Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
respond to Cyber Security Incidents Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others. Run Vulnerability Assessment tools to measure compliance with security updates and security patches. Member of a Team who are responsible for making multiple daily CSOC checks to detect and respond to … XDR and Microsoft Defender variants, and Elastic Security, or displays aptitude to learn how to work with a SIEM. Experience and knowledge of SIEM tools, Cyber Security Incident Response, VulnerabilityManagement and Cyber Threat Intelligence. Experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at More ❯
Birmingham, West Midlands, England, United Kingdom
Robert Walters
Robert Walters is working in partnership with a leading financial services business. They specialise in providing experts services across pensions, wealth management and financial planning across both personal and commercial services. In addition, they offer tailored services across retirement, tax and estate planning. They are considered market leaders in providing customer and client-centric services, operating across multiple locations. … with hands-on expertise across critical systems. Information Security Manager: Duties Experience of business acquisitions - Highly desirable Develop/Maintain enterprise InfoSec strategy aligned business goals Oversee security architecture, vulnerabilitymanagement, incident response and threat intelligence Lead security risk assessments and manage remediation plans for gaps Financial regulation compliance - GDRP, PCI DSS, SOX, FCA Establish security policies, standards … Manager: Experience Experience within a financial services environment - Highly desirable Manage security for cloud-first environments - AWS, Azure, Google Cloud Implement SOC & Automated security monitoring Lead third-party risk management & vendor security programmes Experience of DevSecOps practises and SDLC Design/Implement security frameworks - ISO 27001, NIST Hands-on experience of SIEM, DLP, IAM, Endpoint Technology The permanent opportunity More ❯
templates, and standards. Assist in the development and localisation of standard test scripts, ensuring they are tailored to specific control environments and aligned with the organisation's Enterprise Risk Management Framework. Conduct control testing activities to evaluate the design and operational effectiveness of cybersecurity controls, documenting results clearly and raising issues where appropriate. Ensure timely delivery of assigned control … role, the essential criteria you'll need are Proven experience in performing cybersecurity control assessments, including evaluating design and operational effectiveness. Strong understanding of information security principles, cyber risk management, and control frameworks. Experience in IT, OT and Cloud environments, with a focus on cybersecurity controls. Clear and professional verbal and written communication, including the ability to explain cybersecurity … with minimal supervision, taking ownership of assigned tasks and driving them to completion while maintaining high standards of quality and accuracy. Strong understanding of Cybersecurity Domains, including Threat Intelligence, VulnerabilityManagement, Security Testing, Security Architecture, Infrastructure Protection, Application Security, Identity and Access Management, Incident Investigation & Response and Cryptography. Additional skills and experiences would be great to have More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Acumin
architectures in hybrid and cloud (AWS/Azure) environments. Strong hands-on expertise with enterprise security platforms – including Endpoint Protection, Cloud Security, Network Security, DevSecOps, SIEM/SOAR, and vulnerability management. Deep understanding of secure design principles, IAM, encryption, API security, and application security. Experience performing threat modelling, security risk assessments, and control design validation. In-depth knowledge of More ❯
Bedminster, Bristol, Avon, England, United Kingdom
QA
s mission is to help businesses protect their data, enhance productivity, and achieve compliance through its comprehensive Protect & Grow managed IT plans. Services include Microsoft 365 and Google Workspace management, device security, vulnerabilitymanagement, AI-enhanced email security, and disaster recovery planning. With a reputation for clear, jargon-free communication and strong client relationships, Dial A Geek More ❯
of cyber security within one of the UK's most dynamic digital infrastructure organisations? We're looking for an Information Security Manager to own and evolve our Information Security Management System (ISMS) and drive alignment with ISO 27001:2022 . This is your chance to combine strategic influence with hands on impact - protecting critical assets, leading transformation, and championing … a security first culture across the business. You'll collaborate closely with teams across IT, Legal, Procurement, and Operations , acting as the go to expert for information assurance, incident management, and regulatory compliance . What You'll Be Doing Lead and continuously improve our ISMS Manage ISO 27001 certification, surveillance audits, and compliance activities Oversee cyber risk management … an enterprise ISMS and leading ISO 27001 audits Strong understanding of cyber threats and cloud security (Azure/M365) Sound knowledge of GDPR and relevant regulatory frameworks Experience in vulnerabilitymanagement, penetration testing, and supplier assurance Excellent communication skills with the ability to influence and engage stakeholders Confident leading governance forums and promoting a security first mindset Familiarity More ❯
