to providers, payers, and the global population, our objectives are to improve health, reduce costs, and enhance the healthcare experience. We offer the most secure and reliable healthcare solutions, which connect clinical, operational, and financial data to improve care and advance decision-making around health and well-being. Oracle Health … Risk and Compliance team. This provides an exciting opportunity to be part of an innovative and dedicated team of security and audit professionals. The Lead Governance, Risk & Compliance Analyst will be responsible for operating and supporting the Security Governance, Risk and Compliance functions across the global footprint and serve as … in Governance, Risk Assessment, Risk Management, and other program improvement initiatives as part of a matrixed Security Governance, Risk & Compliance team. What we'll offer: A competitive salary with exciting benefits Flexible and remote working so you can do your best work Learning and development opportunities to advance your career more »
age of constant innovation and digital disruption. With diverse services spanning IT strategy and architecture, IT Operations, Cloud Transformation, Security, Risk and Compliance, we help enterprises executives to deliver business value through the use technologyand processes. Our teams specialise in 3 core areas covering Cloud, Enterprise and Cyber Security … AI and ML). Able to navigate ambiguity and complexity, honing into the specific client goals. Able to think critically and creatively to shape the consulting engagement. Work in agile and cross functional teams with clients on all aspects of their delivery. Support presales, sales, account management opportunities and bid … the ability to demonstrate awareness cross sector will also of benefit: Financial Services Manufacturing Consumer, Retail, Logistics Energy & Utilities Resources and Services Telecommunications & Media Information security principles and understanding of security lifecycle. Familiarity with cybersecurity frameworks andstandards such as NIST CSF, ISO27001,CIS controls and industry specific regulations (e.g. more »
as one of the UK's most capable suppliers of systems engineering expertise and know-how. We have built up an enviable customer base in aerospace and defence and are now seeking to extend our presence and influence in the rail, transportation and public utility sectors – all of which are … of Synoptix clients or as part of internal delivery programmes. This may include: Development of Security Management Plans Understanding and defining the capability context Performance of Risk Assessments (System Driven or Component Driven) Define and architect of Security Controls Development of SyOps Development of CoCos Vulnerability Management Planning Development of … essential for you to apply: Knowledge and application of UK Information Assurance Standards, Frameworks and supporting guidance: HMG IS1 & IS2 ISO27000 Series JSP440 JSP604 NCSC Guidance Material Secure by Design DefStan 05-139 Knowledge and application of non-UK Information Assurance StandardsNIST SP800 (in particular NIST SP more »
London, England, United Kingdom Hybrid / WFH Options
Anson McCade
Permanent SC Clearable One of world’s leading Digital Consultancies and a powerhouse of the UK Defence sector is currently seeking an experienced Cloud Security Architect to join the businesses renowned Digital Solutions Practice based in London where you will be supporting the delivery of highly secure services. In this … designing and implementing technology solutions using firewall, secure networks, IDS/IPS, and IDAM systems • A firm grasp of the threat actors and mitigations for technology risks and a keenness for learning and keeping pace with technologyand ways of working • Experience of leading the design & architecture of cloud capabilities … including managing operational risk and assurance • Hands-on-experience working in roles across all phases of the portfolio, programme and project lifecycles • Familiarity with relevant cyber security standards, to include NIST CSF, ISO 27001 and broader views of good practice Cloud Security Architect Benefits: • Base Salary more »
London, England, United Kingdom Hybrid / WFH Options
Simpson Booth Limited
for ensuring the confidentiality, integrity, and availability of our information assets, and for maintaining compliance with relevant nuclear industry standardsand regulations. You will develop and implement information security strategies, policies, and procedures, and work closely with cross-functional teams to mitigate risks and protect our organization's sensitive data. … possible choices in terms of safety and sustainability. Their focus is to build and design a new generation of Fast Reactors using lead as coolant (LFRs) allowing a substantial reduction of radioactive waste and a 100x more efficient use of fuel at competitive costs and incomparable safety. Their mid-term … and industry best practices. Policies andStandards: Craft and maintain robust policies, standards, and procedures that guarantee the security of our information assets. Risk Management: Lead the charge in regular risk and vulnerability assessments to proactively identify and thwart security threats. Security Controls: Engineer and oversee the deployment of robust more »
