Portsmouth, England, United Kingdom Hybrid/Remote Options
Cloud People
and managed services to customers across enterprise, public sector and fast growing scale ups. Its Security Practice protects clients through capabilities including Managed Detection and Response (MDR), Threat Hunting, VulnerabilityManagement, Penetration Testing and Incident Response, supported by a consulting led Security Advisory practice. As a Senior Security Engineer, you will be responsible for designing, implementing and maintaining … CrowdStrike or Elastic • Proven ability to build and tune detection rules, dashboards and automation playbooks • Knowledge of scripting or automation using KQL, PowerShell, Python or similar • Familiarity with log management, APIs and data normalisation • Understanding of cloud security across Azure, AWS and M365 • Strong grasp of network, system and identity security fundamentals • Analytical mindset and passion for problem solving … CK mapping and detection engineering frameworks • Experience using Infrastructure as Code such as Terraform, Bicep or ARM templates • Integration experience with ServiceNow or ITSM tools • Exposure to threat hunting, vulnerabilitymanagement or red team automation What You’ll Get • Competitive salary £65,000 to £85,000 depending on experience • Hybrid and flexible working arrangements • Funded training and certification More ❯
Portsmouth, England, United Kingdom Hybrid/Remote Options
Cloud People
services to customers across enterprise, public sector and fast growing scale ups. Its Security Practice protects clients through a powerful mix of Managed Detection and Response (MDR), Threat Hunting, VulnerabilityManagement, Penetration Testing and Incident Response, supported by a world class Security Advisory function. As a Senior SOC Analyst, you will take a leading role in identifying, investigating … and a collaborative mindset Passion for learning and knowledge sharing Desirable Experience Experience with scripting or automation using PowerShell, KQL or Python Exposure to threat hunting, threat intelligence or vulnerabilitymanagement Experience mentoring or coaching junior analysts What You’ll Get Competitive salary £40,000 to £55,000 depending on experience Hybrid working and flexible hours Funded training More ❯
GCP) Hands-on with IaC tools (Terraform, Bicep, CloudFormation) and CI/CD pipelines Proficient in Python or Bash scripting Knowledge of cloud security best practices (e.g. IAM, encryption, vulnerabilitymanagement) Familiar with Docker, Kubernetes, serverless, and event-driven architectures Comfortable working with both SQL and NoSQL databases A passion for engineering excellence and staying on top of … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Bristol, Gloucestershire, United Kingdom Hybrid/Remote Options
Experis
GCP) Hands-on with IaC tools (Terraform, Bicep, CloudFormation) and CI/CD pipelines Proficient in Python or Bash scripting Knowledge of cloud security best practices (e.g. IAM, encryption, vulnerabilitymanagement) Familiar with Docker, Kubernetes, serverless, and event-driven architectures Comfortable working with both SQL and NoSQL databases A passion for engineering excellence and staying on top of … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid/Remote Options
Littlefish
deliver solutions that strengthen resilience and enable smarter security operations. You will: Architect & Design : Build and evolve secure frameworks using Microsoft Security (Defender, Sentinel, Purview, Entra) and integrate Qualys vulnerabilitymanagement for continuous threat detection and remediation. Automate & Innovate: Lead the charge on automation (SOAR, IaC, workflow automation) and embed Gen AI into security operations, threat intelligence, and … . Strategic mindset, strong communication skills, and a passion for emerging tech. The following would also be of interest: Certifications in automation/cloud (Azure Solutions Architect, Terraform, GIAC), vulnerabilitymanagement (Qualys, ISO 27001, NIST). Experience with SOAR, SIEM, XDR, and cloud-native security (especially Azure). Pre-sales or solution architecture exposure. What can we offer More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Sadler Recruitment
most inclusive employers in the UK. The Head of Information and Cyber Security will design, develop, and coordinate all aspects of the Information Security strategy, encompassing governance and risk management, incident response, and disaster recovery. The Head of Information and Cyber Security will manage a multitude of third-party partnerships from the SOC, to vulnerabilitymanagement, to … s security strategy and roadmap, aligned to NIST. Oversee a small internal team (2 privacy/GDPR specialists). Manage all external 3rd party security contracts/relationships -SOC, vulnerabilitymanagement, patching, and firewall operations. Oversee incident response, risk mitigation, and disaster recovery planning. Support delivery of Cyber Essentials Plus accreditation. Present cyber and data risks at risk … of technical principles (firewalls, phishing, vulnerabilities, routing, MFA, etc) - you can challenge, not necessarily configure. Knowledge of NIST and experience supporting Cyber Essentials Plus or similar certifications. Excellent stakeholder management and communication skills and comfortable presenting to execs, trustees, and end users alike. Leadership style that builds trust and collaboration, more about influence than command. Strategic mindset with patience More ❯
