ll work as part of our Information Security governance and oversight team. This technically focused role includes delivering our Information Security services (such as consultancy, assurance reviews and risk management) and providing governance and oversight across the business to effectively manage Information Security and Cyber risk. We're big on working flexibly - you'll spend most of your time … of maturing extensive Pen test & other testing programmes. Proficiency in technical security controls and frameworks, including experience and proficiency in cloud security. Experience and expertise in Azure environment security, vulnerabilitymanagement, and associated processes. Detailed knowledge of Information Security frameworks and standards, particularly PCI-DSS, ISO27001, and other cyber frameworks. Experience of managing Information Security in an Agile More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
UKRI
organisation to identify, assess, and mitigate risks, ensuring security policies and processes align with organisational objectives and regulatory requirements. Advise stakeholders and implement effective security solutions, providing oversight for vulnerability assessments, remediation activities, and technical control evaluations. Promote a culture of security by participating in awareness programs, supporting internal and external audits, and assisting in the development of policy … A professional certification (e.g., CISM, CISSP, CompTIA Security+, CCSP or AWS certification). Degree in a related subject or relevant comparable education. Solid experience with risk assessment methodologies and vulnerabilitymanagement processes, including relevant tooling. (S&I) Excellent analytical, problem-solving, and decision-making skills, with strong attention to detail. (I) Proficient in communicating complex security concepts to … and security technologies and controls. (S&I) Proven ability to lead and drive security initiatives, respond to security incidents, and conduct investigations. (S&I) Comprehensive understanding of information security management concepts. (S&I) Benefits: We recognise and value our employees as individuals and aim to provide a favourable pay and rewards package. We are committed to supporting employees' development More ❯
CEH, CySA+, OSCP, CISSP, CCSP etc.) • IT Security or Cyber Security experience in any of the following areas: Incident Response & Digital Forensics. Cybersecurity Detection Engineering and Threat Hunting or VulnerabilityManagement • Experience analysing attack vectors, current threats, and security remediation strategies • Experience with SIEM technologies, EDR technologies, and/or Asset isolation tools • Experience with cloud environment • Networking More ❯
CEH, CySA+, OSCP, CISSP, CCSP etc.) • IT Security or Cyber Security experience in any of the following areas: Incident Response & Digital Forensics. Cybersecurity Detection Engineering and Threat Hunting or VulnerabilityManagement • Experience analysing attack vectors, current threats, and security remediation strategies • Experience with SIEM technologies, EDR technologies, and/or Asset isolation tools • Experience with cloud environment • Networking More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Atrium (EMEA)
CEH, CySA+, OSCP, CISSP, CCSP etc.) • IT Security or Cyber Security experience in any of the following areas: Incident Response & Digital Forensics. Cybersecurity Detection Engineering and Threat Hunting or VulnerabilityManagement • Experience analysing attack vectors, current threats, and security remediation strategies • Experience with SIEM technologies, EDR technologies, and/or Asset isolation tools • Experience with cloud environment • Networking More ❯
CEH, CySA+, OSCP, CISSP, CCSP etc.) • IT Security or Cyber Security experience in any of the following areas: Incident Response & Digital Forensics. Cybersecurity Detection Engineering and Threat Hunting or VulnerabilityManagement • Experience analysing attack vectors, current threats, and security remediation strategies • Experience with SIEM technologies, EDR technologies, and/or Asset isolation tools • Experience with cloud environment • Networking More ❯
East London, London, United Kingdom Hybrid / WFH Options
Atrium (EMEA)
CEH, CySA+, OSCP, CISSP, CCSP etc.) • IT Security or Cyber Security experience in any of the following areas: Incident Response & Digital Forensics. Cybersecurity Detection Engineering and Threat Hunting or VulnerabilityManagement • Experience analysing attack vectors, current threats, and security remediation strategies • Experience with SIEM technologies, EDR technologies, and/or Asset isolation tools • Experience with cloud environment • Networking More ❯
Leigh, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium (EMEA)