IT brand that is outperforming the market and experiencing rapid growth. Our consulting business is annually recognized as one of the UK's top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity and dedicated training and career paths offered to our consultants. As … age of constant innovation and digital disruption. With diverse services spanning IT strategy and architecture, IT Operations, Cloud Transformation, Security, Risk and Compliance, we help enterprises executives to deliver business value through the use technologyand processes. Our teams specialize in 3 core areas covering Cloud, Enterprise and Cyber Security … of the below: Exposure to one or more industries with the ability to demonstrate awareness cross sector also of benefit: Financial Services Manufacturing Consumer, Retail, Logistics Energy & Utilities Resources and Services Telecommunications & Media Information security principles and understanding of security lifecycle Familiarity with cybersecurity frameworks andstandards such as NISTmore »
software development infrastructure and applications, ensuring the safety and integrity of their clients' data and systems. Key Responsibilities: Design and implement the SOC solution, encompassing the identification of monitored log and event data sources, deployment of log management infrastructure, integration of threat intelligence feeds, and design of technical architecture components … vulnerability scans, penetration testing, and root cause analysis. Develop and update Incident Response Plans (IRPs) and regularly test them. Assess security solutions and providers, lead the architecture, design, and automation of technical security solutions and new security tools, and stay updated on emerging threats and industry best practices. Participate in … and protocols, understanding of GitLabCI, Terraform, or Ansible as IaaC. Bachelor’s degree in computer science, Information Security, or a related field. Minimum of 10 years of experience in cybersecurity. Strong understanding of MITRE ATT&CK Tactics and Techniques. Knowledge of common security frameworks, standards, and best practices (e.g., NISTmore »
IT brand that is outperforming the market and experiencing rapid growth. Our consulting business is annually recognized as one of the UK's top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity and dedicated training and career paths offered to our consultants. As … age of constant innovation and digital disruption. With diverse services spanning IT strategy and architecture, IT Operations, Cloud Transformation, Security, Risk and Compliance, we help enterprises executives to deliver business value through the use technologyand processes. Our teams specialise in 3 core areas covering Cloud, Enterprise and Cyber Security … of the below: Exposure to one or more industries with the ability to demonstrate awareness cross sector also of benefit: Financial Services Manufacturing Consumer, Retail, Logistics Energy & Utilities Resources and Services Telecommunications & Media Information security principles and understanding of security lifecycle Familiarity with cybersecurity frameworks andstandards such as NISTmore »
software development infrastructure and applications, ensuring the safety and integrity of their clients' data and systems. Key Responsibilities: Design and implement the SOC solution, encompassing the identification of monitored log and event data sources, deployment of log management infrastructure, integration of threat intelligence feeds, and design of technical architecture components … vulnerability scans, penetration testing, and root cause analysis. Develop and update Incident Response Plans (IRPs) and regularly test them. Assess security solutions and providers, lead the architecture, design, and automation of technical security solutions and new security tools, and stay updated on emerging threats and industry best practices. Participate in … and protocols, understanding of GitLabCI, Terraform, or Ansible as IaaC. Bachelor's degree in computer science, Information Security, or a related field. Minimum of 10 years of experience in cybersecurity. Strong understanding of MITRE ATT&CK Tactics and Techniques. Knowledge of common security frameworks, standards, and best practices (e.g., NISTmore »
and engineering Experience of implementing cloud security in a regulated sector such as Financial Services Experience of working within a DevOps environment including agile and CICD and implementing security within the development processes Detailed working knowledge of how information security standards such as ISO 27001/2 andNISTmore »
to ensure a smooth operation, Accurate and up-to-date documentation on all SOC tooling Patching schedule for SOC tooling Ensuring the SOC has redundancy in its tooling and can continue working in, and recover from, a DR event Support development/maintenance of high-fidelity alerts Ensure that the … effectively and that redundant tools are identified Essential experience of the Security Operations Centre (SOC) Engineer Proven experience within an IT security function. Proven experience in building and maintaining security systems & SIEM tools Demonstrable evidence of contributing Security subject matter expertise to projects and operations teams. Excellent written and verbal … and analysis. Minimum 3-5 years of experience in a SOC environment or related cybersecurity field. Comprehensive understanding of Information Security concepts including Security Architecture and Design, Information Security Standardsand frameworks, Network Security, and Operations Security. Strong knowledge of security technologies, including SIEM, IDS/IPS, firewalls, antivirus, andmore »
