systems, data, and infrastructure from threats and attacks. Key Responsibilities: Design and implement enterprise security architecture across systems, applications, networks, and cloud platforms. Conduct security assessments, threat modeling, and riskanalysis for new and existing systems. Develop and maintain security policies, standards, and best practices aligned with industry frameworks (e.g., NIST, ISO 27001, CIS Controls). Collaborate with More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
real-time. Design and implement security solutions and controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure system architecture and application development. Maintain and enhance incident response procedures and disaster recovery plans. Investigate and document security … breaches, providing root cause analysis and remediation plans. Conduct security awareness training for staff and ensure compliance with internal policies and regulatory requirements (e.g., FCA, GDPR, ISO 27001). Stay up to date with the latest security technologies, trends, and threat intelligence. Essential Skills & Qualifications: Proven experience in a cyber security or information security engineering role. Strong knowledge of More ❯
sensitive data. This role supports business strategy in a dynamic environment. Responsibilities: Vulnerability Assessment: Conduct regular vulnerability assessments to identify security weaknesses in our systems, applications, and network infrastructure. RiskAnalysis: Analyze and prioritize vulnerabilities based on risk level and potential impact on the organization. Mitigation Strategies: Develop and implement effective mitigation strategies to address identified vulnerabilities … vulnerability assessment findings, mitigation efforts, and overall security posture for senior management. Security: Engage in the design and support of all aspects of an information security program, including Governance Risk & Compliance, Security Operations, and Security Engineering with hands on engineering and administration of security tools, such as CrowdStrike, Qualys, and Splunk in collaboration with fellow security and IT professionals. … Required Skills and Qualifications: Demonstrable experience across multiple cybersecurity domains including vulnerability management, risk management, network security, Splunk engineering, and incident response. Experience analyzing impact of vulnerabilities and designing solutions across Windows, Mac, Linux, Cloud, Network, Labs, and OT. Technical experience designing solutions across Linux, Mac, and Windows platforms. Strong knowledge of common vulnerabilities and attack vectors, as well More ❯
standards and regulations Exception Management: Identify, document, submit and track instances where the implementation of security patches or configuration controls needs to be delayed for business or technical reasons Risk Assessment: evaluate potential risks and impacts of granting a security exception, considering immediate needs and long-term implications Exception Renewal: periodically review active exceptions to determine if they are … limited to, secure configuration management, data protection, security monitoring, incident response, patch management, governance, enterprise security strategies and architecture Understanding of security vulnerabilities, exploits, and mitigation techniques Knowledge of riskanalysis, vulnerability assessment methodologies, and security baselines Clear understanding of various operating systems and versions, secure configuration and build images Experience with automation, scripting, and orchestration (Python, PowerShell More ❯
related to cloud security breaches and misconfigurations. Implement SIEM and security monitoring tools for real-time threat detection. Cloud Security Assessments & Compliance Conduct cloud security assessments, penetration testing, and riskanalysis . Ensure compliance with ISO 27001, NIST, CIS Benchmarks, GDPR , and other security standards. Collaborate with DevOps teams to integrate security into CI/CD pipelines. Security More ❯
Southampton, England, United Kingdom Hybrid / WFH Options
Aztec
We can consider hybrid or fully remote work in the UK. We’re looking for a self-motivated and driven individual with a passion for technology risk management who is looking for an exciting role as a technology risk subject matter expert within the second line of defence (2LoD) Chief Risk Office. You will provide expertise, advice … and independent challenge around the Technology risk and control environment and play a crucial role in developing the technology risk strategy to protect Aztec from technology-related threats while enabling business growth and innovation. This role offers the successful candidate extensive opportunities for development and the opportunity to apply their knowledge of technology risk at a senior … level within a financial services environment. Key responsibilities: Development and delivery of Aztec’s technology risk strategy in line with the ERMF and the Chief Risk Office roadmap, regulatory requirements and industry best practice, such as COBIT5/ITIL. Ensure that key strategic risks and controls associated with cloud infrastructure, AI, data management, and wider digital transformation are More ❯
Plymouth, Devon, United Kingdom Hybrid / WFH Options
Thales Group
