Birmingham, West Midlands, England, United Kingdom
Proactive Appointments
s hybrid infrastructure, spanning both on-premise and cloud environments. This role is ideal for a hands-on technical professional with a strong background in network and system security, vulnerability remediation, and endpoint protection using Microsoft Intune . Key Responsibilities Support and secure network infrastructure across cloud and on-prem environments . Hands on experience of Network & Security design … and implementation Strengthen Windows Server and network security configurations. Lead efforts in vulnerabilitymanagement and remediation , working closely with IT and security teams. Implement and maintain endpoint hardening policies through Microsoft Intune . Monitor and respond to network security events and incidents. Contribute to the continuous improvement of security posture, compliance, and best practices. Collaborate with internal teams … environments. Strong understanding of network infrastructure (switching, routing, firewalls, VPNs). Experience securing Windows Server environments. Proficiency in network security principles , firewalls, and access control. Hands-on experience with vulnerability remediation tools and processes. Strong knowledge of endpoint hardening and management via Microsoft Intune . Familiarity with cloud networking and security (Azure, AWS, or equivalent) is desirable. Excellent More ❯
security threats; supporting digital transformation through the adoption and modernisation of cloud-based security solutions; and fostering a high-performing, collaborative team environment that encourages innovation while prioritising risk management, compliance, and continual improvement of security controls. Core Business Responsibilities Responsible for overseeing the design, implementation, and ongoing enhancement of security infrastructure and operational security systems. This includes ensuring … levels of security service availability and prompt incident response, supporting transformation through cloud security adoption and modernisation, and fostering a collaborative team culture that balances innovation with effective risk management and compliance. The role also involves working closely with IT teams, key security vendors, and business stakeholders to deliver critical security projects and support digital transformation initiatives whilst ensuring … experience in a security engineering or closely related IT security role Strong hands-on knowledge of security technologies (such as firewalls, intrusion detection/prevention systems, endpoint protection, SIEM, vulnerabilitymanagement tools, etc.) Experience administering and supporting security solutions within cloud and on-premises environments Proven capability in responding to and investigating security incidents Familiarity with security frameworks More ❯
the implementation and monitoring of cyber security best practices across the business. Administer security tools, including , multi-factor authentication (MFA), mail filtering and Anti-Virus software . Participate in vulnerabilitymanagement, incident response coordination, and system security reviews. Help maintain system documentation, asset registers, and compliance records in line with IT policies and data protection regulations. Project Support … and ongoing system enhancements. Process & Documentation Maintain up-to-date documentation of IT systems, configurations, procedures, and security protocols. Support the continuous improvement of IT operational processes and incident management workflows. Skills & Experience Required Proven experience in a Systems Analyst, IT Support Analyst, or Desktop Support role, ideally within a retail, luxury, or manufacturing business environment. Strong hands-on … experience supporting Microsoft 365 environments (essential) — including Exchange, Entra, SharePoint, Teams, OneDrive. Solid understanding of cyber security fundamentals — including access management, endpoint protection, MFA, secure cloud configuration, and vulnerability management. Exposure to, and understanding of compliance standards such as PCI and GDPR Experience supporting Windows 10/11, Active Directory, Mac OS, iOS, Print and network technology . More ❯
transformation with our people and our customers at its heart. As Cornerstone’s Information Security Manager, you will lead the development, implementation, and continuous improvement of our Information Security Management System (ISMS), ensuring alignment with ISO 27001:2022. You will be responsible for safeguarding our digital infrastructure, managing cyber risk, and embedding a security-first culture across the organisation. … we meet our obligations to customers and regulatory standards Delivery ISMS Leadership: Own and maintain the ISMS, ensuring it meets ISO 27001:2022 requirements and supports business objectives. Risk Management: Identify, evaluate, and mitigate information security risks across systems, suppliers, and processes. Maintain visibility over key cyber risks and report to senior leadership. Incident Response: Lead the response to … the project lifecycle, from initial design through to deployment and ongoing maintenance Role Expertise The successful candidate will possess substantial experience in managing and maintaining an enterprise Information Security Management System (ISMS), with a demonstrable track record of leading and supporting external ISO 27001 audits and implementing and managing robust security frameworks. They will have a comprehensive understanding of More ❯
Theale, England, United Kingdom Hybrid/Remote Options
Cornerstone
