Southampton, Hampshire, South East, United Kingdom Hybrid / WFH Options
Sterling Bridge Limited
technology leadership within the firm. Required Skills: Proven track record in senior security roles (e.g. Head of Security, CISO, or equivalent) Strong technical foundation in cloud security, identity & access management, network security, encryption, threat modelling Hands-on knowledge securing hybrid and cloud infrastructure (AWS/Azure/GCP) Experience building and managing security teams, setting processes (incident response, SOC … vulnerabilitymanagement) Familiarity with compliance/legal security requirements (e.g. GDPR, Legal Privilege, regulatory/security audits) Strong stakeholder management able to communicate with partners, executives, and legal professionals Exclusive Benefits: £80,000 £100,000 base pay + performance bonus & equity Hybrid working model (some days in Southampton office) Significant influence over security direction and technology choices More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
ensure the products they deliver are secure by design. You'll work closely with developers, architects, and business stakeholders to create an environment where secure coding and proactive risk management come naturally. What you'll be doing You'll play a leading role in driving a security-first culture across agile product teams, defining and delivering a clear application … Working hand-in-hand with developers, you'll weave security seamlessly into the software development lifecycle - from designing controls and integrating testing into CI/CD pipelines to supporting vulnerabilitymanagement and remediation. Acting as the go-to expert for secure design, threat modelling, and compliance, you'll make sure teams have the knowledge, tools, and confidence to More ❯
our client's internal security posture and you'll be working closely with the engineering and product teams to enable security across the company. Key Requirements: AWS - Cloud Security VulnerabilityManagement Tools IAM CPSM Incident Response/small amounts of ISO27001 This role is 5 days a week on-site , you’ll enjoy the perks of a sleek More ❯
warrington, cheshire, north west england, united kingdom
Prism Digital
our client's internal security posture and you'll be working closely with the engineering and product teams to enable security across the company. Key Requirements: AWS - Cloud Security VulnerabilityManagement Tools IAM CPSM Incident Response/small amounts of ISO27001 This role is 5 days a week on-site , you’ll enjoy the perks of a sleek More ❯
skills and experiences: Essential: Technical background with experience of technologies including but not limited to firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, Linux, Networking, Cloud and VulnerabilityManagement Analytical background and comfortable analysing and interpreting large and complex data sets and articulating the story behind any observations along with providing conclusions and recommendations Knowledge and More ❯
ATT&CK and network/cloud security principles. Strong analytical and communication skills. Bonus points for: Scripting or automation experience (KQL, PowerShell, Python). Background in threat hunting or vulnerability management. Why apply? Hybrid flexibility, funded certifications, cutting-edge tooling, and clear development paths into leadership or specialist roles. If you’re ready to step up and help evolve More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
vertex-it-solutions
ideal candidate will be a proactive problem-solver, a mentor to junior team members, and a driving force in the ongoing improvement of our IT services. Key Responsibilities Infrastructure Management & Support: Design, build, and maintain the company's global IT infrastructure, including on-premises HPE/Dell server and storage hardware, co-located data centres, and cloud-based systems. … device management. Ensure the security of our infrastructure and data by managing on-premises and cloud security controls and working closely with the Security Operations Centre (SoC) to action vulnerabilitymanagement and system patching. Manage and maintain our Windows and Linux (CentOS, Red Hat, Ubuntu) server estate, as well as core Microsoft services (AD, GPO, DNS, NPS/… SMTP Relay), and our extensive VMware vSphere/vCenter virtualisation platform. Administer and optimise our System Centre Configuration Manager (SCCM) hierarchy, including Primary/Secondary sites, Distribution Points, Cloud Management Gateway (CMG), and Azure integration for global software deployment and updates. Manage and maintain our VDI environment (VMware Horizon/Citrix/OLVM), ensuring a reliable experience for our More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Holland & Barrett International Limited
experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python, JavaScript … GoLang, Terraform, CloudFormation (AWS), and AWS CDK. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Desired: Ability to work independently, take initiative, and maintain a keen attention to detail, ensuring high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. Why More ❯
across multiple platforms. Analyse and prioritise tickets to ensure timely, effective responses. Conduct initial investigations and escalate incidents as needed. Document findings, actions, and outcomes clearly and consistently. Support vulnerabilitymanagement, patching, and threat monitoring. Maintain and improve SOC playbooks and standard operating procedures. Collaborate across teams to remediate security risks. Contribute to incident trend reporting and ongoing More ❯
