brands, ensuring our security approaches and technology align. Cloud Security Integration: You'll work with development, DevOps, and cloud engineering teams to embed cloud security controls into our CI / CD workflows and infrastructure-as-code. Cloud Security Posture: You'll utilise cloud-native and third-party security tools to keep an eye on our cloud security posture and … Linux, Windows, Apple & Android OS . Knowledge of network perimeter security, including firewalls, WAF, anti-virus, and O365 compliance & security centre . Familiarity with NIST (CSF Framework 2.0), ISO27001, PCI-DSS, and GDPR . Experience … operating and managing SIEM solutions , vulnerability management tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and / or SecOps oriented teams . A proven track record of analysing security requirements and applying architectural best practices. Previous work experience in an IT, InfoSec, or system administration role. More ❯
land major enterprise customers. This isn't your typical security role. We're looking for someone who can code first, audit later & are able to dive into our NodeJS / React stack, help teams ship secure-by-design features, and implement pragmatic security improvements across our application codebase, tooling and cloud infrastructure. You'll work closely with Engineering, Product … risks early. • Partner with Engineering Leads and our CPTO to assess new threats, handle incidents, and continuously improve our posture. • Support customer security reviews, RFPs, and external audits (SOC2, ISO27001, etc). • Design and tune WAF rules, bot protections, and layered defenses to mitigate real-world attacks. • Improve the security of our cloud infrastructure (AWS), IAM policies, and container configurations. … monitor, and when to say no. • Experience with WAFs, IAM, and infrastructure-layer security (e.g., network, container, or runtime protections). Nice-to-haves • Experience with SOC2 /ISO27001, Vanta, or security questionnaires for enterprise customers. • Familiarity with identity & access management (SSO, SCIM, RBAC), secure frontend patterns, and data encryption at rest / in transit. • Incident response experience More ❯
Washington, Washington DC, United States Hybrid / WFH Options
ALTA IT Services
in standalone or domain mode, depending on architecture needs. • Apply Red Hat-supported RPMs or ZIP installations and ensure compliance with licensing. • Deploy and manage Java EE applications (WAR / EAR) via: o Management CLI o Admin Console o Automation scripts (Ansible, shell) • Enable rolling deployments, hot deployment • Set up HTTPS / SSL with trusted certificates and secure … configure log rotation and log levels. • Apply Red Hat-provided patches and updates using RHSM or offline methods. • Maintain backup procedures for: • Configuration files o Deployed apps o Domain / host controllers (in domain mode) • Prepare and test disaster recovery procedures and environment restoration. • Integrate JBoss EAP with Red Hat AMQ • Connect to external systems like databases, message brokers … Red Hat Support via the Customer Portal and create support cases when needed. • Automate tasks using: o Ansible (especially Red Hat Certified Collections) o JBoss CLI scripting o Shell / Python scripts • Integrate EAP deployments with CI / CD pipelines (Jenkins, GitLab, Tekton). • Support EAP clustering, session replication, and high availability. • Manage load balancing with Apache HTTPD More ❯
collaborate across IT, BI, and operational teams to support a resilient, scalable, and governed data platform. Build and maintain automated, secure data pipelines from sources such as Dynamics AX / D365 , CRM, and third-party platforms. Manage the capacity, scalability, and configuration of the data platform, including SQL Server, SQL MI, Synapse, Data Lake , and Microsoft Fabric , in collaboration … DevOps and knowledge sharing. Mission Critical Skills Proven experience as a Data Engineer, Data Platform Engineer or similar technical role in enterprise environments, with advanced SQL development skills, Python / PySpark, and demonstrated experience with modern ETL / ELT frameworks Hands-on expertise with cloud-native data platforms (preferably Microsoft Fabric, Synapse, Data Factory, and related services Experience … integrating data from ERP / CRM systems (e.g., Dynamics 365), and operational data sources. Familiarity with data governance tools like Purview, and understanding of data security and compliance (e.g., GDPR, ISO27001). Knowledge of DevOps, including CI / CD, Git, and Infrastructure as Code (e.g., ARM, Terraform, Bicep). Strong problem-solving, diagnostic More ❯
Warrington, Cheshire, United Kingdom Hybrid / WFH Options
Babcock Mission Critical Services España SA
