Manchester, England, United Kingdom Hybrid / WFH Options
TechNET IT Recruitment Ltd
and wider business goals Build and implement policies, procedures, and board-level metrics to support the strategy Lead on the development and maturity of the organisation’s Cyber Risk Management Framework Drive a security-aware culture across departments through training, communication, and engagement Operational Security Oversight Support architectural decisions and strengthen the company’s threat modelling approach Lead incident … response efforts and run simulations, red team exercises, and readiness activities Conduct proactive assessments of emerging threats and implement mitigation strategies Oversee vulnerabilitymanagement across a hybrid cloud estate Manage security tooling and third-party SOC relationships Assess new technologies from a security standpoint, including AI initiatives Provide support to commercial teams with security input for tenders, bids … response and security operations Familiarity with compliance standards such as ISO 27001, SOC 2, HIPAA, GDPR Excellent communication skills; able to influence both technical and non-technical stakeholders Project management capabilities and experience delivering key security initiatives Seniority level Seniority level Director Employment type Employment type Full-time Job function Job function Information Technology Industries Pension Funds and IT More ❯
the Security Architecture & Advisory team to ensure the implementation of security processes aligns KPMG’s security frameworks, policies, standards, whilst collaborating with other security teams in areas such as vulnerabilitymanagement, and incident management. In this delivery-focused Security Engineer role, you will have the exciting opportunity to manage multiple workstreams simultaneously. Your responsibilities will encompass supporting the … organization. What will you be doing? Develop, document, and maintain Platform security processes and plans per KPMG’s trust and verify framework. Support in the development/design and management of Product/Platform security processes and automated tooling that prevent security issues. Support on threat modelling exercises for our products. Perform security-focused code reviews. Support penetration testing … activities. Prioritise and oversee vulnerability remediation. Manage the implementation of logging and integration to the corporate SIEM for SOC monitoring. Lead Clara’s response to incidents and risks raised by the SOC. Champion and coach cloud security principles across our product engineering team. Manage escalations of security related issue, risk or exceptions, including audit actions Lead Clara’s relationships More ❯
the Security Architecture & Advisory team to ensure the implementation of security processes aligns KPMG’s security frameworks, policies, standards, whilst collaborating with other security teams in areas such as vulnerabilitymanagement, and incident management. In this delivery-focused Security Engineer role, you will have the exciting opportunity to manage multiple workstreams simultaneously. Your responsibilities will encompass supporting the … organization. What will you be doing? Develop, document, and maintain Platform security processes and plans per KPMG’s trust and verify framework. Support in the development/design and management of Product/Platform security processes and automated tooling that prevent security issues. Support on threat modelling exercises for our products. Perform security-focused code reviews. Support penetration testing … activities. Prioritise and oversee vulnerability remediation. Manage the implementation of logging and integration to the corporate SIEM for SOC monitoring. Lead Clara’s response to incidents and risks raised by the SOC. Champion and coach cloud security principles across our product engineering team. Manage escalations of security related issue, risk or exceptions, including audit actions Lead Clara’s relationships More ❯
investigation Integrate lessons learned to improve defensive capabilities and incident response processes, ensure proper configurations and security controls of systems and agents, document key findings in reports and incident management systems Conduct enterprise security log collection, management, and analysis. Investigate SIEM events, alerts and tips to determine if an incident has occurred Recognize attacker and APT activity; tactics … log analysis, and triage in support of incident response activities Assist in developing and maturing the future services and capabilities of the Global Security Team, such as Forensics, Threat Management, Penetration Assessments, Tool Management, VulnerabilityManagement, etc Requirements For this role, we value ability, attitude and aptitude over experience and skills as we can train you. More ❯
