<?xml version="1.0" encoding="utf-8"?><!--RSS Feed Generated by www.firefishsoftware.com - Sun, 19 Apr 2026 03:50:27 GMT.--><rss version="2.0" xmlns:ffAdvert="http://www.firefishsoftware.com/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>i-confidential - Latest Vacancies</title><link>https://vacancies.i-confidential.com/</link><atom:link href="https://vacancies.i-confidential.com/rss/adverts/latest.aspx" rel="self" type="application/rss+xml" /><description>All of the latest vacancies from i-confidential.</description><copyright /><language>en-gb</language><pubDate>Sun, 19 Apr 2026 03:50:26 GMT</pubDate><generator>www.firefishsoftware.com</generator><item><title>Network and Infrastructure Security Engineer</title><description><![CDATA[<div><span style="display: none;">&nbsp;</span><span style="font-size:14pt;">We are currently looking for a Network and Infrastructure Engineer to join an existing team with one of our financial services clients.</span></div>

<ul style="margin-top:10px">
	<li style="margin-top:10px">
	<div><span style="font-size:14pt;"><span style="background:white"><span style="line-height:normal"><span lang="EN-US"><span style="color:black">Significant experience&nbsp;and proven technical depth within two of the following domains of cybersecurity<b>;</b> infrastructure &amp; network security, and data protection &amp; privacy</span></span></span></span></span></div>
	</li>
	<li style="margin-top:10px">
	<div><span style="font-size:14pt;"><span style="background:white"><span style="line-height:normal"><span style="color:black">Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level</span></span></span></span></div>
	</li>
	<li style="margin-top:10px">
	<div><span style="font-size:14pt;"><span style="background:white"><span style="line-height:normal"><span style="color:black">Strong proficiency in technical scoping, architecture design, and integration of security tools and processes.</span></span></span></span></div>
	</li>
	<li style="margin-top:10px">
	<div><span style="font-size:14pt;"><span style="background:white"><span style="line-height:normal"><span style="color:black">Strong understanding of cyber security principles, governance, and compliance frameworks</span></span></span></span></div>
	</li>
	<li style="margin-top:10px">
	<div><span style="font-size:14pt;"><span style="background:white"><span style="line-height:normal"><span style="color:black">Ability to translate business needs into scalable, user-centric cloud solutions.</span></span></span></span></div>
	</li>
	<li style="margin-top:10px">
	<div><span style="font-size:14pt;"><span style="background:white"><span style="line-height:normal"><span style="color:black">Excellent communication and collaboration skills, with a focus thought leadership and solution development</span></span></span></span></div>
	</li>
	<li style="margin-top:10px">
	<div><span style="font-size:14pt;"><span style="background:white"><span style="line-height:normal"><span style="color:black">Experience in both operational and transformation cybersecurity roles or a clear working understanding of both perspectives </span></span></span></span></div>
	</li>
	<li style="margin-top:10px">
	<div><span style="font-size:14pt;"><span style="background:white"><span style="line-height:normal"><span style="color:black">Experience working in large-scale IT transformation programmes</span></span></span></span></div>
	</li>
</ul>

<div style="margin-top: 10px;"><strong><span style="font-size:14pt;"><span style="font-family:Arial;">Contract will be inside IR35, applicants must be able to work from client office 3 days per week.</span></span></strong><span style="display: none;">&nbsp;</span></div>