across multiple platforms. Analyse and prioritise tickets to ensure timely, effective responses. Conduct initial investigations and escalate incidents as needed. Document findings, actions, and outcomes clearly and consistently. Support vulnerabilitymanagement, patching, and threat monitoring. Maintain and improve SOC playbooks and standard operating procedures. Collaborate across teams to remediate security risks. Contribute to incident trend reporting and ongoing More ❯
watford, hertfordshire, east anglia, united kingdom
Hamilton Barnes 🌳
across multiple platforms. Analyse and prioritise tickets to ensure timely, effective responses. Conduct initial investigations and escalate incidents as needed. Document findings, actions, and outcomes clearly and consistently. Support vulnerabilitymanagement, patching, and threat monitoring. Maintain and improve SOC playbooks and standard operating procedures. Collaborate across teams to remediate security risks. Contribute to incident trend reporting and ongoing More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
as the central point for all cybersecurity matters and incident response. Maintain the cybersecurity risk register and lead Cyber Essentials certification. Oversee Microsoft 365 and Google Workspace security, including vulnerabilitymanagement, patching, MFA, and email security. Coordinate security audits, penetration tests, and third-party application reviews. Manage and monitor MSP performance, ensuring consistent security standards. Promote cybersecurity awareness More ❯
Folkestone, Kent, South East, United Kingdom Hybrid / WFH Options
Saga Group
and external stakeholders. Provide technical support to incidents raised by the business and ensure these are resolved within target resolution times. Research and apply the required security remediation and vulnerabilitymanagement activities when required and within expected timescales. The Ideal Candidate We are keen to speak with Tech Engineers from large organisations or MSPs who have exposure to … in a customer facing organisations. Candidates will need to demonstrate these key skills and meet the criteria below: Microsoft 365 administration - strong knowledge of Intune, Exchange Online, including license management, security and compliance configuration and general product administration within the Microsoft 365 Admin Center. Microsoft Entra - strong knowledge of Entra ID (Azure Active Directory) architecture, configuration and management. Experience … and Entra tasks. Troubleshooting and support - advanced troubleshooting of authentication, access and service issues across M365 and Entra. Candidates will ideally have; Knowledge and understanding of RBAC, privileged identity management (PIM) and Just-In-Time access. Experience with monitoring and reporting tools. Experience of maintaining and administering SharePoint Online, Teams and OneDrive. Microsoft 365 security and compliance knowledge - implementing More ❯
and external stakeholders. Provide technical support to incidents raised by the business and ensure these are resolved within target resolution times. Research and apply the required security remediation and vulnerabilitymanagement activities when required and within expected timescales. The Ideal Candidate We are keen to speak with Tech Engineers from large organisations or MSPs who have exposure to … in a customer facing organisations. Candidates will need to demonstrate these key skills and meet the criteria below: Microsoft 365 administration - strong knowledge of Intune, Exchange Online, including license management, security and compliance configuration and general product administration within the Microsoft 365 Admin Center. Microsoft Entra - strong knowledge of Entra ID (Azure Active Directory) architecture, configuration and management. Experience … and Entra tasks. Troubleshooting and support - advanced troubleshooting of authentication, access and service issues across M365 and Entra. Candidates will ideally have; Knowledge and understanding of RBAC, privileged identity management (PIM) and Just-In-Time access. Experience with monitoring and reporting tools. Experience of maintaining and administering SharePoint Online, Teams and OneDrive. Microsoft 365 security and compliance knowledge - implementing More ❯
and external stakeholders. Provide technical support to incidents raised by the business and ensure these are resolved within target resolution times. Research and apply the required security remediation and vulnerabilitymanagement activities when required and within expected timescales. The Ideal Candidate We are keen to speak with Tech Engineers from large organisations or MSPs who have exposure to … in a customer facing organisations. Candidates will need to demonstrate these key skills and meet the criteria below: Microsoft 365 administration - strong knowledge of Intune, Exchange Online, including license management, security and compliance configuration and general product administration within the Microsoft 365 Admin Center. Microsoft Entra - strong knowledge of Entra ID (Azure Active Directory) architecture, configuration and management. Experience … and Entra tasks. Troubleshooting and support - advanced troubleshooting of authentication, access and service issues across M365 and Entra. Candidates will ideally have; Knowledge and understanding of RBAC, privileged identity management (PIM) and Just-In-Time access. Experience with monitoring and reporting tools. Experience of maintaining and administering SharePoint Online, Teams and OneDrive. Microsoft 365 security and compliance knowledge - implementing More ❯
