Apex Systems is currently hiring for CyberSecurity Engineer with a US Airforce Base based in McLean, VA. Project Details/Mission Supported: • The resource will be responsible for supporting and administering of the following solutions: SCCM, McAfee EPO, McAfee Move, Tenable Nessus (ACAS), and LogRhythm for the Airforce Base. Qualified candidates will have the following experience and skills: • Security+ … CE ( IAT II Certification ) • 4+ Years of HBSS/ESS/ACAS/Endpoint Security/DLP or Similar • Able to ensure compliance with KR and DOD cybersecurity policies and procedures. • Able to review IaaS related software release notes and provide feedback for approval to load from a security-related perspective. Able to draft and brief reports on cyberMore ❯
we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are seeking an CyberSecurity Specialist 4 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of a team that designs, engineers More ❯
tech running smoothly-from desktops to servers-and elevating our systems to meet evolving business and security needs. You'll handle everything from system upgrades and workstation setup to cybersecurity and end-user training. You'll act as a subject-matter expert on core platforms like Windows, iOS, Microsoft 365, SharePoint, Google Workspace, and Adobe suite, ensuring both functionality and … improvements and business-critical IT tasks to boost productivity. Research, assess, and implement emerging hardware, software, and technologies. Act as SME for Windows, iOS, Microsoft, Adobe, Google Workspace. Manage cybersecurity tools, procedures, compliance, and SharePoint/Office 365 security. Install, configure, and support workstations, printers, phones, and mobile devices. Administer time & attendance and various business systems. Support Infor ERP and … asset database management. Participate in IT projects-documentation, training, testing, and rollout. Monitor and execute software/app upgrades to ensure compliance. Aid cybersecurity awareness efforts and sustain Cyber Essentials+ accreditations. Contribute to policy development by interpreting company IT guidelines. Skills & Qualifications Minimum five years' IT experience with hardware, software, and systems. Proven ability to liaise with third-party vendors More ❯
Policies & Procedures Act as an Escalation Point & Coordinate with other Teams when required Key Skills & Experience Required for Vulnerability Management Analyst role will include: Strong Understanding of Information/CyberSecurity Principles & Technologies. Experience of Security Related Technical Investigations Hands-On Technical Experience of Conducting Vulnerability Scanning & Evaluating Results Commercial Awareness & (Ideally) Experience of PCI DSS (Current Version) Experience with … Attention to Detail Strong Team Player Searches: Vulnerability Management Analyst/VM Analyst/Information Security Analyst/Information Security Engineer/Security Operations Analyst/SOC Engineer/CyberSecurity Engineer/SecOps Engineer/SecOps Analyst/SOC Analyst/Systems Administrator At SECURE, we value Attitude & Aptitude over Certifications. If you possess the drive and relevant experience … to deliver tangible results aligned with our clients needs, reach out. We embrace DE & I and welcome applications from underrepresented groups, minorities, women in cybersecurity, neurodiverse individuals, LGBTQ+ community members, veterans, and those from diverse socioeconomic backgrounds. Curious to learn more about the Company, Culture & Purpose? Apply Today to discover where your journey with us can lead. More ❯
Policies & Procedures Act as an Escalation Point & Coordinate with other Teams when required Key Skills & Experience Required for Vulnerability Management Analyst role will include: Strong Understanding of Information/CyberSecurity Principles & Technologies. Experience of Security Related Technical Investigations Hands-On Technical Experience of Conducting Vulnerability Scanning & Evaluating Results Commercial Awareness & (Ideally) Experience of PCI DSS (Current Version) Experience with … Attention to Detail Strong Team Player Searches: Vulnerability Management Analyst/VM Analyst/Information Security Analyst/Information Security Engineer/Security Operations Analyst/SOC Engineer/CyberSecurity Engineer/SecOps Engineer/SecOps Analyst/SOC Analyst/Systems Administrator At SECURE, we value Attitude & Aptitude over Certifications. If you possess the drive and relevant experience … to deliver tangible results aligned with our clients needs, reach out. We embrace DE & I and welcome applications from underrepresented groups, minorities, women in cybersecurity, neurodiverse individuals, LGBTQ+ community members, veterans, and those from diverse socioeconomic backgrounds. Curious to learn more about the Company, Culture & Purpose? Apply Today to discover where your journey with us can lead. More ❯