tooling and processes and owning vulnerability management through the whole lifecycle from internal and external monitoring and identification to remediation and reporting. This position plays a key role in providing Security Input for a Digital Transformation Programme. Senior Security Analyst - Responsibilities: Provide Security Input to architecture, high level and low … analysis and digital forensics where appropriate. Own maintenance, renewal and distribution of SSL Certificates. Contribute and provide input on Risk Analysis Assessments. Participate in achieving and maintaining Security related certifications (CE+, PCI, etc) Contribute to the design & development of security standards, controls, and procedures. Assist in development of company-wide … InfoSec based role. Experience of Cyber Security input on Projects (Design, High Level, Low Level). Experience with security tool sets (SIEM, FIM, EDR, NDR). The ability to contextualise, categorise and prioritise security events, incidents, and alerts. Knowledge of security framework andstandards implementation (NiST, ISO27001, PCI-DSS) Demonstrable more »
tooling and processes and owning vulnerability management through the whole lifecycle from internal and external monitoring and identification to remediation and reporting. This position plays a key role in providing Security Input for a Digital Transformation Programme. Senior Security Analyst - Responsibilities: Provide Security Input to architecture, high level and low … analysis and digital forensics where appropriate. Own maintenance, renewal and distribution of SSL Certificates. Contribute and provide input on Risk Analysis Assessments. Participate in achieving and maintaining Security related certifications (CE, PCI, etc) Contribute to the design & development of security standards, controls, and procedures. Assist in development of company-wide … InfoSec based role. Experience of Cyber Security input on Projects (Design, High Level, Low Level). Experience with security tool sets (SIEM, FIM, EDR, NDR). The ability to contextualise, categorise and prioritise security events, incidents, and alerts. Knowledge of security framework andstandards implementation (NiST, ISO27001, PCI-DSS) Demonstrable more »
value and protecting our data and systems. You will build and lead a team to build our threat hunting capability and perform security monitoring, threat analysis and vulnerability management. You will also be responsible for developing our Incident Response procedures and responding to, and managing, security events and incidents. In … ensure security by design in the implementation of new products and services by supporting the project teams with SME knowledge of security, as well as taking a lead in the development of new security controls to protect the Cognita Group of Companies and schools throughout the world. The successful candidate … to build effective relationships easily, and possess an excellent knowledge of cyber security operations and engineering. They will be excited to join an impressive, high-growth business with a progressive, purpose-led approach to education and the use oftechnology in supporting the success of all students. This role is more »
to be responsible for the IT and OT vulnerabilities across our clients estate. They will lead on the identification, prioritisation and remediation tracking of vulnerabilities to ensure that their Critical National Infrastructure is securely maintained and operated in line with legislative, regulatory, and business security requirements. The Vulnerability Manager will … and managed appropriately and mitigating controls identified and implemented where necessary Provide the Security Assurance function with metrics and reports with relevant narrative including updates and plans for remediation activities and recommendations Manage a team of security analyst providing thought leadership, and helping to navigate through senior management and business … proven expertise in Vulnerability Assessment and Management, Security Risk and one of the following security domain areas, Compliance, Security Architecture, Endpoint Protection, Network Security, and Security Engineering Good understanding and practical experience of Cyber Security Frameworks andstandards such as NCSC security principles, NIST Framework, ISO 27001, ISO27005, IEC62443 etc. more »
on all aspects of secure design, considering the security and privacy needs of the business and colleagues. The role is responsible for facilitating the secure delivery of technology. The Information Security Architect will also play a leading role in the design and implementation of security controls and processes, as well … for Azure and Microsoft 365 environments and develop and enforce security policies, procedure andstandards related to Azure and Microsoft 365. Ensure that all cloud-based solutions are architected and deployed securely, in line with best practices and organisation policies. Review and refine existing architectures to identity and mitigate potential … culture of security awareness through the organisation. Key Skills and Experience required: Previous proven experience working in a similar technical Information Security Architect role. Strong understanding of technical architecture and security aspects of infrastructure, application, web, and cloud technologies. Experience of creating and implementing technical security standardsand security policies. more »
