UK Firm. Taking a holistic approach, this includes gathering requirements, solution design, build and run and the execution of complex change portfolios focused on security, data, core infrastructure and business applications. Threat Detection Team The Team is an important function within Security Operations. The team play a key … ensuring that the business IT systems are protected and monitored from cyber threats. The team works with external MSSPs to monitor, analyse, report cyber security threats and respond accordingly. The team works with the different internal business capabilities to ensure that securitymonitoring service is embedded into … their solutions. The team is also responsible for making sure that securitymonitoring is aligned with cyber threat landscape and business risks on an ongoing basis. Senior Threat Detection Analyst (SOC) The person will be playing a key role in ensuring that the business IT systems are protected more »
You will need to login before you can apply for a job. The Principal Security Architect will orchestrate the design and deployment of comprehensive security architectures across cloud platforms, microservices, and enterprise systems within the consumer business. They will drive the development and execution of the consumer security strategy, ensuring the implementation of technology roadmaps that improve and safeguard the company's overall security posture. This role requires a deep understanding of cloud-native security, application security, data security, and enterprise security technologies. You will work closely with developers, security engineers … and DevSecOps teams to integrate security into the entire software development lifecycle and enterprise infrastructure. Key Responsibilities: Develop and maintain comprehensive security architecture documentation aligned with business goals, enterprise target architecture, and industry standards. Design and implement security frameworks for cloud-native environments, ensuring secure deployment on more »
Principal Security Architect – Insurance - £110-130k The Information Security Lead Architect is a strategic technical leader responsible for designing and implementing comprehensive security architecture solutions across the organization. This role combines the expertise in security frameworks, technologies, and best practices with the ability to oversee … the development and implementation of enterprise-wide security solutions, ensuring IT systems alignment with industry standards and regulatory compliance. The Principal Security Architect operates autonomously with minimal supervision, collaborating consultatively with the Director of Information Security and other senior security leaders. Job Responsibilities: Lead the development … and implementation of the information security and data protection architecture strategy and roadmap, ensuring alignment with business objectives, regulatory requirements, and industry best practices. Provide technical leadership and guidance to the information security team, overseeing the design, implementation, and integration of security solutions across the organization. Collaborate more »
West Midlands, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
data-driven, trusted and sustainable digital transformation. As a next generation digital business with worldwide leading positions in digital, cloud, data, advanced computing and security, it brings deep expertise for all industries in more than 47 countries. By uniting unique high-end technologies across the full digital continuum with … Eviden expands the possibilities of data and technology, now and for generations to come. The opportunity: We are seeking a skilled and experienced Cloud Security Architect to design, implement, and optimize Security within our customers cloud environments. As a Cloud Security Architect, you will be responsible for … developing a comprehensive security strategy, defining architecture and policies, integrating, and optimizing threat detection, and enabling advanced securitymonitoring to ensure our customers digital assets remain secure from cyber threats. Youll work collaboratively with cybersecurity engineers and analysts, IT teams, and other stakeholders to assess the securitymore »
data-driven, trusted and sustainable digital transformation. As a next generation digital business with worldwide leading positions in digital, cloud, data, advanced computing and security, it brings deep expertise for all industries in more than 47 countries. By uniting unique high-end technologies across the full digital continuum with … Eviden expands the possibilities of data and technology, now and for generations to come. The opportunity: We are seeking a skilled and experienced Cloud Security Architect to design, implement, and optimize Security within our customers cloud environments. As a Cloud Security Architect, you will be responsible for … developing a comprehensive security strategy, defining architecture and policies, integrating, and optimizing threat detection, and enabling advanced securitymonitoring to ensure our customers digital assets remain secure from cyber threats. Youll work collaboratively with cybersecurity engineers and analysts, IT teams, and other stakeholders to assess the securitymore »
sunbury, south east england, united kingdom Hybrid / WFH Options
BP Energy
Entity: Technology Job Family Group: IT&S Group Job Description: BP are looking for a Security Operations Specialist to join us in our Sunbury offices and work within our Automation Systems Security Operations Team, providing security services to Operational Technology environments around the globe. In this customer … facing support role you’ll be responsible for monitoring and managing Firewalls and other security technologies within the specialism. Using established technical capabilities, you will implement change, troubleshoot and support the delivery of new solutions and initiatives. The Specialist will follow and improve established process/procedure and … contribute to the creation of new. Assisting in the remediation of security incidents, liaising with internal and external stakeholders, and supporting the remediation of security vulnerabilities forms part of the role. This position will be working on a Monday to Friday day’s only shift pattern, working one more »
