Milton Keynes, Buckinghamshire, South East, United Kingdom
COMPUTACENTER (UK) LIMITED
team members Ensure accurate documentation and incident records Participate in team meetings and contribute to service improvements Use monitoring tools to track and resolve incidents Support compliance, patching, and vulnerabilitymanagement Liaise with 3rd Line teams to drive service enhancements Deliver small project work to customer timelines What youll need Were looking for a team player with a More ❯
Manchester, England, United Kingdom Hybrid/Remote Options
iO Associates
architecture or engineering) Strong communication and presentation skills, with the confidence to engage at all levels Hands-on experience with security tools such as SIEM, SOAR, EDR, WAF or vulnerabilitymanagement A desire to move into a solutions or pre-sales role , combining your technical expertise with commercial awareness Energy, curiosity and a genuine passion for helping customers More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid/Remote Options
Operations Resources
the role is to develop policies to protect the Companies data and networks which is a Microsoft-centric environment. Secondary, you should have been involved in incident response and vulnerability management. This is a new interesting role which will surely evolve over time. This is a full time permanent position based on site and does NOT offer remote working. More ❯
implement, and maintain information security policies, procedures, and guidelines. - Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001). - SIEM & Vulnerability Management. - Monitor and respond to security incidents, conducting investigations and implementing corrective actions. - Collaborate with IT and other departments to ensure the security of network infrastructure and data. - Manage … risk assessments and vulnerability assessments to identify potential security threats. - Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies. - Provide training and guidance to staff on information security best practices. - Stay updated on the latest cybersecurity trends and technologies. **Qualifications:** - Bachelor's degree in Information Security, Computer Science, or a related field. … Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor. - Proven experience in information security management and conducting security audits. - Strong knowledge of information security frameworks and standards. - Excellent analytical and problem-solving skills. - Strong communication and interpersonal skills. **Preferred Qualifications:** - Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX. - Familiarity with security tools and technologies More ❯
implement, and maintain information security policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001).- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage … risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information Security, Computer Science, or a related field. … Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor.- Proven experience in information security management and conducting security audits.- Strong knowledge of information security frameworks and standards.- Excellent analytical and problem-solving skills.- Strong communication and interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX.- Familiarity with security tools and technologies More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Randstad Digital
VMware environments. Troubleshoot and resolve system, platform, and network issues with minimal supervision. Apply knowledge of networking technologies to support infrastructure needs. Implement and maintain cybersecurity best practices and vulnerabilitymanagement processes. Utilize Python, Bash, and APIs for scripting, automation, and integrations. Continuously challenge and improve existing processes, driving automation and operational excellence. Collaborate effectively with cross-functional … Linux (RHEL) administration. Proven expertise with Red Hat Satellite installation, configuration, and management. Hands-on experience with Ansible/AAP and Infrastructure as Code practices. Practical knowledge of VMware management and upgrades. Solid understanding of networking fundamentals and cybersecurity principles. Scripting experience with Python and Bash; familiarity with working via APIs. Excellent problem-solving abilities and ownership mindset. Strong More ❯
VMware environments. Troubleshoot and resolve system, platform, and network issues with minimal supervision. Apply knowledge of networking technologies to support infrastructure needs. Implement and maintain cybersecurity best practices and vulnerabilitymanagement processes. Utilize Python, Bash, and APIs for scripting, automation, and integrations. Continuously challenge and improve existing processes, driving automation and operational excellence. Collaborate effectively with cross-functional … Linux (RHEL) administration. Proven expertise with Red Hat Satellite installation, configuration, and management. Hands-on experience with Ansible/AAP and Infrastructure as Code practices. Practical knowledge of VMware management and upgrades. Solid understanding of networking fundamentals and cybersecurity principles. Scripting experience with Python and Bash; familiarity with working via APIs. Excellent problem-solving abilities and ownership mindset. Strong More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Randstad Digital
