safeguard the organisation's information and technology systems. As the Information Security Manager , you will be responsible for overseeing the organisation's information security management system (ISMS). Your primary focus will be on managing the delivery of, and improving, security policies, practices, and standards to protect our company … mitigate potential vulnerabilities. The Information Security Manager will perform fundamental security and data protection tasks. You will conduct security and data protection assessments, supporting vulnerabilitymanagement, reviewing security configurations, and contributing to the development of security and data protection policies. The ideal candidate is eager to learn and … posture of our systems and infrastructure Work collaboratively with other departments to ensure the alignment of security efforts with wider business objectives 2. Risk Management: Identify and assess information security risks Provide recommendations for mitigating and managing risks effectively Security system management, administration and reporting; Provide advice and More ❯
regular performance reviews and data audits of deployed models, tracking model drift and identifying opportunities for optimisation to enhance performance and reliability. Security and VulnerabilityManagement: Participate in threat modelling to identify and assess potential security risks throughout the ML lifecycle. Implement and maintain vulnerabilitymanagement … Infrastructure: Experience with cloud platforms (AWS, Azure, or GCP) and managing cloud-based ML workflows and resources at scale. Experience with Threat Modelling and VulnerabilityManagement: Proven ability to conduct threat modelling exercises to identify security risks. Experience in Security and Compliance: Demonstrated experience working within secure, high … that is making a difference in society. A supportive and collaborative environment. As well as this, we offer: Development: access to LinkedIn Learning, a management development programme and training. Wellness: 24/7 Confidential employee assistance programme. Time off: 25 days of annual leave a year, plus bank holidays More ❯
Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Searchability (UK) Ltd
infrastructure operations in a dynamic environment Hybrid working available (2 days onsite in Rugby) Salary £120,000 - £130,000 Opportunity to drive governance, risk management, and service excellence. ABOUT THE CLIENT Our client is a leading organisation that places cybersecurity and infrastructure at the core of its operations. Their … cybersecurity tools, enforce ITIL processes, drive governance, and mitigate risks. Your role will involve working closely with stakeholders to enhance security resilience, oversee incident management, and ensure SLAs are met while continuously improving service delivery frameworks. SERVICE DELIVERY SKILLS: Strong experience in cybersecurity and IT infrastructure roles. Strong background … and infrastructure operations Expertise in ITIL frameworks , including Incident, Change, and Problem Management. Hands-on experience with SIEM, IAM/PAM, Endpoint Security, Firewalls, VulnerabilityManagement, Encryption, and Cloud/On-Prem security solutions . Proven track record in risk management, SLA monitoring, and operational governance . More ❯
Development. Container native technology and ecosystem projects e.g. OpenShift, EKS, AKS and vanilla K8s. The application of DevSecOps practices to application delivery e.g. Secrets Management, Application Security Testing, VulnerabilityManagement etc. Ability to integrate security controls into the DevSecOps lifecycle to ensure ongoing compliance with standards like … PCI DSS, etc. Technical knowledge Technical knowledge and hands-on experience in the following technologies (providing cert details where applicable): Issue and Project Management tools such as JIRA, Confluence. Hashicorp Terraform. Hashicorp Vault. SAST Security Testing such as GitLab, Checkmarx or Veracode. DAST Security Testing such as OWASP ZAP … or Veracode. SCA Security Testing such as Checkmarx, Trivy, or Veracode. IAST Security Testing such as Checkmarx. VulnerabilityManagement such as PA Prisma. QA Testing such as Selenium. Ready to make a difference? If you’re a leader in DevSecOps, with the technical know-how and the drive More ❯
Development. Container native technology and ecosystem projects e.g. OpenShift, EKS, AKS and vanilla K8s. The application of DevSecOps practices to application delivery e.g. Secrets Management, Application Security Testing, VulnerabilityManagement etc. Ability to integrate security controls into the DevSecOps lifecycle to ensure ongoing compliance with standards like … PCI DSS, etc. Technical knowledge Technical knowledge and hands-on experience in the following technologies (providing cert details where applicable): Issue and Project Management tools such as JIRA, Confluence. Hashicorp Terraform. Hashicorp Vault. SAST Security Testing such as GitLab, Checkmarx or Veracode. DAST Security Testing such as OWASP ZAP … or Veracode. SCA Security Testing such as Checkmarx, Trivy, or Veracode. IAST Security Testing such as Checkmarx. VulnerabilityManagement such as PA Prisma. QA Testing such as Selenium. Ready to make a difference? If you’re a leader in DevSecOps, with the technical know-how and the drive More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Microlise
