You'll be at the heart of their SecOps function, helping to shape and improve their cyber capabilities. What they are looking for : Someone comfortable with SIEM, EDR, and vulnerabilitymanagement tooling (Rapid7, CrowdStrike, Qualys etc.) Scripting and automation Strong foundational IT and networking knowledge Familiarity with patching solutions and email security tools A proactive mindset and good More ❯
Kingston Upon Hull, East Riding of Yorkshire, United Kingdom
Principal IT
on the system as and when required Create tickets to record technical issues and solutions, escalating issues to senior team members when necessary Responsible for the ongoing patch and vulnerabilitymanagement of many of the company devices Continually adding to the knowledge database to ensure all technical documentation is fully up to date and relevant Requirements: Proven work More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Stackstudio Digital Ltd
to): Microsoft Defender for Endpoint Microsoft Defender for O365 Microsoft Defender for Identity Microsoft 365 Defender Microsoft Cloud App Security Good knowledge around Endpoint Detection and Response (EDR), Threat & VulnerabilityManagement (TVM), Attack Surface Reduction (ASR), and Auto Investigation and Remediation (AIR). Experience with Symantec Endpoint Protection (SEPM). Experience in McAfee/Windows Defender Antivirus Policy More ❯
in large-scale Financial Services organisations. Proven expertise in designing and implementing secure architectures within Azure public cloud solutions. Strong knowledge of securing Azure infrastructure, including identity and access management, network security, and data protection. Comprehensive understanding of security architecture frameworks and best practices (e.g., SABSA, TOGAF). Hands-on experience with security tools and processes, such as SIEM … vulnerabilitymanagement, and incident response within Azure environments. The ability to engage and communicate effectively with senior security stakeholders and technical security departments. Capability to engage with finance stakeholders to analyse and map business needs and processes. Experience in leading the development and implementation of business applications and financial solutions. A solid understanding of security architecture reviews and More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
role where youll play a key part in strengthening the organisations cyber defence posture by collecting, analysing, and disseminating actionable intelligence. Youll work closely with incident response, security operations, vulnerabilitymanagement, and leadership teams to anticipate threats, mitigate risks, and improve resilience. Key Responsibilities: Collect and analyse intelligence to address high-priority security requirements. Produce and share actionable More ❯
for deployment. Ability to demonstrate any IRM solution and SecOps solutions as and when needed. Knowledge of various modules like Policy Mgmt. Compliance & Audit Mgmt., Vendor Mgmt., Business Continuity Management, Vulnerability Response, Incident Response, Security Dashboard on ServiceNow IRM platform Assess as-is IRM processes for maturity and automation on ServiceNow platform Knowledge of Advance risk management … SecOps administrator/consultant (this is mandatory) Must have concluded at least 1 lifecycle of ServiceNow IRM/SecOps implementation. Experience in JavaScript, API, Web Services Working knowledge of Vulnerability Mgmt. process & tools ISO/CISA/CISM/CISSP/CRICS (preferred) PLATFORM/TOOL EXPERTISE ServiceNow GRC & SecOps More ❯
for deployment. Ability to demonstrate any IRM solution and SecOps solutions as and when needed. Knowledge of various modules like Policy Mgmt. Compliance & Audit Mgmt., Vendor Mgmt., Business Continuity Management, Vulnerability Response, Incident Response, Security Dashboard on ServiceNow IRM platform Assess as-is IRM processes for maturity and automation on ServiceNow platform Knowledge of Advance risk management … SecOps administrator/consultant (this is mandatory) Must have concluded at least 1 lifecycle of ServiceNow IRM/SecOps implementation. Experience in JavaScript, API, Web Services Working knowledge of Vulnerability Mgmt. process & tools ISO/CISA/CISM/CISSP/CRICS (preferred) PLATFORM/TOOL EXPERTISE ServiceNow GRC & SecOps More ❯
london (city of london), south east england, united kingdom
HCLTech
for deployment. Ability to demonstrate any IRM solution and SecOps solutions as and when needed. Knowledge of various modules like Policy Mgmt. Compliance & Audit Mgmt., Vendor Mgmt., Business Continuity Management, Vulnerability Response, Incident Response, Security Dashboard on ServiceNow IRM platform Assess as-is IRM processes for maturity and automation on ServiceNow platform Knowledge of Advance risk management … SecOps administrator/consultant (this is mandatory) Must have concluded at least 1 lifecycle of ServiceNow IRM/SecOps implementation. Experience in JavaScript, API, Web Services Working knowledge of Vulnerability Mgmt. process & tools ISO/CISA/CISM/CISSP/CRICS (preferred) PLATFORM/TOOL EXPERTISE ServiceNow GRC & SecOps More ❯