stay ahead of emerging risks and regulations—ensuring our platform is resilient, secure, and trusted by every customer and supplier. A typical day: Develop and own our Information Security Management System (ISMS) aligned with ISO 27001 Maintain security policies, control frameworks and ensure compliance with UK GDPR, Cyber Essentials Plus, PCI-DSS and DPA Conduct risk assessments, manage our … risk register, and lead remediation actions Oversee security tooling and controls—from endpoint protection to vulnerabilitymanagement Support platform and IT teams on secure design, deployments and third-party risk Lead incident response efforts, from root cause analysis to post-incident reviews Deliver training and awareness programmes that embed a culture of security across the business Collaborate with … experience in security, compliance or risk roles within mid-to-large UK organisations Deep knowledge of ISO 27001, UK GDPR, and frameworks like Cyber Essentials Practical experience with risk management, audit prep, incident response and policy development Familiarity with technical controls such as access management, scanning tools and endpoint security Strong communication and influencing skills—able to translate More ❯
and work closely with stakeholders to ensure compliance and security best practice across the business. You will also assist with maintaining and improving the company's accredited Information Security Management System (ISMS), with a particular focus on ISO 27001 and Cyber Essentials Plus requirements. In addition, you will help mentor team members, providing guidance and support to develop their … is considered throughout the entire SDLC. Creates and maintains documentation around the use of cyber security technology in the organisation. Carries out threat detection and incident response. Carries out vulnerabilitymanagement and remediation. Collaborates as needed with third-party security vendors for expert advice and issue resolution. Carries out threat intel research and recommends security improvements. Qualifications Extensive … PHP, MySQL, PostgreSQL, Nginx, Mercurial and Git. Good understanding of cyber security practices in relation to cloud hosting, preferably with experience of AWS. Good understanding of open-source risk management using enterprise management tools. An understanding of Service Management disciplines, ideally using the ITIL framework. Ability to keep up to date with technology trends and to understand More ❯
London, England, United Kingdom Hybrid / WFH Options
The Best Connection
join our existing team based in Bromsgrove, reporting to the Cybersecurity Operations Manager. The core function of an experienced Information Security Analyst is to support governance, planning, and risk management functions, verifying that appropriate policies and controls are in place for effective service delivery. Support all areas related to Release and Change Management. Also, support the organisation’s information … Flexibility to work occasional weekends and out of hours Desirable Criteria: ITIL Foundation Level or above ISO:27001 Implementor, Auditor, or other security-related certifications Experience with SIEM tools, vulnerabilitymanagement, or scripting (e.g., PowerShell, Python) Microsoft Azure Security Engineer Associate Certifications such as CompTIA Security+, Network+, Linux+, Data+, DataSys+ Full UK Driving Licence The Company: The Best More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Carousel Consultancy Ltd
implementation and maintenance of security policies including RBAC, NSGs, firewalls and conditional access Hoping to manage identity and access through Azure Active Directory and MS Entry ID Participating in vulnerabilitymanagement and patching processes across cloud workloads Assisting in incident response efforts and root cause investigations Maintaining system and security documentation, diagrams and logs Collaborating with engineers to … plus) Experience in creating and managing VNETs, VM, App Service, Application Gateways, Firewalls and Custom RBAC roles in Azure Exposure to Azure Monitor, Log Analytics is advantageous Experience using vulnerability scanners (e.g. Defender for Endpoint, Qualys) is beneficial Basic understanding of GDPR, ISO27001, PCI DSS or other compliance is desirable Dynamic and personable nature with the desire for continuous More ❯
