-
Microsoft System Engineer (M365 & Azure) - Lucerne, Switzerland
(Tech stack: Microsoft System Engineer, Windows Server, Active Directory, PowerShell, Group Policy, Microsoft Exchange, SQL Server, Azure (VMs, Blob Storage, Azure Functions, Azure SQL Database, Azure AD), M365 (SharePoint, Teams, OneDrive), Microsoft Intune, Endpoint Management, Power Platform (Power Apps, Power Automate), Windows Virtual Desktop, Networking (DNS, DHCP), Security (BitLocker, Azure Security Center), Backup Solutions (Veeam, Azure Site Recovery), Monitoring (Azure Monitor), Hybrid Cloud Architecture, Compliance Solutions, Microsoft System Engineer)
Join a forward-thinking Swiss engineering firm at the cutting edge of cybersecurity innovation.
As a Microsoft System Engineer specializing in M365, Azure, and hybrid-cloud ecosystems, you'll design and implement robust security solutions that safeguard critical infrastructures and data.
Work alongside a talented team, integrating advanced security protocols, threat detection, and response strategies to fortify systems against evolving cyber threats.
Thrive in a culture of continuous learning and growth, while playing a key role in shaping the future of secure, digital infrastructure in Swiss engineering.
Opportunities available for junior, intermediate, and senior professionals.
Our client is looking for passionate Microsoft System Engineer candidates with experience in some or all of the following (full training will be provided to fill any gaps in your skill set): (Tech stack: System Engineer, Windows Server, Active Directory, PowerShell, Group Policy, Microsoft Exchange, SQL Server, Azure (VMs, Blob Storage, Azure Functions, Azure SQL Database, Azure AD), M365 (SharePoint, Teams, OneDrive), Microsoft Intune, Power Platform (Power Apps, Power Automate), Windows Virtual Desktop, Networking (DNS, DHCP), Security (BitLocker, Azure Security Center), Backup Solutions (Veeam, Azure Site Recovery), Monitoring (Azure Monitor), Hybrid Cloud Architecture, Compliance Solutions, System Engineer).
All Microsoft System Engineer (M365 & Azure) Engineer positions come with the following benefits:
Shares in the company.
Pension scheme (8%).
3 hours ‘free time' each week to investigate new technologies.
An annual training allowance of CHF 4,500.
27 days holiday (excluding Public Holidays) plus your birthday off.
Flexible working hours.
Location: Lucerne, Switzerland
Salary: CHF 80,000 - CHF 115,000 + Bonus + Pension + Benefits
To apply for this position please send your CV to Charlie Skipper at Noir.
Applicants must be based in Switzerland and have the right to work in Switzerland even though remote working is available.
NOIRSWITTZERLANDREC
NOIRSEUROPEREC
NOIREURNET
NC/CS/SYSTEM80115 ....Read more...
Type: Permanent Location: Lucerne, Switzerland
Start: ASAP
Salary / Rate: Swiss Franc80000 - Swiss Franc115000 per annum + Benefits + Salary
Posted: 2025-05-05 02:00:24
-
CISSP Certified Cyber Security Consultant
A renowned Managed Security Service Provider (MSSP) committed to delivering top-tier cyber security solutions are looking for a CISSP certified security professional to join as a Cyber Security Consultant.
You'll work collaboratively with their established 24/7 Security Operations team to develop and implement Cyber Security strategies for their broad range of clients in both Private and Public Sector markets.
Our team is composed of industry experts who are passionate about safeguarding digital assets and ensuring the highest levels of security for our clients.
As a CISSP Certified Cyber Security Consultant, you will play a crucial role in our organization.
You will be responsible for:
Conducting comprehensive security assessments and audits.
Developing and implementing robust security strategies and policies.
Providing expert guidance on risk management and mitigation.
Collaborating with clients to understand their unique security needs and tailoring solutions accordingly.
Staying updated on the latest cyber threats and security technologies.
Requirements:
CISSP certification (mandatory).
Proven experience in either cyber security consulting, advising or engineering.
Strong knowledge of security frameworks, standards, and best practices.
Excellent problem-solving skills and the ability to think critically.