and guidance to develop reliable, secure, and compliant security solutions tailored to project needs. Your responsibilities include: Advising on high-level security architecture and contributing to design processes, including risk assessments Consulting on security component architectures (e.g., SIEM, IAM, gateways) Evaluating architectures against policies and standards (NIST, ISO, JSP) Justifying architectural decisions Coordinating across multidisciplinary teams Presenting solutions to … recognized as a valuable contributor to sensitive programs. COMPETENCIES: You can independently define architectures, are proficient in Infrastructure Security, Security Supervision, and Information Systems Security. You are familiar with RiskAnalysis, Network Security, Cryptography, IAM, cloud technologies, and compliance monitoring. You excel in working with customers and technical teams. NICE TO HAVE: Domain expertise in Defence, Nuclear, Government … Aerospace, CNI, Transport; experience in Risk Management and Accreditation. CAREER DEVELOPMENT: Thales offers opportunities to explore different domains, roles, and international careers. We support personal growth, talent development, and career flexibility within our global organization. Candidates must provide proof of identity, work eligibility, and employment/education history for up to three years. Some roles may require full Security More ❯
or efficiency, of the Cyber Security team, by identifying innovative, problem-solving solutions. Create and maintain appropriate standard operating procedures for the Cyber Security and information protection. Support on Analysis & Planning Activities Identify, respond, predict and analyse security breaches and threats to determine their root cause and report findings to relevant stakeholders on cyber-security threats, attacks, incidents, and … Information Security Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction within mandate Assessment of the organisation's technology risk exposure and measurement of the various parameters that make up technology risks. Support the Design for your area of responsibility Work closely with other stakeholders to design, architect, consult … the desired outcomes and success criteria which is to be the baseline for post project review and benefit realisation validation, as well as measuring positive effects. Contribute to project risk management consulting and technical reviews, drafting mitigation plans and delivering on any actionable items allocated Draft procedures and or policies with regards to cyber security submitting them to the More ❯
Crawley, England, United Kingdom Hybrid / WFH Options
Thales
with customers to define and implement Cyber Security Operations capabilities within their organisations. Assists customers in the routine application and interpretation of SOC security legislation, standards, policies and practices. Risk Assessment and Vulnerability Analysis: Perform thorough assessments of clients’ SOC systems, identifying security gaps, and vulnerabilities. Conduct risk analyses to determine potential impacts on operations and prioritize … Understanding of SOC/SIEM configurations and possesses the ability to test, diagnose, configure and maintain SOC systems. Produce security architecture design documents that have been created through an analysis of the potential risks, which has taken into account threats and likely attack routes to a system and produces pragmatic security controls. Selection of appropriate security components to provide … department policies. Ability to analyse information and produce reports, network diagrams and recommendations on how to improve security monitoring and detection. Ability to plan, control, report and manage the risk for a defined package of work to ensure delivery of on-time, budget and quality products. This role will require SC Clearance. It would be advantageous if currently held More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
UK Ministry of Defence
and improve the user experience. This role plays a critical role in supporting the successful delivery of projects within BMfS by applying robust Project Controls processes across planning, scheduling, risk, cost, and resource management. This role ensures integration and coherence across multiple projects, enabling effective control, informed decision-making, and alignment with the overall programme strategy. The post holder … to HEO Project Control Managers, ensuring consistency in approach and contributing to the achievement of programme objectives. The role oversees the development and maintenance of integrated schedules, supports schedule riskanalysis, and ensures that milestone tracking and interdependencies are effectively managed. In addition, the Senior Project Controls Manager will provide expert advice to senior leaders, support governance and … assurance activities, and promote a culture of proactive risk and issue management. The role requires extensive experience in Project Controls and programme environments, with a strong understanding of transformational change, stakeholder engagement, and the application of best practice methodologies. This role will have line management responsibilities. This position is advertised at 37 hours per week. Job Description Schedule and More ❯
