CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and More ❯
CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and More ❯
security initiatives, influence secure design standards, and mentor colleagues in best practices. Key Responsibilities Lead application and cloud security initiatives, ensuring systems and software are secure by design. Drive vulnerabilitymanagement and implement a risk-based approach across the technology stack. Perform security testing (SAST, DAST, SCA) and work with developers to remediate findings. Support cloud security controls … hands-on experience in application and cloud security engineering. Deep understanding of web app vulnerabilities (OWASP Top 10, CWE) and secure coding practices. Proficiency with security testing tools and vulnerabilitymanagement platforms. Broad knowledge of network and infrastructure security concepts (WAFs, ACLs, VPNs, etc.). Familiarity with security frameworks and principles such as Zero Trust and risk-based More ❯
security initiatives, influence secure design standards, and mentor colleagues in best practices. Key Responsibilities Lead application and cloud security initiatives, ensuring systems and software are secure by design. Drive vulnerabilitymanagement and implement a risk-based approach across the technology stack. Perform security testing (SAST, DAST, SCA) and work with developers to remediate findings. Support cloud security controls … hands-on experience in application and cloud security engineering. Deep understanding of web app vulnerabilities (OWASP Top 10, CWE) and secure coding practices. Proficiency with security testing tools and vulnerabilitymanagement platforms. Broad knowledge of network and infrastructure security concepts (WAFs, ACLs, VPNs, etc.). Familiarity with security frameworks and principles such as Zero Trust and risk-based More ❯
security initiatives, influence secure design standards, and mentor colleagues in best practices. Key Responsibilities Lead application and cloud security initiatives, ensuring systems and software are secure by design. Drive vulnerabilitymanagement and implement a risk-based approach across the technology stack. Perform security testing (SAST, DAST, SCA) and work with developers to remediate findings. Support cloud security controls … hands-on experience in application and cloud security engineering. Deep understanding of web app vulnerabilities (OWASP Top 10, CWE) and secure coding practices. Proficiency with security testing tools and vulnerabilitymanagement platforms. Broad knowledge of network and infrastructure security concepts (WAFs, ACLs, VPNs, etc.). Familiarity with security frameworks and principles such as Zero Trust and risk-based More ❯
Crewe, England, United Kingdom Hybrid / WFH Options
DCS Technology
Security Analyst to play a key role in protecting our client’s systems, networks, and data. This is an exciting opportunity to lead on threat detection, incident response, and vulnerabilitymanagement , while driving continuous improvement across the organisation’s security posture. You’ll collaborate closely with infrastructure, development, and compliance teams to maintain high standards of cyber resilience … and uphold key frameworks such as ISO 27001 and Cyber Essentials Plus . Key Responsibilities: • Lead threat detection, incident response, and vulnerabilitymanagement activities • Strengthen cyber security posture across cloud, infrastructure, and applications • Provide expert guidance to development teams on secure SDLC practices • Maintain compliance with ISO 27001 and Cyber Essentials Plus standards • Mentor junior analysts and support More ❯
Crewe, Cheshire, England, United Kingdom Hybrid / WFH Options
DCS Recruitment
Security Analyst to play a key role in protecting our client's systems, networks, and data. This is an exciting opportunity to lead on threat detection, incident response, and vulnerabilitymanagement , while driving continuous improvement across the organisation's security posture. You'll collaborate closely with infrastructure, development, and compliance teams to maintain high standards of cyber resilience … and uphold key frameworks such as ISO 27001 and Cyber Essentials Plus . Key Responsibilities: * Lead threat detection, incident response, and vulnerabilitymanagement activities * Strengthen cyber security posture across cloud, infrastructure, and applications * Provide expert guidance to development teams on secure SDLC practices * Maintain compliance with ISO 27001 and Cyber Essentials Plus standards * Mentor junior analysts and support More ❯
Engineering organization. Champion Secure Reliability: Drive a 'secure and reliable by design' philosophy across all of engineering. Own Platform Integrity: Take ownership of the availability, latency, performance, efficiency, change management, monitoring, emergency response, and capacity planning for Klaviyo's global platform. Build a Modern Security Program: Lead the evolution of our security program, including application security, vulnerabilitymanagement … technical background in distributed systems, observability, container orchestration (Kubernetes), infrastructure as code (Terraform), and CI/CD principles. Demonstrable experience leading a modern security engineering function, including application security, vulnerabilitymanagement, and incident response. Deep, practical experience implementing technical controls for GDPR compliance and familiarity with other security frameworks (e.g., SOC 2, ISO 27001). Experience managing geographically More ❯
West London, London, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