Effective communication and interpersonal skills.
Ability to work independently and as part of a team.
Why Apply?
This opportunity will provide a
*significant
* opportunity to progress your career.
As well as involvement in the design and implementation of Cyber Security Strategy, you'll gain considerable experience in Vulnerability Monitoring, Intrusion Detection, Incident Response (including assurance of Business Continuity), and Cyber Investigations.
You'll be learning from some of the best in the business and working with many household name brands in relation to all of the above.
Remote based.
Paying up to 60k + benefits
Must be eligible for SC Clearance.
....Read more...
Type: Permanent Location: Leeds, England
Salary / Rate: £55000 - £60000 per annum
Posted: 2025-04-29 17:04:03
-
Cyber Security Manager - Birmingham (hybrid working, 2 day per week WFH, can also be based in Oxfordshire, Aylesbury or London if preffered)
£75,000 - £80,000 PA (plus excellent benefits)
Information Security Manager sought by a well-known and public-facing organisation with numerous sites spread across the county.
The business is involved in significant, complex and critical logistical operations, providing services to hundreds-of-thousands.
As a public-facing, Critical National Infrastructure business the Information Security Manager will be a crucial component in ensuring the effective management of both the technical cyber security environment and wider information security management piece for the business.
In this role, you'll take a proactive leadership approach to strengthening cybersecurity measures, cultivating a security-first mindset across the business, and ensuring alignment with industry regulations.
Reporting to the Head of IT, you'll oversee a Security Engineer and collaborate with both internal teams and external partners to uphold best practices in IT security.
Key Responsibilities:
Work with the Head of IT to design, refine, and implement a robust cyber security roadmap that effectively mitigates risks.
Maintain and manage security policies and procedures to ensure compliance with industry best practices.
Embed “Security by Design” principles into all technological projects and initiatives.
Promote a strong IT and cybersecurity awareness culture, encouraging accountability at all levels.
Develop, refine, and execute a forward-thinking Information Security Strategy.
Continuously assess security threats, risks, and capabilities to identify and mitigate vulnerabilities.
Establish, manage, and monitor third-party SOC (Security Operations Center) services.
Conduct security audits, address findings, and ensure compliance with regulations like GDPR and data protection laws.
Required Experience:
Experience in an cyber security focussed role involving management of strategy and oversight in the deployment of security controls.
Ideally have experience setting up and running of SOC services ( either internal or SOCaaS )
Ideally come from a ‘hands on' SecOps/Infrastructure background
Extensive experience with GDPR and data protection, together with extensive knowledge of IS standards including ISO and NIST.
Security assessment frameworks (threat modelling, controls assessment, risk assessment)
Ideally hold a relevant qualifications; CISSP, CISM or similar.
Understanding of TOGAF methodology would be beneficial, although is not a requirement.
Some travel required between Birmingham and London. ....Read more...
Type: Permanent Location: Birmingham, England
Salary / Rate: £75000 - £80000 per annum + plus excellent benefits
Posted: 2025-04-29 16:38:13
-
Group Cyber Security Architect - City of LondonHybrid workingSalary £75,000 - 80,000 + Bonus Scheme A Cyber Security Architect is required for a leading client located in Central London.
The client is seeking a professional to provide technical security advice and guidance with a comprehensive focus on the client's landscape.
The successful candidate will be responsible for identifying digital threats through risk assessments and participating in hands-on evaluations of initiatives.
Additionally, they will collaborate on various change projects and contribute to producing tailored security best practices for the broader business.
The candidate will work closely with the business to provide security advice, requirements, and guidance during the delivery of new systems or updates to existing ones, ensuring that Security by Design is considered.
They will participate in security-focused risk assessments to ensure compliance with acceptable risk tolerance levels.
Furthermore, the role involves supporting the review of designs to ensure alignment with existing security principles, patterns, standards, and best practices.
The candidate will assist in the documentation of core security patterns, standards, and guidelines and identify opportunities for improvement.Key skills and responsibilities,
Strong Cyber Security experience
Previous Azure knowledge
CISSP Certified
Knowledge of common frameworks such as NIST, CIS, ISO27k, and MITRE.
