Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
Deloitte LLP
is embedded throughout the development lifecycle of Technology Assets by using Deloitte's Secure System Development Lifecyle (SSDLC) to assure paths to production. Oversee that security testing activities like vulnerability scanning, penetration testing, and code reviews are completed to identify weaknesses and potential exploits on the identified security requirements. Identify potential information security risks within a project, analyse their … information security principles, including confidentiality, integrity, and availability. Demonstrable understanding of Cybersecurity risk and controls inherent in various technologies, and related best practices. This includes OWASP Top 10 and vulnerability management. Have strong knowledge in cybersecurity frameworks and standards like ISO 27001, NIST, COBIT, and Cyber Essentials+ or equivalent. Experience with risk management methodologies, techniques, and being able … to clearly understand and articulate risk. Demonstrable ability to identify risks associated with business processes, operations, and the roll out of technology projects. An understanding of project management to manage security aspects within a project timeline and budget. Knowledge and understanding of cybersecurity technologies - mobile threat defense, endpoint protection, data loss prevention, insider threat protection, device hardening, classification, key More ❯
throughout the solution lifecycle, from initial design through development, testing, and into operational deployment. Demonstrate a strong understanding of leading operational security functions, including SOC operations, threat intelligence, and vulnerability management. Experience of managing the incident response lifecycle, including triage, containment, investigation, remediation, and conducting post-incident reviews. Ability to establish and improve incident response playbooks and escalation processes … risk owners to advise on exposure and inform proportionate, evidence-based decisions. Demonstrate capability in planning, scoping, and reviewing security assurance activities, including penetration tests, IT health checks, and vulnerability assessments. Ability to interpret technical findings and ensure remediation actions are appropriately prioritised and managed through to resolution. Experience of maintaining a technical risk register and developing appropriate compensating More ❯
Implement guidelines for effective management of security incidents to ensure all personnel understand their roles in maintaining security Develop incident response plans detailing procedures for detection, containment, eradication, recovery, and lessons learned. Conduct regular training sessions and simulations for staff to reinforce awareness of their responsibilities during incidents. Establish clear communication channels for reporting incidents promptly.Document limitations of security … Understanding basic control systems and applications (ex. Rockwell) Undergraduate degree in Computing; Cyber Security; Networking or any other relevant degree Minimum 5 years of experience in IT security or vulnerability management. Experience conducting vulnerability scans and managing remediation efforts. Excellent communication skills for training delivery and documentation.With over 200 brands sold in more than 180 countries, we're More ❯
to mitigate against vulnerabilities. Working with internal teams, you'll be instrumental in up-skilling Engineers on the Linux Platforms and working with them to create strategies around patch management and keeping Servers secure. The role will be based on onsite for the first week or 2 to get familiar with systems and the Team and will then reduce … If you're not local, it's down to you to sort travel arrangements/accommodation if required. Key experience/skills: - Linux SME Skills - RedHat - VMware - Patching/Vulnerabilitymanagement - Automation (Ansible, Jenkins, Git) If you feel you could be a great fit for the role, please send your CV for immediate consideration. DXP Talent LTD is More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Corecom Consulting
engineers through implementation, balancing workloads, addressing hotspots, and providing coaching. Oversee deployments, ensuring quality, traceability, and compliance with security standards . Take accountability for technical debt, service levels, and vulnerability management. Collaborate with architects, DevOps engineers, product owners, and Scrum Masters to deliver seamless solutions. Join the out-of-hours support rota for critical digital products. What We're More ❯
worked using Bitbucket (Source Safe) for Code Integration/Code Deployment (release on Demand). Implementation on Light Speed Enterprise Implement robust security measures, including access control, encryption, and vulnerability management. Ensure compliance with industry regulations and data privacy standards. Implement optimization techniques to ensure high availability and scalability. Qualifications & Experience Skills Required: Light Speed Enterprise ASP.NET Angular Microservices More ❯
