with our people and customers at the heart of everything we do. We’re hiring an Information Security Manager to lead the development and evolution of our Information Security Management System (ISMS), aligned with ISO 27001:2022. This strategic and hands-on role is pivotal in safeguarding our digital infrastructure, managing cyber risk, and embedding a security-first culture … across the business. What You’ll Be Doing Lead and maintain our ISO 27001:2022-compliant ISMS Drive risk management across systems, suppliers, and processes Respond to security incidents with forensic precision and coordination Conduct supplier assurance audits and enforce security policies Champion cyber awareness through training and simulations Oversee compliance with GDPR, ISO standards, and regulatory frameworks Collaborate … What We’re Looking For Proven experience managing enterprise ISMS and leading ISO 27001 audits Deep understanding of cyber threats, cloud security (Azure, M365), and compliance frameworks Skilled in vulnerabilitymanagement, penetration testing, and supplier assurance Strong communicator with the ability to translate technical risk into business impact Experience with tools like ISMS Online, Qualys VMDR, and Cofense More ❯
Description We re seeking a hands-on Security Architect to lead the design and assurance of security across our Financial Advice & Wealth Management SaaS platform. This is a pivotal role where you ll own the security architecture across cloud infrastructure and networking, drive secure-by-design application architectures, and ensure robust security for integrations with external partners and systems. … us meet the expectations of our customers, clients, and regulators What you'll do Design and maintain secure cloud environments, including network segmentation, WAFs, DDoS protection, secret and certificate management, and encryption. Embed secure SDLC practices such as SAST/DAST, dependency scanning, secure coding standards, threat modelling, and API security. Architect identity-centric controls across cloud infrastructure and … Align security standards and frameworks with business and technology strategy. Monitor and communicate emerging security trends. Identify and address security design gaps in application and infrastructure architectures. Assist with vulnerabilitymanagement, testing, risk analysis, and reporting. Clearly communicate security concepts and strategies to stakeholders. The knowledge, experience and qualifications you need Strong expertise in cloud security, preferably within More ❯
Description We’re seeking a hands-on Security Architect to lead the design and assurance of security across our Financial Advice & Wealth Management SaaS platform. This is a pivotal role where you’ll own the security architecture across cloud infrastructure and networking, drive secure-by-design application architectures, and ensure robust security for integrations with external partners and systems. … us meet the expectations of our customers, clients, and regulators What you'll do Design and maintain secure cloud environments, including network segmentation, WAFs, DDoS protection, secret and certificate management, and encryption. Embed secure SDLC practices such as SAST/DAST, dependency scanning, secure coding standards, threat modelling, and API security. Architect identity-centric controls across cloud infrastructure and … Align security standards and frameworks with business and technology strategy. Monitor and communicate emerging security trends. Identify and address security design gaps in application and infrastructure architectures. Assist with vulnerabilitymanagement, testing, risk analysis, and reporting. Clearly communicate security concepts and strategies to stakeholders. The knowledge, experience and qualifications you need Strong expertise in cloud security, preferably within More ❯
DevSecOps Lead to set technical direction and ensure secure, scalable, and resilient systems. Key Responsibilities: Define and enforce platform architecture standards with a focus on security and resilience Lead vulnerabilitymanagement and compliance alignment Implement security best practices across CI/CD pipelines and infrastructure Drive API security (OAuth, JWT, API keys) and lifecycle management Oversee disaster … recovery strategies and resilience testing Automate infrastructure upgrades using IaC tools 🛠️ Tech Stack: Cloud & DevOps: AWS (Lambda, API Gateway, ECS, DynamoDB, S3), Azure DevOps, GitHub Workflows Security: Secure coding, vulnerability scanning, compliance frameworks Infrastructure Automation: Terraform, Ansible, Docker Programming: Python, Node.js API Management: Apigee Edge/Apigee X What We’re Looking For: Strong expertise in cloud-native More ❯
gap analyses , delivering actionable insights aligned with leading frameworks (Cyber Essentials, NIST, ISO27001, CIS). Provide expert GRC guidance , helping clients build, assess, and mature their cybersecurity posture. Conduct vulnerability assessments and collaborate on remediation through services such as MDR, DLP, and Penetration Testing. Act as a trusted security advisor , managing multiple client engagements and presenting findings clearly to … Essentials/Plus, NIST, CIS , and ISO27001 . Proficiency with common cybersecurity tools and technologies, and a strong knowledge of current cybersecurity threats, trends, and mitigation strategies, ideally around vulnerabilitymanagement or incident response. Professional certifications such as CISSP, CISM, or CEH (preferred). Excellent communication skills, with experience presenting to senior stakeholders, including C-level executives. Ability More ❯
