London, South East, England, United Kingdom Hybrid/Remote Options
Akkodis
ensure the products they deliver are secure by design. You'll work closely with developers, architects, and business stakeholders to create an environment where secure coding and proactive risk management come naturally. What you'll be doing You'll play a leading role in driving a security-first culture across agile product teams, defining and delivering a clear application … Working hand-in-hand with developers, you'll weave security seamlessly into the software development lifecycle - from designing controls and integrating testing into CI/CD pipelines to supporting vulnerabilitymanagement and remediation. Acting as the go-to expert for secure design, threat modelling, and compliance, you'll make sure teams have the knowledge, tools, and confidence to More ❯
advise on and implement appropriate security controls in line with design specifications. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identity and access management (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Familiarity with common regulatory and compliance frameworks (e.g. NIST, CIS Controls, ISO 27001, Cyber Essentials Plus). Experience … and secure storage/access principles. Experience defining security configurations and collaborating with engineers to apply them consistently across the entire IT estate. Familiarity with endpoint protection platforms and vulnerabilitymanagement tools. Experience securing hybrid identity solutions and federated authentication models Understanding of security automation concepts, including security orchestration and response (SOAR) including ability to script or automate More ❯
Troy, Michigan, United States Hybrid/Remote Options
AETG Services PVT LTD
Process Mapping & Gap Analysis: Evaluate current processes, identify gaps, and propose control improvements aligned with regulatory expectations. Risk & Security Focus: Analyze and support initiatives involving data loss prevention (DLP), vulnerabilitymanagement, security tool implementations, and compliance efforts. Stakeholder Communication: Act as the liaison between business units, technology teams, and vendors to ensure requirements are clearly understood and delivered. … Business Analyst, preferably in financial services or IT risk/security environments. Knowledge: Familiarity with risk and regulatory frameworks such asNIST, GLBA, SOX, and experience with controls, audit response, vulnerability remediation, orsecurity tool deployments. Tools: Proficiency in Microsoft Office, Visio, and experience withPower BI or other reporting tools is a strong plus. Skills: Excellent analytical, problem-solving, and communication More ❯
penetration testing with strong understanding of adversarial tactics and threat intelligence Expertise across network, cryptography, vulnerabilities, and attack vectors Strong communication and reporting skills Experience with Breach Attack Simulation, vulnerabilitymanagement, cloud security reviews (AWS/Azure/GCP), or frameworks like ISO 27001 Certifications such as CISM, CISSP, ECSA, CREST CCT Eligible for UK SC Clearance is More ❯
our client's internal security posture and you'll be working closely with the engineering and product teams to enable security across the company. Key Requirements: AWS - Cloud Security VulnerabilityManagement Tools IAM CPSM Incident Response/small amounts of ISO27001 This role is 5 days a week on-site , you’ll enjoy the perks of a sleek More ❯
ATT&CK and network/cloud security principles. Strong analytical and communication skills. Bonus points for: Scripting or automation experience (KQL, PowerShell, Python). Background in threat hunting or vulnerability management. Why apply? Hybrid flexibility, funded certifications, cutting-edge tooling, and clear development paths into leadership or specialist roles. If you’re ready to step up and help evolve More ❯
ATT&CK and network/cloud security principles. Strong analytical and communication skills. Bonus points for: Scripting or automation experience (KQL, PowerShell, Python). Background in threat hunting or vulnerability management. Why apply? Hybrid flexibility, funded certifications, cutting-edge tooling, and clear development paths into leadership or specialist roles. If you’re ready to step up and help evolve More ❯
including Azure Networking, RBAC/IAM and Storage Microsoft Security stack tools (Defender, Security and Compliance, Purview) Virtualisation Technologies (VMWare) Networking Technologies (LAN/WLAN, WAN/MPLS) Storage Management (physical SAN and software-defined) With practical experience of securing and hardening platforms, as well as experience of using vulnerabilitymanagement systems, you'll also have exposure … to SIEM/XDR/MDR systems and knowledge and practical experience of Service Management tools (Manage Engine). You'll have significant experience of implementing and supporting Infrastructure technology solutions, as well as practical experience of Security stack systems including but not exclusively vulnerability management. With experience of working in an IT Operations/Service Environment, you More ❯