Kingston Upon Hull, East Riding of Yorkshire, United Kingdom
Akkodis
Cloud Security Engineer - AWS Akkodis are currently working in partnership with a leading service provider to recruit an experienced Cloud Security Engineer with extensive experience of AWS. You who will provide security expertise for the cloud infrastructure. You will collaborate with DevOps and engineering teams to design … build, and maintain security services, ensuring compliance with relevant regulations and industry standards. The Role As a Cloud Security Engineer you will improve securitymonitoring and automation across AWS infrastructure and support ongoing security operations. You will also proactively assess systems for vulnerabilities and work … with stakeholders to embed security standards and best practices. The Responsibilities Responsible for the continued development and improvement of cloud security posture; by providing security expertise and guidance on cloud infrastructure. Work with the Cloud Infrastructure team - AWS to ensure secure practices on AWS Organisation tenants. Conduct more »
Job title: Information Security & Cyber Security Analyst Client: Banking Salary: £60,000-£75,000 + Bonus Location: London/Hybrid Skills: Information Security, Cyber Security, SIEM, EDR, Wireshark, Incident Response, Vulnerability Management The role: My client are seeking a knowledgeable Information & Cyber Security Analyst to … join their team. This role is focused on the business side of Security, and is absolutely key in assuring that information is protected and secured at all times. You will ideally have 5+ years experience working in Information/Cyber Security. The position is broadly split into a few … core areas Incident Response Vulnerability Management SIEM SecurityMonitoring You will advise on Security best practices, and act as SME when assisting other teams. The ideal candidate will have: Incident Response experience SecurityMonitoring experience Vulnerability Management experience Knowledge and understanding of technical Securitymore »
you be responsible for as an IT & Cyber Analyst at Leumi UK? IT Operations: Coordinate IT Operations: Facilitate smooth collaboration between service delivery, information security, and IT teams, ensuring alignment across all functions. Cloud Services Management: Assist with managing cloud infrastructure (Microsoft 365, Azure, AWS), ensuring optimal performance, cost … of communication for incidents affecting IT systems and cloud infrastructure, ensuring swift escalation and resolution. Documentation and Reporting: Maintain comprehensive documentation of IT and security processes. Provide regular reports on operational performance, security metrics, and incident handling. Information Security Responsibilities: Security Policy Implementation: Ensure that security policies and procedures are enforced across all IT and cloud platforms, assisting the Information Security Manager in aligning with company-wide security strategies. Compliance & Risk Management: Assist in maintaining compliance with industry standards and regulations (e.g., GDPR). Help conduct risk assessments and internal security audits. more »
Forter is looking for a Senior SOC Engineer to enhance our security operations and ensure robust protection against sophisticated threats. This role is crucial for maintaining our Security Operations as a high-performing and resilient hub that can quickly adapt to emerging security challenges in the fintech … industry. You will take the lead in refining our SOC capabilities by monitoring network traffic, analyzing security incidents, managing security tools, automating processes, and providing expertise to SOC analysts, without having direct management responsibilities. The Senior SOC Engineer collaborates with cross-functional teams to build defenses, respond … critical role in defending against sophisticated threats in a high-stakes fintech environment. As a Senior SOC Engineer, you will: Shape the Future of Security : Lead initiatives to enhance our SOC capabilities, using cutting-edge technologies and automation tools to protect against advanced threats in real-time. Make an more »
This is a fantastic opportunity to work alongside a highly skilled Security Consultancy Team who specialise across the full range of cyber security disciplines. We are a fast growing Small to Medium-Sized Enterprise (SME) who offer a varied workload day-to-day, with long term careers through … do the school run has taken a huge level of stress off myself and my partner’s life” … - About Logiq Logiq Consulting are Cyber Security and Information Assurance experts. Specialising in delivering leading edge consultancy to clients with high-risk business operations, along with a range of security … and Public Sector. - Our existing programmes of work are expanding rapidly, and we have urgent requirements for a number of Associate Senior/Principal Security Consultants to join us between now and the next 6 month to enable us to continue to deliver at an accelerated rate. Ideally you more »
Storage: • Design and optimize data storage solutions using BigQuery Storage. • Collaborate with data engineers and analysts to ensure efficient data processing and analysis. • Wiz Security Control Integration: • Integrate and configure Wiz Security Control for continuous securitymonitoring and compliance checks within GCP environments. • Collaborate with security teams to implement and enhance security controls. • Automation and Tooling: • Implement automation and tooling solutions for monitoring, scaling, and managing GCP resources. • Develop and maintain scripts and tools to streamline operational tasks. • Security and Compliance: • Implement security best practices in GCP environments, including identity and … access management, encryption, and compliance controls. • Must understand the Policies as a Code in GCP • Perform regular security assessments and audits. Requirements: • Bachelor's Degree: • Bachelor’s degree in Computer Science, Information Technology, or a related field. • GCP Certification: • GCP Professional Cloud Architect or similar certifications are highly desirable. more »
London, England, United Kingdom Hybrid / WFH Options
Transport for London