CEH, CySA+, OSCP, CISSP, CCSP etc.) • IT Security or Cyber Security experience in any of the following areas: Incident Response & Digital Forensics. Cybersecurity Detection Engineering and Threat Hunting or VulnerabilityManagement • Experience analysing attack vectors, current threats, and security remediation strategies • Experience with SIEM technologies, EDR technologies, and/or Asset isolation tools • Experience with cloud environment • Networking More ❯
Bolton, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium (EMEA)
CEH, CySA+, OSCP, CISSP, CCSP etc.) • IT Security or Cyber Security experience in any of the following areas: Incident Response & Digital Forensics. Cybersecurity Detection Engineering and Threat Hunting or VulnerabilityManagement • Experience analysing attack vectors, current threats, and security remediation strategies • Experience with SIEM technologies, EDR technologies, and/or Asset isolation tools • Experience with cloud environment • Networking More ❯
Altrincham, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium (EMEA)
CEH, CySA+, OSCP, CISSP, CCSP etc.) • IT Security or Cyber Security experience in any of the following areas: Incident Response & Digital Forensics. Cybersecurity Detection Engineering and Threat Hunting or VulnerabilityManagement • Experience analysing attack vectors, current threats, and security remediation strategies • Experience with SIEM technologies, EDR technologies, and/or Asset isolation tools • Experience with cloud environment • Networking More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Atrium (EMEA)
CEH, CySA+, OSCP, CISSP, CCSP etc.) • IT Security or Cyber Security experience in any of the following areas: Incident Response & Digital Forensics. Cybersecurity Detection Engineering and Threat Hunting or VulnerabilityManagement • Experience analysing attack vectors, current threats, and security remediation strategies • Experience with SIEM technologies, EDR technologies, and/or Asset isolation tools • Experience with cloud environment • Networking More ❯
Bury, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium (EMEA)
CEH, CySA+, OSCP, CISSP, CCSP etc.) • IT Security or Cyber Security experience in any of the following areas: Incident Response & Digital Forensics. Cybersecurity Detection Engineering and Threat Hunting or VulnerabilityManagement • Experience analysing attack vectors, current threats, and security remediation strategies • Experience with SIEM technologies, EDR technologies, and/or Asset isolation tools • Experience with cloud environment • Networking More ❯
Central London / West End, London, United Kingdom Hybrid / WFH Options
Atrium (EMEA)
CEH, CySA+, OSCP, CISSP, CCSP etc.) • IT Security or Cyber Security experience in any of the following areas: Incident Response & Digital Forensics. Cybersecurity Detection Engineering and Threat Hunting or VulnerabilityManagement • Experience analysing attack vectors, current threats, and security remediation strategies • Experience with SIEM technologies, EDR technologies, and/or Asset isolation tools • Experience with cloud environment • Networking More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Atrium Workforce Solutions Ltd
CEH, CySA+, OSCP, CISSP, CCSP etc.) • IT Security or Cyber Security experience in any of the following areas: Incident Response & Digital Forensics. Cybersecurity Detection Engineering and Threat Hunting or VulnerabilityManagement • Experience analysing attack vectors, current threats, and security remediation strategies • Experience with SIEM technologies, EDR technologies, and/or Asset isolation tools • Experience with cloud environment • Networking More ❯
Ashton-Under-Lyne, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium (EMEA)
CEH, CySA+, OSCP, CISSP, CCSP etc.) • IT Security or Cyber Security experience in any of the following areas: Incident Response & Digital Forensics. Cybersecurity Detection Engineering and Threat Hunting or VulnerabilityManagement • Experience analysing attack vectors, current threats, and security remediation strategies • Experience with SIEM technologies, EDR technologies, and/or Asset isolation tools • Experience with cloud environment • Networking More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Castlefield Recruitment
