Job Title: SC Cleared Solution Architect Location: Remote Duration: 19th January start 3-6 months with likely extension Rate: Up to 540 per day via an approved umbrella company Must be willing to go through the SC Clearance process Role Overview We are seeking a highly experienced Solution Architect to own the solution and technical architecture for a major platform and its new data-visualisation components. This role requires a strategic leader capable of embedding scalability, security, and performance into every aspect of the solution while guiding a multidisciplinary technical team. The ideal candidate will blend hands-on architectural expertise with strong leadership, governance, and stakeholder-management skills Key Responsibilities Architecture Leadership Own the end-to-end solution architecture for the platform, ensuring designs meet requirements for scalability, security, performance, and maintainability. Develop and maintain architectural standards and design principles in line with DSA architectural governance . Conduct architectural reviews, define best practices, and maintain clear, traceable documentation of technical decisions. Oversee the design of new data-visualisation components, ensuring optimal integration with existing systems. Collaboration & Stakeholder Engagement Work closely with Delivery Leads, Business Analysts, and Product Leads to shape and refine technical requirements. Advise on technical feasibility, delivery timelines, and risk management, ensuring well-informed decision-making. Support stakeholder engagement by communicating complex technical concepts in a clear, accessible way. Ensure all architectural decisions align with business objectives, user needs, and compliance requirements. Required Skills & Experience Proven experience as a Lead Architect, Solutions Architect, or similar senior technical leadership role. Strong background designing scalable, secure, and high-performance platforms. Experience leading multidisciplinary technical teams and driving delivery in complex environments. Excellent understanding of architectural governance frameworks and documentation practices. Ability to manage competing priorities while maintaining high-quality outputs. Strong communication and stakeholder-management skills. SC Clearance or eligibility to obtain it. If this is the role for you please submit your CV at your earliest convenience
10/12/2025
Contractor
Job Title: SC Cleared Solution Architect Location: Remote Duration: 19th January start 3-6 months with likely extension Rate: Up to 540 per day via an approved umbrella company Must be willing to go through the SC Clearance process Role Overview We are seeking a highly experienced Solution Architect to own the solution and technical architecture for a major platform and its new data-visualisation components. This role requires a strategic leader capable of embedding scalability, security, and performance into every aspect of the solution while guiding a multidisciplinary technical team. The ideal candidate will blend hands-on architectural expertise with strong leadership, governance, and stakeholder-management skills Key Responsibilities Architecture Leadership Own the end-to-end solution architecture for the platform, ensuring designs meet requirements for scalability, security, performance, and maintainability. Develop and maintain architectural standards and design principles in line with DSA architectural governance . Conduct architectural reviews, define best practices, and maintain clear, traceable documentation of technical decisions. Oversee the design of new data-visualisation components, ensuring optimal integration with existing systems. Collaboration & Stakeholder Engagement Work closely with Delivery Leads, Business Analysts, and Product Leads to shape and refine technical requirements. Advise on technical feasibility, delivery timelines, and risk management, ensuring well-informed decision-making. Support stakeholder engagement by communicating complex technical concepts in a clear, accessible way. Ensure all architectural decisions align with business objectives, user needs, and compliance requirements. Required Skills & Experience Proven experience as a Lead Architect, Solutions Architect, or similar senior technical leadership role. Strong background designing scalable, secure, and high-performance platforms. Experience leading multidisciplinary technical teams and driving delivery in complex environments. Excellent understanding of architectural governance frameworks and documentation practices. Ability to manage competing priorities while maintaining high-quality outputs. Strong communication and stakeholder-management skills. SC Clearance or eligibility to obtain it. If this is the role for you please submit your CV at your earliest convenience
Senior SOC Analyst (DV Cleared) Duration: 12 Months Location: London Rate: £600-£650 per day IR35 Status: Inside Start: ASAP A Senior SOC Analyst (DV Cleared) is required for our Government client to be part of their security team providing a 24x7 service helping to protect the organisation from cyber threats. You will be part of a 24x7 team responsible for monitoring their systems, detecting potential security incidents and initiating the incident response process. Essential skills & experience required: As the Senior SOC Analyst you will possess current security clearance to DV Level together with experience of SPLUNK within a security operations centre (SOC) Possess excellent problem solving abilities, attention to detail and the capacity to work under pressure and comfortable working within a team environment. Have a good understanding of networking concepts (TCP/IP, DNS etc ) Windows and Linux O/Systems Common cyber attack techniques Any Cyber security certifications would be desirable. Responsibilities include: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. Analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents. For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Create detailed tickets and reports for all detected incidents, documenting your findings and the steps you have taken as this is crucial for tracking incidents and for future analysis. Also to assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively. To apply for this role please email your CV to: (see below) Certes IT Service Solutions welcome applications from all sections of the community and from people with diverse experience and backgrounds Certes Computing (and all of its subsidiary companies) is committed to promoting equality and diversity in its business operations.
10/12/2025
Contractor
Senior SOC Analyst (DV Cleared) Duration: 12 Months Location: London Rate: £600-£650 per day IR35 Status: Inside Start: ASAP A Senior SOC Analyst (DV Cleared) is required for our Government client to be part of their security team providing a 24x7 service helping to protect the organisation from cyber threats. You will be part of a 24x7 team responsible for monitoring their systems, detecting potential security incidents and initiating the incident response process. Essential skills & experience required: As the Senior SOC Analyst you will possess current security clearance to DV Level together with experience of SPLUNK within a security operations centre (SOC) Possess excellent problem solving abilities, attention to detail and the capacity to work under pressure and comfortable working within a team environment. Have a good understanding of networking concepts (TCP/IP, DNS etc ) Windows and Linux O/Systems Common cyber attack techniques Any Cyber security certifications would be desirable. Responsibilities include: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. Analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents. For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Create detailed tickets and reports for all detected incidents, documenting your findings and the steps you have taken as this is crucial for tracking incidents and for future analysis. Also to assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively. To apply for this role please email your CV to: (see below) Certes IT Service Solutions welcome applications from all sections of the community and from people with diverse experience and backgrounds Certes Computing (and all of its subsidiary companies) is committed to promoting equality and diversity in its business operations.
Job Title: Lead Architect Location: Remote Start Date: Estimated 19 January 2026 Clearance: SC Clearance (or eligibility to obtain) Day rate : 540 Role Overview We are seeking a highly experienced Lead Architect to own the solution and technical architecture for a major platform and its new data-visualisation components. This role requires a strategic leader capable of embedding scalability, security, and performance into every aspect of the solution while guiding a multidisciplinary technical team. The ideal candidate will blend hands-on architectural expertise with strong leadership, governance, and stakeholder-management skills Key Responsibilities Architecture Leadership Own the end-to-end solution architecture for the platform, ensuring designs meet requirements for scalability, security, performance, and maintainability. Develop and maintain architectural standards and design principles in line with DSA architectural governance . Conduct architectural reviews, define best practices, and maintain clear, traceable documentation of technical decisions. Oversee the design of new data-visualisation components, ensuring optimal integration with existing systems. Team Leadership & Delivery Lead and mentor a cross-functional technical team of six across Architecture, DevOps, Data Engineering, and Software Development. Ensure alignment to the project's technical strategy, promoting quality, consistency, and timely delivery. Act as an escalation point for technical blockers, providing guidance and direction to resolve complex issues. Support the growth and development of team members through coaching, knowledge sharing, and structured feedback. Collaboration & Stakeholder Engagement Work closely with Delivery Leads, Business Analysts, and Product Leads to shape and refine technical requirements. Advise on technical feasibility, delivery timelines, and risk management, ensuring well-informed decision-making. Support stakeholder engagement by communicating complex technical concepts in a clear, accessible way. Ensure all architectural decisions align with business objectives, user needs, and compliance requirements. Required Skills & Experience Proven experience as a Lead Architect, Solutions Architect, or similar senior technical leadership role. Strong background designing scalable, secure, and high-performance platforms. Experience leading multidisciplinary technical teams and driving delivery in complex environments. Excellent understanding of architectural governance frameworks and documentation practices. Ability to manage competing priorities while maintaining high-quality outputs. Strong communication and stakeholder-management skills. SC Clearance or eligibility to obtain it.
10/12/2025
Contractor
Job Title: Lead Architect Location: Remote Start Date: Estimated 19 January 2026 Clearance: SC Clearance (or eligibility to obtain) Day rate : 540 Role Overview We are seeking a highly experienced Lead Architect to own the solution and technical architecture for a major platform and its new data-visualisation components. This role requires a strategic leader capable of embedding scalability, security, and performance into every aspect of the solution while guiding a multidisciplinary technical team. The ideal candidate will blend hands-on architectural expertise with strong leadership, governance, and stakeholder-management skills Key Responsibilities Architecture Leadership Own the end-to-end solution architecture for the platform, ensuring designs meet requirements for scalability, security, performance, and maintainability. Develop and maintain architectural standards and design principles in line with DSA architectural governance . Conduct architectural reviews, define best practices, and maintain clear, traceable documentation of technical decisions. Oversee the design of new data-visualisation components, ensuring optimal integration with existing systems. Team Leadership & Delivery Lead and mentor a cross-functional technical team of six across Architecture, DevOps, Data Engineering, and Software Development. Ensure alignment to the project's technical strategy, promoting quality, consistency, and timely delivery. Act as an escalation point for technical blockers, providing guidance and direction to resolve complex issues. Support the growth and development of team members through coaching, knowledge sharing, and structured feedback. Collaboration & Stakeholder Engagement Work closely with Delivery Leads, Business Analysts, and Product Leads to shape and refine technical requirements. Advise on technical feasibility, delivery timelines, and risk management, ensuring well-informed decision-making. Support stakeholder engagement by communicating complex technical concepts in a clear, accessible way. Ensure all architectural decisions align with business objectives, user needs, and compliance requirements. Required Skills & Experience Proven experience as a Lead Architect, Solutions Architect, or similar senior technical leadership role. Strong background designing scalable, secure, and high-performance platforms. Experience leading multidisciplinary technical teams and driving delivery in complex environments. Excellent understanding of architectural governance frameworks and documentation practices. Ability to manage competing priorities while maintaining high-quality outputs. Strong communication and stakeholder-management skills. SC Clearance or eligibility to obtain it.