<p style="margin-top:10px">&nbsp;</p>

<p style="margin-top:10px"><span style="font-size:11pt"><span style="background:white"><span style="line-height:normal"><span style="font-family:Aptos,sans-serif"><span style="font-size:10.0pt"><span style="font-family:&quot;Arial&quot;,sans-serif"><span style="color:black">#LI-DNI</span></span></span></span></span></span></span></p>
]]></description><link>https://vacancies.i-confidential.com/job/network-and-infrastructure-security-engineer-355.aspx</link><guid>https://vacancies.i-confidential.com/job/network-and-infrastructure-security-engineer-355.aspx</guid><applyUrl>https://vacancies.i-confidential.com/job/network-and-infrastructure-security-engineer-355/apply.aspx</applyUrl><pubDate>Fri, 17 Apr 2026 08:28:45 GMT</pubDate><ffAdvert:applyUrl>https://vacancies.i-confidential.com/job/network-and-infrastructure-security-engineer-355/apply.aspx</ffAdvert:applyUrl><ffAdvert:ReferenceNumber>355</ffAdvert:ReferenceNumber><ffAdvert:Title>Network and Infrastructure Security Engineer</ffAdvert:Title><ffAdvert:CompanyReferenceNumber>11</ffAdvert:CompanyReferenceNumber><ffAdvert:JobType>Contract</ffAdvert:JobType><ffAdvert:Discipline>Engineering, Development &amp; Automation</ffAdvert:Discipline><ffAdvert:Role></ffAdvert:Role><ffAdvert:LocationArea>Remote</ffAdvert:LocationArea><ffAdvert:Location></ffAdvert:Location><ffAdvert:PostedDate>Fri, 17 Apr 2026 08:28:45 GMT</ffAdvert:PostedDate><ffAdvert:ClosingDate>Sun, 17 May 2026 22:59:59 GMT</ffAdvert:ClosingDate><ffAdvert:Remuneration></ffAdvert:Remuneration><ffAdvert:PostedBy>Matt Smith</ffAdvert:PostedBy><ffAdvert:RecruiterEmail>matt.smith@i-confidential.com</ffAdvert:RecruiterEmail><ffAdvert:RecruiterDirectDial></ffAdvert:RecruiterDirectDial><ffAdvert:MinimumPayment>0.00</ffAdvert:MinimumPayment><ffAdvert:MaximumPayment>0.00</ffAdvert:MaximumPayment><ffAdvert:PaymentRate>Per Day</ffAdvert:PaymentRate><ffAdvert:Currency>GBP</ffAdvert:Currency><ffAdvert:Country>UK</ffAdvert:Country></item><item><title>Senior SOC Analyst (Incident Response, Microsoft Security)</title><description><![CDATA[<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif"><b>Senior SOC Analyst (Incident Response, Microsoft Security)</b><br>
London (Hybrid &ndash; 2 days onsite every 2 weeks)</span></span></span></div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">&nbsp;6-month contract, Inside IR35 </span></span></span></div>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif"><b>About the Role</b></span></span></span></div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">We&rsquo;re looking for a hands-on Senior SOC Analyst to join a mature Cyber Fusion function, focused on detection and response across a Microsoft 365 environment.</span></span></span></div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">This is a true operational security role&mdash;you&rsquo;ll be actively investigating incidents, handling alerts, and improving detection capabilities. You&rsquo;ll also play a key part in strengthening processes, tooling, and overall response effectiveness.</span></span></span></div>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif"><b>What You&rsquo;ll Be Doing</b></span></span></span></div>

<ul style="margin-bottom:11px">
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Investigating and responding to <b>security incidents end-to-end</b> (triage &rarr; containment &rarr; recovery)</span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Performing <b>deep-dive technical analysis</b> to understand root cause and scope</span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Handling <b>phishing investigations</b> and user-driven security cases</span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Working with <b>SIEM and SOAR platforms</b> to support investigations and response workflows</span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Improving <b>detection rules, alert quality, and triage processes</b></span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Supporting reductions in <b>MTTI / MTTR</b> through effective analysis and tooling</span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Contributing to <b>post-incident reviews, documentation, and playbooks</b></span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Collaborating with the wider <b>Blue Team and Cyber Fusion Centre</b></span></span></span></div>
	</li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif"><b>What We&rsquo;re Looking For</b></span></span></span></div>

<ul style="margin-bottom:11px">
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Strong experience in a <b>SOC, SecOps, or Incident Response role</b> (ideally Tier 2/3 level)</span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Proven ability to <b>investigate and resolve security incidents</b> in enterprise environments</span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Hands-on experience with <b>SIEM platforms</b> (e.g. Microsoft Sentinel, Splunk, QRadar)</span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Experience working with <b>SOAR tools or automated response workflows</b></span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Solid understanding of <b>attack techniques and frameworks</b> (e.g. MITRE ATT&amp;CK)</span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Strong technical knowledge across <b>endpoint, identity, email, and cloud security</b></span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Experience with <b>Microsoft Defender and Microsoft 365 security tooling</b></span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Ability to work effectively during <b>active incidents and time-sensitive situations</b></span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Clear communication skills, both technical and non-technical</span></span></span></div>
	</li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif"><b>Nice to Have</b></span></span></span></div>

<ul style="margin-bottom:11px">
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Experience in <b>detection engineering or tuning alert logic</b></span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Certifications such as <b>GCIH, CySA+, SC-200, BTL1/BTL2</b></span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Exposure to <b>Google Cloud security operations</b></span></span></span></div>
	</li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif"><b>Working Setup</b></span></span></span></div>

