CyberSecurity Trainee Placement Programme Please note this is a training course and fees apply Are you looking to benefit from a new career in IT and Cybersecurity? Skills shortages in the IT sector are driving the need for qualified, entry-level career seekers and career changers. We help place graduates from this programme into top UK companies and organisations … needing to employ entry-level IT and Cybersecurity staff that can hit the ground running with up-to-date skills gained from this programme. The best part is you will not need any previous experience as fully accredited training, which includes tutor support and mentoring, provides you with the skills, practical knowledge and qualifications for you to secure a professional … with you to secure your first role as an IT Technician. Ideally you will need to gain two years experience in this role before you can progress into a cybersecurity role. While working as an IT Technician, we will release your second batch of training which is specifically designed to qualify you to move into the cybersecurity field. This More ❯
CyberSecurity Trainee Placement Programme *Please note this is a training course and fees apply* Are you looking to benefit from a new career in IT and Cybersecurity? Skills shortages in the IT sector are driving the need for qualified, entry-level career seekers and career changers. We help place graduates from this programme into top UK companies and organisations … needing to employ entry-level IT and Cybersecurity staff that can hit the ground running with up-to-date skills gained from this programme. The best part is you will not need any previous experience as fully accredited training, which includes tutor support and mentoring, provides you with the skills, practical knowledge and qualifications for you to secure a professional … with you to secure your first role as an IT Technician. Ideally you will need to gain two years’ experience in this role before you can progress into a cybersecurity role. While working as an IT Technician, we will release your second batch of training which is specifically designed to qualify you to move into the cybersecurity field. This More ❯
effective day-to-day delivery of IT services across both shared and in-house environments, with a strong focus on ITIL disciplines - Incident, Problem, Change, and Asset Management - and CyberSecurity risk management . The postholder will act as the customer-facing lead for operational IT, ensuring services are reliable, secure, and responsive to user needs. Key Responsibilities Manage the … Incident , Problem , Change , and Asset Management Act as the operational interface with the other organisation (the shared service provider) Maintain the CMDB and configuration item lifecycle tracking Lead on cybersecurity risk assessments , patch assurance , vulnerability management , and coordination with SOC/XDR providers Ensure compliance with cyber and data protection standards (e.g. Cyber Essentials) Monitor service level agreements (SLAs … service/in-house/outsourced environment Deep knowledge of ITIL v4 practices, especially Incident, Problem, Change, and Asset Management Experience with service desk systems and CMDBs Familiarity with cybersecurity operations (e.g., vulnerability scanning, patch management, access reviews) Strong stakeholder engagement and supplier management skills Ability to maintain service performance under pressure and manage conflicting priorities A pragmatic, delivery-focused More ❯
Are you looking for an exciting new opportunity? Join an award-winning cybersecurity firm recognized as Check Point Partner of the Year 2022 and CRN MSSP of the Year 2021. Since 2014, the company has been challenging the status quo in cybersecurity by offering a fully managed security platform where expert engineers take responsibility for maintaining critical services, applying updates … pension Employee discounts (including EE family discount) Cycle to work scheme and birthday leave Access to wellbeing support and employee assistance programme Career development and progression within a growing cybersecurity business Salary: £26,000 - £32,000 depending on experience More ❯
Our Mission At Palo Alto Networks everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and … we're looking for innovators who are as committed to shaping the future of cybersecurity as we are. Who We Are We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values … value realization of their investment with Palo Alto Networks. You evangelize our industry leadership in on-prem, cloud, and security operations services that establish PANW as your customer's cybersecurity partner of choice. Your Impact Curiosity is core to the Solutions Consultant role, and you see complex problems as opportunities to learn and deliver innovative solutions! You define your impact More ❯
Barrow-In-Furness, Cumbria, North West, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions
Up to £50,000 Clearance Requirement: UK nationals only, SC eligible Deerfoot IT Recruitment is helping one of our trusted clients source a Vulnerability Manager to join a specialist cybersecurity team working on a high-profile programme. This is a fantastic opportunity for someone with a passion for cybersecurity, hands-on experience with vulnerability management tools, and strong communication skills … security findings. Collaborating with wider teams and contributing to security training and mentoring initiatives. Ideal candidate profile: 2-3 years' experience in vulnerability management (3-5 years in wider cybersecurity desirable). Familiarity with vulnerability tools (e.g. Nessus, Tenable, Microsoft Defender, IBM QRadar). Relevant certifications such as CompTIA Security+, CISSP, or similar are a plus. Strong interpersonal skills and … onsite in Barrow-in-Furness. Candidates should live within commuting distance or willing to relocate. If you're a collaborative team player looking to take your next step in cybersecurity, we'd love to hear from you. Deerfoot IT Resources Ltd is a leading UK recruitment agency, operating since 1997. We are committed to equal opportunity and welcome applications from More ❯
stepping into a unique opportunity to learn the ins and outs of cybersecurity support from the ground up, while attending the local college to achieve a foundation degree in CyberSecurity with Cloud and Network Infrastructure. You don't need to be an expert on day one - what matters most is your drive to learn, solve problems, and make things … to dive into new challenges, this is the place to grow. We believe attitude beats experience - so if you're curious, communicative, and motivated to learn the world of cybersecurity, let's talk. What You'll Do Assist customers by responding to support tickets using tools like Jira Service Desk - and jump on Zoom calls when needed to troubleshoot live More ❯
and stakeholders where applicable. Identify and continuously assess risks related to cybersecurity, data privacy, and unauthorised access, implementing feedback loops for ongoing improvement. Consider and mitigate risks related to cybersecurity, data privacy, and unauthorized access. Ensure compliance with regulations on digital communications, surveillance, and prisoner access. Work with security teams to integrate firewalls, monitoring tools and secure authentication methods. More ❯
deeper into your career as a Senior Penetration Testing Consultant? Join a well-established Managed Security Service Provider (MSSP) and a leading Fortinet and Microsoft partner, delivering high-impact cybersecurity solutions to clients in the defense, government, and financial services industries. Committed to nurturing talent, the organization offers a certification sponsorship and professional development plan. They are currently seeking for … Develop detailed reports on penetration test results, vulnerabilities, attack paths, and recommended remediations, and present findings to clients with expert guidance on risk mitigation strategies. Stay informed on emerging cybersecurity threats, vulnerabilities, and attack methods while researching and developing new methodologies and tools to enhance penetration testing capabilities. Work with cybersecurity teams to enhance overall security posture while sharing expertise … Proficient in advanced tools and techniques for penetration testing. Strong leadership skills with a passion for mentoring junior team members. Excellent communication and presentation skills. In-depth knowledge of cybersecurity technologies, best practices, and risk assessment methodologies. Proven ability to think critically and strategically to identify vulnerabilities and risks. Benefits: Career development program Certification sponsorship Remote working Salary More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Involved Solutions
Research Officer will lead a small team to deliver high-impact research on Critical Information Infrastructure (CII) dependencies across the UK's international partners. This work will shape future cybersecurity risk mitigation activities by providing an evidence-based prioritisation of international engagement based on dependency risk analysis. Key Responsibilities - Senior Research Officer - Cyber Lead the design, development, and implementation … CNI dependency research , ensuring accuracy and relevance across multiple sectors. Update and refine data evaluation methodologies to support consistent and robust research outcomes. Identify and present opportunities for future cybersecurity risk mitigation at national and enterprise levels. Facilitate stakeholder workshops and interviews , gathering insight and validating findings. Engage directly with stakeholders in the public and private sector , as well … to inform project outputs. Essential Skills & Experience - Senior Research Officer - Cyber Proven ability to work at the strategic system-of-systems level with a global perspective. Demonstrated experience in cybersecurity risk mitigation, requirements, and capacity building at enterprise and national scale. Strong background in Critical National Infrastructure (CNI) protection from cyber threats, ideally spanning sectors such as telecommunications, energy More ❯