implementation and maintenance of security policies including RBAC, NSGs, firewalls and conditional access Hoping to manage identity and access through Azure Active Directory and MS Entry ID Participating in vulnerabilitymanagement and patching processes across cloud workloads Assisting in incident response efforts and root cause investigations Maintaining system and security documentation, diagrams and logs Collaborating with engineers to … plus) Experience in creating and managing VNETs, VM, App Service, Application Gateways, Firewalls and Custom RBAC roles in Azure Exposure to Azure Monitor, Log Analytics is advantageous Experience using vulnerability scanners (e.g. Defender for Endpoint, Qualys) is beneficial Basic understanding of GDPR, ISO27001, PCI DSS or other compliance is desirable Dynamic and personable nature with the desire for continuous More ❯
team members in the Information Technology department to ensure that systems and networks are always designed, developed, deployed, and managed with an emphasis on strong, effective security and risk management controls. The Cyber Security Analyst leads the firm's vulnerabilitymanagement program, manages the annual cybersecurity assessments and penetration tests, and researches and reports on emerging threats … threat patterns and vulnerabilities. Runs internal security scans, coordinates mitigation and tracks results. Investigates security alerts and is a part of the incident response team. Monitors identity and access management, including monitoring for abuse of permissions by authorized system users. Liaises with stakeholders in relation to cyber security issues and provides future recommendations. Generates reports for both technical and More ❯
Work for an award-winning provider of Security Services, specialising in Cyber Security Services such as VulnerabilityManagement, Information Security, Penetration Testing, and Managed Security Services. We boast a fully managed Security Operations Centre (SOC) staffed by dedicated professionals. We're seeking a skilled Cyber Security Engineer to join our clients eam. The ideal candidate will have expertise More ❯
in cybersecurity frameworks (e.g., MITRE ATT&CK, NIST, CIS), incident response, and threat intelligence In-depth knowledge of security operations, including SIEM, EDR, IDS/IPS, malware analysis, and vulnerabilitymanagement Strong background in cloud security operations and monitoring across AWS, Azure, and GCP Preferred Proven success in incident resolution within SLAs and based on severity. Experience in More ❯
as required. Assist in continuously updating the company’s security incident, data breach response and disaster recovery plans. Undertake threat detection practices. Undertake security hardening support practices with teams. Vulnerabilitymanagement to analyse findings from vulnerability reports, assist with risk assessments on the vulnerabilities and coordinate remediation and patching activities with system owners. Taking on a wide More ❯
configuration, and ongoing buildout of Splunk ES, including onboarding new data sources, tuning correlation rules, and developing new detection use cases. • Collaborate with other teams to support incident response, vulnerabilitymanagement, and threat hunting activities. • Conduct threat analysis, log analysis, and data enrichment using Splunk and other security tools. • Participate in regular security reviews and audits, providing evidence More ❯
Offensive security and exploitation techniques. Digital Forensics : Host, network, or memory-based investigation. Threat Hunting : Detection engineering and hypothesis-driven threat investigation. Knowledge of modern security tooling (SIEM, EDR, vulnerabilitymanagement, SOAR). Strong documentation and communication skills; fluent in written and spoken English. Diversity, Inclusion, and Equal Opportunity We hire, promote, and compensate employees based on their More ❯
Peterborough, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
certification support. Responsibilities: Monitor, analyse, and respond to security events and incidents within the SOC, ensuring timely detection and resolution in line with SLAs. Conduct thorough threat analysis and vulnerability assessments to identify potential security risks and implement mitigation strategies. Develop and refine incident response plans and playbooks to enhance SOC effectiveness. Perform root cause analysis (RCA) for high … years’ experience with leadership or advanced incident response experience. Strong understanding of network security, firewalls, VPNs, IDS/IPS, and endpoint security. Proficiency in incident response, threat analysis, and vulnerability management. Experience with security monitoring, root cause analysis, and risk assessments. Excellent analytical and problem-solving skills with attention to detail. Strong communication skills, including report writing and client More ❯
London, England, United Kingdom Hybrid / WFH Options
Hott Source
date and compliant with industry best practice, policies, and guidelines. Contributing to deployment of Cybersecurity related projects and tasks for clients and internal infrastructure End to end threat and vulnerability management. Rolling out, managing, and configuring a range of network security tools and appliances. Key Skills: Microsoft 365 and Google Workspace Security admin Cloud, Endpoint Security, Virtualisation Networking (Routers More ❯