<ul style="margin-bottom:11px">
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Hybrid model: <b>2 days onsite every two weeks</b> (London)</span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Embedded within a <b>Cyber Security / Cyber Fusion team</b></span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Collaborative, hands-on environment with a focus on <b>continuous improvement</b></span></span></span></div>
	</li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">If you&rsquo;re a Senior SOC Analyst who enjoys real investigation work and improving how security operations run, this is a strong opportunity to make an impact.</span></span></span><br>
<br>
#LI-DNI</div>
]]></description><link>https://vacancies.i-confidential.com/job/senior-soc-analyst-(incident-response,-microsoft-security)-359.aspx</link><guid>https://vacancies.i-confidential.com/job/senior-soc-analyst-(incident-response,-microsoft-security)-359.aspx</guid><applyUrl>https://vacancies.i-confidential.com/job/senior-soc-analyst-(incident-response,-microsoft-security)-359/apply.aspx</applyUrl><pubDate>Thu, 16 Apr 2026 12:09:07 GMT</pubDate><ffAdvert:applyUrl>https://vacancies.i-confidential.com/job/senior-soc-analyst-(incident-response,-microsoft-security)-359/apply.aspx</ffAdvert:applyUrl><ffAdvert:ReferenceNumber>359</ffAdvert:ReferenceNumber><ffAdvert:Title>Senior SOC Analyst (Incident Response, Microsoft Security)</ffAdvert:Title><ffAdvert:CompanyReferenceNumber>106</ffAdvert:CompanyReferenceNumber><ffAdvert:JobType>Contract</ffAdvert:JobType><ffAdvert:Discipline>Security Operations &amp; Incident Response</ffAdvert:Discipline><ffAdvert:Role>Threat &amp; Cyber Intelligence</ffAdvert:Role><ffAdvert:LocationArea>England</ffAdvert:LocationArea><ffAdvert:Location>London</ffAdvert:Location><ffAdvert:PostedDate>Thu, 16 Apr 2026 12:09:07 GMT</ffAdvert:PostedDate><ffAdvert:ClosingDate>Sat, 16 May 2026 22:59:59 GMT</ffAdvert:ClosingDate><ffAdvert:Remuneration></ffAdvert:Remuneration><ffAdvert:PostedBy>Lewis Black</ffAdvert:PostedBy><ffAdvert:RecruiterEmail>lewis.black@i-confidential.com</ffAdvert:RecruiterEmail><ffAdvert:RecruiterDirectDial></ffAdvert:RecruiterDirectDial><ffAdvert:MinimumPayment>0.00</ffAdvert:MinimumPayment><ffAdvert:MaximumPayment>0.00</ffAdvert:MaximumPayment><ffAdvert:PaymentRate>Per Day</ffAdvert:PaymentRate><ffAdvert:Currency>GBP</ffAdvert:Currency><ffAdvert:Country>Scotland</ffAdvert:Country></item><item><title>Senior / Lead SOC Consultant - Contract</title><description><![CDATA[<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif"><b>Senior / Lead SOC Consultant</b></span></span></span></div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif"><b>Location:</b> Paddington, London (3 days onsite)<br>
<b>Duration:</b> 6 months<br>
<b>Rate:</b> &pound;650/day (Inside IR35, via Umbrella)</span></span></span></div>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif"><b>The Opportunity</b></span></span></span></div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">We&rsquo;re seeking an experienced <b>Senior / Lead SOC Consultant</b> to support and enhance an established Security Operations Centre (SOC) function within a leading organisation.</span></span></span></div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">You&rsquo;ll play a key role in <b>uplifting SOC capability</b>, working closely with a team of four analysts. This is a hands-on leadership role suited to someone who enjoys improving processes, mentoring others, and ensuring high-quality, risk-based security outcomes.</span></span></span></div>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif"><b>Key Responsibilities</b></span></span></span></div>

<ul style="margin-bottom:11px">
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Review, validate, and enhance SOC analyst investigations and incident responses </span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Ensure alerts, incidents, and recommendations are technically accurate and business-relevant </span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Take ownership of complex or ambiguous security events </span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Improve SOC processes to reduce operational load and increase efficiency </span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Identify and drive opportunities for automation and optimisation </span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Support and mentor analysts through knowledge-sharing and guidance </span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Act as a senior escalation point for SOC-related security issues </span></span></span></div>
	</li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif"><b>About You</b></span></span></span></div>