Experience with SABSA is beneficial.
Capability to review solution designs, identify security concerns, and recommend appropriate mitigations.
Identifying enhancements in security processes.
Acting as the initial regional contact for security and escalating issues as necessary.
Collaborating with the security architecture team to ensure a standardised approach is followed.
Supporting IT teams in implementing correct security controls and measures.
Ability to collaborate with vendors to understand security measures and make informed recommendations.
Experience in assisting the business with understanding the security implications of design decisions.
Experience in supporting the implementation of security requirements within the business.
Understanding of threat modelling frameworks, such as STRIDE
Interested? Submit your updated CV to Dean Sadler-Parkes at Crimson.
Not interested? Refer a friend and earn £250 in vouchers! Crimson is acting as an employment agency for this vacancy. ....Read more...
Type: Permanent Location: City of London, England
Start: ASAP
Salary / Rate: £75000 - £80000 per annum
Posted: 2025-04-22 14:17:56
-
C Software Engineer - Defence Sector - Cambridge
A growing Defence and Security company, based in Cambridge, is currently seeking an experienced C Software Engineer to contribute to the development of breakthrough technologies that will enhance the UK's security against external threats.
You will have the opportunity to work on cutting-edge systems architecture, ideally utilizing past firmware and embedded software tools.
The projects you will be involved in will truly mind-blowing, challenging you on a daily basis.
It would also be ideally, though not essential, if you have previous knowledge and experience in Software-Defined Radio (SDR) and Real-Time Operating Systems (RTOS).
There will also be a significant amount of algorithm development, so a strong mathematical background would be advantageous in this role.
The company has recently revamped cutting-edge labs, enabling development at the forefront of the sector.
This means you will be working on brand-new developments using the latest technologies available.
Knowledge of other programming languages such as C++, MATLAB, or Python will also be required.
As this role involves working in the defence and security sectors, you will need to be able to obtain (or already hold) security clearance.
If you have previous experience in the defence and security field and hold security clearance, this would be highly advantageous.
In addition to working within a growing company on some of the most fascinating projects, you will also be rewarded with an excellent starting salary (based on level of experience), bonuses, enhanced pensions, healthcare, gym membership, free lunches, and other excellent benefits you would expect from a larger organisation.
If you believe you are well-suited for this role, I suggest submitting an application now to avoid missing out on this career opportunity.
For more information, please feel free to call Andrew Welsh, Director of Medical Devices Recruitment and Scientific Recruitment Specialists Newton Colmore, on +44 121 268 2240, or submit an application, and one of our team members at Newton Colmore will contact you.
....Read more...
Type: Permanent Location: Cambridge, England
Salary / Rate: Negotiable
Posted: 2025-04-22 13:00:15
-
FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for Cyber Security Analysts for roles in Central Scotland providing a 24/7 shift pattern cover for their customers.
A generous shift allowance is paid on top of the basic salary, making up a very good reward package and path to DV Cleared status where applicable.
The roles require you to be on-site in Hampshire
* on a 4 x 4 shift pattern, whereby you will work for four 12 hour shifts and then have four shifts off.
IMPORTANT: You will be required to have only British Citizenship (i.e.
DUAL citizenship, or ILR status is not going to be eligible) AND already possess live, current SC or DV Clearance due to the timescale we are looking to hire within.
Please only apply if you have SC or DV Cleared status.
The Tier 2 Cyber Security Analyst role will involve you advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization.
This role is crucial in the escalated investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts.
As a Tier 2 Analyst you will work to ensure a seamless SOC operation & act as a bridge between foundational & advanced threat detection & response functions.
Responsibilities:
, Conducting escalated triage & analysis on security events identified by Tier 1 Analysts, determining threat severity & advising on initial response actions.
, Applying expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, & thorough documentation of security incidents.
, Identifying & escalating critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response & adherence to service Tier objectives (SLOs).
, Investigating potential security incidents by conducting deeper analysis on correlated events & identifying patterns or anomalies that may indicate suspicious or malicious activity.
, Using OSINT (Open-Source Intelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats.
