Manchester, England, United Kingdom Hybrid/Remote Options
iO Associates
architecture or engineering) Strong communication and presentation skills, with the confidence to engage at all levels Hands-on experience with security tools such as SIEM, SOAR, EDR, WAF or vulnerabilitymanagement A desire to move into a solutions or pre-sales role , combining your technical expertise with commercial awareness Energy, curiosity and a genuine passion for helping customers More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid/Remote Options
Operations Resources
the role is to develop policies to protect the Companies data and networks which is a Microsoft-centric environment. Secondary, you should have been involved in incident response and vulnerability management. This is a new interesting role which will surely evolve over time. This is a full time permanent position based on site and does NOT offer remote working. More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Randstad Digital
VMware environments. Troubleshoot and resolve system, platform, and network issues with minimal supervision. Apply knowledge of networking technologies to support infrastructure needs. Implement and maintain cybersecurity best practices and vulnerabilitymanagement processes. Utilize Python, Bash, and APIs for scripting, automation, and integrations. Continuously challenge and improve existing processes, driving automation and operational excellence. Collaborate effectively with cross-functional … Linux (RHEL) administration. Proven expertise with Red Hat Satellite installation, configuration, and management. Hands-on experience with Ansible/AAP and Infrastructure as Code practices. Practical knowledge of VMware management and upgrades. Solid understanding of networking fundamentals and cybersecurity principles. Scripting experience with Python and Bash; familiarity with working via APIs. Excellent problem-solving abilities and ownership mindset. Strong More ❯
VMware environments. Troubleshoot and resolve system, platform, and network issues with minimal supervision. Apply knowledge of networking technologies to support infrastructure needs. Implement and maintain cybersecurity best practices and vulnerabilitymanagement processes. Utilize Python, Bash, and APIs for scripting, automation, and integrations. Continuously challenge and improve existing processes, driving automation and operational excellence. Collaborate effectively with cross-functional … Linux (RHEL) administration. Proven expertise with Red Hat Satellite installation, configuration, and management. Hands-on experience with Ansible/AAP and Infrastructure as Code practices. Practical knowledge of VMware management and upgrades. Solid understanding of networking fundamentals and cybersecurity principles. Scripting experience with Python and Bash; familiarity with working via APIs. Excellent problem-solving abilities and ownership mindset. Strong More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Randstad Digital
VMware environments. Troubleshoot and resolve system, platform, and network issues with minimal supervision. Apply knowledge of networking technologies to support infrastructure needs. Implement and maintain cybersecurity best practices and vulnerabilitymanagement processes. Utilize Python, Bash, and APIs for scripting, automation, and integrations. Continuously challenge and improve existing processes, driving automation and operational excellence. Collaborate effectively with cross-functional … Linux (RHEL) administration. Proven expertise with Red Hat Satellite installation, configuration, and management. Hands-on experience with Ansible/AAP and Infrastructure as Code practices. Practical knowledge of VMware management and upgrades. Solid understanding of networking fundamentals and cybersecurity principles. Scripting experience with Python and Bash; familiarity with working via APIs. Excellent problem-solving abilities and ownership mindset. Strong More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Randstad Technologies
VMware environments. Troubleshoot and resolve system, platform, and network issues with minimal supervision. Apply knowledge of networking technologies to support infrastructure needs. Implement and maintain cybersecurity best practices and vulnerabilitymanagement processes. Utilize Python, Bash, and APIs for scripting, automation, and integrations. Continuously challenge and improve existing processes, driving automation and operational excellence. Collaborate effectively with cross-functional … Linux (RHEL) administration. Proven expertise with Red Hat Satellite installation, configuration, and management. Hands-on experience with Ansible/AAP and Infrastructure as Code practices. Practical knowledge of VMware management and upgrades. Solid understanding of networking fundamentals and cybersecurity principles. Scripting experience with Python and Bash; familiarity with working via APIs. Excellent problem-solving abilities and ownership mindset. Strong More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid/Remote Options
Morson Edge
Operations - Windows & Linux administration - Regulatory - NIS/CAF and other assessment frameworks - Governance, process and documentation - Operational Technology/SCADA - Telecoms & Transport networks - Deployment of SIEMs, IDAM & PAM, and VulnerabilityManagement products - Legacy technologies Requirements • Skills and experience in understanding at a technical level security operation. • Awareness of key legislation and regulation impacting IT/OT General Control More ❯
Knutsford, Cheshire, United Kingdom Hybrid/Remote Options
Applause IT Recruitment Ltd
such as ISO 27001 and SOC 2 Type II. This is a visible and strategic position - ideal for someone who enjoys combining technical depth with governance, audit, and risk management responsibilities. Key Responsibilities Develop and maintain the company's information security strategy, policies, and frameworks. Oversee day-to-day security operations including access control, patching, log review, and alert … Strong understanding of ISMS principles (ISO 27001) and audit support for SOC 2 Type II. Hands-on experience with security tools and controls - SIEM, IAM/PAM, endpoint protection, vulnerability management. Working knowledge of data-protection and privacy standards (GDPR, HIPAA). Excellent communication skills - able to collaborate across technical and non-technical teams. Relevant certifications welcomed - CISSP, CISM More ❯
Leeds, West Yorkshire, United Kingdom Hybrid/Remote Options
Corecom Consulting
Leeds is seeking a Full-Stack PHP Developer to join its small but growing team. The business has evolved from dark web monitoring into a full External Attack Surface Management (EASM) platform. The role is focused on enhancing, maintaining, and scaling this SaaS platform while embedding secure coding practices. Key Responsibilities * Enhance and maintain the SaaS platform hosted in … and general cybersecurity principles. * Ability to communicate effectively with technical and non-technical stakeholders. * Experience working in small teams or start-up environments. Desirable Skills * Experience in cybersecurity SaaS, vulnerabilitymanagement, or EASM. * Familiarity with serverless AWS infrastructure and cloud-native architectures. * Exposure to AI/ML in the context of cybersecurity. * Knowledge of DevOps practices, CI/ More ❯