<ul style="margin-bottom:11px">
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Strong experience working within a <b>Security Operations Centre (SOC)</b> </span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Proven ability to <b>lead and uplift teams</b> without formal line management responsibility </span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Skilled in reviewing and challenging investigations to improve quality and outcomes </span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Experience driving <b>SOC process improvements and automation initiatives</b> </span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Confident communicator, able to clearly articulate risk and recommendations to stakeholders </span></span></span></div>
	</li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif"><b>Technical Experience</b></span></span></span></div>

<ul style="margin-bottom:11px">
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">CrowdStrike (EDR) </span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Microsoft Defender </span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Splunk or similar SIEM platforms </span></span></span></div>
	</li>
	<li style="margin-bottom:11px">
	<div><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">Qualys (vulnerability management) </span></span></span></div>
	</li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif"><b>Why Apply?</b></span></span></span></div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:107%"><span style="font-family:Aptos,sans-serif">This is an opportunity to make a <b>tangible impact on SOC maturity</b>, working in a collaborative environment where your expertise will directly influence security operations and team capability.</span></span></span><br>
<br>
<br>
#LI-DNI</div>
]]></description><link>https://vacancies.i-confidential.com/job/senior--lead-soc-consultant-contract-358.aspx</link><guid>https://vacancies.i-confidential.com/job/senior--lead-soc-consultant-contract-358.aspx</guid><applyUrl>https://vacancies.i-confidential.com/job/senior--lead-soc-consultant-contract-358/apply.aspx</applyUrl><pubDate>Thu, 09 Apr 2026 15:01:14 GMT</pubDate><ffAdvert:applyUrl>https://vacancies.i-confidential.com/job/senior--lead-soc-consultant-contract-358/apply.aspx</ffAdvert:applyUrl><ffAdvert:ReferenceNumber>358</ffAdvert:ReferenceNumber><ffAdvert:Title>Senior / Lead SOC Consultant - Contract</ffAdvert:Title><ffAdvert:CompanyReferenceNumber>210</ffAdvert:CompanyReferenceNumber><ffAdvert:JobType>Contract</ffAdvert:JobType><ffAdvert:Discipline>Security Operations &amp; Incident Response</ffAdvert:Discipline><ffAdvert:Role>SOC Analyst</ffAdvert:Role><ffAdvert:LocationArea>England</ffAdvert:LocationArea><ffAdvert:Location>London</ffAdvert:Location><ffAdvert:PostedDate>Thu, 09 Apr 2026 15:01:14 GMT</ffAdvert:PostedDate><ffAdvert:ClosingDate>Sat, 09 May 2026 22:59:59 GMT</ffAdvert:ClosingDate><ffAdvert:Remuneration></ffAdvert:Remuneration><ffAdvert:PostedBy>Lewis Black</ffAdvert:PostedBy><ffAdvert:RecruiterEmail>lewis.black@i-confidential.com</ffAdvert:RecruiterEmail><ffAdvert:RecruiterDirectDial></ffAdvert:RecruiterDirectDial><ffAdvert:MinimumPayment>0.00</ffAdvert:MinimumPayment><ffAdvert:MaximumPayment>0.00</ffAdvert:MaximumPayment><ffAdvert:PaymentRate>Per Day</ffAdvert:PaymentRate><ffAdvert:Currency>GBP</ffAdvert:Currency><ffAdvert:Country></ffAdvert:Country></item><item><title>Technical Business Analyst - Manufacturing</title><description><![CDATA[<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">We are currently looking for an Technical Business Analyst to work with one of our key clients, supporting the Project Management team and relevant business partners within a manufacturing environment.&nbsp; Applicants will have analysis expertise, along with knowledge of Cyber, Networks, Infrastructure etc., and a background in Manufacturing or FMCG.&nbsp; Experience with Operational Technology and the interface with Information Technology, would be an advantage.</span></span></span></div>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">In alignment with a project governance framework, the purpose of this role is to:</span></span></span></div>

<ul>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Lead in the areas of process, information, and data analysis within their subject matter expertise.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Act as a subject matter expert in manufacturing technology and systems.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Bring competitive and industry best-practice analysis.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Provide recommendations for targeted investments.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Lead the deployment of methodologies to analyse and resolve complex business problems.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Provide SME leadership to the business and project team in a lead engagement capacity.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">This role will play a key part in driving digital transformation and technology optimisation across manufacturing operations.</span></span></span></li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif"><b>Key Responsibilities</b></span></span></span></div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif"><b>Business &amp; Process Analysis</b></span></span></span></div>