requirements: Essential: 5+ years of experience in application security, with at least 3+ years in software development. Strong understanding of application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, and API Security (including authentication and authorization). Proficiency in programming languages such as Python, Java, JavaScript … GoLang, and Rust. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to oversee multiple security projects simultaneously. Desired: Independent, proactive, and detail-oriented, with a commitment to maintaining high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. What we offer: What we offer: Wellbeing & Lifestyle Benefits More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, VulnerabilityManagement, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
SOC 2 Type 2 maintenance (already accredited)—expert level not required. Oversee SIEM operations with the tech team: ensure log ingestion/coverage , daily monitoring, and follow-up. Guide vulnerabilitymanagement, alert triage (Alert Logic), and external pen-test cycles. Keep evidence flows tight: client questionnaires, audit responses, security awareness, and user access reviews. About you Strong GRC … grounding plus solid technical understanding (AWS-heavy environment). Comfortable being hands-on where needed; people management nice-to-have, not essential. ISO 27001 (implementation/assurance) experience; SOC 2 exposure helpful. SIEM familiarity and the ability to work with engineers on coverage, tuning, and use-cases . Stakeholder-savvy; calm under pressure; excellent written/verbal comms. Benefits More ❯
DREAD, STRIDE-LM, OCTAVE, MITRE ATT&CK. Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007. Knowledge of security control (and maturity) frameworks e.g. NIST (e.g. CSMA, CSF), CIS … DFD) and trust boundaries and is able to create one using information provided about an environment. Familiar with the functions of relevant authorities e.g. NCSC, NPSA. An understanding of VulnerabilityManagement, Red Teaming, and Breach and Attack Simulation or experience of working within an Active Defence discipline. Security Requirements: SC This role will require you to hold or More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Hirexa Solutions UK
for deployment. Ability to demonstrate any IRM solution and SecOps solutions as and when needed. Knowledge of various modules like Policy Mgmt. Compliance & Audit Mgmt., Vendor Mgmt., Business Continuity Management, Vulnerability Response, Incident Response, Security Dashboard on ServiceNow IRM platform Assess as-is IRM processes for maturity and automation on ServiceNow platform Knowledge of Advance risk management … SecOps administrator/consultant (this is mandatory) Must have concluded at least 1 lifecycle of ServiceNow IRM/SecOps implementation. Experience in JavaScript, API, Web Services Working knowledge of Vulnerability Mgmt. process & tools ISO/CISA/CISM/CISSP/CRICS (preferred) ServiceNow GRC & SecOps B.E/B.Tech , BCA/MCA ServiceNow Certified Consultant Thanks More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
deliverable initiatives. Understand the risk landscape affecting IT systems and information. Prioritise risk treatment and resources based on impact, human factors, and cost-effectiveness. Assurance and compliance oversight and management Manage the IT Security, Governance, Risk and Compliance team, ensuring clear direction, support, and professional development. What you'll need to succeed At least one of the following, ideally … Experience of being a central point for provision of IT/cyber security and risk guidance. Able to manage sensitive and challenging situations with discretion, fairness, empathy. Awareness of vulnerabilitymanagement tools; enterprise IT systems, services, infrastructure, networking, applications in cloud, on-prem, and hybrid environments. Security tooling such as Mimecast and Microsoft Defender, Sentinel, IDAM services; ITSM More ❯
Attack Path analysis; IT and Infrastructure experience (Windows Server and/or Red Hat Linux); development of monitoring use cases; collaboration and remediation engagement 3+ years of experience in vulnerabilitymanagement or compliance monitoring Experience in design and implementation of security technologi Experience with IT controls monitoring for regulatory and compliance requirements Experience with visualization tools In-depth More ❯
Hands-on experience with security tools (OWASP Zap, Trivy, Dependabot) in CI/CD Cloud security expertise in AWS and Azure Strong scripting skills (Node.js, Python, Bash) Knowledge of vulnerabilitymanagement and secure DevOps practices Nice to Have: IaC security knowledge Experience with defect tracking and automated testing frameworks Preferred Background: Bachelor’s in Computer Science or related More ❯
oxford district, south east england, united kingdom
Stott and May
Hands-on experience with security tools (OWASP Zap, Trivy, Dependabot) in CI/CD Cloud security expertise in AWS and Azure Strong scripting skills (Node.js, Python, Bash) Knowledge of vulnerabilitymanagement and secure DevOps practices Nice to Have: IaC security knowledge Experience with defect tracking and automated testing frameworks Preferred Background: Bachelor’s in Computer Science or related More ❯
Sentinel, and Tenable One, ensuring these platforms are aligned with security best practices and operational readiness standards. The Role: The role requires strong technical expertise across SIEM, EDR, and VulnerabilityManagement technologies Combined with consultative experience in capacity planning, architectural design, and gap analysis This position bridges the gap between pre-sales design and post-implementation operations, ensuring More ❯