Senior SOC Analyst (DV Cleared) Duration: 12 Months Location: Milton Keynes Rate: £600-£650 per day IR35 Status: Inside Start: ASAP A Senior SOC Analyst (DV Cleared) is required for our Government client to be part of their security team providing a 24x7 service helping to protect the organisation from cyber threats. You will be part of a 24x7 team responsible for monitoring their systems, detecting potential security incidents and initiating the incident response process. Essential skills & experience required: As the Senior SOC Analyst you will possess current security clearance to DV Level together with experience of SPLUNK within a security operations centre (SOC) Possess excellent problem solving abilities, attention to detail and the capacity to work under pressure and comfortable working within a team environment. Have a good understanding of networking concepts (TCP/IP, DNS etc ) Windows and Linux O/Systems Common cyber attack techniques Any Cyber security certifications would be desirable. Responsibilities include: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. Analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents. For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Create detailed tickets and reports for all detected incidents, documenting your findings and the steps you have taken as this is crucial for tracking incidents and for future analysis. Also to assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively. To apply for this role please email your CV to: (see below) Certes IT Service Solutions welcomes applications from all sections of the community and from people with diverse experience and backgrounds Certes Computing (and all of its subsidiary companies) is committed to promoting equality and diversity in its business operations.
09/12/2025
Contractor
Senior SOC Analyst (DV Cleared) Duration: 12 Months Location: Milton Keynes Rate: £600-£650 per day IR35 Status: Inside Start: ASAP A Senior SOC Analyst (DV Cleared) is required for our Government client to be part of their security team providing a 24x7 service helping to protect the organisation from cyber threats. You will be part of a 24x7 team responsible for monitoring their systems, detecting potential security incidents and initiating the incident response process. Essential skills & experience required: As the Senior SOC Analyst you will possess current security clearance to DV Level together with experience of SPLUNK within a security operations centre (SOC) Possess excellent problem solving abilities, attention to detail and the capacity to work under pressure and comfortable working within a team environment. Have a good understanding of networking concepts (TCP/IP, DNS etc ) Windows and Linux O/Systems Common cyber attack techniques Any Cyber security certifications would be desirable. Responsibilities include: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. Analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents. For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Create detailed tickets and reports for all detected incidents, documenting your findings and the steps you have taken as this is crucial for tracking incidents and for future analysis. Also to assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively. To apply for this role please email your CV to: (see below) Certes IT Service Solutions welcomes applications from all sections of the community and from people with diverse experience and backgrounds Certes Computing (and all of its subsidiary companies) is committed to promoting equality and diversity in its business operations.
LA International Computer Consultants Ltd
East Kilbride, Lanarkshire
We have a number of Lead and Senior SOC Analyst roles requiring a high level of Security Clearance. The roles will be based fully onsite in East Kilbride covering a 24/7 shift rota. You will be a part of a 24/7 team responsible for monitoring our systems, detecting potential security incidents, and initiating the incident response process. Key Responsibilities Continuous Monitoring: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. You will be the first to see potential threats and will need to be efficient and professional response against defined processes. Incident Triage: You will analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents. Initial Incident Response: For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Reporting and Documentation: You'll create detailed tickets and reports for all detected incidents, documenting your findings and the steps you took. This is crucial for tracking incidents and for future analysis. Tool Management: You will assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively. Essential skills & experience include: - Excellent problem-solving abilities, strong attention to detail, and the capacity to work under pressure. You should be a strong communicator, both written and verbal, and be comfortable working in a team environment. - Experience of SPLUNK within a Security Operations Centre (SOC). Education: A bachelor's degree in computer science, Cyber Security, Information Technology, or a related field is preferred. Relevant experience may be substituted for a degree. Knowledge: You should have a foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques. Certifications: While not required, certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus to the role. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment which can take up to a minimum 18 weeks. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
09/12/2025
Contractor
We have a number of Lead and Senior SOC Analyst roles requiring a high level of Security Clearance. The roles will be based fully onsite in East Kilbride covering a 24/7 shift rota. You will be a part of a 24/7 team responsible for monitoring our systems, detecting potential security incidents, and initiating the incident response process. Key Responsibilities Continuous Monitoring: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. You will be the first to see potential threats and will need to be efficient and professional response against defined processes. Incident Triage: You will analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents. Initial Incident Response: For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Reporting and Documentation: You'll create detailed tickets and reports for all detected incidents, documenting your findings and the steps you took. This is crucial for tracking incidents and for future analysis. Tool Management: You will assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively. Essential skills & experience include: - Excellent problem-solving abilities, strong attention to detail, and the capacity to work under pressure. You should be a strong communicator, both written and verbal, and be comfortable working in a team environment. - Experience of SPLUNK within a Security Operations Centre (SOC). Education: A bachelor's degree in computer science, Cyber Security, Information Technology, or a related field is preferred. Relevant experience may be substituted for a degree. Knowledge: You should have a foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques. Certifications: While not required, certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus to the role. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment which can take up to a minimum 18 weeks. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
Enterprise Architecture Modelling SME Must have an Active DV Clearance Join a high-performing Defence and National Security programme as an Enterprise Architecture Modelling SME, where you will design and manage enterprise architecture models that guide strategic decision making across complex systems. This is an opportunity to work within a multi skilled agile team, shaping how technology, applications, and business processes align to deliver secure and effective outcomes. About the Role - Enterprise Architecture Modelling SME As an Enterprise Architecture Modelling SME, you will create and manage enterprise architecture models across business, application, and technology layers using the ArchiMate standard. You will develop clear viewpoints, diagrams, and capability maps to communicate architectural direction to stakeholders. The role involves conducting impact and gap analyses, scenario modelling, and supporting decision making on proposed changes. You will work closely with analysts, project managers, data architects, and engineers to ensure solutions align with defined blueprints. You will automate documentation outputs from models to support knowledge transfer and reduce manual effort. What We're Looking For - Enterprise Architecture Modelling SME Strong experience applying ArchiMate 3.x across multiple viewpoints. Familiarity with architecture tools such as Archi, Sparx EA, or BizzDesign. Ability to visualise complex systems and produce clear analytical outputs. Excellent communication skills to explain architectural concepts to technical and non technical audiences. Strong problem solving ability with a structured and proactive approach. Make a meaningful impact as an Enterprise Architecture Modelling SME in a secure, mission focused environment. To apply, please send your CV by pressing the apply button. JBRP1_UKTJ
06/12/2025
Full time
Enterprise Architecture Modelling SME Must have an Active DV Clearance Join a high-performing Defence and National Security programme as an Enterprise Architecture Modelling SME, where you will design and manage enterprise architecture models that guide strategic decision making across complex systems. This is an opportunity to work within a multi skilled agile team, shaping how technology, applications, and business processes align to deliver secure and effective outcomes. About the Role - Enterprise Architecture Modelling SME As an Enterprise Architecture Modelling SME, you will create and manage enterprise architecture models across business, application, and technology layers using the ArchiMate standard. You will develop clear viewpoints, diagrams, and capability maps to communicate architectural direction to stakeholders. The role involves conducting impact and gap analyses, scenario modelling, and supporting decision making on proposed changes. You will work closely with analysts, project managers, data architects, and engineers to ensure solutions align with defined blueprints. You will automate documentation outputs from models to support knowledge transfer and reduce manual effort. What We're Looking For - Enterprise Architecture Modelling SME Strong experience applying ArchiMate 3.x across multiple viewpoints. Familiarity with architecture tools such as Archi, Sparx EA, or BizzDesign. Ability to visualise complex systems and produce clear analytical outputs. Excellent communication skills to explain architectural concepts to technical and non technical audiences. Strong problem solving ability with a structured and proactive approach. Make a meaningful impact as an Enterprise Architecture Modelling SME in a secure, mission focused environment. To apply, please send your CV by pressing the apply button. JBRP1_UKTJ
JOB ADVERT - Service Desk Analyst Job Title: Service Desk Analyst Location: Portsmouth - Portsdown Hill Security Clearance: SC (or ability to obtain) We are looking for a customer-focused Service Desk Analyst to join our IT Service Management function supporting a secure MOD private cloud environment. This role is ideal for individuals with experience in IT support or service operations who are looking to grow their capabilities within an ITIL 4-aligned setting. Working as part of a dedicated service team, you will provide first-line technical support, ensure incidents and service requests are handled efficiently, and contribute to the continuous improvement of our digital services. Key responsibilities Act as the first point of contact for users, providing high-quality customer support. Log, prioritise and categorise incidents and requests using Jira Service Management. Perform initial investigation and diagnosis, resolving issues where possible. Escalate incidents to resolver groups following defined workflows. Maintain accurate and clear records of all interactions. Use and improve knowledge articles in Confluence. Support major incident communication and coordination. Contribute to service improvement initiatives. Work in alignment with ITIL 4 practices and ISO 20000 processes. What we're looking for ITIL 4 Foundation Experience in an IT support or customer-facing technical role. Working knowledge of ITIL processes (Incident, Request, Service Desk). Experience with Jira Service Management or similar ITSM tooling. Excellent communication and customer-service skills. Strong problem-solving and triage ability. Eligibility and willingness to obtain SC clearance. Desirable MoD, Defence or wider UK Government experience Confluence and Jira familiarity Understanding of continuous improvement This is an excellent opportunity to grow your career within a structured, secure, and modern IT service environment. Guidant, Carbon60, Lorien & SRG - The Impellam Group Portfolio are acting as an Employment Business in relation to this vacancy.