Requirements: Essential: 5+ years of experience in application security, with at least 3+ years in software development. Strong understanding of application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, and API Security (including authentication and authorization). Proficiency in programming languages such as Python, Java, JavaScript … GoLang, and Rust. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to oversee multiple security projects simultaneously. Desired: Independent, proactive, and detail-oriented, with a commitment to maintaining high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. What we offer: Pension company contribution = 3% Incentive scheme More ❯
implement, and maintain information security policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards ISO 27001 & Cyber Essentials.- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage … risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information Security, Computer Science, or a related field. … Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor.- Proven experience in information security management and conducting security audits.- Strong knowledge of information security frameworks and standards.- Excellent analytical and problem-solving skills.- Strong communication and interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX.- Familiarity with security tools and technologies More ❯
implement, and maintain information security policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001).- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage … risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information Security, Computer Science, or a related field. … Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor.- Proven experience in information security management and conducting security audits.- Strong knowledge of information security frameworks and standards.- Excellent analytical and problem-solving skills.- Strong communication and interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX.- Familiarity with security tools and technologies More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
The Bridge (IT Recruitment) Limited
Cyber Security Leadership Shape the cyber security vision and build a corresponding technical roadmap which delivers a world class security controls across cloud infrastructure, networks, end points, identity & access management, application security, and threat detection. Collaborate closely with the SNOPs Lead to adapt the SNOPs roadmap priorities in line with shifts in industry, evolving threat landscape and regulatory requirements. … Ensure effective 24/7 security operations (inc. security incident management) Collaborate closely with the Enterprise Resilience function (1st Line of Defence) to ensure integrated risk management and incident response. Promote stakeholder engagement and cross-functional collaboration to embed a culture of security awareness and ownership across the organisation. Operational Oversight Ensure high availability, performance, and security of … culture of continuous improvement, collaboration, and innovation across all teams. Support recruitment, onboarding, and capability development to meet evolving technology needs. Technology Platform Delivery Oversee the delivery and lifecycle management of: Microsoft 365 and collaboration platforms Cloud platforms (design, automation, cost optimisation) Network and security operations (compliance, threat management) Monitoring, observability, and backup/recovery systems Ensure alignment More ❯
Harmondsworth, West Drayton, Middlesex, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
Secure our CI/CD pipelines and provide improvement plans and requirements to those that use them, while overseeing the consistent adoption of secure practices across teams. Support the vulnerabilitymanagement process, raising awareness and embedding secure development principles with development teams. Evaluate, implement, support and communicate new tools and features to improve our security posture whilst supporting More ❯
SecOps administrator/consultant (this is mandatory) Must have concluded at least 1 lifecycle of ServiceNow IRM/SecOps implementation. Experience in JavaScript, API, Web Services Working knowledge of Vulnerability Mgmt. process & tools ISO/CISA/CISM/CISSP/CRICS (preferred) ServiceNow GRC & SecOps B.E/B.Tech , BCA/MCA ServiceNow Certified Consultant More ❯
Managers, building consistency and capability. Stabilise delivery during a period of transition – quickly build relationships, understand challenges and drive solutions. Deliver a diverse portfolio including WAN upgrades, global telephony, vulnerabilitymanagement, HR & Finance Technology transformations, and digital initiatives. Strengthen PMO frameworks, governance and resourcing processes to improve pipeline and delivery outcomes. Monitor and report on KPIs, risks, budgets … Head of IT Projects will have prior experience of: Held the position of Head of IT Projects/Programmes (or similar leadership role) in fast paced environments Have prior management experience of Project Managers Track record of managing multiple complex IT Transformations in a fast paced environment Pragmatic with project methodologies – Agile, Waterfall, Hybrid. Strong knowledge of project managementMore ❯
