safeguard the organisation's information and technology systems. As the Information Security Manager , you will be responsible for overseeing the organisation's information security management system (ISMS). Your primary focus will be on managing the delivery of, and improving, security policies, practices, and standards to protect our company … mitigate potential vulnerabilities. The Information Security Manager will perform fundamental security and data protection tasks. You will conduct security and data protection assessments, supporting vulnerabilitymanagement, reviewing security configurations, and contributing to the development of security and data protection policies. The ideal candidate is eager to learn and … posture of our systems and infrastructure Work collaboratively with other departments to ensure the alignment of security efforts with wider business objectives 2. Risk Management: Identify and assess information security risks Provide recommendations for mitigating and managing risks effectively Security system management, administration and reporting; Provide advice and More ❯
regular performance reviews and data audits of deployed models, tracking model drift and identifying opportunities for optimisation to enhance performance and reliability. Security and VulnerabilityManagement: Participate in threat modelling to identify and assess potential security risks throughout the ML lifecycle. Implement and maintain vulnerabilitymanagement … Infrastructure: Experience with cloud platforms (AWS, Azure, or GCP) and managing cloud-based ML workflows and resources at scale. Experience with Threat Modelling and VulnerabilityManagement: Proven ability to conduct threat modelling exercises to identify security risks. Experience in Security and Compliance: Demonstrated experience working within secure, high … that is making a difference in society. A supportive and collaborative environment. As well as this, we offer: Development: access to LinkedIn Learning, a management development programme and training. Wellness: 24/7 Confidential employee assistance programme. Time off: 25 days of annual leave a year, plus bank holidays More ❯
Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Searchability (UK) Ltd
infrastructure operations in a dynamic environment Hybrid working available (2 days onsite in Rugby) Salary £120,000 - £130,000 Opportunity to drive governance, risk management, and service excellence. ABOUT THE CLIENT Our client is a leading organisation that places cybersecurity and infrastructure at the core of its operations. Their … cybersecurity tools, enforce ITIL processes, drive governance, and mitigate risks. Your role will involve working closely with stakeholders to enhance security resilience, oversee incident management, and ensure SLAs are met while continuously improving service delivery frameworks. SERVICE DELIVERY SKILLS: Strong experience in cybersecurity and IT infrastructure roles. Strong background … and infrastructure operations Expertise in ITIL frameworks , including Incident, Change, and Problem Management. Hands-on experience with SIEM, IAM/PAM, Endpoint Security, Firewalls, VulnerabilityManagement, Encryption, and Cloud/On-Prem security solutions . Proven track record in risk management, SLA monitoring, and operational governance . More ❯
safeguard the organisation's information and technology systems. As the Information Security Manager , you will be responsible for overseeing the organisation’s information security management system (ISMS). Your primary focus will be on managing the delivery of, and improving, security policies, practices, and standards to protect our company … mitigate potential vulnerabilities. The Information Security Manager will perform fundamental security and data protection tasks. You will conduct security and data protection assessments, supporting vulnerabilitymanagement, reviewing security configurations, and contributing to the development of security and data protection policies. The ideal candidate is eager to learn and … alignment of security efforts with wider business objectives. Identify and assess information security risks. Provide recommendations for mitigating and managing risks effectively. Security system management, administration, and reporting. Provide advice and guidance to teams on how to mitigate any identified risks. VulnerabilityManagement: Coordinate security assurance testing More ❯
Development. Container native technology and ecosystem projects e.g. OpenShift, EKS, AKS and vanilla K8s. The application of DevSecOps practices to application delivery e.g. Secrets Management, Application Security Testing, VulnerabilityManagement etc. Ability to integrate security controls into the DevSecOps lifecycle to ensure ongoing compliance with standards like … PCI DSS, etc. Technical knowledge Technical knowledge and hands-on experience in the following technologies (providing cert details where applicable): Issue and Project Management tools such as JIRA, Confluence. Hashicorp Terraform. Hashicorp Vault. SAST Security Testing such as GitLab, Checkmarx or Veracode. DAST Security Testing such as OWASP ZAP … or Veracode. SCA Security Testing such as Checkmarx, Trivy, or Veracode. IAST Security Testing such as Checkmarx. VulnerabilityManagement such as PA Prisma. QA Testing such as Selenium. Ready to make a difference? If you’re a leader in DevSecOps, with the technical know-how and the drive More ❯
/CD pipelines to streamline model deployment. Monitor and Maintain Deployed Models: Conduct regular performance reviews and data audits of deployed models. Security and VulnerabilityManagement: Participate in threat modelling to identify and assess potential security risks throughout the ML lifecycle. Troubleshoot and Resolve Issues: Proactively troubleshoot issues …/CD pipelines. Knowledge of Cloud and ML Infrastructure: Experience with cloud platforms and managing cloud-based ML workflows. Experience with Threat Modelling and VulnerabilityManagement: Proven ability to conduct threat modelling exercises. Experience in Security and Compliance: Demonstrated experience working within secure environments. Cross-Functional Collaboration Skills More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Adecco