most inclusive employers in the UK. The Head of Information and Cyber Security will design, develop, and coordinate all aspects of the Information Security strategy, encompassing governance and risk management, incident response, and disaster recovery. The Head of Information and Cyber Security will manage a multitude of third-party partnerships from the SOC, to vulnerabilitymanagement, to … s security strategy and roadmap, aligned to NIST. Oversee a small internal team (2 privacy/GDPR specialists). Manage all external 3rd party security contracts/relationships -SOC, vulnerabilitymanagement, patching, and firewall operations. Oversee incident response, risk mitigation, and disaster recovery planning. Support delivery of Cyber Essentials Plus accreditation. Present cyber and data risks at risk … of technical principles (firewalls, phishing, vulnerabilities, routing, MFA, etc) - you can challenge, not necessarily configure. Knowledge of NIST and experience supporting Cyber Essentials Plus or similar certifications. Excellent stakeholder management and communication skills and comfortable presenting to execs, trustees, and end users alike. Leadership style that builds trust and collaboration, more about influence than command. Strategic mindset with patience More ❯
Hi All, I’m helping a growing FS business find a VulnerabilityManagement specialist to join their cyber function! This is your opportunity to lead the Vulnerability programme for a FTSE 250 Business! To be successful in this role you will have experience with: VulnerabilityManagement (Vendor agnostic) Managing 3rd parties Leading business projects Salary More ❯
Crewe, England, United Kingdom Hybrid/Remote Options
DCS Technology
Security Analyst to play a key role in protecting our client’s systems, networks, and data. This is an exciting opportunity to lead on threat detection, incident response, and vulnerabilitymanagement , while driving continuous improvement across the organisation’s security posture. You’ll collaborate closely with infrastructure, development, and compliance teams to maintain high standards of cyber resilience … and uphold key frameworks such as ISO 27001 and Cyber Essentials Plus . Key Responsibilities: • Lead threat detection, incident response, and vulnerabilitymanagement activities • Strengthen cyber security posture across cloud, infrastructure, and applications • Provide expert guidance to development teams on secure SDLC practices • Maintain compliance with ISO 27001 and Cyber Essentials Plus standards • Mentor junior analysts and support More ❯
Crewe, Cheshire, England, United Kingdom Hybrid/Remote Options
DCS Recruitment
Security Analyst to play a key role in protecting our client's systems, networks, and data. This is an exciting opportunity to lead on threat detection, incident response, and vulnerabilitymanagement , while driving continuous improvement across the organisation's security posture. You'll collaborate closely with infrastructure, development, and compliance teams to maintain high standards of cyber resilience … and uphold key frameworks such as ISO 27001 and Cyber Essentials Plus . Key Responsibilities: * Lead threat detection, incident response, and vulnerabilitymanagement activities * Strengthen cyber security posture across cloud, infrastructure, and applications * Provide expert guidance to development teams on secure SDLC practices * Maintain compliance with ISO 27001 and Cyber Essentials Plus standards * Mentor junior analysts and support More ❯
West London, London, United Kingdom Hybrid/Remote Options
Sanderson Recruitment
are effectively deployed, maintained and optimised, while driving efficiencies and ensuring secure, compliant infrastructure. This role requires a background and strong expertise in enterprise toolsets, automation technologies and patch management processes. Engagement via Umbrella Company Only; all taxes & NI deducted at source. General responsibilities Lead operations of enterprise tooling platforms including SCCM, Scorch, BMC, Ansible and MuleSoft. Define and … consistent monitoring, reporting and compliance dashboards are in up to date and in-place for patching and tooling. Work with security and governance teams to align patching schedules with vulnerabilitymanagement requirements. Provide operational reporting for Stakeholders, including compliance metrics. Manage vendor relationships and licensing agreements for tooling and middleware platforms. Required Skills & Experience Proven experience managing enterprise … operations tooling, middleware and patch management. Strong expertise with SCCM, Scorch, BMC, Ansible and MuleSoft platforms. Demonstrated experience in patch management, vulnerability remediation and compliance reporting. Hands-on knowledge of automation frameworks and orchestration platforms. ITIL Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built More ❯
Liverpool, England, United Kingdom Hybrid/Remote Options
Love2shop
development teams to optimize application performance and reliability • Maintain and improve backup, recovery, and disaster recovery procedures • Support incident response and root cause analysis for production issues • Manage configuration management and secrets management solutions • Optimize cloud resource utilization and cost management • Cover on-call rotation for production support (1 week out of 6) As well as making … improvements to: • Deployment automation and release management processes • Application and infrastructure monitoring and observability • Security scanning and vulnerabilitymanagement in pipelines • Performance optimization and capacity planning • Development team productivity through tooling and automation What we would like from you • Strong experience with CI/CD pipeline design and implementation (Azure DevOps, GitHub Actions) • Proficiency in Infrastructure as … great if you have the following • Experience with Azure DevOps administration • Knowledge of database deployment automation and migration strategies • Familiarity with microservices architecture and deployment patterns • Experience with API management and gateway solutions • Knowledge of network security and firewall management • Certification in Azure, AWS, or DevOps methodologies • Experience with chaos engineering and resilience testing • Familiarity with service mesh More ❯
