growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Exploitation Analyst, Digital Network Exploitation Analyst, Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. … You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Exploitation Analyst, Digital Network Exploitation Analyst, Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. … You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Exploitation Analyst, Digital Network Exploitation Analyst, Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. … You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Exploitation Analyst, Digital Network Exploitation Analyst, Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. … You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Exploitation Analyst, Digital Network Exploitation Analyst, Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. … You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Exploitation Analyst, Digital Network Exploitation Analyst, Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. … You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Exploitation Analyst, Digital Network Exploitation Analyst, Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. … You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The More ❯
as a significant strength, and it shows: ATS is consistently ranked as a top workplace among DC area firms and continues to grow. We are actively hiring a Digital Network Exploitation Analyst to join our Defense & Homeland Security Division working in Annapolis Junction, MD. We are hiring Digital Network Exploitation Analysts (DNEAs) of all skill levels for … a variety of roles to support core Intelligence Community (IC) missions through our Next Generation Analysts portfolio. Our national security depends on technology as never before, and this dependence is growing at an ever-increasing rate. As a cyber professional in the intelligence community, you will work as part of a team on the frontlines against our cyber adversaries. … opportunities will give you the chance to showcase your talent and expertise while working on the cutting edge of national cybersecurity missions. Join us in helping advance our national security interests as part of the world's most advanced team of cyber professionals. RESPONSIBILITIES • Evaluate target opportunities using all source data to understand and map target networks, and to More ❯
Security Project Manager Location: Onsite (Full-time, 5 days/week) Start Date: ASAP Duration: 12 months (with potential for renewal) Rate: Up to £540/day About the Role We are seeking an experienced Security Project Manager to lead and deliver critical IT Security initiatives within a large-scale enterprise environment. This is a fantastic opportunity … to work on high-impact projects in a dynamic and collaborative setting. Key Responsibilities Drive end-to-end delivery of complex IT Security projects Engage with Cyber Intelligence and Cyber Defence teams Manage project governance, budgets, and reporting to senior stakeholders Ensure operational readiness and risk mitigation across business and technology functions Key Qualifications 10–15 years of IT … Project Management experience, ideally in financial services or large enterprises Proven success in delivering: NetworkSecurity implementations (e.g., WAF, IDS/IPS) Adversary protection and threat mitigation initiatives Splunk integration and security monitoring Security Operations programs (process design, tooling, readiness) Strong stakeholder management and communication skills Deep understanding of cybersecurity frameworks, controls, and best practices Familiarity More ❯
Security Project Manager Location: Onsite (Full-time, 5 days/week) Start Date: ASAP Duration: 12 months (with potential for renewal) Rate: Up to £540/day About the Role We are seeking an experienced Security Project Manager to lead and deliver critical IT Security initiatives within a large-scale enterprise environment. This is a fantastic opportunity … to work on high-impact projects in a dynamic and collaborative setting. Key Responsibilities Drive end-to-end delivery of complex IT Security projects Engage with Cyber Intelligence and Cyber Defence teams Manage project governance, budgets, and reporting to senior stakeholders Ensure operational readiness and risk mitigation across business and technology functions Key Qualifications 10–15 years of IT … Project Management experience, ideally in financial services or large enterprises Proven success in delivering: NetworkSecurity implementations (e.g., WAF, IDS/IPS) Adversary protection and threat mitigation initiatives Splunk integration and security monitoring Security Operations programs (process design, tooling, readiness) Strong stakeholder management and communication skills Deep understanding of cybersecurity frameworks, controls, and best practices Familiarity More ❯
