communication, and team collaboration skills. Nice to Have Expert-level certification in Azure or related technologies. Experience with GitOps workflows and security automation at scale. Familiarity with SOC processes, vulnerabilitymanagement, and compliance standards (e.g., NIST, ISO, ITIL). More ❯
deployments. Provide technical support with risk assessments on PHI, and steering improvements to our environment in line with common standards such as NIST. Support External Penetration Testing and application vulnerability efforts, delivering assessments and prioritizing remediation activities across the organization. Be across Threat Intelligence relevant to our industry and geographic regions, and translating that to real world defenses for … Suite, Kali, Metasploit and such Scripting including the use of python, Powershell, bash or Javascript Securing networks, hosts, web applications and cloud native deployments Working with toolsets such as: vulnerabilitymanagement, firewalls, SIEM, PAM, IDS/IPS, EDR/XDR, WAF Working with code security controls such as SAST/DAST/IAST/RASP You should also More ❯
Eastbourne, England, United Kingdom Hybrid / WFH Options
AxisOps
backup strategy Write markdown-based SOPs, runbooks, and infra playbooks that are used, tested, and evolved Work in regulated environments , including audit trail design, SBOM production, and CI-driven vulnerability/pentest workflows Collaborate closely with software engineers to make infrastructure serve delivery, not slow it down Note: this role requires you to work from our Eastbourne (UK) office … infra-as-code tooling Real-world experience operating hybrid environments (on-prem, AWS, Azure) Strong networking fundamentals: routing, firewalls, VPNs, switching A security-first mindset, with practical exposure to vulnerabilitymanagement and secure provisioning Clear written communication – your runbooks don’t need walkthroughs Familiarity with datacentre hardware: racking, patching, switch config, server diagnostics Proactive problem-solving skills and More ❯
Bath, Somerset, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Infrastructure Security Analyst, SCCM, Vulnerability, Patch management, Qualys/Nessus Our client, a leading private sector business based in Bath, is looking to hire contractor with a background in infrastructure and related security. The successful candidate will be responsible for ensuring security and integrity for our clients IT infrastructure, taking responsibility for patching and vulnerability remediation for … patches to Windows servers to address vulnerabilities, ensuring compliance with security policies. Manage patching windows and downtime coordination with various business units to minimize disruption during updates. Monitor patch management systems to ensure all systems are up to date and protected from security threats. Server hardening to Windows systems, both physical and virtual. Maintain accurate documentation of remediation activities … incident response by applying emergency patches and remediations Contribute to disaster recovery and business continuity plans Skills and experience required: - Windows server including patching processes Server/security hardening. Vulnerabilitymanagement tools e.g. Nessus, Qualys, for conducting vulnerability assessments Hands-on experience in patch management systems - SCCM, WSUS, or Azure Update Management - for deploying patches More ❯
Feltham, England, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
commercial sectors collaborating with stakeholders and engineers across the business. The organisation is seeking an experienced Cyber Security Engineer with security clearance to support critical national security functions, including vulnerabilitymanagement, endpoint protection, and incident response, within a highly secure environment. Role Overview: This is a hands-on engineering role requiring the delivery of endpoint security engineering activities … of the initial project, cannot be dual national . What we're looking for: Strong understanding of modern endpoint security and hardening practices Familiarity with NIST security controls and vulnerabilitymanagement processes Practical experience with tools such as Ivanti, Trellix, SonarQube, Nessus, or Trivvy Comfortable working within Agile or Scrum environments Excellent written and verbal communication skills, with … Professionals who value collaboration and are comfortable working closely with a range of stakeholders. Those with a growth mindset, intellectual curiosity, and a personable, team-oriented approach. Key Responsibilities: Vulnerability Scanning & Reporting Conduct regular scans using tools such as SonarQube, Trivvy, and Nessus Generate and analyse vulnerability reports; support the Vulnerability & Patch Manager Endpoint Security Maintain and More ❯
London, England, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
commercial sectors collaborating with stakeholders and engineers across the business. The organisation is seeking an experienced Cyber Security Engineer with security clearance to support critical national security functions, including vulnerabilitymanagement, endpoint protection, and incident response, within a highly secure environment. Role Overview: This is a hands-on engineering role requiring the delivery of endpoint security engineering activities … of the initial project, cannot be dual national . What we're looking for: Strong understanding of modern endpoint security and hardening practices Familiarity with NIST security controls and vulnerabilitymanagement processes Practical experience with tools such as Ivanti, Trellix, SonarQube, Nessus, or Trivvy Comfortable working within Agile or Scrum environments Excellent written and verbal communication skills, with … Professionals who value collaboration and are comfortable working closely with a range of stakeholders. Those with a growth mindset, intellectual curiosity, and a personable, team-oriented approach. Key Responsibilities: Vulnerability Scanning & Reporting Conduct regular scans using tools such as SonarQube, Trivvy, and Nessus Generate and analyse vulnerability reports; support the Vulnerability & Patch Manager Endpoint Security Maintain and More ❯
