THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerabilitymanagement programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerabilitymanagement experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerabilitymanagement programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerabilitymanagement experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerabilitymanagement programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerabilitymanagement experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerabilitymanagement programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerabilitymanagement experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful, mission-critical projects. … What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerabilitymanagement programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to national … security standards Experience required Extensive hands-on CTI and vulnerabilitymanagement experience Leadership of technical teams within high-security environments Strong knowledge of threat actor tactics, techniques, and procedures (TTPs) Familiarity with tools such as Cobalt Strike, SIEM, and vulnerability scanning platforms Active DV clearance (or willingness to achieve it) The package Competitive salary + benefits Industry More ❯
efficiency. Proactively hunt for potential threats within the environment, leveraging threat intelligence and advanced analytics to identify and mitigate risks. Work closely with other cyber defence teams, including Intelligence, VulnerabilityManagement, Threat Hunting, and Purple Teams. Effectively communicate findings and recommendations to various stakeholders. Utilise your technical expertise to analyse telemetry related to incidents and identify appropriate investigation … in scripting or programming languages. Preferred experience dealing with incidents in various environments, including OT and ICS technologies. Preferred experience working with wider Cyber Defence teams, such as Intelligence, VulnerabilityManagement, Threat Hunting, and Purple Teams. Understanding of cyber security legislation and experience with information risk and security-related best practices, policies, standards, and regulations. What's in More ❯
with users. Escalate issues appropriately and manage major incidents in line with agreed processes. Provide outstanding customer service, maintaining accurate records and regular updates. Support problem, change, and project management activities, representing the Service Desk where required. Manage and document IT assets, processes, and knowledge bases. Contribute to vulnerabilitymanagement, regulatory compliance, and audit requirements. Assist in … written and verbal communication skills, with the ability to explain technical issues to non-technical audiences. Desirable Skills: Experience in financial services or multi-site support environments. Exposure to vulnerabilitymanagement tools (e.g., Qualys) and remote access administration. Experience with Microsoft Power Apps and automation of Service Desk processes. ITIL 4 Foundation and/or Service Desk Analyst More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Nextech
expertise. What You'll Do Serve as the Cyber Security Subject Matter Expert, advising on secure systems design, change control, and implementation of robust security controls. Lead the technical vulnerabilitymanagement programme, with a strong focus on application security, web application firewalls, and secure DevOps pipelines. Provide security leadership and mentoring , supporting colleagues and enhancing security awareness across … evolving threats, and help shape our strategy using frameworks such as OWASP, SASE, and Zero Trust. What We're Looking For Essential: Proven experience in cyber security engineering, including vulnerabilitymanagement, SIEM, WAFs, and secure infrastructure design. Strong knowledge of TCP/IP, firewalls, routing, access controls, and threat-based security approaches. Excellent communication skills with the ability More ❯
stakeholders and providing clear, actionable reporting. Skills & experience sought: Strong background in IT Security, Cyber Assurance, or IT Audit. Hands-on knowledge across areas such as governance, IAM, threat management, vulnerabilitymanagement, and incident response. Good understanding of security frameworks (e.g. ISO27001, NIST, PCI-DSS, SOX). Experience engaging with senior stakeholders within complex environments. Relevant certifications More ❯
requires a thorough understanding of the technology underpinning the Trust digital systems, as well as a broad, up-to-date knowledge of information security frameworks, pertinent regulation and legislation, vulnerabilitymanagement, incident management and response, secure development techniques and approaches, Cyber Security engineering and operations, and management and governance of Cyber risk and Cyber Security. Please … using a range of IT applications Significant evidence of continued professional development Desirable ITIL Qualification COBIT Knowledge and Experience Essential Proven and significant leadership experience and/or formal management qualification Demonstrated expertise in an IT Security environment Direct experience of strategic and budgetary planning and financial management and controls Previously worked within the NHS A good practical … knowledge of security technologies and wider business solutions including Firewalls, IDS/IPS, Identity and access management, SIEM, remote working and cloud technologies Proven experience of working at a senior level leading and delivering IT Security in a sensitive and complex environment which is undergoing significant change Experience of delivering presentations to large groups of stakeholders Demonstrable commitment to More ❯