Employment Type: Permanent
Salary: £70000 - £80000/annum bonus car allowance healthcare
Glasgow, Lanarkshire, United Kingdom Hybrid / WFH Options
Sanderson Recruitment Plc
a good security operations background and will be keen to learn new skills such as DevOps tools and technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use cases. Designing and implementing security controls and secure configurations. Maintaining proactive vulnerability … on maturing security incident management processes and playbooks. Collaborating with third-party led security tests, assessments and audits of our information security information security policies, procedures, and systems. Identifying, assessing, managing, remediating, and tracking information security risks through our risk management framework and ensuring key risks are reported to the … security engineer with experience of learning, adapting, and utilising different security technologies, including but not limited to private and cloud infrastructure. Technical knowledge and experience with SIEM, SOAR, IDPS, DDoS, Malware Protection, Vulnerability Management, and Application Security tooling, etc. Knowledge of Information Security frameworks (CIS, NIST, NCSC CAF), supporting processes more »
Cambridge, Cambridgeshire, UK Hybrid / WFH Options
Bridge Partners
role ensures the confidentiality, integrity, and availability of Bridge Partners and our clients. You would be responsible for creating and maintaining cybersecurity controls, to identify, protect, detect, respond, and recover to maintain the security posture of Bridge Partners and our clients. A mix of Office 365, email security, endpoint security … field of cyber security. Continuously enhance knowledge and skills through self-study and certifications. Technical Support: Provide expert-level technical support and guidance to other members of the Security Team as well as the wider business. Assist in the design, implementation, and maintenance of secure systems, networks, and applications. Act … cause analysis and provide recommendations for remediation and prevention. Contribute to the development and maintenance of incident response plans and playbooks. Policies and Procedures: Develop and maintain information security policies, standards, and procedures. Ensure compliance with relevant regulations and industry standards. Assist in the creation and delivery of security awareness more »
Cambridge, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Bridge Partners
role ensures the confidentiality, integrity, and availability of Bridge Partners and our clients. You would be responsible for creating and maintaining cybersecurity controls, to identify, protect, detect, respond, and recover to maintain the security posture of Bridge Partners and our clients. A mix of Office 365, email security, endpoint security … field of cyber security. Continuously enhance knowledge and skills through self-study and certifications. Technical Support: Provide expert-level technical support and guidance to other members of the Security Team as well as the wider business. Assist in the design, implementation, and maintenance of secure systems, networks, and applications. Act … cause analysis and provide recommendations for remediation and prevention. Contribute to the development and maintenance of incident response plans and playbooks. Policies and Procedures: Develop and maintain information security policies, standards, and procedures. Ensure compliance with relevant regulations and industry standards. Assist in the creation and delivery of security awareness more »
in place and highlight any deficiencies and gaps for management consideration and ensure Cyber Security controls are operating as designed. Provide cyber security assurance activities by ensuring implemented solutions are a replica of agreed and approved architecture definition documents Where required, propose solutions and coordinate delivery of mitigating actions to … of all projects and provide mitigating cyber security requirements to help ensure the secure delivery of compliant systems, applications, and business processes Work alongside and coordinate our third-party vendors including ‘managed security services provider’ (MSSP), penetration testers, attack path mapping and SOC operators including following up remediation work and … proven expertise in three of the following security domain areas, Vulnerability Assessment and Management, Physical Security, Security Risk and Compliance, Security Architecture, Endpoint Protection, Network Security, and Security Engineering Good understanding and practical experience of Cyber Security Frameworks andstandards such as NCSC security principles, NIST Framework, ISO 27001, ISO27005 more »
London, England, United Kingdom Hybrid / WFH Options
Anson McCade