leading Microsoft Teams-based walkthroughs with control owners Reviewing supporting documentation and evidence Conducting detailed control assessments Documenting findings in Word templates and updating Excel trackers Reporting outcomes to management and stakeholders Controls to Test: 55 prioritised key controls across multiple business units Control Domains: You’ll be testing across a wide range of domains including: Perimeter Security – Networks … Devices, Threat Monitoring, Malware Protection Critical Applications – Change Management, Secure Development, Access Management Resilience – Continuity Planning, Crisis Response, VulnerabilityManagement Data Controls – Protection, Loss Prevention, Retention, Accuracy Financial Control Framework – ITGCs, Access Management, Change Management What We’re Looking For: Certifications: CISA (essential); CISM, CISSP, ISO27001, COBIT, ITIL (highly desirable) Experience: Strong background in More ❯
Havant, Hampshire, United Kingdom Hybrid / WFH Options
Reed Technology
month FTC (with likely extension to permanent) Salary: 50 - 53K plus benefits We are seeking a Cyber Security Specialist to lead the implementation of a new Information Security Management System (ISMS) and ensure compliance with security standards. This role is crucial in driving security improvements, managing risks, and maintaining regulatory compliance within a dynamic IT environment of circa … IT users. Key Accountabilities: * Lead the implementation of a new ISMS, ensuring alignment with industry security standards. * Develop and maintain cyber security policies, procedures, and risk management frameworks. * Manage compliance with cyber security regulations, standards, and frameworks (ISO27001, CAF/eCAF, Cyber Essentials Plus). * Implement and manage security monitoring tools to detect and respond to security events. * Identify … with hands-on involvement in ensuring compliance to security frameworks (ISO27001, NIST, eCAF). * Proven experience in implementing security systems and/or monitoring tools. * Strong knowledge of SIEM, VulnerabilityManagement, Threat Intelligence, and IAM systems. * Experience contributing to enterprise-level security initiatives and aligning with industry standards. * Strong collaboration skills, including experience working with IT Operations teams More ❯
Havant, Hampshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
month FTC (with likely extension to permanent) Salary: 50 - 53K plus benefits We are seeking a Cyber Security Specialist to lead the implementation of a new Information Security Management System (ISMS) and ensure compliance with security standards. This role is crucial in driving security improvements, managing risks, and maintaining regulatory compliance within a dynamic IT environment of circa … IT users. Key Accountabilities: * Lead the implementation of a new ISMS, ensuring alignment with industry security standards. * Develop and maintain cyber security policies, procedures, and risk management frameworks. * Manage compliance with cyber security regulations, standards, and frameworks (ISO27001, CAF/eCAF, Cyber Essentials Plus). * Implement and manage security monitoring tools to detect and respond to security events. * Identify … with hands-on involvement in ensuring compliance to security frameworks (ISO27001, NIST, eCAF). * Proven experience in implementing security systems and/or monitoring tools. * Strong knowledge of SIEM, VulnerabilityManagement, Threat Intelligence, and IAM systems. * Experience contributing to enterprise-level security initiatives and aligning with industry standards. * Strong collaboration skills, including experience working with IT Operations teams More ❯
East Sussex, England, United Kingdom Hybrid / WFH Options
DataCareers
Brighton 2 days per week + WFH) Salary: £55K - £62.5K + exceptional Employee Benefits including 28% Employer Pension, (+ on-call payment on the on-call rota) Key Skills: VulnerabilityManagement tools, Azure Security Centre, Defender, Sentinel and a broad Infrastructure Engineer background Summary: This role joins a high performing, dedicated, hands-on Cyber Security Team responsible for … and Microsoft cloud infrastructure, including: Cisco firewalls and ISE, Forcepoint or similar secure web gateway/CASB solution, Mimecast, IDS/IPS solutions, Network Detection and Response (NDR), Qualys vulnerability detection and management platform or similar Highly practical with a can-do attitude, able to demonstrate a proactive approach to identifying and mitigating potential security risks. Strong communications More ❯
Brighton 2 days per week + WFH) Salary: 60K - 62.5K + exceptional Employee Benefits including 28% Employer Pension, (+ on-call payment), great work/life balance Key Skills: VulnerabilityManagement tools, Azure Security Centre, Defender, Sentinel and a broad Infrastructure Engineer background Summary: This role joins a high performing, dedicated, hands-on Cyber Security Team responsible for … and Microsoft cloud infrastructure, including: Cisco firewalls and ISE, Forcepoint or similar secure web gateway/CASB solution, Mimecast, IDS/IPS solutions, Network Detection and Response (NDR), Qualys vulnerability detection and management platform or similar Highly practical with a can-do attitude, able to demonstrate a proactive approach to identifying and mitigating potential security risks. Strong communications More ❯
Brighton, East Sussex, South East, United Kingdom Hybrid / WFH Options
Data Careers
