years' experience in cybersecurity operations, ideally within a SOC or incident response environment. Proven expertise with QRadar (key focus), Splunk, or Microsoft Sentinel. Strong grasp of network traffic analysis, vulnerabilitymanagement, and ethical hacking techniques. Solid understanding of DFIR principles and evidence handling. Knowledge of ITIL processes - Incident, Problem, and Change Management. Comfortable working autonomously in a More ❯
the end-to-end journey. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at More ❯
such as antivirus, content filtering, firewalls, and intrusion detection systems. *Proficiency in Microsoft Azure and associated cloud security services. *Familiarity with Windows and Linux operating systems. *Experience with log management and security monitoring platforms. *Critical thinking and problem-solving skills in complex technical environments. *Knowledge of ITIL practices and security compliance standards. *Must have access to own transport. *Willingness … Computer Science, Cybersecurity, or a related field. *Postgraduate qualification in an IT-related subject. *Professional certifications such as CISSP, CompTIA Security+, or equivalent. *Experience with governance frameworks and risk management tools. Key Responsibilities *Operate and maintain security systems including firewalls, antivirus, intrusion detection/prevention, and authentication platforms. *Monitor system logs and network traffic to identify suspicious activity and … potential threats. *Respond to security incidents and support forensic investigations. *Develop and maintain security protocols, policies, and procedures. *Conduct vulnerability assessments and recommend mitigation strategies. *Deliver cybersecurity awareness training and guidance to staff. *Maintain the information security risk register and support audit processes. *Collaborate with IT and operational teams to ensure secure system configurations. *Assist in compliance with frameworks More ❯
Birmingham, West Midlands, England, United Kingdom
Proactive Appointments
s hybrid infrastructure, spanning both on-premise and cloud environments. This role is ideal for a hands-on technical professional with a strong background in network and system security, vulnerability remediation, and endpoint protection using Microsoft Intune . Key Responsibilities Support and secure network infrastructure across cloud and on-prem environments . Strengthen Windows Server and network security configurations. … Lead efforts in vulnerabilitymanagement and remediation , working closely with IT and security teams. Implement and maintain endpoint hardening policies through Microsoft Intune . Monitor and respond to network security events and incidents. Contribute to the continuous improvement of security posture, compliance, and best practices. Collaborate with internal teams to support ongoing infrastructure and security projects. Key Skills … environments. Strong understanding of network infrastructure (switching, routing, firewalls, VPNs). Experience securing Windows Server environments. Proficiency in network security principles , firewalls, and access control. Hands-on experience with vulnerability remediation tools and processes. Strong knowledge of endpoint hardening and management via Microsoft Intune . Familiarity with cloud networking and security (Azure, AWS, or equivalent) is desirable. Excellent More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Joblogic Service Management Software
CTO) or Leadership Team Hours & Place of Work- Birmingham, UK (with international remit: UK, Pakistan, Vietnam) Company Overview Established in 1998, Joblogic is the UK’s #1 Field Service Management (FSM) software. With offices in the UK, Pakistan, and Vietnam and a team of over 400 people, we’ve been empowering service businesses for more than two decades. While … role ensures the protection of company, customer, and employee data across global operations, while enabling business growth and innovation. The SISL will build and mature Joblogic’s Information Security Management System (ISMS), maintain certifications such as ISO/IEC 27001:2022 certification and Cyber Essentials Plus, ensure compliance with UK GDPR and international regulations, and strengthen Joblogic’s resilience … . Oversee secure international data transfers, ensuring lawful mechanisms (e.g. SCCs). 4. Operational Security Implement and monitor technical and organisational controls across UK, Pakistan, and Vietnam operations. Lead vulnerabilitymanagement, endpoint protection, DLP, identity & access management, and secure coding practices. Establish metrics, dashboards, and KPIs for ISMS and privacy programme performance. Drive security monitoring, detection, and More ❯
Birmingham, West Midlands, England, United Kingdom
Proactive Appointments
