ATT&CK and network/cloud security principles. Strong analytical and communication skills. Bonus points for: Scripting or automation experience (KQL, PowerShell, Python). Background in threat hunting or vulnerability management. Why apply? Hybrid flexibility, funded certifications, cutting-edge tooling, and clear development paths into leadership or specialist roles. If you’re ready to step up and help evolve More ❯
in Cyber Security, PCI DSS within a cloud environment Have good Security architecture experience, ideally with a DevSecOps environment Excellent experience with PCI DSS and able to lead design Vulnerabilitymanagement & Compliance Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, and NIST Confidence when speaking with More ❯
threat detection and response processes. Key Requirements: Previous experience in a SOC Analyst or similar cybersecurity role Strong expertise in Splunk or similar SIEM tools Familiarity with Flexera for vulnerabilitymanagement Understanding of firewalls, network protocols, intrusion detection/prevention systems Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous Must be eligible for Developed Vetting (DV) clearance , requiring More ❯
Lead and mentor a small team of IT security professionals. Own ISO 27001 implementation and Cyber Essentials Plus certification. Manage operational security: endpoint protection, M365 security, SIEM/SOC, vulnerabilitymanagement, and incident response. Lead security projects. Build strong relationships with stakeholders and deliver security awareness training. What We’re Looking For: Proven experience in information security managementMore ❯
London, South East, England, United Kingdom Hybrid/Remote Options
vertex-it-solutions
ideal candidate will be a proactive problem-solver, a mentor to junior team members, and a driving force in the ongoing improvement of our IT services. Key Responsibilities Infrastructure Management & Support: Design, build, and maintain the company's global IT infrastructure, including on-premises HPE/Dell server and storage hardware, co-located data centres, and cloud-based systems. … device management. Ensure the security of our infrastructure and data by managing on-premises and cloud security controls and working closely with the Security Operations Centre (SoC) to action vulnerabilitymanagement and system patching. Manage and maintain our Windows and Linux (CentOS, Red Hat, Ubuntu) server estate, as well as core Microsoft services (AD, GPO, DNS, NPS/… SMTP Relay), and our extensive VMware vSphere/vCenter virtualisation platform. Administer and optimise our System Centre Configuration Manager (SCCM) hierarchy, including Primary/Secondary sites, Distribution Points, Cloud Management Gateway (CMG), and Azure integration for global software deployment and updates. Manage and maintain our VDI environment (VMware Horizon/Citrix/OLVM), ensuring a reliable experience for our More ❯
Horsham, Sussex, United Kingdom Hybrid/Remote Options
Benchmark Capital Limited
from Horsham Station straight to our campus. Description We re seeking a hands-on Security Architect to lead the design and assurance of security across our Financial Advice & Wealth Management SaaS platform. This is a pivotal role where you ll own the security architecture across cloud infrastructure and networking, drive secure-by-design application architectures, and ensure robust security … us meet the expectations of our customers, clients, and regulators What you'll do Design and maintain secure cloud environments, including network segmentation, WAFs, DDoS protection, secret and certificate management, and encryption. Embed secure SDLC practices such as SAST/DAST, dependency scanning, secure coding standards, threat modelling, and API security. Architect identity-centric controls across cloud infrastructure and … Align security standards and frameworks with business and technology strategy. Monitor and communicate emerging security trends. Identify and address security design gaps in application and infrastructure architectures. Assist with vulnerabilitymanagement, testing, risk analysis, and reporting. Clearly communicate security concepts and strategies to stakeholders. The knowledge, experience and qualifications you need Strong expertise in cloud security, preferably within More ❯
Horsham, West Sussex, United Kingdom Hybrid/Remote Options
Benchmark Capital Limited
from Horsham Station straight to our campus. Description We’re seeking a hands-on Security Architect to lead the design and assurance of security across our Financial Advice & Wealth Management SaaS platform. This is a pivotal role where you’ll own the security architecture across cloud infrastructure and networking, drive secure-by-design application architectures, and ensure robust security … us meet the expectations of our customers, clients, and regulators What you'll do Design and maintain secure cloud environments, including network segmentation, WAFs, DDoS protection, secret and certificate management, and encryption. Embed secure SDLC practices such as SAST/DAST, dependency scanning, secure coding standards, threat modelling, and API security. Architect identity-centric controls across cloud infrastructure and … Align security standards and frameworks with business and technology strategy. Monitor and communicate emerging security trends. Identify and address security design gaps in application and infrastructure architectures. Assist with vulnerabilitymanagement, testing, risk analysis, and reporting. Clearly communicate security concepts and strategies to stakeholders. The knowledge, experience and qualifications you need Strong expertise in cloud security, preferably within More ❯
