geographically dispersed environment. Identify process and technical improvements for the environment Desirable Knowledge in a variety of endpoint solutions such as Sophos and/or Symantec AV Knowledge of VulnerabilityManagement and Risk Analysis AV policy enhancements for SACB solutions (Netskope) Vendor-specific AV/APT certifications Prior experience and/or training with regard to the ITIL More ❯
Knutsford, Cheshire, United Kingdom Hybrid/Remote Options
Applause IT Recruitment Ltd
such as ISO 27001 and SOC 2 Type II. This is a visible and strategic position - ideal for someone who enjoys combining technical depth with governance, audit, and risk management responsibilities. Key Responsibilities Develop and maintain the company's information security strategy, policies, and frameworks. Oversee day-to-day security operations including access control, patching, log review, and alert … Strong understanding of ISMS principles (ISO 27001) and audit support for SOC 2 Type II. Hands-on experience with security tools and controls - SIEM, IAM/PAM, endpoint protection, vulnerability management. Working knowledge of data-protection and privacy standards (GDPR, HIPAA). Excellent communication skills - able to collaborate across technical and non-technical teams. Relevant certifications welcomed - CISSP, CISM More ❯
with strong leadership and strategic planning capabilities. Key Responsibilities Security Leadership Define and implement the company's IT security strategy, policies, and frameworks. Lead risk assessments, threat modeling, and vulnerability management. Ensure compliance with ISO 27001, SOC 2, GDPR, HIPAA, and other relevant standards. Oversee incident response and monitoring to ensure rapid detection and remediation. Champion a security-first … detection/prevention systems. Experience supporting AI/ML platforms and GPU clusters is a plus. Familiarity with compliance frameworks (SOC 2, ISO 27001, FedRAMP). Excellent leadership, stakeholder management, and communication skills. Preferred Qualifications Advanced degree in Computer Science, Cybersecurity, or related field. Certifications such as CISSP, CISM, CCSP, or AWS Security Specialty. Experience in AI-focused or More ❯
in embedding security into IT platforms across both cloud and on-premises environments. You’ll advise on security design, implement and maintain controls, and contribute to incident response and vulnerability management. The role involves working closely with architects, infrastructure teams, and project managers to ensure systems are resilient, compliant, and aligned to best practice. You’ll also be involved … ll bring strong experience in cyber or IT infrastructure security, ideally within hybrid Microsoft-based environments. You should have hands-on expertise in areas such as identity and access management, encryption, monitoring tools, and vulnerability management. A sound knowledge of regulatory frameworks and industry security standards is important, along with the ability to balance technical detail with clear … endpoint protection. Familiarity with frameworks like NIST, CIS, ISO 27001, and Cyber Essentials Plus. Experience with monitoring and SIEM tools, threat detection, and incident response. Strong communication and stakeholder management skills. Desirable experience: Security certifications (e.g. CISSP, CISM, Microsoft security certs). Cloud security or architecture qualifications. Knowledge of automation, scripting, or SOAR platforms. Experience in OT or IoT More ❯
Leeds, West Yorkshire, United Kingdom Hybrid/Remote Options
Corecom Consulting
Leeds is seeking a Full-Stack PHP Developer to join its small but growing team. The business has evolved from dark web monitoring into a full External Attack Surface Management (EASM) platform. The role is focused on enhancing, maintaining, and scaling this SaaS platform while embedding secure coding practices. Key Responsibilities * Enhance and maintain the SaaS platform hosted in … and general cybersecurity principles. * Ability to communicate effectively with technical and non-technical stakeholders. * Experience working in small teams or start-up environments. Desirable Skills * Experience in cybersecurity SaaS, vulnerabilitymanagement, or EASM. * Familiarity with serverless AWS infrastructure and cloud-native architectures. * Exposure to AI/ML in the context of cybersecurity. * Knowledge of DevOps practices, CI/ More ❯
