Epsom, Surrey, South East, United Kingdom Hybrid / WFH Options
Reed Technology
Full-time An exciting opportunity for an experienced Software Development Manager to lead my clients Business Technology Solutions & InformationSecurity Department (BTS & InfoSec). This pivotal role involves guiding the business through technology change, delivering and ensuring robust protection of business processes, present & future. Day to Day of more »
The Contract PCI Specialist will be responsible for conducting comprehensive assessments of the payment card security practices, preparing documentation, and guiding the organisation through the PCI compliance process. The ideal candidate will have extensive experience in preparing for PCI audits and a deep understanding of PCI DSS requirements. Key … Responsibilities: PCI Compliance Assessment: Conduct detailed assessments of current payment card security measures to ensure compliance with PCI DSS requirements. Audit Preparation: Prepare the organisation for PCI audits by developing and implementing strategies, documentation, and processes that meet PCI DSS standards. Gap Analysis: Perform gap analyses to identify areas … Awareness: Provide training and guidance to internal teams on PCI DSS requirements and best practices. Stakeholder Collaboration: Work closely with internal stakeholders, including IT, security, compliance, and management teams, to ensure alignment on compliance objectives. Remediation Planning: Develop and oversee the implementation of remediation plans to address identified compliance more »
Cyber Security Engineer Location: Lincoln Salary: £660 day rate Contract Type: June 2024 - November 2024 (potentially extendible) Hours: Full time Our Client is seeking a dynamic and experienced Cyber Security Engineer/Architect to join the team on a contract basis. This role is crucial in enhancing our … will work in a complex and diverse technological environment, collaborating with public and private sector partners. What will the role involve? Defining and implementing security countermeasures Driving suppliers to deliver necessary systems and changes Managing projects focused on improving cyber security Ensuring effective vulnerability management Collaborating with the … Head of Cyber Security and other colleagues to identify, plan, and deliver projects to enhance cybersecurity Focus on security improvements in M365, Azure, networks, and firewalls Working with a team of technical specialists and delivery partners Essential Experience: At least 5 years of technical security experience Strong more »
national charity seeking an experienced Assurance Manager to join their team. The ideal candidate will be responsible for overseeing the development and implementation of security measures. The role can be fully remote or if preferred you can work from the office in their Birmingham or London office. Responsibilities: Working … across the Charity, taking responsibility for embedding compliance with the Charitys ISO27001 certification requirements. Line management responsibility for the InformationSecurity Officer and the Corporate Policy & Assurance Officer. To lead on the development and maintenance data privacy programme and policy framework. To support strategic activities by working closely … Act as Lead Officer in the maintenance of ISO27001 certification. Working closely with the ICT team and key managers across the charity to ensure InformationSecurity Management System is implemented effectively. People Management Lead team by example by upholding values and behaviours and translating those into everyday active more »
London, Bishopsgate, United Kingdom Hybrid / WFH Options
Proactive Appointments
analytics, and decision-making processes. Data Governance: Contribute to the establishment of data governance policies, standards, and procedures to ensure data quality, integrity, and security across the integrated data warehouse environment. Documentation and Communication: Document data mapping rules, transformation logic, and data model specifications, and effectively communicate findings, recommendations … stakeholders and work in a team-oriented environment. Desirable skills: Knowledge of, or has worked within, an ISO 27001 accredited organisation and awareness of informationsecurity requirements. Knowledge of data governance principles, data quality management, and regulatory compliance requirements (e.g. GDPR, SOX) is desirable. Data Analyst Due to … an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website (url removed more »
A well-established business is looking for an accomplished Network Security Engineer to join its team based in North London. Please note this is an office-based role, so you will work from the office 5 days per week. Reporting to the Head of Cyber Security, you will … on technologist with proven networking skills across Firewalls, Routers and Switches and will be comfortable with vulnerability and patching management. You will implement effective security governance policies and procedures and ensure that they are fully documented. You will strive to continually harden and enhance the organisation's IT systems … deliver awareness training, test and report on the business's disaster recovery, continuity and incident response plans, and carry out internal audits of the InfoSec governance frameworks. In order to be suitable for this role, you must be an accomplished Cyber Security Engineer, InformationSecurity Analyst or more »
We are currently working with a growing company that is actively recruiting for a Security Architect to join them on a permanent basis. This is a vital role for the business, taking business requirements and creating low-level specifications and high-level designs, working closely with stakeholders from across … the business as well as engineering teams in the process. The successful candidate for the Security Architect will have the following responsibilities: Owning enterprise security architecture, integrating security controls within systems across the business Communicating effectively with stakeholders (both business and technology) to develop security requirements … for projects Taking into consideration operational efficiency and useability when designing solutions Taking security requirements (both technical and non-technical) and creating high level designs, then in collaboration with engineering functions, producing low level designs Overall responsibility and ownership of security principles within architectural designs, ensuring these are more »
