clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Stoke-on-Trent, Staffordshire, UK Hybrid / WFH Options
Logiq
clients across Private and Public Sector. Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves … As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful … of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerabilitymanagement software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft More ❯
Chelmsford, Essex, South East, United Kingdom Hybrid / WFH Options
Keystream Group Limited
leadership and over 9,000 users - working collaboratively across internal teams and over 100 partners and suppliers. Oversee governance, risk, compliance, and security operations including incident response, threat intelligence, vulnerabilitymanagement, and penetration testing. Direct the selection, deployment, and maintenance of appropriate security technologies and processes to protect ECCs data and assets. You will be responsible for designing … a team of approximately 15, including six direct reports, fostering a culture of professionalism, learning, and service excellence. Experience Needed: Deep expertise in cyber security governance, compliance, and risk management within complex organisations. Strong strategic leadership experience across large scale organisations, with the ability to influence and communicate effectively at senior and political levels. A track record of developing More ❯
Coventry, Warwickshire, United Kingdom Hybrid / WFH Options
Cadent Gas
and Operational Technology (OT) environments. This is a hands-on, technically rich role where you will work with a wide range of security tools and collaborate with threat intelligence, vulnerabilitymanagement, and incident response teams. You will engineer solutions to mitigate threats, automate detection and response, and ensure our systems remain secure, resilient, and compliant. Why you'll … IT and OT environments. Strategic Contribution - Influence the development of new controls and support the delivery of Cadent's cyber security strategy. Cross-Team Collaboration - Partner with threat intelligence, vulnerability analysts, and incident responders to enhance our defences. Continuous Improvement - Engineer solutions for unpatchable vulnerabilities and automate detection and response processes. National Impact - Help protect the systems that keep More ❯
City of London, London, United Kingdom Hybrid / WFH Options
FIND | Creating Futures
at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetration testing and vulnerabilitymanagement Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why Join? Be at More ❯
at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetration testing and vulnerabilitymanagement Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why Join? Be at More ❯
to lead the end-to-end delivery of critical security projects for a global leader in financial market infrastructure. This role focuses on driving Security Maturity and Identity & Access Management (IAM) initiatives, ensuring alignment with regulatory requirements and business objectives in a highly regulated environment. You will oversee complex, multi-workstream projects, managing budgets, stakeholders, and vendor relationships while … and interface with PMO, Finance, and Portfolio teams. Required Experience: 5+ years in delivering complex InfoSec projects (financial/trading sector preferred). Proven expertise in IAM, cloud security, vulnerabilitymanagement, and third-party risk. Certifications: PRINCE2, MSP, PMP, or APM (CISM/CRISC/ITIL desirable). Strong stakeholder management and experience in matrixed environments. Proficiency More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Computappoint
to lead the end-to-end delivery of critical security projects for a global leader in financial market infrastructure. This role focuses on driving Security Maturity and Identity & Access Management (IAM) initiatives, ensuring alignment with regulatory requirements and business objectives in a highly regulated environment. You will oversee complex, multi-workstream projects, managing budgets, stakeholders, and vendor relationships while … and interface with PMO, Finance, and Portfolio teams. Required Experience: 5+ years in delivering complex InfoSec projects (financial/trading sector preferred). Proven expertise in IAM, cloud security, vulnerabilitymanagement, and third-party risk. Certifications: PRINCE2, MSP, PMP, or APM (CISM/CRISC/ITIL desirable). Strong stakeholder management and experience in matrixed environments. Proficiency More ❯
to lead the end-to-end delivery of critical security projects for a global leader in financial market infrastructure. This role focuses on driving Security Maturity and Identity & Access Management (IAM) initiatives, ensuring alignment with regulatory requirements and business objectives in a highly regulated environment. You will oversee complex, multi-workstream projects, managing budgets, stakeholders, and vendor relationships while … and interface with PMO, Finance, and Portfolio teams. Required Experience: 5+ years in delivering complex InfoSec projects (financial/trading sector preferred). Proven expertise in IAM, cloud security, vulnerabilitymanagement, and third-party risk. Certifications: PRINCE2, MSP, PMP, or APM (CISM/CRISC/ITIL desirable). Strong stakeholder management and experience in matrixed environments. Proficiency More ❯
engagement for both local and distributed projects focused on technological transformation, improvement and growth. The Senior Security Automation Engineer will have full responsibility for the design, engineering, planning and management of the security orchestration and automation process. Key responsibilities include: Providing automation services to the Information Security Team. Including proof of concept, design, deployment, and maintenance of new technologies … maintenance of automation playbooks). Extensive experience with SIEM platforms Extensive experience SOC environments In-depth understanding of the design and deployment of other common security technologies, e.g., IDS, VulnerabilityManagement, Authentication and identity management, WAF, SOAR, MDM etc Experience with designing security solutions at scale for large enterprises or for multi-tenant service providers. Familiarity with More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