You’ll Do Lead and investigate high-impact cyber security incidents across global customer environments. Proactively hunt for threats, triage alerts, and identify anomalous behaviours before they escalate. Manage vulnerability assessments end-to-end, driving remediation outcomes with customers and internal teams. Optimise the Microsoft Security Stack: Sentinel, Defender (for Endpoint/Identity), Purview, and XDR. Support Zero Trust … build detections, correlations, and meaningful insights. Experience centralising log sources and onboarding new tools and data feeds into a SIEM/SOAR platform. Strong understanding of threat hunting methodologies, vulnerabilitymanagement, and incident response. Knowledge of frameworks: ISO27001, NIST CSF, SOC2, Cyber Essentials Plus. Comfortable adapting to unfamiliar tooling and integrating new technologies quickly. Why Join? Work at More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
it's a mission-critical role at the heart of our cyber security strategy. As Operational Security Manager, you'll take ownership of our security operations, overseeing threat intelligence, vulnerabilitymanagement, incident response and the performance of our outsourced 24/7 SOC. You'll work closely with internal technology teams to embed security into every aspect of More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Career Legal
days in London per week* What You’ll Do Build the SecOps team from the ground up and manage/mentor the team. Lead the implementation, optimisation, and management of cutting-edge security tools like CrowdStrike, Palo Alto, and Mimecast. Take ownership of our cyber defence posture from incident response and vulnerabilitymanagement to WAFs, DDoS protection More ❯
Poole, Dorset, England, United Kingdom Hybrid / WFH Options
Mexa Solutions LTD
week in the office) Scope : Work across IT, application, cloud, and physical security, no siloed remits here Responsibility : Be the go-to person for penetration testing, compliance audits, and vulnerabilitymanagement Environment : Modern SaaS product environment, working alongside DevOps, engineering, and IT Growth : Get stuck into a wide variety of work, with support from leadership and autonomy to … make a real impact What you’ll be doing: Leading vulnerability assessments and coordinating regular penetration testing across systems and products Owning risk remediation actions, from security audits to PCI scans and compliance reporting Working across cloud (AWS), infrastructure, and software environments to ensure security best practices are embedded throughout Supporting the secure design of products and infrastructure, providing … ideally 2-3+ years), ideally across cloud and hybrid environments Strong penetration testing experience with confidence to act on the findings A solid grasp of access controls, identity management, and cloud security (especially AWS) Familiarity with secure software development practices and working alongside dev teams Understanding of key frameworks like ISO 27001, PCI-DSS, and GDPR Bonus points More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Reed
practices. You’ll work closely with IT, development, and project teams to embed security into every stage of the software development lifecycle and drive a risk-based approach to vulnerability management. Key Responsibilities Lead application security initiatives across cloud-native and enterprise environments. Promote secure design principles, threat modelling, and best practices across teams. Own and evolve the technical … vulnerabilitymanagement programme. Implement and support security controls, particularly within Azure cloud environments. Evaluate and deploy best-in-class application security tools. Mentor teams and deliver tailored security awareness programmes. Assist with incident response, security training, and supplier/client security assessments. What We’re Looking For Essential Skills & Experience: Proven experience in application security engineering. Strong knowledge More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Context
are patched and secure. Responsibilities: * Managing and optimising security tools and platforms (SIEM, XDR, IDAM policies etc.) * Monitoring vulnerabilities, investigating incidents and implementing corrective actions * Supporting patching compliance and vulnerability remediation * Ensuring security best practices are applied across networks, applications and systems * Participating in change reviews and advising on improvements to existing setups * Supporting compliance with frameworks such as … ISO 27001, Cyber Essentials Plus and CAF Requirements: * A solid background in IT infrastructure and/or network engineering * Some exposure to, or a growing focus on, cybersecurity and vulnerabilitymanagement * Understanding of network devices, configurations and security principles * Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) * Confidence to identify More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Project People
