customer-facing teams, vendors and Go-To-Market teams. The role involves leading a team globally collaborating with various stakeholders to implement innovative cost-saving solutions and optimize endpoint management strategies globally. Key Responsibilities Manage the overall P&L for the Global End Point Operations Accountable for achieving delivery goals (customer specific SLA and KPIs) in large and complex … and ensure alignment with organizational goals Foster a high-performing team culture through effective coaching, trust, and accountability, ensuring transparency and ethical conduct Create and implement strategies to improve vulnerabilitymanagement and ensure compliance with global security standards Strong experience in Microsoft Azure Cloud within M365 stack on Intune, Endpoint manager, Office 365, Collaboration tools etc., Experience management … industry specialists Establish career paths, training and engagement of people in their respective domains as well as cross functional Resource hiring/alignment to projects Drive evergreen and release management process to keep the organization up to date Drive technology roadmap for clients and future state of operations Drive client satisfaction using continuous service improvements in technology & process Act More ❯
threat detection and response processes. Key Requirements: Previous experience in a SOC Analyst or similar cybersecurity role Strong expertise in Splunk or similar SIEM tools Familiarity with Flexera for vulnerabilitymanagement Understanding of firewalls, network protocols, intrusion detection/prevention systems Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous Must be eligible for Developed Vetting (DV) clearance , requiring More ❯
mentor junior staff members. About you To be successful in this role you will have: Qualifications, certification or relevant experience in a cybersecurity-related field Experience in security risk management and applying frameworks under the DSPF, ISM, ISO27001, etc. Experience with Defence Assessment and Authorisation (A&A) processes. Experience in vulnerabilitymanagement tools, Windows and Linux cybersecurity More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ashdown Group
genuine opportunity for progression A large West London based company is looking for an experienced Cyber Analyst/Engineer to join its IT function. Duties will include: - BAU cyber vulnerabilitymanagement and incident response - Cyber security projects and working with the wider group/external vendors to deliver security requirements - Focus on delivering Cyber Essentials Plus and ISO27001 … Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Support ongoing improvements to internal defence - Oversee policies and procedures - Audits To be considered suitable you will need the following skills and experience: - Experience in either a Cyber Analyst or Cyber Engineer role - SC Cleared/Clearance - Experience in network audits and More ❯
Newport, Gwent, United Kingdom Hybrid / WFH Options
Yolk Recruitment Ltd
into asset security while managing a small team of technical analysts and overseeing supplier relationships to drive successful outcomes. What You'll Bring: Proven experience in IT asset and vulnerabilitymanagement In-depth knowledge of asset discovery tools, vulnerability scanning and remediation techniques Solid understanding of the differences between IT and operational technology environments Awareness of attacker More ❯
IT Infrastructure Support Specialist - Systems & Patch Management Analyst We're seeking a detail-oriented and proactive Technical Infrastructure Analyst work an initial 3-month contract on our client's site in Suffolk. The candidate must therefore be a commutable distance Suffolk. This role is pivotal in maintaining the integrity, security, and performance of our client's enterprise systems. You … ll work closely with experienced Technical Analysts to apply patches, remediate vulnerabilities, and support life cycle management across both Windows and Linux environments. Key Responsibilities Patching & System Maintenance Install, configure, and maintain system software including operating systems and utilities. Apply security patches and updates in line with organisational policy and vendor guidance. Monitor patch compliance and report on remediation … progress. VulnerabilityManagement Investigate unauthorised access attempts and ensure compliance with relevant legislation. Collaborate with security teams to identify, assess, and remediate vulnerabilities. Support access control monitoring and incident response activities. Lifecycle & Infrastructure Operations Assist in the operation and control of IT infrastructure across hardware, software, and networks. Participate in change management processes for new or modified More ❯
through close collaboration with senior leadership. Owning the organisation’s risk register and assessment processes. Leading technical risk assessments across infrastructure, applications, and third parties. Overseeing threat modelling and vulnerabilitymanagement initiatives. Providing risk-based recommendations to mitigate threats and vulnerabilities. Leading internal and external audits, including managing remediation plans. Reporting on compliance posture to executive stakeholders. Acting … technical expertise in areas such as infrastructure, cloud, or application security. Deep understanding of GRC frameworks, methodologies, and risk assessment techniques. Familiarity with key security technologies (SIEM, DLP, IAM, vulnerability scanners). Strong knowledge of regulatory and compliance standards. Demonstrated experience leading teams and managing cross-functional projects. Relevant experience in CISSP, CISM, CRISC, ISO 27001 Lead Implementer/ More ❯
