Information Security Jobs in Reading

1 to 25 of 39 Information Security Jobs in Reading

SOC Tier 3 Analyst

Reading, England, United Kingdom
Hybrid / WFH Options
Focus on SAP
Full time Start: ASAP Location: Reading – Hybrid Languages: English We are seeking an experienced and highly capable SOC Tier 3 Analyst to serve as a senior member of our Security Operations Center (SOC). You will lead advanced incident response efforts, conduct proactive threat hunting, perform digital forensics, and collaborate cross-functionally to safeguard our digital assets and infrastructure. … Threat Hunting & Analysis Proactively identify emerging threats through behavioral analytics and threat intelligence. Analyze log data, network activity, and endpoints to uncover hidden anomalies or malicious behavior. Partner with security engineering teams to build detection capabilities based on evolving threats. Digital Forensics & Investigation Conduct detailed forensic investigations to determine incident scope, root cause, and impact. Collect and preserve digital … and support threat blocking strategies. Collaboration & Knowledge Sharing Mentor junior SOC analysts and share knowledge across incident response workflows. Engage with stakeholders across IT, DevOps, and legal to enhance security posture. Contribute to post-incident reviews and continuous process improvement. Security Research & Intelligence Stay ahead of industry developments, vulnerabilities, and attacker methodologies. Create detection rules and playbooks to More ❯
Posted:

SOC Tier 3 Analyst

Reading, England, United Kingdom
Hybrid / WFH Options
Focus on SAP
Full time Start: ASAP Location: Reading – Hybrid Languages: English We are seeking an experienced and highly capable SOC Tier 3 Analyst to serve as a senior member of our Security Operations Center (SOC). You will lead advanced incident response efforts, conduct proactive threat hunting, perform digital forensics, and collaborate cross-functionally to safeguard our digital assets and infrastructure. … Threat Hunting & Analysis Proactively identify emerging threats through behavioral analytics and threat intelligence. Analyze log data, network activity, and endpoints to uncover hidden anomalies or malicious behavior. Partner with security engineering teams to build detection capabilities based on evolving threats. 🔬 Digital Forensics & Investigation Conduct detailed forensic investigations to determine incident scope, root cause, and impact. Collect and preserve digital … and support threat blocking strategies. 🤝 Collaboration & Knowledge Sharing Mentor junior SOC analysts and share knowledge across incident response workflows. Engage with stakeholders across IT, DevOps, and legal to enhance security posture. Contribute to post-incident reviews and continuous process improvement. 📚 Security Research & Intelligence Stay ahead of industry developments, vulnerabilities, and attacker methodologies. Create detection rules and playbooks to More ❯
Posted:

Technical Cyber Risk Assessment Manager

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Deloitte LLP
practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the Cyber Defense group and the Security Operations … Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs, articles, and reports and remain current on related laws, regulations, and industry standards to keep up to date on the latest security risks, threats, and technology trends and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security programme Manager

Reading, Berkshire, United Kingdom
Primark Stores Limited
office. Purpose of the Role Primark Technology is on a transformation journey supporting the business strategy which includes modernising our operating model as well as technology architecture and Cyber Security and Risk posture. This role is key in building and improving Primark's Cyber Security posture. Duties & Responsibilities Actively progress and improve Primark's cyber security posture … and Agile delivery methodology and development methods Certified with appropriate qualifications is desirable, 1. Structured Project Management : Prince/PMP 2. Agile certification, such as Scrum, SaFe, AgilePM 3. Information Security/Data Protection certification An appropriate degree, equivalent qualification or experience Desirable Be a passionate and visionary technologist able to inspire others to challenge and disrupt the … ways to translate that into business opportunities. Be able to take people along with you, empowering new ways of working and successfully executing on those opportunities. Have extensive cyber security delivery and programme/project management experience, Retail experience would be beneficial. Be technically strong across a range of IT disciplines and systems, including cloud and network security. Have More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