end applications with REST/GraphQL APIs, WebSockets, and backend services. Collaborate with AI engineers, backend developers, and cloud architects to deliver end-to-end solutions. Ensure compliance with cybersecurity and data privacy standards through secure coding practices and regular code reviews. Deploy applications to GCP (Firebase, Cloud Run) and Azure App Services using CI/CD pipelines hardened for … React Query, Zustand or similar AI/Cloud Integration: GCP: Vertex AI Gemini API, Firebase Hosting, Google IAM, Secret Manager Azure: Azure OpenAI, Azure App Services, Azure AD authentication Cybersecurity: CSP headers, XSS/CSRF protection, OAuth2 flows, JWT encryption Front-end logging for anomaly detection and audit trails Familiarity with OWASP guidelines and secure SDLC practices DevOps: GitHub Actions More ❯
end applications with REST/GraphQL APIs, WebSockets, and backend services. Collaborate with AI engineers, backend developers, and cloud architects to deliver end-to-end solutions. Ensure compliance with cybersecurity and data privacy standards through secure coding practices and regular code reviews. Deploy applications to GCP (Firebase, Cloud Run) and Azure App Services using CI/CD pipelines hardened for … React Query, Zustand or similar AI/Cloud Integration: GCP: Vertex AI Gemini API, Firebase Hosting, Google IAM, Secret Manager Azure: Azure OpenAI, Azure App Services, Azure AD authentication Cybersecurity: CSP headers, XSS/CSRF protection, OAuth2 flows, JWT encryption Front-end logging for anomaly detection and audit trails Familiarity with OWASP guidelines and secure SDLC practices DevOps: GitHub Actions More ❯
Application Cybersecurity Lead Location: ScottishPower HQ, Glasgow Flexible & Hybrid Working The role requires that the successful candidate can obtain UK Government Security Clearance Help us create a better future, quicker The Application Cybersecurity Lead will work within the Digital Transformation team, working across all ScottishPower businesses, with the objective of rolling out the Global Application Security Model, to ensure best … the business. What you'll be doing A key focus of this role will be to implement and evolve the application security model, aligning it to the Global Application Cybersecurity team, ensuring standards and best practices are fully integrated into the Software Development Lifecycle. Within this role, you'll lead on vulnerability management, promoting the adoption and execution of the … vulnerabilities Solution verification Reporting Contributing to the evolution of the process for vulnerability management. Lead security assessments of commercial packages You'll look to continually evolve the implementation of cybersecurity, implementing new measures and optimising those already in place. You'll act as the owner and subject matter expert for the Secure Software Development Standards, Methods and Tools, and has More ❯
Minneapolis, Minnesota, United States Hybrid / WFH Options
Target
disability, long term disability, paid sick leave, paid national holidays, and paid vacation. Find competitive benefits from financial and education to well-being and beyond at . JOIN TARGET CYBERSECURITY AS A LEAD ENGINEER - RED TEAM About Us Target is an iconic brand, a Fortune 50 company, and one of America's leading retailers. Target as a tech company? Absolutely. … performing teams balance independence with collaboration, and we pride ourselves on being versatile, agile and creative. Use your skills, experience, and talents as a member of a world-class cybersecurity team! About Red Team Target's Red Team uses adversary simulation to uncover risk in our environment, provide training opportunities to defenders, and measure the processes and technology defending … real-world threat actor tactics, techniques, and procedures to develop proof-of-concept tools and playbooks Bypass preventative and detective security controls to accomplish operational goals Partner with the CyberSecurity Incident Response Team and other stakeholders in the organization to identify improvement opportunities Collaborate with Cyber Threat Intelligence, Detection, and Threat Hunting engineers and analysts on research Work with More ❯
Join us in our pursuit to defend data and protect people. How We Work: At Proofpoint, you'll be part of a global team that breaks barriers to redefine cybersecurity, guided by our BRAVE core values: Bold in how we dream and innovate, Responsive to feedback, challenges, and opportunities, Accountable for results and best-in-class outcomes, Visionary in future … focused problem-solving, Exceptional in execution and impact. Corporate Overview Proofpoint is a leading cybersecurity company protecting organizations' greatest assets and biggest risks: vulnerabilities in people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber-attacks. Leading organizations of all sizes …/or data pipelines in the AWS cloud (SageMaker Endpoints, ECS/EKS, EMR, Glue) Why Proofpoint Protecting people is at the heart of our award-winning lineup of cybersecurity solutions, and the people who work here are the key to our success. We're a customer-focused and a driven-to-win organization with leading-edge products. We are More ❯
