UK ONLY - SPONSORSHIP IS NOT AVAILABLE Job Purpose:This role is responsible for overseeing and enhancing the security of our IT systems, data, and networks. You will conduct regular security audits, assessments, and tests, and identify and resolve any vulnerabilities or breaches.You will also develop and implement security policies, procedures, and standards, and ensure compliance with the relevant laws and regulations, and train and educate employees on the best practices and awareness of IT security. Operating Environment:The role operates within the IT Services Team, The IT Services Team includes specialist staff delivering core outputs that are both external-facing and internal key enablers. Framework & Boundaries: The role is responsible for improving the quality, wellbeing and efficiency of our IT Security. The role has external-facing responsibilities and is required and authorised to act as a representative for the organisation. Key accountabilities:Monitor and Inspect: Regularly monitor the network for security threats or breaches. Policy Development: Develop and implement security policies and procedures to safeguard data and systems. Vulnerability Testing: Perform regular vulnerability testing and risk assessments to identify and mitigate security risks. Incident Response: Investigate security incidents and provide post-event analysis and recommendations. Security Tools Management: Manage and maintain firewalls, intrusion detection and prevention systems, antivirus software, and other security tools. Compliance: Ensure compliance with industry regulations and standards. Training: Train technical and non-technical employees on security protocols, procedures, and best practices. Disaster Recovery: Participate in disaster recovery planning and testing to ensure business continuity in the event of a security incident. Job impact:Risk Mitigation: Implementing robust security measures to significantly reduce the risk of data breaches, cyber-attacks, and other security incidents. Proactive Threat Management: Identifying and addressing vulnerabilities before they can be exploited, thereby enhancing the overall security posture of the organisation. Ensuring that the organisation complies with relevant laws, regulations, and industry standards (e.g., GDPR, HIPAA, PCI-DSS), thereby avoiding legal penalties and enhancing trust with stakeholders. Maintaining a state of readiness for security audits and assessments, ensuring that all security controls and measures are well-documented and effective. Developing and implementing disaster recovery plans to ensure business continuity in the event of a security incident or data loss. Efficiently managing and mitigating the impact of security incidents to minimise downtime and operational disruption. Knowledge and experience:Technical Proficiency: In-depth knowledge of network security software - Meraki Cloud, Cloudflare, Mimecast, encryption technologies, and other security hardware and software tools. Current Trends: Stay current with the latest trends in cybersecurity threats and defence strategies. Problem-Solving: Strong problem-solving skills and the ability to work well under pressure. Communication: Good communication skills to effectively train employees and coordinate with other departments. Functional/technical skills: Firewall Management: Proficiency in configuring and managing firewalls to protect network boundaries. Intrusion Detection/Prevention Systems (IDS/IPS): Experience with IDS/IPS to monitor and respond to potential threats. VPNs and Remote Access: Knowledge of setting up and managing Virtual Private Networks (VPNs) and secure remote access solutions. Patch Management: Ability to manage and deploy security patches and updates to systems and applications. Endpoint Security: Experience with endpoint protection solutions, such as antivirus and anti-malware software. Proficiency in implementing and managing encryption technologies to protect data at rest and in transit. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at hays.co.uk
Mar 19, 2026
Full time
UK ONLY - SPONSORSHIP IS NOT AVAILABLE Job Purpose:This role is responsible for overseeing and enhancing the security of our IT systems, data, and networks. You will conduct regular security audits, assessments, and tests, and identify and resolve any vulnerabilities or breaches.You will also develop and implement security policies, procedures, and standards, and ensure compliance with the relevant laws and regulations, and train and educate employees on the best practices and awareness of IT security. Operating Environment:The role operates within the IT Services Team, The IT Services Team includes specialist staff delivering core outputs that are both external-facing and internal key enablers. Framework & Boundaries: The role is responsible for improving the quality, wellbeing and efficiency of our IT Security. The role has external-facing responsibilities and is required and authorised to act as a representative for the organisation. Key accountabilities:Monitor and Inspect: Regularly monitor the network for security threats or breaches. Policy Development: Develop and implement security policies and procedures to safeguard data and systems. Vulnerability Testing: Perform regular vulnerability testing and risk assessments to identify and mitigate security risks. Incident Response: Investigate security incidents and provide post-event analysis and recommendations. Security Tools Management: Manage and maintain firewalls, intrusion detection and prevention systems, antivirus software, and other security tools. Compliance: Ensure compliance with industry regulations and standards. Training: Train technical and non-technical employees on security protocols, procedures, and best practices. Disaster Recovery: Participate in disaster recovery planning and testing to ensure business continuity in the event of a security incident. Job impact:Risk Mitigation: Implementing robust security measures to significantly