and internal R&D planning. Collaborating with other teams to support continuous improvement initiatives. Skills & Experience At least 5 years of experience in project delivery, preferably in engineering or cybersecurity environments. Experience managing multi-disciplined technical teams and delivering to complex requirements. Familiarity with agile methodologies, Jira, and backlog management. APMP or PRINCE2 qualification is desirable, but not essential. More ❯
systems, software and security needed to take the lead in a low carbon world. They provide expertise, advice and day-to-day support in emerging technologies, data and analytics, cybersecurity and more. Flexible benefits to fit your life Enjoy discounts on private healthcare and gym memberships. Wellbeing benefits like a free online GP and 24/7 counselling service. More ❯
systems, software and security needed to take the lead in a low carbon world. They provide expertise, advice and day-to-day support in emerging technologies, data and analytics, cybersecurity and more. Flexible benefits to fit your life Enjoy discounts on private healthcare and gym memberships. Wellbeing benefits like a free online GP and 24/7 counselling service. More ❯
systems, software and security needed to take the lead in a low carbon world. They provide expertise, advice and day-to-day support in emerging technologies, data and analytics, cybersecurity and more. Flexible benefits to fit your life Enjoy discounts on private healthcare and gym memberships. Wellbeing benefits like a free online GP and 24/7 counselling service. More ❯
systems, software and security needed to take the lead in a low carbon world. They provide expertise, advice and day-to-day support in emerging technologies, data and analytics, cybersecurity and more. Flexible benefits to fit your life Enjoy discounts on private healthcare and gym memberships. Wellbeing benefits like a free online GP and 24/7 counselling service. More ❯
systems, software and security needed to take the lead in a low carbon world. They provide expertise, advice and day-to-day support in emerging technologies, data and analytics, cybersecurity and more. Flexible benefits to fit your life Enjoy discounts on private healthcare and gym memberships. Wellbeing benefits like a free online GP and 24/7 counselling service. More ❯
ITILV4 would be a plus. Any experience around solution design and modelling tools, enterprise architecture frameworks and cloud computing platforms such as AWS, Azure or GCP, virtualization, networking, or cybersecurity tools. Must be SC cleared or able to obtain SC and eventually DV clearance. For more info pls get in touch. More ❯
role will support the Head of Operational Risk with the development, implementation and embedding of the IT and security Risk Framework. Key Responsibilities: Support the execution of IT and cybersecurity risk strategies, procedures, and controls aimed at identifying, evaluating, managing, and reporting on risk exposure. Collaborate on building and refining the enterprise risk management framework, including defining risk appetite in More ❯
role will support the Head of Operational Risk with the development, implementation and embedding of the IT and security Risk Framework. Key Responsibilities: Support the execution of IT and cybersecurity risk strategies, procedures, and controls aimed at identifying, evaluating, managing, and reporting on risk exposure. Collaborate on building and refining the enterprise risk management framework, including defining risk appetite in More ❯
role will support the Head of Operational Risk with the development, implementation and embedding of the IT and security Risk Framework. Key Responsibilities: Support the execution of IT and cybersecurity risk strategies, procedures, and controls aimed at identifying, evaluating, managing, and reporting on risk exposure. Collaborate on building and refining the enterprise risk management framework, including defining risk appetite in More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Hire Ground Ltd
the CCTV system and work closely with the security team as required. To manage the Biometric system and work closely with the security team as required. To Assist the CyberSecurity Administrator when require on the day-to-day management of Ruckus system and Wi-Fi. To Manage with the ICT nurse call system in the entire company. To manage More ❯
classroom-based training across a spectrum of IT areas including: Digital literacy Operating systems (Windows, Linux) Networking fundamentals Hardware and peripherals Software applications (Office 365, SharePoint, bespoke Defence systems) Cybersecurity awareness Evaluate training effectiveness and adjust content or methods accordingly. Provide post-training support and follow-up to ensure knowledge retention and operational readiness. Maintain accurate training records and provide More ❯
Leicester, Leicestershire, East Midlands, United Kingdom
Alexander Associates Technical Recruitment