04/12/2025
Contractor
JOB ADVERT - Service Desk Analyst Job Title: Service Desk Analyst Location: Portsmouth - Portsdown Hill Security Clearance: SC (or ability to obtain) We are looking for a customer-focused Service Desk Analyst to join our IT Service Management function supporting a secure MOD private cloud environment. This role is ideal for individuals with experience in IT support or service operations who are looking to grow their capabilities within an ITIL 4-aligned setting. Working as part of a dedicated service team, you will provide first-line technical support, ensure incidents and service requests are handled efficiently, and contribute to the continuous improvement of our digital services. Key responsibilities Act as the first point of contact for users, providing high-quality customer support. Log, prioritise and categorise incidents and requests using Jira Service Management. Perform initial investigation and diagnosis, resolving issues where possible. Escalate incidents to resolver groups following defined workflows. Maintain accurate and clear records of all interactions. Use and improve knowledge articles in Confluence. Support major incident communication and coordination. Contribute to service improvement initiatives. Work in alignment with ITIL 4 practices and ISO 20000 processes. What we're looking for ITIL 4 Foundation Experience in an IT support or customer-facing technical role. Working knowledge of ITIL processes (Incident, Request, Service Desk). Experience with Jira Service Management or similar ITSM tooling. Excellent communication and customer-service skills. Strong problem-solving and triage ability. Eligibility and willingness to obtain SC clearance. Desirable MoD, Defence or wider UK Government experience Confluence and Jira familiarity Understanding of continuous improvement This is an excellent opportunity to grow your career within a structured, secure, and modern IT service environment. Guidant, Carbon60, Lorien & SRG - The Impellam Group Portfolio are acting as an Employment Business in relation to this vacancy.
Bolton The CERT Incident Responder is responsible for leading digital forensics and incident response (DFIR) readiness. While also advancing the organisation's Adversarial Exposure Validation (AEV)- including Red and Purple Team activities The role ensures detection, response, and control validation against real-world threat actor tactics, techniques, and procedures (TTPs). Salary: £50,000 - £60,000 depending on experience Dynamic (hybrid) working: Minimum 2 days per week on-site due to workload classification Security Clearance: British Citizen or a Dual UK national with British citizenship. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS), which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Overtime: opportunity for paid overtime Flexi Leave: Up to 15 additional days Flexible working: We welcome applicants who are looking for flexible working arrangements Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more Healthcare Cash Plan: The Healthcare Cash Plan benefit provides the option to claim cash back on everyday healthcare expenses such as optical, dental, health and wellbeing and more . The opportunity: The CERT Incident Responder is responsible for leading digital forensics and incident response (DFIR) readiness. While also advancing the organisation's Adversarial Exposure Validation (AEV)- including Red and Purple Team activities. The role ensures detection, response, and control validation against real-world threat actor tactics, techniques, and procedures (TTPs). This is a Next step role for an experienced Analyst with a passion for Incident response and Threat mitigation. Essentials: Lead digital forensics and incident response (DFIR) activities, ensuring lab readiness, artefact management, and delivery of forensic objectives. Maintain and enhance forensic tools and environments (e.g., Magnet Axiom, Autopsy) to ensure operational capability. Conduct detailed forensic analysis, malware reverse engineering, and cyber investigation of complex incidents. Ensure effective chain of custody, artefact preservation, and evidence handling processes. Maintain accurate digital forensics documentation, incident playbooks, and readiness rehearsal materials. Lead and execute tabletop exercises (TTEx) to test and improve incident response and forensic readiness. Perform network and endpoint investigations, including AV scans, incident remediation, and validation of security alerts. Collaborate with IM/DEx and Security Operations to enhance incident reporting, alerting, and notification services. Deputise for CERT responders during major incidents or third-party attacks, coordinating with national and international partners (e.g., NCPC). Develop and maintain enterprise security documentation, including policies, standards, baselines, and playbooks. Desirables: Identify root causes of security incidents and recommend sustainable mitigation strategies. Manage remediation and closure of security cases, ensuring timely implementation of corrective actions. Develop and maintain threat scenarios to validate detection and response across SOC, EDR, SIEM, and XDR platforms. Translate threat intelligence into testable hypotheses and simulation exercises in collaboration with Threat Intelligence teams. Utilise adversarial emulation tools (Caldera, Atomic Red Team, AttackIQ, SCYTHE, Cobalt Strike, etc.) to replicate realistic attacker behaviours. Research and integrate emerging threats and TTPs into adversary emulation and validation methodologies. Produce detailed reporting and metrics on detection coverage, response performance, and control effectiveness. Support the wider IM/DEx team by validating new or updated controls against advanced threat simulations. Support SOC operations with investigation, alert triage, and implementation of lessons learned from adversarial validation and DFIR activities. Research and evaluate emerging security tools, technologies, and methodologies; provide gap analysis and recommendations to influence investment. Deliver metrics, dashboards, and reports demonstrating adversarial resilience and capability maturity. Contribute to small-to-medium cyber projects enhancing threat detection, emulation, and response maturity. What we're looking for from you: Demonstratable experience handling incidents, such as: Ransomware containment + remediation Business email compromise investigations Cloud account takeover Insider threat events Large-scale phishing attacks Leading incident response calls, advising leadership, and writing executive summaries Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information. JBRP1_UKTJ
02/12/2025
Full time
Bolton The CERT Incident Responder is responsible for leading digital forensics and incident response (DFIR) readiness. While also advancing the organisation's Adversarial Exposure Validation (AEV)- including Red and Purple Team activities The role ensures detection, response, and control validation against real-world threat actor tactics, techniques, and procedures (TTPs). Salary: £50,000 - £60,000 depending on experience Dynamic (hybrid) working: Minimum 2 days per week on-site due to workload classification Security Clearance: British Citizen or a Dual UK national with British citizenship. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS), which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Overtime: opportunity for paid overtime Flexi Leave: Up to 15 additional days Flexible working: We welcome applicants who are looking for flexible working arrangements Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more Healthcare Cash Plan: The Healthcare Cash Plan benefit provides the option to claim cash back on everyday healthcare expenses such as optical, dental, health and wellbeing and more . The opportunity: The CERT Incident Responder is responsible for leading digital forensics and incident response (DFIR) readiness. While also advancing the organisation's Adversarial Exposure Validation (AEV)- including Red and Purple Team activities. The role ensures detection, response, and control validation against real-world threat actor tactics, techniques, and procedures (TTPs). This is a Next step role for an experienced Analyst with a passion for Incident response and Threat mitigation. Essentials: Lead digital forensics and incident response (DFIR) activities, ensuring lab readiness, artefact management, and delivery of forensic objectives. Maintain and enhance forensic tools and environments (e.g., Magnet Axiom, Autopsy) to ensure operational capability. Conduct detailed forensic analysis, malware reverse engineering, and cyber investigation of complex incidents. Ensure effective chain of custody, artefact preservation, and evidence handling processes. Maintain accurate digital forensics documentation, incident playbooks, and readiness rehearsal materials. Lead and execute tabletop exercises (TTEx) to test and improve incident response and forensic readiness. Perform network and endpoint investigations, including AV scans, incident remediation, and validation of security alerts. Collaborate with IM/DEx and Security Operations to enhance incident reporting, alerting, and notification services. Deputise for CERT responders during major incidents or third-party attacks, coordinating with national and international partners (e.g., NCPC). Develop and maintain enterprise security documentation, including policies, standards, baselines, and playbooks. Desirables: Identify root causes of security incidents and recommend sustainable mitigation strategies. Manage remediation and closure of security cases, ensuring timely implementation of corrective actions. Develop and maintain threat scenarios to validate detection and response across SOC, EDR, SIEM, and XDR platforms. Translate threat intelligence into testable hypotheses and simulation exercises in collaboration with Threat Intelligence teams. Utilise adversarial emulation tools (Caldera, Atomic Red Team, AttackIQ, SCYTHE, Cobalt Strike, etc.) to replicate realistic attacker behaviours. Research and integrate emerging threats and TTPs into adversary emulation and validation methodologies. Produce detailed reporting and metrics on detection coverage, response performance, and control effectiveness. Support the wider IM/DEx team by validating new or updated controls against advanced threat simulations. Support SOC operations with investigation, alert triage, and implementation of lessons learned from adversarial validation and DFIR activities. Research and evaluate emerging security tools, technologies, and methodologies; provide gap analysis and recommendations to influence investment. Deliver metrics, dashboards, and reports demonstrating adversarial resilience and capability maturity. Contribute to small-to-medium cyber projects enhancing threat detection, emulation, and response maturity. What we're looking for from you: Demonstratable experience handling incidents, such as: Ransomware containment + remediation Business email compromise investigations Cloud account takeover Insider threat events Large-scale phishing attacks Leading incident response calls, advising leadership, and writing executive summaries Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information. JBRP1_UKTJ
Level 1 SOC Analyst Up to 460pd DOE (Umbrella) DV Clearance required Milton Keynes - Hybrid 3 days in office 6-month contract Mon - Fri (Days) Are you a DV Cleared Practitioner SOC Analyst looking for an immediately available, long term contract role? My government client requires a DV Cleared SOC analyst to join their team on an initial 6-month contract basis. You will be required to be onsite in Milton Keynes for 3 days per week. Duties: Monitor, triage and investigate Security Alerts on the various monitoring tools to identify potential Security Incidents. Escalate suspected Security Incidents to the Lead Analysts. Assist Lead Analysts and Incident Response team with investigation and containment. Maintain knowledge of technology and cyber threats by reading Threat Intel, reports, attending Threat Intel briefings and self-study. Perform analysis of Security Event Data / Security Alerts to support Customers in responding to Security Incidents. Ensure Protective monitoring tools are performing as expected. Assist in the Creation of procedures to report incidents to customers Assisting in the Development of the team to ensure best practice and that their knowledge is up to date. In association with other colleagues provide an on-Call service to investigate and remedy security and technical issues in relation to the SOC service on a 24/7 basis . Skills & Experience Required: Working knowledge of Various Operating systems including Windows and Linux. Experience of working with SIEM and IPS products within a SOC Environment. Good Analytical skills with the ability to manipulate, interrogate and analyse large data sets. Relevant cyber security analyst experience within a SOC environment. Knowledge of IT Networking, specifically in Firewalls and other Network security devices Strong interpersonal skills ability to assist other team members Excellent Communication Skills To apply for this role or to be considered for further roles, please click "Apply Now" Rise Technical Recruitment Ltd acts an employment agency for permanent roles and an employment business for temporary roles. The salary advertised is the bracket available for this position. The actual salary paid will be dependent on your level of experience, qualifications and skill set. We are an equal opportunities employer and welcome applications from all suitable candidates.
