Aberdeen, City of Aberdeen, United Kingdom Hybrid / WFH Options
Spectrum IT Recruitment
exclusively with a global leader in the software industry to recruit a Head of Cyber & IT. This is a senior leadership role with strategic responsibility across Cloud Operations, IT Management, and Cybersecurity in a fast-paced SaaS environment. The company has a strong portfolio of products that are essential to industries such as energy, offshore, and large-scale infrastructure. … with business goals, and managing vendor relationships and audit requirements. Key Areas of Responsibility Cybersecurity Ensure compliance with ISO 27001, SOC 2, GDPR, and other frameworks. Lead incident response, vulnerabilitymanagement, and threat detection. Oversee disaster recovery and business continuity planning. Champion a DevSecOps culture across the organisation. IT Management Lead IT support, enterprise systems, and SaaS More ❯
Chichester, West Sussex, United Kingdom Hybrid / WFH Options
Spectrum IT Recruitment
exclusively with a global leader in the software industry to recruit a Head of Cyber & IT. This is a senior leadership role with strategic responsibility across Cloud Operations, IT Management, and Cybersecurity in a fast-paced SaaS environment. The company has a strong portfolio of products that are essential to industries such as energy, offshore, and large-scale infrastructure. … with business goals, and managing vendor relationships and audit requirements. Key Areas of Responsibility Cybersecurity Ensure compliance with ISO 27001, SOC 2, GDPR, and other frameworks. Lead incident response, vulnerabilitymanagement, and threat detection. Oversee disaster recovery and business continuity planning. Champion a DevSecOps culture across the organisation. IT Management Lead IT support, enterprise systems, and SaaS More ❯
Bosham, Sussex, United Kingdom Hybrid / WFH Options
Spectrum IT Recruitment
exclusively with a global leader in the software industry to recruit a Head of Cyber & IT. This is a senior leadership role with strategic responsibility across Cloud Operations, IT Management, and Cybersecurity in a fast-paced SaaS environment. The company has a strong portfolio of products that are essential to industries such as energy, offshore, and large-scale infrastructure. … with business goals, and managing vendor relationships and audit requirements. Key Areas of Responsibility Cybersecurity Ensure compliance with ISO 27001, SOC 2, GDPR, and other frameworks. Lead incident response, vulnerabilitymanagement, and threat detection. Oversee disaster recovery and business continuity planning. Champion a DevSecOps culture across the organisation. IT Management Lead IT support, enterprise systems, and SaaS More ❯
Washington, Washington DC, United States Hybrid / WFH Options
ICF
is not an immediate opening, we are actively conducting interviews and extending offers in anticipation of the award. We are seeking a Cyber Compliance Lead to oversee compliance, risk management, and governance activities in support of a federal government program. The ideal candidate will serve as the primary point of contact for ensuring that all systems, processes, and documentation … practices under EO 14028 , supply chain attestation , and FedRAMP inheritance . What We Would Like You To Bring With You: Master's degree preferred. Strong knowledge of NIST Risk Management Framework (RMF), FedRAMP, FISMA, CMMC, and related federal cybersecurity requirements. Hands-on experience with compliance tools, continuous monitoring, and vulnerabilitymanagement solutions. Prior experience leading ATO processes More ❯
wideopen, north east england, united kingdom Hybrid / WFH Options
CGI
Security allowing you to grow and develop your career. We offer full 360-degree services to our clients from initial consulting on a range of areas including Risk Assessments, VulnerabilityManagement, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, Penetration Testing and much more. We More ❯
Penwortham, Lancashire, United Kingdom Hybrid / WFH Options
JAM Recruitment Ltd
and detailed experience of technologies including but not limited to firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, Linux, TCP/IP, Networks, Cloud, CDN's and Vulnerability Management. - Analytical background, comfortable analysing and interpreting large and complex data sets and articulating the story behind any observations along with providing conclusions and recommendations. - Detailed knowledge of the More ❯
Preston, Lancashire, North West, United Kingdom Hybrid / WFH Options
JAM Recruitment Ltd
and detailed experience of technologies including but not limited to firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, Linux, TCP/IP, Networks, Cloud, CDN's and Vulnerability Management. - Analytical background, comfortable analysing and interpreting large and complex data sets and articulating the story behind any observations along with providing conclusions and recommendations. - Detailed knowledge of the More ❯
Southampton, Hampshire, South East, United Kingdom Hybrid / WFH Options
Sterling Bridge Limited
