experience as a SOC/Security Engineer within a cloud environment Strong CrowdStrike experience is needed Experience with a range of SIEM, SOAR and vulnerabilitymanagement tools Experience advising on security best practices and developing SOC playbooks Networking and infrastructure experience, including with Firewalls and IDS/IPS More ❯
Portsmouth, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Computappoint
issues Support installation, configuration, and upgrades of operating systems and software Assist with virtualisation and cloud technologies Contribute to security initiatives, including patching and vulnerabilitymanagement Maintain accurate asset records and update documentation Follow and uphold change control processes Technologies: Windows and/or Linux Operating Systems Virtualisation … Platforms Cloud Environments Infrastructure Monitoring and Management Tools Microsoft Entra and Azure Environment Management Python and PowerShell scripting experience Veeam VBR server experience would be beneficial to your application Requirements: Strong communication skills and a customer-focused approach Ability to work both independently and within a team A More ❯
portsmouth, hampshire, south east england, United Kingdom Hybrid / WFH Options
Computappoint
issues Support installation, configuration, and upgrades of operating systems and software Assist with virtualisation and cloud technologies Contribute to security initiatives, including patching and vulnerabilitymanagement Maintain accurate asset records and update documentation Follow and uphold change control processes Technologies: Windows and/or Linux Operating Systems Virtualisation … Platforms Cloud Environments Infrastructure Monitoring and Management Tools Microsoft Entra and Azure Environment Management Python and PowerShell scripting experience Veeam VBR server experience would be beneficial to your application Requirements: Strong communication skills and a customer-focused approach Ability to work both independently and within a team A More ❯
for: Owning and leading the information security function, working collaboratively across all departments. Maintaining and evolving ISO 27001 certification and managing the Information Security Management System (ISMS) lifecycle. Performing regular risk assessments, developing and managing remediation plans, and conducting internal security audits. Ensuring compliance with data protection laws (e.g. … controls across cloud infrastructure (ideally AWS), including access control, encryption, and logging. Leading the incident response process and managing third-party penetration testing and vulnerabilitymanagement activities. The ideal Information Security Lead will have experience with the following: 3-5 years of hands-on experience in an information … AWS preferred) and common security risks associated with SaaS platforms. Hands-on knowledge of security tooling, including endpoint protection, SIEMs, DLP, identity and access management (IAM), and SSO. A clear understanding of data privacy laws, particularly GDPR. This is a unique opportunity to be the foundational Information Security leader More ❯
leadership role that requires an individual with a strong technical background, as well as an ability to work with the IT organization and business management to align priorities and plans with key business objectives. This role and its function are part of the Information Technology shared services model. A … legal and purchasing departments to establish mutually acceptable contracts and service-level agreements. Manages production issues and incidents and participates in problem and change management forums. Works with the Executive Director of IT and IT Security and business stakeholders to define metrics and reports strategies that effectively communicate successes … Manages outsourced vendors that provide information security functions for compliance with contracted service-level agreements. Manages the day-to-day activities of threat and vulnerabilitymanagement, identify risk tolerances, recommend treatment plans, and communicate information about residual risk. Manages security projects and provides expert guidance on security matters More ❯
Dover, Kent, South East, United Kingdom Hybrid / WFH Options
Migrant Help
and experience we are looking for in our Information Security Officer: Proficiency in security domains, tools and technologies such as DLP, SIEM, SOAR and VulnerabilityManagement Good working knowledge of network security, firewalls, threat management, endpoint detection and response Ability to identify, assess, and mitigate security risks More ❯
Shepherdswell, Kent, United Kingdom Hybrid / WFH Options
Migrant Help
and experience we are looking for in our Information Security Officer: Proficiency in security domains, tools and technologies such as DLP, SIEM, SOAR and VulnerabilityManagement Good working knowledge of network security, firewalls, threat management, endpoint detection and response Ability to identify, assess, and mitigate security risks More ❯
diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency in … Experience with CI/CD tools and practices, ensuring secure and automated deployment processes. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Responsibilities Security Strategy: Define and execute cloud security strategy, partnering with platform and Site Reliability Engineering (SRE More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Eames Consulting
of complex, multi-site security projects globally. Deep knowledge of security frameworks (NIST, ISO 27001, CIS, CSA CCM). Strong understanding of GRC processes , vulnerabilitymanagement, incident response, and SOC. Familiarity with DevSecOps , secure SDLC, disaster recovery, and BCP. Excellent stakeholder management and communication skills. Experience navigating More ❯
on. Experience required Familiar with NIST, ISO 27001, ITIL Azure - 5 years experience Info Sec (Azure AD, Defender, Sentinel) Audits and report writing Assessments VulnerabilityManagement and Pen Testing Zero Trust Architecture Automation (eg powershell, python More ❯
in an agile and resilient manner. Required technical experience: Microsoft Sentinel Microsoft Defender products Splunk Cloud + Splunk Enterprise Security (ES) Crowdstrike Falcon Tenable VulnerabilityManagement Be yourself. We embrace diverse perspectives, experiences, and backgrounds. Please let us know if you require support or adjustments to assist with More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
e.g., AWS Shield, Security Hub, IAM). Knowledge of security frameworks such as ISO 27001, NIST, or CIS benchmarks. Experience in application security reviews, vulnerabilitymanagement, and security controls implementation. Familiarity with OWASP Top 10, CWE, and secure coding practices. Proficiency in using security tools such as static More ❯