Lead Location: Bristol, GB, BS16 1EJ Onsite or Hybrid: Job Title: IS& Cyber Security Lead Location: Warrington, Bristol or Leicester Compensation: Band 7 - £51,941 Role Type: Full time / Permanent Role ID: SF66104 At Babcock we're working to create a safe and secure world, together, and if you join us, you can play your part as a … out of the ordinary. We are looking for a Cyber Security expert with proven working experience within a complex organisation responsible for critical defence programmes. Closely working with government / MOD client, programme partners, and design collaborators, you will ensure the highest standards of cybersecurity across all stages of development. Day-to-day, you'll have the following responsibilities … entries, Risk Balance Cases, Information Asset Owner forms, Supplier Assurance Questionnaires. Experienced in relevant Security Policy and Cyber Security Frameworks including the GovS 007, MOD Secure by Design (SbD), ISO27001 - Information Security Management Systems, NIST, NCSC IA Guidance Qualifications for the IS & Cyber Security Lead: Educated to degree level or holds a relevant professional qualification or equivalent experience. Security Clearance More ❯
site at our Glasgow office. This position is office-based, meaning regular in-person collaboration or use of office equipment is essential to maximize effectiveness for this team and / or position. Qualified applicants must live within commuting distance of our Glasgow office location and should expect to be in office a minimum of 4 days per week. At … of product security compliance. Education & Certifications: Bachelor's degree in Computer Science, Information Security, Law, or a related technical field. Master's degree or relevant industry certifications (e.g., CIPP / E, CISM, CRISC, or specialized IoT / Product Security compliance certifications) are highly preferred. Experience: Minimum of 5 years of progressive experience in cybersecurity compliance, regulatory affairs, or … product security, with a strong focus on IoT and / or consumer electronics products. Demonstrable experience interpreting complex legal and regulatory texts and translating them into practical, engineering-consumable requirements. Proven track record of successfully guiding product development teams through compliance efforts for regulations such as EU CRA, UK PSTI Act, EU RED Delegated Act, GDPR, and CCPA. Familiarity More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Octad Recruitment Consultants (Octad Ltd )
3+ years of hands-on Azure engineering experience (IaaS ? PaaS), including Infra as Code. Strong SQL skills and proficiency in Python or PySpark . Built or maintained data lakes / warehouses using Synapse , Fabric , Databricks , Snowflake , or Redshift . Experience hardening cloud environments (NSGs, identity, Defender). Demonstrated automation of backups, CI / CD deployments, or DR workflows. … work effectively across time zones and teams. Thrives in a small, high-trust, high-autonomy team culture. Day-to-Day Responsibilities Infrastructure & Automation: Deploy and manage infrastructure using Bicep / Terraform , GitHub Actions , and PowerShell / DSC . Data Engineering: Architect and implement scalable ETL / ELT solutions; model schemas, optimize performance, and apply lakehouse best practices. … Security & Resilience: Implement best-practice cloud security (NSGs, Defender, Conditional Access), automate DR / backups, and run quarterly restore drills. Collaboration: Partner with AI Product Owners, Business Performance, and Data Analysts to translate business needs into robust data solutions. Mentorship & Knowledge Sharing: Act as a data SMEguiding system administrators and upskilling junior technical team members. What You'll Achieve More ❯
a Subject Matter Expert (SME) in analysing and helping deliveridentity and access management solutions,acrosssome ofthe following areas: Identity Governance and Administration (IGA) Identity Management (IDM) Ideally withgood conceptual / practical knowledge of: Access Management (inc.Single Sign-On (SSO) / Multi-Factor Authentication (MFA) / Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) The key … with a proven track record of deliveringprojects Background in both delivering and working with major IAM vendors, as described above E xperience in integrating withother IAM technologies, such asOkta / CyberArk(PAM) / ServiceNow / SAP technologieswould be beneficial but not compulsory. Comfortable w orking both as part of a team, orindividually, and familiar with the relevant … deliver an IAM solutionacross all aspects of the SDLC(Analyse, Design, Develop / Configure, Test, Deploy, Document) Understanding of regulatory frameworks, and their application to IAM, e.g. SOx , ISO27001, NIST, HIPAA, GDPR,PSD2,etc. Ideally, an e ducation in Business, IT, IT security or related field Ability tomanage owntime and priorities effectively The following attributes, while not mandatory, will More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Halian Technology Limited
threat detection, vulnerability management, and incident response Lead threat modelling and risk assessments for critical systems and services Collaborate with engineering teams to integrate security best practices into CI / CD pipelines Monitor and respond to security incidents, coordinating investigation and remediation efforts Drive security automation and infrastructure-as-code initiatives Support compliance efforts (ISO27001 … understanding of networking, identity & access management, and encryption technologies Hands-on experience with tools like Terraform, Kubernetes, SIEM platforms, and security scanners Familiarity with DevSecOps practices and modern CI / CD pipelines Strong scripting or coding skills (e.g., Python, Bash, or PowerShell) Excellent problem-solving, communication, and stakeholder engagement skills Nice to Have Security certifications (e.g., CISSP, AWS Security More ❯
