Milton Keynes, Buckinghamshire, England, United Kingdom
Altitude-Recruitment Limited
assessments for new features and system changes Evaluate and recommend security technologies and tools Operational (40%) Manage security environments across Azure and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerabilityassessment and penetration testing programs Maintain identity and access management controls Compliance & Assurance (30%) Maintain ISO27001 certification More ❯
assessments for new features and system changes Evaluate and recommend security technologies and tools Operational (40%) Manage security environments across Azure and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerabilityassessment and penetration testing programs Maintain identity and access management controls Compliance & Assurance (30%) Maintain ISO27001 certification More ❯
WINDSOR HOUSE, GADBROOK BUSINESS CENTRE, RUDHEATH, NORTHWICH, England
A.S.M TECHNOLOGIES LTD
across various systems, managing access controls and permissions with a focus on 'least privilege' Assist in the routine maintenance and monitoring of network, server, and cloud infrastructure Conduct regular vulnerability assessments and system patching to ensure all devices and software are secure and up to date Actively support the Incident Response process by investigating security alerts and applying essential More ❯
Asm Technologies Ltd, Windsor House, Gadbrook Business Centre, Northwich, England
A.S.M TECHNOLOGIES LTD
access controls and permissions with a focus on 'least privilege'. Infrastructure & Cyber Security: Assist in the routine maintenance and monitoring of network, server, and cloud infrastructure Conduct regular vulnerability assessments and system patching to ensure all devices and software are secure and up-to-date. Actively support the Incident Response process by investigating security alerts and applying essential More ❯
oxford district, south east england, united kingdom
Ellison Institute of Technology
Compliance Apply security best practices across OCI and Fusion applications. Manage identity and access control (IAM, roles, policies). Ensure compliance with ITIL, SOX, and internal governance frameworks. Conduct vulnerability assessments and implement remediations. Performance Optimisation & Support Optimise performance across cloud and on-prem integrations. Troubleshoot complex issues involving Fusion, middleware, and OCI services. Collaborate with Oracle support for More ❯
cyber risk governance, and assurance frameworks. This is a cross-functional role with both advisory and hands-on responsibilities, focusing on security assurance, risk management and supporting architecture reviews, vulnerability management, risk assessments, cyber defence posture, driving technical assurance, and embedding risk-aligned security controls across IT and OT systems and secure-by-design practices. You will work across … SSCP, CISM, CRISC, CCSP, SABSA, or SANS GIAC (GSEC, GCCC, GCPM). o Demonstrable experience in designing and implementing secure infrastructure or cloud architectures. o Proven experience with risk assessment methodologies and maintaining enterprise risk registers. o Working knowledge of risk assessment methodologies (e.g. ISO 31000, FAIR, OWASP risk rating). o Strong understanding of Gov Assure, CAF … Azure AD), Microsoft 365 E5, Azure IaaS/PaaS, Windows/Linux/Unix. o Strong knowledge of security tooling such as SIEM, endpoint detection (EDR/XDR), and vulnerability management platforms. o Hands-on experience with policy development, access control models (RBAC, ABAC), and logging standards. o Experience supporting assurance activities or government-mandated reviews (e.g. GovAssure, Secure More ❯
You’ll Do Lead and investigate high-impact cyber security incidents across global customer environments. Proactively hunt for threats, triage alerts, and identify anomalous behaviours before they escalate. Manage vulnerability assessments end-to-end, driving remediation outcomes with customers and internal teams. Optimise the Microsoft Security Stack: Sentinel, Defender (for Endpoint/Identity), Purview, and XDR. Support Zero Trust … build detections, correlations, and meaningful insights. Experience centralising log sources and onboarding new tools and data feeds into a SIEM/SOAR platform. Strong understanding of threat hunting methodologies, vulnerability management, and incident response. Knowledge of frameworks: ISO27001, NIST CSF, SOC2, Cyber Essentials Plus. Comfortable adapting to unfamiliar tooling and integrating new technologies quickly. Why Join? Work at the More ❯