your level of ability/experience, you will have familiarity, competence or expertise in a subset of these areas: Cloud technologies: AWS primarily Azure and GCP beneficial Cyber security Vulnerabilitymanagement (e.g. tenable) IDAM (e.g Azure AD, Keycloak) Virtualisation and Containerisation Containerisation (e.g. Docker, Podman) Container management (e.g. Kubernetes) Architectural styles Microservices Serverless DevSecOps tooling Version control More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid/Remote Options
hireful
a mix of on-premise and Azure environments. You’ll work across servers, networks, storage, and security tools, contributing to infrastructure projects as well as cyber initiatives such as vulnerabilitymanagement, incident response, and enhancing security controls. You’ll also collaborate with group security teams and help ensure systems remain resilient and up to date. Key skills we … with security tools (Defender, Sentinel, Tenable, Zscaler etc.) Palo Alto deployment/configuration experience is a must Good understanding of firewalls, network protocols, and intrusion prevention Ability to manage vulnerability scanning, incident response, and remediation Confident communicator with solid documentation skills The role also covers an office in Milton Keynes and they might be occasional travel there This is More ❯
london (city of london), south east england, united kingdom Hybrid/Remote Options
Bupa Occupational Health
analysing the output of assessments utilising our chosen Breach and Attack Simulation platform and by consuming additional data from multiple sources such as Red Team and Penetration Testing reports, Vulnerability Scanning platforms, and other tools that will identify misconfigurations within the Bupa infrastructure that represent a potential security risk. You will also perform a leading role in designing test … platforms and engage in continuous self-learning through provided resources to maintain your credibility and expertise. Partner with internal and external SMEs across Security Operations, Engineering, Threat Intelligence, and VulnerabilityManagement to design effective solutions. Mentor and guide colleagues, sharing knowledge and influencing others to resolve identified weaknesses. Lead small projects, ensuring timely and accurate implementation of solutions … Security Control technologies Exposure to Threat Intelligence sources Good experience of typical enterprise security services including but not limited to: Threat Intelligence Penetration testing Anti-malware Email/SPAM management Authentication mechanisms SIEM WAF Firewalls Proxy technologies IDS/IPS DLP Has a track record of technical delivery within a fast paced & pressured environment. Engages key stakeholders well Effective More ❯
Edinburgh, Midlothian, United Kingdom Hybrid/Remote Options
Lloyds Bank plc
Azure. Proficiency in Terraform, Docker, Kubernetes, and CI/CD tools (e.g., Jenkins, Harness). Experience with observability tools and distributed tracing. Solid understanding of cloud security principles and vulnerability management. Excellent communication and documentation skills. A collaborative mindset and a bias for action. You'll help shape the future of reliability engineering at Lloyds, contributing to the evolution More ❯
Birmingham - 3 days on site Inside IR35 £500 - £550 This is an excellent opportunity for an experienced and proactive IT Security professional to play a critical role in the management and continuous improvement of the Security Operations function through safeguarding the information and technology systems. This company is at the heart of the British transport network and are considered … keep up with the high demand. In this varied role you will be accountable for a broad range of Security Operations activities, including proactive monitoring, incident response, threat and vulnerabilitymanagement, managing the external Security Operations Centre (SOC) partnership and developing security capabilities. You will also play a key part in providing expert technical advice for risk assessments … and compliance initiatives. The ideal candidate will possess strong experience in managing and delivering security operations, including planning vulnerability assessments and penetration testing, investigating security breaches, maintaining operational security processes, maturity assessments and actively contributing technical expertise to risk management. An understanding of ISO27001 and Power BI would be beneficial and having previous experience with government policies such as More ❯