Welwyn Garden City, England, United Kingdom Hybrid/Remote Options
PayPoint plc
development teams to optimize application performance and reliability • Maintain and improve backup, recovery, and disaster recovery procedures • Support incident response and root cause analysis for production issues • Manage configuration management and secrets management solutions • Optimize cloud resource utilization and cost management • Cover on-call rotation for production support (1 week out of 6) As well as making … improvements to: • Deployment automation and release management processes • Application and infrastructure monitoring and observability • Security scanning and vulnerabilitymanagement in pipelines • Performance optimization and capacity planning • Development team productivity through tooling and automation What we would like from you • Strong experience with CI/CD pipeline design and implementation (Azure DevOps, GitHub Actions) • Proficiency in Infrastructure as … great if you have the following • Experience with Azure DevOps administration • Knowledge of database deployment automation and migration strategies • Familiarity with microservices architecture and deployment patterns • Experience with API management and gateway solutions • Knowledge of network security and firewall management • Certification in Azure, AWS, or DevOps methodologies • Experience with chaos engineering and resilience testing • Familiarity with service mesh More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom Hybrid/Remote Options
Adroit People Limited (UK)
Greetings Greetings We are Hiring Lead Security Solution Architect(Privilege Password Management CyberArk ) Position in UK - Sheffield -JC: 106885 Client is looking for someone with strong ITSM knowledge Privilege Password Management CyberArk . Job Description Location: UK - Sheffield (Hybrid) Hybrid Model Job Profile – Lead Security Solution Architect Project Overview Client is working on a strategic Identity and Access … Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. Client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage … programme as subject matter expert. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at More ❯
Houston, Texas, United States Hybrid/Remote Options
K.L. McKinney
incidents within our organization's IT infrastructure. The ideal candidate will have expertise in threat detection, vulnerability assessments, and security compliance to enhance our cybersecurity posture. Key Responsibilities: Threat Monitoring & Incident Response -Continuously monitor security logs, SIEM alerts, and network traffic for threats. -Analyze security events and escalate incidents based on severity and impact. -Investigate potential breaches, malware infections … and unauthorized access attempts. -Assist in incident response, containment, and remediation activities. VulnerabilityManagement & Risk Assessment -Conduct vulnerability scans, risk assessments, and penetration tests. -Work with IT teams to remediate security gaps and harden systems. -Research emerging threats and attack techniques to proactively improve defenses. Security Policies & Compliance -Ensure compliance with industry standards (ISO 27001, NIST, GDPR More ❯
not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerabilitymanagement, identity & access management, and network security. Develop and manage project plans, milestones, risks, and budgets. Coordinate delivery across regional teams, ensuring consistency and practicality. Manage third … progress. Essential Skills & Experience Proven experience managing complex cyber security projects within multi-region or federated organisations. Strong technical understanding across key cyber domains within Microsoft environments. Excellent stakeholder management and communication skills. Familiarity with structured project management methodologies (e.g. PRINCE2, PMP, Agile). Relevant security certifications such as CISSP, CISM, CompTIA Security+, or AWS/Azure Security More ❯
not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerabilitymanagement, identity & access management, and network security. Develop and manage project plans, milestones, risks, and budgets. Coordinate delivery across regional teams, ensuring consistency and practicality. Manage third … progress. Essential Skills & Experience Proven experience managing complex cyber security projects within multi-region or federated organisations. Strong technical understanding across key cyber domains within Microsoft environments. Excellent stakeholder management and communication skills. Familiarity with structured project management methodologies (e.g. PRINCE2, PMP, Agile). Relevant security certifications such as CISSP, CISM, CompTIA Security+, or AWS/Azure Security More ❯
City of London, London, United Kingdom Hybrid/Remote Options
TRIA