s hybrid infrastructure, spanning both on-premise and cloud environments. This role is ideal for a hands-on technical professional with a strong background in network and system security, vulnerability remediation, and endpoint protection using Microsoft Intune . Key Responsibilities Support and secure network infrastructure across cloud and on-prem environments . Hands on experience of Network & Security design … and implementation Strengthen Windows Server and network security configurations. Lead efforts in vulnerabilitymanagement and remediation , working closely with IT and security teams. Implement and maintain endpoint hardening policies through Microsoft Intune . Monitor and respond to network security events and incidents. Contribute to the continuous improvement of security posture, compliance, and best practices. Collaborate with internal teams … environments. Strong understanding of network infrastructure (switching, routing, firewalls, VPNs). Experience securing Windows Server environments. Proficiency in network security principles , firewalls, and access control. Hands-on experience with vulnerability remediation tools and processes. Strong knowledge of endpoint hardening and management via Microsoft Intune . Familiarity with cloud networking and security (Azure, AWS, or equivalent) is desirable. Excellent More ❯
Defender for Cloud. Guide project teams on remediation steps and ensure alignment with security best practices. Support WebOps activities including deployment and configuration of SIEM and CNAPP tools. Oversee vulnerabilitymanagement processes and ensure timely remediation. Manage and maintain LogicMonitor for cloud platform monitoring Create and update logicmodules Configure alert rules and escalation chains Manage ServiceNow integration for … Deploy and manage Workbooks Configure Azure Policies for security posture Implement regulatory compliance templates Hands-on experience with LogicMonitor and ServiceNow integrations Proven ability to lead incident response and vulnerability remediation efforts Nice-to-Have Skills Familiarity with multi-cloud environments (AWS, GCP) Experience in coordinating ITHC assessments and managing audit findings Knowledge of cloud architecture patterns and security … frameworks Strong communication and stakeholder management skills We Care About Our Employees' Happiness By providing 25 days of Annual leave + an option to purchase more through our Flexible Benefits. Flex benefits system – exciting opportunity to choose your own benefits. Retail discounts. Pension - matching contribution up to 10%. Private Medical Scheme. Life Assurance. Opportunities to learn in Atos More ❯
the implementation and monitoring of cyber security best practices across the business. Administer security tools, including , multi-factor authentication (MFA), mail filtering and Anti-Virus software . Participate in vulnerabilitymanagement, incident response coordination, and system security reviews. Help maintain system documentation, asset registers, and compliance records in line with IT policies and data protection regulations. Project Support … and ongoing system enhancements. Process & Documentation Maintain up-to-date documentation of IT systems, configurations, procedures, and security protocols. Support the continuous improvement of IT operational processes and incident management workflows. Skills & Experience Required Proven experience in a Systems Analyst, IT Support Analyst, or Desktop Support role, ideally within a retail, luxury, or manufacturing business environment. Strong hands-on … experience supporting Microsoft 365 environments (essential) — including Exchange, Entra, SharePoint, Teams, OneDrive. Solid understanding of cyber security fundamentals — including access management, endpoint protection, MFA, secure cloud configuration, and vulnerability management. Exposure to, and understanding of compliance standards such as PCI and GDPR Experience supporting Windows 10/11, Active Directory, Mac OS, iOS, Print and network technology . More ❯
Defender, CrowdStrike, Elastic). Expertise in building and tuning detection rules, dashboards, and automation playbooks. Proficiency in scripting or automation (KQL, PowerShell, Python, or similar). Knowledge of log management, APIs, data normalisation, and cloud security (Azure, AWS, or M365). Solid understanding of network, system, and identity security fundamentals. Excellent problem-solving skills and a passion for continuous … Cortex XSOAR, Splunk SOAR). Knowledge of MITRE ATT&CK mapping and detection engineering frameworks. Infrastructure-as-Code experience (Terraform, Bicep, or ARM templates). Exposure to threat hunting, vulnerabilitymanagement, or integrations with ServiceNow/ITSM tools. Services offered by Computappoint Limited are those of an Employment Business and/or Employment Agency in relation to this More ❯
Defender, CrowdStrike, Elastic). Expertise in building and tuning detection rules, dashboards, and automation playbooks. Proficiency in scripting or automation (KQL, PowerShell, Python, or similar). Knowledge of log management, APIs, data normalisation, and cloud security (Azure, AWS, or M365). Solid understanding of network, system, and identity security fundamentals. Excellent problem-solving skills and a passion for continuous … Cortex XSOAR, Splunk SOAR). Knowledge of MITRE ATT&CK mapping and detection engineering frameworks. Infrastructure-as-Code experience (Terraform, Bicep, or ARM templates). Exposure to threat hunting, vulnerabilitymanagement, or integrations with ServiceNow/ITSM tools. Services offered by Computappoint Limited are those of an Employment Business and/or Employment Agency in relation to this More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
