and internal R&D planning. Collaborating with other teams to support continuous improvement initiatives. Skills & Experience At least 5 years of experience in project delivery, preferably in engineering or cybersecurity environments. Experience managing multi-disciplined technical teams and delivering to complex requirements. Familiarity with agile methodologies, Jira, and backlog management. APMP or PRINCE2 qualification is desirable, but not essential. More ❯
Hereford, Herefordshire, West Midlands, United Kingdom
Thorn SDS
Carry out installation, configuration, and support activities across varied IT environments Work collaboratively with technical teams and project stakeholders Troubleshoot issues, apply fixes, and maintain documentation Ensure adherence to cybersecurity protocols and operational standards Skills and Experience: Experience in a relevant IT engineering role (network/server/desktop/installation) Demonstrated capability within a defence environment Strong understanding More ❯
Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom
Jackson Hogg - Tech
development by sharing knowledge and mentoring colleagues. What we’re looking for: Strong support background – 0365 and Windows server. Experience using and administering Jira and Confluence. An understanding of cybersecurity principles and best practices. Knowledge of Mac OS support and AWS exposure would be beneficial. More ❯
and troubleshoot LAMP or LEMP stacks. Familiarity with hosting and tuning PHP-based applications. Solid experience with Windows Server technologies, networking, and administration. Good understanding and experience enabling proven cybersecurity best practices. Excellent verbal and written communication skills. If you are interested in this position please apply online or for more information please contact me on More ❯
in all areas related to Cloud Security Engineering including:Working as part of a team of problem solvers to support mission-critical operations and establish continued compliance with important Cybersecurity principles in a Cloud environmentUtilization of modern technologies and techniques across multiple providers and vendors while supporting multiple cloud service implementations (IaaS, SaaS, PaaS)Leading the configuration and support of More ❯
focus • Knowledge of Risk and Control Framework standards such as SOC 1, SOC 2, PCI-DSS, ISO • Knowledge of laws, regulations, policies, and ethics as they related to technology, cybersecurity and IT management, especially in relation to payments sector (e.g., GDPR, DORA, NIS 2, etc.) • Strong IT technical knowledge, including emerging technologies and potential for exploitation • Knowledge of Mastercard retail More ❯
We are Heimdaland cybersecurity is our passion. Join us in an internationally expanding business, leading the fight against cybercrime! When joining Heimdal, you will embark on a thrilling ride in a fast-growing cybersecurity business, where we believe the team is the cornerstone of what we do tomorrow. We are leading the fight against cybercrime, developing new technologies and providing … intelligence to protect over 15,000 companies worldwide against cybercriminal attacks and data security breaches. Our award-winning line-up of 10+ fully integrated cybersecurity solutions span the entire IT estate, allowing organizations to be proactive, whether remote or onsite. From endpoints, networks, and cloud to emails, and beyond, Heimdal offers advance detection and response capabilities, ensuring complete security coverage. … into scalable systems solutions Excellent communication and stakeholder management skills Comfortable working in a fast-paced, high-growth environment Why Join Heimdal? Be part of an exciting, high-growth cybersecurity company, backed by leading private equity investors Work alongside passionate, driven colleagues in a collaborative and entrepreneurial environment Enjoy significant autonomy, exposure to senior leadership, and the opportunity to make More ❯
leads and payments to communications and workflow automation. With strong foundations in place (PHP 8+, MySQL 8, Redis, AWS), the next step is transformation: AI/ML-powered automation Cybersecurity hardening Platform integration and performance optimisation The successful candidate will help position the business for scale, operational efficiency, and a potential future exit. What Youll Be Doing: AI/Automation … Modernisation Lead rollout of 30+ AI/ML features including voice AI, automation, and predictive tools Overhaul the legacy CRMs UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and … tech-driven or scaling businesses Deep knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetration testing Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success More ❯
leads and payments to communications and workflow automation. With strong foundations in place (PHP 8+, MySQL 8, Redis, AWS), the next step is transformation: AI/ML-powered automation Cybersecurity hardening Platform integration and performance optimisation The successful candidate will help position the business for scale, operational efficiency, and a potential future exit. What Youll Be Doing: AI/Automation … Modernisation Lead rollout of 30+ AI/ML features including voice AI, automation, and predictive tools Overhaul the legacy CRMs UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and … tech-driven or scaling businesses Deep knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetration testing Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success More ❯
