Security Consultant (Security Operations) Location: Hybrid; with occasional travel expected to client site or Logiq’s offices in Bristol, Chippenham or Exeter. Salary: Negotiable, plus car allowance, plus up to 10% performance bonus*, plus excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due … to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to … ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a More ❯
Security Consultant (Security Operations) Location: Hybrid; with occasional travel expected to client site or Logiq’s offices in Bristol, Chippenham or Exeter. Salary: Negotiable, plus car allowance, plus up to 10% performance bonus*, plus excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due … to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to … ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a More ❯
be doing: Be responsible for the management of work within cost and budget Report on team progress and performance with an awareness of financial forecasting and estimating Oversee the Security Assurance Case Capture and agree on technical requirements in accordance with company and programme processes Maintain compliant technical solutions against contractual requirements and regulations Have a technical input and … appropriate consideration of product security activities and issues for LCM deliverables and Design Reviews, including Sub-Contract Design Reviews Capture and agree on input to appropriate Verification and Qualification Plans Provide specialist advice and contribution to other project documentation, such as Training Needs Analysis, Technical Publications, Cyber Incident Plans and Operating Instructions (list is not exhaustive) Your skills and … experiences: Hold a relevant degree (or equivalent experience) in a relevant STEM subject or InformationSecurity related Hold a CISSP (or able to achieve) Have relevant engineering lifecycle and Project Management knowledge and experience A thorough understanding of informationsecurity principles and its potential impact on Product Systems Experience of Consultancy on the application of Product More ❯
Chatham, Kent, South East, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
Are you ready to shape the future of cloud security for a major organisation? As part of this evolution, theyve launched a brand-new Cloud Centre of Excellence and were on the hunt for a Cloud Security Engineer to be at the heart of this strategic initiative. This is a pivotal role where youll blend hands-on technical … expertise with forward-looking strategy to design and implement enterprise-grade cloud security solutions on a self-service cloud platform. Youll be part of a high-impact team working cross-functionally to enable secure innovation across the Group. Youll be: Leading the design and implementation of secure cloud services (primarily Azure) within a self-service model. Acting as the … cloud security SME, embedding security principles across compute, storage, networking, RBAC, and containerised environments. Building scalable, compliant solutions using Security-as-Code, Terraform, and native cloud tooling. Collaborating closely with delivery teams and representing Group InformationSecurity (GIS) to ensure security is woven into every layer of the cloud ecosystem. Driving the DevSecOps mindset More ❯
Chatham, Kent, United Kingdom Hybrid / WFH Options
Tilt Recruitment
Are you ready to shape the future of cloud security for a major organisation? As part of this evolution, they’ve launched a brand-new Cloud Centre of Excellence and we’re on the hunt for a Cloud Security Engineer to be at the heart of this strategic initiative. This is a pivotal role where you’ll blend … hands-on technical expertise with forward-looking strategy to design and implement enterprise-grade cloud security solutions on a self-service cloud platform. You’ll be part of a high-impact team working cross-functionally to enable secure innovation across the Group. You’ll be: Leading the design and implementation of secure cloud services (primarily Azure) within a self … service model. Acting as the cloud security SME, embedding security principles across compute, storage, networking, RBAC, and containerised environments. Building scalable, compliant solutions using Security-as-Code, Terraform, and native cloud tooling. Collaborating closely with delivery teams and representing Group InformationSecurity (GIS) to ensure security is woven into every layer of the cloud More ❯
adhere to CCM principles Support the Audits and Sarbanes Oxley ensuring systems are compliant and follow documented IT Controls Forward thinking/planning Maintaining relationships with technology, software, and security vendors Information within the business. Support, guide, influences where necessary Ensuring that InformationSecurity is factored into the evaluation, selection, installation and configuration of hardware, applications … problems. To be available for "out-of-hours" work to resolve support calls or planned activities. Put security at the heart of the solutions created and supporting the Infosec teams as required. Works with the wider senior team to ensure that all activities and operations are performed in compliance with regulations and laws governing business operations. Person specification : Knowledge … level technical expertise across a Microsoft, Dell, and Citrix infrastructure. Exchange 2016/2019 Hybrid, Office 365 and Azure AD PowerShell, including knowledge of scripting Understanding and expertise in security products and services Dell and Netapp hardware, including traditional 3-tier and HCI (VxRail/VSAN/NSX). Storage and Backup Management using SAN/NAS based technologies More ❯