A well-established business is looking for an accomplished Network Security Engineer to join its team based in North London. Please note this is an office-based role, so you will work from the office 5 days per week. Reporting to the Head of Cyber Security, you will … on technologist with proven networking skills across Firewalls, Routers and Switches and will be comfortable with vulnerability and patching management. You will implement effective security governance policies and procedures and ensure that they are fully documented. You will strive to continually harden and enhance the organisations IT systems and … will deliver awareness training, test and report on the businesss disaster recovery, continuity and incident response plans, and carry out internal audits of the InfoSec governance frameworks. In order to be suitable for this role, you must be an accomplished Cyber Security Engineer, InformationSecurity Analyst or more »
South Yorkshire, United Kingdom Hybrid / WFH Options
Som3
Role: InformationSecurity Consultant Benefits: £65,000 - £75,000 + Benefits Location: South Yorkshire (Hybrid) Are you an experienced security professional with a passion for managing informationsecurity? Our client is currently on the lookout for a permanent informationsecurity consultant … who will be able to come in and make an impact from day one. You'll be tasked with supporting, maintaining and maturing the infosec program. Responsibilities: Guaranteeing the protection of information assets and technologies Involvement in completion of security related audits such as ISO27001, ISO27701, ISO20000, NIST … as well as vendor security programme review. Assist the sales team with scoping engagements and supplying a valued service to customers Requirements : Extensive InfoSec Governance, Risk and Compliance (GRC) experience as well as InfoSec Operations experience Experience contributing to an InformationSecurity Management System (ISMS) certified to more »
We are currently working with a growing company that is actively recruiting for a Security Architect to join them on a permanent basis. This is a vital role for the business, taking business requirements and creating low-level specifications and high-level designs, working closely with stakeholders from across … the business as well as engineering teams in the process. The successful candidate for the Security Architect will have the following responsibilities: Owning enterprise security architecture, integrating security controls within systems across the business Communicating effectively with stakeholders (both business and technology) to develop security requirements … for projects Taking into consideration operational efficiency and useability when designing solutions Taking security requirements (both technical and non-technical) and creating high level designs, then in collaboration with engineering functions, producing low level designs Overall responsibility and ownership of security principles within architectural designs, ensuring these are more »
a vibrant, inclusive, and innovative place with great ambition working together within the community. This role will help with ensuring compliance with industry-standard security practices and regulations, while continuously evaluating and enhancing the organisation's security posture. Playing a pivotal role in minimising risks & protecting assets. You … they offer a great benefits package and development opportunities. Responsibilities of the role: Collaborating with senior management to develop and refine the organisation's informationsecurity strategy, aligning it with business objectives and regulatory requirements. Developing, implementing, and maintaining information & data security policies, standards, guidelines, and … and industry standards such as Cyber Essentials+, ISO 27001 & NIST guidelines. Managing the relationship(s) with 3rd party suppliers responsible for implementing and managing security monitoring tools and technologies, ensuring we detect and respond to security threats in a timely manner. Developing and deliver a security awareness more »
Computer Futures - London & S.E(Permanent and Contract)
Role Description: Cyber Defence Engineer will join a growing security team responsible for the testing, implementation, deployment, maintenance, configuration and troubleshooting of the SOC's technology stack (hardware and software). The engineer will also assist with the continued development and maintenance of data pipelines and signature updates and … big data technologies and ecosystems (eg, NiFi). * Knowledge of current market and emerging leaders in data analytical and SIEM platforms. * Knowledge of network security implementations (eg, host-based IDS, IPS), including their function and placement in a network. * Knowledge of intrusion detection systems and signature development. * Knowledge of … concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. * Knowledge of cyber defence and informationsecurity policies, procedures and regulations. * Knowledge of network security architecture concepts including topology, protocols, components and principles. Skills/Experience: * Previous experience more »
Northallerton, North Yorkshire, Yorkshire and the Humber
Computer Futures
Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external … broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system more »
Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external … broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system more »
Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external … broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system more »
Our client is seeking a dedicated and knowledgeable Security identity access Manager to join their dynamic team. This role sits within the Cyber Security product group, focusing on Identity & Access platforms for Privileged Access Management and Identity Governance and Administration. The successful candidate will have the opportunity to … deliver enterprise security services to the organisation, acting as a subject matter expert in identity and access technologies. This role offers an exciting opportunity to drive forward the Digital Identity function within Cyber Security, creating a community of inter-departmental identity and access teams. Opportunity to be a … subject matter expert in identity and access technologies Drive forward the Digital Identity function within Cyber Security Create a community of inter-departmental identity and access teams What you'll do: As a Security identity acess Manager, you will play a pivotal role in shaping our client's more »
Role Description: Cyber Defence Engineer will join a growing security team responsible for the testing, implementation, deployment, maintenance, configuration and troubleshooting of the SOC's technology stack (hardware and software). The engineer will also assist with the continued development and maintenance of data pipelines and signature updates and … big data technologies and ecosystems (e.g., NiFi). * Knowledge of current market and emerging leaders in data analytical and SIEM platforms. * Knowledge of network security implementations (e.g., host-based IDS, IPS), including their function and placement in a network. * Knowledge of intrusion detection systems and signature development. * Knowledge of … concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. * Knowledge of cyber defence and informationsecurity policies, procedures and regulations. * Knowledge of network security architecture concepts including topology, protocols, components and principles. Skills/Experience: * Previous experience more »