Coordinate with Development and other departments to ensure these systems and records remain accurate and available Plan & Develop automation workflows to streamline deployments, infrastructure management and security processes with dry run testing and complete roll back functionality Analyse, diagnose and rectify system or service errors/faults as tasked … as Terraform, Ansible, PowerShell Experience with monitoring/logging tools SolarWinds, Grafana, Elastic Familiarity with security concepts such as Zero Trust, Identity and Access ManagementVulnerabilitymanagement, OWASP Understanding of CI/CD pipelines Familiar with Entra ID, AD, DNS, Azure Ability to troubleshoot complex issues across … desirable) Backup Concepts Database knowledge (MS SQL, Postgres) CI/CD Tools (Azure DevOps pipelines) IAM - OAuth/SAML/OIDC Credentials, Certificates, Secrets management SolarWinds Grafana Elastic Why Microlise? When your groceries arrive at your door or you sign for your online parcel, one or more of our More ❯
/CD pipelines to streamline model deployment. Monitor and Maintain Deployed Models: Conduct regular performance reviews and data audits of deployed models. Security and VulnerabilityManagement: Participate in threat modelling to identify and assess potential security risks throughout the ML lifecycle. Troubleshoot and Resolve Issues: Proactively troubleshoot issues …/CD pipelines. Knowledge of Cloud and ML Infrastructure: Experience with cloud platforms and managing cloud-based ML workflows. Experience with Threat Modelling and VulnerabilityManagement: Proven ability to conduct threat modelling exercises. Experience in Security and Compliance: Demonstrated experience working within secure environments. Cross-Functional Collaboration Skills More ❯
processes in Standard Operating Procedures Document and maintain details of ePO configuration Configures and distributes two-factor authentication devices Performs trend analysis of routine vulnerability assessments using automated and semi-automated tools, including Nessus Tenable Provides vulnerability mitigation advice to stakeholders Supports external service providers in management of local boundary protection and cyber security monitoring infrastructure Provides CIS Security advice and training, as required Executes the incident and change management processes in accordance with the Information Technology (IT) Information Library (ITIL) Version 4 framework Contributes to Asset Configuration Patching and VulnerabilityManagement activities … challenging environments and configurations Familiarity with NATO CIS Security directives Experience with VMWare virtual hosting infrastructure and applications Experience using Microsoft update and patch management systems, IT security frameworks and governance models, and Common Vulnerability Scoring System (CVSS) v3.X or later standards Familiarity ITIL Version 4 concepts including More ❯
Stoke-On-Trent, Staffordshire, West Midlands, United Kingdom
Rapiscan Systems
Design & Documentation: Define cybersecurity design requirements and develop product security documentation for border protection and transportation security products within a standardized security framework. Risk Management: Analyze, report, and manage security-related risks, proposing further security improvements. Education & Training: Educate product design staff and stakeholders on cybersecurity impacts on product … design and support efforts. Innovative Solutions: Develop innovative solutions to secure and support networked products used in diverse settings over long periods. Vulnerability Assessment: Lead the development of product test protocols to assess vulnerabilities and recommend remediation techniques. Threat Assessment: Assess product vulnerabilities to new and emerging threats, identify … operating system and network security in physical, virtual, and cloud-based environments (AWS). Hands-On Experience: Proficiency in security systems, including endpoint security, vulnerabilitymanagement, firewalls, IDS/IPS, wireless security, authentication systems, log management, and encryption. Communication: Strong verbal and written communication skills, with the More ❯
requires the holder to actively participate in and support various IT systems and associated projects. The role is expected to work with and support management and the wider team in improving and enhancing key systems and processes. As SRE you will be a subject-matter expert leading by example … monitoring and event tools to support stabilization & lifecycle. Develops in depth knowledge of supported systems and applications and transfers knowledge to more junior staff. Vulnerabilitymanagement by assessing security status and applying mitigation solutions. Liaising with internal and external partners, including user groups, technical IT consultants and project … manner aligned with ITIL best practices. Provide technical peer review of proposed changes to be made to the estate. Actively participate in the Change Management Board meetings and manage change within the infrastructure team. Ensure that all services are appropriately licenced and assist with tracking and costing license and More ❯
travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerabilitymanagement and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security More ❯
travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerabilitymanagement and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security More ❯
travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerabilitymanagement and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Tenth Revolution Group
travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerabilitymanagement and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security More ❯
Birmingham, West Midlands (County), United Kingdom
Adria Solutions Ltd