, Monitoring the threat landscape & documenting findings on evolving threat vectors, sharing relevant insights with internal Cyber teams to enhance overall situational awareness.
, Following established incident response playbooks, providing feedback for enhancements & suggesting updates to streamline internal Cyber processes & improving threat response times.
., Coordinating with Tier 3 Analysts & management to refine detection & response workflows, contributing to continuous SOC maturity.
, Collaborating with Tier 3 Analysts on tuning SIEM & detection tools to reduce false positives & improve alert fidelity, submitting tuning requests & testing configurations.
, Identifying gaps in current detection content & working with Senior Analysts to develop & validate new detection rules & use cases tailored to the organization's threat profile.
, Acting as a mentor to Tier 1 Analysts, offering guidance on triage & analysis techniques & facilitating on-the-job training.
., Assisting in training sessions and knowledge-sharing activities, contributing to a supportive learning environment within the SOC.
Knowledge and Skills required to be a Tier 2 Cyber Security Analyst:
, Understands advanced networking concepts, including IP addressing, basic network protocols, & how traffic flows within a network.
, Advanced knowledge of Windows & Linux operating environments, including standard commands, file systems, & user authentication mechanisms.
, Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms.
, Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search & filter logs effectively.
, Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats & gathering information.
, Able to communicate clearly & efficiently with team members and stakeholders, both internally & externally, under senior analysts' direction.
, Can communicate simple technical issues to non-technical individuals in a clear & understandable way.
, Able to create concise, structured reports that outline findings from preliminary investigations & daily monitoring.
, Able to manage personal workload effectively to ensure timely completion of assigned tasks within the SOC.
, Willing to collaborate with team members, accepting guidance and learning from more experienced analysts.
, Shows initiative in learning new technologies and techniques.
, Able to function efficiently during high-pressure situations, following procedures to ensure consistent performance in IM.
Next Steps:
If you have live SC or DV Clearance, along with the associated skills for this role & are committed to working on a rotating shift pattern (shift allowance is paid on top of the basic salary), then please apply immediately.
Interviews will be conducted promptly with suitable candidates who meet all the stipulated essential Citizenship & Clearance criteria.
We are Disability Confident and neurodiverse aware.
If you have a disability, please tell us if there are any reasonable adjustments we can make to assist you in your application or with your recruitment process ....Read more...
Type: Permanent Location: Central Belt, Scotland
Start: With SC or DV Clearance ASAP
Salary / Rate: £48000 - £65000 per annum + Career path to DV level & Benefits
Posted: 2025-04-17 17:49:52
-
FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for Cyber Security Analysts for roles which provide a 24/7 shift pattern cover for their customers.
A generous shift allowance is paid on top of the basic salary, making up a very good reward package and path to DV Cleared status where applicable.
You will be required to already possess live, current SC Clearance due to the timescale we are looking to hire within.
Therefore, if you are not eligible for, or do not already hold SC Clearance, this will not be the opportunity for you at this time.
If you do have SC Cleared status, or higher, i.e.
DV Clearance, then please do appreciate the opportunity can turn into an interview and offer for you very quickly.
The Tier 2 Cyber Security Analyst role will involve you being responsible for advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization.
This role is crucial in the escalated investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts.
As a Tier 2 Analyst you will works closely with senior and junior analysts to ensure a seamless SOC operation and act as a bridge between foundational and advanced threat detection and response functions.
Responsibilities:
, Conducting escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on initial response actions.
, Applying expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents.
, Identifying and escalating critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response and adherence to service Tier objectives (SLOs).
, Investigating potential security incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity.
, Using OSINT (Open-Source Intelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats.
, Monitoring the threat landscape and documenting findings on evolving threat vectors, sharing relevant insights with internal Cyber teams to enhance overall situational awareness.
, Following established incident response playbooks, providing feedback for enhancements and suggesting updates to streamline internal Cyber processes and improving threat response times.
., Coordinating with Tier 3 Analysts and management to refine detection and response workflows, contributing to continuous SOC maturity.
, Collaborating with Tier 3 Analysts on tuning SIEM and detection tools to reduce false positives and improve alert fidelity, submitting tuning requests and testing configurations when necessary.
