Bath, Somerset, United Kingdom Hybrid / WFH Options
Bmt Defence Services LTD
Job Title: Principal CyberSecurity Consultant Contract Type: Permenent Flexibility: This role is available part-time, job-share or full time . This is because we want the best people for our roles, and we recognise that sometimes those people aren't available full-time. Location: In terms of location , we have offices in Bath, Bristol & London, and we are … policies Committed to an inclusive culture Wellbeing Fund - an annual fund for personal hobbies or interests Holiday Trading Professional Subscriptions About The Role We are seeking an experienced Principal CyberSecurity Consultant to join our team and engage in a diverse range of client projects within the defence, national security, environmental, and research sectors. This includes the provision of strategic … highly skilled professionals dedicated to safeguarding technologies and systems, many of which are critical to UK defence and national security. To deliver this outcome, you must be passionate about cybersecurity and apply your deep understanding and experience of HMG, NCSC, and international cyber standards. The role will require excellent stakeholder management and communication skills to build the trust and More ❯
organisationally as part of our Group General Council Office. The Technical Assurance Manger leads our Technical Assurance team. easyJet is overseen by 3 Aviation Regulators, each with their own cybersecurity control expectations, along with legal compliance requirements and a changing cyber threat landscape. The Technical Assurance team is responsible for overseeing easyJet’s strong cybersecurity posture. We help … Safety Assurance, the role Technical Assurance Manager is key within the Digital Safety Assurance department. This role acts as the 2nd line of defence tasked with providing oversight of CyberSecurity Controls in line with Digital Safety policy, security standards and our legal and regulatory compliance requirements. Along with capturing exposures and exceptions as part of risk identification. JOB ACCOUNTABILITIES … where deficiencies are found. Collaborating with other teams and departments to foster a culture of security and awareness within the organisation. Delivering training sessions and workshops to staff on cybersecurity and protection of data-in-use related topics to ensure understanding and compliance. Preparing reports on Technical Assurance activities performed and presenting them to management and stakeholders, highlighting any More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
Job title OT CyberSecurity Analyst Ref 40929 Division Digital Transformation Location Hybrid - Clearwater Court - RG1 8DB Contract type Permanent Full/Part-time Full-time Salary Up to £65,000 per annum depending on skills and experience Job grade B Closing date 16/05/2025 We are seeking a highly skilled and experienced OT Senior CyberSecurity … are essential as you will work closely with cross-functional teams to mitigate risks and protect Thames Water's essential services. What you'll do as an OT Senior CyberSecurity Analyst Contextualise OT Specific Threats: • Understand the Operational Technology (OT) estate, specific OT threats, and controls in place to mitigate risks. • Use tools like Claroty to analyse network traffic … risk reduction. • Provide tangible metrics to demonstrate risk reduction and reduced technical debt. Incident Readiness & Response: • Lead the incident triage and response process, ensuring effective management and remediation of cybersecurity incidents. • Improve incident management by reducing business impacts and the time between incident identification and closure. • Ensure the business is regularly educated on incident management procedures and that all More ❯
Description Navy Cybersecurity Engineer At B&A, we foster and embrace a distinct set of values that we live by and instill in all aspects of our organization: dedication, commitment, partnership, trust, and recognition. We have incorporated these values into successful delivery for our customers since 1988. B&A believes in ensuring its employees feel deeply connected to B&A … with each other, as one team working towards a common vision. We'd love for you to join our team! Job Summary B&A is looking for a Navy Cybersecurity Engineer to join a contract with a federal government client in support of an important mission. We are seeking a highly skilled and motivated Cybersecurity Engineer III to join our … dynamic team supporting a critical U.S. Department of Defense (DoD) programs. This leadership position will oversee the cybersecurity strategy and operations to protect sensitive systems and information within a complex, high-stakes environment. The ideal candidate will have a strong background in cybersecurity, a proven ability to work independently, and possess a Security+ certification (or higher). You will play More ❯
CyberSecurity Engineer – Join a Cutting-Edge Security Team! Salary: Up to £75,000 (DOE) + Fantastic Employee Benefits Office Location: Portsmouth (Expected several days per week in office w/remaining remote) Employment Type: Permanent Is This For You? Are you a CyberSecurity Engineer with a passion for safeguarding digital assets? Do you thrive in a dynamic, fast … ISO 27001, NIST, GDPR) Perform threat detection, incident response & forensic analysis Utilize Microsoft Sentinel, Cisco Splunk, Palo Alto QRadar, KQL & more What We’re Looking For: 4+ years in CyberSecurity within an MSP or similar environment Hands-on expertise in SIEM, EDR, firewalls, VPNs, cloud security (AWS, Azure, GCP) Experience with Palo Alto XSOAR or similar platforms Familiarity with … security compliance & best practices Certifications (CISSP, CEH, OSCP, CISM, Security+) are a big plus! Ready to take your CyberSecurity career to the next level? Apply today! Computappoint Limited operates as an Employment Business and/or Employment Agency in relation to this vacancy. More ❯