Employment Type: Contract
Rate: £500 - £550 per day + Inside IR35 + ASAP Start
Security & Compliance Implement security best practices across infrastructure and deployments Manage secrets, credentials, and access control Ensure compliance with data protection requirements for financial data Conduct security scanning and vulnerabilitymanagement Support audit and compliance requirements Collaboration & Enablement Work closely with engineering teams to understand deployment needs Provide guidance on containerization and cloud-native practices Document infrastructure, runbooks … Expertise Essential Skills and Experience DevOps/infrastructure experience in production environments Strong Kubernetes knowledge including deployment, scaling, networking, and troubleshooting Experience with infrastructure as code and cloud resource management Azure cloud experience including AKS, networking, storage, and security services CI/CD pipeline experience with GitOps tools (ArgoCD preferred) or similar platforms Scripting and automation using Bash, Python … to troubleshoot complex distributed systems Desirable Skills and Experience Experience with GitHub Actions for CI/CD Understanding of networking and load balancing in cloud environments Security tooling experience - vulnerability scanning, SAST/DAST, compliance automation Experience with cost optimization and FinOps practices in cloud environments Knowledge of database administration – MS SQL, PostgreSQL, Redis, or similar Understanding of AI More ❯
Bristol, Gloucestershire, United Kingdom Hybrid/Remote Options
Deloitte LLP
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, VulnerabilityManagement, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯
Manchester, Lancashire, United Kingdom Hybrid/Remote Options
Burns Sheehan
posture, manage ISO certifications, and establish formal security governance to meet the demands of major institutional investment. Hands On Technical Guidance: Provide technical expertise to navigate security tools (SIEM, VulnerabilityManagement) and architectural decisions, ensuring the move away from early stage cost cutting. Global Team Management: Lead and grow a small, focused security team (currently 2, planned More ❯
london (city of london), south east england, united kingdom Hybrid/Remote Options
Gravitee
digital transformation for top enterprises, from Michelin to Roche to Blue Yonder and beyond, offering unmatched control over APIs and event streams. Our rapid growth and leadership in API management are fueled by our team's commitment to excellence and our core values: Passion: We bring excitement to everything we do, constantly innovating to stay ahead of the curve. … respectful communication and prioritize the needs of our team and customers. Join us on this journey. Be part of a team that's redefining what's possible in API management, and shaping the future of digital transformation. The possibilities are endless—be a part of the revolution THE ROLE & WHY IT EXISTS is taking APIs to the next level … and tools to continuously improve platform reliability and customer experience. ESSENTIAL TECHNICAL SKILLS The right candidate will possess at least the following skills, if not more: Kubernetes (cluster creation & management) Docker Terraform Helm Charts Cloud experience (AWS and/or Azure) Even better if you also have skills across: Certificate management (ZeroSSL, Let's Encrypt) Argo Workflows & ArgoCD More ❯
this transformation, we are seeking an experienced Environment Manager who will play a pivotal role in managing and optimising our technology environments across the development lifecycle. Responsibilities Environment Lifecycle Management: Oversee the provision, configuration, and maintenance of technology environments across lifecycle stages including Development, System Integration Testing (SITS), Pre-Production, whilst supporting Production. This spans on-premises ERP systems … focusing on cost efficiency, demand fulfilment, and adherence to best practices. Deliver a consistent model across technology with our partners. Process Improvement: Continuously identify and implement improvements to environment management processes, tools, and documentation to simplify and optimise the environment landscape. Environment Cost Optimisation: Monitor, forecast, and manage environment-related costs across all delivery stages, aligning provisioning and scheduling … with demand to ensure efficient resource utilisation and scalable costs across ERP, digital, and cloud-native platforms. Security, VulnerabilityManagement & Compliance: Ensure robust security practices across all environments, proactively identify and remediate vulnerabilities, and maintain compliance with industry and audit requirements. Incident Management: Own incident and escalation Resolution across environments, communicating clearly with senior stakeholders and translating More ❯