, Identifying gaps in current detection content and working with Senior Analysts to develop and validate new detection rules and use cases tailored to the organization's threat profile.
, Acting as a mentor to Tier 1 Analysts, offering guidance on triage and analysis techniques and facilitating on-the-job training to elevate their technical skills and operational efficiency
., Assisting in training sessions and knowledge-sharing activities, providing feedback on areas for growth and contributing to a supportive learning environment within the SOC.
Knowledge and Skills required to be a Tier 2 Cyber Security Analyst:
, Understands advanced networking concepts, including IP addressing, basic network protocols, and how traffic flows within a network.
, Advanced knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms.
, Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms.
, Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search and filter logs effectively.
, Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information.
, Able to communicate clearly and efficiently with team members and stakeholders, both internally and externally, under direction from senior analysts.
, Can communicate simple technical issues to non-technical individuals in a clear and understandable way.
, Able to create concise, structured reports that outline findings from preliminary investigations and daily monitoring.
, Able to manage personal workload effectively to ensure timely completion of assigned tasks within the SOC.
, Willing to collaborate with team members, accepting guidance and learning from more experienced analysts.
, Shows initiative in learning new technologies and techniques.
, Able to function efficiently during high-pressure situations, following procedures to ensure consistent performance in IM.
Next Steps:
If you have SC Clearance, the associated skills for this role, and are committed to working on a rotating shift pattern (shift allowance is paid on top of the basic salary), then please apply immediately.
Interviews will be conducted ASAP with suitable candidates who meet all the criteria, with attractive packages offered to start ASAP.
We are Disability Confident and neurodiverse aware.
If you have a disability, please tell us if there are any reasonable adjustments we can make to assist you in your application or with your recruitment process ....Read more...
Type: Permanent Location: Hampshire, England
Start: SC or DV Clearance ASAP
Salary / Rate: £48000 - £65000 per annum + Career path to DV level & Benefits
Posted: 2025-04-11 11:48:24
-
FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for Cyber Security Analysts for roles which provide a 24/7 shift pattern cover for their customers.
You will be required to already possess live, current SC Clearance due to the timescale we are looking to hire within.
Therefore, if you are not eligible for, or do not already hold SC Clearance, this will not be the opportunity for you at this time.
If you do have SC Cleared status, or higher, i.e.
DV Clearance, then please do appreciate the opportunity can turn into an interview and offer for you very quickly.
The Tier 1 Cyber Security Analyst role will involve working under the guidance of more senior analysts, so your foundational knowledge of Security Information and Event Management (SIEM) solutions, to support the security operations team will be put to very good use.
We are looking to assess your proficiency in utilizing Kusto Query Language (KQL), for log analysis and gain experience using multiple ticketing systems to manage incidents effectively ensuring that we adhere to our service level objectives.
Responsibilities of a Tier 1 Cyber Security Analyst:
, Monitoring and reviewing security events across various SIEM platforms 24/7/365 to detect, triage, and responding to security incidents.
, Acting as the first line of response for security incidents by identifying, validating, and classifying potential threats, escalating to higher tiers when necessary.
, Performing preliminary analysis on alerts to determine false positives and escalate confirmed incidents based on pre-defined criteria.
, Creating and managing incident tickets in the system to track incident status and facilitate accurate handovers between shifts.
, Conducting and documenting formal handover / takeover procedures at the beginning and end of each shift to ensure continuity of operations.
, Liaising with Tier 2 and Tier 3 Analysts for complex investigations, continuity briefs, and updates on service status issues.
, Following and providing feedback on existing processes; identifying and suggesting improvements to streamline workflow efficiency.
, Following procedures to communicate and report incidents to appropriate team members and documenting incidents as per internal guidelines.
, Working closely with other team members, contributing to a cooperative environment while assisting in the completion of assigned tasks.
, Developing a foundational understanding of security event analysis from network traffic, host logs, and other data sources to support incident identification and escalation.
, Completing assigned tasks accurately and in a timely manner as directed by senior analysts or management.