LOOKING FOR Active DV clearance (Developed Vetting) is essential Proficient in Linux systems administration (e.g., CentOS, Ubuntu) Experience with virtualisation platforms, ideally VMware vSphere Exposure to infrastructure monitoring and vulnerabilitymanagement tools (e.g., Zabbix, Tenable) Familiarity with scripting languages such as Bash or Python Knowledge of automation and IaC tools like Ansible or Terraform is beneficial A team More ❯
is embedded throughout the development lifecycle of Technology Assets by using Deloitte's Secure System Development Lifecyle (SSDLC) to assure paths to production. Oversee that security testing activities like vulnerability scanning, penetration testing, and code reviews are completed to identify weaknesses and potential exploits on the identified security requirements. Identify potential information security risks within a project, analyse their … information security principles, including confidentiality, integrity, and availability. Demonstrable understanding of Cybersecurity risk and controls inherent in various technologies, and related best practices. This includes OWASP Top 10 and vulnerability management. Have strong knowledge in cybersecurity frameworks and standards like ISO 27001, NIST, COBIT, and Cyber Essentials+ or equivalent. Experience with risk management methodologies, techniques, and being able … to clearly understand and articulate risk. Demonstrable ability to identify risks associated with business processes, operations, and the roll out of technology projects. An understanding of project management to manage security aspects within a project timeline and budget. Knowledge and understanding of cybersecurity technologies - mobile threat defense, endpoint protection, data loss prevention, insider threat protection, device hardening, classification, key More ❯
is embedded throughout the development lifecycle of Technology Assets by using Deloitte's Secure System Development Lifecyle (SSDLC) to assure paths to production. Oversee that security testing activities like vulnerability scanning, penetration testing, and code reviews are completed to identify weaknesses and potential exploits on the identified security requirements. Identify potential information security risks within a project, analyse their … information security principles, including confidentiality, integrity, and availability. Demonstrable understanding of Cybersecurity risk and controls inherent in various technologies, and related best practices. This includes OWASP Top 10 and vulnerability management. Have strong knowledge in cybersecurity frameworks and standards like ISO 27001, NIST, COBIT, and Cyber Essentials+ or equivalent. Experience with risk management methodologies, techniques, and being able … to clearly understand and articulate risk. Demonstrable ability to identify risks associated with business processes, operations, and the roll out of technology projects. An understanding of project management to manage security aspects within a project timeline and budget. Knowledge and understanding of cybersecurity technologies - mobile threat defense, endpoint protection, data loss prevention, insider threat protection, device hardening, classification, key More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
is embedded throughout the development lifecycle of Technology Assets by using Deloitte's Secure System Development Lifecyle (SSDLC) to assure paths to production. Oversee that security testing activities like vulnerability scanning, penetration testing, and code reviews are completed to identify weaknesses and potential exploits on the identified security requirements. Identify potential information security risks within a project, analyse their … information security principles, including confidentiality, integrity, and availability. Demonstrable understanding of Cybersecurity risk and controls inherent in various technologies, and related best practices. This includes OWASP Top 10 and vulnerability management. Have strong knowledge in cybersecurity frameworks and standards like ISO 27001, NIST, COBIT, and Cyber Essentials+ or equivalent. Experience with risk management methodologies, techniques, and being able … to clearly understand and articulate risk. Demonstrable ability to identify risks associated with business processes, operations, and the roll out of technology projects. An understanding of project management to manage security aspects within a project timeline and budget. Knowledge and understanding of cybersecurity technologies - mobile threat defense, endpoint protection, data loss prevention, insider threat protection, device hardening, classification, key More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
