Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of our cyber practice … They bring an ability to apply a robust understanding of security principles and technologies to support clients with varying risk appetite in the pragmatic management of cyber risk. Cyber Security Skills Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory … cyber security (or equivalent) or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerabilitymanagement, cyber security reviews. Consulting Skills Experience building relationships with clients and developing an internal network of subject matter experts. Experience More ❯
partner with engineering teams and proactively identify, assess, and remediate security risks across our product portfolio. This role will focus on secure development practices, vulnerabilitymanagement, threat modelling, and driving a shift-left security culture. The ideal candidate is a pragmatic problem solver with strong technical expertise in … every phase-from design to deployment. Threat Modeling & Security Design Reviews: Conduct structured threat modelling and security assessments for new features, architectures, and services. VulnerabilityManagement & Remediation: Work closely with engineering teams to identify and remediate vulnerabilities from SAST, DAST, SCA, container security, and cloud security scans. Code … Actions, Jenkins, GitLab CI, etc.). Familiarity with infrastructure-as-code security (Terraform, CloudFormation) and cloud security posture management. Strong understanding of identity & access management (OAuth, OIDC, SAML, JWT) and API security. Knowledge of industry frameworks like NIST, ISO 27001, and SOC 2. Experience driving developer enablement and security More ❯
of IT to develop the Assembly Commission's IT vision, strategy and accompanying action plan and deliver it through a robust programme and project management framework, in line with best practice, to support the continuing digital transformation of Assembly and Assembly Commission business. Identify future challenges in the IT … landscape and develop relevant mitigation strategies. Operational Information Security Management Lead, develop, implement, and monitor a comprehensive technical information security program, including all related policies, standards, and guidelines to protect information assets, especially where changes have been made. Lead and define security best practices and align them with organisational … HIPAA, PCI-DSS, and SOX. Lead and prepare for internal and external security audits, documenting compliance status and remediation efforts. Supplier and Third-Party Management Assess and manage security risks associated with third-party suppliers, including reviewing security documentation, conducting periodic audits and mitigating risk through appropriate controls. Documentation More ❯
are dedicated to building a complete suite of industry-leading products which provide a cohesive platform for our customers. Our range of solutions spans vulnerabilitymanagement, detection, automation, cloud security, and penetration testing; in order to build these products our teams work with an array of technologies including … our engineers are first class stakeholders in all parts of the development process. When required, partner with internal teams such as UX and Product Management who work deeply with our product to ensure we are understanding our customers needs. Continue to develop a deep understanding of our products in More ❯
are dedicated to building a complete suite of industry-leading products which provide a cohesive platform for our customers. Our range of solutions spans vulnerabilitymanagement, detection, automation, cloud security, and penetration testing; in order to build these products our teams work with an array of technologies including … NUnit, Playwright or Selenium. Knowledge of dependency mocking frameworks e.g. WireMock. Working knowledge of JIRA, Test Rail or equivalent defect tracking and test case management tools. Knowledge of Amazon Web Services, Google Cloud Platform, Azure, OpenStack and VMware is a plus. Knowledge of RDBMS and SQL language(s). More ❯