cloud environments are secure, resilient and protected against ever evolving cyber threats. Responsibilities: Lead architectural reviews of client cloud implementations against best practices and acceptable risks. Define and implement cloud security strategies and roadmaps for design and remediation activities. Collaborate across strategy, transformation, and digital engineering teams to implement secure … changes and best practices. Create architecture examples and proof of concepts on vendor platforms to illustrate best practices. Manage day-to-day tasks of small teams during assignments. The Company: The Organisation consists of 4000 high-performing Digital Strategists and Engineering Technologists - united in delivering human-centred innovation and making … in cloud architecture and CISSP accreditation. Background in security architecture, emphasising technology solution design and implementation. Extensive experience leading cloud capability design, focusing on operational risk management. Hands-on experience across all phases of portfolio, program, and project lifecycles. Familiarity with cyber security standards such as NIST CSF, ISO more »
aspects of secure design, considering the security and privacy needs of our business and our colleagues. Your responsibilities as our Information Security Architect will include: Design and implement security architecture for Azure and Microsoft 365 environments Develop, maintain, and enforce security policies, procedure andstandards related to Azure and Microsoft … effective mitigation and resolution Collaborate with IT Services and Operations and business stakeholders to integrate security considerations into project lifecycle Stay updated with the latest security trends, threats and vulnerabilities related to Azure, Microsoft 365, and the broader financial services industry Evaluate and recommend new security tools and technologies to … Understanding of technical architecture and security aspects of infrastructure, application, web, and cloud technologies. Experienced in working within developing digital ecosystems, with multiple partners and environments, ensuring suitable security is delivered Experience of creating and implementing technical security standardsand security policies. Hands-on experience with Azure and Microsoft more »
self-motivation and an entrepreneurial streak and we appreciate the benefits which can be brought to the company by consultants with varied experience, gained from a wide range of career and educational paths. Experience Extensive hands on experience and in-depth knowledge of one or more of the Azure, AWS … architecture knowledge and expertise Experience of reviewing and designing the security of complex application andtechnology architectures in the cloud as part of digital transformation and cloud migration projects Strong knowledge of cloud identity and access management controls, tools and technologies Experience of analysing cloud security risks and threats, performing … cloud security audits and assessments and recommending cloud security controls Experience of implementing cloud vendor security hardening practices Exposure to cloud security monitoring including tooling, log collection and log analysis Working knowledge of key cloud security standards such as NIST, CIS, NCSC and ISO Clear, concise and articulate written andmore »
as a subject matter expert and escalation point for other SOC teammates and will work closely with both the Senior Security Operations Manager and the Senior Security Analysts to feed into the SOC technology roadmap and own delivery to align with analyst requirements and further Insight's growth strategy. The … experience Strong understanding of security principles and technologies. Excellent analytical and problem-solving skills. Strong verbal and written communication skills. Leadership, coaching, and mentoring skills. Ability to work well in a team environment. Familiarity with security tools and technologies such as SIEM, IDS/IPS, and firewalls. Microsoft Security Stack … knowledge highly advantageous. Knowledge of security incidents and attack methodologies. Experience with incident response procedures and investigations. Familiarity with Industry standard security frameworks such as NIST, ISO 27001, or SOC2. Experience with scripting languages such as Python, Perl, or Bash. Certification in relevant security fields such as Certified Information Systems more »
fortifying their IT environment and ensuring robust security practices. Key Responsibilities: Document Management & File Server Security: Enhance and manage security protocols for Document Management Systems and file servers. Cloud Security Enhancement : Spearhead the elevation of cloud security across the business. Proactive Monitoring: Execute regular checks and generate standard reports to … Configure security parameters and serve as the go-to person for escalated technical issues. Threat Identification & Action: Swiftly identify, report, and take action on threats, vulnerabilities, and unusual events. Security Infrastructure Development : Contribute to the development and maintenance of firm-wide security infrastructure configurations, policies, and procedures. Forensic Investigations: Utilise … policies and governance standards. Industry Awareness: Stay ahead of the curve on security risks and exposures, actively promoting effective counter-measures. Diagnostics & Analysis: Conduct diagnostics and analysis on firewalls, routers, switches, and associated systems for optimal reliability and security. Threat Intel & Vulnerability Reporting: Provide valuable threat intelligence and vulnerability information more »