Information Systems Management, Engineering) is required for this position. 4 years of relevant work experience may be considered in lieu of the degree requirement. 8 years of experience in cybersecurity or a related field, with prior experience in a leadership role 2 years of cybersecurity experience in the Department of Defense (DoD) or Intelligence community. Strong knowledge of cybersecurity principles More ❯
Program Implementation Guide (JSIG). • Implement media control procedures and continuously monitor for compliance. • Verify data security access controls and assign privileges based on need-to-know. • Investigate suspected cybersecurity incidents in accordance with Departmental directives and applicable Risk Management Implementation Plans (RMIPs). • Apply and maintain required confidentiality controls and processes. • Verify authenticator generation and verification requirements and processes. … work experience may be considered in lieu of the degree requirement. • Security certification or equivalent (DoD 8570) if no current IAM Level II certification. • 8 years of experience in cybersecurity or a related field. • 2 years of experience displaying strong knowledge of operating systems (e.g., Windows, Linux). • 2 years of cybersecurity experience in the Department of Defense (DoD) or … or Associate), GCED, GCIH), or ability to obtain certification within six months of hiring. • Experience with the Special Access Programs (SAPs) and Intelligence Community (IC).• Strong knowledge of cybersecurity principles, tools, and techniques. • Knowledge and/or understanding of Joint Special Access Program Implementation Guide (JSIG) • Strong familiarity with the Risk Management Framework (RMF), Federal Information Security Management Act More ❯
Work for an award-winning provider of Security Services, specialising in CyberSecurity Services such as Vulnerability Management, Information Security, Penetration Testing, and Managed Security Services. We boast a fully managed Security Operations Centre (SOC) staffed by dedicated professionals. We're seeking a skilled CyberSecurity Engineer to join our clients eam. The ideal candidate will have expertise in Azure … with cross-functional teams to identify security vulnerabilities and develop appropriate solutions. Conduct regular security assessments and penetration testing to identify and mitigate potential risks. Stay updated on emerging cybersecurity threats and best practices, implementing necessary adjustments to security protocols. Provide guidance and support to junior members of the security team. Requirements: Bachelor's degree in Computer Science, Information … Technology, or related field. Proven experience working as a CyberSecurity Engineer or similar role. In-depth knowledge of Azure Sentinel SIEM, Microsoft Defender, and KQL scripting. One of the following certifications: AZ-500 (Microsoft Azure Security Technologies) or SC-200 (Microsoft Security Operations Analyst). Strong analytical and problem-solving skills. Excellent communication and interpersonal abilities. Ability to work More ❯
CyberSecurity Specialist ** Location: London/Hybrid (2 days in office) Rate: A highly competitive salary is available for suitable candidates Role Profile As a CyberSecurity Specialist, you will be the go-to Subject Matter Expert (SME) for various projects, offering your insights and recommendations to enhance our security posture. With a strong technical background, you will work independently … guidance on best practises for cloud security architecture and design. Assist in the development and implementation of cloud security policies and procedures. Skills & Experience: Strong understanding of information and cybersecurity principles and practises. Experience with security assessment and risk management methodologies. Proficiency in cloud security, particularly with Azure security tools and services. Familiarity with security standards and frameworks (e.g. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Pontoon
CyberSecurity Specialist ** Location: London/Hybrid (2 days in office) Rate: A highly competitive salary is available for suitable candidates Role Profile As a CyberSecurity Specialist, you will be the go-to Subject Matter Expert (SME) for various projects, offering your insights and recommendations to enhance our security posture. With a strong technical background, you will work independently … guidance on best practises for cloud security architecture and design. Assist in the development and implementation of cloud security policies and procedures. Skills & Experience: Strong understanding of information and cybersecurity principles and practises. Experience with security assessment and risk management methodologies. Proficiency in cloud security, particularly with Azure security tools and services. Familiarity with security standards and frameworks (e.g. More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