Manchester Area, United Kingdom Hybrid/Remote Options
Found Talent
managing IT security operations and driving improvements across infrastructure and processes? This Manchester based organisation is looking for an IT Security Manager to take ownership of information security, risk management and ongoing security enhancement activities. You’ll work closely with Senior Leadership, leading key initiatives to protect systems, data and users while helping shape the organisation’s security posture. … ISO27001 or similar What you’ll need: Proven experience managing IT security or information security functions Strong technical knowledge of Microsoft environments and security controls Experience with incident response, vulnerabilitymanagement, and security risk mitigation Confident working with both technical teams and business stakeholders Solid understanding of security frameworks and compliance standards Ability to lead projects and drive … security improvements proactively What’s in it for you: A key management role focused on shaping and improving security within a collaborative IT leadership team Hybrid working Annual bonus and regular salary reviews Company pension scheme More ❯
is looking to take their career to the next level by having more input into organisations as you help them strengthen their security posture, conduct vital areas such as vulnerability analysis and security audits that meet recommended industry standards. You will be working closely with stakeholders in order to implement Cybersecurity strategies, manage client information and provide expertise across … Conduct detailed risk assessments and gap analysis for client environments Deliver control reviews and maturity assessments aligned to relevant frameworks (ISO 27001, NIST, CIS, Cyber Essentials/Plus) Perform vulnerability assessments and develop mitigation strategies Support the deployment of Managed Detection and Response (MDR), Penetration Testing, and Data Loss Prevention (DLP) solutions Advise clients on governance, incident response, and … Experience Proven experience in a Cybersecurity consultancy role Professional certifications such as CISSP or CISM Strong working knowledge of ISO 27001, NIST and Cyber Essentials/Plus Proficiency with vulnerabilitymanagement, endpoint protection and SIEM tools The role is genuinely exciting with a forward thinking business who have their employees careers at the forefront of their minds and More ❯
Orlando, Florida, United States Hybrid/Remote Options
Living Talent
and Service Delivery teams to assess client needs, design tailored IT solutions, and ensure seamless onboarding. Tech Stack & Tools SentinelOne: EDR, MDR/XDR Arctic Wolf: MDR, SOC Rapid7: VulnerabilityManagement, SIEM, Threat Intelligence Webroo: DNS Protection, Antivirus Proofpoint: Email Security, Spam Filtering Auvik: Network Monitoring & Mapping Liongard: Automated Documentation, Change Detection ConnectWise Control: RMM, Dashboards, Alerts RapidFire … Network Assessment, Compliance Reporting Usecure: Security Awareness Training, Phishing Simulations SOTI: MDM, IoT Device Control Axcient: Business Continuity, Cloud Backup Pax8: Cloud Marketplace, Vendor Management Core Responsibilities Pre-Sales Support : Provide technical expertise during the sales cycle, ensuring client needs are fully understood and met with the right solutions. Client Discovery : Conduct discovery sessions (onsite, video, or phone) to … Solid networking knowledge: DNS, DHCP, VLANs, routing, firewalls, etc. Experience with Microsoft Entra ID (Azure AD), O365, licensing, and Azure. Exposure to ConnectWise (RMM, PSA, CPQ). Active Directory management, Server upgrades and virtualization (VMware), Microsoft Exchange support Understanding of cybersecurity best practices - EDR, MFA, security audits, etc. Demonstrated stability and success in prior roles. More ❯
chance to lead security operations, respond to real-world threats, and shape the future of cybersecurity in a dynamic, multi-entity environment. Requirements: Proven experience in incident response and vulnerability management. Hands-on with Microsoft Defender, Sentinel, Azure 365, and related tools. Strong communicator—able to engage technical and non-technical stakeholders. Experience in distributed or franchisee-based environments … plus. Certifications like CISSP, CISM, GIAC, or Azure Security Engineer are highly valued. Responsibilities: Be the go-to expert for security incidents—detect, respond, and remediate across regions. Drive vulnerabilitymanagement using top-tier tools like Tenable, Nessus, and Microsoft Defender. Collaborate with franchisees, vendors, and internal teams to close security gaps and elevate resilience. Translate complex threats More ❯