BT Group
with expertise in Elasticsearch to join our dynamic team. As a SIEM engineer, you will play a critical role in designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threat detection, incident response, and overall security posture. This role is hybrid (3 days in … Logstash: Design, develop, and maintain data pipelines using Logstash, part of the Elastic Stack. Automate data ingestion, transformation, and loading tasks. Beats for Data Collection: Agent and Agent Policy Management: Proficiency in configuring and managing agents, including setting up agent policies for various operation systems. Ensure seamless data flow from endpoints to the Elastic Stack. Data Cleaning and Enrichment … Collaborate with data analysts to create meaningful search experiences. Database Architecture and Scaling with Elasticsearch: Optimize data storage and retrieval mechanisms within Elasticsearch clusters. Implement sharding, replication, and index management strategies. End-to-End Solution Delivery: Expertise in taking ownership of a requirement from start to finish, including gathering detailed requirements, designing, and implementing robust, innovative solutions. Experience Required More ❯
days optional remote work. The goal is to strengthen the operational security of information systems by deploying, administering, and monitoring various cybersecurity tools. This mission also includes incident management, optimizing existing solutions, and ensuring compliance with regulatory security requirements. Responsibilities: Deployment and administration of protection tools (AV/EDR, WAF, SIEM, vulnerability scanners) Analysis and management of … cybersecurity incidents in support of SOC N2 The implementation and optimization of detection scenarios Carrying out security audits and proposing action plans Risk management and compliance with current regulations (GDPR, ISO standards, etc.) Skills needed: Mastery of security technologies: Firewalls, IPS/IDS, WAF, Proxy, SIEM, vulnerabilitymanagement Expertise in mitigating DDoS attacks Mastery of Threat Intelligence … tools (MITRE ATT&CK, OTX, Shodan) Experience in crisis management and incident response Mastery of IT infrastructure security concepts (network, servers, OS, databases) Knowledge of application security (OWASP, SAST) Mastery of collaborative tools: Klaxoon, JIRA, Teams Mastery of ITIL best practices and security by design principles Knowledge of GDPR, ISO 27001 regulations Interested in joining a household name in More ❯
Aldershot, Hampshire, South East, United Kingdom Hybrid / WFH Options
JLA Resourcing Ltd
Your role will be pivotal in ensuring the secure delivery of new systems into live service, as well as ongoing protection, compliance, and incident response. You will: Own the vulnerabilitymanagement strategy across platforms, leading scanning, remediation, and reporting activities Design and enforce endpoint security policies, access controls, and malware protections Lead incident identification and response efforts, ensuring … skills & experience: Extensive hands-on experience in cyber security engineering roles, ideally in defence, government, or secure sectors Advanced knowledge of AWS security services, network security, endpoint protection, and vulnerabilitymanagement Strong working knowledge of compliance frameworks and standards (CIS, STIG, NIST, Government Functional Standard 007) Proven ability to lead security planning, risk assessments, and incident response activities More ❯
for all people to be able to make the most of our energy and resources through the integration of processes, software, Big Data, and energy technologies that enable integrated management of buildings, industries, and cities. We are present in over 110 countries with a diverse and disruptive team of over 135,000 people. If you are seeking an opportunity … do you get to do in this position? Deploy Schneider's SDL (Secure Development Lifecycle) Act as an expert facilitator on practices such as secure design, threat modeling, and vulnerabilitymanagement Act as a point of contact for cybersecurity issues for a portfolio of offers Support product owners in specifying security requirements and bring expert knowledge of relevant … and effective Support site, team, and offer cybersecurity certifications Form a network of experts inside and outside the line of business to engage as necessary on technical reviews, risk management and customer topics Travel requirements Occasional travel is required to visit sites, participate in working groups, and engage directly with customers and partners as needed Location and Availability: Sevilla More ❯
San Antonio, Texas, United States Hybrid / WFH Options
Novacoast Federal
strong foundation in cloud security. Proficiency in Python Scripting is highly preferred. Minimum of 3 years experience in spearheading security solutions in large-scale environments. A comprehensive grasp of vulnerabilitymanagement and various compliance standards. Adeptness with API-based security and compliance standards is highly valued. Knowledgeable in cloud networking, network security, virtualization, and cloud computing basics. Skillful … presenting solutions to leadership and customers. Preferred Experience: Hands-on experience with Palo Alto Prisma Cloud: 2+ years (Highly preferred) Strong Python scripting skills (Highly preferred) API configuration and management: 3+ years (Highly preferred) Cloud Security expertise: 3+ years Experience with Kubernetes: 3+ years Experience with other Cloud Security Posture Management (CSPM) tools: (Significant plus) Code Security knowledge More ❯