automation, and a mobile-first strategy across a global footprint. Duties and Responsibilities Platform Ownership & Strategy • Act as the primary owner for the Azure cloud environment, including governance, cost management, architecture, and operations. • Develop and maintain a scalable, secure, and resilient cloud platform aligned with the firm's digital transformation goals. • Drive and implement the roadmap for infrastructure upgrades … regardless of time of day is an essential. • Lead by example, setting clear expectations and holding individuals and teams accountable for high performance and ethical conduct. • Provide direct line management of individuals where appropriate, ensuring clear direction, regular development conversations, and alignment with team and business goals. Operational Management • Take full ownership of day-to-day BAU operations … ensuring the cloud platform's performance, reliability, security, and compliance. This includes patch management across all infrastructure services, as well as ensuring regular reporting is carried out for patch compliance and vulnerability management. Beyond operational stability, the role demands a continuous improvement mindset - proactively evaluating the platform and driving enhancements to optimise efficiency, resilience, and user experience. • Manage More ❯
automation, and a mobile-first strategy across a global footprint. Duties and Responsibilities Platform Ownership & Strategy • Act as the primary owner for the Azure cloud environment, including governance, cost management, architecture, and operations. • Develop and maintain a scalable, secure, and resilient cloud platform aligned with the firm's digital transformation goals. • Drive and implement the roadmap for infrastructure upgrades … regardless of time of day is an essential. • Lead by example, setting clear expectations and holding individuals and teams accountable for high performance and ethical conduct. • Provide direct line management of individuals where appropriate, ensuring clear direction, regular development conversations, and alignment with team and business goals. Operational Management • Take full ownership of day-to-day BAU operations … ensuring the cloud platform's performance, reliability, security, and compliance. This includes patch management across all infrastructure services, as well as ensuring regular reporting is carried out for patch compliance and vulnerability management. Beyond operational stability, the role demands a continuous improvement mindset - proactively evaluating the platform and driving enhancements to optimise efficiency, resilience, and user experience. • Manage More ❯
of Infrastructure as Code, Containers and CI/CD concepts. In-depth knowledge of SAST/DAST tooling and concepts and how best to utilize it to enhance the VulnerabilityManagement and wider IAC capabilities. Significant knowledge of AWS environments and implementing AWS Well Architected Security pillar. Experience building and fine-tuning security tooling to be deployed in More ❯
Bristol, Avon, South West, United Kingdom Hybrid/Remote Options
Alexander Mae (Bristol) Ltd
desk Assist with pre-sales technical support Providing technical support by way of support tickets and emails Answering the phone when needed Completing business as usual activities such as vulnerabilitymanagement, patching, backend systems troubleshooting Acting as primary technical lead Training other members of the desk, or assisting non technical staff with support issues Answering to the service More ❯
BAE Systems, 1st Floor, Main Shipyard Offices, Barrow-in-Furness, Cumbria, England
BAE SYSTEMS PLC
risks and issues to business managers and other stakeholders and then applies and maintains specific security controls as required by organisational policy and local risk assessments Supporting incidents and vulnerabilitymanagement Supports the Investigation of minor security breaches in accordance with established procedures Assists users in defining their access rights and privileges Performs non-standard security administration tasks More ❯
them to real-world solutions. Strong background in web services, RESTful APIs, and event-driven architectures (MSMQ, RabbitMQ, Kafka). Security-first mindset with experience in threat modelling and vulnerability management. This is a super technical role with very complex software so your problem solving skills will be challenged every day. The Perks Salary: Up to More ❯
automation, and a mobile-first strategy across a global footprint. Key Responsibilities Platform Ownership s Strategy Act as the primary owner for the Azure cloud environment, including governance, cost management, architecture, and operations. Develop and maintain a scalable, secure, and resilient cloud platform aligned with the firm’s digital transformation goals. Drive and implement the roadmap for infrastructure upgrades … expectation of flexibility and responsiveness during critical incidents. Lead by example, setting clear expectations and holding individuals and teams accountable for high performance and ethical conduct. Provide direct line management of individuals where appropriate, ensuring clear direction, regular development conversations, and alignment with team and business goals. This role requires you to remain hands on as well as take … on leadership responsibilities. Operational Management Take full ownership of day-to-day BAU operations, ensuring the cloud platform’s performance, reliability, security, and compliance. This includes patch management across all infrastructure services, as well as ensuring regular reporting is carried out for patch compliance and vulnerability management. Beyond operational stability, the role demands a continuous improvement mindset More ❯
