Adword
Job title: Cyber Asset Management Engineer
Start date: Asap!
Duration: 12 months - likely to want to take on perm for the right candidate
IR35: Inside
Location: Remote - candidate needs to be within a reasonable commuting distance from Edinburgh to be able to attend meetings and work on site if / when required. The manager is very flexible but doesn’t want someone that is unable to get to Edinburgh.
Job description:
Not just an analyst but an engineer who can:
The outcomes we expect
The kind of person and soft skills
The technical depth required
The ideal candidate background
What’s the most important thing
If you’re excited about application security, identity management, and creating robust, secure solutions for modern architectures, we want to hear from you!
Please apply with a copy of your CV or send it to Prasanna . merugu @ randstaddigital . com and let’s start the conversation!
Randstad Technologies is acting as an Employment Business in relation to this vacancy.
Job Specification
Delivery Team Support Lead in the Security as a Service Team
HMS Excellent is home to the Naval Headquarters and front-line training units. Based on Whale Island in Portsmouth Harbour, it successfully blends heritage and history with a modern and progressive outlook. HMS Excellent is a unique shore establishment with its roots in more than 100 years of naval history.
Navy Digital is required to deliver and sustain digital and information security services that enable the secure operation of Information Communication Technology (ICT) equipment, services, and applications. In order for Navy Digital to achieve this goal in an agile and effective manner, a central security service must be established. This service will establish a single coherent approach to Navy Digital’s requirements to prevent duplication and improve efficiency.
This Outcome is for the provision of Security as a Service across a full spectrum of programmes and projects delivering digital outcomes that enable current and future information-based capabilities supporting Navy Command Information, MoD and HMG defence and national security outputs.
Tasking
Person Specification
To be considered for this role you will have the following:
Desirable Skills
Role specifics
Guidant, Carbon60, Lorien & SRG - The Impellam Group Portfolio are acting as an Employment Business in relation to this vacancy.
About the team
Our team isaccountable for security within the mobile channel. Weprovide a suite of mobile security components,that provides an all-round security posture in mobile appsincluding associated services (penetration testing, obfuscation, consultancy etc.).
Were passionate about our shared passion for delivering new features for customers across our brands in the mobile space.
What We Need from You Essential Skills & Experience
Desirable Skills & Experience
Secure Engineer
Must have an Active DV Clearance
An opportunity has arisen for a Secure Engineer to join a growing Secure Engineering Project Team supporting Defence and highly secure government environments. This role suits a hands on engineer who enjoys on site delivery, takes ownership, and leads by example in complex and sensitive locations across the UK and occasionally overseas.
About the Role - Secure Engineer
Key Skills - Secure Engineer
Additional Requirements - Secure Engineer
Build secure national capability and lead on site delivery as a Secure Engineer.
To apply, please send your CV by pressing the apply button.
IDAM Engineer
Must have an Active DV Clearance
An excellent opportunity has arisen for an IDAM Engineer to join a secure and fast paced Defence and National Security programme. You will design and deliver enterprise grade identity and access management solutions while working in a multi skilled agile team focused on high assurance environments.
About the Role - IDAM Engineer
What We’re Looking For - IDAM Engineer
Lead secure identity services and shape the future of access management as an IDAM Engineer.
To apply, please send your CV by pressing the apply button.
Technical Security Architect
Must have an Active DV Clearance
About the Technical Security Architect role
We’re seeking a highly skilled Technical Security Architect to take the lead on embedding security across the design, development, and integration of complex network infrastructures. Working within an Agile Scrum environment, the Technical Security Architect will play a vital part in shaping secure platforms by applying Secure by Design and NIST principles throughout the delivery lifecycle.
What you’ll do as a Technical Security Architect
What you’ll bring to the Technical Security Architect role
To apply for the Technical Security Architect position, please send your CV by pressing the apply button.
JD: The role requires an experienced systems engineer with strong technical leadership and collaboration skills. The ideal candidate will have significant experience in cloud platform management, infrastructure delivery pipelines (e.g. Azure, AWS, GCP, scripting in Bash, PowerShell, Python, Terraform, etc.).
