We are working with a global organisation looking to bring an experienced CyberThreat and Vulnerability Management Lead to their team. As the Threat & Vulnerability Management Lead, you will build and oversee organization's threat and vulnerability management program. KEY RESPONSIBILITIES: Develop and maintain a … identify emerging cyberthreats, assess risks, and determine mitigation strategies. Collaborate with regional IT teams for timely remediation of vulnerabilities. Translate complex threat and vulnerability data into actionable insights. Develop and maintain policies and procedures for vulnerability and threat intelligence management. Track and report on the more »
West London, London, United Kingdom Hybrid / WFH Options
Centrica
World. Around 700 people work for Centrica Energy in our offices in London, Denmark, Germany, Sweden and Singapore. In response to the escalating cyberthreats and stringent regulatory demands, Centrica Energy is looking for a Senior Information Security Manager to join our Information Security team! This role is more »
Potters Bar, Hertfordshire, South East, United Kingdom
JSM Construction Limited
Ensure high availability and optimal performance of network systems, minimising downtime and ensuring rapid recovery from outages. - Security Management : Protect network infrastructure against cyberthreats and vulnerabilities, ensuring adherence to security policies. - Compliance and Standards : Maintain compliance with relevant industry standards and regulations, keeping detailed documentation and evidence. more »
North West London, London, United Kingdom Hybrid / WFH Options
Client Server
Cyber Security Engineer London/WFH to £100k Do you enjoy collaborating and working on complex systems with cutting edge technology? You could be progressing your career at a highly profitable Hedge Fund that invests in sports betting markets whilst enjoying a range of perks and benefits including … hybrid working and a sociable team environment. As a Cyber Security Engineer you will join a small team with a broad scope of responsibilities related to safeguarding the IT infrastructure, applications and data from cyberthreats, collaborating with various operations and development teams to implement and … lunch, dinner) from the onsite chef with flexibility to work from home one day a week. About you: You have a range of cyber security experience with a strong understanding of security concepts, principles and best practice You're experienced with security tools and technologies e.g. Splunk, SIEM more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against them. Strategic Defense Implementation: Putting in place robust … strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the complex and ever-evolving cyberthreat landscape. It's about being always prepared, constantly learning, and effectively communicating to maintain and enhance the organization's security posture. Tasks & Responsibilities Evaluate … the containment and resolution process in line with established protocols to reduce risks. Enhance security procedures to improve the organization's monitoring, detection, and threat mitigation capabilities. Support the development and deployment of systems for threat detection and response, ensuring optimal performance. Synthesize and prioritize data from logs more »
Royston, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Johnson Matthey Plc
your engineering team thrive in managing the platforms effectively. Keep Things Secure: Implement and uphold strong security measures to protect our platforms from cyberthreats and data breaches, ensuring they run smoothly and securely. Design for Success: Lead the design, implementation, and upkeep of platform services, focusing on more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
class talents, Eviden expands the possibilities of data and technology, now and for generations to come. The opportunity We are looking for motivated Cyber Security Architects to join our team. If you are a forward-thinking person, who loves working with clients to identify their needs, build relationships … obtain a security clearance to SC level. Location: Home based (Travelling to client sites when needed) Role and responsibilities: Understanding client requirements for cyber security solutions and translating these into technology-based solutions using several suitable portfolio offerings Providing advice to clients on technical and operational security measures … A depth of information technology and information security experience Experience in design and deployment of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access Management SIEM and MDR VA Vulnerability Analysis and mitigation DLP Data loss more »
Cambridge, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
GMSL
assets. Conductingregular reviews and risk assessments of information security controls and processes. Implementing lessons learned to ensure continued improvement and staying abreast of emerging threat, vulnerabilities and best practices in information security. Preparing security and risk reports for GMSLs leadership and key stakeholders. Implementing ongoing security awareness training programs … to educate employees about the latest cyberthreats and best practices. Supporting, where appropriate, information security incidents and IT transformation projects. Monitoring regulatory changes and ensuring compliance with laws, regulation and industry standards, specifically ISO/IEC 27001 standards. Your experience We are looking for someone who can … information security or a related field. Demonstrable understanding of information security principles, frameworks, specifically ISO27001, and best practices including knowledge of various security technologies, threat landscape, vulnerabilities and mitigation strategies. Understanding of the terms and definitions used in the ISO 27001 Standard, including risk and options for risk assessments. more »