respond to Cyber Security Incidents Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others. Run Vulnerability Assessment tools to measure compliance with security updates and security patches. Member of a Team who are responsible for making multiple daily CSOC checks to detect and respond to … XDR and Microsoft Defender variants, and Elastic Security, or displays aptitude to learn how to work with a SIEM. Experience and knowledge of SIEM tools, Cyber Security Incident Response, VulnerabilityManagement and Cyber Threat Intelligence. Experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at More ❯
payments security. Your Day-to-Day Alert Triage: Analyze SIEM and threat-intelligence feeds to spot anomalies. Threat Hunting: Use forensic tools to track indicators of compromise across networks. VulnerabilityManagement: Run scans, prioritize remediation tasks, and validate fixes. Incident Response Support: Coordinate with SRE and DevOps teams to contain breaches. Report & Recommend: Draft concise, actionable incident summaries More ❯
Employment Type: Full-Time
Salary: £36,000 - £43,000 per annum, Negotiable, OTE
Birmingham, West Midlands, England, United Kingdom
Robert Walters
Robert Walters is working in partnership with a leading financial services business. They specialise in providing experts services across pensions, wealth management and financial planning across both personal and commercial services. In addition, they offer tailored services across retirement, tax and estate planning. They are considered market leaders in providing customer and client-centric services, operating across multiple locations. … with hands-on expertise across critical systems. Information Security Manager: Duties Experience of business acquisitions - Highly desirable Develop/Maintain enterprise InfoSec strategy aligned business goals Oversee security architecture, vulnerabilitymanagement, incident response and threat intelligence Lead security risk assessments and manage remediation plans for gaps Financial regulation compliance - GDRP, PCI DSS, SOX, FCA Establish security policies, standards … Manager: Experience Experience within a financial services environment - Highly desirable Manage security for cloud-first environments - AWS, Azure, Google Cloud Implement SOC & Automated security monitoring Lead third-party risk management & vendor security programmes Experience of DevSecOps practises and SDLC Design/Implement security frameworks - ISO 27001, NIST Hands-on experience of SIEM, DLP, IAM, Endpoint Technology The permanent opportunity More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Acumin
architectures in hybrid and cloud (AWS/Azure) environments. Strong hands-on expertise with enterprise security platforms - including Endpoint Protection, Cloud Security, Network Security, DevSecOps, SIEM/SOAR, and vulnerability management. Deep understanding of secure design principles, IAM, encryption, API security, and application security. Experience performing threat modelling, security risk assessments, and control design validation. In-depth knowledge of More ❯
architectures in hybrid and cloud (AWS/Azure) environments. Strong hands-on expertise with enterprise security platforms - including Endpoint Protection, Cloud Security, Network Security, DevSecOps, SIEM/SOAR, and vulnerability management. Deep understanding of secure design principles, IAM, encryption, API security, and application security. Experience performing threat modelling, security risk assessments, and control design validation. In-depth knowledge of More ❯
Bedminster, Bristol, Avon, England, United Kingdom
QA
s mission is to help businesses protect their data, enhance productivity, and achieve compliance through its comprehensive Protect & Grow managed IT plans. Services include Microsoft 365 and Google Workspace management, device security, vulnerabilitymanagement, AI-enhanced email security, and disaster recovery planning. With a reputation for clear, jargon-free communication and strong client relationships, Dial A Geek More ❯
milton keynes, south east england, united kingdom Hybrid / WFH Options
MIB
and reputation while leading with purpose—this is your opportunity to make a lasting impact. Key responsibilities Security Operations Oversight Oversee daily security operations, including monitoring, threat analysis, and vulnerabilitymanagement, with regular oversight by and reporting to the Head of Information Security and Executive Security Steering Group Compliance and Risk Management Working with Group Privacy Office … of strategic security plans to enhance MIB’s security posture and resilience Operational Resilience Identify within Security Operations and support the business on our Operational Resilience efforts Incident Response Management : Lead and coordinate from a Security perspective incident response efforts, ensuring timely and effective resolution of security incidents Budget Management The Security Operations Manager will play a crucial … role in supporting the Head of Information Security to effectively manage the security budget. This includes resources management, identifying cost-saving opportunities, managing vendor relationships, aligned with MIB’s long-term security goals Skills and Experience Proven experience in leading, managing, and developing Security Operations and Security Engineering teams. This includes the ability to mentor and guide team members More ❯