experience as an AWS Architect or similar role (5+ years in AWS-focused roles). Deep understanding of core AWS services including EC2, S3, VPC, RDS, IAM, Lambda, CloudFormation / Terraform, ECS / EKS, and API Gateway. Strong knowledge of network design, security best practices, and cloud-native application architecture. Proficient in scripting or programming (e.g., Python, Bash … or Node.js). Experience with CI / CD tools (e.g., GitLab CI, Jenkins, AWS CodePipeline). Familiarity with containerization and orchestration tools (e.g., Docker, Kubernetes). AWS certifications such as AWS Certified Solutions Architect - Professional or Associate . Preferred Qualifications Experience in hybrid cloud environments and integration with on-premise systems. Background in DevOps, SRE, or Infrastructure Engineering. Knowledge … of monitoring / logging tools (e.g., CloudWatch, Datadog, Prometheus, ELK). Experience with enterprise security and compliance frameworks (e.g., ISO27001, SOC 2, GDPR). Familiarity with cost modeling and optimization strategies in AWS. More ❯
post-incident reviews and recommend improvements. Forensic Analysis Investigate incidents, perform root cause analysis, preserve digital evidence, and produce forensic reports. Security Tools Manage tools such as firewalls, IDS / IPS systems, and endpoint protection solutions; evaluate and recommend new technologies. Documentation Maintain detailed logs and reports of incidents, assessments, and analyses for internal stakeholders. Collaboration Partner with IT … What We re Looking For IT Expertise Strong knowledge of IT infrastructure, especially cloud platforms; AWS experience preferred. Security Tools Proficiency Hands-on experience with Palo Alto firewalls, IDS / IPS, and endpoint protection. Network Security Knowledge Deep understanding of VPNs, network protocols, and security architecture. Incident Management Proven ability to detect, analyse, and resolve security threats and malware. … both technical and non-technical stakeholders. Project Management Experience managing security projects and working with cross-functional teams. Certifications Relevant qualifications such as CEH, CCSP, CompTIA Security+, or AWS / Azure certs are highly desirable. This fantastic role come with a highly competitive salary which is reviewed annually, and comes with an excellent benefits package which includes a More ❯
post-incident reviews and recommend improvements. Forensic Analysis - Investigate incidents, perform root cause analysis, preserve digital evidence, and produce forensic reports. Security Tools - Manage tools such as firewalls, IDS / IPS systems, and endpoint protection solutions; evaluate and recommend new technologies. Documentation - Maintain detailed logs and reports of incidents, assessments, and analyses for internal stakeholders. Collaboration - Partner with IT … What We’re Looking For IT Expertise - Strong knowledge of IT infrastructure, especially cloud platforms; AWS experience preferred. Security Tools Proficiency - Hands-on experience with Palo Alto firewalls, IDS / IPS, and endpoint protection. Network Security Knowledge - Deep understanding of VPNs, network protocols, and security architecture. Incident Management - Proven ability to detect, analyse, and resolve security threats and malware. … both technical and non-technical stakeholders. Project Management - Experience managing security projects and working with cross-functional teams. Certifications - Relevant qualifications such as CEH, CCSP, CompTIA Security+, or AWS / Azure certs are highly desirable. This fantastic role come with a highly competitive salary which is reviewed annually, and comes with an excellent benefits package which includes a More ❯
post-incident reviews and recommend improvements. Forensic Analysis – Investigate incidents, perform root cause analysis, preserve digital evidence, and produce forensic reports. Security Tools – Manage tools such as firewalls, IDS / IPS systems, and endpoint protection solutions; evaluate and recommend new technologies. Documentation – Maintain detailed logs and reports of incidents, assessments, and analyses for internal stakeholders. Collaboration – Partner with IT … What We’re Looking For IT Expertise – Strong knowledge of IT infrastructure, especially cloud platforms; AWS experience preferred. Security Tools Proficiency – Hands-on experience with Palo Alto firewalls, IDS / IPS, and endpoint protection. Network Security Knowledge – Deep understanding of VPNs, network protocols, and security architecture. Incident Management – Proven ability to detect, analyse, and resolve security threats and malware. … both technical and non-technical stakeholders. Project Management – Experience managing security projects and working with cross-functional teams. Certifications – Relevant qualifications such as CEH, CCSP, CompTIA Security+, or AWS / Azure certs are highly desirable. This fantastic role come with a highly competitive salary which is reviewed annually, and comes with an excellent benefits package which includes a More ❯
Employment Type: Permanent
Salary: £60000 - £65000/annum + 10% Bonus and Excellent Benefits