We’re seeking an experienced Information Security Manager to lead, develop, and continuously improve our Information Security Management System (ISMS) , ensuring compliance with ISO 27001:2022 and protecting the digital infrastructure. In this strategic yet hands-on role, you’ll manage cyber risk , drive security governance , and embed a security-first culture across the organisation. You’ll also act … we’re looking for: Proven experience managing an enterprise ISMS and ISO 27001 audits. Strong knowledge of cyber threats, cloud security (Azure, M365), and GDPR. Hands-on experience in vulnerabilitymanagement, supplier assurance, and incident response. Excellent communication and stakeholder management skills. Benefits: Competitive salary with bonus scheme Very generous holiday allowance Hybrid working – 3 days per More ❯
through our comprehensive suite of cloud-native solutions. With over 100,000 customers across 135 countries, we deliver mission-critical software spanning accountancy and finance, HR and payroll, education management, and business operations. Our impact reaches deep into communities: over 4 million UK families connect with their children’s schools through our education apps, nearly 5 million employees globally … team, comprehensive learning opportunities, and a vibrant technical community committed to creating exceptional solutions that make a real difference in how our customers operate and succeed. Main Responsibilities : Delivery Management (40%) Ensure projects are scoped, prioritised, and delivered on time with clear alignment to business goals and quarterly OKRs Drive predictability, velocity, and quality through effective agile practices and … Provide strategic technical leadership through architectural guidance and critical technical decisions, with selective hands-on contributions Define technical decisions and maintain system health through architectural oversight and technical debt management Establish and drive comprehensive quality culture including TDD/BDD practices, testing standards, automated quality gates, and team code review excellence Define team security standards ensure team compliance governance More ❯
through our comprehensive suite of cloud-native solutions. With over 100,000 customers across 135 countries, we deliver mission-critical software spanning accountancy and finance, HR and payroll, education management, and business operations. Our impact reaches deep into communities: over 4 million UK families connect with their children’s schools through our education apps, nearly 5 million employees globally … team, comprehensive learning opportunities, and a vibrant technical community committed to creating exceptional solutions that make a real difference in how our customers operate and succeed. Main Responsibilities : Delivery Management (40%) Ensure projects are scoped, prioritised, and delivered on time with clear alignment to business goals and quarterly OKRs Drive predictability, velocity, and quality through effective agile practices and … Provide strategic technical leadership through architectural guidance and critical technical decisions, with selective hands-on contributions Define technical decisions and maintain system health through architectural oversight and technical debt management Establish and drive comprehensive quality culture including TDD/BDD practices, testing standards, automated quality gates, and team code review excellence Define team security standards ensure team compliance governance More ❯
Information Security Officer - Risk. - Hybrid - Lancashire £61,500 10.5% bonus 14% pension healthcare plus additional benefits. Information Security Officer with Risk management and risk register experience needed as part of an extremely well-funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As the Information Security Officer for Risk your primary purpose … will be to become a trusted cyber security risk advisor, ensuring the business is compliant against security policy, acting as advisory, collaborating with stakeholders and management to assess risks, review and advise ratings for IT/OT/Physical Cyber risks and support business coordinators in assessing their risk position. As the Information Security Officer for Risk, you will … build strong relationships with business and technology functions as well as 3rd parties offering real world experience of cyber security risk management In this role you will act in an advisory capacity to the business day-to-day basis monitoring cyber security risk, compliance across diverse business functions, supporting business area coordinators. Reviewing risks to ensure they are clear More ❯
Information Security Officer - Risk. - Hybrid - Lancashire £61,500 10.5% bonus 14% pension healthcare plus additional benefits. Information Security Officer with Risk management and risk register experience needed as part of an extremely well-funded growing cyber security team for this North West based enterprise level critical national infrastructure organisation. As the Information Security Officer for Risk your primary purpose … will be to become a trusted cyber security risk advisor, ensuring the business is compliant against security policy, acting as advisory, collaborating with stakeholders and management to assess risks, review and advise ratings for IT/OT/Physical Cyber risks and support business coordinators in assessing their risk position. As the Information Security Officer for Risk, you will … build strong relationships with business and technology functions as well as 3rd parties offering real world experience of cyber security risk management In this role you will act in an advisory capacity to the business day-to-day basis monitoring cyber security risk, compliance across diverse business functions, supporting business area coordinators. Reviewing risks to ensure they are clear More ❯