across multiple UK energy generation and storage sites? We're looking for a Cyber Security OT Specialist with strong first-line technical skills and a solid grounding in risk management frameworks, ideally with experience in the energy sector. This is a key role within the cyber risk function, supporting critical infrastructure and helping shape secure and resilient OT environments … aligned with IEC62443 standards. Key Responsibilities Lead the implementation of new technical security controls across OT environments. Contribute to the assessment of OT network architecture, protocols, and change management processes. Lead incident response and remediation for cyber events detected by OT SIEM systems. Actively support vulnerabilitymanagement and ensure threat exposure is minimised. Provide hands-on leadership … in data and asset management, including backup and removable media deployments. Apply and track security metrics to ensure the ongoing effectiveness of controls. Deliver awareness training and cyber security guidance across OT engineering teams. Champion collaboration across cyber, IT, and engineering teams-bridging gaps between tech, process, and people. What We're Looking For The ability to work independently More ❯
Employment Type: Permanent
Salary: £57000 - £60000/annum Pension,Medical,Incentive Plan,25 Ho
Immingham, Lincolnshire, North East, United Kingdom
Rullion Limited
across multiple UK energy generation and storage sites? We're looking for a Cyber Security OT Specialist with strong first-line technical skills and a solid grounding in risk management frameworks, ideally with experience in the energy sector. This is a key role within the cyber risk function, supporting critical infrastructure and helping shape secure and resilient OT environments … aligned with IEC62443 standards. Key Responsibilities Lead the implementation of new technical security controls across OT environments. Contribute to the assessment of OT network architecture, protocols, and change management processes. Lead incident response and remediation for cyber events detected by OT SIEM systems. Actively support vulnerabilitymanagement and ensure threat exposure is minimised. Provide hands-on leadership … in data and asset management, including backup and removable media deployments. Apply and track security metrics to ensure the ongoing effectiveness of controls. Deliver awareness training and cyber security guidance across OT engineering teams. Champion collaboration across cyber, IT, and engineering teams-bridging gaps between tech, process, and people. What We're Looking For The ability to work independently More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
Defining and implementing the software security strategy in line with business goals Collaborating with developers to automate security testing and embed security requirements into the SDLC Supporting penetration testing, vulnerabilitymanagement, and remediation efforts Acting as a software security SME, advising teams on secure design, risk, and compliance Maintaining security documentation, training materials, and processes Reporting on compliance More ❯
include: Defining and delivering a comprehensive cyber security strategy aligned with business goals and regulations Leading and developing the cyber security operations team Overseeing threat monitoring, incident response, and vulnerabilitymanagement Managing compliance with frameworks such as Cyber Essentials, NIST, ISO27001, GDPR, and GovAssure Acting as the primary point of contact for cyber matters internally and externally, including … regulators and industry forums Representing Cyber Security at board committees and senior management meetings Supporting bid and tender processes, providing risk-based advice and competitive responses About You Were looking for an experienced cyber security leader with a blend of strategic vision and operational expertise. You should bring: Proven experience defining and executing cyber security strategy at a senior … level Strong knowledge of governance, risk, compliance, and regulatory frameworks Leadership experience managing cyber security operations teams Excellent stakeholder management skills, including board-level engagement The ability to represent the organisation externally with authority and credibility Benefits Competitive salary and benefits package Hybrid/flexible working arrangements Generous annual leave and pension Inclusive, collaborative culture with senior-level visibility More ❯
include: Defining and delivering a comprehensive cyber security strategy aligned with business goals and regulations Leading and developing the cyber security operations team Overseeing threat monitoring, incident response, and vulnerabilitymanagement Managing compliance with frameworks such as Cyber Essentials, NIST, ISO27001, GDPR, and GovAssure Acting as the primary point of contact for cyber matters internally and externally, including … regulators and industry forums Representing Cyber Security at board committees and senior management meetings Supporting bid and tender processes, providing risk-based advice and competitive responses About You We’re looking for an experienced cyber security leader with a blend of strategic vision and operational expertise. You should bring: Proven experience defining and executing cyber security strategy at a … senior level Strong knowledge of governance, risk, compliance, and regulatory frameworks Leadership experience managing cyber security operations teams Excellent stakeholder management skills, including board-level engagement The ability to represent the organisation externally with authority and credibility Benefits Competitive salary and benefits package Hybrid/flexible working arrangements Generous annual leave and pension Inclusive, collaborative culture with senior-level More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