In this role you will: Act as a Technical SME, designing and developing innovative automated solutions to complex problems utilising the cloud environments. Design and support custom-built applications Azure environment, ensuring secure, reliable and high-performing deployments. Build and manage Azure Infrastructure, including Virtual Machines, VM images, Virtual Networks (VNets), subnets, private endpoints and Azure Storage. Develop and deploy Python functions within an Azure Functions App. Develop Infrastructure-as-Code (IaC) such as ARM templates, Bicep, or Terraform. Support CI/CD practices through deployment automation and version-controlled infrastructure in Azure DevOps. Integrate monitoring, logging and diagnostics for custom applications using Azure Monitor, Application Insights and Log Analytics. Integrate with AI-related Azure services such as OpenAI and contribute to integrations strategies involving LLMs. Ensure that custom-built applications are built and maintained inline with client standards, governance and controls, ensuring compliance with SLDC & DEPL controls, AI Governance and legal & regulatory requirements. Support and extend an existing architecture in close partnership with the principal architect and core development team. Produce well-documented, maintainable infrastructure configurations and effectively communicating implementation details with engineers and stakeholders. Work within evolving technical landscape and contribute to the refinement and evolution of architecture and infrastructure decisions. Utilise strong problem-solving skills, with the ability to investigate issues, troubleshoot deployment challenges, and propose scalable and secure solutions. Promote a self-critical and continuous assessment and improvement culture whereby identification of weaknesses in the banks control plane (people, process and technology) are brought to light and addressed in an effective and timely manner. Support engagement of Global Businesses and Functions to drive a global up-lift in cyber-security awareness and help to evangelise Cybersecurity efforts and success.
To be successful in this role you should meet the following requirements: Experience within an enterprise scale organisation including hands-on experience of complex data centre environments, working within a similar role ie DevOps Engineer, Cloud Engineer, Security Engineer is mandatory. Expert level knowledge of one of more leading Cloud platforms including Microsoft Azure, Amazon Web Services, Google Cloud Platform and Alibaba Cloud. Expert level knowledge and proven experience managing Azure App Services, Azure Virtual Machines, and Azure Storage solutions. Hands on experience in one or more programming or scripting language (e.g Python, PowerShell, Bash, Terraform). Experience and demonstrated experience of building and maintaining CI/CD Pipelines to support efficient software delivery.
TPBN1_UKTJ
Cybersecurity Specialist - AI & Data Security
Client & Project
We are seeking a talented Cybersecurity Specialist to join the AI & Data Security team, where you will contribute to the delivery and ongoing evolution of the organisation’s AI Security programme.
Role Overview
As a Cybersecurity Specialist, you will bring hands-on experience with leading AI technologies and platforms-primarily AWS Bedrock, Azure OpenAI, Microsoft 365, and other foundation model providers-to support teams in adopting these capabilities securely and effectively.
You will provide guidance on model security, deployment patterns, guardrails, integration architectures, observability, evaluation techniques, and safe operationalisation across a wide range of business use cases. You will translate platform-specific risks, limitations, and best practices into actionable engineering patterns and governance controls.
In this role, you will act as a subject matter expert, collaborating with and supporting the wider team to ensure high-quality outcomes. You will influence key decisions, engage with multiple teams, and provide practical solutions to technical and security challenges across the organisation.
Required & Recommended Proficiencies
Key Responsibilities
Skills
Master proficiency in Network Encryption is required; expert proficiency in Secure AI is recommended.Master proficiency in Microsoft Azure Active Directory Security, with intermediate proficiency in AI Agents, Amazon Bedrock, and Microsoft Azure AI Foundry, is preferred.
Job Specification
Delivery Team Support Lead in the Security as a Service Team
HMS Excellent is home to the Naval Headquarters and front-line training units. Based on Whale Island in Portsmouth Harbour, it successfully blends heritage and history with a modern and progressive outlook. HMS Excellent is a unique shore establishment with its roots in more than 100 years of naval history.
Navy Digital is required to deliver and sustain digital and information security services that enable the secure operation of Information Communication Technology (ICT) equipment, services, and applications. In order for Navy Digital to achieve this goal in an agile and effective manner, a central security service must be established. This service will establish a single coherent approach to Navy Digital’s requirements to prevent duplication and improve efficiency.
This Outcome is for the provision of Security as a Service across a full spectrum of programmes and projects delivering digital outcomes that enable current and future information-based capabilities supporting Navy Command Information, MoD and HMG defence and national security outputs.
Tasking
Person Specification
To be considered for this role you will have the following:
Desirable Skills
Role specifics
Guidant, Carbon60, Lorien & SRG - The Impellam Group Portfolio are acting as an Employment Business in relation to this vacancy.
Security Administrator
6 months
London - hybrid
Inside IR35 - Umbrella only
Role overview:
Key Responsibilities:
Palo Alto Administer, configure, and support Palo Alto NGFWs (PA-Series / VM-Series) including:
Security policy rules, NAT, zones, routing, interfaces, HA, and objects
App-ID / User-ID / Content-ID, URL filtering, Anti-Spyware, Vulnerability profiles
SSL decryption policy management (where applicable) and related operational impacts
Work closely with Network Engineers, Cloud/Platform teams, and Service Owners
Support projects such as:
Required Skills:
Desirable Skills (Nice to Have):
Certifications:
OCI Cloud Administrator l Security Lead l Oracle Cloud Infrastructure l PaaS / IaaS l DV Cleared l Hybrid | Competitive PD l Outside IR35 l London
Method Resourcing is working with a partnering consultancy that is looking for an OCI Cloud Administrator / Security Lead to take ownership of the secure operation of Oracle Cloud Infrastructure (OCI) within a highly regulated, security-critical environment.