02/12/2025
Contractor
Level 1 SOC Analyst Up to 460pd DOE (Umbrella) DV Clearance required Milton Keynes - Hybrid 3 days in office 6-month contract Mon - Fri (Days) Are you a DV Cleared Practitioner SOC Analyst looking for an immediately available, long term contract role? My government client requires a DV Cleared SOC analyst to join their team on an initial 6-month contract basis. You will be required to be onsite in Milton Keynes for 3 days per week. Duties: Monitor, triage and investigate Security Alerts on the various monitoring tools to identify potential Security Incidents. Escalate suspected Security Incidents to the Lead Analysts. Assist Lead Analysts and Incident Response team with investigation and containment. Maintain knowledge of technology and cyber threats by reading Threat Intel, reports, attending Threat Intel briefings and self-study. Perform analysis of Security Event Data / Security Alerts to support Customers in responding to Security Incidents. Ensure Protective monitoring tools are performing as expected. Assist in the Creation of procedures to report incidents to customers Assisting in the Development of the team to ensure best practice and that their knowledge is up to date. In association with other colleagues provide an on-Call service to investigate and remedy security and technical issues in relation to the SOC service on a 24/7 basis . Skills & Experience Required: Working knowledge of Various Operating systems including Windows and Linux. Experience of working with SIEM and IPS products within a SOC Environment. Good Analytical skills with the ability to manipulate, interrogate and analyse large data sets. Relevant cyber security analyst experience within a SOC environment. Knowledge of IT Networking, specifically in Firewalls and other Network security devices Strong interpersonal skills ability to assist other team members Excellent Communication Skills To apply for this role or to be considered for further roles, please click "Apply Now" Rise Technical Recruitment Ltd acts an employment agency for permanent roles and an employment business for temporary roles. The salary advertised is the bracket available for this position. The actual salary paid will be dependent on your level of experience, qualifications and skill set. We are an equal opportunities employer and welcome applications from all suitable candidates.
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 8x SOC Threat Detection Analyst subcontractors on an initial 6 month contract. This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit someone from a Cyber Security Analyst, SOC Analyst or Threat Detection Analyst background. Hourly Rate: 45ph - 85 per hour. There are 8 positions being recruited across the mid-senior level. Overtime rate of time and a quarter. Contract Duration: 6 Months initially and long-term thereafter. Shift pattern: 28 day Cycle Sat to Tue - Earlies (Apply online only) Wed to Sun - Off Mon to Fri - Lates (Apply online only) Sat to Tue Off Wed to Sun - Nights (Apply online only) (The type of shift rotates along the pattern through, so the start of the next 28 day cycle they start with lates -> Nights -> earlies then next cycle: Nights -> earlies -> lates) 28 days = 4 weeks, 14 days worked per 28 days, 3.5 days worked per week, 3.5 x 8 = 28 hours per week Initially may not be expected to do nights until team grows. SOC Threat Detection Analyst Job Description: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Responsibilities: To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. The SOC Analyst reports to the SOC Manager. The SOC Analyst conducts a range of analysis and assists the incident response team with investigations that need to be escalated to an embedded member of staff. The SOC Analyst key responsibilities are: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement Skillset/experience required (Baseline): A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. Desirable Skillset/experience (Senior grade): Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies
02/12/2025
Contractor
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 8x SOC Threat Detection Analyst subcontractors on an initial 6 month contract. This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit someone from a Cyber Security Analyst, SOC Analyst or Threat Detection Analyst background. Hourly Rate: 45ph - 85 per hour. There are 8 positions being recruited across the mid-senior level. Overtime rate of time and a quarter. Contract Duration: 6 Months initially and long-term thereafter. Shift pattern: 28 day Cycle Sat to Tue - Earlies (Apply online only) Wed to Sun - Off Mon to Fri - Lates (Apply online only) Sat to Tue Off Wed to Sun - Nights (Apply online only) (The type of shift rotates along the pattern through, so the start of the next 28 day cycle they start with lates -> Nights -> earlies then next cycle: Nights -> earlies -> lates) 28 days = 4 weeks, 14 days worked per 28 days, 3.5 days worked per week, 3.5 x 8 = 28 hours per week Initially may not be expected to do nights until team grows. SOC Threat Detection Analyst Job Description: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Responsibilities: To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. The SOC Analyst reports to the SOC Manager. The SOC Analyst conducts a range of analysis and assists the incident response team with investigations that need to be escalated to an embedded member of staff. The SOC Analyst key responsibilities are: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement Skillset/experience required (Baseline): A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. Desirable Skillset/experience (Senior grade): Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies
Business Analyst - Telecoms / Defence / SCIDA Support - Fixed Term Contract (FTC) till 2027 Location: Warwick HQ (CV34 5AH) - Hybrid working Industry: Telecoms, MOD, Defence, Critical National Infrastructure Package: Competitive starting salary + Matched Pension + Flexible Benefits Join Telent and play a key role in supporting the UK's critical national infrastructure. Our Business Analysts are central to driving improvement, shaping transformation, and ensuring operational excellence across our organisation. In this Business Analyst role, you will provide support to the SCIDA programme , applying structured analysis and process rigour to help maintain high-integrity communications environments. We're looking for individuals ideally from Telecoms, MOD, RAF, or wider Forces backgrounds , with strong analytical and auditing skills, and based within commuting distance of our Warwick headquarters - Hybrid working. Full Right to Work in the UK required, and eligibility to gain NPPV3 / SC Security Clearance. The Role: As a Business Analyst at Telent, you'll support both business-as-usual and transformation activity, delivering high-quality insights, process improvements and reporting that directly influence operational performance. You will collaborate across multiple teams, develop meaningful relationships with stakeholders, and ensure our business areas have the information and processes they need to operate effectively. Business Analyst - What You'll Do Create and consolidate business reporting for designated areas Maintain and improve data quality and information storage (Oracle ERP, Salesforce CRM, SharePoint, M365) Develop, maintain and quality-check process maps and operational documentation Work with stakeholders to design and review new or updated procedures Support leadership teams with business improvement programmes Partner with project teams, operational leads and managers to produce analysis and documentation Build strong working relationships and respond to stakeholder queries with clear research and recommendations Assess data, gather requirements and model business processes Identify cost savings, efficiency opportunities and process improvements Support testing, implementation and transition of solutions Act as a Lean efficiency "waste champion" (Tim Woods methodology) Provide trusted advice and insights to senior managers Support the SCIDA programme with structured analysis and documentation activities Business Analyst - Who You Are: You are an organised, analytical and proactive Business Analyst with strong communication skills and a background in process improvement. You're comfortable working in structured or regulated environments - such as telecoms, defence, or forces roles - and you can translate complex problems into clear, actionable solutions. You work well across teams, manage multiple tasks confidently, and maintain high attention to detail. Business Analyst - Key Requirements: Strong organisational skills and ability to meet tight timelines Excellent communication, active listening and presentation skills Experience collaborating with distributed teams and external partners Ability to write clear requirements, business cases and structured documentation Strong working knowledge of Microsoft 365 and Visio Experience with databases and reporting tools Ability to produce process documentation, maps and reports Understanding of operational business processes Degree in Business Studies, Business Administration / Management or equivalent experience Commitment to continuous professional development Experience with Microsoft Apps (Teams, Forms, Power Automate, Lists, SharePoint, Planner etc) Confident user of and experience of PowerBI, VLOOKUP, Pivot Tables (MS Excel) Capability to define, measure and report on KPIs Previous experience in business and/or data analysis supporting system and process improvement Ability to simplify complex problems into practical, user-focused solutions Knowledge of standards and processes relevant to telecoms or defence disciplines Project management experience desirable IIBA certification or working towards it (or equivalent) Full right to work in the UK - eligibility to gain NPPV3 / SC Security Clearance Telent - What We Offer: A career at Telent offers opportunities to grow, learn and contribute to nationally important work. We value diversity, encourage new thinking and help our people reach their potential. Benefits include: 26 days annual leave + 8 bank holidays (with buy/sell options) Company matched pension Family-friendly policies and access to the Flexible Benefits portal Wellbeing and occupational health support Telent Reward scheme - discounts on cinema, restaurants, shopping and more We're passionate about creating an environment that champions diversity and inclusion, where everyone feels they belong, can be themselves and empowered to reach their full potential. People are at the heart of our business, and we believe that our teams should reflect the diverse experiences and backgrounds of the communities we support. Telent Core Values: Be Collaborative, Be Inclusive, Be Customer Focused, Take Responsibility
27/11/2025
Seasonal
