City of London, London, United Kingdom Hybrid / WFH Options
Vanquis Banking Group
direction andmanagement of direct reports. The Principal Security Engineer is responsible for implementing and communicating technical security policies and standards, ensuring other technical teams build systems that align and are compliant with these. The role is responsible for the detailed design work involved in new security systems and solutions … to-day role, as a Principal InformationSecurity Engineer you will: Lead Engineering designs and delivery to meet or exceed business requirements and Vanquis Banking Groups security objectives. Managing relationships with our security partners including the Security Operations Centre to ensure that our security tools are configured appropriately. Driving process … new opportunities and improvements in current practices and processes. Serve as a technical security SME to advise on security designs for new and existing architecture and services, and ensure requirements are incorporated into designs. Identify, assess, document, manage, escalate, and report the risks associated with my role and business area more »
Bradford, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Vanquis Banking Group
direction andmanagement of direct reports. The Principal Security Engineer is responsible for implementing and communicating technical security policies and standards, ensuring other technical teams build systems that align and are compliant with these. The role is responsible for the detailed design work involved in new security systems and solutions … to-day role, as a Principal InformationSecurity Engineer you will: Lead Engineering designs and delivery to meet or exceed business requirements and Vanquis Banking Groups security objectives. Managing relationships with our security partners including the Security Operations Centre to ensure that our security tools are configured appropriately. Driving process … new opportunities and improvements in current practices and processes. Serve as a technical security SME to advise on security designs for new and existing architecture and services, and ensure requirements are incorporated into designs. Identify, assess, document, manage, escalate, and report the risks associated with my role and business area more »
Petersfield, Hampshire, South East, United Kingdom Hybrid / WFH Options
Vanquis Banking Group
direction andmanagement of direct reports. The Principal Security Engineer is responsible for implementing and communicating technical security policies and standards, ensuring other technical teams build systems that align and are compliant with these. The role is responsible for the detailed design work involved in new security systems and solutions … to-day role, as a Principal InformationSecurity Engineer you will: Lead Engineering designs and delivery to meet or exceed business requirements and Vanquis Banking Groups security objectives. Managing relationships with our security partners including the Security Operations Centre to ensure that our security tools are configured appropriately. Driving process … new opportunities and improvements in current practices and processes. Serve as a technical security SME to advise on security designs for new and existing architecture and services, and ensure requirements are incorporated into designs. Identify, assess, document, manage, escalate, and report the risks associated with my role and business area more »
Chatham, Kent, South East, United Kingdom Hybrid / WFH Options
Vanquis Banking Group
direction andmanagement of direct reports. The Principal Security Engineer is responsible for implementing and communicating technical security policies and standards, ensuring other technical teams build systems that align and are compliant with these. The role is responsible for the detailed design work involved in new security systems and solutions … to-day role, as a Principal InformationSecurity Engineer you will: Lead Engineering designs and delivery to meet or exceed business requirements and Vanquis Banking Groups security objectives. Managing relationships with our security partners including the Security Operations Centre to ensure that our security tools are configured appropriately. Driving process … new opportunities and improvements in current practices and processes. Serve as a technical security SME to advise on security designs for new and existing architecture and services, and ensure requirements are incorporated into designs. Identify, assess, document, manage, escalate, and report the risks associated with my role and business area more »
InformationSecurity Analyst with at least 5 to 7 years expertise in Technology Security. The Senior InformationSecurity Analyst is responsible for maintaining informationsecurity policies, architecture, technical standards, technical controls, security solutions, guidelines, procedures, and other elements necessary to maintain security posture. Responsible for assessing information risk and facilitating … Identify and address security gaps discovered through ongoing monitoring of all informationsecurity controls and implement enhancements to security controls. Manage access to elevated privileges accounts and audit activities to meet business and regulatory requirements. Evaluate and/or implement cybersecurity solutions and controls to maintain confidentiality, integrity, and availability. … operational needs, andsecurity requirements. Participate in the development and testing of the security incident response plan, act as the incident response leader. Develop security, risk, and compliance reports and alerts. Participate in the yearly review of policies and procedures to support informationsecurity, risk, andsecurity compliance activities. Participates more »