<ul>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Analyse current-state manufacturing processes, systems, and data flows.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Identify gaps, risks, and improvement opportunities across IT/OT environments.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Develop clear documentation including business requirements, functional specifications, process maps, and data models.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Lead workshops and stakeholder sessions to define future-state solutions.</span></span></span></li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif"><b>Subject Matter Expertise</b></span></span></span></div>

<ul>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">IT/OT convergence</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Manufacturing infrastructure</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Networking and industrial connectivity</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Servers (on-premise and edge environments)</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Cyber security (industrial and enterprise alignment)</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Manufacturing systems (e.g., MES, SCADA, PLC integration, historian systems)</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Bring external industry best practices in smart manufacturing, Industry 4.0, and secure plant connectivity.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Evaluate and recommend technology investments aligned to operational and strategic goals.</span></span></span></li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif"><b>Project &amp; Programme Support</b></span></span></span></div>

<ul>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Support the Project Manager/Programme Manager in planning, risk management, and stakeholder alignment.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Lead analytical workstreams within larger programmes.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Ensure alignment with governance standards.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Provide impact assessments for proposed changes across infrastructure and manufacturing systems.</span></span></span></li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif"><b>Methodology &amp; Problem Solving</b></span></span></span></div>

<ul>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Deploy structured analysis methodologies to resolve complex business and technical problems.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Use data-driven insights to support investment decisions.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Conduct feasibility assessments and cost/benefit analyses.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Define KPIs and measurement frameworks for solution success.</span></span></span></li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif"><b>Stakeholder Engagement</b></span></span></span></div>

<ul>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Engage with manufacturing site leadership, engineering teams, IT teams, and cyber security teams.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Act as a bridge between technical and non-technical stakeholders.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Influence and guide decision-making through clear, structured analysis.</span></span></span></li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif"><b>Experience</b></span></span></span></div>

<ul>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Experience as a Business Analyst, Systems Analyst, or similar role within manufacturing or industrial environments.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Strong exposure to IT/OT convergence in manufacturing.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Experience working on infrastructure and industrial networking projects.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Demonstrable experience supporting large-scale transformation or technology programmes.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Experience working within structured governance frameworks </span></span></span></li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif"><b>Technical Expertise</b></span></span></span></div>

<ul>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Industrial networking and plant connectivity.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Server infrastructure (on-premise, virtualised, edge computing).</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Cyber security within manufacturing environments (e.g., IEC 62443 awareness).</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Manufacturing systems (MES, SCADA, PLC integration).</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Infrastructure architecture and resilience.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Data analysis and systems integration.</span></span></span></li>
</ul>

<p style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Applicants must be able to travel between clients sites in Glasgow, Edinburgh and Fife.</span></span></span></p>

<p style="margin-bottom:11px">&nbsp;</p>

<p style="margin-bottom:11px"><span style="font-size:12pt"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">#LI-DNI</span></span></span></p>
]]></description><link>https://vacancies.i-confidential.com/job/technical-business-analyst-manufacturing-357.aspx</link><guid>https://vacancies.i-confidential.com/job/technical-business-analyst-manufacturing-357.aspx</guid><applyUrl>https://vacancies.i-confidential.com/job/technical-business-analyst-manufacturing-357/apply.aspx</applyUrl><pubDate>Fri, 03 Apr 2026 08:27:17 GMT</pubDate><ffAdvert:applyUrl>https://vacancies.i-confidential.com/job/technical-business-analyst-manufacturing-357/apply.aspx</ffAdvert:applyUrl><ffAdvert:ReferenceNumber>357</ffAdvert:ReferenceNumber><ffAdvert:Title>Technical Business Analyst - Manufacturing</ffAdvert:Title><ffAdvert:CompanyReferenceNumber>211</ffAdvert:CompanyReferenceNumber><ffAdvert:JobType>Contract</ffAdvert:JobType><ffAdvert:Discipline>Business Management</ffAdvert:Discipline><ffAdvert:Role>Technical Business Analyst</ffAdvert:Role><ffAdvert:LocationArea>Scotland</ffAdvert:LocationArea><ffAdvert:Location></ffAdvert:Location><ffAdvert:PostedDate>Fri, 03 Apr 2026 08:27:17 GMT</ffAdvert:PostedDate><ffAdvert:ClosingDate>Fri, 01 May 2026 22:59:59 GMT</ffAdvert:ClosingDate><ffAdvert:Remuneration></ffAdvert:Remuneration><ffAdvert:PostedBy>Matt Smith</ffAdvert:PostedBy><ffAdvert:RecruiterEmail>matt.smith@i-confidential.com</ffAdvert:RecruiterEmail><ffAdvert:RecruiterDirectDial></ffAdvert:RecruiterDirectDial><ffAdvert:MinimumPayment>0.00</ffAdvert:MinimumPayment><ffAdvert:MaximumPayment>0.00</ffAdvert:MaximumPayment><ffAdvert:PaymentRate>Per Day</ffAdvert:PaymentRate><ffAdvert:Currency>GBP</ffAdvert:Currency><ffAdvert:Country></ffAdvert:Country></item><item><title>Client Facing Cyber Awareness Manager</title><description><![CDATA[<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">We are looking for an experienced and motivated Client<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>Facing Cyber Awareness Manager to join our Cybersecurity Education &amp; Awareness team. In this high<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>impact role, you will design, deliver, and continuously improve cybersecurity awareness initiatives for customers across four Global Business divisions.</span></span></span></div>