on an exciting opportunity with one of our clients-a purpose-driven organisation making a real impact through innovation and integrity. They're looking to bring in a Senior InformationSecurity Analyst to help drive their mission forward by protecting critical systems and embedding a robust security culture throughout the business. Key responsibilities for the Senior InformationSecurity Analyst: As a Senior InformationSecurity Analyst, you'll join a collaborative and multi-disciplinary security team that works across operations, assurance, and governance. This is a highly cross-functional role, perfect for someone with broad security expertise who enjoys variety and continual development. You'll take the lead on: First and second … line security operations, including vulnerability management Investigating and responding to security incidents Ensuring policies and procedures remain aligned to industry best practice Providing assurance that security controls are effective and fit for purpose Promoting security awareness and education throughout the organisation Mentoring junior analysts and supporting team leadership initiatives Participating in a 24x7 on-call rota More ❯
on an exciting opportunity with one of our clients-a purpose-driven organisation making a real impact through innovation and integrity. They're looking to bring in a Senior InformationSecurity Analyst to help drive their mission forward by protecting critical systems and embedding a robust security culture throughout the business. Key responsibilities for the Senior InformationSecurity Analyst: As a Senior InformationSecurity Analyst, you'll join a collaborative and multi-disciplinary security team that works across operations, assurance, and governance. This is a highly cross-functional role, perfect for someone with broad security expertise who enjoys variety and continual development. You'll take the lead on: First and second … line security operations, including vulnerability management Investigating and responding to security incidents Ensuring policies and procedures remain aligned to industry best practice Providing assurance that security controls are effective and fit for purpose Promoting security awareness and education throughout the organisation Mentoring junior analysts and supporting team leadership initiatives Participating in a 24x7 on-call rota More ❯
Data Loss Prevention/DLP/Insider Threat Analyst required by Harrington Starr’s global client to play a key role in their Cyber Security Engineering team. The role will play a key role in protecting the organisation from exposure to data loss/theft. Key accountabilities will include: Developing and administering DLP policies Perform analysis and triage of … DLP violations Play an integral role in any cyber incidents with a DLP focus Working with the Security Operations and Engineering teams on DLP strategy Provide reporting on DLP incidents Developing Firmwide strategy for Data Loss Prevention Regular usage of DLP tools such as Microsoft Purview In order to be suitable, you will need: Experience in a dedicated DLP … role or a cyber security role with a heavy DLP focus. Hands-on experience of DLP policy, incident management, data protection and reporting Experience of Microsoft Purview, M365, and Proofpoint technologies Practical experience End-User Behaviour Analytics (EUBA) and Insider Risk Management A good overall understanding of cyber and informationsecurity Certifications such as Microsoft SC More ❯
Hi there Thanks for wanting to know more about Hack The Box career opportunities! Let's redefine cyber security expertise standards and connect business - community through highly engaging hacking experiences. (Find out more insights about Hack The Box culture in our career site). The core mission of the Defensive Content Engineer: The core mission of the Defensive Content … While HTB is well established for its red team content, through your work, you'll enable the company to broaden its services and become a place for all cyber security professionals to upskill themselves, thus dealing with the great shortage of talent that exists in cyberspace. The fellowship you'll be joining: HTB's defensive team is a relatively … to our players' readiness on defensive techniques Skills, knowledge, and experience points required to unlock the role of Defensive Content Engineer at Hack The Box: Experience in a Defensive security operations environment Familiarity with Defensive security tooling (SIEM, EDR, Wireshark, Volatility, Autopsy, etc) Some experience engineering defensive content for CTFs or similar platforms Good understanding of common operating More ❯
updates, new features and evolving best practice and incorporating these into project proposals. Ensures that all designs are robust, compliant with relevant standards and design principles whilst satisfying Infosec requirements. Play a key role in the diagnosis and resolution of high impact, or technically challenging problems, in close coordination with IT operations colleagues. Is diligent in determining the root … and used to drive performance, security, reliability and process improvements etc. Puts security at the heart of the solutions created ensuring all proposals are fully compliant with Infosec and regulatory requirements. Works with the wider senior team to ensure that all activities and operations are performed in compliance with regulations and laws governing business operations. The successful candidate … tune platforms and campaigns for efficiency and performance. Management of third parties, both for technology vendors and professional services including support and project delivery. Extensive experience of working within Infosec and security best practice to deliver robust and secure solution designs and technical environments. Experience of methodical and robust diagnostic approach in the resolution of complex problems and major More ❯