support the continued development of a robust security programme across cloud-based IT services and managed environments (particularly Microsoft 365 and Azure). This role spans security operations, governance, risk, and assurance , and will suit someone with a blend of hands-on technical skills and strategic thinking. What You'll Be Doing: Support and improve day-to-day security … operations, incident response, and vulnerability management. Lead on security investigations and ensure remediation is aligned with industry best practices. Conduct risk assessments and provide security consultancy for technical projects and service design. Help maintain ISMS policies and ensure regulatory compliance (e.g. PCI-DSS, GDPR, FCA). Play a key role in cloud security strategy across Azure/M365 and … in a security-focused role with exposure to frameworks like PCI, ISO27001, or FCA compliance. Deep understanding of Microsoft cloud environments and hands-on experience with technical controls. Excellent riskanalysis, stakeholder engagement, and documentation skills. Relevant qualifications such as CISSP, CompTIA Security+, AZ-500, or MS-500 are highly desirable. Seniority level Seniority level Mid-Senior level More ❯
Crawley, England, United Kingdom Hybrid / WFH Options
Thales
development of high level security compliant architecture and contribution to the design of the preliminary and detailed designs of the solution: it includes the study of alternatives and a risk assessment Consult on potential security components architectures (e.g. SIEM, IAM, gateways, detection and deception capabilities...) Evaluate architectures against Business Line policy and major cyber security standards & regulation frameworks (NIST … You are proficient with Infrastructure Security Design, Security Supervision Design, and Information Systems Security (ISS) You can advise and give support to the rest of the team Familiar with RiskAnalysis, Network Security, Cryptography, Identity & Access Management (software/hardware development, the NIST Cybersecurity Framework, cloud technologies) Able to monitor and measure risk as well as compliance … You have the ability to work with customers and technical teams NICE TO HAVE: Domain knowledge – Defence, Nuclear, Government, Aerospace, CNI, Transport Risk Management and Accreditation YOUR CAREER AT THALES Future opportunities will allow you to discover other domains or sites. You will be able to evolve and grow your competences in different areas: Room and attention to personal More ❯
Key Responsibilities: Implement and manage security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEMs, and endpoint protection Conduct threat and vulnerability assessments, penetration testing, and riskanalysis activities Design and deploy security controls that align with enterprise architecture and regulatory requirements Support secure configuration and hardening of systems, applications, and infrastructure Monitor and respond More ❯
Offered: Full-time, Permanent, Onsite working. Working Hours/Shifts: 40 hours per week, Monday to Friday. What does this role involve? This role is responsible for network security analysis, monitoring and incident response, as well as maintenance and configuration of network security tools. Security Analysts will work with the latest technologies to detect, analyse, and limit intrusions and … in a fast-paced environment. Demonstrable Experience in implementing security in cloud platforms (M365, Defender/Endpoint/Identity, Conditional Access, etc). An understanding of approaches of: ISMS, riskanalysis, the CIA triad, attack vectors including social engineering. Strong understanding of Cyber Security controls and Security concepts. Cyber/Cloud Security certification (e.g. AZ-500, SC More ❯
Fareham, England, United Kingdom Hybrid / WFH Options
Leidos
to a solution architect and Chief Engineer for developing and delivering the relevant elements of the solution, whilst understanding the whole. You will have a complete understanding of cyber risk and treatment approaches. Based on a strong ability to communicate risk and its proportionate management, you will know how this issue is addressed both in traditional ‘on-premise … cloud environments. You will be required to develop high- and low-level security architecture designs for systems intended for secure/sensitive environments, with appropriate security based on detailed risk analysis. What does Leidos need from me? Due to the sensitive nature of the work, sole British National and DV clearance are a must, along with significant experience in … producing security bid artefacts (such as security responses to PQQ/ITN questions, creation of Project Security Management Plan, System Security Architecture Design, Through Life Security Management Plan, Cyber Risk Assessments) Experience of network and boundary protection technologies (firewalls, mail gateways, load balancers, anti-virus), including cross domain technologies. Experience of authentication and authorisation technologies (SAML, LDAP, PKI, etc More ❯
to the following: Manage, optimize and maintain ownership of core credit reporting processes, documentation and tools with the aim to deliver timely, accurate and insightful data to senior management, risk management, regulators, treasury, accounting teams. Contribute to the development of current and new Credit MI, metrics, dashboards and decision tools in order to gain accurate and timely insight into … bps Credit Risk drivers. Develop strong understanding of bp Credit Risk frameworks, quantitative approach, and risk metrics as well as acquire strong commercial awareness. Support various technology and systems initiatives, including automation, data integrity and data integration. Create, implement, and support credit risk quantitative models leveraging mathematical and computer science methods and tools including Python , SQL … verbal and written, to understand data needs and communicate report results. Remain up to date with the latest technology, techniques and methods. Stay curious and enthusiastic about exploring new risk modelling concepts, algorithms and data exploration methods to solve problems and enthuse others to see the benefit of your work. Essential Experience & Job Requirements Prior experience in financial riskMore ❯