<div style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">You will work closely with stakeholders to understand customer needs, create compelling awareness materials, and support Relationship Managers in strengthening conversations with their clients around cyber risk. This is an exciting opportunity to shape a scalable, customer<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>centric cyber awareness offering that enhances trust, resilience, and brand value.</span></span></span></div>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><strong><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Key Responsibilities</span></span></span></strong></div>

<ul>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Design &amp; Deliver Cyber Awareness Materials</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Produce engaging, scalable materials such as presentation decks, crisis simulations, written insights, and other assets to educate and upskill clients. </span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Position cybersecurity defences as a point of differentiation in client engagement. </span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Own Client<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>Facing Cyber Learning &amp; Content</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Serve as product owner for the cybersecurity page on the internal sales enablement platform.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Manage cybersecurity learning paths for Relationship Managers and other customer<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>facing roles, ensuring they drive strong engagement and measurable outcomes. </span></span></span></li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><strong><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Insight, Measurement &amp; Continuous Improvement</span></span></span></strong></div>

<ul>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Support the measurement and value quantification of all client<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>facing cyber awareness activity. </span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Gather requirements from Global Business CISO teams to understand client needs and inform solution design. </span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Apply customer<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>centric design principles, including behavioural science and learner<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>psychology best practice. </span></span></span></li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><strong><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Collaboration &amp; Stakeholder Engagement</span></span></span></strong></div>

<ul>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Work with Cybersecurity Education &amp; Awareness team members and third<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>party suppliers to repurpose or design new client<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>facing initiatives</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Engage closely with Legal, Cyber Intelligence &amp; Threat Analysis, and the Fraud Awareness team to exchange insights and maximise existing channels. </span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Champion a customer<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>centric mindset across all initiatives. </span></span></span></li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><strong><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Knowledge, Skills &amp; Experience</span></span></span></strong></div>

<ul>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Understanding of operational resilience, business continuity, and cyber defences in a commercial environment. </span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Knowledge of marketing and awareness campaign development.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Awareness of behavioural science and learner psychology techniques. </span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Familiarity with requirements gathering, agile methods, project management, and data analysis. </span></span></span></li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><strong><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Experience</span></span></span></strong></div>

<ul>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Designing and delivering training, marketing or awareness campaigns (cybersecurity or risk preferred). </span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Conducting requirements<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>gathering or design<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>thinking activities with end<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>user research. </span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Collaborating with stakeholders at multiple seniority levels within complex delivery environments.</span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Working with content management systems and internal communication/training tools (e.g., SharePoint, Degreed, Workplace). </span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Experience in data analysis. </span></span></span></li>
</ul>

<div style="margin-bottom: 11px;">&nbsp;</div>

<div style="margin-bottom: 11px;"><strong><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Capabilities</span></span></span></strong></div>

<ul>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Excellent written and spoken English with strong attention to detail. </span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Strong organisational and stakeholder<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>management skills. </span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Ability to work in a fast<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>paced environment with changing priorities, delivering high<span style="font-family:&quot;Cambria Math&quot;,serif">&#8209;</span>quality outputs to tight timelines. </span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">Confident, proactive, and accountable, with the ability to work both independently and collaboratively. </span></span></span></li>
	<li style="margin-bottom: 11px;"><span style="font-size:14pt;"><span style="line-height:115%"><span style="font-family:Aptos,sans-serif">A calm, flexible team player who shares knowledge and helps others succeed.</span></span></span></li>
</ul>