transformation with our people and our customers at its heart. As Cornerstone’s Information Security Manager, you will lead the development, implementation, and continuous improvement of our Information Security Management System (ISMS), ensuring alignment with ISO 27001:2022. You will be responsible for safeguarding our digital infrastructure, managing cyber risk, and embedding a security-first culture across the organisation. … we meet our obligations to customers and regulatory standards Delivery ISMS Leadership: Own and maintain the ISMS, ensuring it meets ISO 27001:2022 requirements and supports business objectives. Risk Management: Identify, evaluate, and mitigate information security risks across systems, suppliers, and processes. Maintain visibility over key cyber risks and report to senior leadership. Incident Response: Lead the response to … the project lifecycle, from initial design through to deployment and ongoing maintenance Role Expertise The successful candidate will possess substantial experience in managing and maintaining an enterprise Information Security Management System (ISMS), with a demonstrable track record of leading and supporting external ISO 27001 audits and implementing and managing robust security frameworks. They will have a comprehensive understanding of More ❯
Defender, CrowdStrike, Elastic). Expertise in building and tuning detection rules, dashboards, and automation playbooks. Proficiency in scripting or automation (KQL, PowerShell, Python, or similar). Knowledge of log management, APIs, data normalisation, and cloud security (Azure, AWS, or M365). Solid understanding of network, system, and identity security fundamentals. Excellent problem-solving skills and a passion for continuous … Cortex XSOAR, Splunk SOAR). Knowledge of MITRE ATT&CK mapping and detection engineering frameworks. Infrastructure-as-Code experience (Terraform, Bicep, or ARM templates). Exposure to threat hunting, vulnerabilitymanagement, or integrations with ServiceNow/ITSM tools. Services offered by Computappoint Limited are those of an Employment Business and/or Employment Agency in relation to this More ❯
Technical Leadership & Architecture: Design and implement secure, scalable, and cost-effective cloud solutions across AWS and Azure (hybrid and multi-cloud). Build robust security architectures, leveraging Identity & Access Management (IAM), zero-trust policies, and tools like firewalls, WAFs, and SIEMs. Oversee enterprise networking (SD-WAN, VPNs, VPCs, and load balancers) and ensure efficient, secure connectivity across systems. Cloud … cost optimization and ensure production environments meet SLAs. Develop disaster recovery plans, enhance system monitoring, and reduce downtime through proactive troubleshooting. Cybersecurity Oversight: Safeguard systems through advanced threat detection, vulnerabilitymanagement, encryption, and compliance initiatives (e.g., NIST, GDPR, ISO 27001). Collaborate with SOC teams on incident response and risk mitigation strategies. Cross-Team Collaboration & Strategy: Work with More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid/Remote Options
Leidos Innovations UK Limited
respond to Cyber Security Incidents Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others. Run Vulnerability Assessment tools to measure compliance with security updates and security patches. Member of a Team who are responsible for making multiple daily CSOC checks to detect and respond to … XDR and Microsoft Defender variants, and Elastic Security, or displays aptitude to learn how to work with a SIEM. Experience and knowledge of SIEM tools, Cyber Security Incident Response, VulnerabilityManagement and Cyber Threat Intelligence. Experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at More ❯
Birmingham, West Midlands, England, United Kingdom
Robert Walters
Robert Walters is working in partnership with a leading financial services business. They specialise in providing experts services across pensions, wealth management and financial planning across both personal and commercial services. In addition, they offer tailored services across retirement, tax and estate planning. They are considered market leaders in providing customer and client-centric services, operating across multiple locations. … with hands-on expertise across critical systems. Information Security Manager: Duties Experience of business acquisitions - Highly desirable Develop/Maintain enterprise InfoSec strategy aligned business goals Oversee security architecture, vulnerabilitymanagement, incident response and threat intelligence Lead security risk assessments and manage remediation plans for gaps Financial regulation compliance - GDRP, PCI DSS, SOX, FCA Establish security policies, standards … Manager: Experience Experience within a financial services environment - Highly desirable Manage security for cloud-first environments - AWS, Azure, Google Cloud Implement SOC & Automated security monitoring Lead third-party risk management & vendor security programmes Experience of DevSecOps practises and SDLC Design/Implement security frameworks - ISO 27001, NIST Hands-on experience of SIEM, DLP, IAM, Endpoint Technology The permanent opportunity More ❯
