levels of supervision. Education Requirements & Experience Minimum of 2 to 3 years of experience in the IT security industry, preferably working in a SOC/NOC environment. Preferably holds CyberSecurity Certification e.g. ISC2 CC, EPQ Experience with Cloud platforms (AWS and/or Microsoft Azure) Excellent knowledge of Microsoft Office products, especially Excel and Word Reports to Security Director More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
or equivalent). Demonstrable experience working on technical projects and managing stakeholders. Demonstrable experience of working within security standards and frameworks Desirable criteria: Degree in Computer Science, Information Technology, CyberSecurity or technical related field. Professional Membership (e.g. BCS, CITP) or a willingness to obtain within 12 months of taking up post SC Clearance before taking up post (will be More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Clear IT Recruitment Limited
proficiency in managing and troubleshooting network devices and configurations, including VLANs, DNS, DHCP, and VPNs. • System administration - experience with Active Directory, Group Policy and Azure AD. • Security - familiarity with cybersecurity principles and tools, such as firewalls, antivirus and patch management. • Customer service - excellent communication and customer service skills to interact with clients and internal stakeholders in a clear, supportive manner. More ❯
Staffordshire, United Kingdom Hybrid / WFH Options
Gleeson Recruitment Group
friendly culture Benefits Strong training and development support Friendly, collaborative IT team of 50 across Infrastructure, Dev & Ops The chance to help shape how a major UK organisation tackles cybersecurity At Gleeson Recruitment Group, we embrace inclusivity and welcome applicants of all backgrounds, experiences, and abilities. We are proud to be a disability confident employer. By applying you will More ❯
and security gaps and support of tracking and remediation. Guide and support the Third-Party Security Assessment team with assessments and due diligence activities in line with Information and CyberSecurity requirements. Provide guidance and support to internal teams on supplier risk management best practices. Stay up to date with the latest information security trends, threats, and technologies. Provide reports More ❯
and security gaps and support of tracking and remediation. Guide and support the Third-Party Security Assessment team with assessments and due diligence activities in line with Information and CyberSecurity requirements. Provide guidance and support to internal teams on supplier risk management best practices. Stay up to date with the latest information security trends, threats, and technologies. Provide reports More ❯
Logic Apps and Azure Integration Services. Experience in semi/fully unstructured datasets and NoSQL environments Awareness of working in a regulated environment, with experience of data legislation and cybersecurity accreditations e.g., GDPR, ISO27001, Cyber Essentials. Expertise in Business Intelligence, ideally via Power BI for data visualization and reporting Use of DevOps (CI/CD) concepts to test, schedule More ❯
Technologies: Security Cleared SC C++ C# Unix Solaris Java Powershell Shellscript Perl Python PHP VMware Docker AWS Azure HTPP SMTP SNMP Syslog NTP Visual Studio tfs CyberSecurity The Software Engineer will be part of an existing highly skilled development team, reporting directly to the Lead Developer, writing complex security solution software. The following are key responsibilities: Writing high quality More ❯
strategies and government requirements. Analyze customer needs and software requirements for feasibility. Conduct testing of new software sites for functionality. Develop testing, validation procedures, and documentation. Possess knowledge of cybersecurity, privacy, networking, protocols, security methods, and risk management. Perform software debugging. Understand content creation technologies like wikis, social networking, and content management systems. Communicate effectively and collaborate with team members. More ❯
information governance, network protocols. Knowledge of system hardening techniques. Knowledge and experience in SIEM technologies. Knowledge and experience in vulnerability and risk management processes. Knowledge and experience of applying cybersecurity controls within SAAS environments. Project Engagement Strong stakeholder management skills Knowledge and experience in software development lifecycle processes and ITIL principles. Collaborative Working Effective communication skills (written and verbal) Prepared More ❯
ISO 27001 implementation as a minimum, but preferably also experience in ISOs 27701/22301/9001 A strong understanding of information security and data privacy frameworks like NIST Cybersecurity Framework (CSF), GDPR, CIS or similar. Experience of certification body audits. Should have good experience and knowledge of Cyber/Information Security Governance, Risk Management, and Compliance. ISO Consultant – SC More ❯
higher Good understanding of the risks associated with technological functions Experience reading and interpreting regulations, laws and statutes Understanding of the global regulatory environment as it relates to technology, cybersecurity, information security, data governance and artificial intelligence Experience interacting with regulators, or supporting regulatory audits or inquiries Experience in cyber regulatory requirements and technology incident reporting is a plus More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
Python, PowerShell) for automation and enrichment. Minimum of 3 to 5 years of experience in the IT security industry, preferably working in a SOC/NOC environment. Preferably holds CyberSecurity Certification, e.g., ISC2 CISSP, GIAC, SC-200, Splunk Certified Admin/Power User, IBM QRadar Please send your details and CV through to (url removed) if you are interested More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Capgemini