Business Analyst - Telecoms / Defence / SCIDA Support - Fixed Term Contract (FTC) till 2027 Location: Warwick HQ (CV34 5AH) - Hybrid working Industry: Telecoms, MOD, Defence, Critical National Infrastructure Package: Competitive starting salary + Matched Pension + Flexible Benefits Join Telent and play a key role in supporting the UK's critical national infrastructure. Our Business Analysts are central to driving improvement, shaping transformation, and ensuring operational excellence across our organisation. In this Business Analyst role, you will provide support to the SCIDA programme , applying structured analysis and process rigour to help maintain high-integrity communications environments. We're looking for individuals ideally from Telecoms, MOD, RAF, or wider Forces backgrounds , with strong analytical and auditing skills, and based within commuting distance of our Warwick headquarters - Hybrid working. Full Right to Work in the UK required, and eligibility to gain NPPV3 / SC Security Clearance. The Role: As a Business Analyst at Telent, you'll support both business-as-usual and transformation activity, delivering high-quality insights, process improvements and reporting that directly influence operational performance. You will collaborate across multiple teams, develop meaningful relationships with stakeholders, and ensure our business areas have the information and processes they need to operate effectively. Business Analyst - What You'll Do Create and consolidate business reporting for designated areas Maintain and improve data quality and information storage (Oracle ERP, Salesforce CRM, SharePoint, M365) Develop, maintain and quality-check process maps and operational documentation Work with stakeholders to design and review new or updated procedures Support leadership teams with business improvement programmes Partner with project teams, operational leads and managers to produce analysis and documentation Build strong working relationships and respond to stakeholder queries with clear research and recommendations Assess data, gather requirements and model business processes Identify cost savings, efficiency opportunities and process improvements Support testing, implementation and transition of solutions Act as a Lean efficiency "waste champion" (Tim Woods methodology) Provide trusted advice and insights to senior managers Support the SCIDA programme with structured analysis and documentation activities Business Analyst - Who You Are: You are an organised, analytical and proactive Business Analyst with strong communication skills and a background in process improvement. You're comfortable working in structured or regulated environments - such as telecoms, defence, or forces roles - and you can translate complex problems into clear, actionable solutions. You work well across teams, manage multiple tasks confidently, and maintain high attention to detail. Business Analyst - Key Requirements: Strong organisational skills and ability to meet tight timelines Excellent communication, active listening and presentation skills Experience collaborating with distributed teams and external partners Ability to write clear requirements, business cases and structured documentation Strong working knowledge of Microsoft 365 and Visio Experience with databases and reporting tools Ability to produce process documentation, maps and reports Understanding of operational business processes Degree in Business Studies, Business Administration / Management or equivalent experience Commitment to continuous professional development Experience with Microsoft Apps (Teams, Forms, Power Automate, Lists, SharePoint, Planner etc) Confident user of and experience of PowerBI, VLOOKUP, Pivot Tables (MS Excel) Capability to define, measure and report on KPIs Previous experience in business and/or data analysis supporting system and process improvement Ability to simplify complex problems into practical, user-focused solutions Knowledge of standards and processes relevant to telecoms or defence disciplines Project management experience desirable IIBA certification or working towards it (or equivalent) Full right to work in the UK - eligibility to gain NPPV3 / SC Security Clearance Telent - What We Offer: A career at Telent offers opportunities to grow, learn and contribute to nationally important work. We value diversity, encourage new thinking and help our people reach their potential. Benefits include: 26 days annual leave + 8 bank holidays (with buy/sell options) Company matched pension Family-friendly policies and access to the Flexible Benefits portal Wellbeing and occupational health support Telent Reward scheme - discounts on cinema, restaurants, shopping and more We're passionate about creating an environment that champions diversity and inclusion, where everyone feels they belong, can be themselves and empowered to reach their full potential. People are at the heart of our business, and we believe that our teams should reflect the diverse experiences and backgrounds of the communities we support. Telent Core Values: Be Collaborative, Be Inclusive, Be Customer Focused, Take Responsibility
Enterprise Architecture Modelling SME Must have an Active DV Clearance Join a high-performing Defence and National Security programme as an Enterprise Architecture Modelling SME , where you will design and manage enterprise architecture models that guide strategic decision making across complex systems. This is an opportunity to work within a multi skilled agile team, shaping how technology, applications, and business processes align to deliver secure and effective outcomes. About the Role - Enterprise Architecture Modelling SME As an Enterprise Architecture Modelling SME , you will create and manage enterprise architecture models across business, application, and technology layers using the ArchiMate standard. You will develop clear viewpoints, diagrams, and capability maps to communicate architectural direction to stakeholders. The role involves conducting impact and gap analyses, scenario modelling, and supporting decision making on proposed changes. You will work closely with analysts, project managers, data architects, and engineers to ensure solutions align with defined blueprints. You will automate documentation outputs from models to support knowledge transfer and reduce manual effort. What We're Looking For - Enterprise Architecture Modelling SME Strong experience applying ArchiMate 3.x across multiple viewpoints. Familiarity with architecture tools such as Archi, Sparx EA, or BizzDesign . Ability to visualise complex systems and produce clear analytical outputs. Excellent communication skills to explain architectural concepts to technical and non technical audiences. Strong problem solving ability with a structured and proactive approach. Make a meaningful impact as an Enterprise Architecture Modelling SME in a secure, mission focused environment. To apply, please send your CV by pressing the apply button.
20/11/2025
Contractor
Enterprise Architecture Modelling SME Must have an Active DV Clearance Join a high-performing Defence and National Security programme as an Enterprise Architecture Modelling SME , where you will design and manage enterprise architecture models that guide strategic decision making across complex systems. This is an opportunity to work within a multi skilled agile team, shaping how technology, applications, and business processes align to deliver secure and effective outcomes. About the Role - Enterprise Architecture Modelling SME As an Enterprise Architecture Modelling SME , you will create and manage enterprise architecture models across business, application, and technology layers using the ArchiMate standard. You will develop clear viewpoints, diagrams, and capability maps to communicate architectural direction to stakeholders. The role involves conducting impact and gap analyses, scenario modelling, and supporting decision making on proposed changes. You will work closely with analysts, project managers, data architects, and engineers to ensure solutions align with defined blueprints. You will automate documentation outputs from models to support knowledge transfer and reduce manual effort. What We're Looking For - Enterprise Architecture Modelling SME Strong experience applying ArchiMate 3.x across multiple viewpoints. Familiarity with architecture tools such as Archi, Sparx EA, or BizzDesign . Ability to visualise complex systems and produce clear analytical outputs. Excellent communication skills to explain architectural concepts to technical and non technical audiences. Strong problem solving ability with a structured and proactive approach. Make a meaningful impact as an Enterprise Architecture Modelling SME in a secure, mission focused environment. To apply, please send your CV by pressing the apply button.
A leading manufacturing company in Kidlington, Oxfordshire are looking for a Technical Support Analyst to join the business. Main responsibilities To undertake technical activities concerning the installation and support of computer and related equipment, ensuring the smooth running of the company's business with the minimum of disruption. To act as first line support for all helpdesk requests and incidents Provide first-line technical support to end-users via face-to-face interactions, telephone, and email. Install, configure, and maintain desktop and laptop PCs. Support and troubleshoot issues related to telephone systems. Provide support for audio-visual equipment, projectors, and video conference facilities. Manage the resolution of IT issues, problems, service requests, and changes using the Helpdesk tool. Conduct audits of computers to ensure all software is authorised and licensed. Maintain an accurate inventory/database of IT hardware and software. Liaise with third-party IT support companies and vendors as required. Provide IT support to other offices as needed. Perform any other IM or IM Admin related tasks. Adhere to defined IT standards and procedures. Purchase, Configure, install and maintain desktop and laptop PCs Maintain an inventory/database of IT hardware and software Liaise with third party IT support Companies and vendors Essential Knowledge and Skills Strong expertise in supporting Windows based PC's and servers Windows Desktop (Enterprise) MS Office & MS Products Google G-Suite Excellent troubleshooting skills and problem-solving abilities Basic understanding of network infrastructure (TCP/IP, DNS, DHCP) Experience with ticketing systems and ITIL best practices Ability to provide clear and concise technical support to non-technical users Strong communication skills, both written and verbal Ability to work independently and as part of a team Desirable Windows Server Firewalls (Checkpoint, PALO ALTO) Active Directory Basic Networking Telephony IT Security Virtualisation (VMware) MDM Platforms Mobile Phone Support (IOS & Android) Education, Qualifications or Training A Qualification in IT (A+ or MCSE) Experience in a Technical support environment Able to obtain SC Clearance Desirable Computer science related degree Working knowledge of other IT operating systems (Linux) Experience working in a secure environment Additional requirements If you have not been a resident for the last 5 consecutive years, please be prepared to request an overseas criminal record check for these countries as you will be asked to provide this for referencing and security checks. You must possess the current, legal right to work in the United Kingdom. They will not be able to offer sponsorship for any employment Visa's. Benefits Competitive salary Private Medical Insurance (Bupa) - single cover for employees paid by the company Pension: Employees are auto enrolled into the Airbus Group UK Retirement Fund. Initially, AH contributes 6%, employee 4% basic Share Incentive Plan and ESOP. Annual share schemes at company discretion. Success Share, Discretionary Group bonus scheme (conditions apply) Bikes to Work (up to 3,000) (employee purchase scheme) Technology (employee purchase scheme) Mydrive (employee car purchase scheme) Den-Plan (employee purchase scheme) Health-care Cash Scheme Personal Accident Insurance (employee purchase scheme) Health Assessments Travel Insurance Financial/Legal Advice (eg, Will-writing; Lasting Power of Attorney)
19/11/2025
Full time
