Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
Job overview: This is an opportunity to lead global Security Operations focused on safeguarding Arm's digital environment through exemplary threat detection, incident response, and vulnerabilitymanagement capabilities. This senior role, reporting directly into the CISO is accountable for driving the strategic direction of Arm's Detect & Response function, delivering outstanding performance and ensuring we are resilient against … an evolving threat landscape! In addition to operations, you will lead cyber crisis management, C-Suite level stress testing, team development, and top-level cybersecurity thought leadership. Responsibilities: Own and deliver the strategic roadmap for cyber incident and vulnerability detection & response in line with Arm's threat profile and business objectives. You will guide and develop a high … of enterprise security domains and how they can be used as a force multiplier for a technology business strategy, with the ability to influence at all levels. Extensive people management experience, fostering a culture focused on mentoring, wellbeing and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant security-related subject. Certifications such More ❯
effectively across teams. What you'll do: Develop and implement proactive security strategies, policies, and procedures to protect our systems, networks, and data assets. Lead regular security assessments, including vulnerability scans and penetration tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents … the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong capability … in risk assessment, vulnerabilitymanagement, and data informed decision -making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in scripting and programming (i.e., Python More ❯
successful candidate. You can expect: Design and manage scalable, secure cloud environments using Azure Bicep, ARM, or Terraform Lead the implementation of DevSecOps practices including CI/CD, secrets management, zero-trust security, and vulnerabilitymanagement Develop secure cloud-native architectures including microservices, containers, and serverless patterns Ensure compliance with industry security and privacy standards ( e.g. ISO … to succeed in this role Deep experience in Azure infrastructure (with IaC using Bicep, ARM, or Terraform) Hands-on knowledge of DevSecOps tooling and techniques (CI/CD, secrets management, threat modelling) Experience implementing security standards across cloud and hybrid environments Familiarity with container security ( e.g. Docker, Kubernetes) A strong understanding of compliance frameworks such as ISO 27001 and More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Found Talent Limited
experience managing IT security operations and driving improvements across infrastructure and processes? This Manchester based organisation is looking for a Security Manager to take ownership of information security, risk management and ongoing security enhancement activities. Youll work closely with Senior Leadership, leading key initiatives to protect systems, data and users while helping shape the organisations security posture. What youll … Essentials, ISO27001 or similar What youll need: Proven experience managing IT security or information security functions Strong technical knowledge of Microsoft environments and security controls Experience with incident response, vulnerabilitymanagement, and security risk mitigation Confident working with both technical teams and business stakeholders Solid understanding of security frameworks and compliance standards Ability to lead projects and drive … security improvements proactively Whats in it for you: A key management role focused on shaping and improving security within a collaborative IT leadership team Hybrid working Annual bonus and regular salary reviews Company pension scheme More ❯
threat detection and response processes. Key Requirements: Previous experience in a SOC Analyst or similar cybersecurity role Strong expertise in Splunk or similar SIEM tools Familiarity with Flexera for vulnerabilitymanagement Understanding of firewalls, network protocols, intrusion detection/prevention systems Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous Must be eligible for Developed Vetting (DV) clearance , requiring More ❯
one scripting language (PowerShell or Python preferred). Experience and understanding of hyperconverged infrastructure preferably with Nutanix, VMWare, Commvault and hybrid cloud infrastructure (Azure or similar). Knowledge of vulnerabilitymanagement, monitoring/alerting, and automation/orchestration platforms. Certifications such as Microsoft SC-200, Certified Ethical Hacker and CBCP or CBCI equivalent DR/resilience credentials. We More ❯
one scripting language (PowerShell or Python preferred). Experience and understanding of hyperconverged infrastructure preferably with Nutanix, VMWare, Commvault and hybrid cloud infrastructure (Azure or similar). Knowledge of vulnerabilitymanagement, monitoring/alerting, and automation/orchestration platforms. Certifications such as Microsoft SC-200, Certified Ethical Hacker and CBCP or CBCI equivalent DR/resilience credentials. We More ❯
london (city of london), south east england, united kingdom
Slaughter and May
one scripting language (PowerShell or Python preferred). Experience and understanding of hyperconverged infrastructure preferably with Nutanix, VMWare, Commvault and hybrid cloud infrastructure (Azure or similar). Knowledge of vulnerabilitymanagement, monitoring/alerting, and automation/orchestration platforms. Certifications such as Microsoft SC-200, Certified Ethical Hacker and CBCP or CBCI equivalent DR/resilience credentials. We More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ashdown Group
genuine opportunity for progression A large West London based company is looking for an experienced Cyber Analyst/Engineer to join its IT function. Duties will include: - BAU cyber vulnerabilitymanagement and incident response - Cyber security projects and working with the wider group/external vendors to deliver security requirements - Focus on delivering Cyber Essentials Plus and ISO27001 … Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Support ongoing improvements to internal defence - Oversee policies and procedures - Audits To be considered suitable you will need the following skills and experience: - Experience in either a Cyber Analyst or Cyber Engineer role - SC Cleared/Clearance - Experience in network audits and More ❯
STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics … and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerabilitymanagement, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills - Excellent organizational and analytical skills - Detail oriented with the ability to multi-task and prioritize efforts - Ability to express More ❯