VMware environments. Troubleshoot and resolve system, platform, and network issues with minimal supervision. Apply knowledge of networking technologies to support infrastructure needs. Implement and maintain cybersecurity best practices and vulnerabilitymanagement processes. Utilize Python, Bash, and APIs for scripting, automation, and integrations. Continuously challenge and improve existing processes, driving automation and operational excellence. Collaborate effectively with cross-functional … Linux (RHEL) administration. Proven expertise with Red Hat Satellite installation, configuration, and management. Hands-on experience with Ansible/AAP and Infrastructure as Code practices. Practical knowledge of VMware management and upgrades. Solid understanding of networking fundamentals and cybersecurity principles. Scripting experience with Python and Bash; familiarity with working via APIs. Excellent problem-solving abilities and ownership mindset. Strong More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Randstad Technologies
VMware environments. Troubleshoot and resolve system, platform, and network issues with minimal supervision. Apply knowledge of networking technologies to support infrastructure needs. Implement and maintain cybersecurity best practices and vulnerabilitymanagement processes. Utilize Python, Bash, and APIs for scripting, automation, and integrations. Continuously challenge and improve existing processes, driving automation and operational excellence. Collaborate effectively with cross-functional … Linux (RHEL) administration. Proven expertise with Red Hat Satellite installation, configuration, and management. Hands-on experience with Ansible/AAP and Infrastructure as Code practices. Practical knowledge of VMware management and upgrades. Solid understanding of networking fundamentals and cybersecurity principles. Scripting experience with Python and Bash; familiarity with working via APIs. Excellent problem-solving abilities and ownership mindset. Strong More ❯
MoD) and other regulatory bodies to demonstrate compliance with stringent security and airworthiness standards.Key Responsibilities* Lead product-level cybersecurity assessments for UAV platforms, avionics, and embedded payload systems.* Conduct vulnerability analysis and assurance activities across software, firmware, and communication interfaces.* Develop and maintain product security architectures, ensuring compliance with secure-by-design principles and recognised standards.* Support and participate … Secure Development Lifecycle (SDL) processes.* Identify and mitigate cyber threats early in the product lifecycle through threat modelling and risk analysis.* Drive continuous improvement in security testing, automation, and vulnerabilitymanagement practices.* Proficiency in one or more programming/scripting languages: C, C++, Python, or Bash, preferably in embedded or Linux environments.* Familiarity with relevant standards, including:o More ❯
and other regulatory bodies to demonstrate compliance with stringent security and airworthiness standards. Key Responsibilities * Lead product-level cybersecurity assessments for UAV platforms, avionics, and Embedded payload systems. * Conduct vulnerability analysis and assurance activities across software, firmware, and communication interfaces. * Develop and maintain product security architectures, ensuring compliance with secure-by-design principles and recognised standards. * Support and participate … Development Lifecycle (SDL) processes. * Identify and mitigate cyber threats early in the product life cycle through threat modelling and risk analysis. * Drive continuous improvement in security testing, automation, and vulnerabilitymanagement practices. * Proficiency in one or more programming/Scripting languages: C, C++, Python, or Bash, preferably in Embedded or Linux environments. * Familiarity with relevant standards, including: o More ❯
Hands-on experience with security tools (OWASP Zap, Trivy, Dependabot) in CI/CD Cloud security expertise in AWS and Azure Strong scripting skills (Node.js, Python, Bash) Knowledge of vulnerabilitymanagement and secure DevOps practices Nice to Have IaC security knowledge Experience with defect tracking and automated testing frameworks Preferred Background Bachelor's in Computer Science or related More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid/Remote Options
Morson Edge
Operations - Windows & Linux administration - Regulatory - NIS/CAF and other assessment frameworks - Governance, process and documentation - Operational Technology/SCADA - Telecoms & Transport networks - Deployment of SIEMs, IDAM & PAM, and VulnerabilityManagement products - Legacy technologies Requirements • Skills and experience in understanding at a technical level security operation. • Awareness of key legislation and regulation impacting IT/OT General Control More ❯
Code) with Ansible, AAP VMware (upgrade, manage) Understanding of Networking Technologies Strong problem-solving skills with the ability to own, diagnose and resolve platforms Issues. Understanding of cybersecurity principles, vulnerabilitymanagement Experience of Python, Bash, API's Engineering mindset able to challenge the status quo and automate manual processes to deliver additional value. Exceptional communication & teamwork skills This More ❯
as Code) with Ansible, AAP VMware (upgrade, manage) Understanding of Networking Technologies Strong problem-solving skills with the ability to own, diagnose and resolve platformsIssues. Understanding of cybersecurity principles, vulnerabilitymanagement Experience of Python, Bash, API's Engineering mindset able to challenge the status quo and automate manual processesto deliver additional value. Exceptional communication & teamwork skills This is More ❯
geographically dispersed environment. Identify process and technical improvements for the environment Desirable Knowledge in a variety of endpoint solutions such as Sophos and/or Symantec AV Knowledge of VulnerabilityManagement and Risk Analysis AV policy enhancements for SACB solutions (Netskope) Vendor-specific AV/APT certifications Prior experience and/or training with regard to the ITIL More ❯
