Governance (ideally in an Agile context) A strong technical background with demonstrable expertise in at least one of AWS, GCP or Azure. Familiarity with cybersecurity, security architecture or closely related topics like identity and access management, or offensive security engineering An understanding of the end to end technology delivery life more »
of our key projects include support to various submarine programmes, adaptive camouflage for the British Army, Architectural support on Typhoon and F-35 platforms, cybersecurity support to EW systems. Our customers benefit from lean delivery of agile projects, utilising best practices developed across a range of industries. The Role more »
Coleshill, England, United Kingdom Hybrid / WFH Options
Mercury
you will also play a part in. Systems and Security Oversight: Administer critical system tasks, including user account management and access control. Implement robust cybersecurity protocols to safeguard digital assets using firewalls, antivirus, and encryption. Technical Support and Troubleshooting: Deliver prompt IT support to resolve employee technical issues, ensuring minimal more »
the South, predominantly within Sussex Familiarity with industry standards and best practices, such as ITIL, ISO Microsoft technologies: 365, Azure, Windows, AD, Server OS Cybersecurity: firewalls, web filters, advanced protection and recovery Cloud technologies Desirable qualifications: Microsoft Certified – 365, Azure, Windows, Server CompTIA – A+, Security+, Network+ Cisco Certified – CCNA more »
events A brilliant breakout room with free breakfast and a pool table Join a Trusted Partner for Transformative Managed Technology Experts in Managed IT, CyberSecurity and Communications solutions, Tailor Made Technologies (TMT) is on a mission to help small and medium-sized enterprises leverage business technology to achieve their more »
and software issues. Assist in the setup and maintenance of network infrastructure, including routers, switches, and firewalls. Aid in the implementation and management of cybersecurity measures, including antivirus software and firewalls. Assist in the documentation of IT procedures, processes, system configurations and administrative tasks. Collaborate with team members on IT more »
the assessment, parsing, onboarding of log sources, and use case and rule development. What we’re looking for: Level 3 SOC Analyst/Senior CyberSecurity and security operations experience Microsoft MDE, MDI, Sentinel, Lighthouse and DevOps experience Experience of onboarding, tuning, reporting, and configuring SIEM solutions Experience of threat … Testing and/or Security Monitoring Understanding of networking and infrastructure design Knowledge/experience of one or more System administration (Linux, Windows, Mac) Cybersecurity degree or equivalent experience Always remaining updated on new threats and developing security standards Excellent interpersonal skills with the ability to explain technical problems … SC clearance Preferred Qualification: SANS Certification Experience with NIST assurance/EDR IT Certifications, including Network+, Security+ Protective Monitoring/SOC Certifications, including CySA+ CyberSecurity Certifications, including CISMP, CISSP Experience with various Microsoft Technologies, including Microsoft Defender for Endpoint, Identity and Cloud Experience with SIEM platforms, including IBM QRadar more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
SDL Solutions Limited
networking across LANs and WANs Knowledge of SIEM solutions Any knowledge of Azure Security principles Ideally experience with Microsoft Defender stack Knowledge of essential cybersecurity principles and practices Excellent communication, stakeholder management, and collaboration skills Information Management Standards for ISO27001, Cyber Essentials+, and AAF 1/20 certification and accreditations more »
Job Overview: Join a dynamic and high-performing team as a Senior Analyst in Vulnerability Management & Security Testing. This role offers the unique opportunity to enhance a best-in-class Threat Defence capability and make significant contributions to our securitymore »
Role Overview This is a golden chance to demonstrate your technical skills and establish yourself within a leading Microsoft Gold Partner. They have been helping big names secure their businesses efficiently since the turn of the century, and now they more »
OT CyberSecurity Consultant Remote working Main Activities deploy, and oversee CyberSecurity Management Systems (CSMS) aligned with the ISA 62443-2-1 standard customised for client-specific industrial automation and control system requirements. clients through compliance with regulatory standards such as the NIS Regulations, ensuring all activities adhere to … gas and electricity), OFWAT (water), HSE (oil and gas operations), ONR (nuclear), and ORR (Office of Rail and Road) for rail, ensuring adherence to cybersecurity and operational technology standards within the water, gas, oil, nuclear, energy, and rail sectors. clients in transitioning to or implementing frameworks like ISA …/IEC 62443 Cybersecurity Risk Assessment Specialist, ISA/IEC 62443 Cybersecurity Design Specialist, ISA/IEC 62443 Cybersecurity Maintenance Specialist, SANS Global Industrial CyberSecurity Professional (GICSP), and Certified SCADA Security Architect (CSSA). (Role holders without certification need to have significant experience with Operational Technology CyberSecurity (5+ more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Maxwell Bond®
essential that you are able to obtain security clearance or currently hold security clearance. Responsibilities: Demonstrate extensive Information Security knowledge. Facilitate customer workshops for cybersecurity strategy development. Deliver Information Risk Management services to large organizations. Define controls for mitigating information risks in complex programs and projects. Understand vulnerabilities in modern more »