with internal and external teams to ensure secure and reliable operations. Manage and maintain key infrastructure components including servers, networks, and cloud platforms. Deliver technical input into IT service management and improvement projects. Ensure systems are compliant with relevant security standards and best practices. Identify and mitigate risks through regular assessments and reviews. Drive continuous improvement in monitoring, automation … cyber security principles, tooling, and incident response. Ability to troubleshoot complex technical issues across systems and services. Comfortable working both independently and collaboratively across teams. Familiarity with IT service management frameworks (e.g. ITIL) and best practice methodologies. Desirable Skills and Qualifications Relevant industry certifications (e.g. Microsoft Certified, CompTIA Security+, ITIL, etc.) Experience working in regulated environments with a focus … on data protection and compliance. Exposure to cloud security, identity management, and endpoint protection tools. Understanding of vulnerabilitymanagement and patching practices. More ❯
Washington, Washington DC, United States Hybrid / WFH Options
phia
support services to our partners and clients. phia is seeking a Senior Application Security Engineer with hands-on experience using Veracode and Burp Suite for application security testing and vulnerability management. The ideal applicant should be proficient in planning, coordinating, and conducting application security testing (SAST/DAST) utilizing static and dynamic analysis tools, interpreting scan results, and providing More ❯
roadmap that you will shape. What you'll be doing Application Security (AppSec) : Driving secure development practices, code analysis, and threat modelling. Security Operations (SOC) : Overseeing monitoring, incident response, vulnerabilitymanagement, and operational resilience. Governance, Risk & Compliance (GRC) : Leading our efforts to achieve and maintain compliance with PCI, GDPR, SOC2, and ISO27001. Vendor Security : Spearheading due diligence and … our Vendor Governance Forum. Policies & Assurance : Defining and enforcing security standards, collaborating with IT Ops and Platform Engineering on execution, and providing assurance to stakeholders, customers, and regulators. Risk Management : Escalating material risks directly to the CTO and other risk functions. Culture & Training : Promoting a secure-by-design culture through training, awareness, and best practices across the company. What … we're looking for We're seeking an experienced security leader who is comfortable with: Building a team : You have prior management experience and a proven track record of growing a collaborative and cross-functional Security team. Scaling AppSec : You've owned and scaled a robust Application Security program, including secure development, code analysis, and threat modelling. Running Security More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
NCC
configuration assessments, and support user acceptance testing (UAT) for security-related features. Collates and analyses information for threat intelligence requirements from a variety of sources. Designs and executes complex vulnerability research activities. Provides guidance, support and mentoring to other IT Engineers as requested by the IT Leadership team or line manager So, what are we looking for in your … Knowledge of Microsoft-Based Environments across both on-prem and cloud environments. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identity and access management (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Familiarity with common regulatory and compliance frameworks (e.g.NIST, CIS Controls, ISO 27001, Cyber Essentials Plus). Experience aligning … implementing monitoring, logging, and alerting toolsets including SIEM and threat detection platforms. Understanding of data classification, encryption, and secure storage/access principles. Familiarity with endpoint protection platforms and vulnerabilitymanagement tools. Experience securing hybrid identity solutions and federated authentication models Understanding of security automation concepts, including security orchestration and response (SOAR) including ability to script or automate More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Thames Water
procedures, templates, and standards Assist in the development and localisation of standard test scripts, ensuring they are tailored to specific control environments and aligned with the organisations Enterprise Risk Management Framework Conduct control testing activities to evaluate the design and operational effectiveness of cybersecurity controls, documenting results clearly and raising issues where appropriate. Ensure timely delivery of assigned control … this role, the essential criteria youll need is Proven experience in performing cybersecurity control assessments, including evaluating design and operational effectiveness Strong understanding of information security principles, cyber risk management, and control frameworks Experience in IT, OT and Cloud environments, with a focus on cybersecurity controls Clear and professional verbal and written communication, including the ability to explain cybersecurity … with minimal supervision, taking ownership of assigned tasks and driving them to completion while maintaining high standards of quality and accuracy Strong understanding of Cybersecurity Domains including Threat Intelligence, VulnerabilityManagement, Security Testing, Security Architecture, Infrastructure Protection, Application Security, Identity and Access Management, Incident Investigation & Response and Cryptography Additional skills and experiences would be great to have More ❯