Vulnerability Analyst – 3-month contract My Customer is seeking a proactive and skilled Vulnerability Analyst to join their team in a highly regulated, mission-critical 24/7 environment. Their infrastructure includes over 450 servers operating across both Windows and Linux platforms — making secure access and timely response essential. Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools is needed for this role. Key Skills from the Vulnerability Analyst: Demonstrated experience in vulnerabilitymanagement within large-scale enterprise or corporate environments . Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools. Strong working knowledge of Windows and Linux operating systems , including their associated technology … stacks. Able to operate effectively in a secure, complex, and highly regulated setting with restricted access considerations. Key responsibilities for the Vulnerability Analyst: Daily monitoring and analysis of security events and vulnerabilities. Proactively reviewing Qualys reports to identify missing patches, misconfigurations, and other potential threats. Collaborating closely with infrastructure and operations teams to coordinate and apply remediation actions. Ensuring More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Alexander Mae (Bristol) Ltd
the IT Service Desk Providing support via tickets, email and phone Assisting with pre-sales technical support Leading the response during P1 critical issues Completing BAU tasks including patch management , vulnerabilitymanagement , and backend system troubleshooting Onboarding new clients when needed Supporting non-technical colleagues with escalated issues Reporting directly to the Service Desk Manager The Person More ❯
and ensure alignment of security controls with business risk appetite. • Monitor compliance with regulatory and shareholder cybersecurity obligations, including NIS2 and UK critical infrastructure laws. Responsbile for Information Risk Management across the IT function. Operational Security Leadership • Lead cybersecurity operations including Security Operations Centre (SOC), SIEM management, and incident response coordination. • Oversee vulnerabilitymanagement, patch management … of IT estate fromlegacy systems, ensuring cyber risk is proactively managed during transition. • Design and implement the foundational security architecture for a greenfield technology landscape, including secure cloud, identity management, and endpoint protection. Qualifications & Experience Required: • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, or a related field. • Minimum 10 years of experience in IT risk management … years in leadership/management. • Familiarity with security frameworks (NIST CSF, ISO 27001), regulatory requirements (NIS2, GDPR), and OT standards (IEC 62443, OG86). • Strong vendor and stakeholder management skills. Preferred: • Professional certifications such as CISSP, CISM, or SANS GIAC. • Deep understanding of both enterprise IT and industrial control systems (ICS/SCADA) in upstream energy. • Proven experience in More ❯
systems. Maintain accurate documentation of IT assets and processes. Assist in the planning and implementation of new infrastructure projects. Identify and mitigate potential risks to IT systems and services. Vulnerabilitymanagement system experience such as Rapid 7 Linux patching Profile A successful System Administrator should have: Experience managing IT infrastructure in the industrial or manufacturing Software environment. Strong … and storage systems. Proficiency in troubleshooting and problem-solving within IT environments. Knowledge of system security best practices and compliance standards. Ability to work collaboratively with cross-functional teams. VulnerabilityManagement system experience such as Rapid 7 Linux patching skills Cloud Infrastructure experience Excellent attention to detail and organisational skills. Job Offer Competitive salary ranging from More ❯
