Nottingham, Nottinghamshire, England, United Kingdom Hybrid / WFH Options
Digital Waffle
response plans, ensuring continuous improvements Integrate security practices seamlessly into the DevOps pipeline Manage and optimise monitoring tools to provide real-time threat visibility Carry out regular threat and vulnerability assessments, applying effective remediation strategies Coach and mentor colleagues, keeping the team ahead of evolving risks and technologies What you bring: Significant experience in security operations across both cloud More ❯
implementation of an Information Security Management System (ISMS) aligned with ISO 27001 standards. Monitor emerging threats, legislation, and industry changes, translating them into actionable requirements. Coordinate penetration testing and vulnerability assessments, ensuring remediation plans are completed effectively. Identify and plan critical patching and security updates with technical teams. Ensure security is embedded in all change requests, upgrades, and projects. More ❯
CRM's UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
CRM's UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
legacy CRMs UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
Support bioinformaticians in building pipelines that are secure by design, version-controlled, and deployed through automated workflows. Collaborate with engineering teams to embed security throughout the development lifecycle. Automate vulnerability assessments to proactively identify and mitigate risks. Work closely with the security team to integrate best practices into new and existing features. Ensure compliance with security standards and regulations More ❯
strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security practices. Manage the relationship with the external SOC, ensuring proactive threat detection and response. Stay updated on industry More ❯
Birmingham, Chelmsley Wood, West Midlands (County), United Kingdom
SSR General & Management
strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security practices. Manage the relationship with the external SOC, ensuring proactive threat detection and response. Stay updated on industry More ❯
Lincoln, Lincolnshire, East Midlands, United Kingdom
MASS Consultants
Deliver Cyber Essentials and Cyber Essentials Plus assessments to clients Strengthen our internal security posture and processes Provide expert guidance on large, customer-facing projects Support penetration testing and vulnerability assessments, building real-world cyber skills The invaluable experience youll bring, to help us achieve more Essential: Around 3 years experience in an IT role Familiarity with operating systems More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
UKRI
organisation to identify, assess, and mitigate risks, ensuring security policies and processes align with organisational objectives and regulatory requirements. Advise stakeholders and implement effective security solutions, providing oversight for vulnerability assessments, remediation activities, and technical control evaluations. Promote a culture of security by participating in awareness programs, supporting internal and external audits, and assisting in the development of policy … standards, and procedures. Lead the collection, analysis, and presentation of InfoSec performance metrics, and prepare briefings for senior leaders on studies and plans. Analyse data from security assessment tools and systems, identify process inefficiencies, and contribute innovative solutions to improve security and efficiency across projects and initiatives Personal Specification: The below criteria will be scored during Shortlisting (S), Interview … I). Essential A professional certification (e.g., CISM, CISSP, CompTIA Security+, CCSP or AWS certification). Degree in a related subject or relevant comparable education. Solid experience with risk assessment methodologies and vulnerability management processes, including relevant tooling. (S&I) Excellent analytical, problem-solving, and decision-making skills, with strong attention to detail. (I) Proficient in communicating complex More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Automate deployment, configuration, and infrastructure provisioning (Infrastructure as Code) Work with virtualisation (VMware/vSphere, etc.) Configure/manage SAN/storage, Fibre Channel, zoning, LUN provisioning Participate in vulnerability assessments, patches, security hardening, and incident response Required Skills & Experience NPPV3 clearance, either current or active within the last 12 months (non-negotiable) Strong track record with Windows More ❯
we make it easy to get things sorted, stay compliant, and move forward with confidence. Responsibilities: Manage client relationships Perform system audits to assess compliance and security posture Conduct vulnerability assessments and identify risks Carry out technical remediations in client environments Audit results and produce clear, professional reports Training to keep up to date with industry trends Communicate technical More ❯
Dundee, Angus, Scotland, United Kingdom Hybrid / WFH Options
Reed
assets within ATM infrastructure. Stay current with emerging security trends and integrate advanced technologies and strategies to prevent card fraud, system vulnerabilities and operational liabilities. Conduct comprehensive risk and vulnerability assessments of ATM systems and deliver data-driven solutions to senior management. Effectively prioritise the level of risk/vulnerabilities, define strategies and roadmaps to implement reactive and preventive More ❯
staff to support infrastructure needs and maintain comprehensive documentation of systems and procedures Security Management: implement and maintain security best practices for infrastructure, including patch management, antivirus solutions, and vulnerability assessments (Support) The automation of recurrent activities Propose harmonisation of existing automation developments. Participate in the Day-to-Day service support (incident, alerts, changes. Provide on-call support during More ❯
throughout the solution lifecycle, from initial design through development, testing, and into operational deployment. Demonstrate a strong understanding of leading operational security functions, including SOC operations, threat intelligence, and vulnerability management. Experience of managing the incident response lifecycle, including triage, containment, investigation, remediation, and conducting post-incident reviews. Ability to establish and improve incident response playbooks and escalation processes … risk owners to advise on exposure and inform proportionate, evidence-based decisions. Demonstrate capability in planning, scoping, and reviewing security assurance activities, including penetration tests, IT health checks, and vulnerability assessments. Ability to interpret technical findings and ensure remediation actions are appropriately prioritised and managed through to resolution. Experience of maintaining a technical risk register and developing appropriate compensating More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
DMS Computer Recruitment
of the position include: Design and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments Participate More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
robust and secure technology framework. Job Description Work with managed service provider for cyber security incident management Proactively conduct threats detection and improve threats detection and management process Conduct vulnerability assessments, ensure the remediation and recommend improvements to mitigate risks. Develop security playbooks Work with engineering team to implement security tools and controls Scope penetration testing and review related … newly acquired businesses Provide guidance and training to staff on cybersecurity best practices. The Successful Applicant Proven experience in cyber security operations including threats hunting, detection and response, vulnerabilities assessment remediation Familiarity with data protection regulations and compliance requirements such as ISO27001, GDPR Solid experience in SIEM tools, preferably Microsoft Sentinel Relevant certifications are desirable. Excellent stakeholder management skill More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Michael Page Technology
a robust and secure technology framework. Description Work with managed service provider for cyber security incident management Proactively conduct threats detection and improve threats detection and management process Conduct vulnerability assessments, ensure the remediation and recommend improvements to mitigate risks. Develop security playbooks Work with engineering team to implement security tools and controls Scope penetration testing and review related … posture to newly acquired businesses Provide guidance and training to staff on cybersecurity best practices. Profile Proven experience in cyber security operations including threats hunting, detection and response, vulnerabilities assessment remediation Familiarity with data protection regulations and compliance requirements such as ISO27001, GDPR Solid experience in SIEM tools, preferably Microsoft Sentinel Relevant certifications are desirable. Excellent stakeholder management skill More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
RSM UK
enthusiastic Cyber Security Consultant to join our team. Working alongside our experienced team of specialists, you'll deliver offensive security services including digital footprint reconnaissance, social engineering, penetration testing, vulnerability assessments, and more to high-profile clients across all industries. The purpose of this role is to deliver offensive security services such as digital footprint reconnaissance, social engineering, vulnerabilityMore ❯