is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
background required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK … of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR … in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. Experience More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
bet365
Who we are looking for An Information Security Analyst, who will work within our vulnerabilitymanagement team, which focuses on the technical side, ensuring IT systems are operated in a secure manner. The Information Security department monitor our live operation, creating and reacting to alerts and other anomalies … identified through automated tools or manual analysis. The vulnerabilitymanagement (VM) function covers two high-level areas, including owning the processes and schedules relating to the vulnerability scanning of all endpoints in the Business. You will review the results in terms of risk and impact assessment, additionally … you will own the scheduling of, and planning for specialist third-party vulnerability and penetration testing, in addition to the collation of reports. Liaising with parts of the Business, will aid your understanding of the risk profile then advice on options to resolve any issues identified. You will work More ❯
Manchester OR Hertfordshire - Hybrid, Manchester, England Hybrid / WFH Options
InfraView
leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a "people manager" as well … business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerabilitymanagement, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and … SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerabilitymanagement tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and controls … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory … a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. More ❯
Leigh, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium
to the London Office when needed. PAYE/umbrella option/Inside IR35. Investigate and resolve complex and high-priority incidents. Communicate to senior management on risk management concepts, as well as specific project risks and risk mitigation options/scenarios. Manage a portfolio of applications and projects … the business and IT. Ensure Information Security policies and procedures are up to date, relevant and adhered to, including security and technical standards. Perform vulnerability testing, risk analysis, and security architecture assessments. Relates well to constraints experienced by business partners and finds practical, win-win solutions. Analyzes customer needs … knowledge of secure development practices and standards such as OWASP and MITRE especially on cloud providers Excellent written and verbal communication skills with Stakeholder management and interpersonal skills at both a technical and non-technical level as well as at various levels of seniority. Identifying the need for new More ❯
Altrincham, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium
to the London Office when needed. PAYE/umbrella option/Inside IR35. Investigate and resolve complex and high-priority incidents. Communicate to senior management on risk management concepts, as well as specific project risks and risk mitigation options/scenarios. Manage a portfolio of applications and projects … the business and IT. Ensure Information Security policies and procedures are up to date, relevant and adhered to, including security and technical standards. Perform vulnerability testing, risk analysis, and security architecture assessments. Relates well to constraints experienced by business partners and finds practical, win-win solutions. Analyzes customer needs … knowledge of secure development practices and standards such as OWASP and MITRE especially on cloud providers Excellent written and verbal communication skills with Stakeholder management and interpersonal skills at both a technical and non-technical level as well as at various levels of seniority. Identifying the need for new More ❯
Bury, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium
to the London Office when needed. PAYE/umbrella option/Inside IR35. Investigate and resolve complex and high-priority incidents. Communicate to senior management on risk management concepts, as well as specific project risks and risk mitigation options/scenarios. Manage a portfolio of applications and projects … the business and IT. Ensure Information Security policies and procedures are up to date, relevant and adhered to, including security and technical standards. Perform vulnerability testing, risk analysis, and security architecture assessments. Relates well to constraints experienced by business partners and finds practical, win-win solutions. Analyzes customer needs … knowledge of secure development practices and standards such as OWASP and MITRE especially on cloud providers Excellent written and verbal communication skills with Stakeholder management and interpersonal skills at both a technical and non-technical level as well as at various levels of seniority. Identifying the need for new More ❯
Bolton, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium
to the London Office when needed. PAYE/umbrella option/Inside IR35. Investigate and resolve complex and high-priority incidents. Communicate to senior management on risk management concepts, as well as specific project risks and risk mitigation options/scenarios. Manage a portfolio of applications and projects … the business and IT. Ensure Information Security policies and procedures are up to date, relevant and adhered to, including security and technical standards. Perform vulnerability testing, risk analysis, and security architecture assessments. Relates well to constraints experienced by business partners and finds practical, win-win solutions. Analyzes customer needs … knowledge of secure development practices and standards such as OWASP and MITRE especially on cloud providers Excellent written and verbal communication skills with Stakeholder management and interpersonal skills at both a technical and non-technical level as well as at various levels of seniority. Identifying the need for new More ❯
Ashton-Under-Lyne, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium
to the London Office when needed. PAYE/umbrella option/Inside IR35. Investigate and resolve complex and high-priority incidents. Communicate to senior management on risk management concepts, as well as specific project risks and risk mitigation options/scenarios. Manage a portfolio of applications and projects … the business and IT. Ensure Information Security policies and procedures are up to date, relevant and adhered to, including security and technical standards. Perform vulnerability testing, risk analysis, and security architecture assessments. Relates well to constraints experienced by business partners and finds practical, win-win solutions. Analyzes customer needs … knowledge of secure development practices and standards such as OWASP and MITRE especially on cloud providers Excellent written and verbal communication skills with Stakeholder management and interpersonal skills at both a technical and non-technical level as well as at various levels of seniority. Identifying the need for new More ❯