Bradford, Yorkshire, United Kingdom Hybrid / WFH Options
Spencer Rose Ltd
new opportunities and improvements in current practices and processes. Serve as a technical security SME to advise on security designs for new and existing architecture and services, and ensure requirements are incorporated into designs. Identify, assess, document, manage, escalate, and report the risks associated with my role and business area … Suppliers, and company employees. Provide support for engineering, operations, andsecurity teams to resolve security events. Oversee IT systems risk assessments and control validation. Skills/Experience required: 5+ years of experience in technical informationsecurity role, and 3+ of experience with regulatory compliance andinformationsecuritymanagement frameworks (eg … following certifications: Certified Cloud Security Professional (CCSP), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), Microsoft Azure Security Engineer (AZ-500), System Security Certified Practitioner (SSCP) Understanding of corporate governance frameworks, key Security standards such as ISO27001, SANS, PCI-DSS and NIST, and the ISC2 Common Body of more »
clients over various industries. Your security experience must include: Minimum 2+ years as cyber security consultancy experience in a professional services environment Cyber security consultant with experience in one or more of network security, data security, application securityand cloud security. Your diverse security experience may include one or some … Informationsecurity principles and understanding of security lifecycle. Familiarity with cybersecurity frameworks and standards such as NIST CSF, ISO27001,CIS controls and industry specific regulations (e.g., HIPPA, GDPR). Cloud security principles and experience in securing, including one or more of AWS.AZURE, GCP. Expertise in risk assessment andmanagement, with … ability to identify and priories security risks, and develop risk mitigation strategies. Understanding the current threat landscape, including knowledge of common attack vectors, threat actors and emerging threats. Proficiency in various security technologies and tools (firewalls, IDS/IPS, antivirus, encryption, IDAM, SIEM) Network security concepts including segmentation, firewall configuration more »
to £65,000 + Car Allowance + Benefits Intaso have been engaged by a big player within the Aerospace and Defence Industry who are looking for a SIEM Engineer on a permanent basis. To meet the requirements of this role you must be able to work onsite 3 days per … integrate and optimize security solutions within these environments. Log Analysis: Harness the power of Splunk and Sentinel to sift through mountains of data, identifying threats and vulnerabilities that others might miss. Coding and Scripting: Leverage your coding and scripting skills to automate tasks, create custom solutions, and enhance SIEM functionality. … of SIEM technologies, enabling you to architect and fine-tune our security operations. Qualifications: Proven experience with AWS and Azure cloud environments. Proficiency in Splunk and Microsoft Sentinel. Strong coding and scripting abilities (Python, PowerShell, or similar). A deep understanding of SIEM technologies and their practical implementation. more »
strong governance, transparency, and optimal operational efficiency. Furthermore, they handle market-led infrastructures, automating processes that were traditionally manual. The company's dedication to governance, efficiency, and automation has positioned their solutions as highly coveted among overseers and operators in the global capital markets. As a Security Operations Center (SOC … crucial role in establishing and overseeing the Security Operations team. This includes responsibilities for monitoring, detecting, analyzing, and responding to cyber threats and incidents. Collaboration with the Security Engineering and DevOps teams is vital to inform them of incidents and facilitate the incorporation of security controls into their systems to … and applications, ensuring the safety and integrity of their clients' data and systems. Key Responsibilities: Design and implement the SOC solution, encompassing the identification of monitored log andevent data sources, deployment of log management infrastructure, integration of threat intelligence feeds, and design of technical architecture components such as SIEMmore »
Reigate, England, United Kingdom Hybrid / WFH Options
esure Group
esure's information systems and networks from security breaches and cyber threats by responding to security events, conducting improvements and assessments. What will my role entail? Monitoring and Analysis: Continuously monitor security systems and analyse potential threats and vulnerabilities to the organisation’s information systems. Use securityand network tools … developing security policies and runbooks, and assist in conducting regular audits to ensure compliance. Collaboration: Work closely with service providers and other departments to ensure network, system, and data security. Training and Education: Provide advice and training to staff to raise awareness of informationsecurityand promote good security practices. … following… Experience working in a Security Operations team handling security incidents and associated tooling plus prior extensive experience in IT support or related roles A passion for cyber securityand technology Knowledge of various security methodologies, processes, and technical security solutions (Crowdstrike, Netskope, Zscaler, SIEM, Mimecast, O365). Knowledge of more »