CyberSecurity Analyst When registering to this job board you will be redirected to the online application form. Please ensure that this is completed in full in order that your application can be reviewed. Come and join the Littlefish team! Role: CyberSecurity Analyst Work location: Nottingham or Sheffield (Hybrid) Remote but connected Salary banding: £26,500 Must be eligible … and you are excited at the thought of working with creative, passionate, energetic, friendly people we would love to hear from you. Role Overview: Littlefish is seeking a dedicated CyberSecurity Analyst to join our expanding Cyber division. The successful candidate will be responsible for monitoring customer infrastructure, conducting thorough investigations of security alerts, and implementing measures to contain identified … in KQL. Familiarity with the Microsoft Defender Suite. Education/Qualifications: CompTIA Security+ or equivalent certification. SC-200 Microsoft Security Operations Analyst certification. Experience: Demonstrated experience in responding to cybersecurity threats. Proficiency in the use of antivirus technologies. Experience with Endpoint Detection & Response solutions. Familiarity with SIEM platforms. Skills: Awareness of vulnerabilities and security standards. Knowledge of HMG SecurityMore ❯
Join our dynamic Digital, Data and Technology (DDaT) team at NHSBSA as a CyberSecurity Operations Team Lead. You'll lead a team of specialists, manage security operations, and support various projects and initiatives. Your role involves ensuring compliance with security standards, managing incidents, and collaborating with internal and external stakeholders. Key Responsibilities : Lead and manage the CyberSecurity Operations … team leadership experience.Strong knowledge of security technologies (firewalls, IDS/IPS, SIEM).Relevant qualifications (CISSP, CISM, etc.). Apply now to make a significant impact on NHS BSA's cybersecurity strategy! What do we offer ?o 27 days leave (increasing with length of service) plus 8 bank holidayso Flexible working (we are happy to discuss options such as compressed … resource for advice. Efficiently manage the workload of personnel, ensuring timely completion of tasks and continuous improvement. Ensure continued compliance with NCSC, DHSC Cyber Assessment Framework, and HM Government Cybersecurity strategy. Develop, maintain, and promote security procedures and standards in line with NHSBSA requirements. Implement, monitor, and report on agreed service levels, KPIs, and standards within security operations. Oversee More ❯
Job summary Join our dynamic Digital, Data and Technology (DDaT) team at NHSBSA as a CyberSecurity Operations Team Lead. You'll lead a team of specialists, manage security operations, and support various projects and initiatives. Your role involves ensuring compliance with security standards, managing incidents, and collaborating with internal and external stakeholders. Key Responsibilities: Lead and manage the Cyber … team leadership experience.Strong knowledge of security technologies (firewalls, IDS/IPS, SIEM).Relevant qualifications (CISSP, CISM, etc.). Apply now to make a significant impact on NHS BSA's cybersecurity strategy! What do we offer?o 27 days leave (increasing with length of service) plus 8 bank holidayso Flexible working (we are happy to discuss options such as compressed … resource for advice. Efficiently manage the workload of personnel, ensuring timely completion of tasks and continuous improvement. Ensure continued compliance with NCSC, DHSC Cyber Assessment Framework, and HM Government Cybersecurity strategy. Develop, maintain, and promote security procedures and standards in line with NHSBSA requirements. Implement, monitor, and report on agreed service levels, KPIs, and standards within security operations. Oversee More ❯
Position Overview: We are seeking an Information Systems Security Officer (ISSO) to support cybersecurity and information assurance activities at Eglin AFB. The ideal candidate will help ensure the confidentiality, integrity, and availability of mission-critical systems by implementing and managing security controls in compliance with Department of Defense (DoD) cybersecurity policies and standards. Key Responsibilities: Develop, implement, and maintain security … security awareness initiatives. Required Qualifications: Active Secret clearance (or higher). Current CompTIA Security+ certification (IAT Level II). 2-5 years of hands-on experience in information security, cybersecurity compliance, or system security roles. Familiarity with DoD cybersecurity policies, RMF processes, STIGs, and NIST frameworks. Experience developing or maintaining security documentation for system accreditation. Strong analytical and problem-solving … skills. Excellent communication and documentation abilities. Preferred Qualifications: Bachelor's degree in Cybersecurity, Information Technology, or a related field. Experience supporting DoD programs or federal government environments. Additional certifications (e.g., CAP, CISSP, CISM, or CND). Why Join OSAAVA Services: Support critical national security projects at Eglin AFB. Collaborate with experienced cybersecurity and engineering professionals. Grow your career in a More ❯