Greater London, England, United Kingdom Hybrid / WFH Options
Oliver Bernard
product focused business units to improve our security posture for new and existing products and ways of working. Requirements: Proven knowledge of information and cybersecurity engineering Great experience with PCI DSS. Good SIEM knowledge (Splunk is ideal) Great understanding of logs and log events across Linux, Windows, AWS, AV more »
South East London, England, United Kingdom Hybrid / WFH Options
Oliver Bernard
and product focused business units to improve our security posture for new and existing products and ways of working.Requirements:Proven knowledge of information and cybersecurity engineeringGreat experience with PCI DSS.Good SIEM knowledge (Splunk is ideal)Great understanding of logs and log events across Linux, Windows, AWS, AV and Vulnerability more »
using available technology to understand the areas that require staff to be trained in Designing and releasing eLearning modules for all staff, Participating in CyberSecurity Awareness month and organising educational activities. Writing global communications. Working with IT and the business to deliver key certifications and meet ever-changing regulations. more »
and access rights as directed by change requests from the Service Desk and in line with the Network Security Policy. Manage and support ISO, CyberSecurity Essentials and other accreditations aligned with security objectives. Experience and Skills 5+ years Desktop, Networking, Server or application support experience. Ability to communicate and more »
technology or security (TOGAF, SABSA, SANS Architecture, Microsoft/Azure Architecture, British Computer Society Diploma)Relevant certifications (CISSP, CISM, CRISK, CGEIT)Computer Science or CyberSecurity DegreeAs a Principal Security Architect, you will have the opportunity to work with a talented team of security professionals, collaborating with various technology teams more »
are seeking an experienced engineer in product security to join our team. The ideal candidate will have experience in multiple aspects of physical and cybersecurity across air platforms through life. This includes secure by design functions including Missile Technology Control Regime (MTCR) Regulations. Knowledge of Security Management Systems with more »
regulatory requirements. Requirements: • Extensive experience in Information Security leadership roles, with a track record of building and maturing security programs. • In-depth knowledge of cybersecurity principles, technologies, and best practices, including risk management frameworks and regulatory requirements. • Strong understanding of industry standards such as ISO 27001, SOC2, NIST frameworks • Excellent more »
documentation.Address employee inquiries and issues promptly and effectively.Requirements:Bachelor's degree preferred.Proficiency in MS Office applications, particularly Excel and PowerPoint.2+ years of experience in cybersecurity, information risk management, or related fields.Familiarity with security compliance tools such as SailPoint, Tenable, and Microsoft Security Suite.Experience evaluating controls over IT processes.Knowledge of securitymore »
documentation.Address employee inquiries and issues promptly and effectively.Requirements:Bachelor's degree preferred.Proficiency in MS Office applications, particularly Excel and PowerPoint.2+ years of experience in cybersecurity, information risk management, or related fields.Familiarity with security compliance tools such as SailPoint, Tenable, and Microsoft Security Suite.Experience evaluating controls over IT processes.Knowledge of securitymore »
Debug production issues across services and levels of the stack. - Plan the growth of the infrastructure as the business scales. Qualifications: - Strong passion for cybersecurity and protecting cloud-based assets in a Financial Services environment. - Proactive mindset in identifying and addressing potential security risks. - Keen attention to detail and ability more »
engineering attack methodologies. Working knowledge of CobaltStrike. Experience with bug bounty programs and vulnerability disclosure policies. Education, Training, and Experience: Bachelor's degree in Cybersecurity/Computer Science is preferred. A minimum of 3-5 years of hands-on testing experience. Ideally, hold two or more of the following more »
requirements and policies to stakeholders at a variety of levels in this role Identity & Access Management processes, governance, metrics, and control A background in Cybersecurity or Information Security with an interest in moving into the Identity & Access Management space. InfoSec frameworks and best practice such as NIST, ISO27001 and PCI more »
technology for aviation, ports, borders, defense, and security across 55 countries around the globe Job Purpose: We are seeking an experienced Head of Product CyberSecurity to join our team. This role is pivotal in developing, sustaining, and enhancing our cybersecurity architecture across all products and digital applications. In … this role, you will be responsible for developing and implementing a comprehensive cybersecurity roadmap, leading cross-cultural teams, and ensuring the protection of our software products from potential threats while effectively managing various stakeholders. The role also requires engagement with third party providers of cybersecurity, software, and hardware … products developed for our hardware. Conduct in-depth security assessments, penetration testing, and vulnerability assessments. Drive the development of secure coding practices and guidelines. CyberSecurity Leadership: Provide strategic vision and technical leadership for product cybersecurity initiatives across the organization. Collaborate with senior management to establish product cybersecuritymore »