strong governance, transparency, and optimal operational efficiency. Furthermore, they handle market-led infrastructures, automating processes that were traditionally manual. The company's dedication to governance, efficiency, and automation has positioned their solutions as highly coveted among overseers and operators in the global capital markets. As a Security Operations Center (SOC … crucial role in establishing and overseeing the Security Operations team. This includes responsibilities for monitoring, detecting, analyzing, and responding to cyber threats and incidents. Collaboration with the Security Engineering and DevOps teams is vital to inform them of incidents and facilitate the incorporation of security controls into their systems to … and applications, ensuring the safety and integrity of their clients' data and systems. Key Responsibilities: Design and implement the SOC solution, encompassing the identification of monitored log andevent data sources, deployment of log management infrastructure, integration of threat intelligence feeds, and design of technical architecture components such as SIEMmore »
value and protecting our data and systems. You will build and lead a team to build our threat hunting capability and perform security monitoring, threat analysis and vulnerability management. You will also be responsible for developing our Incident Response procedures and responding to, and managing, security events and incidents. In … development of new security controls to protect the Cognita Group of Companies and schools throughout the world. The successful candidate will be a technical security professional with strong leadership skills, be able to build effective relationships easily, and possess an excellent knowledge of cyber security operations and engineering. They will … Computer Science, InformationSecurity or similar (desirable) Minimum 8 years' experience as a senior security leader with responsibility for developing and leading Security Operations in a global, multi-site business. Strong technical security background with a proven track record of delivery. Working knowledge of common securitymanagement frameworks, such as more »
clients over various industries. Your security experience must include: Minimum 2+ years as cyber security consultancy experience in a professional services environment Cyber security consultant with experience in one or more of network security, data security, application securityand cloud security Your diverse security experience may include one or more … Resources and Services Telecommunications & Media Informationsecurity principles and understanding of security lifecycle Familiarity with cybersecurity frameworks and standards such as NIST CSF, ISO27001, CIS controls and industry specific regulations (e.g., HIPPA, GDPR) Expertise in risk assessment andmanagement, with ability to identify and prioritise security risks, and develop risk … Defence model, and the interconnectedness of securityand business processes Understanding the current threat landscape, including knowledge of common attack vectors, threat actors and emerging threats Awareness of cloud security principles, including exposure to one or more of AWS. AZURE, GCP Awareness of various security technologies and tools such as more »
London, England, United Kingdom Hybrid / WFH Options
Intec Select
will organise and conduct vulnerability audits and assessments. Role and Responsibilities: Assist with the managementand operation of our client’s security controls. Help in streamlining and automating of security controls to improve overall security posture of the organisation. To take the lead on security incidents, identification, and remediation. Support … transition for the deployment, integration, and configuration of new security solutions and of any enhancements to existing security solutions. Monitor all in-place security solutions for efficient and appropriate operations. Conduct security focused reviews and analysis of log files and reports of devices, systems, and network traffic (i.e., workstations, servers … . Interpret results and resolve issues identified. Investigate security alerts and provide incident response if and when required, working with global team to help mitigate and resolve incidents. Support and contribute to red/blue team testing and cyber threat-based tabletop exercises. Develop maintain and implement system hardening procedures. more »
Cambridge, Cambridgeshire, UK Hybrid / WFH Options
Bridge Partners
confidentiality, integrity, and availability of Bridge Partners and our clients. You would be responsible for creating and maintaining cybersecurity controls, to identify, protect, detect, respond, and recover to maintain the security posture of Bridge Partners and our clients. A mix of Office 365, email security, endpoint security, other various systems … Security Operations: Collaborate with the security team to monitor and investigate security incidents and vulnerabilities. Conduct root cause analysis and provide recommendations for remediation and prevention. Contribute to the development and maintenance of incident response plans and playbooks. Policies and Procedures: Develop and maintain informationsecurity policies, standards, and procedures. … and recovery. Coordinate with internal teams and external SOC, such as law enforcement or third-party incident response providers, as necessary. Risk Management: Collaborate with stakeholders to identify, assess, and prioritise cyber security risks. Assist in the development and implementation of risk mitigation strategies and controls. Conduct risk assessments andmore »