, Engaging with available knowledge and training tools to maintaining and improving technical skills, enhancing the ability to support cyber security operations effectively.
Tier 1 Analyst Roles and Responsiblilties
, Once comprehensive training has been completed, the L1 Analyst will assume shift lead duties in the absence of an L2 Analyst.
You will be responsible for security monitoring, completion of all assigned tasks and ensuring a thorough handover at the end of the shift.
Knowledge and Skills
, Understands and can explain foundational networking concepts, including IP addressing, basic network protocols, and how traffic flows within a network.
, Basic knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms.
, Competence in using SIEM for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms.
, Able to demonstrate basic knowledge using Kusto Query Language (KQL) to search and filter logs effectively.
, Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information.
, Able to communicate clearly and efficiently with team members and stakeholders, both internally and externally, under direction from senior analysts.
, Can communicate simple technical issues to non-technical individuals in a clear and understandable way.
, Able to create concise, structured reports that outline findings from preliminary investigations and daily monitoring activities.
, Able to manage personal workload effectively to ensure timely completion of assigned tasks within the SOC.
, Willing to collaborate with team members, accepting guidance and learning from more experienced analysts.
, Shows initiative in learning new technologies and techniques, leveraging internal resources and training to grow professionally.
, Able to function efficiently during high-pressure situations, following procedures to ensure consistent performance in incident management.
Next Steps:
If you have SC Clearance, the associated skills for this role, and are committed to working on a rotating shift pattern (shift allowance is paid on top of the basic salary), then please apply immediately.
Interviews will be conducted ASAP with suitable candidates who meet all the criteria, with attractive packages offered to start ASAP.
We are Disability Confident and neurodiverse aware.
If you have a disability, please tell us if there are any reasonable adjustments we can make to assist you in your application or with your recruitment process ....Read more...
Type: Permanent Location: Renfrewshire, Scotland
Start: ASAP with SC Clearance
Posted: 2025-04-10 18:05:24
-
Position Title: Security Engineer
Location: Sydney or Newcastle
Contract Type: 12-Month Daily Rate Contract
Work Rights: Must have full Australian working rights
Position Overview
The Security Engineer position exists to ensure a safe and secure computing environment for both employees and members.
This role is responsible for identifying vulnerabilities, responding to security incidents, designing and implementing Information Security Architecture, and configuring systems to enhance security features.
The Security Engineer will work in a fast-paced business environment, addressing security threats, resolving technical faults, and implementing real solutions efficiently.
Key Responsibilities
Maintain security software and hardware, including firewalls, intrusion detection systems, identity & access management, and vulnerability management.
Identify emerging security trends, vulnerabilities, and threats to proactively mitigate risks.
Interpret threat intelligence advisories and recommend appropriate security measures.
Source, evaluate, and implement new security solutions to enhance organisational protection.
Conduct proactive research to analyse security weaknesses and recommend improvements.
Work closely with vendors to integrate security technologies.
Contribute to the development and refinement of security policies and procedures.
Monitor security solutions, execute vulnerability scans, and address data security concerns.
Required Skills & Experience
Qualifications (Mandatory):
Tertiary qualification in Information Technology or related field
CISSP or CISM certification
Experience & Skills:
Minimum 5 years' experience in a technical security role.
Proven expertise with firewalls, intrusion detection systems, identity & access management, and vulnerability management.
Strong understanding of Linux and Windows operating systems.
Experience with configuration management tools.
Familiarity with scripting languages (e.g., Python, PowerShell).
Knowledge of security within cloud platforms.
Understanding of modern IT architectures (e.g., hybrid cloud, IaaS, PaaS).
Experience with Rapid7 and CrowdStrike (nice to have).
Ability to multi-task, prioritise, and manage time effectively.
Strong problem-solving skills and ability to work in high-pressure environments.
Excellent communication skills with the ability to explain security concepts to non-technical stakeholders.
....Read more...
Type: Contract Location: Sydney, Australia
Start: ASAP
Duration: 12 months
Posted: 2025-04-03 06:58:20
-
Physicist - Defence Sector Engineering - Cambridge
A growing Defence company, based in Cambridge, offers an exciting opportunity for a Physicist to work on a wide range of cutting-edge technologies that will enhance the UK's defence against external threats, with a focus on defensive technologies rather than offensive ones.