Bristol, Avon, South West, United Kingdom Hybrid/Remote Options
Alexander Mae (Bristol) Ltd
desk Assist with pre-sales technical support Providing technical support by way of support tickets and emails Answering the phone when needed Completing business as usual activities such as vulnerabilitymanagement, patching, backend systems troubleshooting Acting as primary technical lead Training other members of the desk, or assisting non technical staff with support issues Answering to the service More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid/Remote Options
Last Mile Infrastructure Limited
our digital resilience. As a Cyber Security Lead, reporting into the Director, Technology and Data, youll lead and develop a team of security professionals, oversee the delivery and ongoing management of our security infrastructure, and act as the go-to technical expert in threat detection, incident response, and vulnerability management. Were looking for someone with strong leadership skills … cyber security role, with a proven track record of leading and mentoring a team. Extensive experience with security technologies such as SIEM, firewalls, intrusion detection/prevention systems, and vulnerability scanning tools. In-depth knowledge of incident response procedures, threat hunting, and forensic investigation techniques. Strong understanding of networking protocols, operating systems, and cloud security principles. Qualifications Bachelor's … wastewater. Working through our operating companiesUKPS(in South of England and Wales),Energetics(in Scotland, North Wales and the North of England) and our asset adoption businessLast Mile Asset Management, we offer a one-stop shop for new utility connections. Were proud to be both aGreat Place to Workcertified business and a Living Wage Employer, reflecting our commitment to More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid/Remote Options
Hirexa Solutions UK
Pod Security Policies (or the newer Pod Security Admission controller), and GKE Sandbox. Configuring and enforcing network policies to control traffic between pods and namespaces. Using container scanning and vulnerabilitymanagement tools to secure container images. Implementing Binary Authorization to ensure only trusted images are deployed to clusters. Establishing robust IAM policies for GKE and related GCP services. … Excellent communication, stakeholder management, and problem-solving skills. Relevant professional certifications (e.g., Google Cloud Certified Professional Cloud Architect or DevOps Engineer) are a plus. More ❯
Lincoln, Lincolnshire, East Midlands, United Kingdom Hybrid/Remote Options
ITSS Recruitment Ltd
responsible for driving the technical direction, team growth, and execution of software initiatives that support our business goals. The ideal candidate combines deep technical expertise with strong leadership, project management, and cross-functional collaboration skills. We are ideally looking for someone who can primarily be office based, with flexibility for home working when required. Key Responsibilities * Lead and mentor … and resource plans. * Serve as the technical voice in executive discussions and strategic planning. * Ensure all systems and software meet internal standards and external compliance requirements. * Oversee incident response, vulnerabilitymanagement, and disaster recovery plans. As a visionary and strategic technology leader, the Director of Software Engineering is responsible for shaping and executing the software development strategy that More ❯
Saint Paul, Minnesota, United States Hybrid/Remote Options
Genesis10
LLMs); Automating and integrating application security capabilities in the SDLC/DevOps processes for AI/ML applications. Expert knowledge of Application Security practices including SAST, DAST, SCA, Application Vulnerability Management. Foundational knowledge of Cloud Security and IAM (Identity and Access Management) principles. Education/Experience: Associate's degree in computer programming or relevant field required. Bachelor's … LLMs); Automating and integrating application security capabilities in the SDLC/DevOps processes for AI/ML applications. Expert knowledge of Application Security practices including SAST, DAST, SCA, Application Vulnerability Management. Foundational knowledge of Cloud Security and IAM (Identity and Access Management) principles. Only candidates available and ready to work directly as Genesis10 employees will be considered for More ❯
Birmingham, England, United Kingdom Hybrid/Remote Options
EML
that are transforming businesses worldwide. Key Responsibilities: Cloud Engineering: Design, deploy, and manage scalable, secure, and cost-efficient cloud infrastructure. Implement Infrastructure as Code (IaC) to automate provisioning and management of resources while ensuring security best practices. Optimize cloud resources for performance, cost efficiency, and security compliance. Ensure compliance with security and governance standards, including encryption, access control, and … vulnerability management. DevOps: Build and maintain automated workflows for secure application deployment and testing. Collaborate with development teams to integrate DevOps practices with security principles into the software development lifecycle. Implement containerization and orchestration with secure configurations to protect workloads. Continuously improve build and deployment processes with a focus on minimizing security risks. Site Reliability Engineering (SRE): Ensure system … into cloud, DevOps, SRE, database, and network/system operations. Infrastructure Expertise : Experience in managing secure cloud, on-premises, and hybrid environments. Automation : Proficiency in automating workflows and infrastructure management with security controls. Reliability Practices : Strong knowledge of monitoring, incident management, and performance optimization with security considerations. Database Management : Experience with secure database design, optimization, and administration. More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Adecco
public sector organisations. What You'll Do: As a Senior Business Analyst, you will: Engage with public sector organisations to enhance cyber security services. Model processes and systems around vulnerability management. Share insights with service owners and project teams. Identify and recommend improvements across multiple organisations. Collaborate with User Researchers and Service Designers to meet user needs. Monitor and … measure service effectiveness through KPIs. Who You Are: We're looking for a dynamic professional with: Expertise in context, problem, and option analysis. Strong user experience and stakeholder relationship management skills. Proven ability in requirements definition and management. Experience in business modelling and process improvement. A solid understanding of cyber security risks and best practises. Proficiency in agile working More ❯