Centre, VoIP systems, and warehouse/dispatch operations. Maintained and troubleshooted printers, Wi-Fi, and barcode scanners. Installed, configured, and maintained software and hardware. Applied security patches and monitored cybersecurity systems. Supported Microsoft 365 and maintained IT asset inventory. Documented technical issues and ensured compliance with IT policies. Skills and Experience required to be considered for this IT Support Specialist … operating systems. Familiarity with Active Directory, and basic networking (TCP/IP, DNS, DHCP). Excellent customer service. Excellent troubleshooting, problem-solving, and communication skills. Understanding and awareness of CyberSecurity best practices. Ability to work independently and manage multiple tasks simultaneously If you feel like you meet the above criteria & would like to be considered for this IT Support More ❯
and cross-functionally with multiple teams and stakeholders. You'll be using your technical skills to problem solve with our clients, as well as working on internal projects Tackling cybersecurity hurdles for organisations, particularly in Operational Technology (OT) Hybrid working with the team on client site or in our office a minimum of two days per week. However, the actual … your background might be better suited to. Security management of industrial control and operational technology systems and applications such as: Process control SCADA Distributed control PLCs and RTUs Industrial cybersecurity and data communications Electricity transmission and distribution network control. IoT and Industrial IoT Industrial cybersecurity risk management, architecture and security monitoring Key industries such as: Electricity generation, transmission More ❯
Demonstrate the ability to drive results, provide solutions, and prioritize multiple projects independently. Meet Grouper We are our customers' trusted partner in the exciting world of safeguarding data, strengthening cybersecurity, and strategic consulting. We lead the way in ensuring data integrity, securing information, and navigating regulatory compliance with confidence. With a blend of technical expertise and clever thinking, we redefine More ❯
Southampton, Hampshire, South East, United Kingdom
Sterling Bridge Limited
quality of its technical team. In this role, youll be pushed to develop your skills towards 3rd Line level within your first year. Youll receive structured training on Azure, CyberSecurity, M365, and more all fully funded. The team is young, driven, and highly technical, with regular social events and a culture that rewards achievement. They say youre the product … environment you want to be in if youre looking to level up fast. Exclusive Benefits: Highly competitive annual salary (£30,000 £35,000) Clear progression path into Azure/CyberSecurity Paid training & certifications (Azure, CyberSecurity & more) 30 days annual leave (+8 bank holidays) 10% pension contribution Social, collaborative team environment Key Requirements: MSP experience in a 2nd Line More ❯
SecOps specialist with experience of both SecOps Analysis and Engineering to join a growing yet established firm at a crucial point as they completely build out their Information and CyberSecurity capability. Whilst they have the fundamentals in place, this is a relatively greenfield SOC buildout, where you will work alongside the SOC Manager to shape their SOC monitoring, detection … Mobile Payments FinTech firms build out their cyber defence capability and leave a lasting impact on one of the most reputable organisations whilst working alongside a team of genuine CyberSecurity SMEs, click the to apply or get in touch directly – j.dale@lawrenceharvey.com More ❯
detects external-facing security gaps and misconfigurations, ensuring timely escalation to relevant resolver teams for remediation Your skills and experiences: A extensive technical background with a detailed knowledge of cybersecurity, computer networks and operating systems Broad and detailed experience of technologies including but not limited to DNS, Certificate Transparency, firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server More ❯
