Clydebank, Dunbartonshire, United Kingdom Hybrid / WFH Options
Nine Twenty
firewalls, intrusion detection systems, endpoint protection, log monitoring, and vulnerability scanning. Investigates and documents security breaches and cyber incidents, including assessment of impact and coordination of remediation efforts. Coordinates penetrationtesting with internal or external parties as appropriate. Drives business-wide understanding of secure development practices and general information security awareness. Represents the company during audits and performs More ❯
maintain security tools such as Cloud IAM, Security Command Center, VPC Service Controls, Azure Security Center, Azure AD, and Microsoft Defender for Cloud. Conduct security assessments, vulnerability scans, and penetration testing. Monitor cloud environments for threats and lead incident response efforts. Integrate security into the CI/CD pipeline and ensure secure configurations. Develop and enforce cloud security policies More ❯
measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end users • Regular monitoring of potential security risks externally and internally, provide clear … to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetrationtesting of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation • Experience in testing and reviewing new security solutions • A strong commitment More ❯
L33, Knowsley, Merseyside, United Kingdom Hybrid / WFH Options
Curveball Solutions
Drafting, maintaining and implementing information security policies and Standard Operating Procedures (SOPs). Configuring and overseeing mobile security—MDM (MAM/BYOD)—to protect business continuity. Leading vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Authoring compelling tender responses, clearly demonstrating technical capability and strategic value. Enhancing Microsoft 365 security leveraging Purview, Conditional Access, MFA to safeguard … through closure. Strong understanding of ITIL, CAB, and structured change management. Skilled in crafting and updating security policies, SOPs, and managing tender documentation. Hands-on expertise with MDM tools, penetrationtesting, and policy-based firewalls. Experience designing and delivering compliance aligned services across GDPR, Cyber Essentials, ISO 27001. Proficient in using Microsoft 365 security stack: Purview, Defender, Conditional More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Curveball Solutions
objectives. Drafting, maintaining and implementing information security policies and Standard Operating Procedures (SOPs). Configuring and overseeing mobile securityMDM (MAM/BYOD)to protect business continuity. Leading vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Authoring compelling tender responses, clearly demonstrating technical capability and strategic value. Enhancing Microsoft 365 security leveraging Purview, Conditional Access, MFA to safeguard … through closure. Strong understanding of ITIL, CAB, and structured change management. Skilled in crafting and updating security policies, SOPs, and managing tender documentation. Hands-on expertise with MDM tools, penetrationtesting, and policy-based firewalls. Experience designing and delivering compliance aligned services across GDPR, Cyber Essentials, ISO 27001. Proficient in using Microsoft 365 security stack: Purview, Defender, Conditional More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
83zero Ltd
line with ITIL processes Monitor and enhance network security controls including web security gateways, NAC, endpoint security, and perimeter defense Contribute to internal reviews, security audits, vulnerability assessments, and penetrationtesting Support firewall rule changes, VPN access, network segmentation, and performance improvements Participate in on-call rotation for high-priority issues and assist during major incidents Create and More ❯
and clear with their opinions. Desirable qualifications, capabilities, and skills: Experience in a software engineering role, ideally with focus on security. Working knowledge of offensive security, Application and Infrastructure penetrationtesting (OWASP top 10, OWASP ASVS). Understanding of security vulnerabilities and remediation options in codebases & containers. Working knowledge of methods for authentication and authorization (ODIC, OAuth More ❯
data into IT systems for transformation. They design & integrate operational technology to meet business, production, & operational goals. Principal Network & Cyber Security Engineer responsibilities Provide expertise in Network Design, implementation, & testing for networks supporting Automation & Control Systems Solutions Identify/define the network requirements for Automation & Controls solutions Develop Detailed Network Architecture Create Network Dataflow Diagrams Produce Cybersecurity requirement specifications … Develop Network Schedules (IP addresses, Data communication, server & VM, Switch & firewall) Develop Testing procedures (FAT) Create Migration Strategies Select suitable network components Review deliverables from other departments & coordinate with vendors Support the Lead Engineer in project objectives Apply integration concepts across multiple vendor platforms Conduct Cyber Security Risk Assessments & provide mitigation guidance Evaluate client security posture, identify vulnerabilities & areas … tools & standards Multi-sector & global project experience Problem-solving skills Desirable: Knowledge of process automation & real-time systems Experience with security governance, risk, & compliance controls Experience with vulnerability management & penetrationtesting tools Candidates must be eligible to work in the UK. With over 90 years' combined experience, NES Fircroft is a leading engineering staffing provider worldwide, supporting sectors More ❯
You'll Do Design and implement secure software solutions, applying security-by-design principles and recognised standards (ISO 27001, NIST). Conduct threat modelling, code reviews, vulnerability assessments, and penetration tests to identify and mitigate risks. Respond to security incidents, perform root cause analysis, and enhance incident response capabilities and documentation. Collaborate with developers and clients to embed secure … Cyber Security Analysting, ideally within defence, government, or critical infrastructure sectors Strong knowledge of secure software development, security protocols, and cyber security principles Skilled in using vulnerability assessment and penetrationtesting tools (e.g. Nessus, Burp Suite) Familiarity with security frameworks (ISM, PSPF, ISO 27001) and tools like SIEM, IDS/IPS, and threat intelligence platforms Excellent problem-solving More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetrationtesting, vulnerability assessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role More ❯
IAM, Security Command Center, VPC Service Controls) and Azure/M365 (e.g., Azure Security Center, Azure AD, Microsoft Defender for Cloud). Conduct regular security assessments, vulnerability scanning, and penetrationtesting of cloud infrastructure and applications. Monitor cloud environments for security threats, anomalies, and incidents, and lead incident response efforts. Collaborate with development, operations, and compliance teams to More ❯
Tewkesbury, Gloucestershire, England, United Kingdom
Sanderson