backup, and business continuity processes • Collaborating with internal teams and external vendors on system upgrades, maintenance, and incident resolution • Contributing to security posture improvements, vulnerabilitymanagement, and compliance efforts Experience • 5+ years’ experience in infrastructure or systems engineering, preferably within trading, hedge funds, or financial services • Deep expertise … scripting and automation skills, particularly with PowerShell • Hands-on experience with cloud platforms (Azure or AWS) and hybrid IT environments • Solid understanding of endpoint management, system hardening, and patching • Familiarity with security best practices in regulated or high-trust environments • A proactive, self-starting attitude with the ability to More ❯
architecture for IT security and end-user service domains, ensuring security is integrated into all aspects of the organisation's IT. Driving and facilitating vulnerabilitymanagement and secure the design of IT services. Monitoring, identifying, resolution activities, and reporting IT security KPI's and incidents. Liaising with the More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
ECS Resource Group Ltd
within an enterprise environment Knowledge of security frameworks like Cyber Essentials, ISO 27001, and GDPR Experience with Microsoft 365 security solutions, security operations, and vulnerabilitymanagement Strong analytical skills and the ability to communicate technical information to non-technical users This is a fantastic opportunity to join a More ❯
aligned with industry best practice and regulatory standards. Take the lead on third-party risk assessments and security audits. Collaborate with technical teams on vulnerabilitymanagement and remediation planning. Provide input on secure design and architecture of new systems and solutions. Monitor and enhance security tooling and incident More ❯
Kingston Upon Hull, East Riding of Yorkshire, United Kingdom
Principal IT
when required Create tickets to record technical issues and solutions, escalating issues to senior team members when necessary Responsible for the ongoing patch and vulnerabilitymanagement of many of the company devices Continually adding to the knowledge database to ensure all technical documentation is fully up to date More ❯
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team More ❯
stakeholders. Excellent communication skills with the ability to translate technical concepts for non-technical audiences. Familiarity with SOC, incident response, DR/BCP , and vulnerability management. More ❯
Warwick, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Azure, ensuring alignment with business and technical requirements. Design scalable, secure, and high-performing cloud applications using Azure services (e.g., Azure Front Door, API Management, Azure Gateway, Azure Spring Boot, Azure Functions, Azure Logic Apps, Azure PostgreSQL). Define and document conceptual, logical, and physical architectures, ensuring compliance with … enterprise standards. Design and implement file-based and API-based integration patterns. Provide guidance on Azure API Management, Azure Functions, and Logic Apps to development teams. Conduct design reviews and ensure compliance with architecture principles. Apply cloud security controls (e.g., Azure Defender, Qualys vulnerability scans) and enforce baseline … reviewing, and validating cloud architecture (Azure or GCP). Ability to define and apply Non-Functional Requirements and security controls. Knowledge of cybersecurity frameworks, vulnerabilitymanagement, and compliance standards. Experience working with Design Authorities to ensure enterprise architecture compliance. Excellent communication skills and ability to explain complex technical More ❯
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Ltd
Azure, ensuring alignment with business and technical requirements. Design scalable, secure, and high-performing cloud applications using Azure services (e.g., Azure Front Door, API Management, Azure Gateway, Azure Spring Boot, Azure Functions, Azure Logic Apps, Azure PostgreSQL). Define and document conceptual, logical, and physical architectures, ensuring compliance with … enterprise standards. Design and implement file-based and API-based integration patterns. Provide guidance on Azure API Management, Azure Functions, and Logic Apps to development teams. Conduct design reviews and ensure compliance with architecture principles. Apply cloud security controls (e.g., Azure Defender, Qualys vulnerability scans) and enforce baseline … reviewing, and validating cloud architecture (Azure or GCP). Ability to define and apply Non-Functional Requirements and security controls. Knowledge of cybersecurity frameworks, vulnerabilitymanagement, and compliance standards. Experience working with Design Authorities to ensure enterprise architecture compliance. Excellent communication skills and ability to explain complex technical More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Sycurio
the ISO27001, PCI-DSS, and SOC2 compliance. They are the subject matter expert on all things regarding security and compliance, owning the information risk management processes. They are the thought leader on all matters within the security and compliance domain such that the company remains secure against the ever … stakeholders, communicating the information security strategy to relevant parties and providing assurance of policies, procedures, and systems. Develop, maintain, and expand the information security management system ('ISMS') to optimise compliance for ISO27001, PCI-DSS, and SOC2. Identify gaps in the information security capability, both technical and operational, and propose … on containment and mitigation activities. Execute threat simulations. Assess emerging and potential security threats and act proactively to mitigate relevant threats. End-to-end vulnerability management. Manage the security toolset. Act as the security "face" of Sycurio to its customers, suppliers, and auditors, supporting both in-life and sales More ❯
are dedicated to building a complete suite of industry-leading products which provide a cohesive platform for our customers. Our range of solutions spans vulnerabilitymanagement, detection, automation, cloud security, and penetration testing; in order to build these products our teams work with an array of technologies including … our engineers are first class stakeholders in all parts of the development process. When required, partner with internal teams such as UX and Product Management who work deeply with our product to ensure we are understanding our customers needs. Continue to develop a deep understanding of our products in More ❯
candidate will be working with a Telecoms end client across various projects. Key Responsibilities: Lead integration of security tools such as Qualys (UK) for vulnerabilitymanagement and CyberArk for privileged access security. Implement and support TrueSight for infrastructure and security monitoring. Ensure compliance and governance across multi-cloud More ❯
candidate will be working with a Telecoms end client across various projects. Key Responsibilities: Lead integration of security tools such as Qualys (UK) for vulnerabilitymanagement and CyberArk for privileged access security. Implement and support TrueSight for infrastructure and security monitoring. Ensure compliance and governance across multi-cloud More ❯