greenfield environment, building compliant AI pipelines using Gemini (GCP), Azure OpenAI or Self Hosting embedding security and privacy controls from experimentation to production, in alignment with the bank's cybersecurity and regulatory standards. Accountabilities & Responsibilities Architect and implement secure AI services from lab to production, ensuring scalability and compliance Develop robust APIs for LLMs, RAG pipelines, agentic workflows and document … intelligence systems Embed cybersecurity and data privacy controls across all AI workflows (e.g., encryption, anonymisation, access logging) Collaborate with the CISO function on threat modeling, security reviews, and AI-specific control design. Integrate with enterprise IAM systems, enforcing RBAC, least privilege Conduct vulnerability scans, pen-test remediation, and support internal and regulatory audits (FCA, PRA) Required Knowledge & Experience Delivered greenfield … Context Protocol (MCP) to manage secure, auditable context injection across agentic systems Experience building RAG pipelines with strict data governance and contextual integrity Familiarity with EU AI Act, FCA cybersecurity principles, and oversight of critical systems Worked directly with cybersecurity and compliance teams in regulated deployments Implemented or maintained controls under ISO 27001, NIST, or SOC2 frameworks Technical Skills & Technologies More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Synoptix Limited
Designing requirements and architecture across a large, complex naval programme, managing the complexity inherent in programmes. - Developing training and development packages for the NHS around applied systems thinking. - Providing cybersecurity threat modelling and secure-by-design expertise to a large cancer care AI startup. Day to day tasking can include: - Support and work on a number of our projects helping More ❯
greenfield environment, building compliant AI pipelines using Gemini (GCP), Azure OpenAI or Self Hosting embedding security and privacy controls from experimentation to production, in alignment with the bank's cybersecurity and regulatory standards. Accountabilities & Responsibilities Architect and implement secure AI services from lab to production, ensuring scalability and compliance Develop robust APIs for LLMs, RAG pipelines, agentic workflows and document … intelligence systems Embed cybersecurity and data privacy controls across all AI workflows (e.g., encryption, anonymisation, access logging) Collaborate with the CISO function on threat modeling, security reviews, and AI-specific control design. Integrate with enterprise IAM systems, enforcing RBAC, least privilege Conduct vulnerability scans, pen-test remediation, and support internal and regulatory audits (FCA, PRA) Required Knowledge & Experience Delivered greenfield … Context Protocol (MCP) to manage secure, auditable context injection across agentic systems Experience building RAG pipelines with strict data governance and contextual integrity Familiarity with EU AI Act, FCA cybersecurity principles, and oversight of critical systems Worked directly with cybersecurity and compliance teams in regulated deployments Implemented or maintained controls under ISO 27001, NIST, or SOC2 frameworks Technical Skills & Technologies More ❯
Aylesbury, Buckinghamshire, United Kingdom Hybrid / WFH Options
Skyhigh Security
experience, you directly support and guide our largest customers throughout their product adoption and onboarding journey. You are a trusted advisor, assisting customers in maximizing the value of our cybersecurity solutions, ensuring they can achieve their security goals. Working across our teams in Sales, Customer Value, Support, and Product, your role is pivotal in ensuring a seamless onboarding experience, while … experience, you directly support and guide our largest customers throughout their product adoption and onboarding journey. You are a trusted advisor, assisting customers in maximizing the value of our cybersecurity solutions, ensuring they can achieve their security goals. Working across our teams in Sales, Customer Value, Support, and Product, your role is pivotal in ensuring a seamless onboarding experience, while … growth with the customer. Conduct regular business reviews to track progress, review adoption and utilisation status, and identify expansion opportunities across all dimensions of the account. Act as a cybersecurity advisor, helping customers optimize their security posture with our solutions. Coordinate training and enablement sessions and provide best practices to accelerate product adoption. Work closely with renewa l teams to More ❯
value through the innovative use of technology at a rapid pace. We roll up our sleeves to transform business, revolutionize approaches, satisfy customers, and change the game through Architecture, Cybersecurity, Digital Transformation, Enterprise Application and Risk functions. We balance vision with a pragmatic path to change transforming strategies into leading-edge tech platforms, at scale. What You'll Do At … Mobile) ERP (SAP) &Manufacturing Platforms Banking & Insurance Platforms People, HR, Collaboration Platforms Applied Intelligence, Machine Learning, RPA, Chatbots, Blockchain, IOT DevOps & Bimodal IT Data Analytics, Big Data, Data Platforms CyberSecurity Strong business acumen; can frame complex problems in appropriate business contexts A Master University degree with above average academic performance in a STEM related field or business management Fluent More ❯