Newport, Gwent, United Kingdom Hybrid / WFH Options
Yolk Recruitment Ltd
into asset security while managing a small team of technical analysts and overseeing supplier relationships to drive successful outcomes. What You'll Bring: Proven experience in IT asset and vulnerabilitymanagement In-depth knowledge of asset discovery tools, vulnerability scanning and remediation techniques Solid understanding of the differences between IT and operational technology environments Awareness of attacker More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Exertis
our security policies, procedures and controls. As part of the team, youll: Oversee the implementation and enforcement of security policies, standards and tools including endpoint protection, SIEM, SOC and vulnerabilitymanagement systems. Conduct risk assessments and threat modelling, maintaining the IT risk register and supporting the deployment of security controls, aligned with regulatory and business requirements. Lead incident … such as SIEM, IDS/IPS, endpoint protection and encryption is desirable. Experience with auditing A natural ability to build rapport with clients and colleagues. Strong communication and relationship management skills. Your Rewards and Benefits: We recognise and celebrate hard work at Exertis. When you join us, youll enjoy: 25 days of annual leave, with the option to purchase More ❯
or similar). Understanding of Cyber Essentials and broader security standards. Knowledge of incident response, intrusion detection, and threat analysis. Familiarity with endpoint security, IDS/IPS, firewalls, and vulnerability management. Strong problem-solving skills and a proactive, analytical mindset. Comfortable working onsite, 5 days a week in Manchester . What’s on Offer Salary More ❯
warrington, cheshire, north west england, united kingdom
Explore Group
or similar). Understanding of Cyber Essentials and broader security standards. Knowledge of incident response, intrusion detection, and threat analysis. Familiarity with endpoint security, IDS/IPS, firewalls, and vulnerability management. Strong problem-solving skills and a proactive, analytical mindset. Comfortable working onsite, 5 days a week in Manchester . What’s on Offer Salary More ❯
bolton, greater manchester, north west england, united kingdom
Explore Group
or similar). Understanding of Cyber Essentials and broader security standards. Knowledge of incident response, intrusion detection, and threat analysis. Familiarity with endpoint security, IDS/IPS, firewalls, and vulnerability management. Strong problem-solving skills and a proactive, analytical mindset. Comfortable working onsite, 5 days a week in Manchester . What’s on Offer Salary More ❯
include: Defining and delivering a comprehensive cyber security strategy aligned with business goals and regulations Leading and developing the cyber security operations team Overseeing threat monitoring, incident response, and vulnerabilitymanagement Managing compliance with frameworks such as Cyber Essentials, NIST, ISO27001, GDPR, and GovAssure Acting as the primary point of contact for cyber matters internally and externally, including … regulators and industry forums Representing Cyber Security at board committees and senior management meetings Supporting bid and tender processes, providing risk-based advice and competitive responses About You Were looking for an experienced cyber security leader with a blend of strategic vision and operational expertise. You should bring: Proven experience defining and executing cyber security strategy at a senior … level Strong knowledge of governance, risk, compliance, and regulatory frameworks Leadership experience managing cyber security operations teams Excellent stakeholder management skills, including board-level engagement The ability to represent the organisation externally with authority and credibility Benefits Competitive salary and benefits package Hybrid/flexible working arrangements Generous annual leave and pension Inclusive, collaborative culture with senior-level visibility More ❯
include: Defining and delivering a comprehensive cyber security strategy aligned with business goals and regulations Leading and developing the cyber security operations team Overseeing threat monitoring, incident response, and vulnerabilitymanagement Managing compliance with frameworks such as Cyber Essentials, NIST, ISO27001, GDPR, and GovAssure Acting as the primary point of contact for cyber matters internally and externally, including … regulators and industry forums Representing Cyber Security at board committees and senior management meetings Supporting bid and tender processes, providing risk-based advice and competitive responses About You We’re looking for an experienced cyber security leader with a blend of strategic vision and operational expertise. You should bring: Proven experience defining and executing cyber security strategy at a … senior level Strong knowledge of governance, risk, compliance, and regulatory frameworks Leadership experience managing cyber security operations teams Excellent stakeholder management skills, including board-level engagement The ability to represent the organisation externally with authority and credibility Benefits Competitive salary and benefits package Hybrid/flexible working arrangements Generous annual leave and pension Inclusive, collaborative culture with senior-level More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
ensuring mitigation plans are in place. Support the development and maintenance of security policies and standards. Assist with third-party security reviews and supplier risk management. Provide oversight of vulnerability assessments. Conduct architecture reviews for new systems and services. Evaluate technical controls and recommend improvements. Support the rollout of new security tools and technologies. Provide input into incident management and security metrics reporting. About You: 2+ years' experience in an security role. Strong understanding of risk assessment methodologies. Knowledge of frameworks such as ISO 27001. Experience with vulnerabilitymanagement and technical controls. Excellent problem-solving skills with strong attention to detail. Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is More ❯
