of security frameworks (e.g., NIST, CIS, ISO 27001) and compliance standards (e.g., PCI-DSS, PSD2, GDPR). Hands-on experience with security technologies (e.g., SIEM, endpoint protection, cloud security tools). Exceptional leadership and communication skills, with the ability to engage and influence diverse stakeholders. Working at Allica Bank At More ❯
cybersecurity principles and frameworks; ISO27001, NIST, GDPR etc. Knowledge and experience with MS Sentinel, Cisco Meraki, MS Defender, Endpoint protection Knowledge and experience with SIEM, IDS/IPS, firewalls, endpoint protection systems, and vulnerability management Knowledge and experience analysing and interpreting security logs, event data, and alerts to identify potential More ❯
the OT/IT boundary, including segmentation, firewalls, monitoring, and remote access safeguards. Familiarity with enterprise security tooling, including vulnerability management platforms, endpoint protection, SIEM, identity and access management, and logging solutions. Knowledge of regulatory frameworks and industry standards relevant to the E&U sector. Ability to conduct technical risk More ❯
secure operation of their services. Key Responsibilities: Implement and manage security tools and technologies: Deploy and manage security solutions such as Microsoft Sentinel for SIEMand Tanium for Threat and Vulnerability Management (TVM). Conduct security assessments and vulnerability scans: Regularly assess the security posture of applications and infrastructure, identifying More ❯
secure operation of their services. Key Responsibilities: Implement and manage security tools and technologies: Deploy and manage security solutions such as Microsoft Sentinel for SIEMand Tanium for Threat and Vulnerability Management (TVM). Conduct security assessments and vulnerability scans: Regularly assess the security posture of applications and infrastructure, identifying More ❯
secure operation of their services. Key Responsibilities: Implement and manage security tools and technologies: Deploy and manage security solutions such as Microsoft Sentinel for SIEMand Tanium for Threat and Vulnerability Management (TVM). Conduct security assessments and vulnerability scans: Regularly assess the security posture of applications and infrastructure, identifying More ❯
Science, or related field Additional Skills Strong hands-on network andsecurity background Cisco networking Cisco firewalls (Firepower/Threat Detection) Palo Alto firewalls SIEM experience (Logarithm desirable) Web proxy (Forcepoint desirable) Governance skills Policy writing/reviewing Reporting KPI monitoring Certifications like CCNP/CISM would be desirable but More ❯
implementing and owning an ISO 27001 security framework . Hands-on expertise in network security, application security, IAM, and incident response . Proficiency with SIEM, IDS/IPS, WAFs, EDR, and vulnerability management tools . Understanding of secure coding practices and ability to collaborate with engineering teams. Strong communication skills More ❯
or scripting language PREFERRED QUALIFICATIONS - 3+ years experience working in security response, security automation tooling, or threat intelligence - Familiarity with malware analysis, forensics, SOAR, SIEM platforms, and a variety of Operating Systems (MS Windows, Linux, MacOS) - Experience with Amazon Web Services - Meets/exceeds Amazon's leadership principles requirements for More ❯
or scripting language PREFERRED QUALIFICATIONS 3+ years experience working in security response, security automation tooling, or threat intelligence Familiarity with malware analysis, forensics, SOAR, SIEM platforms, and a variety of Operating Systems (MS Windows, Linux, MacOS) Experience with Amazon Web Services Meets/exceeds Amazon's leadership principles requirements for More ❯
In-depth knowledge of cyber security principles , risk management , and regulatory compliance (e.g., GDPR, ISO 27001, NIST). Experience with security tools such as SIEM , firewalls , endpoint protection , and vulnerability management . Excellent communication and stakeholder management skills, capable of translating technical issues to non-technical teams. Strong problem-solving More ❯
In-depth knowledge of cyber security principles , risk management , and regulatory compliance (e.g., GDPR, ISO 27001, NIST). Experience with security tools such as SIEM , firewalls , endpoint protection , and vulnerability management . Excellent communication and stakeholder management skills, capable of translating technical issues to non-technical teams. Strong problem-solving More ❯