A leading manufacturing company in Kidlington, Oxfordshire are looking for a Technical Support Analyst to join the business. Main responsibilities To undertake technical activities concerning the installation and support of computer and related equipment, ensuring the smooth running of the company's business with the minimum of disruption. To act as first line support for all helpdesk requests and incidents Provide first-line technical support to end-users via face-to-face interactions, telephone, and email. Install, configure, and maintain desktop and laptop PCs. Support and troubleshoot issues related to telephone systems. Provide support for audio-visual equipment, projectors, and video conference facilities. Manage the resolution of IT issues, problems, service requests, and changes using the Helpdesk tool. Conduct audits of computers to ensure all software is authorised and licensed. Maintain an accurate inventory/database of IT hardware and software. Liaise with third-party IT support companies and vendors as required. Provide IT support to other offices as needed. Perform any other IM or IM Admin related tasks. Adhere to defined IT standards and procedures. Purchase, Configure, install and maintain desktop and laptop PCs Maintain an inventory/database of IT hardware and software Liaise with third party IT support Companies and vendors Essential Knowledge and Skills Strong expertise in supporting Windows based PC's and servers Windows Desktop (Enterprise) MS Office & MS Products Google G-Suite Excellent troubleshooting skills and problem-solving abilities Basic understanding of network infrastructure (TCP/IP, DNS, DHCP) Experience with ticketing systems and ITIL best practices Ability to provide clear and concise technical support to non-technical users Strong communication skills, both written and verbal Ability to work independently and as part of a team Desirable Windows Server Firewalls (Checkpoint, PALO ALTO) Active Directory Basic Networking Telephony IT Security Virtualisation (VMware) MDM Platforms Mobile Phone Support (IOS & Android) Education, Qualifications or Training A Qualification in IT (A+ or MCSE) Experience in a Technical support environment Able to obtain SC Clearance Desirable Computer science related degree Working knowledge of other IT operating systems (Linux) Experience working in a secure environment Additional requirements If you have not been a resident for the last 5 consecutive years, please be prepared to request an overseas criminal record check for these countries as you will be asked to provide this for referencing and security checks. You must possess the current, legal right to work in the United Kingdom. They will not be able to offer sponsorship for any employment Visa's. Benefits Competitive salary Private Medical Insurance (Bupa) - single cover for employees paid by the company Pension: Employees are auto enrolled into the Airbus Group UK Retirement Fund. Initially, AH contributes 6%, employee 4% basic Share Incentive Plan and ESOP. Annual share schemes at company discretion. Success Share, Discretionary Group bonus scheme (conditions apply) Bikes to Work (up to 3,000) (employee purchase scheme) Technology (employee purchase scheme) Mydrive (employee car purchase scheme) Den-Plan (employee purchase scheme) Health-care Cash Scheme Personal Accident Insurance (employee purchase scheme) Health Assessments Travel Insurance Financial/Legal Advice (eg, Will-writing; Lasting Power of Attorney)
Your new company I'm currently working with an exciting organisation who are seeking a highly skilled Microsoft Power Platform Developer to design, build, and maintain innovative business applications that enhance operational performance and support the delivery of infrastructure, asset, and facilities management services across the UK Defence sector This is a newly created role within a rapidly growing joint venture, offering the opportunity to shape and expand their digital capabilities from the ground up. Your new role As a key member of the Technology Team, you will play a key role in transforming business needs into powerful, scalable, and user-friendly digital solutions. Collaborating closely with business stakeholders, analysts, and IT colleagues, you will design and develop applications using Microsoft Power Apps (both Canvas and Model-Driven), automate workflows through Power Automate, and manage data structures within Dataverse. A deep understanding of business processes and the ability to translate them into effective technical solutions will be critical to success in this role. You will be responsible for integrating Power Platform solutions with the wider Microsoft 365 ecosystem-including SharePoint, Teams, and Dynamics 365-while also developing custom connectors for external APIs and services. You will take ownership of application design, configuration, testing, and deployment, ensuring that all solutions are optimised for performance, security, and user experience. Supporting end-users through documentation, troubleshooting, and training will form an important part of your remit, alongside ensuring that all developments adhere to best practices and evolving platform standards. What you'll need to succeed This role demands strong technical capability and creative problem-solving. You will be expected to leverage tools such as Power BI, Power Fx, JavaScript, JSON, and SQL to deliver insights and functionality that empower decision-making across the business. A working knowledge of Azure services, REST APIs, and custom connector development will be advantageous, as will familiarity with Agile methodologies and DevOps practices.You will bring proven experience in developing enterprise-grade Power Platform solutions and a solid understanding of data modelling, business intelligence, and database management. Experience with the broader Microsoft Business Intelligence stack-such as Power BI, SSIS, SSRS, and Azure Data Factory-is highly desirable, as is exposure to advanced analytics, including predictive and prescriptive modelling. Strong communication, collaboration, and relationship management skills are essential. You will be expected to engage effectively with diverse technical and non-technical stakeholders, manage multiple projects concurrently, and consistently deliver high-quality applications that meet business objectives. This role requires Security Check (SC) clearance and will involve regular travel across the UK to support business operations. Working arrangements are flexible, with the expectation of being on-site as required to support key delivery and collaboration activities. 2 days per week from the office in Birmingham. This is an excellent opportunity for a technically proficient and forward-thinking Power Platform professional to make a lasting impact in a dynamic and expanding organisation. What you'll get in return 6% employee matched pension contribution 25 days annual leave Single private medical cover Life assurance 2x annual salary What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now. If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
18/11/2025
Full time
Your new company I'm currently working with an exciting organisation who are seeking a highly skilled Microsoft Power Platform Developer to design, build, and maintain innovative business applications that enhance operational performance and support the delivery of infrastructure, asset, and facilities management services across the UK Defence sector This is a newly created role within a rapidly growing joint venture, offering the opportunity to shape and expand their digital capabilities from the ground up. Your new role As a key member of the Technology Team, you will play a key role in transforming business needs into powerful, scalable, and user-friendly digital solutions. Collaborating closely with business stakeholders, analysts, and IT colleagues, you will design and develop applications using Microsoft Power Apps (both Canvas and Model-Driven), automate workflows through Power Automate, and manage data structures within Dataverse. A deep understanding of business processes and the ability to translate them into effective technical solutions will be critical to success in this role. You will be responsible for integrating Power Platform solutions with the wider Microsoft 365 ecosystem-including SharePoint, Teams, and Dynamics 365-while also developing custom connectors for external APIs and services. You will take ownership of application design, configuration, testing, and deployment, ensuring that all solutions are optimised for performance, security, and user experience. Supporting end-users through documentation, troubleshooting, and training will form an important part of your remit, alongside ensuring that all developments adhere to best practices and evolving platform standards. What you'll need to succeed This role demands strong technical capability and creative problem-solving. You will be expected to leverage tools such as Power BI, Power Fx, JavaScript, JSON, and SQL to deliver insights and functionality that empower decision-making across the business. A working knowledge of Azure services, REST APIs, and custom connector development will be advantageous, as will familiarity with Agile methodologies and DevOps practices.You will bring proven experience in developing enterprise-grade Power Platform solutions and a solid understanding of data modelling, business intelligence, and database management. Experience with the broader Microsoft Business Intelligence stack-such as Power BI, SSIS, SSRS, and Azure Data Factory-is highly desirable, as is exposure to advanced analytics, including predictive and prescriptive modelling. Strong communication, collaboration, and relationship management skills are essential. You will be expected to engage effectively with diverse technical and non-technical stakeholders, manage multiple projects concurrently, and consistently deliver high-quality applications that meet business objectives. This role requires Security Check (SC) clearance and will involve regular travel across the UK to support business operations. Working arrangements are flexible, with the expectation of being on-site as required to support key delivery and collaboration activities. 2 days per week from the office in Birmingham. This is an excellent opportunity for a technically proficient and forward-thinking Power Platform professional to make a lasting impact in a dynamic and expanding organisation. What you'll get in return 6% employee matched pension contribution 25 days annual leave Single private medical cover Life assurance 2x annual salary What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now. If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
Business Analyst (eDV Clearance) Remote 60,000 - 70,000 + Clearance Bonus + Yearly Bonus + Training + Progression + Company Benefits Are you a Business Analyst or similar that has active eDV clearance that wants to work for the tech worlds global leader that helped put a man on the moon? Do you want to work for an industry leader that has some of the industries most exciting and top secret projects? This business is one of the most recognisable 3 letter tech giants that has a un-paralleled training and progression, personal development funds and full access to their certification and qualifications courses which are recognised globally. On offer is a fantastic package, best in class training from industry experts and an exciting pipeline of projects to sharpen your skills. This role would suit a Business Analyst with active eDV (Enhanced Developed Vetting Security Clearance) that wants to work on the tech industries most complex and technical challenges. THE ROLE: Work from home and secure sites in your local area Work collaboratively with other team members on Business Analyst activities Demonstrate clean digestible data sets Solve complex technical challenges THE PERSON: Business Analyst experience eDV Clearance that is active Reference: BBBH21976 If you are interested in this role, click 'Apply Now' to forward an up-to-date copy of your CV. We are an equal opportunities employer and welcome applications from all suitable candidates. The salary advertised is a guideline for this position. The remuneration offered will be dependent on the extent of your experience, qualifications, and skill set.
17/11/2025
Full time
Business Analyst (eDV Clearance) Remote 60,000 - 70,000 + Clearance Bonus + Yearly Bonus + Training + Progression + Company Benefits Are you a Business Analyst or similar that has active eDV clearance that wants to work for the tech worlds global leader that helped put a man on the moon? Do you want to work for an industry leader that has some of the industries most exciting and top secret projects? This business is one of the most recognisable 3 letter tech giants that has a un-paralleled training and progression, personal development funds and full access to their certification and qualifications courses which are recognised globally. On offer is a fantastic package, best in class training from industry experts and an exciting pipeline of projects to sharpen your skills. This role would suit a Business Analyst with active eDV (Enhanced Developed Vetting Security Clearance) that wants to work on the tech industries most complex and technical challenges. THE ROLE: Work from home and secure sites in your local area Work collaboratively with other team members on Business Analyst activities Demonstrate clean digestible data sets Solve complex technical challenges THE PERSON: Business Analyst experience eDV Clearance that is active Reference: BBBH21976 If you are interested in this role, click 'Apply Now' to forward an up-to-date copy of your CV. We are an equal opportunities employer and welcome applications from all suitable candidates. The salary advertised is a guideline for this position. The remuneration offered will be dependent on the extent of your experience, qualifications, and skill set.