intrusion prevention) are correctly configured and maintained. Participate in resilience planning, including disaster recovery and business continuity exercises, ensuring network components meet required redundancy and failover standards. Assist in vulnerabilitymanagement activities by reviewing and remediating network-related findings. Maintain compliance with NHS Digital, DSP Toolkit, and Cyber Essentials Plus standards as they apply to network operations. About … configuring cyber systems and associated functionality Significant knowledge of working practices within technical/cyber security Significant experience of Cisco networking hardware Experience of LAN, WLAN troubleshooting, implementation and management Working with suppliers Defining Trust security requirements and interpreting them to system suppliers Advanced knowledge of Microsoft Office applications Person Specification Qualifications Essential Please click 'apply now' to view More ❯
Bonus : 10% of base salary upon clearance and deployment on project Experience & Skills Minimum 2 years in security analyst role Experience : Security Operations Centre (SOC) or equivalent SIEM platforms Vulnerabilitymanagement Incident response & resolution System log analysis Certifications : CompTIA or equivalent (preferred) Qualifications : Experience prioritized over formal education Please Apply/Reach Out to learn more More ❯
Bonus: 10% of base salary upon clearance and deployment on project Experience & Skills Minimum 2 years in security analyst role Experience: Security Operations Centre (SOC) or equivalent SIEM platforms Vulnerabilitymanagement Incident response & resolution System log analysis Certifications: CompTIA or equivalent (preferred) Qualifications: Experience prioritized over formal education Please Apply/Reach Out to learn more More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid/Remote Options
Avanti
locations, including switches, firewalls, and wireless • Monitor performance and availability, responding to issues rapidly • Support backups, disaster recovery planning, and security initiatives • Produce and maintain technical documentation • Contribute to vulnerabilitymanagement and security enhancements Key Skills and Experience • Strong experience with Palo Alto firewalls (deployment and configuration essential) • Solid understanding of networking protocols, routers, switches, and firewalls • Experience More ❯
to Have RHCSA (or higher). CCNA certification. Experience with monitoring tools and configuration management. Exposure to Git, CI/CD pipelines, VMware or KVM. Knowledge of hardening and vulnerability management. What’s on Offer Competitive salary Pension scheme Long service awards Employee discount Cycle-to-work scheme If this job is for you, apply now More ❯
MoD) and other regulatory bodies to demonstrate compliance with stringent security and airworthiness standards.Key Responsibilities* Lead product-level cybersecurity assessments for UAV platforms, avionics, and embedded payload systems.* Conduct vulnerability analysis and assurance activities across software, firmware, and communication interfaces.* Develop and maintain product security architectures, ensuring compliance with secure-by-design principles and recognised standards.* Support and participate … Secure Development Lifecycle (SDL) processes.* Identify and mitigate cyber threats early in the product lifecycle through threat modelling and risk analysis.* Drive continuous improvement in security testing, automation, and vulnerabilitymanagement practices.* Proficiency in one or more programming/scripting languages: C, C++, Python, or Bash, preferably in embedded or Linux environments. Modis International Ltd acts as an More ❯
and other regulatory bodies to demonstrate compliance with stringent security and airworthiness standards. Key Responsibilities * Lead product-level cybersecurity assessments for UAV platforms, avionics, and embedded payload systems. * Conduct vulnerability analysis and assurance activities across software, firmware, and communication interfaces. * Develop and maintain product security architectures, ensuring compliance with secure-by-design principles and recognised standards. * Support and participate … Secure Development Lifecycle (SDL) processes. * Identify and mitigate cyber threats early in the product lifecycle through threat modelling and risk analysis. * Drive continuous improvement in security testing, automation, and vulnerabilitymanagement practices. * Proficiency in one or more programming/scripting languages: C, C++, Python, or Bash, preferably in embedded or Linux environments. Modis International Ltd acts as an More ❯
Attack Path analysis; IT and Infrastructure experience (Windows Server and/or Red Hat Linux); development of monitoring use cases; collaboration and remediation engagement 3+ years of experience in vulnerabilitymanagement or compliance monitoring Experience in design and implementation of security technologi Experience with IT controls monitoring for regulatory and compliance requirements Experience with visualization tools In-depth More ❯