reduce the risk of data breaches, cyber-attacks, and other security incidents. Proactive Threat Management: Identifying and addressing vulnerabilities before they can be exploited, thereby enhancing the overall security posture of the organisation. Ensuring that the organisation complies with relevant laws, regulations, and industry standards (e.g., GDPR, HIPAA, PCI-DSS), thereby avoiding legal penalties and enhancing trust with stakeholders. Maintaining a state of readiness for security audits and assessments, ensuring that all security controls and measures are well-documented and effective. Developing and implementing disaster recovery plans to ensure business continuity in the event of a security incident or data loss. Efficiently managing and mitigating the impact of security incidents to minimise downtime and operational disruption. Knowledge and experience:Technical Proficiency: In-depth knowledge of network security software - Meraki Cloud, Cloudflare, Mimecast, encryption technologies, and other security hardware and software tools. Current Trends: Stay current with the latest trends in cybersecurity threats and defence strategies. Problem-Solving: Strong problem-solving skills and the ability to work well under pressure. Communication: Good communication skills to effectively train employees and coordinate with other departments. Functional/technical skills: Firewall Management: Proficiency in configuring and managing firewalls to protect network boundaries. Intrusion Detection/Prevention Systems (IDS/IPS): Experience with IDS/IPS to monitor and respond to potential threats. VPNs and Remote Access: Knowledge of setting up and managing Virtual Private Networks (VPNs) and secure remote access solutions. Patch Management: Ability to manage and deploy security patches and updates to systems and applications. Endpoint Security: Experience with endpoint protection solutions, such as antivirus and anti-malware software. Proficiency in implementing and managing encryption technologies to protect data at rest and in transit. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at hays.co.uk
Belcan is recruiting for an OT Security Engineer on a Permanent basis based from our South West London office. This project is working within the Oil & Gas Industry. You'll be joining a culture that values curiosity, expertise, and ideas as well as equal opportunities, inclusion, and authenticity. Location: London / hybrid - with ad-hoc visits to Norway and Poland. Job Purpose As an OT Cyber Security Engineer you will be responsible for providing OT cyber security support and oversight for product development groups and industrial control system environments within our client's organisation. This includes defining, managing, and enforcing IACS security controls, processes and procedures. Rely on experience in both information security and automation technologies focusing on industrial controls systems. Additional responsibilities include serving as a member of the IACS Cyber security team, the information and digital services team, working closely with sites, services, technical teams and product groups to ensure that security requirements and support are provided. Job Description Provide secure design, development, and architecture requirements for Industrial Control Systems (ICS) environments and information and digital systems as they relate to ICS and automation. Provide support to write, review, and maintain documents, policies, and standards governing the cyber security requirements for the ICS environment. Provide secure architecture requirements for lab and development networks. Perform security reviews and assessments of systems, networks, and processes/procedures in ICS environments. Assist with testing, selection and implementation of security technologies in ICS environments. Provide support for projects and initiatives that enables sites to accomplish project goals in a secure manner. Provide support for management and remediation of vulnerabilities identified in ICS environments. Support on the development of cyber security technology implementation strategies for ICS environments with clear understanding of the differences between IT and OT environments. Support the execution of risk-based methodologies for cyber security assessments of ICS systems, including remote sites, onsite, third party, and on vessels. Support on the creation of technical design documentation and to write technical reports for both technical and management consumption and understanding. Follows the established metrics and key performance indicators to monitor the overall health and effectiveness of the ISC cyber security program. Stays informed about the latest cyber threats to the ICS environment including threats towards the organisation. Supports on the development of strategies and plans to mitigate emerging cyber threats. Experience required for this role: Bachelor's degree or equivalent Strong technical ICS experience : ability to review configurations of ICS, identify best practices for backup and recovery of ICS, and understand industrial protocols. Good general technical knowledge: Applications technologies, networks, protocols, databases, operating systems (Windows/Linux) Understanding of Industrial Networks Experience using ICS software including: Engineering Software Version Management Software HMI Software OPC Software Working knowledge of networking concepts, ability to review network designs, and perform security assessments of network devices (e.g. switches, routers, firewalls). Cybersecurity certifications (e.g.: CISSP) ICS Security Certifications (SANS GICSP, ISA/IEC 62443 Risk Assessment Specialist) Experience implementing security controls, hardening, and technologies in automation systems and networks. Experience implementing vulnerability and patch management in ICS environments. Working knowledge of IACS Security standards. Willingness to travel to other client sites in Europe (5%). This vacancy is being advertised by Belcan.