have now closed. We're seeking an experienced Cyber Defence Manager to safeguard our digital infrastructure View job & apply Location: Frankfurt Salary: 145,000 + Benefits Sector: Banking, Asset Management & Funds We're hiring an experienced IAM Lead to take ownership of identity governance and access controls View job & apply Location: Frankfurt Salary: 145000 + Benefits Job type: Permanent … Sector: Banking, Asset Management & Funds A growing investment firm headquartered in Frankfurt is looking to appoint a senior IT Governance View job & apply Location: Fully Remote Job type: Contract Position Overview: Fast growing FinTech seeking a highly motivated and technically capable DevSecO View job & apply SOC Manager Location: Fully Remote Job type: Contract Position Overview: Rapidly growing FinTech company … seeks an Incident Response Manager to join their CIRT team. This role plays View job & apply Location: Frankfurt Salary: 120,000 + Benefits Job type: Permanent Sector: Banking, Asset Management & Funds A fast-growing investment firm based in Frankfurt is looking for a motivated IT Governance & View job & apply Technical IAM Consultant Location: London when needed Job type: Contract More ❯
a broad range of domains. The Senior Cyber Security Specialist will operate across Cyber Operations and GRC, ensuring UK-specific compliance and security resilience. Role: Security Incidents: Oversee incident management and response, including root cause analysis, impact assessment, and post-incident reviews. Threat Management: Develop and refine threat intelligence, threat hunting capabilities, and prevention/detection measures. Security … Technologies: Configure, maintain, and optimise security platforms (SIEM/XDR, EDR, vulnerabilitymanagement, Secure Email Gateway, Application Allowlisting etc.) Security Controls: Implement and maintain security controls, continuously improving detection, prevention, and remediation. Vendor Risk & Audit: Conduct vendor risk assessments, support internal and external audits (e.g. Cyber Essentials, ISO27001), and manage remediation actions. Cyber Security Program: Support the execution … Cyber Essentials, and any industry-specific security requirements. Skills and Experience: 5–7 years' experience in security operations, engineering, or cyber threat management. Strong knowledge of SIEM, XDR, EDR, vulnerabilitymanagement, firewalls, and network security. Hands-on experience in security control implementation and maintenance (e.g. ISO27001, Cyber Essentials). Familiarity with MITRE ATT&CK, incident response methodologies, and More ❯
industry. We have an exciting opportunity to support the Air Force Enterprise IT as a Service (EITaaS) Wave 1, specifically advancing the solution for bringing the EITaaS IT Service Management offerings to SIPR. We are currently seeking a Nessus Engineer for an onsite position in Chantilly, VA. This position supports our cybersecurity initiatives by conducting vulnerability assessments and … ensuring the overall security of our networks and systems. This position is critical in maintaining and improving the integrity and safety of our infrastructure using the Nessus vulnerability scanning tool. The ideal candidate will have hands-on experience with Nessus or similar vulnerabilitymanagement tools, a solid understanding of security best practices, and a passion for mitigating … risks in complex IT environments. Minimum of 10+ years' experience in vulnerabilitymanagement, cybersecurity, or IT security. Hands-on experience with Nessus (or similar tools such as OpenVAS, Qualys) for vulnerability scanning and management. Experience with network protocols (TCP/IP, HTTP, DNS, etc.), operating systems (Windows, Linux, macOS), and security best practices. Installing and Configuring Nessus More ❯
enhance the Security Operations Center (SOC) , with one analyst reporting to you Oversee incident response , manage security incidents from detection to resolution Work closely with the compliance manager on vulnerabilitymanagement Architect secure solutions, validate baseline configurations, and recommend improvements to stay compliant Collaborate with key stakeholders including Compliance and Infrastructure teams Required Experience: Microsoft security suite experience … Sentinel or similar Experience managing network security and firewalls Exposure to PenTesting methodologies or practices (desirable) Experience with NAC solutions like Cisco ISE , ForeScout , or similar Strong grasp of vulnerabilitymanagement processes Desired Certifications Microsoft Security certifications (preferred) CISM or CISSP (beneficial, not essential) Apply now or reach out for a confidential chat- ngoren@mcgregor-boyall.com More ❯