Brighton 2 days per week + WFH) Salary: £55K - £62.5K + exceptional Employee Benefits including 28% Employer Pension, (+ on-call payment on the on-call rota) Key Skills: VulnerabilityManagement tools, Azure Security Centre, Defender, Sentinel and a broad Infrastructure Engineer background Summary: This role joins a high performing, dedicated, hands-on Cyber Security Team responsible for … and Microsoft cloud infrastructure, including: Cisco firewalls and ISE, Forcepoint or similar secure web gateway/CASB solution, Mimecast, IDS/IPS solutions, Network Detection and Response (NDR), Qualys vulnerability detection and management platform or similar Highly practical with a can-do attitude, able to demonstrate a proactive approach to identifying and mitigating potential security risks. Strong communications More ❯
Brighton, East Sussex, Preston Park, United Kingdom Hybrid / WFH Options
Data Careers Ltd
Brighton 2 days per week + WFH) Salary: £60K - £62.5K + exceptional Employee Benefits including 28% Employer Pension, (+ on-call payment), great work/life balance Key Skills: VulnerabilityManagement tools, Azure Security Centre, Defender, Sentinel and a broad Infrastructure Engineer background Summary: This role joins a high performing, dedicated, hands-on Cyber Security Team responsible for … and Microsoft cloud infrastructure, including: Cisco firewalls and ISE, Forcepoint or similar secure web gateway/CASB solution, Mimecast, IDS/IPS solutions, Network Detection and Response (NDR), Qualys vulnerability detection and management platform or similar Highly practical with a can-do attitude, able to demonstrate a proactive approach to identifying and mitigating potential security risks. Strong communications More ❯
City of London, London, United Kingdom Hybrid / WFH Options
JCW
Key Skills & Responsibilities: 5+ years with ForgeRock IAM stack : PingGateway, PingAM, PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetration testing , threat modeling, and vulnerabilitymanagement Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO, engineering, and product teams on More ❯
Key Skills & Responsibilities: 5+ years with ForgeRock IAM stack: PingGateway, PingAM, PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetration testing, threat modeling, and vulnerabilitymanagement Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO, engineering, and product teams on More ❯
Key Skills & Responsibilities: 5+ years with ForgeRock IAM stack : PingGateway, PingAM, PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetration testing , threat modeling, and vulnerabilitymanagement Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO, engineering, and product teams on More ❯
We're flexible! We're happy to receive applications in English or German. Your tasks: In this key role, you will take on professional responsibilities within the Cyber Security Management team, supporting departments in managing Cyber Detection and Protection measures, including VulnerabilityManagement, Security Information and Event Management (SIEM), Incident Management, and overseeing the Change … pragmatic solutions with a sense of proportion Knowledge of security-relevant technologies, methods, and procedures, as well as preferably familiarity with banking or derivatives exchange processes Proficient in Project Management and Stakeholder Management Methodical and goal-oriented approach to work, with the ability to work autonomously within a team setting Experience with Information Security Standards such as BSI More ❯
safeguard national interests What We're Looking For 1-3 years of practical experience in Cyber Security Good understanding of core security principles and tools Exposure to network security, vulnerabilitymanagement, or risk assessments (preferred) Familiarity with security frameworks such as ISO 27001, NIST, or PCI DSS (preferred) Professional certifications like Security+, CEH, or CISSP are desirable Analytical … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Employment Type: Permanent
Salary: £45000 - £55000/annum Excellent Training and Benefits
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
safeguard national interests What We're Looking For 1-3 years of practical experience in Cyber Security Good understanding of core security principles and tools Exposure to network security, vulnerabilitymanagement, or risk assessments (preferred) Familiarity with security frameworks such as ISO 27001, NIST, or PCI DSS (preferred) Professional certifications like Security+, CEH, or CISSP are desirable Analytical … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
HII Mission Technologies
understand and be able to implement DoD RMF system accreditation processes. Assess use case and operational risk of integrated open source, and GOTS/COTS software components. Will use vulnerabilitymanagement systems, automated security scanning tools, and system accreditation record systems. Must be able to grasp new concepts, facilitate information exchanges for data gathering, and collaborate with diverse … audiences. Will follow established processes where applicable, and establish and execute defensible processes where none are prescribed. Provide security planning, assessment, risk analysis, and risk management support. Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements. Support the Government in the enforcement of the design and implementation of trusted … inner workings of various software and system level applications. DoD 8570 compliance with IAT Level II (SSCP, Security+, CCNA-Security, or GSEC certification) Experience with DISA STIGs and SRGs, vulnerabilitymanagement systems, mitigation and compliance processes, and reviewing results from automated security scanning tools. The ability to work independently and as part of a team is needed. Work More ❯
Burton Latimer, Northamptonshire, United Kingdom Hybrid / WFH Options
Weetabix Food Company