as the central point for all cybersecurity matters and incident response. Maintain the cybersecurity risk register and lead Cyber Essentials certification. Oversee Microsoft 365 and Google Workspace security, including vulnerabilitymanagement, patching, MFA, and email security. Coordinate security audits, penetration tests, and third-party application reviews. Manage and monitor MSP performance, ensuring consistent security standards. Promote cybersecurity awareness More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Sanderson
as the central point for all cybersecurity matters and incident response. Maintain the cybersecurity risk register and lead Cyber Essentials certification. Oversee Microsoft 365 and Google Workspace security, including vulnerabilitymanagement, patching, MFA, and email security. Coordinate security audits, penetration tests, and third-party application reviews. Manage and monitor MSP performance, ensuring consistent security standards. Promote cybersecurity awareness More ❯
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, VulnerabilityManagement, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯
Bristol, Gloucestershire, United Kingdom Hybrid/Remote Options
Deloitte LLP
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, VulnerabilityManagement, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯
this transformation, we are seeking an experienced Environment Manager who will play a pivotal role in managing and optimising our technology environments across the development lifecycle. Responsibilities Environment Lifecycle Management: Oversee the provision, configuration, and maintenance of technology environments across lifecycle stages including Development, System Integration Testing (SITS), Pre-Production, whilst supporting Production. This spans on-premises ERP systems … focusing on cost efficiency, demand fulfilment, and adherence to best practices. Deliver a consistent model across technology with our partners. Process Improvement: Continuously identify and implement improvements to environment management processes, tools, and documentation to simplify and optimise the environment landscape. Environment Cost Optimisation: Monitor, forecast, and manage environment-related costs across all delivery stages, aligning provisioning and scheduling … with demand to ensure efficient resource utilisation and scalable costs across ERP, digital, and cloud-native platforms. Security, VulnerabilityManagement & Compliance: Ensure robust security practices across all environments, proactively identify and remediate vulnerabilities, and maintain compliance with industry and audit requirements. Incident Management: Own incident and escalation Resolution across environments, communicating clearly with senior stakeholders and translating More ❯
intrusion prevention) are correctly configured and maintained. Participate in resilience planning, including disaster recovery and business continuity exercises, ensuring network components meet required redundancy and failover standards. Assist in vulnerabilitymanagement activities by reviewing and remediating network-related findings. Maintain compliance with NHS Digital, DSP Toolkit, and Cyber Essentials Plus standards as they apply to network operations. About … configuring cyber systems and associated functionality Significant knowledge of working practices within technical/cyber security Significant experience of Cisco networking hardware Experience of LAN, WLAN troubleshooting, implementation and management Working with suppliers Defining Trust security requirements and interpreting them to system suppliers Advanced knowledge of Microsoft Office applications Person Specification Qualifications Essential Please click 'apply now' to view More ❯
City Of London, England, United Kingdom Hybrid/Remote Options
DGH Recruitment
one scripting language (PowerShell or Python preferred). Experience and understanding of hyperconverged infrastructure preferably with Nutanix, VMWare, Commvault and hybrid cloud infrastructure (Azure or similar). Knowledge of vulnerabilitymanagement, monitoring/alerting, and automation/orchestration platforms. Disaster Recovery Specialist/IT Resilience Specialist More ❯
City of London, London, United Kingdom Hybrid/Remote Options
DGH Recruitment
at least one scripting language (PowerShell or Python preferred). - Understanding of hyperconverged infrastructure preferably with Nutanix, VMWare, Commvault and hybrid cloud infrastructure (Azure or similar). - Knowledge of vulnerabilitymanagement, monitoring/alerting, and automation/orchestration platforms. IT Disaster Recovery Technical Specialist In accordance with the Employment Agencies and Employment Businesses Regulations 2003, this position is More ❯
Basildon, England, United Kingdom Hybrid/Remote Options
Cloud Decisions
and respond to security alerts, incidents and vulnerabilities. Deliver Cyber Essentials & Cyber Essentials Plus engagements and renewals. Deploy and support Microsoft 365 Security, Intune and Defender solutions. Assist with vulnerabilitymanagement and remediation across customer estates. Work with platforms like Mimecast, SentinelOne, Sophos and Microsoft Security & Compliance Centre. Act as 2nd/3rd line escalation and drive root More ❯
looking for a more consultative, client-facing role. Ideal Background: Proven experience in cyber security design, architecture, or consultancy. Hands-on expertise across domains such as SIEM, SOAR, EDR, VulnerabilityManagement, WAF, IDAM, and Cloud Security. Strong understanding of vendor technologies (e.g., Fortinet, Palo Alto, Juniper). Excellent communication and stakeholder engagement skills — able to translate complex technical More ❯