supporting innovation and business objectives. Conduct Security Assessments Perform comprehensive security assessments of both third-party vendors and internal applications. Oversee and evaluate security audits and penetration tests. Risk Management And Incident Response Provide consultancy on risk mitigation, incident response planning, and disaster recovery. Analyse security events, incidents, and potential threats. Policy Development And Compliance Develop security documentation in … accordance with ISO 27001, CIS Controls, and other relevant standards. Ensure ongoing compliance with industry regulations and internal governance requirements. Threat Intelligence And VulnerabilityManagement Stay current on new threats, vulnerabilities, and regulatory changes (e.g., GDPR, ISO 27001). Conduct threat modelling assessments for new interconnected technologies. What We’re Looking For Strong ability to identify, assess, and More ❯
supporting innovation and business objectives. Conduct Security Assessments Perform comprehensive security assessments of both third-party vendors and internal applications. Oversee and evaluate security audits and penetration tests. Risk Management And Incident Response Provide consultancy on risk mitigation, incident response planning, and disaster recovery. Analyse security events, incidents, and potential threats. Policy Development And Compliance Develop security documentation in … accordance with ISO 27001, CIS Controls, and other relevant standards. Ensure ongoing compliance with industry regulations and internal governance requirements. Threat Intelligence And VulnerabilityManagement Stay current on new threats, vulnerabilities, and regulatory changes (e.g., GDPR, ISO 27001). Conduct threat modelling assessments for new interconnected technologies. What We’re Looking For Strong ability to identify, assess, and More ❯
templates, and standards. Assist in the development and localisation of standard test scripts, ensuring they are tailored to specific control environments and aligned with the organisation's Enterprise Risk Management Framework. Conduct control testing activities to evaluate the design and operational effectiveness of cybersecurity controls, documenting results clearly and raising issues where appropriate. Ensure timely delivery of assigned control … role, the essential criteria you'll need are Proven experience in performing cybersecurity control assessments, including evaluating design and operational effectiveness. Strong understanding of information security principles, cyber risk management, and control frameworks. Experience in IT, OT and Cloud environments, with a focus on cybersecurity controls. Clear and professional verbal and written communication, including the ability to explain cybersecurity … with minimal supervision, taking ownership of assigned tasks and driving them to completion while maintaining high standards of quality and accuracy. Strong understanding of Cybersecurity Domains, including Threat Intelligence, VulnerabilityManagement, Security Testing, Security Architecture, Infrastructure Protection, Application Security, Identity and Access Management, Incident Investigation & Response and Cryptography. Additional skills and experiences would be great to have More ❯
architectures in hybrid and cloud (AWS/Azure) environments. Strong hands-on expertise with enterprise security platforms – including Endpoint Protection, Cloud Security, Network Security, DevSecOps, SIEM/SOAR, and vulnerability management. Deep understanding of secure design principles, IAM, encryption, API security, and application security. Experience performing threat modelling, security risk assessments, and control design validation. In-depth knowledge of More ❯
Manchester, England, United Kingdom Hybrid/Remote Options
Acumin
architectures in hybrid and cloud (AWS/Azure) environments. Strong hands-on expertise with enterprise security platforms – including Endpoint Protection, Cloud Security, Network Security, DevSecOps, SIEM/SOAR, and vulnerability management. Deep understanding of secure design principles, IAM, encryption, API security, and application security. Experience performing threat modelling, security risk assessments, and control design validation. In-depth knowledge of More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Acumin
architectures in hybrid and cloud (AWS/Azure) environments. Strong hands-on expertise with enterprise security platforms – including Endpoint Protection, Cloud Security, Network Security, DevSecOps, SIEM/SOAR, and vulnerability management. Deep understanding of secure design principles, IAM, encryption, API security, and application security. Experience performing threat modelling, security risk assessments, and control design validation. In-depth knowledge of More ❯
Bedminster, Bristol, Avon, England, United Kingdom
QA
s mission is to help businesses protect their data, enhance productivity, and achieve compliance through its comprehensive Protect & Grow managed IT plans. Services include Microsoft 365 and Google Workspace management, device security, vulnerabilitymanagement, AI-enhanced email security, and disaster recovery planning. With a reputation for clear, jargon-free communication and strong client relationships, Dial A Geek More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance VulnerabilityManagement (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance VulnerabilityManagement (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance VulnerabilityManagement (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance VulnerabilityManagement (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance VulnerabilityManagement (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance VulnerabilityManagement (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance VulnerabilityManagement (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance VulnerabilityManagement (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