of the second line of defense, you will oversee risk management processes and provide independent validation and assurance to ensure that the first line is adhering to IT and cybersecurity standards. This role is pivotal in ensuring the business's resilience against evolving cyber threats and regulatory requirements and is specifically focused on providing long-term assignments on maximum … or 2 clients, offering deep engagement with the client and a meaningful impact on IT and cybersecurity risk management. Roles & Responsibilities: Monitor and assess IT and cybersecurity risks across the organization, focusing on second-line oversight of the first line's risk management practices. Conduct independent risk assessments and challenge the first line's processes and control effectiveness across applications … e.g., ISO 27001, NIST, SOC). Support the implementation of the various aspects of DORA with the objective to achieve compliance. Conduct audits and provide oversight of IT and cybersecurity practices within the first line of defense, especially in third-party risk management. Produce independent risk reports for senior management and governance committees, synthesizing security risks and providing recommendations for More ❯
Central London, London, England, United Kingdom Hybrid / WFH Options
Bupa UK
make a better world. As Head of Cyber Threat Exposure, you’ll play a crucial role in vulnerability management and offensive activities across Bupa. You’ll provide threat-led cybersecurity leadership, subject matter expertise, oversight, E2E process design and implementation, and coordination of vulnerability management and offensive security servicesacross all technology in Bupa. How you’ll help us make … full lifecycle of reported vulnerabilities through to closure. Collaborate with their counterparts in other Bupa Markets to share knowledge, ideas, innovation, and areas for improvement. Stay abreast of emerging cybersecurity industry thought leadership, external industry colleagues, threats, vulnerabilities, and attack techniques. What you’ll bring Solid experience in cybersecurity, with extensive experience in threat management, vulnerability management, offensive security practices … e.g., Nessus, Metasploit, Burp Suite, Nmap, Claire, and OpenSCAP). Extensive experience with Red Teaming, Purple Teaming and Attack Automation. Familiarity with industry regulations and compliance standards related to cybersecurity, such as NIST CSF, SOC2, PCI DSS, and ISO 27001. A relevant professional qualification in Cyber and Information Security (e.g., OCSP, CISM, CISSP, CEH) Experience of vulnerability management and securityMore ❯
My client is hiring an Information Security Lead to help shape and implement its cybersecurity operations, governance, and risk framework. Reporting to the IT Operations & Security Manager, this role is critical in maintaining the organisation's security posture, ensuring compliance, and supporting ongoing IT service resilience. Key Responsibilities Oversee third-party security tools and services (e.g. firewalls, IDS/IPS … incident management activities across IT security functions. Support secure design and delivery of IT projects and solutions. Manage internal security testing schedules and ensure timely execution and review. Deliver cybersecurity awareness initiatives, training sessions, and effectiveness reporting. Collaborate with vendors and contribute to security procurement and tendering processes. Monitor emerging threats and recommend improvements to maintain a strong security posture. More ❯
experience and working knowledge of the Army's IT/OT processes. Firsthand knowledge in securing Operational Technology (OT) and Control Systems is highly preferred. Bachelor's degree in Cybersecurity, Information Technology, or a related field. Ability to clearly present and communicate technical approaches and findings Proficient using MS Office applications Requires working on-site and possible travel (10%) Candidates … Preferred Requirements: Expertise in Zero Trust frameworks, including micro-segmentation, identity-based access, and continuous monitoring. Deep IT/OT understanding of RMF, NIST 800-53, Zero Trust, and cybersecurity principles. Expertise in securing IT and OT systems, including SCADA, ICS, and industrial control systems, as well as risk management and compliance assessments. Advanced knowledge of ICAM, IPv6 implementation and More ❯
for a position of Junior or Mid-Level ACAS Systems Operator I or II (depends upon experience). Seeking an individual for vulnerability assessment analysis and administration role with cybersecurity oriented principles to protect and defend information systems and networks. If you are seeking a challenging place to work, please review the list of responsibilities and qualifications. If you don … intended targets ensuring timely and accurate scanning and reporting per PMO, IA and DoD policies and orders. • Maintain the Nessus scanners connectivity with the associated Tenable.sc (formerly SecurityCenter) • Provide cybersecurity staff scanning capability and system administration continuity • Maintain effective communications with other external and internal teams essential to ACAS operations • Create/maintain/implement custom security policies in … M Information Assurance Technical (IAT) Level II certification: CompTIA Security+ CE (Continuing Education) CompTIA Cybersecurity Analyst (CySA+) CE (Continuing Education) (ISC) Systems Security Certified Practitioner (SSCP) GIAC Global Industrial CyberSecurity Professional (GICSP) GIAC Security Essentials Certification (GSEC) (ISC) Systems Security Certified Practitioner (SSCP) • Requires at least one or more DoDM 8140.03 Computing Environment/Operating System (CE/OS More ❯