to security events and incidents, as well as spearheading engaging user awareness campaigns and training sessions. In addition, you'll play a vital role in supporting the implementation and management of identity, access, and threat management controls throughout our IT environment. Identify, analyse, and respond to security events and incidents, escalating as per the incident response plan. Develop … and deliver IT Security Education and Awareness materials for the entire organisation. Support IT Security Penetration Tests, Assessments, and audits, resolving findings promptly. Analyse vulnerability scans and provide recommendations to prioritise corrective actions. Continuously identify and implement security measures and improvements. Collaborate with Service Line Leads to review and update IT security guidelines and policies. Assist in executing projects … Strong understanding of Active Directory (AD) and Entra ID (Azure AD), MFA, SSO, conditional access, Azure RBAC, PIM Experience with the following products and technologies: Microsoft Defender, Exchange Online, vulnerabilitymanagement tools, phishing simulation tools Experience creating policies, procedures and response plans Excellent communicator with the ability to reduce complex issues and ideas to simple terms and express More ❯
Kettering, Northamptonshire, East Midlands, United Kingdom Hybrid / WFH Options
WEETABIX LIMITED
to security events and incidents, as well as spearheading engaging user awareness campaigns and training sessions. In addition, you'll play a vital role in supporting the implementation and management of identity, access, and threat management controls throughout our IT environment. Identify, analyse, and respond to security events and incidents, escalating as per the incident response plan. Develop … and deliver IT Security Education and Awareness materials for the entire organisation. Support IT Security Penetration Tests, Assessments, and audits, resolving findings promptly. Analyse vulnerability scans and provide recommendations to prioritise corrective actions. Continuously identify and implement security measures and improvements. Collaborate with Service Line Leads to review and update IT security guidelines and policies. Assist in executing projects … Strong understanding of Active Directory (AD) and Entra ID (Azure AD), MFA, SSO, conditional access, Azure RBAC, PIM Experience with the following products and technologies: Microsoft Defender, Exchange Online, vulnerabilitymanagement tools, phishing simulation tools Experience creating policies, procedures and response plans Excellent communicator with the ability to reduce complex issues and ideas to simple terms and express More ❯
Burton Latimer, Northamptonshire, UK Hybrid / WFH Options
The Weetabix Food Company
to security events and incidents, as well as spearheading engaging user awareness campaigns and training sessions. In addition, you\\\'ll play a vital role in supporting the implementation and management of identity, access, and threat management controls throughout our IT environment. Identify, analyse, and respond to security events and incidents, escalating as per the incident response plan. Develop … and deliver IT Security Education and Awareness materials for the entire organisation. Support IT Security Penetration Tests, Assessments, and audits, resolving findings promptly. Analyse vulnerability scans and provide recommendations to prioritise corrective actions. Continuously identify and implement security measures and improvements. Collaborate with Service Line Leads to review and update IT security guidelines and policies. Assist in executing projects … Strong understanding of Active Directory (AD) and Entra ID (Azure AD), MFA, SSO, conditional access, Azure RBAC, PIM Experience with the following products and technologies: Microsoft Defender, Exchange Online, vulnerabilitymanagement tools, phishing simulation tools Experience creating policies, procedures and response plans Excellent communicator with the ability to reduce complex issues and ideas to simple terms and express More ❯
Derbyshire, England, United Kingdom Hybrid / WFH Options
Hays
design effective controls. You will be leading the Cyber Security operations function, by providing strategic direction and coordinating day-to-day delivery of threat intelligence, threat detection, incident response, vulnerabilitymanagement, and ethical hacking capabilities. You will be leading a team of Infrastructure Engineers, ensuring strong data controls are in place, whilst working closely with key stakeholders to … experience of creating cyber security roadmaps Experience of building and implementing strong operational processes Excellent communication skills with the ability to translate business requirements into technical solutions Strong stakeholder management skills What you'll get in return This exciting position is paying between £70,000 and £80,000 negotiable on experience and offers an excellent work life balance including More ❯
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
and services. Ensure project designs comply with Baseline Security Requirements and security policy. Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & Access Management, SIEM and Vulnerability Management. Ensure internal customers, external suppliers and delivery partners are aware of security standards and future strategy to influence development roadmaps. … to deliver a wide range of IT and telecommunications solutions. Competent in applying security policies and principles defined in security architecture to real world scenarios. Understands and applies risk management principles. Effective communication skills to influence stakeholders and explain complex security requirements in simple terms. Stakeholder Management - established as the go-to person for any project issues impacting More ❯