security capabilities across its global infrastructure. This role is vital in ensuring the integrity and resilience of the company’s IT environment against cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents effectively. Perform regular security checks, including monitoring of systems and resolving vulnerabilities. Assist with compliance checks, ensuring … security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning and risk mitigation. Knowledge of security auditing and incident response processes. Experience with event and log analysis. Solid understanding of Disaster Recovery and Business Continuity principles. Excellent communication … make an impact in a global organization, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, VulnerabilityManagement, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery, Business Continuity Nice-to-have skills: ISO 27001 Vulnerability Scanning Disaster Recovery Work More ❯
functional workshops to assess cyber risks, define security controls, and align stakeholders across Security, Infrastructure, and OT/ICS teams. Manage the implementation of key compliance domains such as vulnerabilitymanagement, business continuity, access control, asset inventory, and incident response. Report to senior stakeholders, including CISO-level executives and Business Unit leadership, with regular updates, KPIs, and risk … as a liaison between Legal, IT Security, Infrastructure, and Operational departments for policy alignment and incident response readiness. Requirements for the Candidate Experience: Minimum 5 years of IT Project Management experience, with at least 3 years focused on cybersecurity initiatives. Demonstrated experience managing projects involving compliance with EU directives or regulations (NIS, GDPR, ISO27001, or similar). Strong understanding … services (Azure/AWS), and endpoint security. Experience in manufacturing or industrial environments is highly beneficial. Technology & Skills: Familiarity with cybersecurity frameworks (NIST CSF, ISO27001). Strong knowledge of vulnerabilitymanagement tools, SIEM, SOAR, EDR, and identity/access management platforms. Proven experience managing multi-stakeholder environments and coordinating technical and non-technical teams. Ability to write More ❯
Jobs via eFinancialCareers 1 day ago Be among the first 25 applicants Join to apply for the Analyst - Bloomberg role at Jobs via eFinancialCareers Our Team: The Threat and VulnerabilityManagement Team (TVM) is dedicated to making our systems and technologies as secure as possible. We protect Bloomberg. We partner with internal technical departments to ensure the confidentiality … integrity, and availability of Bloomberg systems and the data we process. We aim to ensure that our clients see us as a trusted partner. Our Team: The Threat and VulnerabilityManagement Team (TVM) is dedicated to making our systems and technologies as secure as possible. We protect Bloomberg. We partner with internal technical departments to ensure the confidentiality … and manage identified vulnerabilities through remediation. You will work directly with other cross-department security engineering and incident response teams to set strategic direction for our enterprise Threat and VulnerabilityManagement program. This is a team that drives company-wide initiatives to improve the effectiveness of Bloomberg's security posture. Analysts in this role must show exemplary judgment More ❯
Infrastructure and Security in the overall delivery and strategic oversight of all PayPoint Group IT security systems and services. This includes providing leadership for the Security Operations Center (SOC), VulnerabilityManagement and Security teams, ensuring alignment with organizational goals. Collaborating closely with the managers of the respective departments within the team, the successful candidate will offer guidance and … in defining and delivering IT security services across physical and cloud infrastructures, ensuring compliance with regulatory and organizational requirements. Provide strategic leadership and oversight for the Security, SOC and VulnerabilityManagement teams, enabling their success through effective planning, guidance, and support. Develop close working relationships with internal audit teams and act as the primary IT contact for all … of Infrastructure and Security. Mentor and guide team members, fostering professional growth and building a high-performing security function. Actively participate as a key member of the Cyber Security Management Team, contributing to the development and execution of the organization's cyber security strategy, policies, and initiatives. Play a leading role in the response to any cyber-related incidents More ❯