shows: ATS is consistently ranked as a top workplace among DC area firms and continues to grow. We are actively hiring a Exploitation Analyst to join our Defense & Homeland Security Division working in Annapolis Junction, MD. We are hiring Exploitation Analysts (EAs) of all skill levels for a variety of roles to support core Intelligence Community (IC) missions through … our Next Generation Analysts portfolio. Our national security depends on technology as never before, and this dependence is growing at an ever-increasing rate. As a cyber professional in the intelligence community, you will work as part of a team on the frontlines against our cyber adversaries. ATS is hiring cyber professionals with technical expertise and a driving desire … opportunities will give you the chance to showcase your talent and expertise while working on the cutting edge of national cybersecurity missions. Join us in helping advance our national security interests as part of the world's most advanced team of cyber professionals. RESPONSIBILITIES • Evaluate target opportunities using all source data to understand and map target networks, and to More ❯
Cloud Security Consultant, Google Cloud Professional Services link Copy link corporate_fare Google place London, UK Mid Experience driving progress, solving problems, and mentoring more junior team members; deeper expertise and applied knowledge within relevant area. Apply link Copy link Bachelor's degree or equivalent practical experience. 5 years of experience architecting, developing, or maintaining secure cloud solutions. Experience … with Cloud Identity and Access Management, networksecurity, data security, regulatory compliance frameworks, and creating security architectures. Experience with Security Orchestration, Automation, and Response (SOAR) platforms. Preferred qualifications: Experience in Cloud Security delivered within the context of customer-facing roles. Experience managing internal or external customer-facing projects to completion while working with cross … functional teams. Experience in securing Google Cloud or other cloud environments. Experience in understanding attacks and mitigation methods, in two or more of the following: network protocols and secure network design; web application security, security assessments and pen testing, authentication and access control, applied cryptography and security protocols, security monitoring and intrusion detection, Incident More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … a System Vulnerability Analyst to identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks to effects on operations and missions supported by those systems. You will compare and contrast various system attack techniques and develop operationally effective countermeasures. … missions being studied. The Level 2 SVA shall possess the following capabilities: Relevant experience must be in computer or information systems design/development, programming, information/cyber/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the More ❯
Network Automation Engineer CACI Network Services is a rapidly expanding specialist IT and Networks consultancy offering a wide variety of opportunities to work within challenging and exciting environments with our major clients in Global Media, Banking, Government, Telecoms & Utilities Essential Experience: (must -have skills/qualifications) Solid experience of working in a high-pressure, large-scale, global environment. … Solid understanding of Web Security - Web Application Firewalls & API Security Gateways Experience doing development & tooling for Network & Security Engineering Teams Ability to communicate at all levels. Solid understanding of distributed multi-tier architectures. Solid understanding of change control procedures and incident reporting methodologies. Automating infrastructure provisioning - IaaS & Automating application delivery - PaaS Successful, proven experience (minimum … Significant experience of different delivery methodologies (waterfall, agile/SaFE/LeSS/kanban/xp) Essential Technical Experience: Good understanding of Firewalls Good experience with automation around Networking & Security devices Minimum 5 years' experience in a DevOps/Automation role Good experience with Automation Frameworks specifically Ginger Solid Development Skills (Bash, Python) Solid Development Skills in developing and More ❯
Network Automation Engineer CACI Network Services is a rapidly expanding specialist IT and Networks consultancy offering a wide variety of opportunities to work within challenging and exciting environments with our major clients in Global Media, Banking, Government, Telecoms & Utilities Essential Experience: (must -have skills/qualifications) Solid experience of working in a high-pressure, large-scale, global environment. … Solid understanding of Web Security - Web Application Firewalls & API Security Gateways Experience doing development & tooling for Network & Security Engineering Teams Ability to communicate at all levels. Solid understanding of distributed multi-tier architectures. Solid understanding of change control procedures and incident reporting methodologies. Automating infrastructure provisioning - IaaS & Automating application delivery - PaaS Successful, proven experience (minimum … Significant experience of different delivery methodologies (waterfall, agile/SaFE/LeSS/kanban/xp) Essential Technical Experience: Good understanding of Firewalls Good experience with automation around Networking & Security devices Minimum 5 years' experience in a DevOps/Automation role Good experience with Automation Frameworks specifically Ginger Solid Development Skills (Bash, Python) Solid Development