are effectively deployed, maintained and optimised, while driving efficiencies and ensuring secure, compliant infrastructure. This role requires a background and strong expertise in enterprise toolsets, automation technologies and patch management processes. Engagement via Umbrella Company Only; all taxes & NI deducted at source. General responsibilities Lead operations of enterprise tooling platforms including SCCM, Scorch, BMC, Ansible and MuleSoft. Define and … consistent monitoring, reporting and compliance dashboards are in up to date and in-place for patching and tooling. Work with security and governance teams to align patching schedules with vulnerabilitymanagement requirements. Provide operational reporting for Stakeholders, including compliance metrics. Manage vendor relationships and licensing agreements for tooling and middleware platforms. Required Skills & Experience Proven experience managing enterprise … operations tooling, middleware and patch management. Strong expertise with SCCM, Scorch, BMC, Ansible and MuleSoft platforms. Demonstrated experience in patch management, vulnerability remediation and compliance reporting. Hands-on knowledge of automation frameworks and orchestration platforms. ITIL Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built More ❯
Welwyn Garden City, England, United Kingdom Hybrid / WFH Options
PayPoint plc
development teams to optimize application performance and reliability • Maintain and improve backup, recovery, and disaster recovery procedures • Support incident response and root cause analysis for production issues • Manage configuration management and secrets management solutions • Optimize cloud resource utilization and cost management • Cover on-call rotation for production support (1 week out of 6) As well as making … improvements to: • Deployment automation and release management processes • Application and infrastructure monitoring and observability • Security scanning and vulnerabilitymanagement in pipelines • Performance optimization and capacity planning • Development team productivity through tooling and automation What we would like from you • Strong experience with CI/CD pipeline design and implementation (Azure DevOps, GitHub Actions) • Proficiency in Infrastructure as … great if you have the following • Experience with Azure DevOps administration • Knowledge of database deployment automation and migration strategies • Familiarity with microservices architecture and deployment patterns • Experience with API management and gateway solutions • Knowledge of network security and firewall management • Certification in Azure, AWS, or DevOps methodologies • Experience with chaos engineering and resilience testing • Familiarity with service mesh More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Love2shop
development teams to optimize application performance and reliability • Maintain and improve backup, recovery, and disaster recovery procedures • Support incident response and root cause analysis for production issues • Manage configuration management and secrets management solutions • Optimize cloud resource utilization and cost management • Cover on-call rotation for production support (1 week out of 6) As well as making … improvements to: • Deployment automation and release management processes • Application and infrastructure monitoring and observability • Security scanning and vulnerabilitymanagement in pipelines • Performance optimization and capacity planning • Development team productivity through tooling and automation What we would like from you • Strong experience with CI/CD pipeline design and implementation (Azure DevOps, GitHub Actions) • Proficiency in Infrastructure as … great if you have the following • Experience with Azure DevOps administration • Knowledge of database deployment automation and migration strategies • Familiarity with microservices architecture and deployment patterns • Experience with API management and gateway solutions • Knowledge of network security and firewall management • Certification in Azure, AWS, or DevOps methodologies • Experience with chaos engineering and resilience testing • Familiarity with service mesh More ❯
leadership role where you’ll shape the future of security assurance across our platforms and products. You’ll lead a talented team of engineers and architects, driving innovation in vulnerabilitymanagement, application security, and adversarial testing. This is a pivotal cyber leadership role within Tesco Technology, shaping how we secure our platforms and products. You’ll be at … stakeholders across Tesco Technology to embed security into everything we do. 🧠 What You’ll Bring: Proven leadership in large-scale security engineering environments. Deep technical expertise in application security, vulnerabilitymanagement, and adversarial testing. Experience with modern security tooling and secure development practices. Strong communication and stakeholder engagement skills. A strategic mindset with hands-on execution ability. 🌟 Why More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom Hybrid / WFH Options
Adroit People Limited (UK)
Greetings Greetings We are Hiring Lead Security Solution Architect(Privilege Password Management CyberArk ) Position in UK - Sheffield -JC: 106885 Client is looking for someone with strong ITSM knowledge Privilege Password Management CyberArk . Job Description Location: UK - Sheffield (Hybrid) Hybrid Model Job Profile – Lead Security Solution Architect Project Overview Client is working on a strategic Identity and Access … Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. Client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage … programme as subject matter expert. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at More ❯