for security practices and deployment processes. Engage with clients to understand their requirements and deliver tailored security solutions. Collaborating with Security and Infrastructure teams to improve Network Defence and Vulnerability Management. Skills required, including - Checkpoint Firewall, Network Defence and VulnerabilityManagement: AWS KMS, AWS Secrets Manager, AWS API Gateway, AWS WAF, Amazon Inspector, Amazon Macie ,Amazon GuardDuty More ❯
for security practices and deployment processes. Engage with clients to understand their requirements and deliver tailored security solutions. Collaborating with Security and Infrastructure teams to improve Network Defence and Vulnerability Management. Skills required, including - Checkpoint Firewall, Network Defence and VulnerabilityManagement: AWS KMS, AWS Secrets Manager, AWS API Gateway, AWS WAF, Amazon Inspector, Amazon Macie ,Amazon GuardDuty More ❯
in Cyber Security, PCI DSS within a cloud environment Have good Security architecture experience, ideally with a DevSecOps environment Excellent experience with PCI DSS and able to lead design Vulnerabilitymanagement & Compliance Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, and NIST Confidence when speaking with More ❯
Pre-Sales Engineer/Solutions Engineer - Remote (with travel) Our client is a multi-award winning network security and vulnerabilitymanagement consultancy, who are on an exciting growth journey, and have a vacancy for a highly skilled Pre-Sales Engineer. Role Using your deep knowledge and expertise in networking and cyber security you will play a critical role More ❯
Edinburgh, Midlothian, United Kingdom Hybrid/Remote Options
Texaport
knowledge of Microsoft 365, Azure, and Windows Server technologies. Proficiency in networking (firewalls, routers, switches, VPNs, VLANs). Experience with cyber security tools and best practices, including endpoint protection, vulnerabilitymanagement, and compliance frameworks. Hands-on experience with virtualisation platforms (VMware, Hyper-V). Knowledge of backup, disaster recovery, and business continuity solutions. Excellent troubleshooting, problem-solving, and More ❯
day work. The ideal candidate will have the following skills: Deep understanding of cyber security principles, secure software development, and threat modeling Experience conducting security assessments, code reviews, and vulnerabilitymanagement across diverse technology stacks Experience in building full-stack products (web applications, APIs, CI tooling or low-level software) Hands-on experience with cloud technologies (AWS, GCP More ❯
continuous improvement across all infrastructure processes and systems. Ensure infrastructure and data security standards are implemented and maintained, aligning with company and legal requirements. Oversee governance, compliance, and risk management within the IT operations function. Build and manage strong partnerships with key vendors, managed service providers (MSPs), and internal stakeholders. Ensure vendors deliver against agreed SLAs, performance, and cost … and operation of the company’s technology infrastructure (networks, servers, cloud environments, data centres, and endpoints). Ensure infrastructure availability, performance, and security meet agreed service levels. Lead incident management processes and ensure rapid, effective response to minimise business disruption. Champion the adoption of modern infrastructure technologies, including cloud platforms and automation tools. Work closely with internal and external … partners to maintain compliance with cyber security standards and frameworks. Implement and oversee vulnerabilitymanagement, patching, and system hardening programmes. Ensure all systems comply with data protection, privacy, and regulatory standards. Manage key vendor relationships, including Managed Security Service Providers (MSSPs) and Managed Service Providers (MSPs). Negotiate and oversee infrastructure contracts and service agreements to ensure value More ❯