automation, and a mobile-first strategy across a global footprint. Key Responsibilities Platform Ownership s Strategy Act as the primary owner for the Azure cloud environment, including governance, cost management, architecture, and operations. Develop and maintain a scalable, secure, and resilient cloud platform aligned with the firm’s digital transformation goals. Drive and implement the roadmap for infrastructure upgrades … expectation of flexibility and responsiveness during critical incidents. Lead by example, setting clear expectations and holding individuals and teams accountable for high performance and ethical conduct. Provide direct line management of individuals where appropriate, ensuring clear direction, regular development conversations, and alignment with team and business goals. This role requires you to remain hands on as well as take … on leadership responsibilities. Operational Management Take full ownership of day-to-day BAU operations, ensuring the cloud platform’s performance, reliability, security, and compliance. This includes patch management across all infrastructure services, as well as ensuring regular reporting is carried out for patch compliance and vulnerability management. Beyond operational stability, the role demands a continuous improvement mindset More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid/Remote Options
Last Mile Infrastructure Limited
our digital resilience. As a Cyber Security Lead, reporting into the Director, Technology and Data, youll lead and develop a team of security professionals, oversee the delivery and ongoing management of our security infrastructure, and act as the go-to technical expert in threat detection, incident response, and vulnerability management. Were looking for someone with strong leadership skills … cyber security role, with a proven track record of leading and mentoring a team. Extensive experience with security technologies such as SIEM, firewalls, intrusion detection/prevention systems, and vulnerability scanning tools. In-depth knowledge of incident response procedures, threat hunting, and forensic investigation techniques. Strong understanding of networking protocols, operating systems, and cloud security principles. Qualifications Bachelor's … wastewater. Working through our operating companiesUKPS(in South of England and Wales),Energetics(in Scotland, North Wales and the North of England) and our asset adoption businessLast Mile Asset Management, we offer a one-stop shop for new utility connections. Were proud to be both aGreat Place to Workcertified business and a Living Wage Employer, reflecting our commitment to More ❯
Pod Security Policies (or the newer Pod Security Admission controller), and GKE Sandbox. Configuring and enforcing network policies to control traffic between pods and namespaces. Using container scanning and vulnerabilitymanagement tools to secure container images. Implementing Binary Authorization to ensure only trusted images are deployed to clusters. Establishing robust IAM policies for GKE and related GCP services. … Excellent communication, stakeholder management, and problem-solving skills. Relevant professional certifications (e.g., Google Cloud Certified Professional Cloud Architect or DevOps Engineer) are a plus. More ❯
Lincoln, Lincolnshire, East Midlands, United Kingdom Hybrid/Remote Options
ITSS Recruitment Ltd
responsible for driving the technical direction, team growth, and execution of software initiatives that support our business goals. The ideal candidate combines deep technical expertise with strong leadership, project management, and cross-functional collaboration skills. We are ideally looking for someone who can primarily be office based, with flexibility for home working when required. Key Responsibilities * Lead and mentor … and resource plans. * Serve as the technical voice in executive discussions and strategic planning. * Ensure all systems and software meet internal standards and external compliance requirements. * Oversee incident response, vulnerabilitymanagement, and disaster recovery plans. As a visionary and strategic technology leader, the Director of Software Engineering is responsible for shaping and executing the software development strategy that More ❯