to the following: Manage, optimize and maintain ownership of core credit reporting processes, documentation and tools with the aim to deliver timely, accurate and insightful data to senior management, risk management, regulators, treasury, accounting teams. Contribute to the development of current and new Credit MI, metrics, dashboards and decision tools in order to gain accurate and timely insight into … bps Credit Risk drivers. Develop strong understanding of bp Credit Risk frameworks, quantitative approach, and risk metrics as well as acquire strong commercial awareness. Support various technology and systems initiatives, including automation, data integrity and data integration. Create, implement, and support credit risk quantitative models leveraging mathematical and computer science methods and tools including Python , SQL … verbal and written, to understand data needs and communicate report results. Remain up to date with the latest technology, techniques and methods. Stay curious and enthusiastic about exploring new risk modelling concepts, algorithms and data exploration methods to solve problems and enthuse others to see the benefit of your work. Essential Experience & Job Requirements Prior experience in financial riskMore ❯
london, south east england, united kingdom Hybrid / WFH Options
BP Energy
to the following: Manage, optimize and maintain ownership of core credit reporting processes, documentation and tools with the aim to deliver timely, accurate and insightful data to senior management, risk management, regulators, treasury, accounting teams. Contribute to the development of current and new Credit MI, metrics, dashboards and decision tools in order to gain accurate and timely insight into … bps Credit Risk drivers. Develop strong understanding of bp Credit Risk frameworks, quantitative approach, and risk metrics as well as acquire strong commercial awareness. Support various technology and systems initiatives, including automation, data integrity and data integration. Create, implement, and support credit risk quantitative models leveraging mathematical and computer science methods and tools including Python , SQL … verbal and written, to understand data needs and communicate report results. Remain up to date with the latest technology, techniques and methods. Stay curious and enthusiastic about exploring new risk modelling concepts, algorithms and data exploration methods to solve problems and enthuse others to see the benefit of your work. Essential Experience & Job Requirements Prior experience in financial riskMore ❯
south west london, south east england, United Kingdom Hybrid / WFH Options
BP Energy
to the following: Manage, optimize and maintain ownership of core credit reporting processes, documentation and tools with the aim to deliver timely, accurate and insightful data to senior management, risk management, regulators, treasury, accounting teams. Contribute to the development of current and new Credit MI, metrics, dashboards and decision tools in order to gain accurate and timely insight into … bps Credit Risk drivers. Develop strong understanding of bp Credit Risk frameworks, quantitative approach, and risk metrics as well as acquire strong commercial awareness. Support various technology and systems initiatives, including automation, data integrity and data integration. Create, implement, and support credit risk quantitative models leveraging mathematical and computer science methods and tools including Python , SQL … verbal and written, to understand data needs and communicate report results. Remain up to date with the latest technology, techniques and methods. Stay curious and enthusiastic about exploring new risk modelling concepts, algorithms and data exploration methods to solve problems and enthuse others to see the benefit of your work. Essential Experience & Job Requirements Prior experience in financial riskMore ❯
and design documents for various projects Acting as the Security SME to customer or Roke Project Managers and Technical Leads, ensuring solutions adhere to MOD security policy Coordinating Security RiskAnalysis and Management activities, including maintaining the security risk register and managing Risk Balance Cases Developing Security Architectural diagrams Producing and maintaining security documentation such as More ❯
experience to join our central cyber security team. This role offers the opportunity to work across a broad stakeholder base within the UK and Europe, contributing to essential cyber risk management and operational security initiatives. Key Responsibilities As a Cyber Security Operations Analyst, you will play a key role in supporting riskanalysis, security policy implementation, and … the Secure by Design framework across Operational Technology (OT) and Information Technology (IT). You will contribute to: Risk Management: Conduct riskanalysis and interpret first-line operational outputs to support VPI's overall cyber security risk posture. Operational Security: Assist in incident response testing, data management, and coordination of cyber security with physical and personnel … security teams. Human Risk Management: Develop cyber security awareness materials, manage phishing protection programmes, and handle external threat intelligence. Software Development & Cloud Security: Support the integration of security policies into DevOps processes and cloud-based tools. Business & Change Management: Contribute to risk mitigation strategies for business development and internal change projects. Incident Response: Act as a responder within More ❯