CyberThreat & Vulnerability Analyst - Reading 2 days PW, to £50k Are you ready to dive into the world of cyber security and protect critical digital landscapes? We are looking for a passionate and skilled CyberThreat & Vulnerability Analyst to join a great … Love This Role: Play a pivotal role in our digital transformation journey. Collaborate with a dynamic team to enhance security measures. Engage in proactive threat hunting and vulnerability management. Key Responsibilities: Support enterprise-wide vulnerability management, ensuring effective identification, categorization, and mitigation. Develop and maintain threat assessment and … security vulnerabilities. Coordinate with stakeholders on cyber security patching and vulnerability management. Participate in major incident response when necessary. Perform proactive threat hunting for emerging cyber threats. Maintain and optimize TVM tool performance and dashboards. Ensure compliance with industry standards, such as GDPR, NIS more »
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
class talents, Eviden expands the possibilities of data and technology, now and for generations to come. The opportunity We are looking for motivated Cyber Security Architects to join our team. If you are a forward-thinking person, who loves working with clients to identify their needs, build relationships … obtain a security clearance to SC level. Location: Home based (Travelling to client sites when needed) Role and responsibilities: Understanding client requirements for cyber security solutions and translating these into technology-based solutions using several suitable portfolio offerings Providing advice to clients on technical and operational security measures … A depth of information technology and information security experience Experience in design and deployment of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access Management SIEM and MDR VA Vulnerability Analysis and mitigation DLP Data loss more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Experian Ltd
Reliability Engineering Manager, you will lead a global team of talented SREs in the development, deployment, and continuous improvement of our CyberThreat Detection Pipeline. Your leadership will ensure the delivery of a scalable, efficient, and highly reliable Threat Detection Engineering platform. Key Responsibilities: Leverage cutting … of SRE technical and managerial skills in a large enterprise environment, such as: A great background in theSRE field supporting a CyberThreat Detection function, with demonstrable experience in a leadership or managerial role overseeing a team. Scripting and Automation Proficiency: Demonstrated expertise in scripting and automation … event management, with a focus on identifying, analyzing, and mitigating network-based threats. Strong understanding of the MITRE ATT&CK framework, cyberthreat landscapes, attack vectors, and threat actors, enabling informed decision-making and strategy development. Relevant Security Certifications: Possession of relevant security certifications, such as more »
Leatherhead, Surrey, South East, United Kingdom Hybrid / WFH Options
RINA
RINA ASD UK is a key technical engineering partner to the defence sector, providing a portfolio of consultancy services, including Safety, ILS, Training, Cyber Assurance, Human Factors and Data Science & Analytics and has proven track record in supporting and improving performance for some of the militarys most technically … creating significant value add. Job description: RINA Aerospace & Defence (ASD UK) Consulting is offering an opportunity for a high calibre, talented and experienced Cyber Consultant to join our growing Defence Air Safety team. This specialist team delivers Airworthiness activities on behalf of national and overseas clients. The Cyber … Role The Senior Cyber Consultant requires a substantial Cyber Security background, with particular experience of cyber risk and threat identification, gained from working with Defence contractors or the MOD. The successful applicant can expect to be challenged intellectually and professionally, work across a more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
class talents, Eviden expands the possibilities of data and technology, now and for generations to come. The opportunity We are looking for motivated Cyber Security Architects to join our team. If you are a forward-thinking person, who loves working with clients to identify their needs, build relationships … obtain a security clearance to SC level. Location: Home based (Travelling to client sites when needed) Role and responsibilities: Understanding client requirements for cyber security solutions and translating these into technology-based solutions using several suitable portfolio offerings Providing advice to clients on technical and operational security measures … A depth of information technology and information security experience Experience in design and deployment of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access Management SIEM and MDR VA Vulnerability Analysis and mitigation DLP Data loss more »
Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), CyberThreat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the use of industry leading SIEM, IDS … and threat Intelligence Technologies. Provide advice and guidance to client targets of cyber-attacks and malicious activity to a high standard. Provide incident reporting capabilities ensuring that all information is provided in a timely, accurate and effective manner. Provide analytical support to other SOC team members during … security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and Vulnerability Management tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable in a client facing role. A keen interest in cybermore »
expertise to map the attack chain across complex environments, encompassing cloud, identity, email, network, and endpoint. In-depth understanding of the cyberthreat landscape, particularly in the aviation sector. Demonstrated ability to translate threat knowledge into proactive threat detection. Proficient in analyzing and researching new … or trending attacks, threat actors, malware samples, and tactics, techniques, and procedures (TTPs) Excellent English language skills in reading, writing, and speaking, with the capability to articulate security insights effectively, both in creating and interpreting security metrics, and in presenting them clearly to all levels of hierarchy, including senior … leadership. Experience: Minimum of 5 years of experience in endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics. Familiarity with AWS cloud infrastructure, with hands-on experience monitoring associated logs, including GuardDuty, CloudTrail, and VPC Flow. Proven experience with Akamai security tools such more »
in Operational Technology (OT) security risk management. Your expertise in integrated information systems and OT, coupled with your ability to identify and address cyberthreats, will be invaluable in propelling our clients' businesses forward through digitalization. What we're looking for: Experience in security management of industrial control more »
Connectivity: Ensure reliable WiFi across venues for attendees and exhibitors • Data Security: Implement robust data security measures for GDPR compliance and protection against cyberthreats and website hacks • Data Management: Establish protocols for data collection, storage, and analysis while respecting privacy regulations. • Vendor Management: Collaborate with vendors to more »
Holborn, England, United Kingdom Hybrid / WFH Options
Sky
environments. Analyse current use of certificates by individual Sky business and infrastructure teams. Assist onboarding new teams into the PKI service. Work with Cyber vulnerability assessment teams to prioritise onboarding to automated certificate management. Work with App Service managed certificates, private and public certificates, and certificates from Key … business on cybersecurity best practice including certificate lifecycle management. What you'll bring A good knowledge and understanding of Information and/or Cyber Security. Good written and verbal communication skills to liaise with stakeholders at varying levels of seniority across the business. Proficient in written and spoken … across multiple departments within an Enterprise environment. Open mind to learn new technologies, ability to analyse technical workflows and identify weak spots from cyber-security and operational point of views. Invested in a culture to self-learn and grow additional skillsets. Be curious to learn and share learnings more »
Lambeth, England, United Kingdom Hybrid / WFH Options
Sky
environments. Analyse current use of certificates by individual Sky business and infrastructure teams. Assist onboarding new teams into the PKI service. Work with Cyber vulnerability assessment teams to prioritise onboarding to automated certificate management. Work with App Service managed certificates, private and public certificates, and certificates from Key … business on cybersecurity best practice including certificate lifecycle management. What you'll bring A good knowledge and understanding of Information and/or Cyber Security. Good written and verbal communication skills to liaise with stakeholders at varying levels of seniority across the business. Proficient in written and spoken … across multiple departments within an Enterprise environment. Open mind to learn new technologies, ability to analyse technical workflows and identify weak spots from cyber-security and operational point of views. Invested in a culture to self-learn and grow additional skillsets. Be curious to learn and share learnings more »
City of Westminster, England, United Kingdom Hybrid / WFH Options
Sky
environments. Analyse current use of certificates by individual Sky business and infrastructure teams. Assist onboarding new teams into the PKI service. Work with Cyber vulnerability assessment teams to prioritise onboarding to automated certificate management. Work with App Service managed certificates, private and public certificates, and certificates from Key … business on cybersecurity best practice including certificate lifecycle management. What you'll bring A good knowledge and understanding of Information and/or Cyber Security. Good written and verbal communication skills to liaise with stakeholders at varying levels of seniority across the business. Proficient in written and spoken … across multiple departments within an Enterprise environment. Open mind to learn new technologies, ability to analyse technical workflows and identify weak spots from cyber-security and operational point of views. Invested in a culture to self-learn and grow additional skillsets. Be curious to learn and share learnings more »