systems. Maintain accurate documentation of IT assets and processes. Assist in the planning and implementation of new infrastructure projects. Identify and mitigate potential risks to IT systems and services. Vulnerabilitymanagement system experience such as Rapid 7 Linux patching Profile A successful System Administrator should have: Experience managing IT infrastructure in the industrial or manufacturing Software environment. Strong … and storage systems. Proficiency in troubleshooting and problem-solving within IT environments. Knowledge of system security best practices and compliance standards. Ability to work collaboratively with cross-functional teams. VulnerabilityManagement system experience such as Rapid 7 Linux patching skills Cloud Infrastructure experience Excellent attention to detail and organisational skills. Job Offer Competitive salary ranging from More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Experience designing and securing AI/ML and MLOps environments , including awareness of risks such as adversarial attacks, model poisoning, and data privacy issues. Deep knowledge of: Identity & Access Management (IAM) Network and Application Security Data Protection & Encryption Kubernetes, Containers, and DevSecOps/MLOps practices SIEM, logging, and monitoring Zero Trust architectures Skilled in applying frameworks such as NIST … CSF, ISO 27001, PCI DSS, CSA CCM, NIST AI RMF . Hands-on with tools for vulnerabilitymanagement, secrets management, CSPM, and CWPP . Relevant certifications strongly preferred (CISSP, CCSP, TOGAF, AWS/Azure/GCP security certifications). Excellent communication and leadership skills, with the ability to influence at all levels. Esther Urtecho Senior Delivery Consultant More ❯
Senior Vulnerability Analyst £50,000 - £57,000 + bonus and extensive benefits Full Time/Permanent West Midlands/Hybrid - 1-2 days a month in the office on average The Role and Company: I am looking for a driven Senior Vulnerability Analyst to join a large nationally recognised brand head quartered in the West Midlands. As a … Senior Vulnerability Analyst you will be joining a highly skilled Cyber Defence team. As a key part if this team you will manage threats to the organisation and safeguard systems that enable the business to function safely and effectively. We are ideally looking for someone Midlands based who can be on site in Warwickshire 1-2 days a month … on average. Responsibilities: Conducting regular vulnerability assessments using automated scanning tools, manual testing techniques, and security best practices to identify vulnerabilities in systems, networks, and applications Managing the lifecycle of vulnerabilities from discovery to remediation, including vulnerability triage, prioritisation, tracking, and reporting Analysing the impact and severity of identified vulnerabilities based on factors such as the likelihood of More ❯
automation and tooling, working with Security Operations to monitor and analyse network traffic for malicious activity or potential breaches. Additionally, this role implements network access controls, enforces robust patch management for network devices, and works with network security partners to identify network vulnerabilities, planning and implementing upgrades to ensure the highest standards of network security. This role is required … Service and Portfolio Requests i.e. Meraki configuration and firewall changes. On Call Rota: Participate in on-call rota and occasionally work out of regular business hours to facilitate change management and incident resolution. Secure Network Configurations: Establish and maintain secure network configurations including Cisco Meraki and Palo Alto firewalls, routers, switches, and VPNs. Firewall and Access Review: Periodically review … monitor and analyse network traffic for malicious activity or potential breaches. Access Controls: Implement network access controls to ensure only authorised users and devices can access specific network segments. Vulnerability and Patch Management: Identify and manage the remediation of network vulnerabilities and upgrades to ensure the highest standards of network security. This includes vulnerabilitymanagement of More ❯
Vulnerability Engineer/Manager to join a highly professional established security ops SOC team. You will lead Vulnerability ensuring identification, assessment and remediation of security vulnerabilities across infrastructure, applications and systems. Working with SOC analysts leading the end to end vulnerabilitymanagement lifecycle, manage and optimise vulnerability scanning tools such as Tenable and Nessus. Regularly … scan networks, systems and applications for security vulnerabilities. Must have 3+ years cyber security experience and at least 2 yrs focusing on vulnerability management. Familiar with threat and standards such as CVSS, NIST, MITRE ATT&CK. This is an excellent opportunity working for an award winning MSP working on exciting projects. You will develop and maintain vulnerability policies More ❯
and roadmap, ensuring our security posture meets the requirements of the NHS Data Security and Protection Toolkit (DSPT), Cyber Essentials Plus, ISO 27001:2022, and other relevant frameworks. Risk Management: Lead the information security risk management program, including the identification, assessment, mitigation, and monitoring of risks across all systems and operations. Policy and Governance: Support and oversee the … Technology Assessment Criteria (DTAC) and NCSC CAF. ISO 27001:2022 implementation & maintenance: Hands-on experience with the successful implementation, certification, and ongoing maintenance of an ISO 27001 Information Security Management System (ISMS), ideally to the 2022 standard. Security architecture & Secure by Design: Strong understanding and experience of secure software development lifecycles (SDLC) and embedding security by design into product … development processes, along with secure system architecture principles. Risk management: Demonstrated expertise in developing, implementing, and managing information security risk management frameworks, including risk assessment methodologies (eg OCTAVE, FAIR). Incident response: Proven track record in developing, leading, and managing security incident response plans, including experience with major incident handling and communication with regulatory bodies (eg NCSC, ICO More ❯