project teams. Perform vendor risk assessments insupport of internal business process area project teams. May be required tosupport Critical Infrastructure Protection (CIP) readiness and compliance activities. Generate regular risk management reports using various security technologies. Perform internal vulnerability assessments and ensure remediation of vulnerabilitiesfor business process area infrastructure and web applications. May be requested toperform internal penetration testing. More ❯
on senior role for someone who thrives on solving complex challenges, mentoring others, and shaping IT standards in an evolving and ambitious organisation. What You’ll Do Lead the management and development of a hybrid IT estate, ensuring performance, security, and resilience. Oversee Windows Server, Active Directory, Intune, Azure, and virtualisation platforms (Hyper-V, SAN). Drive improvements in … on system upgrades, automation, and business continuity planning. What You’ll Bring Strong expertise in Windows Server, Active Directory, Azure, Hyper-V, and Veeam. Solid understanding of cybersecurity, identity management, and vulnerability management. Proven troubleshooting and documentation skills. Experience supporting multi-site or hybrid environments. Desirable: Certifications (e.g. Microsoft, CompTIA, or cybersecurity) PowerShell scripting, networking (Barracuda, Ubiquiti), or More ❯
shape a secure and scalable platform at the crossroads of security, technology, and energy innovation. Key Responsibilities: Lead the architecture and design of ServiceNow SecOps modules (Security Incident Response, Vulnerability Response, Threat Intelligence, etc.). Integrate ServiceNow with cybersecurity tools (SIEM, SOAR, EDR, CMDB, OT/ICS). Work with cybersecurity, IT, and engineering teams to automate and improve … quality, performance, and security across implementations. What You Will Ideally Bring: Proven ServiceNow Architect experience, ideally across SecOps or IRM modules. Strong understanding of security operations, incident response, and vulnerability management. Hands-on expertise in ServiceNow workflows, Scripting, and integrations (REST/SOAP, MID Server). Experience supporting critical infrastructure (energy, utilities, or OT/ICS environments). Excellent More ❯
Manager you will run a small team that leads the design, implementation and improvement of operational security across all IT systems. You will have a strong background in risk management, compliance and vulnerability management. Requirements Strong knowledge of security frameworks and standards (ISO27001, NIST, GDPR) Extensive experience within IT and Security with 5+ years of these IT Management or leadership Knowledge of IT architecture within a regulated environment Experience with stakeholder management both internally and externally (vendors, audits, consultants) Experience in security tooling General understanding of modern infrastructure (DevOps, Cloud, CI/CD) Previously been involved in budgeting (monthly and annually) Relevant professional certifications CISSP, CISM etc Want to know more? Click apply or reach out More ❯
diverse business models, including franchisee and third-party environments. Responsibilities: Lead Incident Response across the organization, coordinating investigations and remediation. Conduct Security Gap Analysis and recommend control enhancements. Manage Vulnerability Detection & Remediation using tools like Tenable, Nessus, and Microsoft Defender. Maintain clear Documentation & Reporting for technical and non-technical stakeholders. Engage with IT teams, franchisees, vendors, and regional leaders … improvements. Contribute to the development of security programs and frameworks. Provide technical leadership in Microsoft-centric environments (Defender, Sentinel, Azure 365). Requirements: Proven experience in incident response and vulnerability management. Strong proficiency in Microsoft Defender, Sentinel, Azure 365, Tenable, Nessus. Ability to analyze and remediate security threats across distributed environments. Excellent communication skills for stakeholder engagement and executive More ❯
Saint Paul, Minnesota, United States Hybrid/Remote Options
Genesis10
LLMs); Automating and integrating application security capabilities in the SDLC/DevOps processes for AI/ML applications. Expert knowledge of Application Security practices including SAST, DAST, SCA, Application Vulnerability Management. Foundational knowledge of Cloud Security and IAM (Identity and Access Management) principles. Education/Experience: Associate's degree in computer programming or relevant field required. Bachelor's … LLMs); Automating and integrating application security capabilities in the SDLC/DevOps processes for AI/ML applications. Expert knowledge of Application Security practices including SAST, DAST, SCA, Application Vulnerability Management. Foundational knowledge of Cloud Security and IAM (Identity and Access Management) principles. Only candidates available and ready to work directly as Genesis10 employees will be considered for More ❯