continuous improvement across all infrastructure processes and systems. Ensure infrastructure and data security standards are implemented and maintained, aligning with company and legal requirements. Oversee governance, compliance, and risk management within the IT operations function. Build and manage strong partnerships with key vendors, managed service providers (MSPs), and internal stakeholders. Ensure vendors deliver against agreed SLAs, performance, and cost … and operation of the company’s technology infrastructure (networks, servers, cloud environments, data centres, and endpoints). Ensure infrastructure availability, performance, and security meet agreed service levels. Lead incident management processes and ensure rapid, effective response to minimise business disruption. Champion the adoption of modern infrastructure technologies, including cloud platforms and automation tools. Work closely with internal and external … partners to maintain compliance with cyber security standards and frameworks. Implement and oversee vulnerabilitymanagement, patching, and system hardening programmes. Ensure all systems comply with data protection, privacy, and regulatory standards. Manage key vendor relationships, including Managed Security Service Providers (MSSPs) and Managed Service Providers (MSPs). Negotiate and oversee infrastructure contracts and service agreements to ensure value More ❯
for deployment. Ability to demonstrate any IRM solution and SecOps solutions as and when needed. Knowledge of various modules like Policy Mgmt. Compliance & Audit Mgmt., Vendor Mgmt., Business Continuity Management, Vulnerability Response, Incident Response, Security Dashboard on ServiceNow IRM platform Assess as-is IRM processes for maturity and automation on ServiceNow platform Knowledge of Advance risk management … SecOps administrator/consultant (this is mandatory) Must have concluded at least 1 lifecycle of ServiceNow IRM/SecOps implementation. Experience in JavaScript, API, Web Services Working knowledge of Vulnerability Mgmt. process & tools ISO/CISA/CISM/CISSP/CRICS (preferred) Platform expertise required: ServiceNow GRC & SecOps. More ❯
for deployment. Ability to demonstrate any IRM solution and SecOps solutions as and when needed. Knowledge of various modules like Policy Mgmt. Compliance & Audit Mgmt., Vendor Mgmt., Business Continuity Management, Vulnerability Response, Incident Response, Security Dashboard on ServiceNow IRM platform Assess as-is IRM processes for maturity and automation on ServiceNow platform Knowledge of Advance risk management … SecOps administrator/consultant (this is mandatory) Must have concluded at least 1 lifecycle of ServiceNow IRM/SecOps implementation. Experience in JavaScript, API, Web Services Working knowledge of Vulnerability Mgmt. process & tools ISO/CISA/CISM/CISSP/CRICS (preferred) Platform expertise required: ServiceNow GRC & SecOps. More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
vertex-it-solutions
ideal candidate will be a proactive problem-solver, a mentor to junior team members, and a driving force in the ongoing improvement of our IT services. Key Responsibilities Infrastructure Management & Support: Design, build, and maintain the company's global IT infrastructure, including on-premises HPE/Dell server and storage hardware, co-located data centres, and cloud-based systems. … device management. Ensure the security of our infrastructure and data by managing on-premises and cloud security controls and working closely with the Security Operations Centre (SoC) to action vulnerabilitymanagement and system patching. Manage and maintain our Windows and Linux (CentOS, Red Hat, Ubuntu) server estate, as well as core Microsoft services (AD, GPO, DNS, NPS/… SMTP Relay), and our extensive VMware vSphere/vCenter virtualisation platform. Administer and optimise our System Centre Configuration Manager (SCCM) hierarchy, including Primary/Secondary sites, Distribution Points, Cloud Management Gateway (CMG), and Azure integration for global software deployment and updates. Manage and maintain our VDI environment (VMware Horizon/Citrix/OLVM), ensuring a reliable experience for our More ❯
Ensure systems and services are reliable, secure, and aligned with business objectives. Manage and maintain a hybrid datacentre and multicloud (AWS/AZURE) environment. Oversee incident, change, and problem management following ITIL best practices. Drive continuous improvement initiatives to enhance performance and efficiency. Partner with suppliers and vendors to ensure best-in-class service delivery. Support business continuity and … disaster recovery planning and execution. Monitor and manage system security, vulnerabilities, and compliance. 🏡 Skills & Experience Required Strong team leadership and management skills. Extensive hands on knowledge with public cloud solutions - AWS (Essential), AZURE (Nice to have) Broad understanding of SaaS services such as Office 365. ITIL experience or qualifications. Proven experience managing medium to large-scale IT projects. Excellent … and decision-making skills. Strong Microsoft stack knowledge: Exchange, Active Directory, IIS, Networking, Windows Server 2019+, PowerShell. AWS Associate (or higher) or Azure equivalent certification advantageous. Practical experience with vulnerabilitymanagement and IT governance. Beyond technical expertise, we’re looking for someone curious, proactive, and eager to grow. At Awaze, learning never stops, whether it’s mastering new More ❯