You will be involved in a variety of physics projects, including (but not limited to) thermal, optics, electromagnetics, acoustics, fluidics, chemical, and other scientific technologies.
If you have experience with complex projects in these fields, I recommend providing as much detail as possible on your CV.
We are open to candidates from various sectors; however, it will be highly advantageous if you already have experience in the Defence sector.
As you will be working in the Defence sector, you will need to be able to obtain security clearance or already hold security clearance.
Given the increasing importance of Artificial Intelligence and Machine Learning in various sectors, a keen interest in these areas would be welcomed, as many of your projects will involve work in this field.
In addition to working on complex and cutting-edge technologies, you will also be rewarded with an excellent starting salary, dependant on experience.
The compensation package includes a bonus, enhanced pension, dental care, gym access, free lunch, and other excellent benefits.
The level of experience sought can range from a PhD holder who has worked in a post-doc role to someone with years of industry experience.
We are looking to recruit several individuals for this team, so if you are in the early stages of your career, you will receive development opportunities, and if you are further along in your career, you will have the chance to mentor junior team members.
This company places a strong emphasis on collaboration, both within the team, with other teams, and with external parties.
Given the anticipated high level of interest in this role, and the company's desire to recruit quickly, I recommend applying immediately if you are interested in this position to avoid missing out.
For more general information, please feel free to call Andrew Welsh, Director of Medical Devices Recruitment, and Scientific Recruitment Specialists Newton Colmore, on 0121 268 2240, or submit an application, and one of our team members at Newton Colmore will contact you.
Please note we will not be able to discuss the role specifics until we have a copy of your CV. ....Read more...
Type: Permanent Location: Cambridge, England
Salary / Rate: Negotiable
Posted: 2025-04-01 10:45:00
-
Cyber Security Manager - Birmingham (hybrid working, 2 day per week WFH)
£75,000 - £80,000 PA (plus excellent benefits)
Information Security Manager sought by a well-known and public-facing organisation with numerous sites spread across the county.
The business is involved in significant, complex and critical logistical operations, providing services to hundreds-of-thousands.
As a public-facing, Critical National Infrastructure business the Information Security Manager will be a crucial component in ensuring the effective management of both the technical cyber security environment and wider information security management piece for the business.
In this role, you'll take a proactive leadership approach to strengthening cybersecurity measures, cultivating a security-first mindset across the business, and ensuring alignment with industry regulations.
Reporting to the Head of IT, you'll oversee a Security Engineer and collaborate with both internal teams and external partners to uphold best practices in IT security.
Key Responsibilities:
Work with the Head of IT to design, refine, and implement a robust cyber security roadmap that effectively mitigates risks.
Maintain and manage security policies and procedures to ensure compliance with industry best practices.
Embed “Security by Design” principles into all technological projects and initiatives.
Promote a strong IT and cybersecurity awareness culture, encouraging accountability at all levels.
Develop, refine, and execute a forward-thinking Information Security Strategy.
Continuously assess security threats, risks, and capabilities to identify and mitigate vulnerabilities.
Establish, manage, and monitor third-party SOC (Security Operations Center) services.
Conduct security audits, address findings, and ensure compliance with regulations like GDPR and data protection laws.
Required Experience:
Experience in an cyber security focussed role involving management of strategy and oversight in the deployment of security controls.
Ideally have experience setting up and running of SOC services ( either internal or SOCaaS )
Ideally come from a ‘hands on' SecOps/Infrastructure background
Extensive experience with GDPR and data protection, together with extensive knowledge of IS standards including ISO and NIST.
Security assessment frameworks (threat modelling, controls assessment, risk assessment)
Ideally hold a relevant qualifications; CISSP, CISM or similar.
Understanding of TOGAF methodology would be beneficial, although is not a requirement.
Some travel required between Birmingham and London. ....Read more...
Type: Permanent Location: Birmingham, England
Salary / Rate: £75000 - £80000 per annum + plus excellent benefits
Posted: 2025-03-28 16:01:44