technologies, including firewalls (Palo Alto, CheckPoint), IDS/IPS, NDR, switch/router ACLs, NAC solutions, IPSec/TLS VPNs, WAFs, email security, andSIEM logging/alerting. Programming and Automation: Proficiency in a modern programming language (e.g., Python). Experience with IaC practices, GitOps workflows, and cloud automation best More ❯
a similar position within a large, complex, and technologically diverse organization. Proficiency in deploying, maintaining, and configuring a wide range of security technologies, including SIEM solutions, DLP solutions, firewall solutions, cloud security centers, IPS (Intrusion Prevention Systems), CTI (Cyber Threat Intelligence) solutions, and vulnerability scanners. Proxy solutions like Zscaler are More ❯
security in our pipeline Raise security awareness across the company What You Bring: Experience in a security analyst or InfoSec role Hands-on with SIEM tools, cloud security (AWS/Azure), firewalls Knowledge of security frameworks and regulations (FCA, GDPR) Certs like Security+, CEH, or CISSP are a plus Perks More ❯
security in our pipeline Raise security awareness across the company What You Bring: Experience in a security analyst or InfoSec role Hands-on with SIEM tools, cloud security (AWS/Azure), firewalls Knowledge of security frameworks and regulations (FCA, GDPR) Certs like Security+, CEH, or CISSP are a plus Perks More ❯
Experience with SOC or NOC environments. A good understanding of SOC deployment or operation and/or typical SOC solutions or technologies (e.g. SOAR, SIEM, orchestration and automation, threat intelligence, incident response) would be a plus. • Proven ability to handle technical escalations, working closely with both technical and business stakeholders. More ❯
effectively deploy and manage cloud environments and integrate technologies that are part of customer stacks, to accurately replicate and resolve customer issues Knowledge of SIEM, vulnerability management tools, firewalls, malware, exploits, operating system structure and behavior Strong consulting and project management skills, with validated results working as a trusted advisor More ❯
effectively deploy and manage cloud environments and integrate technologies that are part of customer stacks, to accurately replicate and resolve customer issues Knowledge of SIEM, vulnerability management tools, firewalls, malware, exploits, operating system structure and behavior Strong consulting and project management skills, with validated results working as a trusted advisor More ❯
requirements gathering and modelling use cases and scenarios Knowledge of informationsecurity concepts and technologies such as IDS, email gateways and desktop security products, SIEMand SOAR platforms, web application firewalls and vulnerability management tools. Click Apply now to be considered for the Application Security Architect – London/Remote role More ❯
requirements gathering and modelling use cases and scenarios Knowledge of informationsecurity concepts and technologies such as IDS, email gateways and desktop security products, SIEMand SOAR platforms, web application firewalls and vulnerability management tools. Click Apply now to be considered for the Application Security Architect – London/Remote role More ❯
requirements gathering and modelling use cases and scenarios Knowledge of informationsecurity concepts and technologies such as IDS, email gateways and desktop security products, SIEMand SOAR platforms, web application firewalls and vulnerability management tools. Click Apply now to be considered for the Application Security Architect – London/Remote role More ❯
requirements gathering and modelling use cases and scenarios Knowledge of informationsecurity concepts and technologies such as IDS, email gateways and desktop security products, SIEMand SOAR platforms, web application firewalls and vulnerability management tools. Click Apply now to be considered for the Application Security Architect – London/Remote role More ❯
City of London, Greater London, UK Hybrid / WFH Options
Atrium
requirements gathering and modelling use cases and scenarios Knowledge of informationsecurity concepts and technologies such as IDS, email gateways and desktop security products, SIEMand SOAR platforms, web application firewalls and vulnerability management tools. Click Apply now to be considered for the Application Security Architect – London/Remote role More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Atrium
requirements gathering and modelling use cases and scenarios Knowledge of informationsecurity concepts and technologies such as IDS, email gateways and desktop security products, SIEMand SOAR platforms, web application firewalls and vulnerability management tools. Click Apply now to be considered for the Application Security Architect – London/Remote role More ❯