policies, standards, and procedures or guidelines acrossthe organisation. • Development of new organizational processes within the organization. • Ensure the organization's internal regulatory compliance. • Monitor compliance with regulations such as ISO27001, NIST, NIS2, SOC2, ENS, or ANSSI. • Maintenance of Information Security KPIs for the maintenance of existing certifications. • Analysis and management of the authorization of HR, IT, TECH and business processes. … access, phishingattempts, and data anomalies. • Collaborate with cybersecurity teams and other third parties to analyse threat intelligence feeds and proactively identifyemerging risks. • Participate in vulnerability assessments and support external / internal penetration testing efforts. • Conduct regular audits of user permissions, authentication logs, and endpoint security compliance. • Develop and deliver security awareness training programs for employees, including social engineeringsimulations and … incidents, access violations, and remediation actions. • Perform risk assessments, policy reviews and development, and continuous improvement of security operations. Cybersecurity Management: • Supervise technological security measures including SIEM, DLP, IDS / IPS, Firewall, WAF, cryptological mechanisms, EDR • Analyse security alerts and conduct technical incident investigations. • Run and monitor vulnerability tests and periodic scans of key assets • Collaborate on managing security More ❯
with the ability to clearly convey complex issues to diverse audiences, including senior leadership. Demonstrated ability to work independently while building trust-based relationships across departments and regions. ISO 9001 or ISO27001 auditor qualification is an advantage. If you are motivated to contribute to the secure operation of a global organization, value collaboration More ❯
Information Security Officer Hybrid – Home & London | Permanent | £68,000 | 35 hrs / week (flexible) A rare and brilliant opportunity to join this international development children’s charity, as their new Information Security Officer . You'll be the expert, working closely with the Chief Information Officer and other senior leaders to embed security practices across systems, suppliers, and staff. … experience in ICT security management and incident response (CIS and Cyber Essential Plus). Strong technical knowledge of Microsoft 365, Azure, and cloud security. Familiarity with frameworks like ISO27001, NIST, and … CIS. Excellent communication skills and a pragmatic, risk-based mindset. Relevant certifications (e.g. AZ-500, CISSP, CISM, CCSP) are highly desirable. This role offers hyrbid working (1-2 days / week in office) as well as open discussion around different working patterns i.e 9-day fortnight and varied start / finish times. The organisation values professional development and More ❯
Information Security Officer Hybrid – Home & London | Permanent | £68,000 | 35 hrs / week (flexible) A rare and brilliant opportunity to join this international development children’s charity, as their new Information Security Officer . You'll be the expert, working closely with the Chief Information Officer and other senior leaders to embed security practices across systems, suppliers, and staff. … experience in ICT security management and incident response (CIS and Cyber Essential Plus). Strong technical knowledge of Microsoft 365, Azure, and cloud security. Familiarity with frameworks like ISO27001, NIST, and … CIS. Excellent communication skills and a pragmatic, risk-based mindset. Relevant certifications (e.g. AZ-500, CISSP, CISM, CCSP) are highly desirable. This role offers hyrbid working (1-2 days / week in office) as well as open discussion around different working patterns i.e 9-day fortnight and varied start / finish times. The organisation values professional development and More ❯
identify vulnerabilities, and suggest improvements. Stay updated on security trends, threats, and best practices. Skills & Qualifications: Mandatory: BSc Degree or equivalent experience Certifications such as CCNA, CCNP, CWNP, ISA /IEC 62443, GICSP (highly desirable) Experience in Control System Network Design Engineering Understanding of IEC62443 and IEC27001 / 2 standards Knowledge of automation and control engineering … disciplines Familiarity with industrial communication protocols (Modbus, DNP3, OPC) and security implications Experience in writing network specifications Experience with multiple system implementation projects and control platforms Experience in upgrades / replacements in automation / control projects Strong knowledge of engineering practices, standards, and procedures Knowledge of modern automation tools, methodologies, and security considerations in OT environments Organized, detail … oriented, inquisitive Desirable: Experience with Rockwell, Honeywell, Schneider PLC / SCADA systems Familiarity with telecom protocols, satellite communications, radio-link tech Experience with OT Intrusion Detection Systems With over 90 years of combined experience, NES Fircroft is a leading engineering staffing provider across multiple sectors worldwide, offering comprehensive support from visas to benefits and accommodation. More ❯