This role requires hands-on OCI experience and active DV clearance, with privileged administrator access across cloud and security tooling.
Key Requirements:
Contract Details:
For more information or to apply, please send your CV to .
OCI Cloud Administrator l Security Lead l Oracle Cloud Infrastructure l DV Cleared l PaaS / IaaS l Hybrid | Outside IR35 l London
RSG Plc is acting as an Employment Business in relation to this vacancy.
Job Title: Resilience Vulnerability Management Lead
Contract Length: 10 months (initial)
Location: Sheffield Hybrid
Sector: Financial Services
IR35 Status: Inside IR35
Overview
We are working with a leading financial services organisation to recruit an experienced Resilience Vulnerability Management Lead for an initial 10-month contract. This role is critical to supporting the organisations Operational Resilience and Vulnerability Management objectives, ensuring Important Business Services (IBS) are resilient, well-governed, and compliant with internal standards and regulatory expectations.
You will work in a hybrid model from Sheffield, collaborating closely with IT Service Owners, Service Sustainability Leads, and senior stakeholders across technology and the business.
Key ResponsibilitiesResilience Assessment (TRVA)
Vulnerability Management
Manage the end-to-end vulnerability lifecycle, including:
Conduct control reviews outside standard assessments and raise vulnerabilities where required
Work closely with IT Service Owners to capture risk, impact, severity, mitigation, and remediation plans
Partner with Service Sustainability Leads and IT Service Owners to collect Evergreening details
Ensure Impact Assessments are completed for all vulnerabilities and severity records are kept up to date
Support other Lines of Business with tolerance assessments for MSS-owned applications
Analyse weekly vulnerability reports to identify new risks impacting Important Business Services and drive them through assessment processes
Ensure remediation actions are accurately reflected in golden source systems
Prepare high-quality closure packs with supporting evidence
Produce Risk & Control Management Meeting packs and stakeholder reports
Represent the team in governance forums when required
Contribute inputs to consolidated CIB-level reporting
Participate in vulnerability portal feature testing, providing feedback and backlog requirements
Actively contribute to daily and weekly Operational Resilience and Vulnerability Management forums
Qualifications & Experience
Bachelors degree in IT, Computer Science, or a related discipline (or equivalent professional experience)
Proven experience in operational resilience, risk management, or vulnerability management within a large financial institution
Strong understanding of:
Demonstrated ability to manage complex assessments across multiple applications and stakeholders
Key Capabilities
Whats on Offer
If you are an experienced Resilience or Vulnerability Management Lead looking for your next contract role, wed be keen to hear from you.
Day Rate: ÂŁ650 (Inside IR35)
Contract Length: 12 months
Clearance Required: UK SC and willing to undergo DV
Location - 4 days on site - Gloucester / Hereford
An opportunity is available for an experienced Integration Engineer to join a high-profile defence programme, working on the integration of mobile and server-based systems within a secure environment.
The Role
You will operate as a senior technical contributor, acting as a bridge between customers, software development teams, and third-party suppliers. The focus is on integrating, configuring, and supporting Linux-based systems and containerised applications, alongside mobile and Android platforms.
You should be comfortable working across the full system landscape, understanding software at a broad level, and contributing to solution design, configuration, and troubleshooting.
Key Responsibilities
Required Skills & Experience
Ideal Profile
Interview Process
If you are an experienced Integration Engineer seeking a long-term, high-impact contract within a secure environment, please apply with your latest CV.
?? Cyber Asset Management Engineer
?? Remote (must be able to travel to Edinburgh when required)
?? 12-month contract | Strong chance to go permanent
?? IR35: Inside
?? Rate: Open - focused on the right person
??? The Role
This is a hands-on cyber engineering role focused on asset visibility, integrations, automation, and real risk reduction - not just reporting.
