channel islands, united kingdom Hybrid / WFH Options
Drax
Cyber Threat Intelligence & VulnerabilityManagement Lead Flexible location Hybrid working Permanent, full time Closing date: Monday 3rd November 2025 Who we are Were not just talking about making a difference, were making it happen. We generate dispatchable, renewable power and create stable energy in an uncertain world. Building on our proud heritage, we have ambition to become the … to decarbonise the planet for generations to come. About the role The primary purpose of this role is to manage and influence all aspects of Cyber Threat Intelligence and VulnerabilityManagement, but particularly in the development of the threat landscape to Drax. Youll also assist in the development of Technical Controls in accordance with policy, standards and regulatory … requirements. Youll help to develop and support senior management with the technical controls and cyber threat intelligence skills within the group-wide security team and through the rollout of tools, technical controls, policies and procedures, and coaching and mentoring. The role will also have responsibility for working with asset owners to ensure that they understand their responsibilities regarding risk More ❯
Guernsey, Channel Isles, South West, United Kingdom Hybrid / WFH Options
Drax
Cyber Threat Intelligence & VulnerabilityManagement Lead Flexible location Hybrid working Permanent, full time Closing date: Monday 3rd November 2025 Who we are Were not just talking about making a difference, were making it happen. We generate dispatchable, renewable power and create stable energy in an uncertain world. Building on our proud heritage, we have ambition to become the … to decarbonise the planet for generations to come. About the role The primary purpose of this role is to manage and influence all aspects of Cyber Threat Intelligence and VulnerabilityManagement, but particularly in the development of the threat landscape to Drax. Youll also assist in the development of Technical Controls in accordance with policy, standards and regulatory … requirements. Youll help to develop and support senior management with the technical controls and cyber threat intelligence skills within the group-wide security team and through the rollout of tools, technical controls, policies and procedures, and coaching and mentoring. The role will also have responsibility for working with asset owners to ensure that they understand their responsibilities regarding risk More ❯
Engineer Are you looking for more in life than just building another web app? Does upending cyber security resonate with you? We're a rapidly expanding cybersecurity startup revolutionizing vulnerabilitymanagement for organizations of all sizes. For our customers, vulnerabilitymanagement has always been a game of catch-up, with limited asset coverage and manual processes. … Nucleus Security's primary mission is to create a fast, scalable platform that not only addresses these challenges but also makes vulnerabilitymanagement simple, fun, and effortless. Currently, we're looking for a passionate Senior Python Software Engineer to join our growing team of engineers. About Nucleus Security Nucleus Security is transforming how security and development teams manage … vulnerabilities at scale. Our platform unifies vulnerability data across scanners and environments, enabling organizations to prioritize and remediate vulnerabilities efficiently. We work with some of the most security-forward enterprises, empowering them with tools that accelerate secure software delivery and infrastructure hardening. Role Overview As a Senior Software Engineer in our Engineering team, you'll operate at the frontier More ❯
Plymouth, Devon, United Kingdom Hybrid / WFH Options
Cyber Threat Not sure what skills you will need for this opportunity Simply read the full description below to get a complete picture of candidate requirements. Intelligence & VulnerabilityManagement Lead Flexible location Hybrid working Permanent, full time Closing date: Monday 3rd November 2025 Who we are We re not just talking about making a difference, we re making … to decarbonise the planet for generations to come. About the role The primary purpose of this role is to manage and influence all aspects of Cyber Threat Intelligence and VulnerabilityManagement, but particularly in the development of the threat landscape to Drax. You ll also assist in the development of Technical Controls in accordance with policy, standards and … regulatory requirements. You ll help to develop and support senior management with the technical controls and cyber threat intelligence skills within the group-wide security team and through the rollout of tools, technical controls, policies and procedures, and coaching and mentoring. The role will also have responsibility for working with asset owners to ensure that they understand their responsibilities More ❯
Northampton, Northamptonshire, United Kingdom Hybrid / WFH Options
Cyber Threat Not sure what skills you will need for this opportunity Simply read the full description below to get a complete picture of candidate requirements. Intelligence & VulnerabilityManagement Lead Flexible location Hybrid working Permanent, full time Closing date: Monday 3rd November 2025 Who we are We re not just talking about making a difference, we re making … to decarbonise the planet for generations to come. About the role The primary purpose of this role is to manage and influence all aspects of Cyber Threat Intelligence and VulnerabilityManagement, but particularly in the development of the threat landscape to Drax. You ll also assist in the development of Technical Controls in accordance with policy, standards and … regulatory requirements. You ll help to develop and support senior management with the technical controls and cyber threat intelligence skills within the group-wide security team and through the rollout of tools, technical controls, policies and procedures, and coaching and mentoring. The role will also have responsibility for working with asset owners to ensure that they understand their responsibilities More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Cyber Threat Not