ensuring mitigation plans are in place.· Support the development and maintenance of security policies and standards.· Assist with third-party security reviews and supplier risk management.· Provide oversight of vulnerability assessments.· Conduct architecture reviews for new systems and services.· Evaluate technical controls and recommend improvements.· Support the rollout of new security tools and technologies.· Provide input into incident management and security metrics reporting. About You: · 2+ years' experience in an security role.· Strong understanding of risk assessment methodologies.· Knowledge of frameworks such as ISO 27001.· Experience with vulnerabilitymanagement and technical controls.· Excellent problem-solving skills with strong attention to detail.· Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is More ❯
analysis and develop metrics that measure current risk Identify appropriate technology/data sources and drive the collection of data necessary to effectively evaluate threats. Communicate threat intelligence and vulnerabilitymanagement options Analysing threats and current security controls to identify gaps in current defensive posture Meet with clients and leading workshops Candidates ideally need to be ticking the … anomaly detections, PKI You have proven implementation of cloud security models, particularly identity, network, and encryption You have demonstrated understanding of Microsoft security technologies and strategy You have program management skills and solution support for security transformation/implementation programs You have business case development skills for justifying, prioritising & forecasting the funding requirements for security programs and initiatives This More ❯
Epsom, Surrey, United Kingdom Hybrid / WFH Options
Lloyd Recruitment - Epsom
the business. Key Responsibilities: Log, prioritise, and resolve technical issues and requests Deliver excellent customer service across multiple channels Escalate and manage major incidents appropriately Support change and problem management processes Assist with projects and improve internal tools like Power Apps Maintain accurate documentation and asset records Participate in shift patterns, including some weekend/on-call work What … focus Ability to manage competing priorities in a fast-paced environment ITIL knowledge and experience working to SLAs Nice to Have: Experience in the financial services sector Familiarity with vulnerabilitymanagement tools (e.g., Qualys) Knowledge of remote support tools and collaboration platforms Experience with Power Apps and automating service processes Refer a friend and earn a retail voucher More ❯
implementation of the firm's overall digital transformation strategy , leveraging application modernisation and innovation to enhance business operations and achieve strategic goals. Act as a trusted advisor to senior management and business leaders. Influence and shape technology decisions related to application development and deployment across the firm. Lead the design of complex and innovative application solutions , integrating various applications … leadership to the application architecture team and related stakeholders, mentoring and developing junior architects and engineers. Lead the evaluation and selection of cutting-edge application technologies and platforms, Stakeholder Management - Collaborate with IT, Business Units, Development teams, Security and vendors Develop and maintain comprehensive documentation of application enterprise architecture Proactively identify emerging trends and technologies in application development and … actionable strategies for the firm. Manage and mitigate risks associated with application development and deployment, ensuring compliance with security standards, data privacy regulations (e.g. GDPR), and overall enterprise risk management frameworks. Conduct regular reviews with application owners to identifying areas for improvement, optimisation, cost reduction and enhanced business value. Provide expert-level support and troubleshooting for complex application architecture More ❯
london (city of london), south east england, united kingdom
Deloitte
implementation of the firm's overall digital transformation strategy , leveraging application modernisation and innovation to enhance business operations and achieve strategic goals. Act as a trusted advisor to senior management and business leaders. Influence and shape technology decisions related to application development and deployment across the firm. Lead the design of complex and innovative application solutions , integrating various applications … leadership to the application architecture team and related stakeholders, mentoring and developing junior architects and engineers. Lead the evaluation and selection of cutting-edge application technologies and platforms, Stakeholder Management - Collaborate with IT, Business Units, Development teams, Security and vendors Develop and maintain comprehensive documentation of application enterprise architecture Proactively identify emerging trends and technologies in application development and … actionable strategies for the firm. Manage and mitigate risks associated with application development and deployment, ensuring compliance with security standards, data privacy regulations (e.g. GDPR), and overall enterprise risk management frameworks. Conduct regular reviews with application owners to identifying areas for improvement, optimisation, cost reduction and enhanced business value. Provide expert-level support and troubleshooting for complex application architecture More ❯
implementation of the firm's overall digital transformation strategy , leveraging application modernisation and innovation to enhance business operations and achieve strategic goals. Act as a trusted advisor to senior management and business leaders. Influence and shape technology decisions related to application development and deployment across the firm. Lead the design of complex and innovative application solutions , integrating various applications … leadership to the application architecture team and related stakeholders, mentoring and developing junior architects and engineers. Lead the evaluation and selection of cutting-edge application technologies and platforms, Stakeholder Management - Collaborate with IT, Business Units, Development teams, Security and vendors Develop and maintain comprehensive documentation of application enterprise architecture Proactively identify emerging trends and technologies in application development and … actionable strategies for the firm. Manage and mitigate risks associated with application development and deployment, ensuring compliance with security standards, data privacy regulations (e.g. GDPR), and overall enterprise risk management frameworks. Conduct regular reviews with application owners to identifying areas for improvement, optimisation, cost reduction and enhanced business value. Provide expert-level support and troubleshooting for complex application architecture More ❯