their own application fees. About Us As cyber threats continue to diversify and grow, so too does TfL’s need to develop our cyber security culture and capabilities to ensure we continue to protect the services and systems which keep London moving. TfL’s cyber security professionals play … safeguarding our customers as they travel across London’s Transport network. About The Role You will support the threat hunting function within the TfL Security Operations Centre (SOC), providing the skills needed to develop a world-class hunting capability across the organization. You will be responsible for coordinating hunting … to identify and remediate potential threats. You will be responsible and accountable for defined aspects of the implementation and improvement of TfL's cyber security posture. This includes the identification and capture of requirements, engagement with stakeholders, the selection and delivery of solutions, and ensuring that solutions maintain their more »
Solihull, West Midlands, United Kingdom Hybrid / WFH Options
Proactive Appointments Limited
IT Security Lead Are you an experienced IT Security professional looking for your next challenge? Our prestigious financial services client in the Solihull area is seeking a talented IT Security Lead to join their dynamic team on a hybrid basis . This is a fantastic opportunity for … a hands-on, security-focused individual with a strong technical background in Microsoft technologies , including Azure , and a solid understanding of PowerShell scripting. Key Responsibilities: Hands-on maintenance and administration of security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, and content filtering. … Architect, implement, and maintain robust security systems to protect IT infrastructure. Oversee security operations for Windows and *nix operating systems, including public and private cloud hosting. Develop in-house tools and security-related applications/controls as needed. Leverage IT securitymonitoring tools and SIEM more »
Fisher Investments is growing internationally and we are looking for an Information Security Response Specialist to bring their talent and experience to our team. You will guide future global growth through strategic solutions and new ideas, support our growing firm's diverse departments by managing and participating in the … security response process, identifying risks to our organization, and collaborating with Technology and Governance teams at an Enterprise level. The Opportunity: As an Information Security Response Specialist, you will oversee activities relating to the monitoring and response of security incidents. You will consume, research, triage and … document security events and alerts as they are received. Supporting multiple security-related platforms, working with team members in Information Security, Technology, other internal departments and external customers/partners. You will coordinate support for incident response efforts with application, system and networking teams. Working with IT more »
TWX have partnered with a Cyber Security technology and service provider headquartered in Gloucestershire. They are looking to add multiple SOC Analysts to their current team, with the primary aim being to undertake and support the response to a cybersecurity event or incident as well as support other cyber … provide practical guidance for the response, coordinate recovery activities, and work to prevent future incidents from reoccurring. Additionally, you will be helping with the monitoring of information security controls within the business by analysing alerts received in line with our information security policies and practices and dealing … with any/all security incidents. WHY? Working within a comprehensive team with decades of experience in Cyber and Incident Response £45K - £60K DOE Additional Training Budget 23 days Annual Leave + Bank Holidays + 3 days between Christmas and New Year. Private Healthcare Buyback Scheme Mostly Remote Working more »
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
+ bonus This person must have previously or currently be working for a Managed Service Provider Build, develop and shape Security practice Define strategy aligning with business goals Potential to develop into CISO You will be responsible for technically leading and developing a team of Cyber Security experts. … Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a “people manager” as well as someone who can drive technology, drive performance and … this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerability management, major incident response, and securitymonitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and Reporting. Responsibilities Own the evolution and more »
Cyber Security Office - Operational Technology (OT) Cyber Security analyst – Compliance and vulnerability management The objective of the OT Cyber hub is to reduce the risk of security threats to OT assets at GSK. GSK is looking for an experienced cybersecurity compliance analyst to perform tasks related to … plans must be established and identified, and their completion must be tracked and reported. The role also includes to support with the implementation and monitoring of our internal OT Cyber Security Standards into manufacturing, R&D and facilities. It may also include the coordination of various tasks related … to the improvement of our securitymonitoring capabilities. Cybersecurity analyst Key responsibilities are: Engage with stakeholders across GSK to plan and execute compliance monitoring activities. Identify compliance gaps and areas for improvement. Document findings and provide recommendations for remediation. Identify asset owners based on various data sources more »
Cyber Intelligence Specialist, you will proactively identify, analyse, respond, and mitigate cyber threats that pose risks to Vanquis Banking Groups cybersecurity posture. This involves monitoringsecurity events, conducting incident response activities, enhancing our threat detection capabilities, and ensuring compliance with policy, standards, and regulation. Your contributions will directly … Manager Cards, you will: Actively participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, Penetration Testing & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. … Collaborate and assist with the investigation and resolution of complex security incidents. Support the delivery of retrospective improvements based on incident analysis, RCAs and PIRs. Engage with third-party security partners to enhance and mature services. Maintain centralised processes across all VBG product lines, promoting synergy and efficiency. more »