Immingham, North East Lincolnshire, UK Hybrid / WFH Options
Rullion
experience to join our central cyber security team. This role offers the opportunity to work across a broad stakeholder base within the UK and Europe, contributing to essential cyber risk management and operational security initiatives. Key Responsibilities As a Cyber Security Operations Analyst, you will play a key role in supporting riskanalysis, security policy implementation, and … the Secure by Design framework across Operational Technology (OT) and Information Technology (IT). You will contribute to: Risk Management: Conduct riskanalysis and interpret first-line operational outputs to support VPI’s overall cyber security risk posture. Operational Security: Assist in incident response testing, data management, and coordination of cyber security with physical and personnel … security teams. Human Risk Management: Develop cyber security awareness materials, manage phishing protection programmes, and handle external threat intelligence. Software Development & Cloud Security: Support the integration of security policies into DevOps processes and cloud-based tools. Business & Change Management: Contribute to risk mitigation strategies for business development and internal change projects. Incident Response: Act as a responder within More ❯
Immingham, Lincolnshire, United Kingdom Hybrid / WFH Options
Rullion Managed Services
experience to join our central cyber security team. This role offers the opportunity to work across a broad stakeholder base within the UK and Europe, contributing to essential cyber risk management and operational security initiatives. Key Responsibilities As a Cyber Security Operations Analyst, you will play a key role in supporting riskanalysis, security policy implementation, and … the Secure by Design framework across Operational Technology (OT) and Information Technology (IT). You will contribute to: * Risk Management: Conduct riskanalysis and interpret first-line operational outputs to support VPI's overall cyber security risk posture. * Operational Security: Assist in incident response testing, data management, and coordination of cyber security with physical and personnel … security teams. * Human Risk Management: Develop cyber security awareness materials, manage phishing protection programmes, and handle external threat intelligence. * Software Development & Cloud Security: Support the integration of security policies into DevOps processes and cloud-based tools. * Business & Change Management: Contribute to risk mitigation strategies for business development and internal change projects. * Incident Response: Act as a responder within More ❯
Employment Type: Permanent
Salary: £40000 - £43000/annum Pension,Medical,Incentive plan,25 Ho
e.g. EU CRA) is one of your tasks. Develop cyber security concepts and architectures with the development teams to fulfill the respective security target levels supports, including threat and riskanalysis (TARA). Drive the implementation of cyber security measures over the whole lifecycle of Voith Hydro products, and initiate penetration tests for high-risk areas for … in cyber security, information security, computer science, information technology or similar once. Ideally, you have already had work experience in a comparable position. Experience with cyber security audit and risk management processes, standards and assessments. Knowledge and experience in information security as well as experience in secure software development lifecycle. Working with international cyber security standards (e.g. IEC More ❯
Improve SOC processes, including incident response, threat hunting, and vulnerability management. Demonstrate expert understanding of security concepts and apply them to a technical level, at the highest levels of risk and customer complexity. Influence and challenge clients to define clear outcomes and problem statements, from which to design appropriate solutions and opportunities. Effectively translate and accurately communicate security and … risk implications at the most senior client levels, across technical and non-technical stakeholders. Manage stakeholder expectations across high risk and complexity or under constrained timescales. Identify new technology opportunities and design the use of these to meet customer needs and pain points. Provide mentorship across delivery team members, operating as an escalation expert for both internal and … client facing issues. Designing, developing, and continuously improving vulnerability assessment, security testing, and riskanalysis methods. Designing, developing, and continuously improving the security posture, effectiveness and efficiency of the company's products and services Providing developers with remediation guidance and advice Designing, developing, and continuously improving security operations Recommending and providing technical leadership for the implementation of security More ❯