You’ll help the business:
? Know exactly what assets exist
? Identify security gaps
? Automate fixes wherever possible
?? What You’ll Do
?? Build full visibility across:
?? Engineer solutions by:
?? Work with tools like SIEM, EDR, Vulnerability Mgmt, CSPM, IAM
?? Automate using Python or PowerShell
?? Success Looks Like
? Higher asset coverage
? Fewer unknown devices
? Automated detection of gaps
? Automated / semi-automated fixes
? Clear dashboards for leadership
?? Who They Want
? Hands-on, proactive engineer
? Comfortable with complex environments
? Spots problems and solves them
? Self-directed and organised
? Able to document and explain work clearly
?? Interviews
Stage 1 - Technical with engineers
Stage 2 - Culture fit with the Senior Director
Randstad Technologies is acting as an Employment Business in relation to this vacancy.
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 8x SOC Threat Detection Analyst subcontractors on an initial 6 month contract.
This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line.
This role would suit someone from a Cyber Security Analyst, SOC Analyst or Threat Detection Analyst background.
Hourly Rate: ÂŁ45ph - ÂŁ85 per hour. There are 8 positions being recruited across the mid-senior level. Overtime rate of time and a quarter.
Contract Duration: 6 Months initially and long-term thereafter.
Shift pattern:
28 day Cycle
Sat to Tue - Earlies (Apply online only)
Wed to Sun - Off
Mon to Fri - Lates (Apply online only)
Sat to Tue Off
Wed to Sun - Nights (Apply online only)
(The type of shift rotates along the pattern through, so the start of the next 28 day cycle they start with lates -> Nights -> earlies then next cycle: Nights -> earlies -> lates)
28 days = 4 weeks, 14 days worked per 28 days, 3.5 days worked per week, 3.5 x 8 = 28 hours per week
Initially may not be expected to do nights until team grows.
SOC Threat Detection Analyst Job Description:
An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC.
Responsibilities:
To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems).
It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies.
The SOC Analyst reports to the SOC Manager. The SOC Analyst conducts a range of analysis and assists the incident response team with investigations that need to be escalated to an embedded member of staff.
The SOC Analyst key responsibilities are:
Effective Tier 1 to 2 alert triage of security events
Monitoring of Cyber Security tools
Monitoring the SOC email notification mailboxes
Assists with the maintenance of Security technologies
Assisting the SOC Solutions Lead with project activity
Assist proactive threat hunting in collaboration with the CTI function
Assist IR in HR and InfoSec related investigations
Ensure the timely triage and remediation of any incident or request tickets raised to the SOC
Participate in the activity of adding/removing URLs from the AcceptList and BlockList
Attend routine security meetings
Conduct activities in line with SOC Maturity and continuous improvement
Skillset/experience required (Baseline):
A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications.
Knowledge of IT Security standard methodologies.
Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S.
Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools.
Hands on experience with IDS/IPS technologies and threat hunting activities.
Strong analytical experience and mind-set.
Experience within Defensive Cyber-attack methodologies and frameworks.
Understanding of Malware capabilities, attack vectors, propagation and impact.
Good communication skills liaising with the business and suppliers.
Desirable Skillset/experience (Senior grade):
Root cause analysis and leading T2 incident investigations
Process / Playbook / Runbook development
Working knowledge of detection engineering, false positive improvements
Capability to tune SIEM rules or create custom detections
Scripted automation experience e.g. Python, SOAR, PowerShell
Threat modelling and Hunting methodologies
Job Title: DV Cleared Senior Network Engineer
Location: Cambridgeshire with Travel to other sites when required
Duration: 6 months with possible extension
Rate: Up to 700 per day via an approved umbrella company
Must be willing and eligible to go through the DV Clearance process
Our client, a reputable organisation supporting UK defence, is hiring for a Senior Network Engineer to join their team primarily based in Cambridgeshire. This is a fantastic opportunity for a skilled network professional to contribute to critical infrastructure projects and ensure the resilience of vital networks.
What you’ll be doing:
What you’ll bring:
This role offers the chance to work on high-profile projects within a dynamic environment. If you’re a motivated network professional ready to make an impact, we’d love to hear from you. Apply now to join a team committed to excellence and innovation.
GRC Analyst 3-month contract Fully Remote
My Customer is looking for an experienced GRC Analyst to join the organisation to strengthen governance, risk, and compliance practices and will lead the delivery of ISO 27001 certification within the next 12 months.
The GRC Analyst will focus on maintaining current ISO and SOC 2 standards within the business. Technical understanding would be beneficial but not essential. Knowledge of the requirements of the above standards in relation to contracts and vendor relationships is essential.
Key Skills & Experience from the GRC Analyst:
Key Responsibilities of the GRC Analyst:
The GRC Analyst can work fully remote for the duration of the contract.
Apply now to speak with VIQU IT in confidence. Or reach out to Connor Smal via the VIQU IT website.
Do you know someone great? We ll thank you with up to ÂŁ1,000 if your referral is successful (terms apply).
For more exciting roles and opportunities like this, please follow us on IT Recruitment.