exciting Cyber Transformation Project. Home based role. A great opportunity to join our team as our Senior SOC Analyst to be responsible for handing security incidents received/escalated from the SOC Analyst (Tier 1 or Tier 2) and perform a business impact analysis on the security incident. … our Cyber Transformation Project. We are looking for a strong technical background, possibly IT Engineering or Systems Administration (cloud and on-premises), coupled with security experience to bring a multi-faceted set of skills to Capita's Cyber Security toolsets. An excellent working knowledge of MS Sentinel is … Networking, Compute, Database, Scripting languages and Cloud technology. The role sits across the full end to end process of building, delivering and running Cyber Security Services that leverage Microsoft Security products in addition to market leading security vendors, thus adaptability and enthusiasm to adopt new challenges and more »
City of London, England, United Kingdom Hybrid / WFH Options
Capita
exciting Cyber Transformation Project. Home based role. A great opportunity to join our team as our Senior SOC Analyst to be responsible for handing security incidents received/escalated from the SOC Analyst (Tier 1 or Tier 2) and perform a business impact analysis on the security incident. … our Cyber Transformation Project. We are looking for a strong technical background, possibly IT Engineering or Systems Administration (cloud and on-premises), coupled with security experience to bring a multi-faceted set of skills to Capita's Cyber Security toolsets. An excellent working knowledge of MS Sentinel is … Networking, Compute, Database, Scripting languages and Cloud technology. The role sits across the full end to end process of building, delivering and running Cyber Security Services that leverage Microsoft Security products in addition to market leading security vendors, thus adaptability and enthusiasm to adopt new challenges and more »
exciting Cyber Transformation Project. Home based role. A great opportunity to join our team as our Senior SOC Analyst to be responsible for handing security incidents received/escalated from the SOC Analyst (Tier 1 or Tier 2) and perform a business impact analysis on the security incident. … our Cyber Transformation Project. We are looking for a strong technical background, possibly IT Engineering or Systems Administration (cloud and on-premises), coupled with security experience to bring a multi-faceted set of skills to Capita's Cyber Security toolsets. An excellent working knowledge of MS Sentinel is … Networking, Compute, Database, Scripting languages and Cloud technology. The role sits across the full end to end process of building, delivering and running Cyber Security Services that leverage Microsoft Security products in addition to market leading security vendors, thus adaptability and enthusiasm to adopt new challenges and more »
and Exposure Manager (CTEM) will lead collecting threat information relating to technology vulnerabilities that effect BDO. This includes conducting and analyzing output from continuous security assessments/securitymonitoring platforms and combining this, with relevant threat intelligence, producing risk-based and contextualized prioritization for remediation teams. Additionally … the Vulnerability and Exposure Manager (CTEM) will understand the purpose and role of breach and attack simulation tools and their role in a modern security aware organization. The role holder will utilise these platforms to continuously assess BDO s overall cyber security posture, ptoviding insights to help drive … the overall Cyber Security strategy and compliance obligations. In this role you ll: Lead on technical cyber security assurance activities Conduct vulnerability and exposure assessments using CSPM (Cloud Security Posture Management) and Vulnerability management platforms following the CTEM (Continuous Threat Exposure Management) framework Work closely with the more »
threats. You will be expected to assess vulnerabilities, monitor networks for suspicious activity, and develop strategies to protect Group Information assets. Providing guidance on security best practices, overseeing incident response, and ensuring compliance with security regulations and policies. As the Senior Cyber Analyst, you will work with the … Technical Information Security Officer and Cyber Security Manager to support the delivery of highly effective technical standards and roadmaps, in addition to providing strategic security capability direction and secure solutions, security principles, and standards, contributing to the overarching Information/Cyber Security strategy. About You … You will have either a recognised Information Security/IT Qualification, be working towards a relevant certification (CISSP, CISM, CISMP, CISA, SANS, CEH, TOGAF), or have commensurate experience. Financial services experience is desirable. It is essential that you have knowledge of Industry Standards: ISO 27001, PCI DSS, NIST more »
Role: WAF F5 Security Architect Location: London, UK- 3days onsite Duration: Contract Inside IR35 Position Overview: We are seeking an experienced and highly skilled Security Architect (WAF F5) to join our team supporting a banking client. The successful candidate will design, implement, and manage security infrastructure focused … Application Firewalls (WAF) using F5 technologies to ensure the protection of banking applications and data from cyber threats. This role requires deep knowledge of security frameworks, strong hands-on experience with F5 WAF solutions, and a strong understanding of banking security protocols. Key Responsibilities: Design and implement comprehensive … security solutions for web applications using F5 WAF. Collaborate with the internal IT and security teams to understand the business needs and translate them into scalable, secure architectural solutions. Define security policies, guidelines, and best practices to ensure the confidentiality, integrity, and availability of the client's more »