Mar 16, 2026
Full time
Belcan is recruiting for an OT Security Engineer on a Permanent basis based from our South West London office. This project is working within the Oil & Gas Industry. You'll be joining a culture that values curiosity, expertise, and ideas as well as equal opportunities, inclusion, and authenticity. Location: London / hybrid - with ad-hoc visits to Norway and Poland. Job Purpose As an OT Cyber Security Engineer you will be responsible for providing OT cyber security support and oversight for product development groups and industrial control system environments within our client's organisation. This includes defining, managing, and enforcing IACS security controls, processes and procedures. Rely on experience in both information security and automation technologies focusing on industrial controls systems. Additional responsibilities include serving as a member of the IACS Cyber security team, the information and digital services team, working closely with sites, services, technical teams and product groups to ensure that security requirements and support are provided. Job Description Provide secure design, development, and architecture requirements for Industrial Control Systems (ICS) environments and information and digital systems as they relate to ICS and automation. Provide support to write, review, and maintain documents, policies, and standards governing the cyber security requirements for the ICS environment. Provide secure architecture requirements for lab and development networks. Perform security reviews and assessments of systems, networks, and processes/procedures in ICS environments. Assist with testing, selection and implementation of security technologies in ICS environments. Provide support for projects and initiatives that enables sites to accomplish project goals in a secure manner. Provide support for management and remediation of vulnerabilities identified in ICS environments. Support on the development of cyber security technology implementation strategies for ICS environments with clear understanding of the differences between IT and OT environments. Support the execution of risk-based methodologies for cyber security assessments of ICS systems, including remote sites, onsite, third party, and on vessels. Support on the creation of technical design documentation and to write technical reports for both technical and management consumption and understanding. Follows the established metrics and key performance indicators to monitor the overall health and effectiveness of the ISC cyber security program. Stays informed about the latest cyber threats to the ICS environment including threats towards the organisation. Supports on the development of strategies and plans to mitigate emerging cyber threats. Experience required for this role: Bachelor's degree or equivalent Strong technical ICS experience : ability to review configurations of ICS, identify best practices for backup and recovery of ICS, and understand industrial protocols. Good general technical knowledge: Applications technologies, networks, protocols, databases, operating systems (Windows/Linux) Understanding of Industrial Networks Experience using ICS software including: Engineering Software Version Management Software HMI Software OPC Software Working knowledge of networking concepts, ability to review network designs, and perform security assessments of network devices (e.g. switches, routers, firewalls). Cybersecurity certifications (e.g.: CISSP) ICS Security Certifications (SANS GICSP, ISA/IEC 62443 Risk Assessment Specialist) Experience implementing security controls, hardening, and technologies in automation systems and networks. Experience implementing vulnerability and patch management in ICS environments. Working knowledge of IACS Security standards. Willingness to travel to other client sites in Europe (5%). This vacancy is being advertised by Belcan.
UK ONLY - SPONSORSHIP IS NOT AVAILABLE Job Purpose: This role is responsible for overseeing and enhancing the security of our IT systems, data, and networks. You will conduct regular security audits, assessments, and tests, and identify and resolve any vulnerabilities or breaches.You will also develop and implement security policies, procedures, and standards, and ensure compliance with the relevant laws and regulations, and train and educate employees on the best practices and awareness of IT security. Operating Environment:The role operates within the IT Services Team, The IT Services Team includes specialist staff delivering core outputs that are both external-facing and internal key enablers. Framework & Boundaries: The role is responsible for improving the quality, wellbeing and efficiency of our IT Security. The role has external-facing responsibilities and is required and authorised to act as a representative for the organisation. Key accountabilities:Monitor and Inspect: Regularly monitor the network for security threats or breaches. Policy Development: Develop and implement security policies and procedures to safeguard data and systems. Vulnerability Testing: Perform regular vulnerability testing and risk assessments to identify and mitigate security risks. Incident Response: Investigate security incidents and provide post-event analysis and recommendations. Security Tools Management: Manage and maintain firewalls, intrusion detection and prevention systems, antivirus software, and other security tools. Compliance: Ensure compliance with industry regulations and standards. Training: Train technical and non-technical employees on security protocols, procedures, and best practices. Disaster Recovery: Participate in disaster recovery planning and testing to ensure business continuity in the event of a security incident. Job impact:Risk Mitigation: Implementing robust security measures to significantly reduce the risk of data breaches, cyber-attacks, and other security incidents. Proactive Threat Management: Identifying and addressing vulnerabilities before