Found 1,524 jobs
Refine your search
- Aerospace 319
- Central Government 150
- Counter Terrorism 254
- Defence 651
- Engineering 425
- Information Technology 575
- Investigation 200
- Policing 379
- Public Sector 117
- Surveillance 192
- More…
- England 1254
- Wales 14
- Scotland 35
- Northern Ireland 18
- Africa 11
- Asia Pacific 6
- Asia 6
- Europe 1447
- Homeworking 46
- North America 25
- More…
- £20,000 - £29,999 233
- £30,000 - £39,999 950
- £40,000 - £49,999 933
- £50,000 - £59,999 943
- £60,000 - £69,999 463
- £70,000 - £79,999 139
- £80,000 - £89,999 127
- £90,000 - £99,999 99
- £100,000 - £109,999 95
- £110,000 - £119,999 87
- More…
- Recruitment Consultant 451
- Direct Employer 1073
- Analyst 39
- Consultant 35
- DevOps Engineer 22
- Java 5
- Network Engineer 14
- Project Manager 56
- Software Developer 9
- Software Engineer 40
- Systems Engineer 22
- Tester 7
- More…
-
DV Cleared Project Manager
Technical Project Manager role / Must have current and valid DV clearance
-
Linux 3rd Line Engineer (With training across HPC) - PERM
Linux Engineer - 3rd Line (With HPC Pathway) Location: Stevenage Salary: £45,000 - £55,000 Type - Fully on-site (Security Purposes) Clearance: M...
-
Persian Language Specialist Ref.2977
1 About Us MI5, MI6 and GCHQ are the UK's Intelligence Services. We work together to safeguard Britain's people, interests and businesses from various
-
Mandarin Language Specialist Ref. 3144
1 Your knowledge of Mandarin could open up a career in intelligence. By joining MI5, MI6, and GCHQ, you can play your part in protecting the UK. About
Related courses
-
MSc Data Science and Artificial Intelligence
Pursue a career in this high-demand sector while gaining a deep and systematic understanding into the domains of data science and AI
-
MSc Information Systems Management
Take your career to the next level with this online Information Systems Management MSc that can enable you to become an effective leader in technology
-
MSc Cyber Security
Gain a comprehensive and critical understanding of the theory and techniques of cyber security and how to apply them to real-world situations