Skills in developing and More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … a System Vulnerability Analyst to identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks to effects on operations and missions supported by those systems. You will compare and contrast various system attack techniques and develop operationally effective countermeasures. … missions being studied. The Level 2 SVA shall possess the following capabilities: Relevant experience must be in computer or information systems design/development, programming, information/cyber/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … a System Vulnerability Analyst to identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks to effects on operations and missions supported by those systems. You will compare and contrast various system attack techniques and develop operationally effective countermeasures. … missions being studied. The Level 2 SVA shall possess the following capabilities: Relevant experience must be in computer or information systems design/development, programming, information/cyber/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the More ❯
Employer description: IT Answers provides managed IT services, cloud solutions, and cybersecurity to help businesses boost efficiency, security, and digital transformation. Overview: IT Answers are seeking a motivated IT Network Technician Apprentice who is eager to begin their career in IT networking. This apprenticeship provides hands-on experience, structured training, and mentorship from senior professionals within our Managed … Service Provider (MSP) environment. You will support our network engineering team by assisting with troubleshooting, installations, and ongoing maintenance of client networks. Responsibilities: Assist in providing first-line support for network-related queries and issues. Support senior engineers in the configuration, deployment, and troubleshooting ofrouters, switches, firewalls, and wireless infrastructure. Monitor network performance and assist in identifying … and resolving issues Help maintain accurate and updated network documentation. Participate in customer site visits alongside experienced engineers to gain practicalon-site experience. Learn and apply best practices related to networksecurity, protocols, andinfrastructure management. Engage proactively in training sessions and achieve relevant certifications as part ofyour apprenticeship. Desirable skills: A strong interest in IT and networking More ❯
Operational Technology (OT) Cyber Security Analyst Drax Power Station, Selby Hybrid working Permanent, full time Closing date: Monday 14th July 2025 Who we are Were not just talking about making a difference, were making it happen. We generate dispatchable, renewable power and create stable energy in an uncertain world. Building on our proud heritage, we have ambition to become … and vulnerabilities. The role will play a key role in ensuring the reliability and safety of UK critical national infrastructure. Cybersecurity Monitoring: Continuously monitor the efficacy and maintain OT security monitoring solutions deployed within the OT environment. Threat Analysis: Analysing and identifying potential cyber threats and vulnerabilities, assess their impact, and prioritize responses accordingly. Incident Response: Developing and implementing … handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. Vulnerability Management: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate penetration testing of OT systems to identify weaknesses and recommend security improvements. Policy Development: Contributing to development and maintenance of cybersecurity More ❯
Operational Technology (OT) Cyber Security Analyst Drax Power Station, Selby Hybrid working Permanent, full time Closing date: Monday 14th July 2025 Who we are Were not just talking about making a difference, were making it happen. We generate dispatchable, renewable power and create stable energy in an uncertain world. Building on our proud heritage, we have ambition to become … and vulnerabilities. The role will play a key role in ensuring the reliability and safety of UK critical national infrastructure. Cybersecurity Monitoring: Continuously monitor the efficacy and maintain OT security monitoring solutions deployed within the OT environment. Threat Analysis: Analysing and identifying potential cyber threats and vulnerabilities, assess their impact, and prioritize responses accordingly. Incident Response: Developing and implementing … handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. Vulnerability Management: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate penetration testing of OT systems to identify weaknesses and recommend security improvements. Policy Development: Contributing to development and maintenance of cybersecurity More ❯
Sheffield, South Yorkshire, England, United Kingdom
Hays Specialist Recruitment Limited