Engineer II Location: MD Requisition#: 0272 Salary: $100k - $135k Clearance: Active Top Secret SCI clearance with a full-scope polygraph Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Equivalent work experience considered Experience: 4 Years OVERVIEW We are seeking a skilled and motivated CNO (Computer Network Operations) Analyst Engineer II to join our dynamic … our organization, you will be responsible for analyzing, designing, and executing critical computer network operations that support national security objectives. The ideal candidate will possess a deep understanding of cybersecurity principles, technical expertise in network and software vulnerabilities, and a keen ability to develop and implement innovative solutions. REQUIREMENTS The CNO Analyst Engineer II is a highly skilled professional that … demands the capability to work independently and within collaborative team settings, focusing on cybersecurity and network defense. The individual is proficient in installing and configuring antivirus and spyware protection software, designing, writing, and executing software test plans, and accurately documenting lab designs, tool usage, and testing procedures. With expertise in scripting languages such as Python, Perl, VBScript, and Unix shell More ❯
contracting officer and the contracting officer's representative. The ideal candidate has experience managing a security program management office (PMO), positively affecting change and improving operations in a federal cybersecurity environment. The position entails managing a team of up to 50 individuals. General Responsibilities Collect requirements from customer on production and delivery of documentation providing operational guidance and processes around … cybersecurity capability services, cybersecurity management, and other topics as needed. Translate technical cybersecurity capability requirements into stakeholder needs and solutions statements. Manages overall contract financials. Maintains a budget and seeks efficiencies to save costs. Produces financial reports as required by the contract and by management. Primary point of contact to the government customer. Responsible for successful performance against a variety … of cybersecurity-related workstreams to include an Information Security focused Program Management Office (PMO), Risk Management, Security Compliance, and Information Security Training and Awareness. Develop and report on measures to demonstrate to the customer and the management team how effectively key business objectives are being achieved. Monitor performance indicators for corporate quality program Works directly with federal staff to ensure More ❯
for customers. Ensure comprehensive security tooling coverage for vulnerability, incident, and alert visibility, and proper SIEM configuration. Manage vulnerabilities across endpoints and products within acceptable tolerance levels. Provide engaging cybersecurity training. Respond to and manage security incidents. Assist the Group CISO in shaping cyber strategy. Integrate security into all processes, keeping pace with industry standards and innovations. Skills & Experience Experience More ❯
Kendal, Cumbria, North West, United Kingdom Hybrid / WFH Options
Des Scanlan IT Recruitment Ltd
information security and IT infrastructure technologies and controls, including but not limited to the following services: networking, servers, telephony, firewalls, storage, backup and recovery, operating systems, business continuity planning, cybersecurity defences, security incident management, audit and compliance. Driving change projects and delivering new and enhanced IT capabilities that add value to the organisation. Providing guidance to the organisation on any … necessary regulations, compliance requirements and best practice in relation to cybersecurity, infrastructure and enterprise risk management. Proactively assist the organisational defence against cybersecurity threats by regularly monitoring new potential attack vectors and providing resolutions and risk management to the business. Manage requests (e.g. incidents, problems, user requests, change requests) through the appropriate tools, documentation and procedures within the IT Dept … hardware (e.g. Virtualisation, RDS, Networking, firewall technologies). Active Directory, Azure AD, Entra ID, Intune, software & cloud deployment, Microsoft365, Exchange Online Administration, A good understanding of industry standards and cybersecurity, e.g. including but not limited to ISO9001, ISO027001, Cyber Essentials and ITIL. Understanding of project management principles. Excellent coordination skills. Ongoing technical skills developments and certification where required. As a More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
DXC Technology Inc
able to obtain DV) About DXC Technology DXC Technology is a global IT services leader, providing cutting-edge technology solutions to modernize and secure IT infrastructure. With expertise in cybersecurity, cloud computing, and digital transformation, DXC empowers organizations to achieve operational excellence. Role Overview As a Security Architect, you will be responsible for enhancing the security posture of DXC's More ❯
years related experience; prior performance in roles such as ISSO or ISSM; DESIRED: SAP Experience ; Training: IAT Level 1 CSSP Auditor or CSSP Incident Responder (in lieu of Cybersecurity Service Provider Analyst). Combatting Trafficking in Persons (CTIP). Security Clearance: Active TS/SCI and the willingness to sit for a polygraph, if needed IC-CAP provides equal employment More ❯