Act as a key liaison between internal stakeholders, managed service providers, and external vendors to ensure operational continuity and alignment with business objectives. Infrastructure Management Oversee the day-to-day performance and availability of core infrastructure systems, including networks, servers, storage, and cloud services. Monitor infrastructure platforms proactively to … units. Service Operations & Technical Support Provide third-line support across infrastructure layers, supporting internal users and IT service desk teams. Maintain and enforce access management protocols for infrastructure components and enterprise applications. Lead incident resolution efforts involving infrastructure systems, ensuring timely escalation to third-party experts when required. Vendor … enhance Microsoft 365 security posture across the organization. Manage the configuration and policy enforcement of Microsoft Intune, including compliance and device security baselines. Oversee vulnerabilitymanagement and endpoint patching activities in partnership with external security consultancies. Administer firewall configurations and ensure consistent deployment across all locations and platforms. More ❯
Lead the development and maintenance of information security policies, standards and procedures in line with regulatory frameworks and industry standards. Lead third party risk management processes. Collaborate across all areas of the business to align security policies and processes with business objectives and regulatory obligations. Work with Security Operations … and IT teams to provide oversight of vulnerability assessments and remediation activities. Lead on security architecture reviews for new systems and services. Evaluate technical security controls and recommending improvements. Support the implementation of security tools and technologies. Provide oversight of the security incident management process. Provide security metrics … Ability to manage risk and compliance projects and drive security initiatives. Knowledge of information security frameworks such as ISO 27001 or NIST. Knowledge of vulnerabilitymanagement processes. About Acorn Insurance With over 40 years of experience, Acorn Insurance is a specialist provider dedicated to helping individuals secure motor More ❯
technologies (firewalls, IDS/IPS, SIEM, etc.). Experience with security tools such as SIEM/SOAR platforms, endpoint detection and response (EDR) solutions, vulnerabilitymanagement, detection and response/remediation (VMDR) solutions and threat intelligence platforms. Knowledge of security standards and frameworks (e.g., NIST, CIS Controls, ISO More ❯
services, such as Active Directory and Windows Server environments. Hands-on experience of common security controls, such as IDS, Web content filters, AV, SIEM, VulnerabilityManagement, and awareness of their purpose in a layered security approach. Demonstrable experience of Azure security solutions. Experience and understanding of the ITIL More ❯
for this role. We're on the hunt for a motivated, engaged Security Operations Analyst to support, maintain and improve/contribute to the management of real time security operations, including real time analysis and ongoing security management across Vix's application suite. This opportunity will suit someone … judgment when working with sensitive information Experience with application/device security monitoring (i.e., Firewalls, IDS/IPS, Anti-Virus) Experience with SIEM tools & VulnerabilityManagement (AlienVault, Nessus, Qualys) Demonstrated ability to work as part of a team to deliver project outcomes within specified parameters including timeframes and More ❯
a security operations/information security analyst within an AWS environment Strong CrowdStrike experience is preferred Experience with a range of SIEM, SOAR and vulnerabilitymanagement tools Experience advising on security best practices and developing SOC playbooks Networking and infrastructure experience, including with Firewalls and IDS/IPS More ❯
compliance Establish and enforce IT security policies and procedures Ensure compliance with relevant regulations, such as GDPR and PCI DSS Oversee security operations, including vulnerabilitymanagement and incident response What are we looking for? Senior-level IT leadership experience, including team management and strategic oversight. Deep hands More ❯
compliance Establish and enforce IT security policies and procedures Ensure compliance with relevant regulations, such as GDPR and PCI DSS Oversee security operations, including vulnerabilitymanagement and incident response What are we looking for? Senior-level IT leadership experience, including team management and strategic oversight. Deep hands More ❯
compliance Establish and enforce IT security policies and procedures Ensure compliance with relevant regulations, such as GDPR and PCI DSS Oversee security operations, including vulnerabilitymanagement and incident response What are we looking for? Senior-level IT leadership experience, including team management and strategic oversight. Deep hands More ❯
Employment Type: Permanent
Salary: £80000 - £85000/annum discretionary bonus and more
the OT environment. Incident Response: Developing and implementing incident response plans for handling cyber incidents in OT environments, including containment, eradication, and recovery procedures. VulnerabilityManagement: Acknowledging and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Collaboration: Collaborating with IT and Generation Engineering … and problem-solving skills including root-cause analysis with the ability to manage multiple activities at pace. You’ll have strong communication and stakeholder management skills, both verbal and written, with the ability to lead small projects, work with complexity and think outside the box. Rewards and benefits As More ❯
experience as a SOC/Security Engineer within a cloud environment Strong CrowdStrike experience is needed Experience with a range of SIEM, SOAR and vulnerabilitymanagement tools Experience advising on security best practices and developing SOC playbooks Networking and infrastructure experience, including with Firewalls and IDS/IPS More ❯
aligned with industry best practice and regulatory standards. Take the lead on third-party risk assessments and security audits. Collaborate with technical teams on vulnerabilitymanagement and remediation planning. Provide input on secure design and architecture of new systems and solutions. Monitor and enhance security tooling and incident More ❯
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
FORT
this includes End-user computing, networks and in Hosting. Strong cloud experience in particualr with Azure, Azure Sentinel In depth experience with Security Monitoring, VulnerabilityManagement tooling, Active directory and Group Policy. Experience across Proxy/DLP systems, SIEM tools, M365, Firewalling, Proxy Servers etc would be beneficial. … a senior level with team & people leadership skills evident - there may be elements of helping to drive change in the division so solid stakeholder management skills would be helpful for success in this role. The Benefits? (Skinny) 25 days holiday Range of insurance products Comprehensive discount package across health More ❯