and internal and external bodies e.g. auditors, management committees, Tokyo head office, regulators (via Compliance), Operational Risk. Key Responsibilities: In this role, you will be responsible for information/cybersecurity across MUFG's banking arm and securities business under a dual-hat arrangement. Under this arrangement, you will act and make decisions on behalf of both the bank and … other technology teams (i.e. infra, app and etc) to develop and improve defensive strategies and security measures to prevent real-world attacks. Stay up-to-date with the latest cybersecurity threats, trends, and technologies to ensure the team's methods and tools are current and effective. Strong understanding of blue team detection use cases Create executive report from technical assessment More ❯
in or near Kent, with regular travel to client sites, events, and the company’s head office. This company delivers more than just IT support. Their core services include cybersecurity, Microsoft 365, cloud solutions, automation, and AI-powered transformation. They help SMEs streamline operations, improve security, and embrace modern workplace technologies – and they’re now looking for someone to … add real value. Essential skills and experience: Minimum 3 years’ B2B sales experience in Managed IT Services or technology consultancy Understanding of Microsoft 365, Power Platform, cloud infrastructure, or cybersecurity solutions Strong communication and relationship-building skills Consultative, value-led approach to sales Experience managing a pipeline and working with CRM tools Confident pin resenting at events and networking with More ❯
we're learning as we go. We're proud of the progress we've made, but we're just getting started. Join Vodafone Business Security Enhanced and strengthen the cybersecurity of the UK's Critical National Infrastructure and public sector organisations. What you'll do To be part of a small, dedicated team in VBSE managing predominantly transmission-based … equipment and networks such as Ciena Telco, Network Operations background/qualifications is desired Understanding of ITIL working practices Basic concept of IP networking, switching and routing Understanding of Cybersecurity Worried that you don't meet all the desired criteria exactly? We know that everyone is unique, with multiple aspects to their identity and different experiences behind them. We are More ❯
customer satisfaction leading to annual renewals and growth for our data and technology. Working in a dynamic, fast-paced environment, the successful candidate will have a strong interest in cyber-security and be inquisitive by nature. This is a new position where the successful candidate will be instrumental in scaling and leading a team as we grow the OSINT capability. … A strong interest and experience in CyberSecurity, Open-Source and/or the Dark Web is necessary for this role. Serve as the main point of contact for current clients. Interaction with the US team, Dark Blue Analytics, joined thought leadership, and developing OSINT analyst. Working with part of the wider team, dealing with serious organised crime - cyber attacks … and mentor junior OSINT roles as we grow. Update and maintain CRM. Aid in bid writing. Education and/or Work Experience Requirements: Excellent attention to detail. Degree in CyberSecurity or relevant work experience. Strong research skills and deep dive into dark web. Ability to work as part of a team and communicate at all levels within the organisation. More ❯
Architect with GenAI would need to design and implement secure AI/ML solutions, ensuring data protection and compliance while leveraging AI's capabilities. This role combines expertise in cybersecurity, AI/ML, and cloud technologies to architect secure and scalable AI solutions. Design and implement security solutions for AI/ML applications, focusing on data privacy, confidentiality, and integrity. … AI-powered solutions, integrating security measures throughout the lifecycle, from data ingestion to model deployment. Required Skills/Experience The ideal candidate will have the following: Strong understanding of cybersecurity principles, threat modeling, vulnerability assessment, and penetration testing. Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Knowledge of data privacy regulations (GDPR, CCPA) and industry standards. Ability More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Anson McCade