word for our reliability, security and professionalism (or even the many kind words from our clients), etiCloud is part of the elite top 1% of worldwide business with ISO accreditation. Our ISO27001 accreditation relates to our defined and implemented best-practice information security processes. So you can be sure that your data, and … that of your clients, is secure. We're equally proud of our ISO 9001 accreditation as an integral part of it is customer satisfaction. It demonstrates our commitment to our customer-led approach - one of the reasons we've built, and continue to build, our business on referrals. More ❯
to reduce risk to an acceptable level. Knowledge of vulnerability management and incident management practices. Ability to learn GRC tools and best practices. RSA Archer is preferred. Financial and / or Banking industry experience preferred. Ideally qualified in MSc Information Security, CICA, CRISC, CISM and / or Data analysis beneficial but not essential if experience validates skills. Knowledge … of security frameworks (e.g., NIST CSF, ISO27001, SOC1,2). Prince 2, MSP, APMQ advantageous. A desire to continue learning and developing security skills and qualifications If the above role is of interest please apply to this advertisement or call me on or email me directly on Robert Walters Operations Limited is an employment business … per annum Workplace Type: Hybrid Experience Level: Mid Management Location: London FULL_TIME Job Reference: BXLXWS-90F5FB78 Date posted: 24 June 2025 Consultant: Darius Goodarzi london information-technology / information-security 2025-06 08-23 banking London London GB GBP YEAR Robert Walters true More ❯
processes and activities Support the Head of Security and Infrastructure across all functional areas within the security department Liaise with with our Privacy, Governance, Infrastructure, IT Operations, and Product / Engineering teams on all security matters Ensure tools are running correctly Ensure the integrity of our data Investigate Events of Interest (EoIs) Act upon alerts Continuous learning development Documentation … demonstrate knowledge and commitment to cybersecurity: CompTIA Security+ Certified Ethical Hacker (CEH) CompTIA Network+ ISO27001 Foundation or Practitioner AWS Certified Security Familiarity with TCP / IP, DNS, firewalls, VPNs, and VLANs. Basic experience with SIEMs and security logs Understanding of vulnerability management practices Understanding of penetration testing, Threat Hunting, Red Teaming methodologies Familiarity with More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Babcock Mission Critical Services España SA
Location: Bristol, GB, BS16 1EJ Onsite or Hybrid: Job Title: Cyber Security Lead Location: Warrington, Bristol or Leicester Compensation: Up to £58,104 + Benefits Role Type: Full time / Permanent Role ID: SF66104 At Babcock we're working to create a safe and secure world, together, and if you join us, you can play your part as a … out of the ordinary. We are looking for a Cyber Security expert with proven working experience within a complex organisation responsible for critical defence programmes. Closely working with government / MOD client, programme partners, and design collaborators, you will ensure the highest standards of cybersecurity across all stages of development. Day-to-day, you'll have the following responsibilities … entries, Risk Balance Cases, Information Asset Owner forms, Supplier Assurance Questionnaires. Experienced in relevant Security Policy and Cyber Security Frameworks including the GovS 007, MOD Secure by Design (SbD), ISO27001 - Information Security Management Systems, NIST, NCSC IA Guidance Qualifications for the Cyber Security Lead Educated to degree level or holds a relevant professional qualification or equivalent experience. Security Clearance The More ❯
to address specific client needs. Collaborate with clients to design and implement risk mitigation strategies and incident response plans. Provide expert guidance to clients on frameworks (GDPR, NIST, ISO, HIPAA) and related strategies, with a focus on cyber security. Conduct thorough assessments … of clients' existing security programs, identifying gaps and vulnerabilities. Develop and implement effective framework policies, procedures, and standards that align with clients' goals and industry best practices. Conduct tabletops / workshops with clients discussing information security best practices, incident response, and the threat landscape. Advise clients on compliance requirements, such as GDPR, HIPAA, NIST, ISO27001More ❯
based infrastructure (e.g., Microsoft Windows Server, M365). • Monitor system performance and ensure high availability and reliability. • Implement and maintain backup and disaster recovery solutions. Network & Connectivity • Support LAN / WAN infrastructure across multiple sites. • Troubleshoot network issues and optimise performance. • Manage firewalls, VPNs, and network security, collaborating with MSPs / Vendors as required. Cloud & Systems Administration • Manage … Desirable • Experience of Fortinet Vendor products (Fortigate appliances, FortiAnalyser and FortiManager. • Experience of file server migrations to M365 • Experience of migration from hybrid environments to cloud-only (e.g. AD / Entra ID and Exchange / Exchange Online) • Experience with scripting (PowerShell). • Knowledge of ITIL practices. • Exposure to compliance frameworks (Cyber Essentials, ISO27001More ❯