support to clients at all levels of their organisations. Responsibilities Perform high quality technical analysis, helping our clients to understand what happened during a cybersecurity incident or data breach. Produce high quality output in a variety of formats, from daily update briefs to full technical investigation reports. Support technical … Provide mentoring and oversight to the incident response practice to help the team grow and develop. Collaborate and build relationships with PwC's wider CyberSecurity practice, sharing insights gained from responding to incidents and helping other teams win and deliver work. Play a role in PwC's global incident … Required Skills Optional Skills Accepting Feedback, Active Listening, Analytical Thinking, Coaching and Feedback, Communication, Creativity, Cybersecurity Framework, Cybersecurity Governance, Cybersecurity Risk Management, Cybersecurity Strategy, CyberSecurity Threat Mitigation, Cyber Threat Intelligence, Digital Forensics, Embracing Change, Emotional Regulation, Empathy, Firewall (Network Security), Forensic Investigation, Incident Management, Incident Remediation, Incident Response Plan More ❯
Consultant- CyberSecurity Consulting & Advisory Consultant Process Cybersecurity Competency Management Cyber Competency Strategy Planning Company: ITL UK Requisition ID: 132349BR Role - Consultant (JL5) Technology - CyberSecurity Consulting & Advisory Location - London (UK) Business Unit - CyberSecurity, Cyber C&A, IOT/OT Team Compensation - Competitive (including bonus) Job Description Today, the … be the cornerstones of our organization and these values are upheld only because of our people. Your role As a Consultant in the Infosys Cybersecurity Consulting & Advisory team, you are an expert at contributing to different phases of the Cybersecurity consulting lifecycle. You will be intensely involved in … shape value-adding consulting solutions that enable our clients to meet the changing needs of the global landscape. Required: Industry experience working in enterprise cybersecurity domain OT Security Strategy & Program Management: Assess OT security risks, develop security roadmaps, and align OT security measures with enterprise IT security frameworks. Deploy More ❯
company and customer information. Conduct regular security audits and risk assessments to ensure compliance with regulatory standards. Lead employee training and awareness programs on cybersecurity practices. What you'll need to succeed 5+ years of experience in IT management or system administration 2+ years in an InfoSec-related role Technical More ❯
and access management (IAM). Foster a culture of security awareness across teams, providing training and mentorship to engineering and development teams. Monitor emerging cybersecurity trends and threats, advising on proactive measures and innovative defense strategies. Design and manage security incident response plans and ensure readiness through regular testing and More ❯
managing SIEM rule sets, creating dashboards, and correlating data for threat detection. Familiarity with security event log analysis, alerts management, and incident response workflows. Cybersecurity Frameworks & Compliance: Knowledge of Cyber Essentials Plus and ISO 27001 compliance requirements. Ability to help maintain and audit compliance for ongoing security certifications. Demonstrated experience More ❯
Qualifications/Skills: Bachelor's degree in computer science, Information Security, or a related field (or equivalent work experience). Master's degree in Cybersecurity or Networking is desirable. Proven experience as a Network and Security Engineer or similar role, with focus on IP network design, implementation, T-shoot and More ❯
with technical CLS Security acumen. Financial and/or Banking industry experience preferred. S. in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent) or Security Certifications such as CISSP, CISM, SANS GIAC GSEC, GCED, GCIA, GCIH, GREM; or Cisco CCNA, CCNP; or equivalent. Industry recognized cloud More ❯
Vulnerability Management, Privileged Access Management, Identity and Access Management, Data Loss Prevention, Network Security and Penetration Testing. Act as lead SME on IT and CyberSecurity Improvement Projects. Play an active role in IT projects and operational processes (e.g., change management, exception management) to assess from an IT security standpoint More ❯
networks, and logs for any signs of security incidents or unauthorized access and respond promptly to mitigate risks. Investigate security breaches, incidents, and other cybersecurity events, and develop incident response plans to ensure timely and effective resolution. Collaborate with cross-functional teams to design, implement, and maintain security controls and More ❯
networks, and logs for any signs of security incidents or unauthorized access and respond promptly to mitigate risks. Investigate security breaches, incidents, and other cybersecurity events, and develop incident response plans to ensure timely and effective resolution. Collaborate with cross-functional teams to design, implement, and maintain security controls and More ❯
Belfast, Bristol, Edinburgh, London, Manchester Business Line Date published: 17-Mar-2025 Connect to your Industry Do you want to be at the heart of some of the most interesting and purposeful projects undertaken to support and protect our country More ❯
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward - always pushing ourselves to go further in More ❯
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward - always pushing ourselves to go further in More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