technology leadership within the firm. Required Skills: Proven track record in senior security roles (e.g. Head of Security, CISO, or equivalent) Strong technical foundation in cloud security, identity & access management, network security, encryption, threat modelling Hands-on knowledge securing hybrid and cloud infrastructure (AWS/Azure/GCP) Experience building and managing security teams, setting processes (incident response, SOC … vulnerabilitymanagement) Familiarity with compliance/legal security requirements (e.g. GDPR, Legal Privilege, regulatory/security audits) Strong stakeholder management able to communicate with partners, executives, and legal professionals Exclusive Benefits: £80,000 £100,000 base pay + performance bonus & equity Hybrid working model (some days in Southampton office) Significant influence over security direction and technology choices More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
Job overview: This is an opportunity to lead global Security Operations focused on safeguarding Arm's digital environment through exemplary threat detection, incident response, and vulnerabilitymanagement capabilities. This senior role, reporting directly into the CISO is accountable for driving the strategic direction of Arm's Detect & Response function, delivering outstanding performance and ensuring we are resilient against … an evolving threat landscape! In addition to operations, you will lead cyber crisis management, C-Suite level stress testing, team development, and top-level cybersecurity thought leadership. Responsibilities: Own and deliver the strategic roadmap for cyber incident and vulnerability detection & response in line with Arm's threat profile and business objectives. You will guide and develop a high … of enterprise security domains and how they can be used as a force multiplier for a technology business strategy, with the ability to influence at all levels. Extensive people management experience, fostering a culture focused on mentoring, wellbeing and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant security-related subject. Certifications such More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Northrop Grumman
note that this is not a remote work opportunity. Responsibilities will include but not be limited to the following: Perform manual and automated security assessments, with a focus on vulnerability remediating and system hardening, using tools such as Tenable Security Center. Maintain accurate records of open and resolved security vulnerabilities and findings using dashboards and analytic tools. Coordinate vulnerability … Administrators using ticketing tools such as Jira to track findings until they are resolved. Verify System Administrators have successfully remediated security findings. Recommend and implement solutions to streamline the vulnerabilitymanagement process. Produce and maintain documentation for required configurations which do not fully comply with all security requirements, obtaining approval from accrediting authorities when needed. Monitor previously mitigated … obtain and maintain access to Special Programs as a condition of continued employment. 1 year of experience using Tenable Security Center, ACAS, or a similar security scanning tool for vulnerability scanning. 1 year of experience supporting operating system and application hardening using STIGs, CIS Benchmarks, or similar security configuration requirements. Ability to describe vulnerability and system hardening concepts More ❯
ensure the products they deliver are secure by design. You'll work closely with developers, architects, and business stakeholders to create an environment where secure coding and proactive risk management come naturally. What you'll be doing You'll play a leading role in driving a security-first culture across agile product teams, defining and delivering a clear application … Working hand-in-hand with developers, you'll weave security seamlessly into the software development lifecycle - from designing controls and integrating testing into CI/CD pipelines to supporting vulnerabilitymanagement and remediation. Acting as the go-to expert for secure design, threat modelling, and compliance, you'll make sure teams have the knowledge, tools, and confidence to More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
ensure the products they deliver are secure by design. You'll work closely with developers, architects, and business stakeholders to create an environment where secure coding and proactive risk management come naturally. What you'll be doing You'll play a leading role in driving a security-first culture across agile product teams, defining and delivering a clear application … Working hand-in-hand with developers, you'll weave security seamlessly into the software development lifecycle - from designing controls and integrating testing into CI/CD pipelines to supporting vulnerabilitymanagement and remediation. Acting as the go-to expert for secure design, threat modelling, and compliance, you'll make sure teams have the knowledge, tools, and confidence to More ❯
Herndon, Virginia, United States Hybrid / WFH Options
Lockheed Martin
day information system security operations including hardware and software implementations. - Carry out technical security administration of IS in accordance with internal LM and customer cybersecurity requirements, primarily the Risk Management Framework (RMF). - Upkeep, monitor, analyze, and respond to network and security events. - Document compliance actions within the approved automated compliance tracking system or develop a plan of actions … and/or DAAPAM. - Experience with industry standard Information Assurance tools such as STIG Viewer, Nessus, and Splunk. - Experience working with eMASS. - Experience performing; security system hardening, analysis, vulnerabilitymanagement, DISA STIGs. - Prior Information System Security Engineer (ISSE) or System Administration experience. - Bachelor's degree from an accredited college in a related discipline, or equivalent experience/combined More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Anson McCade