Cambridge, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Bridge Partners
confidentiality, integrity, and availability of Bridge Partners and our clients. You would be responsible for creating and maintaining cybersecurity controls, to identify, protect, detect, respond, and recover to maintain the security posture of Bridge Partners and our clients. A mix of Office 365, email security, endpoint security, other various systems … Security Operations: Collaborate with the security team to monitor and investigate security incidents and vulnerabilities. Conduct root cause analysis and provide recommendations for remediation and prevention. Contribute to the development and maintenance of incident response plans and playbooks. Policies and Procedures: Develop and maintain informationsecurity policies, standards, and procedures. … and recovery. Coordinate with internal teams and external SOC, such as law enforcement or third-party incident response providers, as necessary. Risk Management: Collaborate with stakeholders to identify, assess, and prioritise cyber security risks. Assist in the development and implementation of risk mitigation strategies and controls. Conduct risk assessments andmore »
work on customer-specific rule sets and be a key advisor to a clients' Service Delivery Manager. The Principal Security Analyst will take responsibility for tuning and maintaining the Security Platforms to deliver the best capability to our analysts and clients. The Principal Security Analyst will act as a key … Principal Security Analyst will act as a subject matter expert and escalation point for other SOC teammates and will work closely with both the Senior Security Operations Manager and the Senior Security Analysts to feed into the SOC technology roadmap and own delivery to align with analyst requirements and further … relevant leadership experience Strong understanding of security principles and technologies. Excellent analytical and problem-solving skills. Strong verbal and written communication skills. Leadership, coaching, and mentoring skills. Ability to work well in a team environment. Familiarity with security tools and technologies such as SIEM, IDS/IPS, and firewalls. Microsoft more »
constant innovation and digital disruption. With diverse services spanning IT strategy and architecture, IT Operations, Cloud Transformation, Security, Risk and Compliance, we help enterprises executives to deliver business value through the use technology and processes. Our teams specialize in 3 core areas covering Cloud, Enterprise and Cyber Security, with a … various industries. Your security experience must include: Minimum 5+ years cyber security experience in a professional services environment with a sound background in privacy Cyber security consultant with experience in one or more of Identity governance, data security, application securityand cloud security Your diverse security experience may include one … Resources and Services Telecommunications & Media Informationsecurity principles and understanding of security lifecycle Familiarity with cybersecurity frameworks and standards such as NIST CSF, ISO27001, CIS controls and industry specific regulations (e.g., HIPPA, GDPR) Expertise in risk assessment andmanagement, with ability to identify and prioritise security risks, and develop risk more »
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Aj Bell Limited
operational analysis and response to security threats targeting AJ Bell systems and information. The key responsibilities of the role are: Responsible for monitoring and responding to alerts and events, ensuring appropriate prioritisation based on impact and urgency. Analysis of large data sets to determine key events and impact of alerts … informationsecurityand acting as point of escalation for service delivery teams Support Identity Access Management activity, ensuring that access to our systems, servers and data is appropriate and in accordance with our security policies. Supporting the assessment, planning and co-ordination of patch management activities for internal systems and … responder and on-call support. Creation andmanagement of phishing simulation campaigns Essential experience, knowledge and skills: Strong understanding and knowledge of InformationSecurity risk management tools and techniques Experience of InformationSecurity standards and frameworks Awareness and understanding of the InformationSecurity threat landscape Understanding of InformationSecurity solutions more »
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Reed Technology
for a Cyber Security Manager to lead and manage a diverse and established Security Operations team. This role will manage and support the procurement, selection, andmanagement of IT security services from 3rd party and in-house providers, alongside delivering and supporting various change initiatives, projects and programmes of work … Lead and manage the cyber security operations function and the security controls, strategies and standards Manage the security cyber operations centre activities, including vulnerability management, security incident andeventmanagement, and threat monitoring Monitor the new and emerging tools, technologies and products and assess their potential value and opportunities Drive … and practices of informationsecurity, such as confidentiality, integrity, and availability. Experience with encryption, authentication, firewalls and antivirus Ensuring compliance with InformationSecurity Standards ISO27001 Proven team leader experience, with a track record of the managementand development of a security team Experience configuring and managing network devices and protocols more »