sure what skills you will need for this opportunity Simply read the full description below to get a complete picture of candidate requirements. Intelligence & VulnerabilityManagement Lead Flexible location Hybrid working Permanent, full time Closing date: Monday 3rd November 2025 Who we are We re not just talking about making a difference, we re making … to decarbonise the planet for generations to come. About the role The primary purpose of this role is to manage and influence all aspects of Cyber Threat Intelligence and VulnerabilityManagement, but particularly in the development of the threat landscape to Drax. You ll also assist in the development of Technical Controls in accordance with policy, standards and … regulatory requirements. You ll help to develop and support senior management with the technical controls and cyber threat intelligence skills within the group-wide security team and through the rollout of tools, technical controls, policies and procedures, and coaching and mentoring. The role will also have responsibility for working with asset owners to ensure that they understand their responsibilities More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Cyber Threat Not sure what skills you will need for this opportunity Simply read the full description below to get a complete picture of candidate requirements. Intelligence & VulnerabilityManagement Lead Flexible location Hybrid working Permanent, full time Closing date: Monday 3rd November 2025 Who we are We re not just talking about making a difference, we re making … to decarbonise the planet for generations to come. About the role The primary purpose of this role is to manage and influence all aspects of Cyber Threat Intelligence and VulnerabilityManagement, but particularly in the development of the threat landscape to Drax. You ll also assist in the development of Technical Controls in accordance with policy, standards and … regulatory requirements. You ll help to develop and support senior management with the technical controls and cyber threat intelligence skills within the group-wide security team and through the rollout of tools, technical controls, policies and procedures, and coaching and mentoring. The role will also have responsibility for working with asset owners to ensure that they understand their responsibilities More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
PEXA Group
Security Operations and Governance Oversee SOC operations ensuring timely threat detection, response, and resolution Continuously improve detection and response capabilities using Cortex XDR, Abnormal Security, Splunk, and Nucleus Manage vulnerabilitymanagement end-to-end, from scanning and prioritisation to remediation tracking Coordinate with third-party partners such as Blazeguard and CCX to ensure effective service delivery Oversee secure … configuration, endpoint management, and patch compliance across hybrid environments including Azure and AWS Own the UK information security framework and assurance programs including ISO 27001, FCA standards, SOC audits, and lender assurances Maintain and evolve security policies, standards, and control frameworks Lead audit preparation, evidence collection, and control testing for certifications and partner reviews Collaboration and Culture Build strong … partnerships across engineering, IT, legal, HR, and operations to embed security in everyday practices Provide input on vendor assessments and third-party risk management Promote a culture of security awareness through training, phishing simulations, and education programs Report on cyber risk, maturity, and incidents to senior leadership with transparency and continuous improvement Key Skills Key Skills Proven experience leading More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Vallum Associates
experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … a comfortable level • Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies • Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity • Experience and understanding of both the roles and interlock between enterprise & solution architecture • Experience in both operational and transformation … cybersecurity roles or a clear working understanding of both perspectives • Experience working in large-scale IT transformation programmes Identity & Access Management • Secrets Management: Experience of designing solutions using SM tools such as HashiCorp Vault • Experience of developing secrets management patterns and championing designs through architecture governance forums • Experience of designing or implementing Workload Identity Frameworks within large More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Vallum Associates
experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … a comfortable level • Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies • Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity • Experience and understanding of both the roles and interlock between enterprise & solution architecture • Experience in both operational and transformation … cybersecurity roles or a clear working understanding of both perspectives • Experience working in large-scale IT transformation programmes Identity & Access Management • Secrets Management: Experience of designing solutions using SM tools such as HashiCorp Vault • Experience of developing secrets management patterns and championing designs through architecture governance forums • Experience of designing or implementing Workload Identity Frameworks within large More ❯
Channel Isles, United Kingdom Hybrid / WFH Options
Drax
Cyber Threat Intelligence & VulnerabilityManagement Lead Flexible location Hybrid working Permanent, full time Closing date: Monday 3rd November 2025 Who we are Were not just talking about making a difference, were making it happen. We generate dispatchable, renewable power and create stable energy in an uncertain world click apply for full job details More ❯
Cyber Threat Intelligence & VulnerabilityManagement Lead Flexible location Hybrid working Permanent, full time Closing date: Monday 3rd November 2025 Who we are Were not just talking about making a difference, were making it happen. We generate dispatchable, renewable power and create stable energy in an uncertain world. Building on our proud heritage, we have ambition to become the More ❯