Leeds, England, United Kingdom Hybrid/Remote Options
Corecom Consulting
coding principles and web application security. Comfortable working end-to-end across the stack in a small, fast-moving team. Desirable: Professional experience in cybersecurity SaaS, threat intelligence, or vulnerability management. Familiarity with AI/ML technologies, particularly around data classification or automation. Experience with CI/CD, containerisation, and serverless architectures. Front-end experience with React and TypeScript. More ❯
configuration, control code debugging, and API integration. Endpoint & Conferencing Systems: Expert in platform-specific deployment, configuration, and troubleshooting for Microsoft Teams Rooms), Zoom Rooms, and Cisco WebEx. Own the Vulnerability Lifecycle: Act as the subject matter expert (SME) responsible for the full vulnerabilitymanagement lifecycle for UC systems (e.g., UC Room software, Crestron, Q-SYS, DSPs, MTR More ❯
training material, and user guides for developed applications Collaborate with internal IT and business teams to define and deliver new features and integrations Operate within the organisation’s Risk Management and Compliance frameworks, escalating issues where appropriate Contribute to continuous improvement initiatives across development practices and system design Ideal Candidate Profile Proven experience as an RPG Developer working on …/BA in Computer Science or related field (MSc/MA desirable) Familiarity with development frameworks and standards used in financial institutions advantageous Experience with Citrix server administration or vulnerabilitymanagement would be an asset Why Join This is a chance to work at the centre of a major business and technology transformation , modernising critical banking systems and More ❯
MoD) and other regulatory bodies to demonstrate compliance with stringent security and airworthiness standards.Key Responsibilities* Lead product-level cybersecurity assessments for UAV platforms, avionics, and embedded payload systems.* Conduct vulnerability analysis and assurance activities across software, firmware, and communication interfaces.* Develop and maintain product security architectures, ensuring compliance with secure-by-design principles and recognised standards.* Support and participate … Secure Development Lifecycle (SDL) processes.* Identify and mitigate cyber threats early in the product lifecycle through threat modelling and risk analysis.* Drive continuous improvement in security testing, automation, and vulnerabilitymanagement practices.* Proficiency in one or more programming/scripting languages: C, C++, Python, or Bash, preferably in embedded or Linux environments. Modis International Ltd acts as an More ❯
and other regulatory bodies to demonstrate compliance with stringent security and airworthiness standards. Key Responsibilities * Lead product-level cybersecurity assessments for UAV platforms, avionics, and Embedded payload systems. * Conduct vulnerability analysis and assurance activities across software, firmware, and communication interfaces. * Develop and maintain product security architectures, ensuring compliance with secure-by-design principles and recognised standards. * Support and participate … Development Lifecycle (SDL) processes. * Identify and mitigate cyber threats early in the product life cycle through threat modelling and risk analysis. * Drive continuous improvement in security testing, automation, and vulnerabilitymanagement practices. * Proficiency in one or more programming/Scripting languages: C, C++, Python, or Bash, preferably in Embedded or Linux environments. Modis International Ltd acts as an More ❯
Attack Path analysis; IT and Infrastructure experience (Windows Server and/or Red Hat Linux); development of monitoring use cases; collaboration and remediation engagement 3+ years of experience in vulnerabilitymanagement or compliance monitoring Experience in design and implementation of security technologi Experience with IT controls monitoring for regulatory and compliance requirements Experience with visualization tools In-depth More ❯
at the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Threat and Vulnerability Manager to protect DIT and the wider UK government from cyber threats in a fast paced and exciting role, responsible for the VulnerabilityManagement and Threat Hunting More ❯
Sentinel, and Tenable One, ensuring these platforms are aligned with security best practices and operational readiness standards. The Role: The role requires strong technical expertise across SIEM, EDR, and VulnerabilityManagement technologies Combined with consultative experience in capacity planning, architectural design, and gap analysis This position bridges the gap between pre-sales design and post-implementation operations, ensuring More ❯
dive deep into the technical tooling and set strategic direction for a small but high-performing team. The remit cover end-to-end defence, covering security strategy, incident response, vulnerabilitymanagement, cloud security and insider risk protection, all within one of the most data-driven, high speed environments. You'll partner closely with engineering, IT and senior leadership More ❯
in IT operations, or security support role. Exposure to security monitoring or incident response processes (e.g. handling alerts, phishing investigations, or log review). Familiarity with patching, configuration, or vulnerabilitymanagement activities. Experience of working in a technical information security role, covering operations and/or infrastructure security. Experience working with or alongside a managed SOC, including escalation More ❯