Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
ECS Resource Group Ltd
those related to physical security. Maintain and enhance the security posture of servers for both existing and new applications, on-premise and in Azure cloud environments. Monitor and manage vulnerability scanning tools, address findings, and coordinate remediation efforts with infrastructure and development teams. Support the development, testing, and annual validation of disaster recovery and backup plans. Create and maintain … To Be Considered for This Role, You Will Need: Cybersecurity Experience: Demonstrated experience in implementing and managing security controls across hybrid environments. Familiarity with endpoint protection, threat detection, and vulnerabilitymanagement tools. Incident Response & Problem Solving: Ability to respond swiftly and effectively to security incidents. Skilled in structured analysis and incident remediation to ensure rapid recovery. Threat Awareness … Clear and confident verbal communication skills, including the ability to explain technical information to non-technical audiences. Proficient in written communication, including technical documentation, reports, and presentations. Strong time management and organisational skills to balance multiple priorities and meet deadlines. Capable of managing competing demands and shifting priorities in line with business objectives. High attention to detail and a More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Xpertise Recruitment Ltd
Security Lead London | Hybrid - 3 days in-office per week Up to £90,000 + ~20% Bonus + 10% Pension Are you passionate about cloud security and cyber risk management? A leading international business has completed a major IT transformation and is now expanding its technology team. They're looking for a highly skilled Cloud Security Lead to help … of experience in technical cyber roles (SOC, security engineering, threat analysis) Minimum 3-5 years working in cloud environments Deep knowledge of Microsoft Azure (and ideally AWS) Expertise in vulnerabilitymanagement, incident response, and cyber risk triage Strong understanding of cloud security principles and the shared responsibility model Familiarity with frameworks like MITRE ATT&CK and Zero Trust More ❯
Work for an award-winning provider of Security Services, specialising in Cyber Security Services such as VulnerabilityManagement, Information Security, Penetration Testing, and Managed Security Services. We boast a fully managed Security Operations Centre (SOC) staffed by dedicated professionals. We're seeking a skilled Cyber Security Engineer to join our clients eam. The ideal candidate will have expertise More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
end-to-end delivery of cyber security projects, ensuring alignment with business goals and compliance requirements Work across InfoSec, IT, risk, and compliance teams to deliver initiatives such as vulnerabilitymanagement, identity and access management (IAM), SIEM upgrades, and cloud security improvements Manage third-party vendors and internal stakeholders to ensure smooth project execution Develop and maintain … adhere to regulatory and governance frameworks Skills and Experience Proven track record delivering cyber security or information security projects in large, complex organisations Strong understanding of cyber risk, threat management, and technical security controls Excellent stakeholder management and communication skills Experience with governance, risk, and compliance frameworks (e.g., ISO 27001, NIST, GDPR) PRINCE2, PMP, or similar project managementMore ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
support the development and delivery of the products (whilst considering cyber resilience) with the ambition to meet the Secure by Design principles. You'll ensure the development, implementation, and management of security protocols, tools, and practices on maturing products meets the appropriate standards and Def Cons. Working closely with the Integrated Product Team (IPT) frameworks with specialists from other … wider Product IA and Security community across Leonardo Electronics UK, influencing corporate policies, processes and guidance. Managing architects such as the generation of Technical Risk Assessments, Security Design and Management Documentation, and Remediation Action Plans. As well as this, you'll oversee the generation and approval of Product Security and Information Assurance Management Plan; Product Design Reviews; generation … of Product Security deliverable information (Product Integrity certificates, product security cases.) What you will be doing as a Lead Security Engineer; Risk Management: Perform risk assessments to identify potential security risks and work product development teams to implement mitigations and preventive measures. Incident Response & Mitigation: Assess and maintain the Incident Response Plan, lead the response to security incidents and More ❯