Security Analyst/Detection Engineer Location: Corsham, 60% on site Duration: 20/02/2026 MUST BE PAYE THROUGH UMBRELLA We are heading up a recruitment drive for a global consultancy that require an SC or DV cleared Security Analyst/Detection Engineer to join them on a major defence project that's based in Corsham. Role description: Good Security analyst skills, knowledge of working in a MOD SOC environment beneficial, knowledge of MOD environment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, Capgemini supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' to the workplace. Must be a sole British National. Hybrid working: The position is office based, with a local agreement with the customer that allows for a limited amount of Working from Home, based around your role, your needs, and those of the business. The current agreement requires 60% attendance in the office. If you are successfully offered this position, you will go through a series of pre-employment checks, including: identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role Conduct reactive monitoring of MOD networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs You can bring your whole self to work. At Capgemini, striving for equity, diversity and inclusion is part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Experienced Tier 2 SOC analyst Knowledge of Data networks Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) Ideally have some experience with UK MOD Your security clearance
06/10/2025
Contractor
Security Analyst/Detection Engineer Location: Corsham, 60% on site Duration: 20/02/2026 MUST BE PAYE THROUGH UMBRELLA We are heading up a recruitment drive for a global consultancy that require an SC or DV cleared Security Analyst/Detection Engineer to join them on a major defence project that's based in Corsham. Role description: Good Security analyst skills, knowledge of working in a MOD SOC environment beneficial, knowledge of MOD environment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, Capgemini supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' to the workplace. Must be a sole British National. Hybrid working: The position is office based, with a local agreement with the customer that allows for a limited amount of Working from Home, based around your role, your needs, and those of the business. The current agreement requires 60% attendance in the office. If you are successfully offered this position, you will go through a series of pre-employment checks, including: identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role Conduct reactive monitoring of MOD networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs You can bring your whole self to work. At Capgemini, striving for equity, diversity and inclusion is part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Experienced Tier 2 SOC analyst Knowledge of Data networks Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) Ideally have some experience with UK MOD Your security clearance
Cybersecurity Vulnerability Lead - £700 per day - Inside IR35 - Remote - 6 Months initial contract. Our client, the UKs leading producer of Zero Carbon energy, is looking for a Cybersecurity Vulnerability Lead to join them on a contract basis. This is a senior role with responsibility for the organisation s vulnerability management programme across multiple business units, technologies, and regulatory environments. The organisation has made significant investment in Tenable as its core vulnerability management platform. You ll be expected to lead its strategic and day-to-day usage, ensuring vulnerabilities are accurately identified, prioritised, and remediated while driving continuous improvement in how the platform is integrated and utilised. Candidates with strong Tenable expertise, particularly those who have embedded it at scale in large or regulated environments such as financial services, will be especially attractive for this role. Security Clearance - Due to the sensitive nature of the work, candidates must be eligible for SC clearance. Candidates with active or recently lapsed SC clearance will be prioritised. Applicants without clearance must be willing and eligible to undergo vetting. The Role - As Cybersecurity Vulnerability Lead, you will: Own the end-to-end vulnerability management programme, with Tenable One at the core. Define and deliver the strategy, policies, SLAs, and operating rhythm. Lead on risk-based prioritisation using exploit intelligence, asset criticality, and business impact. Translate scan data into clear, actionable remediation plans for technical teams. Build dashboards and executive reports (ServiceNow, Power BI). Provide rapid risk assessments and emergency patch governance during incidents. Support audits and regulatory compliance (ISO27001, CE+, GDPR, NIS2, ONR). Drive automation, integrating tools and workflows to improve efficiency. Act as subject matter expert for Tenable and related tooling, ensuring platforms are fully leveraged. Mentor analysts and security champions, building maturity across the team. About You - You will bring experience leading vulnerability management at enterprise scale, ideally in financial services or similarly regulated industries. You should also have hands-on knowledge of the following: Core Vulnerability Management - Tenable One (Exposure Management, Attack Surface Management, Attack Paths, Identity) AWS Inspector Agent-based and network-based scanning Cloud integrations (AWS, Azure, GCP) Dashboards and risk-based prioritisation Patch & Endpoint Management - Microsoft Intune / SCCM / WSUS Jamf Workflow & ITSM Integration - ServiceNow (dashboards, SOAR) Jira Cloud & Application Security - AWS Security Hub Azure Defender for Cloud Veracode Threat Intelligence & Exploit Context - Tenable Threat Intelligence Exploit DB Metasploit SIEM, SOAR & Monitoring - Microsoft Sentinel SOAR platforms (ServiceNow SOAR) Automation & Scripting - Python, PowerShell, Bash, Ansible Reporting & Metrics - Power BI ServiceNow dashboards Excel (advanced analysis) Frameworks & Standards - NIST CSF, ISO 27001, OWASP, CE / CE+, GDPR, NIS2, ONR Security Domains / Capabilities - Identity and Access Management (IAM) Network Security Data Protection Cloud Security Controls Application Security Security Monitoring Processes & Practices - Vulnerability Management Programmes Incident Response and Threat Assessment Emergency Patch Governance Risk-based Prioritisation (CVEs, exploit intelligence, asset criticality, business impact) Audit Support (internal assurance, penetration test follow-ups, external audits) Exception and exemption management Automation of manual tasks Dashboarding for risk and SLA metrics What's on Offer - A leadership role with significant influence across a major UK organisation. Opportunity to work with a forward-thinking Cyber Services function pushing boundaries in vulnerability management.
04/10/2025
Contractor
Cybersecurity Vulnerability Lead - £700 per day - Inside IR35 - Remote - 6 Months initial contract. Our client, the UKs leading producer of Zero Carbon energy, is looking for a Cybersecurity Vulnerability Lead to join them on a contract basis. This is a senior role with responsibility for the organisation s vulnerability management programme across multiple business units, technologies, and regulatory environments. The organisation has made significant investment in Tenable as its core vulnerability management platform. You ll be expected to lead its strategic and day-to-day usage, ensuring vulnerabilities are accurately identified, prioritised, and remediated while driving continuous improvement in how the platform is integrated and utilised. Candidates with strong Tenable expertise, particularly those who have embedded it at scale in large or regulated environments such as financial services, will be especially attractive for this role. Security Clearance - Due to the sensitive nature of the work, candidates must be eligible for SC clearance. Candidates with active or recently lapsed SC clearance will be prioritised. Applicants without clearance must be willing and eligible to undergo vetting. The Role - As Cybersecurity Vulnerability Lead, you will: Own the end-to-end vulnerability management programme, with Tenable One at the core. Define and deliver the strategy, policies, SLAs, and operating rhythm. Lead on risk-based prioritisation using exploit intelligence, asset criticality, and business impact. Translate scan data into clear, actionable remediation plans for technical teams. Build dashboards and executive reports (ServiceNow, Power BI). Provide rapid risk assessments and emergency patch governance during incidents. Support audits and regulatory compliance (ISO27001, CE+, GDPR, NIS2, ONR). Drive automation, integrating tools and workflows to improve efficiency. Act as subject matter expert for Tenable and related tooling, ensuring platforms are fully leveraged. Mentor analysts and security champions, building maturity across the team. About You - You will bring experience leading vulnerability management at enterprise scale, ideally in financial services or similarly regulated industries. You should also have hands-on knowledge of the following: Core Vulnerability Management - Tenable One (Exposure Management, Attack Surface Management, Attack Paths, Identity) AWS Inspector Agent-based and network-based scanning Cloud integrations (AWS, Azure, GCP) Dashboards and risk-based prioritisation Patch & Endpoint Management - Microsoft Intune / SCCM / WSUS Jamf Workflow & ITSM Integration - ServiceNow (dashboards, SOAR) Jira Cloud & Application Security - AWS Security Hub Azure Defender for Cloud Veracode Threat Intelligence & Exploit Context - Tenable Threat Intelligence Exploit DB Metasploit SIEM, SOAR & Monitoring - Microsoft Sentinel SOAR platforms (ServiceNow SOAR) Automation & Scripting - Python, PowerShell, Bash, Ansible Reporting & Metrics - Power BI ServiceNow dashboards Excel (advanced analysis) Frameworks & Standards - NIST CSF, ISO 27001, OWASP, CE / CE+, GDPR, NIS2, ONR Security Domains / Capabilities - Identity and Access Management (IAM) Network Security Data Protection Cloud Security Controls Application Security Security Monitoring Processes & Practices - Vulnerability Management Programmes Incident Response and Threat Assessment Emergency Patch Governance Risk-based Prioritisation (CVEs, exploit intelligence, asset criticality, business impact) Audit Support (internal assurance, penetration test follow-ups, external audits) Exception and exemption management Automation of manual tasks Dashboarding for risk and SLA metrics What's on Offer - A leadership role with significant influence across a major UK organisation. Opportunity to work with a forward-thinking Cyber Services function pushing boundaries in vulnerability management.
3rd Line Analyst (Wintel/AD Specialist) Location: Remote with occasional visits to Derby Contract: 12-month FTC Clearance: Current SC clearance (or above) required - no dual nationality Day Rate: up to £500 - £550 Role Purpose We are seeking an experienced 3rd Line Analyst to join our team, specialising in Wintel and Active Directory environments . You will be responsible for resolving complex technical incidents, supporting a large-scale hybrid infrastructure, and ensuring service excellence across authentication, authorisation, and access services. This role combines business-as-usual support with the opportunity to contribute to solution design and implementation. Key Responsibilities Technical (80%) Respond to incidents and service calls, ensuring SLA targets are consistently met. Deliver higher First Time Fix rates and resolve escalated technical issues. Monitor call queues, liaise with specialist teams, and drive timely resolution. Provide operational support for Microsoft Windows Server, Active Directory, Entra ID, VMware/Hyper-V, and Azure. Manage identity services including Authentication, Federation, and Access Control. Support Windows networking services (DNS, DHCP) and anti-virus solutions. Troubleshoot hybrid infrastructure environments. Create and maintain accurate operational documentation. Administration (20%) Maintain incident records and reporting in ITSM systems. Contribute to SLA reporting and performance metrics. Participate in team/sector meetings and knowledge sharing sessions. Ensure compliance with customer and security policies. Required Skills & Experience 5+ years' experience supporting large hybrid IT environments. 3+ years working with Microsoft Windows Server (all current versions), Active Directory, Entra ID, VMware/Hyper-V. Current SC clearance (or higher) . Strong understanding of ITIL Service Operations (Incident, Request, Problem, Change). Proficiency in PowerShell for automation and reporting. Relevant technical certifications (Microsoft, VMware, Azure). Excellent communication, documentation, and stakeholder management skills. Ability to work under pressure and manage multiple priorities effectively. Desired Skills (Advantageous) In-depth 3rd Line Support experience resolving complex incidents. Modern device management (Intune, Workspace One). Azure PIM & Identity Governance. Microsoft Certifications (eg, AZ-800/801, SC-300). Strong Active Directory deployment, configuration, and troubleshooting experience. Knowledge of enterprise app deployment and conditional access policies. Familiarity with converged technologies (Simplivity, UCS). Personal Attributes Strong analytical and problem-solving skills. Organised, systematic, and detail-oriented. Effective interpersonal skills, with the ability to influence at all levels. Self-driven, adaptable, and collaborative in approach.