payments to communications and workflow automation. With strong foundations in place (PHP 8+, MySQL 8, Redis, AWS), the next step is full-scale transformation: AI/ML-powered automation Cybersecurity hardening Platform integration and performance optimisation Your leadership will help position the business for scale, operational efficiency, and a potential future exit. What Youll Be Doing AI/Automation & CRM … Modernisation Lead rollout of 30+ AI/ML features including voice AI, automation, and predictive tools Overhaul the legacy CRMs UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and … technology leader in scaling businesses Deep knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (AWS preferred) Cybersecurity best practices, disaster recovery, penetration testing Demonstrated success in modernising platforms, optimising performance, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Real estate/ More ❯
payments to communications and workflow automation. With strong foundations in place (PHP 8+, MySQL 8, Redis, AWS), the next step is full-scale transformation: AI/ML-powered automation Cybersecurity hardening Platform integration and performance optimisation Your leadership will help position the business for scale, operational efficiency, and a potential future exit. What You’ll Be Doing AI/Automation … Lead rollout of 30+ AI/ML features including voice AI, automation, and predictive tools Overhaul the legacy CRM’s UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and … technology leader in scaling businesses Deep knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (AWS preferred) Cybersecurity best practices, disaster recovery, penetration testing Demonstrated success in modernising platforms, optimising performance, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Real estate/ More ❯
Leicester, Leicestershire, East Midlands, United Kingdom
Baltic Apprenticeships
including Active Directory, to ensure good housekeeping practices. Contribute to a variety of assignments and mini-projects, helping to drive key initiatives to completion. Stay up-to-date with cybersecurity alerts to ensure the integrity of our systems. Assist with IT auditing and inventory management as required. Create and update technical documentation to ensure processes are clear and current. … Skills and Experience you will learn: Desktops/Laptops: Hardware imaging using the MDT platform, Windows 11 Operating Systems, docking stations, monitor connectivity, and cybersecurity elements such as BitLocker and Endpoint Security. Software: Office 365, Microsoft Office Suite, Defender for Endpoint anti-virus software, Teams, and more. Systems: Active Directory, Service Desk Plus ticketing system, meeting room conference call More ❯
is an award-winning IT services and solutions provider based in London with over 35 years of experience empowering organizations through technology. Main operations are in IT infrastructure, strengthening cybersecurity, and embracing digital transformation. Services are IT Services, Cloud Migration, AI-Powered Solutions, SOC & Cybersecurity Services, and bespoke Software Development. About the Role Looking for a Technical Account Manager (TAM … trends. Participate in the Change Advisory Board and continuous improvement planning. Contribute to service review reports and root cause analysis. Technical Advisory Provide strategic guidance on IT infrastructure, cloud, cybersecurity, and digital transformation. Support clients in IT planning and budgeting. Translate technical concepts into clear business value for non-technical stakeholders. Lead technical discussions and service take-on (STO) activities More ❯
Financial Analyst Exclusive Opportunity with a Leading Cybersecurity Company Location: Segensworth, Hampshire (Fully Office-Based) Salary: £33,000 £45,000 DOE + Bonus + Excellent Benefits Trafalgar Talent is delighted to be partnering with a multi award-winning cybersecurity organisation based in Fareham, Hampshire. Our client recently recognised as South Coast Tech Employer of the Year 2024 is a respected More ❯
This might require optimisation for low power environments or novel adaptations of existing technologies to new sensor data. Your work will expand to more sophisticated software projects in the cybersecurity industry, as well as creating UIs for electronic gizmos using web technologies. You will be working alongside other bright software and hardware engineers on varied and challenging projects. You More ❯
Stevenage, Hertfordshire, United Kingdom Hybrid / WFH Options
AIRBUS Defence and Space Limited
for enhanced system performance. IoT Integration: Assisting in integrating Internet of Things (IoT) devices and sensors into electrical systems to enable remote monitoring, data acquisition, and predictive maintenance capabilities. Cybersecurity: Working with the cybersecurity team to ensure that digital solutions and data transmission within electrical systems are secure and comply with industry standards. Research and Innovation: Staying updated with the More ❯