Experience with Active Directory, DNS, DHCP, and domain administration - Knowledge of server virtualization platforms, such as VMware, Hyper-V for managing virtual machines - Ability to handle server backups, storage management (SAN/NAS), and recovery tasks - Deep understanding of Windows and Linux operating systems for configuration - Knowledge of OS patching, upgrades, and security hardening techniques - Experience with at least … storage, networking, security and managed services. - Skills in cloud infrastructure deployment, including virtual networks, VM instances, storage and monitoring - Understanding of cloud security practices (IAM, VPCs, firewalls), and cost management - Familiarity with IaC tools like Terraform, Ansible, or ClourFormation and automating infrastructure provisioning and configuration - Basic scripting skills in languages like PowerShell, Bask, or Python for task automation - Experience … with vulnerabilitymanagement tools like Nessus, Qualys, or OpenVAS - Knowledge of endpoint security solutions (antivirus, anti-malware) and incident response procedures - Familiarity with Security Information and Event Management (SIEM) tools, like Splunk or QRadar - Ability to interpret metrics from network, server and application performance monitoring tools - Knowledge of log management tools and techniques for monitoring infrastructure More ❯
Employment Type: Permanent
Salary: £46000 - £55000/annum Plus benefits package
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Better Days Recruitment Ltd
cyber and information security strategy ensuing it is aligned with ISO 27001, GDPR and Cyber essentials. Combining strong information security experience with hands-on technical knowledge of SIEM, EDR, vulnerabilitymanagement and incident response. You will have the ability to translate technical risk into clear business advice. This is a great permanent opportunity to demonstrate your strong experience … and great benefits on offer. Skills/Experience and attributes: A minimum of 4-5 years experience working in a similar role Strong understanding of information security principles, risk management and compliance (GDPR, ISO 27001 and Cyber Essentials) Ability to talk technically then non-technically to the business Solid understanding of IT Infrastructure eg; networking, Active Directory and endpoint More ❯
Crawley, West Sussex, United Kingdom Hybrid / WFH Options
Better Days Recruitment Ltd
cyber and information security strategy ensuing it is aligned with ISO 27001, GDPR and Cyber essentials. Combining strong information security experience with hands-on technical knowledge of SIEM, EDR, vulnerabilitymanagement and incident response. You will have the ability to translate technical risk into clear business advice. This is a great permanent opportunity to demonstrate your strong experience … and great benefits on offer. Skills/Experience and attributes: A minimum of 4-5 years’ experience working in a similar role Strong understanding of information security principles, risk management and compliance (GDPR, ISO 27001 and Cyber Essentials) Ability to talk technically then non-technically to the business Solid understanding of IT Infrastructure eg; networking, Active Directory and endpoint More ❯
Employment Type: Permanent
Salary: £65000 - £70000/annum Great company benefits
London, South East, England, United Kingdom Hybrid / WFH Options
NEST Corporation
and third lines delivered by an internal information security team and external auditors respectively. This role covers the first line of defence, of which a large part is outsourced.Currently management of the 3rd party contract provisions related to security, together with various internal control responsibilities are covered by other members of the team for whom this is not a … and improve our information security controls as we seek to improve our infosec maturity using the NIST framework as an externally assessed benchmark.This first line role combines a contract management aspect with the requirement for hands-on process operation for internally managed controls such as access reviews, and some investigations such as subject access requests or insider threats.This role … security policies, standards and controls to internal and external auditors. Understanding and experience of various Information Security domains including Security Architecture, Information Security Governance, Network Security, Data Protection, Risk Management, Identity & Access Management, VulnerabilityManagement, Anti-Malware, Mobile Device Management and Cloud Security. Experience of working within Financial Services, whilst beneficial, is not essential. Don More ❯
CISSP, CISM, CISA, CRISC, or CGEIT. Proven experience in leading IT cyber security teams, with a strong emphasis on operational security and incident response. Extensive knowledge of IT risk management, threat intelligence, IAM and vulnerability management. Familiarity with key regulatory and compliance frameworks, including ISO 27001, GDPR, NIST, and CyberEssentials. Ability to articulate complex technical risks in clear More ❯
Yorkshire and the Humber, United Kingdom Hybrid / WFH Options
Harvey Nash
CISSP, CISM, CISA, CRISC, or CGEIT. Proven experience in leading IT cyber security teams, with a strong emphasis on operational security and incident response. Extensive knowledge of IT risk management, threat intelligence, IAM and vulnerability management. Familiarity with key regulatory and compliance frameworks, including ISO 27001, GDPR, NIST, and CyberEssentials. Ability to articulate complex technical risks in clear More ❯