BA1, Bath, Bath and North East Somerset, Somerset, United Kingdom
YT Technologies
and roadmap, ensuring our security posture meets the requirements of the NHS Data Security and Protection Toolkit (DSPT), Cyber Essentials Plus, ISO 27001:2022, and other relevant frameworks. Risk Management: Lead the information security risk management program, including the identification, assessment, mitigation, and monitoring of risks across all systems and operations. Policy and Governance: Support and oversee the … Technology Assessment Criteria (DTAC) and NCSC CAF. ISO 27001:2022 implementation & maintenance: Hands-on experience with the successful implementation, certification, and ongoing maintenance of an ISO 27001 Information Security Management System (ISMS), ideally to the 2022 standard. Security architecture & Secure by Design: Strong understanding and experience of secure software development lifecycles (SDLC) and embedding security by design into product … development processes, along with secure system architecture principles. Risk management: Demonstrated expertise in developing, implementing, and managing information security risk management frameworks, including risk assessment methodologies (eg OCTAVE, FAIR). Incident response: Proven track record in developing, leading, and managing security incident response plans, including experience with major incident handling and communication with regulatory bodies (eg NCSC, ICO More ❯
role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems and resolving … security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of … make an impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, VulnerabilityManagement, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Leominster, Herefordshire, West Midlands, United Kingdom Hybrid / WFH Options
Kingspan
available, you will be able to commute to your nearest site ideally twice a week. As the Website Platform Manager you will be responsible for the end-to-end management, performance, and evolution of our global website platform, which combines a headless CMS with an integrated Logik-powered product hub. You will ensure the platform delivers a seamless, high … and meets enterprise performance, security, and scalability standards. Responsibilities of our Website Platform Manager Platform Ownership Serve as the primary owner for the global website platform, overseeing its content management system, product hub integration, and related services. Maintain the platform roadmap, balancing global business priorities, regional needs, and technical improvements. Business continuity planning. Technical Oversight Liaise with development partners … content publishing, quality standards, and approval workflows. Provide CMS training and support for global and regional content teams. Data privacy (GDPR/CCPA) and cookie & consent management. Domain & DNS Management (e.g SSL certification) Cyber security operations including vulnerabilitymanagement and penetration testing. Regulatory compliance in local markets. Code quality & security including release management and change controls. More ❯
ready to step up, guide analysts, and model high-integrity InfoSec practice What you’ll be doing: GRC ownership: maintain ISO27001 and SOC2 certifications, policies, and the Information Security Management System Third-party risk management: oversee supplier assessments, support junior analysts, and guide reviews via Panorays Security awareness & training: manage phishing simulations and content using Proofpoint Security architecture … Head of InfoSec when required Project support: direct InfoSec involvement in the U.S. banking expansion and business unit reviews Tech & tools you’ll use: Protecht – Enterprise risk and audit management Panorays – Third-party risk tooling Rapid7/Armis – Vulnerabilitymanagement and threat detection Proofpoint – Phishing and awareness platform Microsoft Purview – Data governance and compliance Azure & AWS – Cloud More ❯
ready to step up, guide analysts, and model high-integrity InfoSec practice What you’ll be doing: GRC ownership: maintain ISO27001 and SOC2 certifications, policies, and the Information Security Management System Third-party risk management: oversee supplier assessments, support junior analysts, and guide reviews via Panorays Security awareness & training: manage phishing simulations and content using Proofpoint Security architecture … Head of InfoSec when required Project support: direct InfoSec involvement in the U.S. banking expansion and business unit reviews Tech & tools you’ll use: Protecht – Enterprise risk and audit management Panorays – Third-party risk tooling Rapid7/Armis – Vulnerabilitymanagement and threat detection Proofpoint – Phishing and awareness platform Microsoft Purview – Data governance and compliance Azure & AWS – Cloud More ❯