NIST, CIS, GDPR). Conduct security risk assessments and audits to identify vulnerabilities. Provide security guidance for regulatory and legal compliance initiatives. Risk Management & Incident Response Assess and manage cybersecurity risks across business functions. Monitor and respond to security incidents, working with IT and external vendors to remediate threats. … including cloud security and DevSecOps. Evaluate and recommend security tools such as firewalls, SIEM, IDS/IPS, and endpoint protection. Conduct penetration testing and vulnerabilitymanagement assessments. Security Awareness & Training Deliver security awareness training to employees to promote best practices. Communicate security threats and mitigation strategies to non … technical stakeholders. Act as a security advocate, promoting a culture of security within the organization. Third-Party & Vendor Security Management Assess third-party security risks and ensure suppliers meet security requirements. Review and negotiate security clauses in contracts with external partners. Conduct security due diligence on new technology solutions More ❯
Stoke-On-Trent, Staffordshire, West Midlands, United Kingdom
Rapiscan Systems
Design & Documentation: Define cybersecurity design requirements and develop product security documentation for border protection and transportation security products within a standardized security framework. Risk Management: Analyze, report, and manage security-related risks, proposing further security improvements. Education & Training: Educate product design staff and stakeholders on cybersecurity impacts on product … design and support efforts. Innovative Solutions: Develop innovative solutions to secure and support networked products used in diverse settings over long periods. Vulnerability Assessment: Lead the development of product test protocols to assess vulnerabilities and recommend remediation techniques. Threat Assessment: Assess product vulnerabilities to new and emerging threats, identify … operating system and network security in physical, virtual, and cloud-based environments (AWS). Hands-On Experience: Proficiency in security systems, including endpoint security, vulnerabilitymanagement, firewalls, IDS/IPS, wireless security, authentication systems, log management, and encryption. Communication: Strong verbal and written communication skills, with the More ❯
requires the holder to actively participate in and support various IT systems and associated projects. The role is expected to work with and support management and the wider team in improving and enhancing key systems and processes. As SRE you will be a subject-matter expert leading by example … monitoring and event tools to support stabilization & lifecycle. Develops in depth knowledge of supported systems and applications and transfers knowledge to more junior staff. Vulnerabilitymanagement by assessing security status and applying mitigation solutions. Liaising with internal and external partners, including user groups, technical IT consultants and project … manner aligned with ITIL best practices. Provide technical peer review of proposed changes to be made to the estate. Actively participate in the Change Management Board meetings and manage change within the infrastructure team. Ensure that all services are appropriately licenced and assist with tracking and costing license and More ❯
travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerabilitymanagement and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Tenth Revolution Group
travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerabilitymanagement and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security More ❯
Birmingham, West Midlands (County), United Kingdom
Adria Solutions Ltd
join their Information Security governance and oversight team. This technically focused role involves delivering Information Security services such as consultancy, assurance reviews, and risk management while providing governance and oversight across the business to manage security risks effectively. Key Responsibilities: Implement and maintain security control frameworks such as ISO27001 … Conduct assurance reviews and assessments, including third-party evaluations and new solutions. Assess security risks, proactively developing countermeasures. Perform security risk assessments for change management, processes, and new solutions. Monitor emerging security threats through external research and internal engagement. Enhance information and cyber security maturity across the organisation. Deliver … Experience with Microsoft security technologies, including endpoint security and Azure. Proficiency in security controls and frameworks, particularly in cloud security. Hands-on experience with vulnerability management. Ability to translate security frameworks and standards into detailed control requirements. Experience conducting assurance reviews and identifying security gaps. In-depth understanding of More ❯
Manage trials and pilots Mentor other team members Provide integration support Direct and co-ordinate virtual teams on-site and manage local test schedules Management of local test teams and matrix management of virtual teams Technical project management of Security test schedules and activities Develop and maintain … facilitate customer acceptance. Basic Requirements Core Competencies/Technical Expertise: ITSQB foundation ITIL V3 foundation CompTIA Security+ Have a good working knowledge of Tenable vulnerability Mgmt tool. Have good working knowledge of Splunk Enterprise Security for SIEM. Degree in Computer Science, Information Security, or a related field Proven practical More ❯
development lifecycle-from inception to retirement. Expertise in automation tools and processes for streamlined deployment and operations. Strong knowledge of security best practices and vulnerability management. Proficiency in a variety of coding languages and scripting techniques. A proactive, problem-solving mindset with a focus on continuous learning and improvement. … Charts, Python, PowerShell, REST APIs. Kubernetes: Experience building and managing Kubernetes clusters and application delivery. Applications: Familiarity with Apache NiFi, Elastic ECK, Artifactory. Secret Management: Expertise in using HashiCorp Vault. Operating Systems: Solid experience with Red Hat and Windows environments. Apply today via the link provided More ❯