to protect customer’s IT networks from cyber attack. Responsibilities : Monitor and analyse Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, and Security Incident and Event Management (SIEM) toolset event logs to identify security attacks and threats for remediation/suppression. Assist in Computer Security Incident Response activities for large organisations as a 1st line security … operational effectiveness and efficiency. Qualifications: Broad experience of technologies including but not limited to; Firewalls, IPS & IDS, Active Directory, Windows Server, Linux, TCP/IP, Networks, AWS, CDN's, Vulnerabilitymanagement and SIEM, DRM. At least basic knowledge the fundamentals of cyber security Security Administration Incident containment, recovery and mitigation Excellent customer service skills Strong analytical and problem More ❯
and external audits. * Oversee incident response, including investigation, containment, and recovery. * Conduct vendor security assessments and review contractual security requirements. * Lead day-to-day security operations, including access control, vulnerabilitymanagement, and endpoint protection. * Build and mentor a new security team while driving organisation-wide security awareness. Key experience:* Extensive experience in information security within regulated financial services. More ❯
measures What you'll bring: Knowledge of frameworks such as NIST CSF, NIST 800-53, and NCSC CAF Strong understanding of networking, cloud security (AWS/Azure), IAM, and vulnerabilitymanagement Familiarity with ISO 27001/27002 and related standards Awareness of modern threats, malware, and security analytics Experience (5+ years) in cyber security roles preferred Desirable certifications More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
Analyse and prioritise incoming security tickets Perform initial investigation and escalation of suspicious activity or confirmed incidents Document incidents, investigation steps, and resolutions in accordance with internal processes Support vulnerabilitymanagement, patching, and threat monitoring activities Assist in maintaining and improving SOC runbooks, playbooks, and standard operating procedures Collaborate with IT teams and other stakeholders to remediate security More ❯
Hatfield, Hertfordshire, South East, United Kingdom
Affinity Water Limited
ensuring the resilience of OT systems. What you'll be doing: Implement and manage OT security controls, measures, and technologies to protect critical assets and systems. Conduct risk assessments, vulnerabilitymanagement, and security testing. Develop and implement incident response plans and ensure compliance with regulations. Conduct proactive threat hunting and reactive incident response. Provide regular reports on security … industrial control systems (ICS) and SCADA systems. Strong problem-solving skills and attention to detail. Proven experience with OT and IT security technologies, including firewalls, intrusion detection systems (IDS), vulnerability detection, network discovery, log collection systems, and security information and event management (SIEM) solutions. UK Driving Licence. About Us Affinity Water is the UKs largest water-only supplier More ❯
Bromsgrove, Worcestershire, United Kingdom Hybrid / WFH Options
First Choice Recruitment Services
working to protect the company from a range of cyber and security threats. Candidates will need 2/3 years’ experience of working as a Security Analyst, including monitoring vulnerability and threats, risk mitigation and implementation of robust security policies. This role is to be based at the Bromsgrove office but regular travel to Tewkesbury as required. Hybrid working … to contain and resolve threats. Keep incident logs, reports, and tickets updated within incident tracking systems. Assist in threat intelligence gathering and analysis to enhance detection capabilities. Participate in vulnerabilitymanagement activities. Update and oversee the software inventory. Support compliance reporting and audits. Assist in IT service desk activities. Stay updated with emerging cyber threats, attack techniques, and … security trends. Perform any additional duties delegated by the IT Manager to ensure efficient management of the Company. Key skills: Candidates will need recent work history of working in a similar role. Degree Educated would be an advantage A strong understanding of firewalls, intrusion detection systems and other security technologies is essential. Familiar with ethical hacking and penetration testing More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
IO Associates
to solve problems and push boundaries. Progression: As the function expands, you'll have the chance to build your own specialism or sub-function, whether that's automation, exposure management, or advanced threat engineering. What You'll Be Doing Deliver hands-on security engineering and automation projects for enterprise clients. Build custom integrations, playbooks, and scripts to streamline SOC … operations. Optimise SIEM detection logic and vulnerabilitymanagement workflows. Collaborate with technical teams on innovation, labs, and roadmap projects. Act as a trusted consultant - parachuting in, solving problems fast, and moving on to the next challenge. What We're Looking For Background in SOC, Security Engineering, or Automation - ideally customer-facing. Python/PowerShell/REST API scripting More ❯