Debian variants). Designing, planning, and rolling out software and upgrades. Troubleshooting issues and implementing fixes across the infrastructure. The role includes working with the security team and external penetrationtesting teams to ensure a very high security standard across the infrastructure. Benefits Competitive Salary Generous pension provision Performance and business development bonuses 25 days holiday per year More ❯
written and verbal communication - able to simplify complex concepts for clients Confident producing clear documentation and reporting Desirable Skills: Certifications: Security+, SC-200, CEH, ISO 27001 Lead Implementer, PCIP Penetrationtesting or red teaming exposure Experience with SIEM/SOAR platforms (e.g., Microsoft Sentinel) Familiarity with MSP toolsets (Autotask, IT Glue, Rewst) or automation experience Personal Attributes: Friendly More ❯
/7 shift-based role) Desirable Qualifications and Experience Experience in a client-facing technical or consulting role Background in one or more of the following areas: SOC, Pen Testing, InfoSec, Networking, Systems Administration Knowledge of cybersecurity concepts including BGP, WAF, and CDN Familiarity with cloud platforms (AWS, Azure, GCP) Scripting abilities (e.g., Python, Bash) for automation or data More ❯
Professional Framework for one or more of the following capabilities: Cyber Security Advisory Security Architect Cyber Security Advisory Cyber Security Risk Manager Cyber Security Research, Development and Design Security Testing Person specification Ideal candidate: Be a leader in the delivery and development of technical security and expertise and capability of the wider team and drive the learning & development strategy … of appropriate ISO standards including 27001, 27002, 27005, 270017, 27018, 22301. Good working knowledge of Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Working knowledge of penetrationtesting skills and requirements Proven successful delivery of security aspects of major projects and demonstrable professional credibility and authority having been within a key security role working on More ❯
Professional Framework for one or more of the following capabilities: Cyber Security Advisory Security Architect Cyber Security Advisory Cyber Security Risk Manager Cyber Security Research, Development and Design Security Testing Person specification Ideal candidate: Be a leader in the delivery and development of technical security and expertise and capability of the wider team and drive the learning & development strategy … of appropriate ISO standards including 27001, 27002, 27005, 270017, 27018, 22301. Good working knowledge of Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Working knowledge of penetrationtesting skills and requirements Proven successful delivery of security aspects of major projects and demonstrable professional credibility and authority having been within a key security role working on More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
Professional Framework for one or more of the following capabilities: Cyber Security Advisory Security Architect Cyber Security Advisory Cyber Security Risk Manager Cyber Security Research, Development and Design Security Testing Person specification Ideal candidate: Be a leader in the delivery and development of technical security and expertise and capability of the wider team and drive the learning & development strategy … of appropriate ISO standards including 27001, 27002, 27005, 270017, 27018, 22301. Good working knowledge of Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Working knowledge of penetrationtesting skills and requirements Proven successful delivery of security aspects of major projects and demonstrable professional credibility and authority having been within a key security role working on More ❯
Vulnerability Management/SOC Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & PenetrationTesting, along with Reporting. Key Responsibilities of SOC/Vulnerability Management Analyst role would include: Conducting Vulnerability Scanning with leading Tools Scheduling of Scanning across Business, ensuring Reporting More ❯
engineering practices. In this role you will be responsible for: Advising clients on complex cybersecurity issues and building robust solutions collaboratively Performing risk and threat analyses, as well as penetration tests to uncover vulnerabilities Supporting internal and client teams with best practices for secure system and process development Facilitating workshops and security training sessions across interdisciplinary teams Clearly communicating … with developers, product owners, and stakeholders This role is remote in Germany with occasional travel to client site Essential: Professional experience in a similar role such as Security Engineer, Penetration Tester, DevSecOps etc. Knowledge of the following areas: PenetrationTesting, Threat Modelling, Application Security, Security by Design etc. Solid understanding of software development and system architecture basics More ❯
Bristol, Somerset, United Kingdom Hybrid / WFH Options
Alexander Mann Solutions - Public Sector Resourcing
. Assess manufacturer submissions and determine regulatory compliance . Oversee technical activities and ensure audit integrity . Collaborate with client managers for seamless type approval delivery . Observe vehicle testing and document findings . Develop internal guidelines and contribute to policy evolution . Stay ahead of emerging threats and technologies . Mentor colleagues and foster team-wide technical growth … What We're Looking For Essential Experience: . Cyber security risk assessments and management system audits . Penetrationtesting, vulnerability assessment, and security tools Technical Expertise: . Strong foundation in scientific and engineering principles . Proven ability to lead and review technical work Commitment to continuous professional development Qualifications: . Level 6 or above in Cyber Security, Information More ❯
knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetrationtesting Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success Will Be Measured By … and automation efficiency gains Noticeable improvement in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of a disaster recovery plan Positive user feedback on platform improvements Interested? Please Click Apply Now! Head of IT - Lead a Full-Stack Transformation More ❯
knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetrationtesting Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success Will Be Measured By … and automation efficiency gains Noticeable improvement in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of a disaster recovery plan Positive user feedback on platform improvements Interested? Please Click Apply Now! CTO - Lead a Full-Stack Transformation More ❯
knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetrationtesting Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success Will Be Measured By … and automation efficiency gains Noticeable improvement in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of a disaster recovery plan Positive user feedback on platform improvements Interested? Please Click Apply Now! Head of IT – Lead a Full-Stack Transformation More ❯
knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetrationtesting Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success Will Be Measured By … and automation efficiency gains Noticeable improvement in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of a disaster recovery plan Positive user feedback on platform improvements Interested? Please Click Apply Now! CTO Lead a Full-Stack Transformation More ❯