they can be exploited, thereby enhancing the overall security posture of the organisation. Ensuring that the organisation complies with relevant laws, regulations, and industry standards (e.g., GDPR, HIPAA, PCI-DSS), thereby avoiding legal penalties and enhancing trust with stakeholders. Maintaining a state of readiness for security audits and assessments, ensuring that all security controls and measures are well-documented and effective. Developing and implementing disaster recovery plans to ensure business continuity in the event of a security incident or data loss. Efficiently managing and mitigating the impact of security incidents to minimise downtime and operational disruption. Knowledge and experience:Technical Proficiency: In-depth knowledge of network security software - Meraki Cloud, Cloudflare, Mimecast, encryption technologies, and other security hardware and software tools. Current Trends: Stay current with the latest trends in cybersecurity threats and defence strategies. Problem-Solving: Strong problem-solving skills and the ability to work well under pressure. Communication: Good communication skills to effectively train employees and coordinate with other departments. Functional/technical skills: Firewall Management: Proficiency in configuring and managing firewalls to protect network boundaries. Intrusion Detection/Prevention Systems (IDS/IPS): Experience with IDS/IPS to monitor and respond to potential threats. VPNs and Remote Access: Knowledge of setting up and managing Virtual Private Networks (VPNs) and secure remote access solutions. Patch Management: Ability to manage and deploy security patches and updates to systems and applications. Endpoint Security: Experience with endpoint protection solutions, such as antivirus and anti-malware software. Proficiency in implementing and managing encryption technologies to protect data at rest and in transit. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
Feb 27, 2026
Full time
UK ONLY - SPONSORSHIP IS NOT AVAILABLE Job Purpose: This role is responsible for overseeing and enhancing the security of our IT systems, data, and networks. You will conduct regular security audits, assessments, and tests, and identify and resolve any vulnerabilities or breaches.You will also develop and implement security policies, procedures, and standards, and ensure compliance with the relevant laws and regulations, and train and educate employees on the best practices and awareness of IT security. Operating Environment:The role operates within the IT Services Team, The IT Services Team includes specialist staff delivering core outputs that are both external-facing and internal key enablers. Framework & Boundaries: The role is responsible for improving the quality, wellbeing and efficiency of our IT Security. The role has external-facing responsibilities and is required and authorised to act as a representative for the organisation. Key accountabilities:Monitor and Inspect: Regularly monitor the network for security threats or breaches. Policy Development: Develop and implement security policies and procedures to safeguard data and systems. Vulnerability Testing: Perform regular vulnerability testing and risk assessments to identify and mitigate security risks. Incident Response: Investigate security incidents and provide post-event analysis and recommendations. Security Tools Management: Manage and maintain firewalls, intrusion detection and prevention systems, antivirus software, and other security tools. Compliance: Ensure compliance with industry regulations and standards. Training: Train technical and non-technical employees on security protocols, procedures, and best practices. Disaster Recovery: Participate in disaster recovery planning and testing to ensure business continuity in the event of a security incident. Job impact:Risk Mitigation: Implementing robust security measures to significantly reduce the risk of data breaches, cyber-attacks, and other security incidents. Proactive Threat Management: Identifying and addressing vulnerabilities before they can be exploited, thereby enhancing the overall security posture of the organisation. Ensuring that the organisation complies with relevant laws, regulations, and industry standards (e.g., GDPR, HIPAA, PCI-DSS), thereby avoiding legal penalties and enhancing trust with stakeholders. Maintaining a state of readiness for security audits and assessments, ensuring that all security controls and measures are well-documented and effective. Developing and implementing disaster recovery plans to ensure business continuity in the event of a security incident or data loss. Efficiently managing and mitigating the impact of security incidents to minimise downtime and operational disruption. Knowledge and experience:Technical Proficiency: In-depth knowledge of network security software - Meraki Cloud, Cloudflare, Mimecast, encryption technologies, and other security hardware and software tools. Current Trends: Stay current with the latest trends in cybersecurity threats and defence strategies. Problem-Solving: Strong problem-solving skills and the ability to work well under pressure. Communication: Good communication skills to effectively train employees and coordinate with other departments. Functional/technical skills: Firewall Management: Proficiency in configuring and managing firewalls to protect network boundaries. Intrusion Detection/Prevention Systems (IDS/IPS): Experience with IDS/IPS to monitor and respond to potential threats. VPNs and Remote Access: Knowledge of setting up and managing Virtual Private Networks (VPNs) and secure remote access solutions. Patch Management: Ability to manage and deploy security patches and updates to systems and applications. Endpoint Security: Experience with endpoint protection solutions, such as antivirus and anti-malware software. Proficiency in implementing and managing encryption technologies to protect data at rest and in transit. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)