improvement for ISO-27001 and Cyber Essentials compliance. Ensure adherence to security standards, policies, and procedures, including external audits. Key Technologies: Strong knowledge of M365 security tools (Defender, Azure) VulnerabilityManagement, Web Filtering, DLP, Cloudflare, Firewalls, VPN, PKI, DNS, Email Gateways, Security Audits, ISO27001, Azure DevOps, Mitre Attack Framework, ITIL, Microsoft OS, Exchange Online To succeed, you should More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Southern Communications Ltd
days in the office and 2 days from home) Key Tasks: Security assessments:?Create and perform security assessments and threat models Security standards:?Develop,implement&maintainsecurity standards and plans VulnerabilityManagement:?Research weaknesses and find ways to counter them Security incident response:?Respond to attack vectors and security incidents, and coordinate incident response across teams Security software testing:?Test company software … improvements on a continuous basis? Help develop platforms and tools to automate and improve security posture across the group Skills and Competencies Required: Knowledge and hands-on experience in management of IDS/IPS, Firewall, VPN, EDR/XDR, mail filtering and other security products Experience in Security Information Event Management (SIEM) tools, creation of basic co-relation … rules, and administration of SIEMpreferred Should haveexpertiseon TCP/IP network traffic and event log analysis Network Troubleshooting skillsrequired. Knowledge and hands-on experience in penetration testing/vulnerability scanning, security tools like tenable Nessus, kaliLinux Knowledge of ITIL disciplines such as Incident, Problem and Change Management Experience of infrastructure design and management in mission critical environments More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
B&M Retail Limited
of operational resilience. About the role: Reporting to the Head of Information Security Risk & Assurance, the ISBP plays a central role in embedding information security, business continuity, and risk management across our organisation.You'll support a broad range of stakeholders across the following business units:Retail Operations -Supply Chain & Logistics -Support Centre. Your responsibilities will include: Business continuity & incident … security risk & assurance Promoting security governance across business units Managing risk registers and facilitating quarterly risk reviews Coordinating audits, assessments, and compliance checks Supporting third-party due diligence and vulnerability remediation You'll work closely with internal teams including Operations, IT, Legal, Risk, Audit, Procurement, and Compliance - helping to ensure that security is embedded in our processes and partnerships. … continuity and disaster recovery Hands-on experience with security risk assessments, audits, and incident response Familiarity with key standards and regulations (e.g. ISO 27001, PCI DSS, GDPR) Excellent stakeholder management and communication skills And desirable would be: Certifications such as CISSP, CISM, CRISC, CBCI, or ISO 27001 Lead Auditor Experience in the retail, e-commerce, or supply chain sector More ❯
CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and More ❯
CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and More ❯
CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
CET Structures Limited
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … service quality Essential Skills Proven 3rd Line Support Experience with strong focus on Microsoft 365 stack Strong knowledge of managing Azure AD, conditional access, virtual networks, MFA, SSO, Identity management and subscription governance. In-depth experience administering Exchange Online, SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider … Risk Management, Defender for Cloud, Defender for Endpoint, Defender VulnerabilityManagement, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and More ❯
Portchester, Hampshire, United Kingdom Hybrid / WFH Options
Computappoint
edge, robust security framework that supports ongoing innovation efforts. The position provides essential oversight for the company's information security, cybersecurity, and data protection functions, encompassing policy governance, process management, procedural standards, training programs, and awareness initiatives. A subject matter expert who will shape our internal IT direction, ensuring both customer and employee protection while managing daily security operations. … within global organizations, ideally in enterprise consulting environments Proficiency in security frameworks including ISO27001, Cyber Essentials, SOC2, NIST CSF and CIS Extensive understanding of cybersecurity regulations, cloud security, identity management, data protection, security governance, risk management, and remediation planning Technical expertise: SaaS, Cloud platforms, SDLC, VulnerabilityManagement, Networking, IDAM Security vetting eligibility, ITSM/SIEM platform More ❯
Portsmouth, Hampshire, England, United Kingdom Hybrid / WFH Options
Computappoint
edge, robust security framework that supports ongoing innovation efforts. The position provides essential oversight for the company's information security, cybersecurity, and data protection functions, encompassing policy governance, process management, procedural standards, training programs, and awareness initiatives. A subject matter expert who will shape our internal IT direction, ensuring both customer and employee protection while managing daily security operations. … within global organizations, ideally in enterprise consulting environments Proficiency in security frameworks including ISO27001, Cyber Essentials, SOC2, NIST CSF and CIS Extensive understanding of cybersecurity regulations, cloud security, identity management, data protection, security governance, risk management, and remediation planning Technical expertise: SaaS, Cloud platforms, SDLC, VulnerabilityManagement, Networking, IDAM Security vetting eligibility, ITSM/SIEM platform More ❯
