scanning, and cryptography. Experience overseeing incidentresponse, vulnerability management, and security service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable guidance for stakeholders at all levels. Skilled More ❯