of cyber security within one of the UK's most dynamic digital infrastructure organisations? We're looking for an Information Security Manager to own and evolve our Information Security Management System (ISMS) and drive alignment with ISO 27001:2022 . This is your chance to combine strategic influence with hands on impact - protecting critical assets, leading transformation, and championing … a security first culture across the business. You'll collaborate closely with teams across IT, Legal, Procurement, and Operations , acting as the go to expert for information assurance, incident management, and regulatory compliance . What You'll Be Doing Lead and continuously improve our ISMS Manage ISO 27001 certification, surveillance audits, and compliance activities Oversee cyber risk management … an enterprise ISMS and leading ISO 27001 audits Strong understanding of cyber threats and cloud security (Azure/M365) Sound knowledge of GDPR and relevant regulatory frameworks Experience in vulnerabilitymanagement, penetration testing, and supplier assurance Excellent communication skills with the ability to influence and engage stakeholders Confident leading governance forums and promoting a security first mindset Familiarity More ❯
You’ll Do Lead and investigate high-impact cyber security incidents across global customer environments. Proactively hunt for threats, triage alerts, and identify anomalous behaviours before they escalate. Manage vulnerability assessments end-to-end, driving remediation outcomes with customers and internal teams. Optimise the Microsoft Security Stack: Sentinel, Defender (for Endpoint/Identity), Purview, and XDR. Support Zero Trust … build detections, correlations, and meaningful insights. Experience centralising log sources and onboarding new tools and data feeds into a SIEM/SOAR platform. Strong understanding of threat hunting methodologies, vulnerabilitymanagement, and incident response. Knowledge of frameworks: ISO27001, NIST CSF, SOC2, Cyber Essentials Plus. Comfortable adapting to unfamiliar tooling and integrating new technologies quickly. Why Join? Work at More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
it's a mission-critical role at the heart of our cyber security strategy. As Operational Security Manager, you'll take ownership of our security operations, overseeing threat intelligence, vulnerabilitymanagement, incident response and the performance of our outsourced 24/7 SOC. You'll work closely with internal technology teams to embed security into every aspect of More ❯
days in London per week What You'll Do Build the SecOps team from the ground up and manage/mentor the team. Lead the implementation, optimisation, and management of cutting-edge security tools like CrowdStrike, Palo Alto, and Mimecast. Take ownership of our cyber defence posture from incident response and vulnerabilitymanagement to WAFs, DDoS protection More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Career Legal
days in London per week* What You’ll Do Build the SecOps team from the ground up and manage/mentor the team. Lead the implementation, optimisation, and management of cutting-edge security tools like CrowdStrike, Palo Alto, and Mimecast. Take ownership of our cyber defence posture from incident response and vulnerabilitymanagement to WAFs, DDoS protection More ❯
Poole, Dorset, England, United Kingdom Hybrid / WFH Options
Mexa Solutions LTD
week in the office) Scope : Work across IT, application, cloud, and physical security, no siloed remits here Responsibility : Be the go-to person for penetration testing, compliance audits, and vulnerabilitymanagement Environment : Modern SaaS product environment, working alongside DevOps, engineering, and IT Growth : Get stuck into a wide variety of work, with support from leadership and autonomy to … make a real impact What you’ll be doing: Leading vulnerability assessments and coordinating regular penetration testing across systems and products Owning risk remediation actions, from security audits to PCI scans and compliance reporting Working across cloud (AWS), infrastructure, and software environments to ensure security best practices are embedded throughout Supporting the secure design of products and infrastructure, providing … ideally 2-3+ years), ideally across cloud and hybrid environments Strong penetration testing experience with confidence to act on the findings A solid grasp of access controls, identity management, and cloud security (especially AWS) Familiarity with secure software development practices and working alongside dev teams Understanding of key frameworks like ISO 27001, PCI-DSS, and GDPR Bonus points More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Reed
practices. You’ll work closely with IT, development, and project teams to embed security into every stage of the software development lifecycle and drive a risk-based approach to vulnerability management. Key Responsibilities Lead application security initiatives across cloud-native and enterprise environments. Promote secure design principles, threat modelling, and best practices across teams. Own and evolve the technical … vulnerabilitymanagement programme. Implement and support security controls, particularly within Azure cloud environments. Evaluate and deploy best-in-class application security tools. Mentor teams and deliver tailored security awareness programmes. Assist with incident response, security training, and supplier/client security assessments. What We’re Looking For Essential Skills & Experience: Proven experience in application security engineering. Strong knowledge More ❯