Crewe, Cheshire, England, United Kingdom Hybrid / WFH Options
DCS Recruitment
Security Analyst to play a key role in protecting our client's systems, networks, and data. This is an exciting opportunity to lead on threat detection, incident response, and vulnerabilitymanagement , while driving continuous improvement across the organisation's security posture. You'll collaborate closely with infrastructure, development, and compliance teams to maintain high standards of cyber resilience … and uphold key frameworks such as ISO 27001 and Cyber Essentials Plus . Key Responsibilities: * Lead threat detection, incident response, and vulnerabilitymanagement activities * Strengthen cyber security posture across cloud, infrastructure, and applications * Provide expert guidance to development teams on secure SDLC practices * Maintain compliance with ISO 27001 and Cyber Essentials Plus standards * Mentor junior analysts and support More ❯
Wokingham, Berkshire, England, United Kingdom Hybrid / WFH Options
KBC Technologies UK LTD
architect, and maintain network security infrastructure including Firewalls, IDPS, Proxies, Load Balancers, VPNs, and WAFs. Develop and manage firewall policies, network access controls, IAM solutions, MFA, RBAC, and privilege management . Ensure alignment of security measures with compliance standards (GDPR, HIPAA, PCI DSS). Conduct regular security audits and assessments to identify and remediate risks. Apply industry frameworks such … as NIST Cybersecurity Framework, ISO 27001, CIS Controls . Oversee and enhance security technologies: SIEM, vulnerabilitymanagement, cloud security (OCI/Azure/AWS), PKI, cryptography, web/email security, logging and monitoring . Monitor network traffic for anomalies and potential breaches. Collaborate with IT teams (network engineers, sysadmins, developers) to ensure a holistic approach to security. Communicate More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom Hybrid / WFH Options
REDTECH RECRUIT
for Information Security Officer Define and implement security architecture, standards, and processes across SaaS platforms Embed security best practices into development lifecycles and product roadmaps Oversee cloud infrastructure security, vulnerabilitymanagement, and incident response Maintain security monitoring, alerting, and access management controls Lead ISO27001 certification maintenance and audits Ensure compliance with PCI/DSS, GDPR, and other …/GDPR/PCI DSS/CISSP/CISM/CISA/Azure Security/AWS Security/DevSecOps/Cybersecurity/Application Security/Security Compliance/Risk Management/NIST/OWASP/CIS Controls/Data Protection/Information Governance/Cloud Infrastructure Security More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Atrium Workforce Solutions Ltd
CEH, CySA+, OSCP, CISSP, CCSP etc.) • IT Security or Cyber Security experience in any of the following areas: Incident Response & Digital Forensics. Cybersecurity Detection Engineering and Threat Hunting or VulnerabilityManagement • Experience analysing attack vectors, current threats, and security remediation strategies • Experience with SIEM technologies, EDR technologies, and/or Asset isolation tools • Experience with cloud environment • Networking More ❯
such as antivirus, content filtering, firewalls, and intrusion detection systems. *Proficiency in Microsoft Azure and associated cloud security services. *Familiarity with Windows and Linux operating systems. *Experience with log management and security monitoring platforms. *Critical thinking and problem-solving skills in complex technical environments. *Knowledge of ITIL practices and security compliance standards. *Must have access to own transport. *Willingness … Computer Science, Cybersecurity, or a related field. *Postgraduate qualification in an IT-related subject. *Professional certifications such as CISSP, CompTIA Security+, or equivalent. *Experience with governance frameworks and risk management tools. Key Responsibilities *Operate and maintain security systems including firewalls, antivirus, intrusion detection/prevention, and authentication platforms. *Monitor system logs and network traffic to identify suspicious activity and … potential threats. *Respond to security incidents and support forensic investigations. *Develop and maintain security protocols, policies, and procedures. *Conduct vulnerability assessments and recommend mitigation strategies. *Deliver cybersecurity awareness training and guidance to staff. *Maintain the information security risk register and support audit processes. *Collaborate with IT and operational teams to ensure secure system configurations. *Assist in compliance with frameworks More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
respond to Cyber Security Incidents Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others. Run Vulnerability Assessment tools to measure compliance with security updates and security patches. Member of a Team who are responsible for making multiple daily CSOC checks to detect and respond to … XDR and Microsoft Defender variants, and Elastic Security, or displays aptitude to learn how to work with a SIEM. Experience and knowledge of SIEM tools, Cyber Security Incident Response, VulnerabilityManagement and Cyber Threat Intelligence. Experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at More ❯
london, south east england, united kingdom Hybrid / WFH Options
TECEZE