fortifying their IT environment and ensuring robust security practices. Key Responsibilities: Document Management & File Server Security: Enhance and manage security protocols for Document Management Systems and file servers. Cloud Security Enhancement : Spearhead the elevation of cloud security across the business. Proactive Monitoring: Execute regular checks and generate standard reports to … Security Configuration & Escalation : Configure security parameters and serve as the go-to person for escalated technical issues. Threat Identification & Action: Swiftly identify, report, and take action on threats, vulnerabilities, and unusual events. Security Infrastructure Development : Contribute to the development and maintenance of firm-wide security infrastructure configurations, policies, and procedures. … security policies and governance standards. Industry Awareness: Stay ahead of the curve on security risks and exposures, actively promoting effective counter-measures. Diagnostics & Analysis: Conduct diagnostics and analysis on firewalls, routers, switches, and associated systems for optimal reliability and security. Threat Intel & Vulnerability Reporting: Provide valuable threat intelligence and vulnerability more »
Kidlington, Oxfordshire, United Kingdom Hybrid / WFH Options
Planet Recruitment
expanding and exciting work environment. Purpose of the role is to be responsible for overseeing informationsecurity, cyber securityand ICT risk management programs based on industry-accepted informationsecurityand risk management frameworks. This includes identifying and mitigating security risks, responding to security incidents, conducting security audits and providing … risk optimisation, security processes and compliance with regulations. * Facilitate cyber security, informationsecuritymanagementand regulatory (as required) training for all employees. * Support internal investigations, prepare written findings and recommendations, and carry out follow-up activities. * Coordinate InformationSecurity Incident response activities, manage reporting for events and/or exploited … for exceptions and complaints regarding business-wide information systems security policies, practices and related issues, supported by the IT Management Team. * Work as a liaison for external bodies requiring informationand reports on IT security incidents. * Create and maintain all relevant Cyber andInformationSecurity documentation and procedures. * Stay up more »
currently seeking a skilled AWS Cloud Security Engineer to join our finance organization's Cyber IT team. As a Cloud Security Engineer, you will be responsible for ensuring the security of our digital assets, protecting our financial data and systems from cyber threats, and maintaining compliance with industry regulations. Duties … of compute workflows across engineering and cloud environments. Understand AWS Cloud Security, understand access, identity, and permission levels. Understand Zero Trust Security Strategy and Principles. Data Loss Prevention (DLP) Creating security policies and monitoring security, alert and work. Analysing Security Logs, assisting the SIEMand building out Playbooks. Conduct vulnerability more »
London, England, United Kingdom Hybrid / WFH Options
Selfridges
IT Security Operations Team are responsible for managing, maintaining and monitoring Selfridges IT security tooling, enforcing security policies and ensuring that the Selfridges estate is secure. Security incident response, including identification of infrastructure related security incidents. Assessing, investigating and remediating security vulnerabilities. Monitoring & auditing system access. Maintaining security risk register. … Penetration and Vulnerability testing with 3rd parties. Managing security remediation activity, internally and with 3rd parties. Investigating and Reporting on Data Loss Prevention alerts. Investigating and Reporting on Intrusion Detection and Prevention alerts. Maintaining a robust certificate and key management framework. Security audits. Developing, reviewing and implementing security tooling to … and resolution. Excellent communication and interpersonal skills. Customer focused. Ability to work autonomously or collaboratively. Strong sense of ownership and ability to follow tasks through to completion. Broad functional and process knowledge. Strong analytical skills and decision-making skills. Excellent planning and organization skills. Excellent business writing, presentation and facilitation more »
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Reed Technology
an InformationSecurity Manager to lead and manage the ICT Security Operations team to develop and support a range of products and services. This role will manage and support the procurement, selection, andmanagement of IT security services from 3rd party and in-house providers, alongside delivering and supporting various … include: Lead and manage the security operations function and the security controls, strategies and standards Manage the security operations centre activities, including vulnerability management, security incident andeventmanagement, and threat monitoring Monitor the new and emerging tools, technologies and products and assess their potential value and opportunities Drive new … products and services that offer service improvement and justify their costs and benefits Promote and assist Information Governance in implementing procedures to enhance and maintain the InformationSecurityManagement System and comply with relevant ICT standards Manage the ICT security incident process, review security incidents, weaknesses and malfunctions, and take more »