to build a more secure and resilient digital world. You will act as a critical liaison between client stakeholders and internal operational teams, ensuring the delivery of world-class cybersecurity services. You’ll drive incident response coordination, lead vulnerability management efforts, and ensure service excellence through strategic oversight and hands-on technical engagement. What You’ll Be Doing Serve … closely with the Senior Service Delivery Manager to identify process improvements and implement best practices. What You’ll Bring 10+ years of experience in technical support for SOC or CyberSecurity operations. 5+ years of vulnerability management experience, with demonstrable risk-based prioritisation skills. Proven leadership in high-pressure, crisis-response situations. Strong client relationship management and stakeholder engagement skills. More ❯
milton, central scotland, united kingdom Hybrid / WFH Options
Anson McCade
to build a more secure and resilient digital world. You will act as a critical liaison between client stakeholders and internal operational teams, ensuring the delivery of world-class cybersecurity services. You’ll drive incident response coordination, lead vulnerability management efforts, and ensure service excellence through strategic oversight and hands-on technical engagement. What You’ll Be Doing Serve … closely with the Senior Service Delivery Manager to identify process improvements and implement best practices. What You’ll Bring 10+ years of experience in technical support for SOC or CyberSecurity operations. 5+ years of vulnerability management experience, with demonstrable risk-based prioritisation skills. Proven leadership in high-pressure, crisis-response situations. Strong client relationship management and stakeholder engagement skills. More ❯
paisley, central scotland, united kingdom Hybrid / WFH Options
Anson McCade
to build a more secure and resilient digital world. You will act as a critical liaison between client stakeholders and internal operational teams, ensuring the delivery of world-class cybersecurity services. You’ll drive incident response coordination, lead vulnerability management efforts, and ensure service excellence through strategic oversight and hands-on technical engagement. What You’ll Be Doing Serve … closely with the Senior Service Delivery Manager to identify process improvements and implement best practices. What You’ll Bring 10+ years of experience in technical support for SOC or CyberSecurity operations. 5+ years of vulnerability management experience, with demonstrable risk-based prioritisation skills. Proven leadership in high-pressure, crisis-response situations. Strong client relationship management and stakeholder engagement skills. More ❯
services and user support to ensure optimum service availability and user productivity. This includes all user support and comes with responsibilities over run and maintain services, as well as cybersecurity operations. The Head of Service Operations brings current knowledge and future vision for transforming Service Operations functions, including strategy, to remain effective whilst supporting modern service delivery approaches, including … strategic thinking and operational management of live services. The role's level of operational responsibility is high and includes leading through major disruption at times of major incidents including cybersecurity ones. As a key member of the GIO senior IT leadership team this role contributes to the development and execution of the GIO business plan and is responsible for … user-friendly Catalogue of requestable items backed by lean workflow and supported by an efficient exceptions process to deliver what users need, when they need it. Provision of effective cybersecurity protective monitoring, vulnerability management in conjunction with technical teams and suppliers, and a responsive and effective cyber incident response capability. Lead on software licencing (circa £40m/y) seeking More ❯
services and user support to ensure optimum service availability and user productivity. This includes all user support and comes with responsibilities over run and maintain services, as well as cybersecurity operations. The Head of Service Operations brings current knowledge and future vision for transforming Service Operations functions, including strategy, to remain effective whilst supporting modern service delivery approaches, including … strategic thinking and operational management of live services. The role's level of operational responsibility is high and includes leading through major disruption at times of major incidents including cybersecurity ones. As a key member of the GIO senior IT leadership team this role contributes to the development and execution of the GIO business plan and is responsible for … user-friendly Catalogue of requestable items backed by lean workflow and supported by an efficient exceptions process to deliver what users need, when they need it. Provision of effective cybersecurity protective monitoring, vulnerability management in conjunction with technical teams and suppliers, and a responsive and effective cyber incident response capability. Lead on software licencing (circa £40m/y) seeking More ❯