London, England, United Kingdom Hybrid / WFH Options
Prince Talent & Resourcing Group
for service desk colleagues to help them resolve tickets the same day (preferably the same hour). Log tickets for the customer and ensure you are following the Incident Management process every time – “if it’s not in the ticket, it didn’t happen”. Maintain ticket Q so all tickets include a daily update. The standard is to … avoid having tickets older than 2 weeks that do not have a full plan of action to move to resolution. Change Management – Ensure that you always log a change in accordance with our change management process to fix a fault or satisfy a work request. Help the Service Desk and wider teams quickly identify security or a major …/or apply automation to remove manual work/process. Conduct weekly ticket reviews and monthly Service reviews with the customer. Manage and Maintain all Licensing and certificates. Patching & Vulnerability Management. Consider Information Security as part of the incident and security management process to ensure the confidentiality, integrity and availability of both internal and customer IT assets are More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Prince Talent & Resourcing Group
for service desk colleagues to help them resolve tickets the same day (preferably the same hour). Log tickets for the customer and ensure you are following the Incident Management process every time – “if it’s not in the ticket, it didn’t happen”. Maintain ticket Q so all tickets include a daily update. The standard is to … avoid having tickets older than 2 weeks that do not have a full plan of action to move to resolution. Change Management – Ensure that you always log a change in accordance with our change management process to fix a fault or satisfy a work request. Help the Service Desk and wider teams quickly identify security or a major …/or apply automation to remove manual work/process. Conduct weekly ticket reviews and monthly Service reviews with the customer. Manage and Maintain all Licensing and certificates. Patching & Vulnerability Management. Consider Information Security as part of the incident and security management process to ensure the confidentiality, integrity and availability of both internal and customer IT assets are More ❯
possess a strong understanding of security operations and incident response processes. Key responsibilities include: The Senior Security Automation Engineer will have full responsibility for the design, engineering, planning and management of the security orchestration and automation process. Key responsibilities include: Providing automation services to the Information Security Team. Including proof of concept, design, deployment, and maintenance of new technologies … maintenance of automation playbooks). Extensive experience with SIEM platforms Extensive experience SOC environments In-depth understanding of the design and deployment of other common security technologies, e.g., IDS, VulnerabilityManagement, Authentication and identity management, WAF, SOAR, MDM etc Experience with designing security solutions at scale for large enterprises or for multi-tenant service providers. Familiarity with More ❯
Bath, Somerset, South West, United Kingdom Hybrid / WFH Options
London & Country Mortgages
ensure these systems are fit for purpose and operational. Ideally youll have knowledge and experience with the following: 1. MS Azure knowledge, with experience of the following; Entra ID Management Azure storage accounts Azure Virtual Desktop (AVD) Azure Virtual machine management 2. MS 365 administration of; Teams Sharepoint Intune 3. On prem infrastructure experience i ncluding; Building and … when business needs change. Furthermore, whilst not essential, in addition to the Essential skills it would be desirable to have knowledge and experience of the following technologies; SSL certificate managementVulnerabilitymanagement SIEM experience (Ideally MS Sentinel) Infrastructure As Code (Ideally Terraform and Ansible) Powershell SQL Cisco Umbrella Nutanix Hyperconverged Infrastructure support Netapp Support Knowledge of and More ❯
experience. Provide latest industry expertise in emerging security practices and standards. What it Takes: Minimum of 5 years related work experience required, including experience in cloud security engineering, cloud vulnerabilitymanagement, or general cloud cyber domains Undergraduate degree in a related field or the equivalent combination of training and experience Excellent leadership and team management skills, with More ❯
Security allowing you to grow and develop your career. We offer full 360-degree services to our clients from initial consulting on a range of areas including Risk Assessments, VulnerabilityManagement, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, Penetration Testing and much more. We More ❯
Security allowing you to grow and develop your career. We offer full 360-degree services to our clients from initial consulting on a range of areas including Risk Assessments, VulnerabilityManagement, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, Penetration Testing and much more. We More ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced VulnerabilityManagement Engineer to join our Cyber Security team. As a VulnerabilityManagement Engineer, your primary responsibility will be to manage existing vulnerabilitymanagement-specific … tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerabilitymanagement tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerabilitymanagement activities Process vulnerability data to … provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerabilityMore ❯
City of London, London, United Kingdom Hybrid / WFH Options
Next Ventures
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerability scanning and remediation activities via Tenable VulnerabilityManagement Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerabilitymanagement tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