to address identified weaknesses and vulnerabilities. Set up and enhance a comprehensive red and purple team penetration testing program, aligning it with major threat information and industry cybersecurity intelligence. Establish and maintain a vulnerability management process to identify, assess, prioritise, and track remediation of security vulnerabilities and weaknesses … similar, such as Cybersecurity Integration or Engineering, with a focus on assurance testing techniques and methodologies. Team Management: Proven track record in leading a security team or function, with an emphasis on collaboration across partners with varying levels of technical security competency. Educational Background: Professional InformationSecurity certification by a recognised professional body such as Certified in InformationSecurity Management (CISM), Certified Information Systems Security Professional (CISSP), certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+). Technical Expertise: Cloud Security Posture Management more »
to address identified weaknesses and vulnerabilities. Set up and enhance a comprehensive red and purple team penetration testing program, aligning it with major threat information and industry cybersecurity intelligence. Establish and maintain a vulnerability management process to identify, assess, prioritise, and track remediation of security vulnerabilities and weaknesses … similar, such as Cybersecurity Integration or Engineering, with a focus on assurance testing techniques and methodologies. Team Management: Proven track record in leading a security team or function, with an emphasis on collaboration across partners with varying levels of technical security competency. Educational Background: Professional InformationSecurity certification by a recognised professional body such as Certified in InformationSecurity Management (CISM), Certified Information Systems Security Professional (CISSP), certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+). Technical Expertise: Cloud Security Posture Management more »
day inside IR35 DV CLEARANCE REQUIRED Summary Main Tech Skills required are Elastic SIEM and Apache Nifi Cyber Defence Engineer will join a growing security team responsible for the testing, implementation, deployment, maintenance, configuration and troubleshooting of the SOC's technology stack (hardware and software). The engineer will … big data technologies and ecosystems (eg, NiFi). Knowledge of current market and emerging leaders in data analytical and SIEM platforms. Knowledge of network security implementations (eg, host-based IDS, IPS), including their function and placement in a network. Knowledge of intrusion detection systems and signature development. Knowledge of … concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. Knowledge of cyber defence and informationsecurity policies, procedures, and regulations. Knowledge of network security architecture concepts including topology, protocols, components, and principles. Bonus Skills: Red Hat System more »
and Access Management tools preferred (Sailpoint, Saviynt, etc...) Experience in automating IT solutions In-depth knowledge of Active Directory (AD), IT processes and procedures, informationsecurity, and systems implementations required Strong Communication and Stakeholder management skills To apply for the role, please click on the link below. more »
Romsey, Hampshire, South East, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited
Information Assurance Consultant - Permanent - Romsey/Gloucester This opportunity will see you joining the Defence Security & Information Assurance Team providing technical security architecture and Security Assurance Services to a wide range of defence clients. You will contribute to the development of security capabilities ranging … from Security & Assurance services to leading edge Vulnerability Management and Protective Monitoring capabilities. Based in Romsey/Gloucester (Remote working available) £55,000 - £60,000 per annum + 6% bonus Must be eligible for Security Clearance Key Responsiblities: Production and maintenance of security documentation including, Secure by … Design Documentation, Security Management Plans, RMADS, Security Operating Procedures, Security Cases and Test Security Instructions (TSI). Coordinate Security Risk Analysis and Management activity to support design and accreditation of solutions. This includes creation and maintenance of the security risk register and management of more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Tal.ai
InformationSecurity Officer Full-time Company Description They are a part of global organisation which operates in 30 countries, with in excess of 47,000 employees and sits within the top 5 organisations for tech leadership across Europe. They are one of the Financial Tech organisations which forms … to take the next step into their career as Business Partner to take this journey with them. Job Description They are looking for an InformationSecurity Officer to help drive forwards their commitment to providing a world class informationsecurity management system for their products and … services that protects both our client and their customers interests. Identify, manage, and mitigate informationsecurity risks. Align informationsecurity strategy with business goals and objectives. Ensure compliance with relevant local and international laws, as well as internal policies. Foster a culture of informationsecuritymore »
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
Trust In Soda
IR35 DV CLEARANCE REQUIRED Summary Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering, and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify … a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Responsibilities Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system more »
Product Security Consultant - £55k-£59k. 37 hours per week, 3 days on ave on site. Company based in Weymouth. Pension, enhanced annual leave & company shares . Required experience: · Degree (or equivalent experience) in a relevant STEM subject or InformationSecurity related · Experience of Product Security activities … in the defence, maritime or closely linked domain · Recognised Industry Security Qualifications, eg. CCP, CISSP, CISM (or able to achieve) · Proven experience of assessing and managing risk in line with industry good practice (NIST, ISO 27001) · Experience with using security baselines, mitigations and controls · Conducted cyber security analysis work, developed threat taxonomies, security architectures, security baselines and risk mitigations. · Produced test plans-and schedules together conducting informal and formal cyber security testing. · Production of security artefacts such as risk registers, security assurance cases, plans and schedules. . My client is a more »