<p style="margin-bottom: 11px;">#LI_DNI</p>
]]></description><link>https://vacancies.i-confidential.com/job/client-facing-cyber-awareness-manager-353.aspx</link><guid>https://vacancies.i-confidential.com/job/client-facing-cyber-awareness-manager-353.aspx</guid><applyUrl>https://vacancies.i-confidential.com/job/client-facing-cyber-awareness-manager-353/apply.aspx</applyUrl><pubDate>Mon, 30 Mar 2026 08:04:32 GMT</pubDate><ffAdvert:applyUrl>https://vacancies.i-confidential.com/job/client-facing-cyber-awareness-manager-353/apply.aspx</ffAdvert:applyUrl><ffAdvert:ReferenceNumber>353</ffAdvert:ReferenceNumber><ffAdvert:Title>Client Facing Cyber Awareness Manager</ffAdvert:Title><ffAdvert:CompanyReferenceNumber>11</ffAdvert:CompanyReferenceNumber><ffAdvert:JobType>Contract</ffAdvert:JobType><ffAdvert:Discipline>Cyber Education &amp; Awareness</ffAdvert:Discipline><ffAdvert:Role></ffAdvert:Role><ffAdvert:LocationArea>England</ffAdvert:LocationArea><ffAdvert:Location>Sheffield</ffAdvert:Location><ffAdvert:PostedDate>Mon, 30 Mar 2026 08:04:32 GMT</ffAdvert:PostedDate><ffAdvert:ClosingDate>Fri, 01 May 2026 22:59:59 GMT</ffAdvert:ClosingDate><ffAdvert:Remuneration></ffAdvert:Remuneration><ffAdvert:PostedBy>Matt Smith</ffAdvert:PostedBy><ffAdvert:RecruiterEmail>matt.smith@i-confidential.com</ffAdvert:RecruiterEmail><ffAdvert:RecruiterDirectDial></ffAdvert:RecruiterDirectDial><ffAdvert:MinimumPayment>0.00</ffAdvert:MinimumPayment><ffAdvert:MaximumPayment>0.00</ffAdvert:MaximumPayment><ffAdvert:PaymentRate>Per Day</ffAdvert:PaymentRate><ffAdvert:Currency>GBP</ffAdvert:Currency><ffAdvert:Country>UK</ffAdvert:Country></item><item><title>Cyber Education Manager</title><description><![CDATA[<div><meta content="text/html; charset=us-ascii" http-equiv="Content-Type"></div>

<div><span style="font-size:14pt;">
<style type="text/css">a {
    text-decoration: none;
    color: #464feb;
}
tr th, tr td {
    border: 1px solid #e6e6e6;
}
tr th {
    background-color: #f5f5f5;
}
</style>
</span></div>

<div><span style="font-size:14pt;">We are seeking an experienced <strong>Cybersecurity Specialist Training Delivery Manager</strong> to lead the design, execution, and governance of the global Cybersecurity learning and development programme. This is a pivotal role responsible for building capability across a Cybersecurity workforce, uplifting skills aligned to industry frameworks, and embedding a culture of continuous learning.</span></div>

<div><span style="font-size:14pt;">You will drive strategic and operational learning outcomes, oversee professional certification pathways, and ensure our workforce remains resilient, up&#8209;to&#8209;date, and prepared for emerging cyber threats.</span></div>

<div><span style="font-size:14pt;">If you are passionate about workforce development, cybersecurity excellence, and creating learning ecosystems that make an impact, we&rsquo;d love to hear from you.</span></div>

<hr>
<div><span style="font-size:14pt;"><strong>Key Responsibilities</strong></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><strong>Lead and Deliver Cybersecurity Learning Programmes</strong></span></div>

<ul>
	<li>
	<div><span style="font-size:14pt;">Oversee delivery and governance of Cybersecurity certification and accreditation pathways.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Execute tailored learning journeys aligned to cyber personas, career progression, and business priorities.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Deliver targeted capability uplift programmes to support emerging and strategic cybersecurity needs.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Champion a culture of continuous learning across global Cyber teams.</span></div>
	</li>
</ul>

<div><span style="font-size:14pt;"><strong>Learning Governance, Reporting &amp; Insights</strong></span></div>

<ul>
	<li>
	<div><span style="font-size:14pt;">Manage dashboards, reporting, and analytics to drive data&#8209;driven decision&#8209;making.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Ensure compliance with internal controls, regulatory expectations, and industry frameworks (e.g., NIST NICE).</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Track outcomes and demonstrate measurable impact on capability development.</span></div>
	</li>
</ul>