mindset, meaning you will have countless training and development opportunities from thinktanks to hackathons, and access to 250,000 courses with numerous external certifications from AWS, Microsoft, Harvard ManageMentor, Cybersecurity qualifications and much more. You'll be bringing your unique skills and perspectives to the team, inspiring and taking inspiration from your teammates as you unlock value in everything you More ❯
Build relational databases, perform data access analysis, and design archive/recovery processes. Review and develop object/data models and metadata repositories for better data management. Knowledge of cybersecurity, privacy principles, networking, protocols, and risk management is required. Maintain databases and optimize performance. Understand database management systems, query languages, and data warehousing principles. Manage physical and virtual data storage More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Talan Group
as Gemserv Limited, Talan provides a range of consultancy and outsourcing capabilities including programme management, market design and governance. We also have extensive and award-winning capabilities across cybersecurity, data privacy and digital transformation. We are a B Corp, IIP Gold accredited and Great Place to Work accredited. The nature of what we do means we are very much More ❯
Warwick, Warwickshire, West Midlands, United Kingdom
Tata Technologies Europe Ltd
systems engineering, software engineering, coding, and all levels of functional testing. Beyond core development, ESS also integrates critical supporting processes such as project management, risk assessment, functional safety, and cybersecurity, ensuring compliance with ASPICE standards and delivering reliable, secure, and high-quality embedded systems & solutions. The Role: This role sits within the (BEV/XHEV) Propulsion System Integration team. The More ❯
more efficient supply chains, and are more sustainable than single-use packaging. To strengthen our IT-department at our office in Dudley (UK), we are currently recruiting a driven Cybersecurity & Compliance Manager. Position purpose The Cybersecurity & Compliance Manager will lead Tosca’s efforts to ensure adherence to NIST CFS 2.0, ISO 27001, and other standards. This role focuses on developing … security protocols, maintaining documentation, conducting risk assessments, and ensuring regulatory compliance. Responsibilities include managing security infrastructure, incident response, and promoting cybersecurity awareness. The position requires collaboration with Global IT, cross-functional teams, and third-party partners. Key qualifications include experience in cybersecurity and compliance, strong knowledge of NIST and ISO standards, risk management expertise, and effective communication skills. This is … actions. Strong communication and interpersonal skills, capable of working effectively with diverse teams and stakeholders. Ability to stay current with security trends, emerging threats, and best practices in the cybersecurity landscape. Experience of manufacturing and/or supply chain industry is preferred. Able to operate in a multinational corporation with several locations. Competencies You have expertise within Customer/Relationship More ❯
include: Improving and maintaining our Privacy by Design and by Default programme Conducting privacy impact assessments (PIAs), identifying and mitigating risks across the company Collaborating with data protection, legal, cybersecurity, product, and engineering teams to align privacy principles from the early stages of development Guiding the development of new privacy products, features, and tools Responding to privacy incidents with analysis More ❯
Hereford, Herefordshire, West Midlands, United Kingdom
Thorn SDS
Carry out installation, configuration, and support activities across varied IT environments Work collaboratively with technical teams and project stakeholders Troubleshoot issues, apply fixes, and maintain documentation Ensure adherence to cybersecurity protocols and operational standards Skills and Experience: Experience in a relevant IT engineering role (network/server/desktop/installation) Demonstrated capability within a defence environment Strong understanding More ❯
ITILV4 would be a plus. Any experience around solution design and modelling tools, enterprise architecture frameworks and cloud computing platforms such as AWS, Azure or GCP, virtualization, networking, or cybersecurity tools. Must be SC cleared or able to obtain SC and eventually DV clearance. For more info pls get in touch. More ❯
an experienced Digital Forensic Analyst to conduct forensic examinations of digital devices for clients in the legal sector, police forces, local authorities, and commercial organisations. The company also delivers CyberSecurity, e-discovery, and digital investigation services. Key Responsibilities: * Perform forensic examinations of computers, mobile phones, and other digital devices to acquire and process evidential data * Manage casework and forensic More ❯
Wealth Management, and Platform Solutions. Finance Technology Engineering : Covers audits related to software engineering, product management, and system design within Compliance & Legal, Controllers & Tax, Enterprises, and Risk & Capital Planning. CyberSecurity : Responsible for audits related to AI, cyber threats, and system design within the Engineering division. Basic Qualifications Bachelor's degree 0-3 years of relevant work experience Proficiency in More ❯
Redditch Borough Council, Town Hall, Walter Stranz Square, Redditch, Worcestershire, West Midlands, England
Bromsgrove District Council
data protection legislation Support and assist in the development, implementation, maintenance and reviewing of policies, systems and data to ensure compliance with all relevant information regimes and legislation, including cybersecurity To assist with information management processes such as third-party and sharing agreements, retention and disposal, and access. Including having awareness of the legal requirements for information risk and More ❯