03/10/2025
3rd Line Analyst (Wintel/AD Specialist) Location: Remote with occasional visits to Derby Contract: 12-month FTC Clearance: Current SC clearance (or above) required - no dual nationality Day Rate: up to £500 - £550 Role Purpose We are seeking an experienced 3rd Line Analyst to join our team, specialising in Wintel and Active Directory environments . You will be responsible for resolving complex technical incidents, supporting a large-scale hybrid infrastructure, and ensuring service excellence across authentication, authorisation, and access services. This role combines business-as-usual support with the opportunity to contribute to solution design and implementation. Key Responsibilities Technical (80%) Respond to incidents and service calls, ensuring SLA targets are consistently met. Deliver higher First Time Fix rates and resolve escalated technical issues. Monitor call queues, liaise with specialist teams, and drive timely resolution. Provide operational support for Microsoft Windows Server, Active Directory, Entra ID, VMware/Hyper-V, and Azure. Manage identity services including Authentication, Federation, and Access Control. Support Windows networking services (DNS, DHCP) and anti-virus solutions. Troubleshoot hybrid infrastructure environments. Create and maintain accurate operational documentation. Administration (20%) Maintain incident records and reporting in ITSM systems. Contribute to SLA reporting and performance metrics. Participate in team/sector meetings and knowledge sharing sessions. Ensure compliance with customer and security policies. Required Skills & Experience 5+ years' experience supporting large hybrid IT environments. 3+ years working with Microsoft Windows Server (all current versions), Active Directory, Entra ID, VMware/Hyper-V. Current SC clearance (or higher) . Strong understanding of ITIL Service Operations (Incident, Request, Problem, Change). Proficiency in PowerShell for automation and reporting. Relevant technical certifications (Microsoft, VMware, Azure). Excellent communication, documentation, and stakeholder management skills. Ability to work under pressure and manage multiple priorities effectively. Desired Skills (Advantageous) In-depth 3rd Line Support experience resolving complex incidents. Modern device management (Intune, Workspace One). Azure PIM & Identity Governance. Microsoft Certifications (eg, AZ-800/801, SC-300). Strong Active Directory deployment, configuration, and troubleshooting experience. Knowledge of enterprise app deployment and conditional access policies. Familiarity with converged technologies (Simplivity, UCS). Personal Attributes Strong analytical and problem-solving skills. Organised, systematic, and detail-oriented. Effective interpersonal skills, with the ability to influence at all levels. Self-driven, adaptable, and collaborative in approach.
Service Designer - Consultant (SC cleared) Akkodis are currently working in partnership with a leading service provider to recruit an experienced Service Designer with a passion for user-centred design, critical thinking, problem solving and designing and building digital services and products. Please note this is a hybrid role (in either London, Manchester, Glasgow office) with travel to client sites required on occasion and you will need to hold current security clearance. The Role As a Service Designer you will champion inclusive design practices throughout project life cycles, ensuring solutions are accessible to as many users as possible. This includes engaging with diverse user research, applying accessibility guidelines and legislation, and advocating for inclusive design principles in your deliverables. The Responsibilities * Maximise the value from the inception to real life application of Service Design. * Support clients through the end-to-end service design process to design and develop innovative products and services. This process will be all the way from ideation and inception through to solution build and testing. * Champion user-centricity - with a set of tools and methods you can draw upon to embed design thinking/user-centricity * Work on new ideas and work alongside solution team to design and develop innovative products and services * Use current and emerging trends to identify and lead improvements to existing services as well as introduce innovative and industry first service experiences influencing service managers, user researchers, UI/UX designers and programme directors to understand the value as a result of user focused transformation The Requirements * Proven experience working across a service design process, autonomously with minimal support * Experience working with Government Digital Service (GDS) service standards, applying GDS design principles * Ability to create service design artefacts and outputs, such as current and future-state user journeys, personas, service concepts, service blueprints and other artefacts * Ability to identify potential accessibility barriers for complex user groups * Client readiness', with experience facilitating workshops, design sprints, ideation sessions or similar * Ability to visualise complex services in an easy-to-understand format for varying audiences * Strong understanding and experience of working in an agile (scrum) environment in a cross-functional team including but not limited to user researchers, UX/UI designers, business analysts, product owners, delivery managers and developers * Strong stakeholder management skills, with the ability to balance competing views as part of the design process * Aptitude for being an advocate for user-centricity, with the ability to develop and translate user stories and propose design approaches or services to meet these needs and engage in meaningful interactions and relationships with users If you are looking for an exciting new challenge to join a leading consultancy, please apply now. Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
03/10/2025
Full time
Service Designer - Consultant (SC cleared) Akkodis are currently working in partnership with a leading service provider to recruit an experienced Service Designer with a passion for user-centred design, critical thinking, problem solving and designing and building digital services and products. Please note this is a hybrid role (in either London, Manchester, Glasgow office) with travel to client sites required on occasion and you will need to hold current security clearance. The Role As a Service Designer you will champion inclusive design practices throughout project life cycles, ensuring solutions are accessible to as many users as possible. This includes engaging with diverse user research, applying accessibility guidelines and legislation, and advocating for inclusive design principles in your deliverables. The Responsibilities * Maximise the value from the inception to real life application of Service Design. * Support clients through the end-to-end service design process to design and develop innovative products and services. This process will be all the way from ideation and inception through to solution build and testing. * Champion user-centricity - with a set of tools and methods you can draw upon to embed design thinking/user-centricity * Work on new ideas and work alongside solution team to design and develop innovative products and services * Use current and emerging trends to identify and lead improvements to existing services as well as introduce innovative and industry first service experiences influencing service managers, user researchers, UI/UX designers and programme directors to understand the value as a result of user focused transformation The Requirements * Proven experience working across a service design process, autonomously with minimal support * Experience working with Government Digital Service (GDS) service standards, applying GDS design principles * Ability to create service design artefacts and outputs, such as current and future-state user journeys, personas, service concepts, service blueprints and other artefacts * Ability to identify potential accessibility barriers for complex user groups * Client readiness', with experience facilitating workshops, design sprints, ideation sessions or similar * Ability to visualise complex services in an easy-to-understand format for varying audiences * Strong understanding and experience of working in an agile (scrum) environment in a cross-functional team including but not limited to user researchers, UX/UI designers, business analysts, product owners, delivery managers and developers * Strong stakeholder management skills, with the ability to balance competing views as part of the design process * Aptitude for being an advocate for user-centricity, with the ability to develop and translate user stories and propose design approaches or services to meet these needs and engage in meaningful interactions and relationships with users If you are looking for an exciting new challenge to join a leading consultancy, please apply now. Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
*Senior Cyber Security Analyst - £600-800pd (experience dependent) INSIDE IR35 - 3 month initial contract - London (3 days per week onsite)* Please note: Due to the nature of the role, we are ideally looking for candidates to hold an active SC clearance. We are looking for a SC Cleared Senior Cyber Security Analyst with SPLUNK experience to join our central government client on an initial 3-month contract. You must have experience investigating and responding to cyber incidents, co-ordinating incident response in a large organisation. We have both a Senior and mid-level role available. Main responsibilities: As a senior security analyst with responsibility for incident response, you will: Lead the investigation of security alerts to understand the nature and extent of possible cyber incidents Lead the forensic analysis of systems, files, network traffic and cloud environment Lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions Support the wider coordination of cyber incidents Review previous incidents to identify lessons and actions Identify and deliver opportunities for continual improvement of the incident response capability Work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities Develop and update internal plans, playbooks and knowledge base articles Act as an escalation point for, and provide coaching and mentoring to, security analysts Be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. Essential skills and experience: SPLUNK EDR (Endpoint Detection and Response) Significant experience investigating and responding to cyber incidents Significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience managing and coordinating the response to cyber incidents Experience coaching and mentoring junior staff An in-depth understanding of the tools, techniques and procedures used by threat actors Damia Group Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept our Data Protection Policy which can be found on our website. Please note that no terminology in this advert is intended to discriminate on the grounds of a person's gender, marital status, race, religion, colour, age, disability or sexual orientation. Every candidate will be assessed only in accordance with their merits, qualifications and ability to perform the duties of the job. Damia Group is acting as an Employment Business in relation to this vacancy and in accordance to Conduct Regulations 2003.
03/10/2025
Contractor
*Senior Cyber Security Analyst - £600-800pd (experience dependent) INSIDE IR35 - 3 month initial contract - London (3 days per week onsite)* Please note: Due to the nature of the role, we are ideally looking for candidates to hold an active SC clearance. We are looking for a SC Cleared Senior Cyber Security Analyst with SPLUNK experience to join our central government client on an initial 3-month contract. You must have experience investigating and responding to cyber incidents, co-ordinating incident response in a large organisation. We have both a Senior and mid-level role available. Main responsibilities: As a senior security analyst with responsibility for incident response, you will: Lead the investigation of security alerts to understand the nature and extent of possible cyber incidents Lead the forensic analysis of systems, files, network traffic and cloud environment Lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions Support the wider coordination of cyber incidents Review previous incidents to identify lessons and actions Identify and deliver opportunities for continual improvement of the incident response capability Work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities Develop and update internal plans, playbooks and knowledge base articles Act as an escalation point for, and provide coaching and mentoring to, security analysts Be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. Essential skills and experience: SPLUNK EDR (Endpoint Detection and Response) Significant experience investigating and responding to cyber incidents Significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience managing and coordinating the response to cyber incidents Experience coaching and mentoring junior staff An in-depth understanding of the tools, techniques and procedures used by threat actors Damia Group Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept our Data Protection Policy which can be found on our website. Please note that no terminology in this advert is intended to discriminate on the grounds of a person's gender, marital status, race, religion, colour, age, disability or sexual orientation. Every candidate will be assessed only in accordance with their merits, qualifications and ability to perform the duties of the job. Damia Group is acting as an Employment Business in relation to this vacancy and in accordance to Conduct Regulations 2003.