ensuring mitigation plans are in place. Support the development and maintenance of security policies and standards. Assist with third-party security reviews and supplier risk management. Provide oversight of vulnerability assessments. Conduct architecture reviews for new systems and services. Evaluate technical controls and recommend improvements. Support the rollout of new security tools and technologies. Provide input into incident management and security metrics reporting. About You: 2+ years' experience in an security role. Strong understanding of risk assessment methodologies. Knowledge of frameworks such as ISO 27001. Experience with vulnerabilitymanagement and technical controls. Excellent problem-solving skills with strong attention to detail. Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is More ❯
ensuring mitigation plans are in place.· Support the development and maintenance of security policies and standards.· Assist with third-party security reviews and supplier risk management.· Provide oversight of vulnerability assessments.· Conduct architecture reviews for new systems and services.· Evaluate technical controls and recommend improvements.· Support the rollout of new security tools and technologies.· Provide input into incident management and security metrics reporting. About You: · 2+ years' experience in an security role.· Strong understanding of risk assessment methodologies.· Knowledge of frameworks such as ISO 27001.· Experience with vulnerabilitymanagement and technical controls.· Excellent problem-solving skills with strong attention to detail.· Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is More ❯
threat detection, incident response, and security improvements, working closely with teams across the business to maintain compliance and best practice. What you'll do: Lead threat detection, incident response & vulnerabilitymanagement Strengthen cyber security posture across cloud, infrastructure & applications Advise development teams on security best practice (SDLC) Maintain ISO 27001 & Cyber Essentials Plus standards Mentor junior analysts & develop More ❯
Employment Type: Permanent
Salary: £45000 - £50000/annum discretionary bonus and more
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
role where youll play a key part in strengthening the organisations cyber defence posture by collecting, analysing, and disseminating actionable intelligence. Youll work closely with incident response, security operations, vulnerabilitymanagement, and leadership teams to anticipate threats, mitigate risks, and improve resilience. Key Responsibilities: Collect and analyse intelligence to address high-priority security requirements. Produce and share actionable More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Stackstudio Digital Ltd
to): Microsoft Defender for Endpoint Microsoft Defender for O365 Microsoft Defender for Identity Microsoft 365 Defender Microsoft Cloud App Security Good knowledge around Endpoint Detection and Response (EDR), Threat & VulnerabilityManagement (TVM), Attack Surface Reduction (ASR), and Auto Investigation and Remediation (AIR). Experience with Symantec Endpoint Protection (SEPM). Experience in McAfee/Windows Defender Antivirus Policy More ❯
Bletchley, Buckinghamshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
background in delivery Security Assurance support, with the following skills and experience: Experience of producing Secure-By-Design assessments (Risk Assessment Papers, Risk Treatment Plan, Risk Business Case & Security Management Plan). Experience of implementing vulnerabilitymanagement processes. Experience of security assurance and the measurement of controls. Experience in risk and threat modelling within a high-threat More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
SUMMER-BROWNING ASSOCIATES LIMITED
background in delivery Security Assurance support, with the following skills and experience: Experience of producing Secure-By-Design assessments (Risk Assessment Papers, Risk Treatment Plan, Risk Business Case & Security Management Plan). Experience of implementing vulnerabilitymanagement processes. Experience of security assurance and the measurement of controls. Experience in risk and threat modelling within a high-threat More ❯
in large-scale Financial Services organisations. Proven expertise in designing and implementing secure architectures within Azure public cloud solutions. Strong knowledge of securing Azure infrastructure, including identity and access management, network security, and data protection. Comprehensive understanding of security architecture frameworks and best practices (e.g., SABSA, TOGAF). Hands-on experience with security tools and processes, such as SIEM … vulnerabilitymanagement, and incident response within Azure environments. The ability to engage and communicate effectively with senior security stakeholders and technical security departments. Capability to engage with finance stakeholders to analyse and map business needs and processes. Experience in leading the development and implementation of business applications and financial solutions. A solid understanding of security architecture reviews and More ❯