and optimize infrastructure performance to ensure clinical systems meet uptime SLAs. Cybersecurity & Compliance Support • Partner with security teams to design infrastructure aligned with zero trust, segmentation, endpoint protection, and vulnerability management. • Ensure infrastructure meets HIPAA, HITECH, NIST, and Joint Commission compliance. Operations & Service Integration • Work closely with IT operations, service desk, and managed service providers to ensure smooth transitions … from architecture to run-state. • Support ITSM processes (CMDB, incident, change, asset management) with reliable infrastructure solutions. Governance & Collaboration • Chair the Infrastructure Architecture Review Board; define architectural standards, blueprints, and patterns. • Collaborate with clinical, operations, and digital health teams to understand requirements and translate into infrastructure solutions. Required Qualifications Education & Certifications Bachelor's degree in Computer Science, Information Technology … tools (Terraform, Ansible), and monitoring platforms (SolarWinds, Splunk, etc.). Solid knowledge of cybersecurity best practices, secure architecture, and audit requirements in healthcare. Soft Skills Excellent communication and stakeholder management skills. Strong problem-solving and decision-making ability in high-pressure clinical environments. Ability to lead cross-functional initiatives and drive consensus across technical and clinical stakeholders. Preferred Qualifications More ❯
and enforce cybersecurity policies, standards, and procedures in compliance with RMF, DoD, and IC guidelines. Evaluate and manage security configurations for systems, software, and hardware, including patching, scanning and vulnerability remediation. Monitor, respond to, and document cyber threats, IAVAs, and security incidents across enterprise environments. Administer access controls and authentication mechanisms while ensuring continuous improvement in information assurance practices. … security experience. Bachelors Degree in Computer Science, Cybersecurity or related field preferred. Demonstrated technical proficiency in RMF process, A&A toolsets and secure system operations. Proficiency in threat and vulnerability management. PREFERRED QUALIFICATIONS: Certifications such as CISSP, CISM, or IAM II Experience managing accreditation packages for cross-domain solutions, cloud environments, or tactical systems. Excellent communication skills for interfacing More ❯
outcomes: Drive reductions in total cost of ownership/service through standardisation, automation, CI modernisation, and effective vendor management. Implement and monitor CI controls to ensure data security, risk management, privacy, and regulatory compliance, including patch and vulnerability management. Establish governance processes that mitigate operational and cyber risks. Work with other Atos delivery functions, account teams, the UK … public cloud services from and is able to manage complex multi-cloud environments across major hyperscalers (AWS, Azure, Google), ensuring best practices in architecture, deployment, governance, and vendor relationship management in line with Atos's operating blueprint. Experience of leading/governing cloud migration programs, including assessment and planning through execution and optimisation, ensuring minimal disruption to services. Has … create a culture where people feel supported and encouraged. Read more about our commitment here. Whether it is fighting climate change, promoting digital inclusion, or ensuring trust in data management - tech for good sits at the core of our identity. With numerous global recognitions for our ESG practices, we are committed to building a better future for all by More ❯
a positive difference to the lives of our clients, customers, colleagues, shareholders, and society.We are focused on growing our direct and advised wealth platforms and repositioning our specialist asset management business to meet client demand. We are committed to providing excellent client service, supported by leading technology and talent.Aberdeen comprises three businesses, interactive investor (ii), Investments, and Adviser, each … scalable growth - all built on a continuously evolving modern data platform. About the Role As a Junior Engineer (Data), you will be responsible for supporting the design, implementation, and management of a decentralized data architecture based on the principles of Data Mesh. This role leverages a Modern Data Stack of technologies such as Snowflake, DBT, Microsoft Azure and Microsoft … Support the Platform Technical lead in design and implementation of a Data Mesh architecture, enabling decentralized data ownership across various domains. Build platform capabilities to support the creation and management of Data Products, allowing domain teams to own and operate their data. Develop and maintain the centralized data cloud infrastructure using Snowflake, DBT, and Microsoft Azure, and automate data More ❯
industry) compliance and maintain audit readiness through robust validation frameworks, policies, and collaboration with QA and regulatory bodies. Cybersecurity & Risk – Lead cybersecurity strategy, including access controls, incident response, and vulnerability management. Team & Vendor Management – Build and mentor a global IT team while managing external providers and ensuring performance against SLAs. Budgets & Performance – Manage IT budgets, forecasting, and KPIs … and level. Experience working in pharmaceutical organisations is advantageous. Experience in leading and developing a team Knowledge of office 365 and Azure Entra is essential Excellent knowledge of technical management, information analysis and of computer hardware/software systems and troubleshooting practices. Expertise in data management, data governance and general IT security practices. Understanding of computerised systems used More ❯
Belfast, County Antrim, Northern Ireland, United Kingdom
Reed