services provider that offers a broad spectrum of capabilities across digital workplace, infrastructure, cloud/datacenter, and cybersecurity, with a focus on solutioning, service delivery, and end-to-end management for small to mid-size US clients. Below is a detailed, synthesized job-description-style profile for a Solution Consultant who could lead and own the practice for such … to SMB/MSP needs. Service delivery leadership: Define and enforce service delivery frameworks, SLAs, and operational playbooks; ensure seamless transition from presales to delivery; oversee service continuity, incident management, change control, and problem management. Platform and technology scope: Digital workplace services (end-user devices, collaboration tools, unified communications, remote/mobile workforce enablement); infrastructure and network (LAN/… WAN, SD-WAN, data-center design, virtualization, storage, backup); cloud and datacenter (IaaS/PaaS, public, private, hybrid architectures; migration and modernization); cybersecurity (identity, endpoints, network, identity & access management, threat detection, incident response); application support and managed services for critical business applications. Security and compliance: Build security-by-design into solution proposals; incorporate best practices for data protection, vulnerabilityMore ❯
slough, south east england, united kingdom Hybrid / WFH Options
TECEZE
services provider that offers a broad spectrum of capabilities across digital workplace, infrastructure, cloud/datacenter, and cybersecurity, with a focus on solutioning, service delivery, and end-to-end management for small to mid-size US clients. Below is a detailed, synthesized job-description-style profile for a Solution Consultant who could lead and own the practice for such … to SMB/MSP needs. Service delivery leadership: Define and enforce service delivery frameworks, SLAs, and operational playbooks; ensure seamless transition from presales to delivery; oversee service continuity, incident management, change control, and problem management. Platform and technology scope: Digital workplace services (end-user devices, collaboration tools, unified communications, remote/mobile workforce enablement); infrastructure and network (LAN/… WAN, SD-WAN, data-center design, virtualization, storage, backup); cloud and datacenter (IaaS/PaaS, public, private, hybrid architectures; migration and modernization); cybersecurity (identity, endpoints, network, identity & access management, threat detection, incident response); application support and managed services for critical business applications. Security and compliance: Build security-by-design into solution proposals; incorporate best practices for data protection, vulnerabilityMore ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
TECEZE
services provider that offers a broad spectrum of capabilities across digital workplace, infrastructure, cloud/datacenter, and cybersecurity, with a focus on solutioning, service delivery, and end-to-end management for small to mid-size US clients. Below is a detailed, synthesized job-description-style profile for a Solution Consultant who could lead and own the practice for such … to SMB/MSP needs. Service delivery leadership: Define and enforce service delivery frameworks, SLAs, and operational playbooks; ensure seamless transition from presales to delivery; oversee service continuity, incident management, change control, and problem management. Platform and technology scope: Digital workplace services (end-user devices, collaboration tools, unified communications, remote/mobile workforce enablement); infrastructure and network (LAN/… WAN, SD-WAN, data-center design, virtualization, storage, backup); cloud and datacenter (IaaS/PaaS, public, private, hybrid architectures; migration and modernization); cybersecurity (identity, endpoints, network, identity & access management, threat detection, incident response); application support and managed services for critical business applications. Security and compliance: Build security-by-design into solution proposals; incorporate best practices for data protection, vulnerabilityMore ❯
Poole, Dorset, England, United Kingdom Hybrid / WFH Options
Mexa Solutions LTD
week in the office) Scope : Work across IT, application, cloud, and physical security, no siloed remits here Responsibility : Be the go-to person for penetration testing, compliance audits, and vulnerabilitymanagement Environment : Modern SaaS product environment, working alongside DevOps, engineering, and IT Growth : Get stuck into a wide variety of work, with support from leadership and autonomy to … make a real impact What you’ll be doing: Leading vulnerability assessments and coordinating regular penetration testing across systems and products Owning risk remediation actions, from security audits to PCI scans and compliance reporting Working across cloud (AWS), infrastructure, and software environments to ensure security best practices are embedded throughout Supporting the secure design of products and infrastructure, providing … ideally 2-3+ years), ideally across cloud and hybrid environments Strong penetration testing experience with confidence to act on the findings A solid grasp of access controls, identity management, and cloud security (especially AWS) Familiarity with secure software development practices and working alongside dev teams Understanding of key frameworks like ISO 27001, PCI-DSS, and GDPR Bonus points More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Reed
practices. You’ll work closely with IT, development, and project teams to embed security into every stage of the software development lifecycle and drive a risk-based approach to vulnerability management. Key Responsibilities Lead application security initiatives across cloud-native and enterprise environments. Promote secure design principles, threat modelling, and best practices across teams. Own and evolve the technical … vulnerabilitymanagement programme. Implement and support security controls, particularly within Azure cloud environments. Evaluate and deploy best-in-class application security tools. Mentor teams and deliver tailored security awareness programmes. Assist with incident response, security training, and supplier/client security assessments. What We’re Looking For Essential Skills & Experience: Proven experience in application security engineering. Strong knowledge More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Career Legal
days in London per week* What You’ll Do Build the SecOps team from the ground up and manage/mentor the team. Lead the implementation, optimisation, and management of cutting-edge security tools like CrowdStrike, Palo Alto, and Mimecast. Take ownership of our cyber defence posture from incident response and vulnerabilitymanagement to WAFs, DDoS protection More ❯