on system configuration, data exchange, troubleshooting, and supporting functional system administration (FSA) tasks under the guidance of the Senior Systems Analyst. Systems Engineer ensures ECWM operates efficiently, complies with cybersecurity requirements, and supports data migration and reporting needs in alignment with Federal Acquisition Regulation (FAR) and Defense Federal Acquisition Regulation Supplement (DFARS) standards. Wage/Salary Range … oCybersecurity Compliance: Implement and maintain security controls in accordance with DoD 8570.01-M, NIST SP 800-53, and DoDI 8510.01 Risk Management Framework (RMF) requirements. Ensure compliance with DHA cybersecurity policies, including protection of Controlled Unclassified Information (CUI), Personally Identifiable Information (PII), and Protected Health Information (PHI). oNetwork and System Access: Support the establishment and maintenance of secure communication More ❯
for court. Provide clear and professional expert witness testimony. Collaborate with law enforcement and legal professionals. Mentor junior team members and participate in ongoing technical development. Support eDiscovery and CyberSecurity services as needed. Uphold high standards in security, documentation, and quality assurance. Ideal Candidate Profile 7+ years hands-on experience in digital forensics investigations. Proven knowledge of forensic principles More ❯
Leicester, Leicestershire, East Midlands, United Kingdom
Alexander Associates Technical Recruitment
for court. Provide clear and professional expert witness testimony. Collaborate with law enforcement and legal professionals. Mentor junior team members and participate in ongoing technical development. Support eDiscovery and CyberSecurity services as needed. Uphold high standards in security, documentation, and quality assurance. Ideal Candidate Profile 7+ years hands-on experience in digital forensics investigations. Proven knowledge of forensic principles More ❯
SQL databases. Monitor, maintain, and optimize Maximo and asset management system databases. Maintain and enhance data archiving. Manage database configuration and security settings, ensuring compliance with company IT and cybersecurity standards. Perform patch management and upgrades of Maximo and asset management systems database servers, ensuring compatibility with application upgrades. Performance tuning of reporting tools and integrations and optimization of database … exchange integrity. Implement robust database security policies, including user and eternal system access controls, encryption, and activity monitoring. Conduct regular security audits and address vulnerabilities in collaboration with company cybersecurity teams. Collaborate with application administrators and developers to support database-related aspects of Maximo customizations and workflows. Provide database expertise during Maximo upgrades, patching, and troubleshooting to minimize downtime and More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Gallagher
and Windows/Linux systems. Knowledge of OWASP vulnerabilities and experience in webapp and infrastructure pentesting. Must have or be working towards OSCP/CRT or equivalent. Enthusiastic about cybersecurity, excellent communication skills, and a willingness to learn and develop. Certifications like CPSA, Sec+, CEH, Pentest+, PPNT. Industry cybersecurity experience. Experience with vulnerability scanning technologies. Eligible to work in the More ❯
protected and used ethically. Talan provides a range of consultancy and outsourcing capabilities including programme management, market design and governance. We also have extensive and award-winning capabilities across cybersecurity, data privacy and digital transformation. We are IIP Gold accredited and Great Place to Work accredited. The nature of what we do means we are very much a people More ❯
services and Microsoft Entra experience Knowledge of Third-Party Access controls Experience with M&A integrations Familiarity with AWS, GCP, Microsoft cloud access models Solid communicator and team player CyberSecurity know-how (CISSP/CISM a plus) Hands-on with IGA tools like SailPoint, Saviynt, Okta, etc. If you've got the expertise and the client-focused mindset, let More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
IMT Resourcing Solutions
balanced with flexibility. Salary of up to £65,000 plus benefits. The chance to lead delivery across modern IT services: Azure, Microsoft 365, enterprise networking, automation, infrastructure modernisation, and cybersecurity projects. Access to training and certifications to keep you at the forefront of technology. A business that actively invests in career progression, shaping future leaders from within. The company More ❯
to perform process modelling and develop data validation processes. Work with system stakeholders to capture data requirements. Ensure application processes stay in sync with business processes. Work with the cybersecurity engineer to create System Interface Agreements (SIA) for all data exchanges. Assist Business Analyst in the development and technical evaluation of requirements. Manage and respond to user tickets. SharePoint Administrator More ❯