join their Information Security governance and oversight team. This technically focused role involves delivering Information Security services such as consultancy, assurance reviews, and risk management while providing governance and oversight across the business to manage security risks effectively. Key Responsibilities: Implement and maintain security control frameworks such as ISO27001 … Conduct assurance reviews and assessments, including third-party evaluations and new solutions. Assess security risks, proactively developing countermeasures. Perform security risk assessments for change management, processes, and new solutions. Monitor emerging security threats through external research and internal engagement. Enhance information and cyber security maturity across the organisation. Deliver … Experience with Microsoft security technologies, including endpoint security and Azure. Proficiency in security controls and frameworks, particularly in cloud security. Hands-on experience with vulnerability management. Ability to translate security frameworks and standards into detailed control requirements. Experience conducting assurance reviews and identifying security gaps. In-depth understanding of More ❯
development environment Key Requirements: 3+ years in a similar role Strong skills in Python, AWS, Kubernetes, Terraform, Linux, and Ansible Experience with threat analysis, vulnerabilitymanagement, and Agile environments Relevant certifications are a plus Package & Benefits: £60,000 - £70,000 salary Flexible hybrid working (remote options for strong More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Erin Associates
development environment Key Requirements: 3+ years in a similar role Strong skills in Python, AWS, Kubernetes, Terraform, Linux, and Ansible Experience with threat analysis, vulnerabilitymanagement, and Agile environments Relevant certifications are a plus Package & Benefits: £60,000 - £70,000 salary Flexible hybrid working (remote options for strong More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Erin Associates
Requirements: At least 3 years experience in a similar role Mentoring and training experience Python AWS Kubernetes Terraform Linux Ansible Agile Threat analysis and vulnerabilitymanagement Relevant professional certifications and education would be desirable The company have an excellent reputation within their sector and have invested heavily into More ❯
resolution to incidents.' • Maintain compliance with ISO 27001, GDPR and SOC2 by developing security policies, conducting audits, and managing risk assessments.' • Conduct in-depth vulnerability assessments, penetration testing, and security reviews to identify and remediate weaknesses.' • Partner with development teams to integrate secure coding practices.' • Drive security initiatives and … Possess relevant industry certifications e.g. CISSP, CEH and Azure Security Engineer (desired).' • Deep knowledge of cybersecurity principles, including threat detection, incident response, and vulnerability management.' • Experienced in leading security initiatives and overseeing security projects from planning to execution.' • Strong communicator, capable of effectively engaging with technical and non More ❯
resolution to incidents. Maintain compliance with ISO 27001, GDPR and SOC2 by developing security policies, conducting audits, and managing risk assessments. Conduct in-depth vulnerability assessments, penetration testing, and security reviews to identify and remediate weaknesses. Partner with development teams to integrate secure coding practices. Drive security initiatives and … Possess relevant industry certifications e.g. CISSP, CEH and Azure Security Engineer (desired). Deep knowledge of cybersecurity principles, including threat detection, incident response, and vulnerability management. Experienced in leading security initiatives and overseeing security projects from planning to execution. Strong communicator, capable of effectively engaging with technical and non More ❯
Manage trials and pilots Mentor other team members Provide integration support Direct and co-ordinate virtual teams on-site and manage local test schedules Management of local test teams and matrix management of virtual teams Technical project management of Security test schedules and activities Develop and maintain … facilitate customer acceptance. Basic Requirements Core Competencies/Technical Expertise: ITSQB foundation ITIL V3 foundation CompTIA Security+ Have a good working knowledge of Tenable vulnerability Mgmt tool. Have good working knowledge of Splunk Enterprise Security for SIEM. Degree in Computer Science, Information Security, or a related field Proven practical More ❯
role of Information Security Manager. As the Information Security Manager, you will manage the security governance, risk, and compliance programme across all domains from vulnerability management. Role & Responsibilities: Develop and implement security standards, processes, procedures, and guidelines. Handle security incidents as they arise, ensuring a robust and thorough response … protect the company and its customers. Monitor and assess ongoing threats to ensure the group is well-positioned to meet them. Collaborate with senior management and stakeholders, keeping them informed for effective security-related decision-making. Ensure consistent application of policies and standards across all technology projects, systems, and … services. Lead and manage supplier and third-party compliance audits. Develop and enhance an information security management framework. Partner with business stakeholders to raise awareness of risk management concerns. Ensure IT security is implemented, maintained, and tested for perimeter and back-office systems. Proven substantial experience in information More ❯