certification. Experience in an MSP environment, familiar with PSA ticketing and working with multiple clients. Knowledge of Azure IaaS, VMware, Veeam, Citrix, Aruba Networking, Sophos FW, Teams Voice, and vulnerability management. Benefits: Opportunity to improve skills in a small team with close access to clients. Support to work towards Microsoft accreditations. Potential career paths into account management or More ❯
business requirements into effective IP strategies through collaboration. Youll stay ahead of IP trends and continuously elevate our IP posture. Plan, test, and implement robust solutions, including hardware testing, vulnerability scans, and configuration staging. Well need you to empower teams with training, documentation, and hands-on sessions for seamless implementation and support. Travel Ready: Be prepared to travel for … CCNP, CCIE, or equivalent are preferred. Familiarity with F5 and Cisco ASA security solutions is a strong advantage. Proficiency in IP technologies, including firewalls, IDS/IPS, encryption, and vulnerability management. Hands-on experience with integration projects involving IP technologies. Strong analytical and problem-solving skills to address complex security challenges. Excellent communication skills, with the ability to present More ❯
business requirements into effective IP strategies through collaboration. Youll stay ahead of IP trends and continuously elevate our IP posture. Plan, test, and implement robust solutions, including hardware testing, vulnerability scans, and configuration staging. Well need you to empower teams with training, documentation, and hands-on sessions for seamless implementation and support. Travel Ready: Be prepared to travel for … CCNP, CCIE, or equivalent are preferred. Familiarity with F5 and Cisco ASA security solutions is a strong advantage. Proficiency in IP technologies, including firewalls, IDS/IPS, encryption, and vulnerability management. Hands-on experience with integration projects involving IP technologies. Strong analytical and problem-solving skills to address complex security challenges. Excellent communication skills, with the ability to present More ❯
Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Exposed Solutions
fostering a positive, motivated team environment. The Role Design, build, and maintain our cloud infrastructure, optimising for cost, security, and performance. Lead on system monitoring, security best practices, and vulnerability management. Drive development and optimisation of CI/CD pipelines and containerised environments. Develop and manage Infrastructure as Code (IaC) using Terraform. Provide Level 4 support and act as … Lambda, VPC, IAM, ECS, ECR, and CloudFront. Strong skills in Terraform, Jenkins/Bitbucket CI/CD pipelines, and Docker. Scripting and automation experience (bash, PowerShell, Python) and configuration management tools (Ansible, Puppet, or Chef). Familiarity with monitoring and logging tools such as CloudWatch, Prometheus, and Grafana. Certified AWS Solutions Architect Associate (or equivalent experience). Strong knowledge More ❯
West Sussex, England, United Kingdom Hybrid / WFH Options
VIQU IT Recruitment
helping to maintain secure systems and assisting with patching activities to reduce a critical security backlog across 2,700 devices. Responsibilities of the IT Support Engineer: Assist in reviewing vulnerability alerts using Qualys and support patching activities with guidance from senior engineers. Help deliver patch updates for end user devices and maintain security standards. Document processes, issues, and resolutions … clearly for the wider IT team Responsibilities of the IT Support Engineer: Basic understanding or interest in security patching and vulnerability management. Proven experience with Qualys . Strong knowledge of Windows 10/11 for troubleshooting and basic security tasks. Experience with SCCM or similar tools is helpful but not essential. Good problem-solving skills and attention to detail. More ❯
Worthing, West Sussex, South East, United Kingdom Hybrid / WFH Options
VIQU IT Recruitment
helping to maintain secure systems and assisting with patching activities to reduce a critical security backlog across 2,700 devices. Responsibilities of the IT Support Engineer: Assist in reviewing vulnerability alerts using Qualys and support patching activities with guidance from senior engineers. Help deliver patch updates for end user devices and maintain security standards. Document processes, issues, and resolutions … clearly for the wider IT team Responsibilities of the IT Support Engineer: Basic understanding or interest in security patching and vulnerability management. Proven experience with Qualys . Strong knowledge of Windows 10/11 for troubleshooting and basic security tasks. Experience with SCCM or similar tools is helpful but not essential. Good problem-solving skills and attention to detail. More ❯
environment. Drive adoption of modern technologies (hybrid cloud, containerisation, automation) to improve scalability, resilience, and cost efficiency. Establish KPIs and SLAs for infrastructure performance, uptime, and security. Infrastructure & Cloud Management Oversee the design, implementation, and support of on-premises infrastructure, private cloud, and public cloud platforms (Azure). Ensure ultra-low latency and high-throughput networking for trading systems … Compliance Partner with the CISO to ensure all systems meet cybersecurity best practices and comply with FCA and other relevant regulations. Manage identity and access controls, encryption, patching, and vulnerability management. Conduct regular business continuity and disaster recovery tests. More ❯