experience in IT security , ideally within a SOC/NOC environment. Strong knowledge and hands-on expertise with Splunk (other SIEM exposure beneficial). Solid understanding of DFIR principles, vulnerabilitymanagement, and ethical hacking. Strong grasp of network traffic flows, malware analysis, and reverse engineering. Excellent written and verbal communication skills for client interaction and reporting. Ability to More ❯
Defining and implementing the software security strategy in line with business goals Collaborating with developers to automate security testing and embed security requirements into the SDLC Supporting penetration testing, vulnerabilitymanagement, and remediation efforts Acting as a software security SME, advising teams on secure design, risk, and compliance Maintaining security documentation, training materials, and processes Reporting on compliance More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
Defining and implementing the software security strategy in line with business goals Collaborating with developers to automate security testing and embed security requirements into the SDLC Supporting penetration testing, vulnerabilitymanagement, and remediation efforts Acting as a software security SME, advising teams on secure design, risk, and compliance Maintaining security documentation, training materials, and processes Reporting on compliance More ❯
welwyn garden city, east anglia, united kingdom Hybrid / WFH Options
Tesco Technology
assessments of our security posture • Help triage and validate findings from our bug bounty program • Triage and validate Tesco's risk posture for newly released CVEs as part of vulnerabilitymanagement We support our colleagues on their career development and provide time and opportunities throughout the year to carry out research, as well as training supported by us More ❯
as the central point for all cybersecurity matters and incident response. Maintain the cybersecurity risk register and lead Cyber Essentials certification. Oversee Microsoft 365 and Google Workspace security, including vulnerabilitymanagement, patching, MFA, and email security. Coordinate security audits, penetration tests, and third-party application reviews. Manage and monitor MSP performance, ensuring consistent security standards. Promote cybersecurity awareness More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
as the central point for all cybersecurity matters and incident response. Maintain the cybersecurity risk register and lead Cyber Essentials certification. Oversee Microsoft 365 and Google Workspace security, including vulnerabilitymanagement, patching, MFA, and email security. Coordinate security audits, penetration tests, and third-party application reviews. Manage and monitor MSP performance, ensuring consistent security standards. Promote cybersecurity awareness More ❯
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, VulnerabilityManagement, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, VulnerabilityManagement, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Holland & Barrett International Limited
experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python, JavaScript … GoLang, Terraform, CloudFormation (AWS), and AWS CDK. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Desired: Ability to work independently, take initiative, and maintain a keen attention to detail, ensuring high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. Why More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
SOC 2 Type 2 maintenance (already accredited)—expert level not required. Oversee SIEM operations with the tech team: ensure log ingestion/coverage , daily monitoring, and follow-up. Guide vulnerabilitymanagement, alert triage (Alert Logic), and external pen-test cycles. Keep evidence flows tight: client questionnaires, audit responses, security awareness, and user access reviews. About you Strong GRC … grounding plus solid technical understanding (AWS-heavy environment). Comfortable being hands-on where needed; people management nice-to-have, not essential. ISO 27001 (implementation/assurance) experience; SOC 2 exposure helpful. SIEM familiarity and the ability to work with engineers on coverage, tuning, and use-cases . Stakeholder-savvy; calm under pressure; excellent written/verbal comms. Benefits More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Picture More
ISO22301, NIST frameworks, and control evidence. Experience with hyperconverged and hybrid cloud infrastructure (Nutanix, VMware, Commvault, Azure). Skilled in scripting (PowerShell or Python) and infrastructure tooling. Knowledge of vulnerabilitymanagement, monitoring, and automation platforms. Relevant certifications such as SC-200, CEH, CBCP/CBCI desirable. Why Join: Join a global, high-performing technology team. Take ownership of More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
DXP Talent Ltd
technical updates and support. The role is hybrid with 3 days a week on site. Key experience/skills: - Linux SME Skills (build and support) - RedHat - VMware - Patching/Vulnerabilitymanagement - Automation (Ansible, Terraform) - Cloud experience (Azure, AWS, GCP) Bonus Experience: - Kubernetes - Windows Server - Openshift - Network knowledge (Firewalls, switches) If you feel you could be a great fit More ❯