City of London, England, United Kingdom Hybrid / WFH Options
Sky
environments. Analyse current use of certificates by individual Sky business and infrastructure teams. Assist onboarding new teams into the PKI service. Work with Cyber vulnerability assessment teams to prioritise onboarding to automated certificate management. Work with App Service managed certificates, private and public certificates, and certificates from Key … business on cybersecurity best practice including certificate lifecycle management. What you'll bring A good knowledge and understanding of Information and/or Cyber Security. Good written and verbal communication skills to liaise with stakeholders at varying levels of seniority across the business. Proficient in written and spoken … across multiple departments within an Enterprise environment. Open mind to learn new technologies, ability to analyse technical workflows and identify weak spots from cyber-security and operational point of views. Invested in a culture to self-learn and grow additional skillsets. Be curious to learn and share learnings more »
West End of London, England, United Kingdom Hybrid / WFH Options
Sky
environments. Analyse current use of certificates by individual Sky business and infrastructure teams. Assist onboarding new teams into the PKI service. Work with Cyber vulnerability assessment teams to prioritise onboarding to automated certificate management. Work with App Service managed certificates, private and public certificates, and certificates from Key … business on cybersecurity best practice including certificate lifecycle management. What you'll bring A good knowledge and understanding of Information and/or Cyber Security. Good written and verbal communication skills to liaise with stakeholders at varying levels of seniority across the business. Proficient in written and spoken … across multiple departments within an Enterprise environment. Open mind to learn new technologies, ability to analyse technical workflows and identify weak spots from cyber-security and operational point of views. Invested in a culture to self-learn and grow additional skillsets. Be curious to learn and share learnings more »
King's Cross, England, United Kingdom Hybrid / WFH Options
Sky
environments. Analyse current use of certificates by individual Sky business and infrastructure teams. Assist onboarding new teams into the PKI service. Work with Cyber vulnerability assessment teams to prioritise onboarding to automated certificate management. Work with App Service managed certificates, private and public certificates, and certificates from Key … business on cybersecurity best practice including certificate lifecycle management. What you'll bring A good knowledge and understanding of Information and/or Cyber Security. Good written and verbal communication skills to liaise with stakeholders at varying levels of seniority across the business. Proficient in written and spoken … across multiple departments within an Enterprise environment. Open mind to learn new technologies, ability to analyse technical workflows and identify weak spots from cyber-security and operational point of views. Invested in a culture to self-learn and grow additional skillsets. Be curious to learn and share learnings more »
Our client, a leading utilities company in the technology sector, is currently seeking a Senior Cyber GRC Analyst to join their team based in their Crawley office. This is a permanent opportunity to support the Cyber Security Governance, Risk & Compliance Manager in developing IT governance, risk … management, and compliance strategies to safeguard essential business services and operations from cyber threats. Key Responsibilities: Conduct cyber security risk assessments following the company's risk assessment framework and methodology. Produce management information related to the risk and control environment. Operate and maintain the information security … implementation, maintenance, and configuration of GRC tools and systems. Job Requirements: Practical experience in a GRC role or related profession e.g., risk, audit, cyber security, or similar. Detailed knowledge of and experience in implementing, ... more »
Holborn, England, United Kingdom Hybrid / WFH Options
Sky
and automation and Thales HSMs Understand details of existing certificate use-cases and prepare onboarding roadmaps to the new PKI service. Work with Cyber vulnerability assessment teams to prioritise onboarding to automated certificate management by bringing in your technology understanding. Participate in the technical support of the PKI … Key Vault What you'll bring Technical and professional leadership across the discipline. A deep knowledge and understanding of Information and/or Cyber Security. Knowledge of cybersecurity principles and practices and an understanding of security frameworks e.g., NIST, ISO27001 Good written and verbal communication skills to liaise … managing Key Management Systems (KMS) for cryptographic key security. Hands on experience with: PKI and Certificate deployment and automation. Thales HSMs Team overview Cyber Security Our products, platforms and technologies are constantly evolving that’s why keeping Sky safe from cyber-attacks is one of our more »