Cyber Security ManagerSheffieldUp to £75,000 + Benefits Limited Hybrid I'm working with a renowned organisation in Sheffield looking for a leader to run their cyber function. The ideal candidate will have a solid background in cyber, infrastructure and operations. This role is based in Sheffield and applicants will need to be within a commutable distance. This role … will require ability to obtain SC clearance. What you'll be doing: Running the day to day cyber security function Managing the MSSP Protecting the organisation from contemporary cyber threats Developing the overarching cybersecurity strategy Aligning the organisation to standards such as ISO27001 and Cyber Essentials + Using cyber tools to complete strategic threat analysis Using the findings from … threat analysis to guide SIEM and EDR tunings Incident management Mentorship of small team Fostering cyber security awareness across the organisation Using your knowledge of IT networking to enhance networksecurity What we're looking for: Security leadership experience A hybrid of technical cyber security and GRC-led information security understanding IT operations and More ❯
Role: Information Security Consultant Location: Leeds, West Yorkshire Salary: £60,000 - £75,000 PLUS 25 Days Holiday, Vendor Certifications, International Travel, Private Pension About the Company: Our client, a global leader in Sustainability Consulting, is looking for an Information Security Consultant to join their growing Information Security Team. This exciting role provides an opportunity to shape and … strengthen security practices across the organization. If you are passionate about cybersecurity, have a strong technical background, and thrive in a fast-paced environment, we want to hear from you. Position Overview: As an Information Security Consultant, you will collaborate with the IT Security Team to advise, develop, and maintain security processes and policies. Your expertise … will guide the organization in enhancing security capabilities across its global infrastructure. This role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and More ❯
Role: Cyber Security Engineer Location: Leeds, West Yorkshire Salary: £55,000 - £70,000 PLUS 25 Days Holiday, Vendor Certifications, International Travel, Private Pension About the Company: Our client, a global leader in Sustainability Consulting, is looking for a Cyber Security Engineer to join their growing Information Security Team. This exciting role provides an opportunity to shape and … strengthen security practices across the organization. If you are passionate about cybersecurity, have a strong technical background, and thrive in a fast-paced environment, we want to hear from you. Position Overview: As a Cyber Security Engineer, you will collaborate with the IT Security Team to advise, develop, and maintain security processes and policies. Your expertise … will guide the organization in enhancing security capabilities across its global infrastructure. This role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and More ❯
Defense Information Systems Agency (DISA). RBR-Technologies is seeking a System Engineer to support one of our customers in Maryland. RESPONSIBILITIES This position will be focused on cyber security including identifying threats, analyzing risk, and mitigating operating system vulnerabilities and analysis tools. Experience securing applications and containers Analyzes user's requirements, concept of operations documents, and high level … be substituted for a bachelor's degree. Experience identifying threats, analyzing risk, and mitigating operating system vulnerabilities and analysis tools (e.g. Nessus) Experience securing applications and containers Experience Using Security information and Event Management (SEIM) tools (e.g. Elasticsearch, SPLUNK) Experience in Intrusion Detection and Prevention Systems (IDS/IPS) implementation, monitoring, and analysis Desire experience with Cisco Secure Network Analytics (StealthWatch), Cisco Secure End Point (AMP), and Cisco Identify Services Engine (ISE) Familiar with DoD Risk Management Framework Familiar with secure, zero-trust, network architectures Experience writing networksecurity documentation and other systems engineering process and lifecycle artifacts A career at RBR-Technologies doesn't mean you have to make sacrifices in other areas of More ❯
the Role:We are seeking a highly motivated and detail-oriented SOC Analyst to join our on-site team in Wiltshire. This is a critical role within our cyber security operations, responsible for monitoring, detecting, and responding to security incidents, ensuring compliance, and maintaining the integrity of our systems and networks. Key Responsibilities: * Monitor and analyse security events using SIEM tools* Conduct incident response and triage activities* Perform regular security assessments and compliance checks* Maintain and improve logging and monitoring capabilities* Collaborate with internal teams to enhance security posture* Document incidents, findings, and recommendations clearly and accurately* Stay current with emerging threats and vulnerabilities* Demonstrate an understanding of the wider cyber security landscape … and risks Essential Skills & Experience: * Minimum of 2 years' experience in a SOC or cyber security role* Strong understanding of SIEM technologies and incident response processes* Solid knowledge of computer networks, protocols, and infrastructure* Experience with security monitoring, logging, and compliance frameworks* Excellent analytical skills and a keen eye for detail* Strong written and verbal communication skills Desirable More ❯