systems, software and security needed to take the lead in a low carbon world. They provide expertise, advice and day-to-day support in emerging technologies, data and analytics, cybersecurity and more. Flexible benefits to fit your life Enjoy discounts on private healthcare and gym memberships. Wellbeing benefits like a free online GP and 24/7 counselling service. More ❯
systems, software and security needed to take the lead in a low carbon world. They provide expertise, advice and day-to-day support in emerging technologies, data and analytics, cybersecurity and more. Flexible benefits to fit your life Enjoy discounts on private healthcare and gym memberships. Wellbeing benefits like a free online GP and 24/7 counselling service. More ❯
systems, software and security needed to take the lead in a low carbon world. They provide expertise, advice and day-to-day support in emerging technologies, data and analytics, cybersecurity and more. Flexible benefits to fit your life Enjoy discounts on private healthcare and gym memberships. Wellbeing benefits like a free online GP and 24/7 counselling service. More ❯
systems, software and security needed to take the lead in a low carbon world. They provide expertise, advice and day-to-day support in emerging technologies, data and analytics, cybersecurity and more. Flexible benefits to fit your life Enjoy discounts on private healthcare and gym memberships. Wellbeing benefits like a free online GP and 24/7 counselling service. More ❯
systems, software and security needed to take the lead in a low carbon world. They provide expertise, advice and day-to-day support in emerging technologies, data and analytics, cybersecurity and more. Flexible benefits to fit your life Enjoy discounts on private healthcare and gym memberships. Wellbeing benefits like a free online GP and 24/7 counselling service. More ❯
and delivered throughout the year. Help embed security best practices throughout the business and early in projects. Skills, Experience and Knowledge: Proven experience of IT GRC and Information/Cybersecurity Proven experience of risk and control management Proven experience of standards including ISO27001, PCI, GDPR/DPA & NIST Communication of complex ideas clearly in a non-technical way Strong More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Turning Point
meetings. Main Responsibilities : Designing and managing a converged IT infrastructure that integrates compute, networking, storage, and security components, aligning it with the organisation's IT strategy and the evolving cybersecurity landscape. This includes the integration of cloud services from Microsoft Azure, AWS, and Oracle Cloud Services. Collaborating with other IMT staff, stakholders and cloud service providers to ensure the seamless … integration of infrastructure projects, thereby enhancing operational resilience and cybersecurity defenses. Overseeing the Enterprise Architecture strategy, managing its performance, cost-efficiency, and security, and handling relationships with external vendors to ensure the delivery of high-quality services. This includes managing cloud-based Enterprise Architecture strategies. Providing insightful recommendations and leading the implementation of approved infrastructure initiatives while staying abreast of … emerging technologies, cybersecurity threats, and industry developments. This includes leveraging cloud technologies. Please see the attached JD for further information. Ideal Candidate You will need expertise in designing, deploying, and managing converged IT infrastructures, encompassing compute, networking, storage, and security. This includes expertise in cloud platforms such as Microsoft Azure, AWS, and Oracle Cloud Services. We are looking for candidates More ❯
they are scalable and compliant with industry standards. API Development: Create robust APIs for large language models (LLMs), retrieval-augmented generation (RAG) pipelines, agentic workflows, and document intelligence systems. Cybersecurity & Privacy: Integrate cybersecurity and data privacy controls across all AI workflows, including encryption, anonymisation, and access logging. Collaborate with CISO: Work closely with the Chief Information Security Officer (CISO) function … context injection across agentic systems. Demonstrated ability to build RAG pipelines with strict data governance and contextual integrity. Familiarity with regulatory frameworks such as the EU AI Act, FCA cybersecurity principles, and oversight of critical systems. Previous collaboration with cybersecurity and compliance teams in regulated environments. Knowledge of controls under ISO 27001, NIST, or SOC2 frameworks. Candidates will need to More ❯