not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerabilitymanagement, identity & access management, and network security. Develop and manage project plans, milestones, risks, and budgets. Coordinate delivery across regional teams, ensuring consistency and practicality. Manage third … progress. Essential Skills & Experience Proven experience managing complex cyber security projects within multi-region or federated organisations. Strong technical understanding across key cyber domains within Microsoft environments. Excellent stakeholder management and communication skills. Familiarity with structured project management methodologies (e.g. PRINCE2, PMP, Agile). Relevant security certifications such as CISSP, CISM, CompTIA Security+, or AWS/Azure Security More ❯
City of London, London, United Kingdom Hybrid/Remote Options
MFK Recruitment
and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. … and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerabilitymanagement, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement More ❯
and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. … and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerabilitymanagement, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
MFK Recruitment
and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. … and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerabilitymanagement, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Travelfusion
and security alerts for suspicious activity and potential security breaches. Incident Response: Act as a first responder to security incidents, investigating breaches, containing threats and helping to restore systems. VulnerabilityManagement: Conduct regular vulnerability assessments and penetration tests to identify weaknesses in systems and implement necessary improvements. Security Implementation: Improve Security measures. Data Protection & Compliance: Ensure that … Mindset: The ability to analyzs large amounts of data to identify anomalies and potential risks. Technical Proficiency: Knowledge of operating systems, firewalls, encryption, VPNs and security information and event management (SIEM) systems. Attention to Detail: Meticulous in reviewing data and systems to catch even minor security flaws. Strong Communication: Ability to clearly communicate findings and recommendations to both technical More ❯
and security alerts for suspicious activity and potential security breaches. Incident Response: Act as a first responder to security incidents, investigating breaches, containing threats and helping to restore systems. VulnerabilityManagement: Conduct regular vulnerability assessments and penetration tests to identify weaknesses in systems and implement necessary improvements. Security Implementation: Improve Security measures. Data Protection & Compliance: Ensure that … Mindset: The ability to analyzs large amounts of data to identify anomalies and potential risks. Technical Proficiency: Knowledge of operating systems, firewalls, encryption, VPNs and security information and event management (SIEM) systems. Attention to Detail: Meticulous in reviewing data and systems to catch even minor security flaws. Strong Communication: Ability to clearly communicate findings and recommendations to both technical More ❯
corporate IT environment, ensuring it is secure, reliable, and scalable as the company grows.This is a hands-on leadership role , combining responsibility for end-user computing, identity and access management, corporate networking, and cyber security operations . What You’ll Do Manage Humanoid’s corporate IT infrastructure, endpoints, office networks, connectivity, and productivity platforms (Google Workspace, Slack, Miro etc. … . Oversee endpoint lifecycle management, across sourcing, procurement, deployment, patching, and recovery. Maintain monitoring, alerting, and performance reporting for corporate systems. Lead vendor management for hardware, software, and managed services. Ensure operational standards for backup, configuration, and change management. Engineering team , who manage product infrastructure (AWS, CI/CD, robotics environments); ITSM Lead , who manages service process, management … maturity with business growth. We’re Looking For Manage Humanoid’s corporate IT infrastructure, endpoints, office networks, connectivity, and productivity platforms (Google Workspace, Slack, Miro etc.) Oversee endpoint lifecycle management, across sourcing, procurement, deployment, patching, and recovery. Maintain monitoring, alerting, and performance reporting for corporate systems. Lead vendor management for hardware, software, and managed services. Ensure operational standards More ❯
Wokingham, Berkshire, England, United Kingdom Hybrid/Remote Options
KBC Technologies UK LTD
architect, and maintain network security infrastructure including Firewalls, IDPS, Proxies, Load Balancers, VPNs, and WAFs. Develop and manage firewall policies, network access controls, IAM solutions, MFA, RBAC, and privilege management . Ensure alignment of security measures with compliance standards (GDPR, HIPAA, PCI DSS). Conduct regular security audits and assessments to identify and remediate risks. Apply industry frameworks such … as NIST Cybersecurity Framework, ISO 27001, CIS Controls . Oversee and enhance security technologies: SIEM, vulnerabilitymanagement, cloud security (OCI/Azure/AWS), PKI, cryptography, web/email security, logging and monitoring . Monitor network traffic for anomalies and potential breaches. Collaborate with IT teams (network engineers, sysadmins, developers) to ensure a holistic approach to security. Communicate More ❯