East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
relevant leadership role, with a demonstrated track record of leading and mentoring a team of security architects. At least one relevant, industry-recognised professional certification, such as: CISSP CCSP SANS GIAC. Extensive experience in designing and implementing secure architectures across cloud, on-premises, and hybrid environments. Proven experience working in a global organization. Experience supporting audit and compliance activities … with external parties. You will stand out if you bring Bachelors degree in Computer Science or a related field. Additional certifications such as CISA, CISM, CCIE, CRISC, or other SANS credentials. Experience within the legal or professional services sector. What we can offer you We recognise that our people are our most valuable asset, which is reflected in the More ❯
relevant leadership role, with a demonstrated track record of leading and mentoring a team of security architects. At least one relevant, industry-recognised professional certification, such as: CISSP CCSP SANS GIAC. Extensive experience in designing and implementing secure architectures across cloud, on-premises, and hybrid environments. Proven experience working in a global organization. Experience supporting audit and compliance activities … external parties. You will stand out if you bring Bachelor's degree in Computer Science or a related field. Additional certifications such as CISA, CISM, CCIE, CRISC, or other SANS credentials. Experience within the legal or professional services sector. What we can offer you We recognise that our people are our most valuable asset, which is reflected in the More ❯
Qualifications/experience in auditing against/implementing multiple security standards and frameworks, such as ISO 27001/2, NIST CSF, ISF CMMI, CIS, UK Govt/Defence standards, SANS Ability to translate technical requirements and their benefits to a non-technical audience and appeal to relevant stakeholders Experience in the production and briefing of threat intelligence products (not More ❯
vulnerability management program Strong technical expertise in implementing a Prioritizationformula to vulnerabilities and misconfigurations and translating these into risks Excellent knowledge of Vulnerability Management frameworks such as NIST/SANS The following general characteristics are required: A team player with the ability to work independently and unsupervised Ability to own delegated tasks and see them through to completion Ability More ❯
Bachelor's or master's degree in information security, Computer Science, Engineering, or a related field. Relevant certifications such as CREST, OSCP, CISSP, CISM, CISA, ISO 27001 Lead Auditor, SANS, or other recognized credentials in cybersecurity, third-party risk management, and compliance auditing. Skills: Strong commercial acumen, with proven ability to generate new business in cyber assurance and regulatory More ❯
Bachelor’s or master’s degree in information security, Computer Science, Engineering, or a related field. Relevant certifications such as CREST, OSCP, CISSP, CISM, CISA, ISO 27001 Lead Auditor, SANS, or other recognized credentials in cybersecurity, third-party risk management, and compliance auditing. Skills: Strong commercial acumen, with proven ability to generate new business in cyber assurance and regulatory More ❯
should also have a proven experience and knowledge with any combination of the following: Threat modelling and risk assessments, Working knowledge of secure coding principles (OWASP and OWASP mobile, SANS ), Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2), Working knowledge of cryptography including encryption, signing and digital … and IAST tools and building security into existing SDLC processes, Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP), Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker, Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps, Excellent oral, written communication and presentation skills. What we More ❯
large-scale computing, modeling, cybersecurity, and anomaly detection. OR a Master's Degree in Statistics, Mathematics, Computer Science, or a related field. Certifications such as Lenel, CISSP, CISA, CISM, SANS, GCIA, GCIH, OSCP, Security+. Microsoft is an equal opportunity employer. All qualified applicants will receive consideration without regard to age, ancestry, color, family or medical leave, gender identity or More ❯
on efficiency, automation, and continuous improvement. Strong documentation skills and experience working in cross-functional teams (e.g., HR, Legal, Risk). Relevant certifications preferred: ITPM, GCITP, PMP, CISSP, GCIH, SANS, GIAC Additional Information Our uniqueness is that we celebrate yours. Experian's culture and people are important differentiators. We take our people agenda very seriously and focus on what More ❯
and privacy policies and regulations General knowledge of security technology Nice to have: Experience with PowerBI Programming skills and experience (python, java, SQL) Technical network skills Knowledge of OWASP, SANS, NIST, ISO 27001, ISF or other security-related practices Previous Banking/Financial Industry experience CISSP, CISA, CRISC, CSSLP, SABSA certifications Skills & Competencies: Vulnerability management Risk reporting Programming Data More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harvey Nash
and privacy policies and regulations General knowledge of security technology Nice to have: Experience with PowerBI Programming skills and experience (python, java, SQL) Technical network skills Knowledge of OWASP, SANS, NIST, ISO 27001, ISF or other security-related practices Previous Banking/Financial Industry experience CISSP, CISA, CRISC, CSSLP, SABSA certifications Skills & Competencies: Vulnerability management Risk reporting Programming Data More ❯
projects. - Have a passion to learn and thrive in a dynamic and constantly changing environment. - Experience with virtualisation technologies, especially with AWS services. - Relevant industry certifications such as CISSP, SANS, ISC2, CompTia, etc. - Maturity, judgment, negotiation/influence skills, analytical skills, and leadership skills. - Demonstrated knowledge of web protocols, common attacks, and working knowledge of Linux/Unix tools More ❯
projects. - Have a passion to learn and thrive in a dynamic and constantly changing environment. - Experience with virtualisation technologies, especially with AWS services. - Relevant industry certifications such as CISSP, SANS, ISC2, CompTia, etc. - Maturity, judgment, negotiation/influence skills, analytical skills, and leadership skills. - Demonstrated knowledge of web protocols, common attacks, and working knowledge of Linux/Unix tools More ❯
software and development Proficiency in securing cloud technologies Proficiency in reading, writing, and auditing code and the ability to learn new languages/technologies. Experience with OWASP Top10 or SANS Top 25 Experience breaking down complex systems and applications to identify threats. Excellent ability to communicate, verbally and in writing, complicated technical issues and the risks they pose to More ❯