managing SIEM rule sets, creating dashboards, and correlating data for threat detection. Familiarity with security event log analysis, alerts management, and incident response workflows. Cybersecurity Frameworks & Compliance: Knowledge of Cyber Essentials Plus and ISO 27001 compliance requirements. Ability to help maintain and audit compliance for ongoing security certifications. Threat Hunting More ❯
networks, and logs for any signs of security incidents or unauthorized access and respond promptly to mitigate risks Investigate security breaches, incidents, and other cybersecurity events, and develop incident response plans to ensure timely and effective resolution Collaborate with cross-functional teams to design, implement, and maintain security controls and More ❯
Sr CyberSecurity Governance Manager Company Overview 83zero is working with a leading IT consultancy that partners with global organisations to deliver IT operations along with business advancements through the adoption of new and innovative technologies. Our client partners with a number of international private businesses in shipping, real estate … site in Marble Arch) Private medical Company bonus Opportunities for professional growth and development Life Assurance Cycle to work scheme An intro to the CyberSecurity Governance Manager role… You will take ownership and drive improvements to the way the business manages information and cybersecurity activities working closely with … the vendor risk assessment processes and ensure cybersecurity contractual requirements for cybersecurity are considered. Manage, where required, cybersecurity incidents on behalf of the Group CyberSecurity Officer, supporting Security Operational Analyst and MDR team. Support and advise on the deployment of appropriate tools technologies and configurations, ensuring that they align More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Reed Technology
Global CyberSecurity Manager Location: Hybrid (London 3 days, Remote 2 days) Job Type: Full-time Salary: Competitive gross pay circa £80,000 + annual performance bonus of 10% of base salary A new exciting global permanent opportunity has become available to join a global, leading organisation in the energy … sector as a Global CyberSecurity Manager. This role is pivotal in ensuring the company meets its cybersecurity standards and objectives worldwide. You will be responsible for setting security requirements, evaluating design proposals, and leading a team to mitigate risks effectively. Day-to-day of the role: Strategy and … and mitigate risks. Protect the company's digital assets from current and emerging threats. Required Skills & Qualifications: BS or MA in computer science, information security, cybersecurity, or a related field. 3-5+ years of experience in cybersecurity, IT audit, or enterprise risk management (ERM). Familiarity with regulatory compliance More ❯
best practices, policies, and tool implementations. What You'll Bring 5+ years of experience in security operations or incident response. Bachelor's degree in Cybersecurity, Computer Science, or related field, or equivalent work experience. Extensive knowledge of SIEM, EDR, Web & Email Gateways, Cloud Security, and firewall technologies. Proficiency in scripting More ❯
As Security Operations Manager at Two Circles, you play a key role in keeping our systems, people and data safe from external and internal threats by focusing on incident detection, response and remediation; threat hunting; security monitoring; continual improvement and More ❯
About Northern Trust: Northern Trust, a Fortune 500 company, is a globally recognized, award-winning financial institution that has been in continuous operation since 1889. Northern Trust is proud to provide innovative financial services and guidance to the world's More ❯
About Northern Trust: Northern Trust, a Fortune 500 company, is a globally recognized, award-winning financial institution that has been in continuous operation since 1889. Northern Trust is proud to provide innovative financial services and guidance to the world's More ❯
vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze … an international enterprise environment is essential. Responsibilities: Collaborate with IT teams for input and operational requirements to design and implement the company's overall cybersecurity strategy. Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls. Manage access to elevated … privileges accounts and audit activities to meet business and regulatory requirements. Evaluate and/or implement cybersecurity solutions and controls to maintain confidentiality, integrity, and availability. Actively participate in proofs-of-concept for new security technologies by developing selection criteria to identify appropriate security solutions to support strategic, operational needs More ❯
and control frameworks Threat/vulnerability management Network security Professional qualifications/certifications: B.S. in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent). Relevant certification is desirable, e.g., CISSP, CISM, CISA, CRISC. Working knowledge of Risk Management life cycles based on an established framework: NIST More ❯
s information systems, ensuring compliance with industry best practices and regulatory requirements. Key Skills Proven experience as a Security Architect or in a similar cybersecurity role, ideally within an enterprise environment. In-depth knowledge of security principles, methodologies, and tools (e.g., firewalls, VPNs, IDS/IPS, SIEM, encryption, access control More ❯