cyber risk governance, and assurance frameworks. This is a cross-functional role with both advisory and hands-on responsibilities, focusing on security assurance, risk management and supporting architecture reviews, vulnerability management, risk assessments, cyber defence posture, driving technical assurance, and embedding risk-aligned security controls across IT and OT systems and secure-by-design practices. You will work across … SSCP, CISM, CRISC, CCSP, SABSA, or SANS GIAC (GSEC, GCCC, GCPM). o Demonstrable experience in designing and implementing secure infrastructure or cloud architectures. o Proven experience with risk assessment methodologies and maintaining enterprise risk registers. o Working knowledge of risk assessment methodologies (e.g. ISO 31000, FAIR, OWASP risk rating). o Strong understanding of Gov Assure, CAF … Azure AD), Microsoft 365 E5, Azure IaaS/PaaS, Windows/Linux/Unix. o Strong knowledge of security tooling such as SIEM, endpoint detection (EDR/XDR), and vulnerability management platforms. o Hands-on experience with policy development, access control models (RBAC, ABAC), and logging standards. o Experience supporting assurance activities or government-mandated reviews (e.g. GovAssure, Secure More ❯
supply chain risks, and SCA techniques Familiarity with SAST/DAST tools and ability to translate results into actionable fixes Practical experience in security code reviews, threat modeling, or vulnerabilityassessment Demonstrated ability to embed security into developer workflows and improve the developer experience Passion for staying current with security trends, tools, and developer-centric security models Preferred More ❯
strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security practices. Manage the relationship with the external SOC, ensuring proactive threat detection and response. Stay updated on industry More ❯
Birmingham, Chelmsley Wood, West Midlands (County), United Kingdom
SSR General & Management
strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed robust security practices. Manage the relationship with the external SOC, ensuring proactive threat detection and response. Stay updated on industry More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Adecco
against cyber threats. Accountabilities and Responsibilities Security Operations Support Serve as a reference point for network security across IT teams, providing guidance and specialised expertise on security measures. Conduct vulnerability assessments, security audits, and continuous monitoring of network traffic for anomalies using advanced security tools. Collaborate with IT teams to ensure security measures are integrated into network architecture and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Adecco
against cyber threats. Accountabilities and Responsibilities Security Operations Support Serve as a reference point for network security across IT teams, providing guidance and specialised expertise on security measures. Conduct vulnerability assessments, security audits, and continuous monitoring of network traffic for anomalies using advanced security tools. Collaborate with IT teams to ensure security measures are integrated into network architecture and More ❯
Woking, Surrey, England, United Kingdom Hybrid / WFH Options
Nomad Foods
and standards that support risk mitigation and compliance efforts in line with industry standards. Play an active, hands-on role in security initiatives and GRC activities, including incident management, vulnerability assessments, and compliance reviews. Provide reporting to leadership committees and the Board. About you: We need someone who can communicate at all levels and with the ability to summarise More ❯
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
degree in Management Information Systems. Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Equivalent Education and/or Experience May have an equivalent combination of education … Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus More ❯
maintain virtualised environments (e.g., VMware, Hyper-V) to facilitate scalable and secure development processes. This includes configuring virtual machines, monitoring system health, and automating deployment workflows for seamless operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate … advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits, and patch management for both IT and OT systems. Collaborate with cybersecurity and product teams to address vulnerabilities, apply security patches … security settings. Virtualisation: Expertise in virtualisation technologies such as VMware and Hyper-V, with a demonstrated ability to set up, maintain, and optimise virtual environments for industrial applications. Cybersecurity & Vulnerability Management: Strong understanding of cybersecurity practices and vulnerability management for both IT and OT systems. Experience implementing vulnerability assessments reports, securing systems, and applying necessary patches or More ❯
maintain virtualised environments (e.g., VMware, Hyper-V) to facilitate scalable and secure development processes. This includes configuring virtual machines, monitoring system health, and automating deployment workflows for seamless operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate … advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits, and patch management for both IT and OT systems. Collaborate with cybersecurity and product teams to address vulnerabilities, apply security patches … security settings. Virtualisation: Expertise in virtualisation technologies such as VMware and Hyper-V, with a demonstrated ability to set up, maintain, and optimise virtual environments for industrial applications. Cybersecurity & Vulnerability Management: Strong understanding of cybersecurity practices and vulnerability management for both IT and OT systems. Experience implementing vulnerability assessments reports, securing systems, and applying necessary patches or More ❯
london (new malden), south east england, united kingdom
Northrop Grumman UK
maintain virtualised environments (e.g., VMware, Hyper-V) to facilitate scalable and secure development processes. This includes configuring virtual machines, monitoring system health, and automating deployment workflows for seamless operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate … advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits, and patch management for both IT and OT systems. Collaborate with cybersecurity and product teams to address vulnerabilities, apply security patches … security settings. Virtualisation: Expertise in virtualisation technologies such as VMware and Hyper-V, with a demonstrated ability to set up, maintain, and optimise virtual environments for industrial applications. Cybersecurity & Vulnerability Management: Strong understanding of cybersecurity practices and vulnerability management for both IT and OT systems. Experience implementing vulnerability assessments reports, securing systems, and applying necessary patches or More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
MFK Recruitment
and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerability management, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement long More ❯
system logs and network traffic to identify suspicious activity and potential threats. *Respond to security incidents and support forensic investigations. *Develop and maintain security protocols, policies, and procedures. *Conduct vulnerability assessments and recommend mitigation strategies. *Deliver cybersecurity awareness training and guidance to staff. *Maintain the information security risk register and support audit processes. *Collaborate with IT and operational teams … We are proud to be an equal opportunities employer. Keywords IT Security Specialist, Cybersecurity Analyst, SOC Analyst, Azure Security, Information Security, Firewalls, Intrusion Detection, Antivirus, ITIL, CISSP, Security Compliance, Vulnerability Management, Risk Register, Public Sector IT, Hybrid Role, Manchester Jobs, Security Awareness Training More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
pipelines for integration, development, and deployment. Implement and maintain monitoring systems. Maintain and enhance the team's cloud infrastructure. Promote and implement automation processes. Enhance security protocols by conducting vulnerability assessments and risk management to deploy cybersecurity measures. Technical Proficient in Terraform and AWS. Solid experience with CI/CD, ideally with GitLab CI and Jenkins. Extensive experience using More ❯