is embedded throughout the development lifecycle of Technology Assets by using Deloitte's Secure System Development Lifecyle (SSDLC) to assure paths to production. Oversee that security testing activities like vulnerability scanning, penetration testing, and code reviews are completed to identify weaknesses and potential exploits on the identified security requirements. Identify potential information security risks within a project, analyse their … information security principles, including confidentiality, integrity, and availability. Demonstrable understanding of Cybersecurity risk and controls inherent in various technologies, and related best practices. This includes OWASP Top 10 and vulnerability management. Have strong knowledge in cybersecurity frameworks and standards like ISO 27001, NIST, COBIT, and Cyber Essentials+ or equivalent. Experience with risk management methodologies, techniques, and being able … to clearly understand and articulate risk. Demonstrable ability to identify risks associated with business processes, operations, and the roll out of technology projects. An understanding of project management to manage security aspects within a project timeline and budget. Knowledge and understanding of cybersecurity technologies - mobile threat defense, endpoint protection, data loss prevention, insider threat protection, device hardening, classification, key More ❯
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
Deloitte LLP
is embedded throughout the development lifecycle of Technology Assets by using Deloitte's Secure System Development Lifecyle (SSDLC) to assure paths to production. Oversee that security testing activities like vulnerability scanning, penetration testing, and code reviews are completed to identify weaknesses and potential exploits on the identified security requirements. Identify potential information security risks within a project, analyse their … information security principles, including confidentiality, integrity, and availability. Demonstrable understanding of Cybersecurity risk and controls inherent in various technologies, and related best practices. This includes OWASP Top 10 and vulnerability management. Have strong knowledge in cybersecurity frameworks and standards like ISO 27001, NIST, COBIT, and Cyber Essentials+ or equivalent. Experience with risk management methodologies, techniques, and being able … to clearly understand and articulate risk. Demonstrable ability to identify risks associated with business processes, operations, and the roll out of technology projects. An understanding of project management to manage security aspects within a project timeline and budget. Knowledge and understanding of cybersecurity technologies - mobile threat defense, endpoint protection, data loss prevention, insider threat protection, device hardening, classification, key More ❯
to mitigate against vulnerabilities. Working with internal teams, you'll be instrumental in up-skilling Engineers on the Linux Platforms and working with them to create strategies around patch management and keeping Servers secure. The role will be based on onsite for the first week or 2 to get familiar with systems and the Team and will then reduce … If you're not local, it's down to you to sort travel arrangements/accommodation if required. Key experience/skills: - Linux SME Skills - RedHat - VMware - Patching/Vulnerabilitymanagement - Automation (Ansible, Jenkins, Git) If you feel you could be a great fit for the role, please send your CV for immediate consideration. DXP Talent LTD is More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Corecom Consulting
engineers through implementation, balancing workloads, addressing hotspots, and providing coaching. Oversee deployments, ensuring quality, traceability, and compliance with security standards . Take accountability for technical debt, service levels, and vulnerability management. Collaborate with architects, DevOps engineers, product owners, and Scrum Masters to deliver seamless solutions. Join the out-of-hours support rota for critical digital products. What We're More ❯
industry) compliance and maintain audit readiness through robust validation frameworks, policies, and collaboration with QA and regulatory bodies. Cybersecurity & Risk – Lead cybersecurity strategy, including access controls, incident response, and vulnerability management. Team & Vendor Management – Build and mentor a global IT team while managing external providers and ensuring performance against SLAs. Budgets & Performance – Manage IT budgets, forecasting, and KPIs … and level. Experience working in pharmaceutical organisations is advantageous. Experience in leading and developing a team Knowledge of office 365 and Azure Entra is essential Excellent knowledge of technical management, information analysis and of computer hardware/software systems and troubleshooting practices. Expertise in data management, data governance and general IT security practices. Understanding of computerised systems used More ❯
Belfast, County Antrim, Northern Ireland, United Kingdom
Reed
certification. Experience in an MSP environment, familiar with PSA ticketing and working with multiple clients. Knowledge of Azure IaaS, VMware, Veeam, Citrix, Aruba Networking, Sophos FW, Teams Voice, and vulnerability management. Benefits: Opportunity to improve skills in a small team with close access to clients. Support to work towards Microsoft accreditations. Potential career paths into account management or More ❯