the senior lead to ensure our state of the art security centre is as effective and as efficient as can possibly be. As well as the proactive and responsive management of your team you will also have input for the strategy and future direction of our operation. Main tasks and responsibilities: Manage Shared SOC for more than 100 FTE … improvisation to achieve operational objectives Revise and develop processes to strengthen the current Security Operations Framework, Review policies and highlight the challenges in managing SLAs Responsible for team & vendor management, overall use of resources and initiation of corrective action where required for Security Operations Centre Management, administration & maintenance of security devices under the purview of SOC which consists … build and maintain positive working relationships with them Pre-requisites: Experience of more than 12 years in advanced security technologies Strong security professional skilled in Security Information and Event Management (SIEM), VulnerabilityManagement and Security Intelligence, IDAM, Digital Rights Management (DRM), Anti-APT, Data Leak Prevention (DLP), Phishing simulation tools etc Experience in managing P1 incidents More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
Lead Security Solution Architect Project Overview Client is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. Client is working on uplifting controls and capabilities in privileged access for the Group and introducing the … programme as subject matter expert. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Provides technical thought leadership to the Design Team and More ❯
Cyber Security Engineer CyberSec Engineer/IT Security Specialist – Disaster Recovery, Resilience Testing, CyberSec Improvements, Vulnerability Scanning/Management, Infrastructure, Nutanix, Commvault, VMware, Azure, PowerShell, Python; Law Firm, Permanent, London/Hybrid (3/2). £80k - £95k (On Experience) +Bonus +Benefits Global Low Firm seeks experienced Cyber Security Engineer/IT Security Specialist to join the IT … infrastructure tooling and at least one scripting language (PowerShell or Python preferred). Experience with Nutanix, VMware, Commvault, and hybrid cloud platforms Azure (preferred), AWS or GCP. Understanding of vulnerabilitymanagement, monitoring, and orchestration tools. Relevant certifications such as Microsoft SC-200, Certified Ethical Hacker (CEH), CBCP/CBCI or equivalent. We are open to receiving applications from More ❯
Engineer/DevOps Engineer with strong expertise in AWS, Terraform, Azure DevOps, and Apigee. The ideal candidate should have a solid background in cloud architecture, automation, and secure platform management, ensuring reliable and compliant deployments. This role involves developing, deploying, and maintaining scalable systems, managing upgrades, and applying robust security controls across CI/CD pipelines and infrastructure. Candidate … services using AWS ECS, ECR, and Fargate, ensuring scalable and secure microservice environments. Use Docker for containerizing applications and improving deployment consistency. Manage and secure Apigee or similar API Management platforms, ensuring API governance, performance optimization, and compliance. Ensure security and compliance best practices across the platform, including secure coding, dependency management, and vulnerability scanning. Implement and … libraries. Collaborate with security teams to align architecture with compliance standards. Prepare and maintain detailed documentation for builds, deployments, and updates. Required Skills Expertise in implementing secure coding and vulnerabilitymanagement practices. Strong knowledge of API security, OAuth, JWT, and API Gateway policies. Experience in security audits, monitoring, and incident remediation. Familiarity with compliance frameworks (e.g., ISO, SOC More ❯
Engineer/DevOps Engineer with strong expertise in AWS, Terraform, Azure DevOps, and Apigee. The ideal candidate should have a solid background in cloud architecture, automation, and secure platform management, ensuring reliable and compliant deployments. This role involves developing, deploying, and maintaining scalable systems, managing upgrades, and applying robust security controls across CI/CD pipelines and infrastructure. Candidate … services using AWS ECS, ECR, and Fargate, ensuring scalable and secure microservice environments. Use Docker for containerizing applications and improving deployment consistency. Manage and secure Apigee or similar API Management platforms, ensuring API governance, performance optimization, and compliance. Ensure security and compliance best practices across the platform, including secure coding, dependency management, and vulnerability scanning. Implement and … libraries. Collaborate with security teams to align architecture with compliance standards. Prepare and maintain detailed documentation for builds, deployments, and updates. Required Skills Expertise in implementing secure coding and vulnerabilitymanagement practices. Strong knowledge of API security, OAuth, JWT, and API Gateway policies. Experience in security audits, monitoring, and incident remediation. Familiarity with compliance frameworks (e.g., ISO, SOC More ❯
Houston, Texas, United States Hybrid / WFH Options
K.L. McKinney
incidents within our organization's IT infrastructure. The ideal candidate will have expertise in threat detection, vulnerability assessments, and security compliance to enhance our cybersecurity posture. Key Responsibilities: Threat Monitoring & Incident Response -Continuously monitor security logs, SIEM alerts, and network traffic for threats. -Analyze security events and escalate incidents based on severity and impact. -Investigate potential breaches, malware infections … and unauthorized access attempts. -Assist in incident response, containment, and remediation activities. VulnerabilityManagement & Risk Assessment -Conduct vulnerability scans, risk assessments, and penetration tests. -Work with IT teams to remediate security gaps and harden systems. -Research emerging threats and attack techniques to proactively improve defenses. Security Policies & Compliance -Ensure compliance with industry standards (ISO 27001, NIST, GDPR More ❯