<div><span style="font-size:14pt;"><strong>Stakeholder Engagement &amp; Collaboration</strong></span></div>

<ul>
	<li>
	<div><span style="font-size:14pt;">Partner with Cybersecurity leadership, Technology Learning teams, and Communications &amp; Engagement to deliver impactful learning campaigns.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Manage supplier relationships to deliver high&#8209;quality, cost&#8209;effective training solutions.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Lead Cybersecurity learning steering/advisory forums and ensure alignment with strategic objectives.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Gather feedback and continuously improve learning offerings.</span></div>
	</li>
</ul>

<div><span style="font-size:14pt;"><strong>Operational Delivery &amp; Team Leadership</strong></span></div>

<ul>
	<li>
	<div><span style="font-size:14pt;">Oversee platform administration, onboarding/offboarding processes, and governance.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Manage a small delivery team to ensure learning outcomes are delivered on time, with clear success criteria and KPIs.</span></div>
	</li>
</ul>

<hr>
<div><span style="font-size:14pt;"><strong>Impact of the Role</strong></span></div>

<ul>
	<li>
	<div><span style="font-size:14pt;">Strengthening cyber resilience across the organisation.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Ensuring teams have the right skills to reduce operational and security risk.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Demonstrating capability uplift for regulatory and audit requirements.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Supporting innovation and resilience through strategic learning initiatives.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Providing engaging, accessible training experiences for all Cybersecurity colleagues.</span></div>
	</li>
</ul>

<hr>
<div><span style="font-size:14pt;"><strong>About You</strong></span></div>

<ul>
	<li>
	<div><span style="font-size:14pt;">Experience delivering learning and development programmes within Cybersecurity.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Strong knowledge of cyber roles, skills frameworks (e.g., NIST NICE), and industry certifications.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">A data-driven approach to evaluating learning impact and driving continuous improvement.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Excellent stakeholder engagement skills and confidence in presenting to senior leaders.</span></div>
	</li>
	<li>
	<div><span style="font-size:14pt;">Ability to manage suppliers and budgets to deliver high-quality learning solutions.</span></div>
	</li>
</ul>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-size:10pt;">#LI_DNI</span></span></div>

<div>&nbsp;</div>
]]></description><link>https://vacancies.i-confidential.com/job/cyber-education-manager-352.aspx</link><guid>https://vacancies.i-confidential.com/job/cyber-education-manager-352.aspx</guid><applyUrl>https://vacancies.i-confidential.com/job/cyber-education-manager-352/apply.aspx</applyUrl><pubDate>Mon, 30 Mar 2026 08:04:19 GMT</pubDate><ffAdvert:applyUrl>https://vacancies.i-confidential.com/job/cyber-education-manager-352/apply.aspx</ffAdvert:applyUrl><ffAdvert:ReferenceNumber>352</ffAdvert:ReferenceNumber><ffAdvert:Title>Cyber Education Manager</ffAdvert:Title><ffAdvert:CompanyReferenceNumber>11</ffAdvert:CompanyReferenceNumber><ffAdvert:JobType>Contract</ffAdvert:JobType><ffAdvert:Discipline>Cyber Education &amp; Awareness</ffAdvert:Discipline><ffAdvert:Role></ffAdvert:Role><ffAdvert:LocationArea>England</ffAdvert:LocationArea><ffAdvert:Location>Sheffield</ffAdvert:Location><ffAdvert:PostedDate>Mon, 30 Mar 2026 08:04:19 GMT</ffAdvert:PostedDate><ffAdvert:ClosingDate>Fri, 01 May 2026 22:59:59 GMT</ffAdvert:ClosingDate><ffAdvert:Remuneration></ffAdvert:Remuneration><ffAdvert:PostedBy>Matt Smith</ffAdvert:PostedBy><ffAdvert:RecruiterEmail>matt.smith@i-confidential.com</ffAdvert:RecruiterEmail><ffAdvert:RecruiterDirectDial></ffAdvert:RecruiterDirectDial><ffAdvert:MinimumPayment>0.00</ffAdvert:MinimumPayment><ffAdvert:MaximumPayment>0.00</ffAdvert:MaximumPayment><ffAdvert:PaymentRate>Per Day</ffAdvert:PaymentRate><ffAdvert:Currency>GBP</ffAdvert:Currency><ffAdvert:Country>UK</ffAdvert:Country></item></channel></rss>