Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
Deloitte LLP
will: Assess that Cybersecurity is embedded throughout the development lifecycle of Technology Assets by using Deloitte's Secure System Development Lifecyle (SSDLC) to assure paths to production. Oversee that security testing activities like vulnerability scanning, penetration testing, and code reviews are completed to identify weaknesses and potential exploits on the identified security requirements. Identify potential informationsecurity … vulnerabilities. These risk assessments will be presented to risk owners who are either Director or Partner level. Ensure that the project adheres to Deloitte's Cybersecurity capability framework, relevant informationsecurity regulations and industry standards. Examples include GDPR, EU AI Act, ISO 27001, NIST Cybersecurity Framework, and Cyber Essentials +. Communicate security awareness, concerns, and requirements to … project stakeholders, including developers, project managers, and business leaders, to ensure alignment and buy-in. Maintain documentation related to security assessments, risks, mitigation plans, and compliance status, providing regular reports to relevant stakeholders across waterfall and iterative deployment methodologies. Enable the business by being a trusted partner. This means working with Business Relationship Managers, Business Advisers, and Programme Managers More ❯
newport, wales, united kingdom Hybrid / WFH Options
Logiq
package (below). Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Architects to join our team. What is Security Architecture? Security Architecture is a structured, risk-driven discipline that ensures … security is effectively integrated into an organisation’s systems, processes, and people. It spans the lifecycle from strategic planning through design and implementation to governance and continuous improvement, aligning security with business objective We are seeking Security Architects to join our team, providing guidance in the design, development, and assurance of secure solutions for our clients. This … role requires a holistic understanding of security architecture, spanning alignment with business objectives through to detailed design and evaluation of technical controls. Successful candidates may bring strengths in enterprise or technical security architecture, or both, with the ability to tailor solutions to organisational context, risk posture, and technical environments. Priority skills for this consulting role include: Strong client More ❯
newport, wales, united kingdom Hybrid / WFH Options
Logiq
excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover … from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design … SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure solutions that support their business objectives. Why Join Us? Work on impactful projects that drive efficiency and innovation across diverse sectors. Access professional development pathways More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Hays
JOB DETAILS - £500-£650 PER DAY - INSIDE IR35 - REMOTE ROLE - 6-MONTH CONTRACT - IMMEDIATE START SKILLS Strong understanding of web applications, infrastructure, OS and Cloud. Extensive experience with InformationSecurity Standards e.g. ISO27001, Cyber Essentials, CIS20, FFIEC and NIST Standards. Knowledge of InformationSecurity Management Systems (ISMS), including alternative frameworks. RESPONSIBILITIES Operating and enhancing the InformationSecurity technical assurance program. Testing and verifying the effectiveness of security controls and mitigating threats. Document outcomes of testing and assurance activity and discuss findings with key stakeholders. Undertake threat intelligence and data leakage. Reviewing, writing and updating the organisation's policies, standards and procedures. What you need to do now If you're interested in this More ❯
Rogerstone, Gwent, United Kingdom Hybrid / WFH Options
Hays Technology
Cyber Security Analyst Permanent - 40k - 43k + strong benefits Location: Hybrid - South Wales Your new company I am looking to recruit a Cyber Security Analyst to join a leader in the utilities space. The business has been investing in its cyber security and IT estate and is continuing to grow and enhance its security posture. The … numerous people into careers there, with strong feedback. Your new role This is an interesting opportunity where you will work with the cyber resilience team and assist with the Security Operations function, including EDR, SIEM, gathering security control framework evidence and general day to day assistance with security tasks. You will help deliver strategy which will enhance … the organisations security resilience, proactively contributing to mitigating threats, at a good time when the company is expanding and investing in its IT and cyber security estate. Key parts of the role: You will require knowledge and understanding of attack and exploitation techniques and adversarial TTP's. Help to provide resilience to our threat monitoring and response capabilities. More ❯
Newport, Gwent, United Kingdom Hybrid / WFH Options
Hays Technology
Cyber Security Analyst Permanent - £40k - £43k + strong benefits Location: Hybrid - South Wales Your new company I am looking to recruit a Cyber Security Analyst to join a leader in the utilities space. The business has been investing in its cyber security and IT estate and is continuing to grow and enhance its security posture. The … numerous people into careers there, with strong feedback. Your new role This is an interesting opportunity where you will work with the cyber resilience team and assist with the Security Operations function, including EDR, SIEM, gathering security control framework evidence and general day to day assistance with security tasks. You will help deliver strategy which will enhance … the organisations security resilience, proactively contributing to mitigating threats, at a good time when the company is expanding and investing in its IT and cyber security estate. Key parts of the role: You will require knowledge and understanding of attack and exploitation techniques and adversarial TTP's. Help to provide resilience to our threat monitoring and response capabilities. More ❯
Employment Type: Permanent
Salary: £40000 - £43000/annum Up to £43k + benefits
deliver value, achieved by understanding the customer needs, escalating organisational impediments, managing risk and driving a culture of continuous improvement. The Domain Lead will report to the Head of Security Delivery and be allocated to support the Business Resilience domain. The Domain Lead may be supported by one or more Change Leads depending on the complexity of the domain. … flow of value. Responsible for development, operational maintenance and facilitation of resource plans, forecasts future resource requirements, working with customers, Head of Business Resilience and the Head of Cyber Security Delivery to agree resource requirements. Responsible for coaching, mentoring and guiding team members with day-to-day activities. Responsible for driving collaboration and continuous improvement mind-set across the … communication skills as the ability to communicate effectively, constructively, confidently and professionally is key to the success in the role as is the ability to work with IT and InformationSecurity teams and the wider business. Ability to actively manage workloads to meet business and department requirements. Desirable Skills & Experience Experience working within in an Agile framework. Experience More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
Manchester Digital
collaboration across a talented group of software developers, QATs, product specialists and digital experts. You'll also shape development strategy, working across teams and disciplines to embed agile practices, security, and innovation at every stage. We're looking for someone with exceptional technical leadership experience, a proven ability to manage cross-functional teams, and a strong grasp of modern … Champion best practices in Software Development Delivering regular software development iterations through the team for products, working in collaboration with Product Managers, Delivery Managers, Business Analysts, Solution Architects, Infrastructure, InformationSecurity, User Stakeholders, and external delivery partners Contributing to, and advancing the digital technology strategy Takes ownership for own and team members professional development through coaching and training … developing, and deploying microservices-based architectures, proficiency in using containerization technologies such as Docker and Kubernetes, and broad knowledge of cloud services and platforms with a focus on scalability, security, and performance. Demonstrable experience in effectively collaborating with Business Analysts, Delivery Managers, Product Managers, and User Experience colleagues. This includes the ability to work seamlessly within cross-functional teams More ❯
protect against cyber threats. Lead in the identification and the creation, maintenance and troubleshooting of SOAR playbooks, automations and enrichments. Apply critical thinking to solve unique problems in the informationsecurity space. Enhancing the processes around interacting with large datasets to construct actionable information to enhance the detection of suspicious activity within the business. Skills & Qualifications : Understanding … of enterprise networking and computing Knowledge of Python 3 programming language Security experience SPLUNK knowledge SIEM knowledge Defence experience desirable If you would like to be considered for this role please don't hesitate to click apply or call Sam Pierre-Louis on for more information. About BAE: BAE Systems is a leading global defence, aerospace, and securityMore ❯