NETWORK & SECURITY ADMINISTRATOR - RFX 607

Reading, England, United Kingdom
Zensar Technologies
Job Description Profile IT Specialist - Network and Security administrator Required Education and Certification - - First-level university degree in Computer Science. Information Technology, Engineering, or related field. - Cisco Certified Network Associate - Check Point Certified Security Administrator - Zscaler Certifications - Cisco Certified Network Professional - CISSP - Certified Information Systems Security Professional Required Skills Set - - Excellent understanding of routing and … Software Defined Access. - Excellent knowledge of SASE/Zero-Trust Network Access (ZTNA) principles. - Excellent understanding of Remote Access Service and Application Delivery technologies. - Good working knowledge of the Information Technology Infrastructure Library (ITIL) framework. - Excellent analytical and problem-solving skills. - Flexibility and team spirit. Ability to work quickly and accurately under pressure. - Excellent communication and interpersonal skills and … sensitivity and respect for diversity. - Competent user of Microsoft Office applications (Word, Excel, Outlook, PowerPoint) and the Internet, with the ability to quickly learn and use new software and information management tools. - Fluent professional English (spoken and written, CEFR C1+) Desirable Skills Set - - Thorough understanding of network security technologies (Check Point, Palo Alto, Cisco ASA, Fortinet) - Proficient in More ❯
Posted:

Assistant Manager - IT Continuity (Backup) Operations Engineer

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Deloitte LLP
that matter, achieve, and sustain operational excellence. You will be at the heart of fulfilling our mission by working closely with our Global Operations teams, Business operations teams, and Security operations teams to develop plan and execute IT Continuity Services across multiple Data Centers and geographic regions. The role requires advanced skills that enable the individual to deliver a … activities Participate in a 24x7x365 on-call rotation Respond to and manage service issues and problems Responsible for awareness and compliance to policy and guidelines Report any breaches in information security or policies Identify repeatable operational tasks and issues; create automated resolutions to these situations to reduce operational overhead within the virtualization function as well as other enabling More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Manager

Reading, Oxfordshire, United Kingdom
Hays Technology
with a strong emphasis on safeguarding identity access. The SecOps Manager is a key figure in the organisation's cyber defence efforts, tasked with identifying, detecting, and responding to information security threats, as well as managing the response to cybersecurity incidents. Working closely with colleagues across IT and the wider organisation, this role ensures the protection of digital … and information assets against a range of internal and external threats. The M365, Identity, and Security functions are central to this position, leading a team of specialist engineers to maintain the secure operation of services and contributing to major projects that impact identity management across the organisation. The post holder also serves as a technical authority within the … team and department. What you'll need to succeed Security Operations & Incident Response Lead security operations services, including monitoring, incident response, threat management, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery efforts with internal teams and More ❯
Employment Type: Permanent
Salary: GBP 57,696 - 73,039 Annual
Posted:

Security Operations Manager

Reading, Berkshire, South East, United Kingdom
Hays
with a strong emphasis on safeguarding identity access. The SecOps Manager is a key figure in the organisation's cyber defence efforts, tasked with identifying, detecting, and responding to information security threats, as well as managing the response to cybersecurity incidents. Working closely with colleagues across IT and the wider organisation, this role ensures the protection of digital … and information assets against a range of internal and external threats. The M365, Identity, and Security functions are central to this position, leading a team of specialist engineers to maintain the secure operation of services and contributing to major projects that impact identity management across the organisation. The post holder also serves as a technical authority within the … team and department. What you'll need to succeed Security Operations & Incident Response Lead security operations services, including monitoring, incident response, threat management, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery efforts with internal teams and More ❯
Employment Type: Permanent
Salary: £70,000
Posted:

Lead Penetration Tester

Reading, England, United Kingdom
Hybrid / WFH Options
SITA
something big? Are you ready to love your job? The adventure begins right here, with you, at SITA. PURPOSE As a Lead Penetration Tester , part of the SITA Enterprise Information Security Office, you will assess SITA infrastructure and products to identify information security weaknesses and provide remediation strategies. You will also contribute to the automation of … security testing as part of the product development lifecycle. Key Responsibilities Conduct authorized assessment of infrastructure and applications to proactively identify security weaknesses. Verify weaknesses by leveraging attacker techniques to evaluate the difficulty and effectiveness of potential attack from various threat actors. Provide comprehensive and actionable recommendations to counter the threat posed by identified security weaknesses, given … the applicable threat landscape. Bring an offensive mindset to the design of internal solutions and provide input to the selection of countermeasures and security controls through technical risk assessment. Report findings to technical audiences (e.g.: product development teams, IT, operations), and to business management and leadership, indicating the impact to the business of verified weaknesses found. Research and develop More ❯
Posted:

Senior Software Security Architect

Reading, Berkshire, South East, United Kingdom
Hybrid / WFH Options
Bowerford Associates
We are searching for a Senior Software Security Architect/Senior Application Security Architect for a marketing leading and award-winning technology and data driven business. The position is offered on a remote basis. The role is hands-on and very software engineering focused - you will be responsible for establishing a secure SDLC and 'Secure by Design' approach … to ensure security is an integral part of all development and deployment processes. Providing expert software security advice (design, coding, testing) to the Software Engineering Community, to InfoSec, DevOps and other teams. Defining and delivering secure software development of information to the software engineering teams. Escalating issues appropriately, to various teams and levels of authority inside the … Training and Career Progression. Family-Friendly Policies. Remote Working. KEYWORDS Senior Software Security Architect, Senior Application Security Architect, SDLC, Secure by Design, Architecture, Software Development, Engineering, DevOps, InfoSec, Security, Security Strategy, Best Practice, Programming, Code, C++, C#, C, .NET Core, Java, JavaScript, Node.js, Angular, React, OWASP, Agile, Application Threat Modelling, Security Policy, Security Controls More ❯
Employment Type: Permanent, Work From Home
Salary: £90,000
Posted:

Senior Cyber Security Engineer

Reading, England, United Kingdom
Hybrid / WFH Options
XPS Group
is to create a vibrant place to work where difference is recognised as a strength and where talented people can flourish and achieve their highest potential . Our Cyber Security business continues to grow and we are now looking for an experienced Senior Cyber Security Engineer to join our vibrant Reading office with hybrid working. This is an … exciting role and would most likely suit someone with previous experience in a similar Cyber role role where they have gained knowledge and experience in performing daily security engineering tasks and assist with security hardening projects to protect IT infrastructure, networks and data. Senior Cyber Security Engineer Consultant Reading Hybrid Full Time Permanent Ref: 002982 XPS Group … is to create a vibrant place to work where difference is recognised as a strength and where talented people can flourish and achieve their highest potential . Our Cyber Security business continues to grow and we are now looking for an experienced Senior Cyber Security Engineer to join our vibrant Reading office with hybrid working. This is an More ❯
Posted:

Senior Cyber Security Engineer | Reading, UK

Reading, England, United Kingdom
Hybrid / WFH Options
XPS Pensions
Senior Cyber Security Engineer Consultant Reading Hybrid Full Time Permanent Ref: 002982 XPS Group is a leading UK consulting and administration business specialising in the pensions and insurance sectors. At XPS, our vision is to create a vibrant place to work where difference is recognised as a strength and where talented people can flourish and achieve their highest potential … . Our Cyber Security business continues to grow and we are now looking for an experienced Senior Cyber Security Engineer to join our vibrant Reading office with hybrid working. This is an exciting role and would most likely suit someone with previous experience in a similar Cyber role role where they have gained knowledge and experience in performing … daily security engineering tasks and assist with security hardening projects to protect IT infrastructure, networks and data. A FTSE 250 company, XPS combines expertise and insight with advanced technology and analytics to address the needs of over 1,400 pension schemes and their sponsoring employers on an ongoing and project basis. We undertake pensions administration for over one More ❯
Posted:

Principal Enterprise Security Architect

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Bayer AG
re hungry to build a varied and meaningful career in a community of brilliant and diverse minds to make a real difference, there's only one choice. Principal Enterprise Security Architect This role leads and contributes technically in defining and assessing Bayer's security strategy, technical architecture and security practices. They translate business objectives and risk management … strategies into specific security controls enabled by security technologies and services. Provide advanced technical security architectural design for complex applications and platforms. The Principal Enterprise Security Architect leads the development of a holistic security architecture framework that supports the entirety of the global business. The ideal candidate is a strategic thinker and hands-on executor … with a passion for cybersecurity, and a deep understanding of organizational best practices. YOUR TASKS AND RESPONSIBILITIES Design, develop and maintain a robust and enterprise-ready Architectural Security Controls Framework to ensure the specification of Security Solutions across Bayer is done in a controlled and rational way over applicable technical domains, such as network, cloud, application, platform and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Associate, Cybersecurity compliance (global role in a virtual working environment)

Reading, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
primary purpose of this role is to support Grant Thornton International Ltd.’s internal cybersecurity assessment programme, which monitors our global network of Member Firms for compliance against our information security framework. The ideal candidate will have experience evaluating IT Infrastructure Security technologies, IT general computer controls, industry frameworks (e.g. NIST) and will bring strong information technology audit or security consulting experience to the programme. Location United Kingdom/Europe Main responsibilities The Senior Associate will support with the implementation of the cybersecurity compliance programme, including: Collaboration with IT assurance engagement teams across the GT network Review of data and evidence obtained in the field, including reviews for completeness, consistency and clarity. Evaluate cybersecurity … assessment cycles. This role will also include broader support to the team such as: Respond to firm enquiries and mailbox management. Provide advice and guidance on a variety of security topics. Develop guides, templates and other material to support the implementation of security standards. Research security best practices and provide appropriate reporting. Person specification Education/qualifications More ❯
Posted:

Information Security Risk & Assurance Specialist

Reading, Berkshire, United Kingdom
WeAreTechWomen
value everybody for who they are and what they bring to the table, supporting one another as we continue to deliver for our customers. LI-KS1 Create & Maintain an information security management system (ISMS) capable of demonstrating compliance against internal security requirements and external commitments including certification and regulatory requirements. Provide subject matter expertise in the application … to any new or existing programme of work. Prepare and support internal and/or external compliance audit activities. Manage remediation of any audit (internal & External) non-conformities. Ensure security policies (on a risk-based approach) are produced, signed off by relevant stakeholders, published, and communicated. Also, ensure that policies are managed throughout their lifecycle and updated through yearly … or ad-hoc reviews. Produce relevant security standards documentation in consultation with Technical teams. Lead on providing information to Three UK Customers (B2B) regarding Three UK's security practices. Support proactive and effective oversight of technology and security risk management frameworks, methodologies, processes, assurance, remediation, and reporting activities across the company. Assist in designing, building, and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Software Security Architect

Reading, England, United Kingdom
Hybrid / WFH Options
Huston Photos
Join to apply for the Senior Software Security Architect role at William Huston Photography . We are searching for a Senior Software Security Architect/Senior Application Security Architect for a marketing leading and award-winning technology and data-driven business. The position is offered on a remote basis. This role is hands-on and very software … the Architecture and Engineering Team to embed security in all development and deployment processes. Providing expert software security advice (design, coding, testing) to the Software Engineering Community, InfoSec, DevOps, and other teams. Defining and delivering secure software development practices to the engineering teams. Escalating issues appropriately within the organization. Interfacing with customers to ensure security obligations are … insurance, and more. Remote working, training, career progression, and family-friendly policies. Keywords Senior Software Security Architect, SDLC, Secure by Design, Application Security, Architecture, Software Development, DevOps, InfoSec, Security, Programming Languages, OWASP, Agile, Cloud, Azure, GDPR, ISO 27001, NIST. Due to high application volumes, only suitable candidates will be contacted. We promote equality and diversity in the More ❯
Posted:

Cyber Security Architecture and Innovation

Reading, England, United Kingdom
Hybrid / WFH Options
Bayer AG
re hungry to build a varied and meaningful career in a community of brilliant and diverse minds to make a real difference, there’s only one choice. Principal Enterprise Security Architect This role leads and contributes technically in defining and assessing Bayer’s security strategy, technical architecture and security practices. They translate business objectives and risk management … strategies into specific security controls enabled by security technologies and services. Provide advanced technical security architectural design for complex applications and platforms. The Principal Enterprise Security Architect leads the development of a holistic security architecture framework that supports the entirety of the global business. The ideal candidate is a strategic thinker and hands-on executor … with a passion for cybersecurity, and a deep understanding of organizational best practices. YOUR TASKS AND RESPONSIBILITIES Design, develop and maintain a robust and enterprise-ready Architectural Security Controls Framework to ensure the specification of Security Solutions across Bayer is done in a controlled and rational way over applicable technical domains, such as network, cloud, application, platform and More ❯
Posted:

Support Specialist

Reading, England, United Kingdom
keyloophol
can manage your workload and prioritise to deliver excellent service, operating within tight deadlines, delivering results on time and to plan. To be responsible for supporting the Company’s Information Security policy and actively assisting the organisation in meeting Data Protection and other legal obligations through proactive measures Knowledge & understanding of ISO27001. Ability to use internal software such More ❯
Posted:

Head of Information Security

Reading, England, United Kingdom
JR United Kingdom
Social network you want to login/join with: Head of Information Security Required for an online retail business. The role will initially focus on ISO27001 & ISO9001 recertifications. Responsibilities Lead on information security strategy and implementation of security roadmap. Develop security KPIs and track their progress. Advise senior management on risk levels and any … changes impacting security posture, including emerging threats. Create, maintain, and implement information security policies. Continuously validate the firm against policies and procedures to ensure compliance with ISO 27001, ISO 9001, Cyber Essentials+, and GDPR. Manage and continuously improve the firm's Information Security Management System. Oversee the information security training and awareness program. … Lead internal and external audits and track findings through to mitigation. Identify and communicate emerging security threats with relevant stakeholders. Provide security due diligence in procurement processes and oversee ongoing supplier assurance. Manage security incidents and coordinate incident response processes. Select and implement GRC controls and assist in the selection and implementation of security technologies. Identify More ❯
Posted:

Information Security Manager

Reading, England, United Kingdom
Hybrid / WFH Options
Momentum Security Recruitment
Ad nr: 143103 Published: 13 April 2024,views:12 Main characteristics Location Reading, Berkshire Company Momentum Security Recruitment Employment type Permanent Category IT Job summary Information Security Manager Main characteristics Location Reading, Berkshire Company Momentum Security Recruitment Salary £55000/annum Employment type Permanent Category IT Job summary Information Security Manager Location: UK - remote … security controls * Work with project teams across the business in relation to information security * Ensure the company maintain their Cyber Essentials certification * Completion of client infosec audits * Manage security incidents * PCI DSS assessment Applicants should meet the following criteria: * An experienced Information Security professional with strong technical skills who is happy to roll … business * Someone who understands how information security fits into a company commercially- Balancing best practise with the reality of a business. * A skilled communicator who can articulate infosec training to the business in an engaging and accessible way. For a confidential discussion please forward your CV Momentum - Security Recruitment Specialists Established as a Security Recruitment specialist More ❯
Posted:

Lead Data Engineer

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Bowerford Associates
Prem, Big Data and Data Lake environments. Expert knowledge in data technologies, data transformation tools, data governance techniques. Strong analytical and problem-solving abilities. Good understanding of Quality and Information Security principles. Effective communication, ability to explain technical concepts to a range of audiences. Able to provide coaching and training to less experienced members of the team. Essential … Languages such as Spark, Java, Python, PySpark, Scala or similar (minimum of 2). Extensive Big Data hands-on experience across coding/configuration/automation/monitoring/security is necessary. Significant AWS or Azure hands-on experience. ETL Tools such as Azure Data Fabric (ADF) and Databricks or similar ones. Data Lakes: Azure Data, Delta Lake, Data More ❯
Employment Type: Permanent
Salary: £75000 - £80000/annum Pension, Good Holiday, Healthcare
Posted:

Third-Party Security Risk Lead

Reading, England, United Kingdom
Hybrid / WFH Options
Medirest Signature
As the Third-Party Security Risk Lead, you will be part of the Information Security team, focused on setting up and running a Third-Party Security Risk Management program, ensuring that all Third-Party relationships are effectively monitored and risks are mitigated. This role requires experience in Information Security, where you will demonstrate how … based in Reading and will report directly to the Head of Governance, Risk and Compliance, working to deliver the company's goals for a fit-for-purpose third-party security risk management program. This is a role that requires independence, a proactive approach to a fast-paced environment, and a strong sense of accountability to meet and drive the … needs of the program. What you’ll be doing as the Third-Party Security Risk Lead: Develop Third-Party Security Risk Management Strategy: Support the design and implementation of the Third-Party Security Risk Management strategy, standards, and procedures to identify, assess, and mitigate third-party risks. Security Reviews and Audits: Conduct regular security reviews More ❯
Posted:

Senior Android Security Software Developer, Fraud

Reading, England, United Kingdom
JR United Kingdom
Social network you want to login/join with: Senior Android Security Software Developer, Fraud, reading col-narrow-left Client: bet365 Location: reading, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 4 Posted: 31.05.2025 Expiry Date: 15.07.2025 col-wide Job Description: Who we are looking for A Senior Security Software Developer … who will spearhead the Company’s mobile security initiatives, architecting resilient defences and mentoring teams to outsmart today’s advanced threats. Within the fraud site defence team, you will be a strategic leader in our security operations on our Android platform. You will not only confront sophisticated hackers and reverse engineers, but also shape and drive the evolution … of our mobile security landscape. In this role, you are expected to architect cutting-edge anti-tamper and anti-cheat measures across our Android native and companion apps, whilst ensuring critical data integrity such as GPS, against evolving spoofing techniques. In addition to your technical acumen, your track record in leading security initiatives and mentoring junior team members More ❯
Posted:

Product Specialist, Geospatial Solutions

Reading, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
tracking against key product metrics • Preparing and presenting reports as needed on product roadmap, budgets, and performance for senior management. PROCESSES • Accurate record-keeping and administration. • Adhere to Idox Information Security & Management System Policies. To be successful you will need: • Proven experience in a similar senior technical role • To understand the importance of digital asset management and metadata … practice with a long-term focus for regulated environments. Through the automation of tasks, the simplification of complex operations, finding scalability as operations evolve, and more effective management of information, we help our customers harness the power of Digital, so they can do more. We employ around 700 staff in the UK and worldwide, including Europe, North America and … salary expectation, and current remuneration) explaining why you feel you would be suited to this role. Please note successful applicants will need to satisfy the BPSS guidelines (Baseline Personnel Security Standards) which consist of the receipt of satisfactory references covering the last 3 years of employment; an identity check; verification of eligibility to work in the UK; and a More ❯
Posted:

Technical Architect

Reading, England, United Kingdom
JR United Kingdom
effort estimation Escalating project risks when needed and supporting mitigation planning Promoting a culture of continuous improvement across processes and documentation standards Ensuring all activity is aligned with our Information Security Management Systems (ISMS) Who you are: You’re someone who brings clarity to complexity. You know how to make sense of technical detail and communicate it in More ❯
Posted:
Information Security
Reading
10th Percentile
£64,447
25th Percentile
£68,820
Median
£73,750
75th Percentile
£75,938
90th Percentile
£77,625