for court. Provide clear and professional expert witness testimony. Collaborate with law enforcement and legal professionals. Mentor junior team members and participate in ongoing technical development. Support eDiscovery and CyberSecurity services as needed. Uphold high standards in security, documentation, and quality assurance. Ideal Candidate Profile 5-6 years hands-on experience in digital forensics investigations. Proven knowledge of forensic More ❯
for court. Provide clear and professional expert witness testimony. Collaborate with law enforcement and legal professionals. Mentor junior team members and participate in ongoing technical development. Support eDiscovery and CyberSecurity services as needed. Uphold high standards in security, documentation, and quality assurance. Ideal Candidate Profile 5-6 years hands-on experience in digital forensics investigations. Proven knowledge of forensic More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
ALTERED RESOURCING LTD
understanding of networking fundamentals (TCP/IP, subnets, VLANs, firewalls). Experience working with Microsoft 365 and hybrid environments. Familiarity with backup solutions (e.g., Veeam, Commvault). Understanding of cybersecurity best practices and patch management. Excellent communication and documentation skills. Desirable Skills Familiarity with ITIL processes and service desk tooling. Exposure to cloud migration or hybrid infrastructure projects. Experience with More ❯
who plan monthly competitions and events A brilliant breakout room with free breakfast and a pool table Join a Trusted Partner for Transformative Managed Technology Experts in Managed IT, CyberSecurity and Communications solutions, Tailor Made Technologies (TMT) is on a mission to help small and medium-sized enterprises leverage business technology to achieve their goals. Partnership-focused with a More ❯
who plans monthly competitions and events. A brilliant breakout room with free breakfast and a pool table. Join a Trusted Partner for Transformative Managed Technology Experts in Managed IT, CyberSecurity and Communications solutions, our client is on a mission to help small and medium-sized enterprises leverage business technology to achieve their goals. Partnership-focused with a deep and More ❯
who plan monthly competitions and events A brilliant breakout room with free breakfast and a pool table Join a Trusted Partner for Transformative Managed Technology Experts in Managed IT, CyberSecurity and Communications solutions, Tailor Made Technologies (TMT) is on a mission to help small and medium-sized enterprises leverage business technology to achieve their goals. Partnership-focused with a More ❯
who plans monthly competitions and events. A brilliant breakout room with free breakfast and a pool table. Join a Trusted Partner for Transformative Managed Technology Experts in Managed IT, CyberSecurity and Communications solutions, Tailor Made Technologies (TMT) is on a mission to help small and medium-sized enterprises leverage business technology to achieve their goals. Partnership-focused with a More ❯
Platform, both their services and how to work in the cloud such as DevOps-centric approach Having worked in sensitive data environments and ideally have experience facing off to cybersecurity specialists Understand and apply recognised data modelling patterns and standards Aker Systems Attributes At Aker we work as a team; we are collaborative, hardworking, open, and delivery obsessed. There More ❯
identifying and resolving issues within NiFi flows, managing performance bottlenecks, and implementing robust error handling strategies. Youll work closely with cross-functional teams including data architects, compliance officers, and cybersecurity specialists to integrate data from various systems such as databases, APIs, and cloud platforms. Your work will directly support batch processing, real-time streaming, and event-driven data pipelines across More ❯
DNS/DHCP, and VPNs Proficiency with scripting languages (e.g., PowerShell, Bash) Experience with backup and disaster recovery planning Knowledge of ITIL practices and service desk workflows Understanding of cybersecurity principles and secure infrastructure practices Strong troubleshooting, documentation, and communication skills Please forward your CV with salary expectations. Damia Group Limited acts as an employment agency for permanent recruitment and More ❯
DNS/DHCP, and VPNs Proficiency with scripting languages (e.g., PowerShell, Bash) Experience with backup and disaster recovery planning Knowledge of ITIL practices and service desk workflows Understanding of cybersecurity principles and secure infrastructure practices Strong troubleshooting, documentation, and communication skills Please forward your CV with salary expectations. Damia Group Limited acts as an employment agency for permanent recruitment and More ❯
You will be a part of the HVDC team and be responsible for the IT/OT System design in our control and protection system. Leading system, network, and cybersecurity implementations in HVDC projects Building complete infrastructure of networks and systems to support operations. Ensuring systems and networks contain defined levels of cybersecurity. Participating in security assessments as a subject More ❯