London, Portchester, Hampshire, United Kingdom Hybrid / WFH Options
Computappoint
edge, robust security framework that supports ongoing innovation efforts. The position provides essential oversight for the company's information security, cybersecurity, and data protection functions, encompassing policy governance, process management, procedural standards, training programs, and awareness initiatives. A subject matter expert who will shape our internal IT direction, ensuring both customer and employee protection while managing daily security operations. … within global organizations, ideally in enterprise consulting environments Proficiency in security frameworks including ISO27001, Cyber Essentials, SOC2, NIST CSF and CIS Extensive understanding of cybersecurity regulations, cloud security, identity management, data protection, security governance, risk management, and remediation planning Technical expertise: SaaS, Cloud platforms, SDLC, VulnerabilityManagement, Networking, IDAM Security vetting eligibility, ITSM/SIEM platform More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Suits Me Limited
and external audits by providing evidence of controls and contributing to audit readiness activities. Collaborate with the compliance and risk teams to ensure IT operations meet regulatory obligations. Support vulnerabilitymanagement efforts, including patching and system hardening. Assist in maintaining secure and efficient identity and access management practices, including integration with M365 and Azure AD. Contribute to … skills and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also Have More ❯
Own service performance metrics and embed proactive capacity planning across infrastructure and services. • Proactive Issue Resolution: Lead root-cause analysis, implement preventive controls, and champion continuous service improvement. • Service Management Governance: Oversee ITIL processes and support internal audits with robust systems and policies. • Incident & Change Leadership: Manage incidents and changes efficiently, providing strategic oversight on high-priority issues. • Financial … and manage Opex/Capex budgets, track spend, and identify cost-saving opportunities. You ll also lead on: • Cybersecurity Operations: Partner with our vCISO to manage 24 7 monitoring, vulnerabilitymanagement, and secure-by-design principles. • Supplier & Contract Management: Oversee MSPs, cloud, and hardware partners, ensuring value-for-money and service excellence. • Asset & Licensing Management: Maintain … leader with a passion for operational excellence and a proven track record in IT service delivery. You ll bring: Experience & Expertise • 5+ years in a senior IT operations, service management, or IT director role. • Proven ownership of 24 7 production environments with >99.9% availability. • Strong experience managing multi-vendor ecosystems and regulated environments. • Deep technical knowledge of enterprise infrastructure More ❯
Own service performance metrics and embed proactive capacity planning across infrastructure and services. • Proactive Issue Resolution: Lead root-cause analysis, implement preventive controls, and champion continuous service improvement. • Service Management Governance: Oversee ITIL processes and support internal audits with robust systems and policies. • Incident & Change Leadership: Manage incidents and changes efficiently, providing strategic oversight on high-priority issues. • Financial … and manage Opex/Capex budgets, track spend, and identify cost-saving opportunities. You’ll also lead on: • Cybersecurity Operations: Partner with our vCISO to manage 24×7 monitoring, vulnerabilitymanagement, and secure-by-design principles. • Supplier & Contract Management: Oversee MSPs, cloud, and hardware partners, ensuring value-for-money and service excellence. • Asset & Licensing Management: Maintain … leader with a passion for operational excellence and a proven track record in IT service delivery. You’ll bring: Experience & Expertise • 5+ years in a senior IT operations, service management, or IT director role. • Proven ownership of 24×7 production environments with >99.9% availability. • Strong experience managing multi-vendor ecosystems and regulated environments. • Deep technical knowledge of enterprise infrastructure More ❯
Cambridge, Cambridgeshire, England, United Kingdom
Hays Specialist Recruitment Limited
proficient in automation and orchestration tools (e.g., SOAR platforms, scripting languages like Python, PowerShell, KQL) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Key Skills and Experience Experience contributing to large-scale, sprint-based, security automation and detection engineering projects in a SOC/Cyber Defense or similar … Defence Operation's efficiency, scalability, and incident response capabilities.Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management.Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve operational efficiency.Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to build More ❯