San Antonio, Texas, United States Hybrid / WFH Options
Novacoast Federal
strong foundation in cloud security. Proficiency in Python Scripting is highly preferred. Minimum of 3 years experience in spearheading security solutions in large-scale environments. A comprehensive grasp of vulnerabilitymanagement and various compliance standards. Adeptness with API-based security and compliance standards is highly valued. Knowledgeable in cloud networking, network security, virtualization, and cloud computing basics. Skillful … presenting solutions to leadership and customers. Preferred Experience: Hands-on experience with Palo Alto Prisma Cloud: 2+ years (Highly preferred) Strong Python scripting skills (Highly preferred) API configuration and management: 3+ years (Highly preferred) Cloud Security expertise: 3+ years Experience with Kubernetes: 3+ years Experience with other Cloud Security Posture Management (CSPM) tools: (Significant plus) Code Security knowledge More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
respond to Cyber Security Incidents Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others. Run Vulnerability Assessment tools to measure compliance with security updates and security patches. Member of a Team who are responsible for making multiple daily CSOC checks to detect and respond to … XDR and Microsoft Defender variants, and Elastic Security, or displays aptitude to learn how to work with a SIEM. Experience and knowledge of SIEM tools, Cyber Security Incident Response, VulnerabilityManagement and Cyber Threat Intelligence. Experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Connsci
systems maintain a secure posture across their lifecycle and will also serve as an advisor on information security matters. In this role you can expect to: • Maintain and enhance vulnerabilitymanagement programs, analyze scan data (e.g., Tenable Nessus) and apply STIGs for compliance. • Monitor IT systems throughout their lifecycle for changes impacting security posture, ensuring alignment with RMF … and ATO requirements. • Develop, update, and maintain System Security Plans (SSPs), POA&Ms, and configuration management records. • Research vendor documentation and CVE advisories to identify and implement remediation steps or compensating controls. • Prioritize vulnerabilities and implement remediation action plans in conjunction with system and application owners • Support incident response activities, continuous monitoring, and risk assessments of all security controls. More ❯
emerging attack techniques. Manage and optimise SIEM tools (Splunk, QRadar, Microsoft Sentinel). Develop SOC use cases, runbooks, and playbooks to improve response capability. Collaborate with IT, legal, and management teams during incident response. Support pre-sales, client demonstrations, and solution scoping for new opportunities. Contribute to continual service improvement and security tool enhancements Skills & Experience Strong background in … incident response, SOC operations, and security investigations. Hands-on expertise with SIEM tools (Splunk, QRadar, Microsoft Sentinel). Deep understanding of network traffic analysis, vulnerabilitymanagement, and penetration testing. Knowledge of DFIR principles, malware reverse engineering, and digital forensics. Familiarity with ITIL processes (Incident, Problem, Change). Experience with cloud platforms (AWS and/or Azure). More ❯
Aberdeen, Aberdeenshire, United Kingdom Hybrid / WFH Options
Spectrum IT Recruitment
exclusively with a global leader in the software industry to recruit a Head of Cyber & IT. This is a senior leadership role with strategic responsibility across Cloud Operations, IT Management, and Cybersecurity in a fast-paced SaaS environment. The company has a strong portfolio of products that are essential to industries such as energy, offshore, and large-scale infrastructure. … with business goals, and managing vendor relationships and audit requirements. Key Areas of Responsibility Cybersecurity Ensure compliance with ISO 27001, SOC 2, GDPR, and other frameworks. Lead incident response, vulnerabilitymanagement, and threat detection. Oversee disaster recovery and business continuity planning. Champion a DevSecOps culture across the organisation. IT Management Lead IT support, enterprise systems, and SaaS More ❯