the heart of the global economy! The Department for International Trade (DIT) and Inspire People are partnering together to bring you an exciting opportunity for a Cyber Threat and Vulnerability Manager to protect DIT and the wider UK government from cyber threats in a fast paced and exciting role, responsible for the VulnerabilityManagement and Threat Hunting More ❯
Knutsford, Cheshire, United Kingdom Hybrid/Remote Options
Applause IT Recruitment Ltd
such as ISO 27001 and SOC 2 Type II. This is a visible and strategic position - ideal for someone who enjoys combining technical depth with governance, audit, and risk management responsibilities. Key Responsibilities Develop and maintain the company's information security strategy, policies, and frameworks. Oversee day-to-day security operations including access control, patching, log review, and alert … Strong understanding of ISMS principles (ISO 27001) and audit support for SOC 2 Type II. Hands-on experience with security tools and controls - SIEM, IAM/PAM, endpoint protection, vulnerability management. Working knowledge of data-protection and privacy standards (GDPR, HIPAA). Excellent communication skills - able to collaborate across technical and non-technical teams. Relevant certifications welcomed - CISSP, CISM More ❯
with strong leadership and strategic planning capabilities. Key Responsibilities Security Leadership Define and implement the company's IT security strategy, policies, and frameworks. Lead risk assessments, threat modeling, and vulnerability management. Ensure compliance with ISO 27001, SOC 2, GDPR, HIPAA, and other relevant standards. Oversee incident response and monitoring to ensure rapid detection and remediation. Champion a security-first … detection/prevention systems. Experience supporting AI/ML platforms and GPU clusters is a plus. Familiarity with compliance frameworks (SOC 2, ISO 27001, FedRAMP). Excellent leadership, stakeholder management, and communication skills. Preferred Qualifications Advanced degree in Computer Science, Cybersecurity, or related field. Certifications such as CISSP, CISM, CCSP, or AWS Security Specialty. Experience in AI-focused or More ❯
in embedding security into IT platforms across both cloud and on-premises environments. You’ll advise on security design, implement and maintain controls, and contribute to incident response and vulnerability management. The role involves working closely with architects, infrastructure teams, and project managers to ensure systems are resilient, compliant, and aligned to best practice. You’ll also be involved … ll bring strong experience in cyber or IT infrastructure security, ideally within hybrid Microsoft-based environments. You should have hands-on expertise in areas such as identity and access management, encryption, monitoring tools, and vulnerability management. A sound knowledge of regulatory frameworks and industry security standards is important, along with the ability to balance technical detail with clear … endpoint protection. Familiarity with frameworks like NIST, CIS, ISO 27001, and Cyber Essentials Plus. Experience with monitoring and SIEM tools, threat detection, and incident response. Strong communication and stakeholder management skills. Desirable experience: Security certifications (e.g. CISSP, CISM, Microsoft security certs). Cloud security or architecture qualifications. Knowledge of automation, scripting, or SOAR platforms. Experience in OT or IoT More ❯
Leeds, West Yorkshire, United Kingdom Hybrid/Remote Options
Corecom Consulting
Leeds is seeking a Full-Stack PHP Developer to join its small but growing team. The business has evolved from dark web monitoring into a full External Attack Surface Management (EASM) platform. The role is focused on enhancing, maintaining, and scaling this SaaS platform while embedding secure coding practices. Key Responsibilities * Enhance and maintain the SaaS platform hosted in … and general cybersecurity principles. * Ability to communicate effectively with technical and non-technical stakeholders. * Experience working in small teams or start-up environments. Desirable Skills * Experience in cybersecurity SaaS, vulnerabilitymanagement, or EASM. * Familiarity with serverless AWS infrastructure and cloud-native architectures. * Exposure to AI/ML in the context of cybersecurity. * Knowledge of DevOps practices, CI/ More ❯
automation, and a mobile-first strategy across a global footprint. Duties and Responsibilities Platform Ownership & Strategy • Act as the primary owner for the Azure cloud environment, including governance, cost management, architecture, and operations. • Develop and maintain a scalable, secure, and resilient cloud platform aligned with the firm's digital transformation goals. • Drive and implement the roadmap for infrastructure upgrades … regardless of time of day is an essential. • Lead by example, setting clear expectations and holding individuals and teams accountable for high performance and ethical conduct. • Provide direct line management of individuals where appropriate, ensuring clear direction, regular development conversations, and alignment with team and business goals. Operational Management • Take full ownership of day-to-day BAU operations … ensuring the cloud platform's performance, reliability, security, and compliance. This includes patch management across all infrastructure services, as well as ensuring regular reporting is carried out for patch compliance and vulnerability management. Beyond operational stability, the role demands a continuous improvement mindset - proactively evaluating the platform and driving enhancements to optimise efficiency, resilience, and user experience. • Manage More ❯