alerts, logs, and network traffic for suspicious activity. Conduct forensic investigations, malware analysis, and incident remediation. Work with SOC teams to develop and improve security monitoring and response strategies. VulnerabilityManagement & Risk Assessment Perform penetration testing, vulnerability assessments, and security audits. Identify and remediate security misconfigurations, weaknesses, and risks. Ensure security policies align with industry standards (ISO … NIST, GDPR, SOC 2, etc.). Security Automation & DevSecOps Integrate security controls into CI/CD pipelines and cloud environments. Automate security monitoring, log analysis, and vulnerability scanning. Develop scripts and tools for incident response and threat mitigation. Compliance & Security Awareness Ensure adherence to regulatory and compliance frameworks applicable to the organization. Provide security guidance and training for IT More ❯
techniques. 4. Demonstrated experience with cyber security principles for Linux, Windows, virtual platforms, networking, and Cloud. 5. Demonstrated experience with network architectures and fundamentals. 6. Demonstrated experience developing risk management methodologies. 7. Demonstrated experience analyzing test results to develop risk and threat mitigation plans. 8. Demonstrated experience with market-leading vulnerabilitymanagement tools including the ability to … deploy, configure, and run these tools. 9. Demonstrated experience with vulnerability concepts and prevalent vulnerability types such as SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), path traversals, denial of service (DoS), buffer overflows, command injection, race conditions, open redirects, privilege escalation, authentication bypasses, XML External Entity (XXE) attacks and similar. 10. Demonstrated experience with … privilege and high/low trust boundaries and what defines a vulnerability vs. weakness. 11. Demonstrated experience with vulnerability and risk scoring frameworks and methodologies such as CVSSv2 and CVSSv3. 12. Demonstrated experience with vulnerability repositories (NVD, CVE MITRE, and VULdb) and exploitation techniques (MITRE ATT&CK and DEFEND 13. Demonstrated experience with web application (OWASP) and More ❯
not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerabilitymanagement, identity & access management, and network security. Develop and manage project plans, milestones, risks, and budgets. Coordinate delivery across regional teams, ensuring consistency and practicality. Manage third … progress. Essential Skills & Experience Proven experience managing complex cyber security projects within multi-region or federated organisations. Strong technical understanding across key cyber domains within Microsoft environments. Excellent stakeholder management and communication skills. Familiarity with structured project management methodologies (e.g. PRINCE2, PMP, Agile). Relevant security certifications such as CISSP, CISM, CompTIA Security+, or AWS/Azure Security More ❯
City of London, London, United Kingdom Hybrid / WFH Options
TRIA
not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerabilitymanagement, identity & access management, and network security. Develop and manage project plans, milestones, risks, and budgets. Coordinate delivery across regional teams, ensuring consistency and practicality. Manage third … progress. Essential Skills & Experience Proven experience managing complex cyber security projects within multi-region or federated organisations. Strong technical understanding across key cyber domains within Microsoft environments. Excellent stakeholder management and communication skills. Familiarity with structured project management methodologies (e.g. PRINCE2, PMP, Agile). Relevant security certifications such as CISSP, CISM, CompTIA Security+, or AWS/Azure Security More ❯
not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerabilitymanagement, identity & access management, and network security. Develop and manage project plans, milestones, risks, and budgets. Coordinate delivery across regional teams, ensuring consistency and practicality. Manage third … progress. Essential Skills & Experience Proven experience managing complex cyber security projects within multi-region or federated organisations. Strong technical understanding across key cyber domains within Microsoft environments. Excellent stakeholder management and communication skills. Familiarity with structured project management methodologies (e.g. PRINCE2, PMP, Agile). Relevant security certifications such as CISSP, CISM, CompTIA Security+, or AWS/Azure Security More ❯
Horsforth, Leeds, West Yorkshire, England, United Kingdom
TPP (The Phoenix Partnership)
The role involves: • Managing, maintaining and upgrading enterprise server and storage hardware • Providing internal support for office hardware including, PCs, laptops, mobile devices (Windows OS, iOS, MacOS and Android) • Vulnerabilitymanagement using scanning tools such as Nessus • Remediation/automation of software rollout using Ninite/PDQ • Configuring and monitoring of Anti-virus software & Mobile Device Management • Firewall/Switch management - Configuration, patching and upgrading • Administering Microsoft Active Directory, Exchange Server & Office 365 • Achieving recognised Cyber Security accreditation • Management of video conferencing • Management of enterprise level phone system • Monitoring and managing the availability and scalability of resources, including CPU usage, disk usage and storage systems including network troubleshooting • Continuously improving and keeping up More ❯