Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Tesco Bank
Edinburgh office for Moments that matter'. Closing Date - Applications close 15th May at 5pm A chance to thrive We're looking for a Security Engineering Manager to join our Cyber SecurityOperations team at Tesco Bank, part of Barclays Bank UK Plc. You'll work with … tools and technologies, ensuring our systems are always one step ahead of potential threats. This role will be pivotal in implementing and enhancing our securityoperations, directly impacting the safety and integrity of our organisation. Your expertise will be crucial in shaping our security landscape. You'll … by working closely with cross-functional teams, including IT, Risk Management, and Compliance, to ensure a cohesive approach to cybersecurity. Developing and implementing advanced security protocols and procedures to safeguard our systems and data. Ownership of practices and processes within the SecurityOperations Centre (SOC) activities, ensuring More ❯
Cyber & Data Security Risk Consultant Date: 15 Apr 2025 Location: Edinburgh, GB Company: Royal London Group Job Title: Cyber & Data Security Risk Consultant Contract Type: Permanent Location: Edinburgh/Alderley Park Working style: Hybrid 50% home/office based About the Role: Are you passionate about cyber security … protection? Do you have a knack for identifying and managing risks? If so, we have the perfect opportunity for you! As a Cyber & Data Security Risk Consultant, you will play a crucial role in advising the Board and senior management on strategic planning and decision-making. You will independently … risk-related communication and management information flows across the Group. Overseeing processes and mechanisms to identify, record, assess, manage, and report Information and Cyber Security related risks. About You: We are looking for someone with a solid understanding or willingness to gain of the Royal London Group business vision More ❯
Managed Service Provider, Remote with occasional office visits , £70,000 + commission & great package! Our client is seeking a highly motivated Cyber Security Solutions Architect to join their growing team. You will be a vital member of the solution architect team as their Cyber Security Specialist. Collaborating with … Level Designs (LLDs) for customers, ensuring a commercially effective blend of security. Simplify Technical Terms : Explain complex technical concepts in a non-technical manner. Security Assessments : Conduct assessments and design architectures to address vulnerabilities and risks. Threat Modeling : Develop and implement threat models to identify and mitigate potential security … DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Vulnerability Management : Collaborate with SecOps to develop and implement vulnerability management programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise in cloud security best practices, including More ❯
to recruit a Cyber Incident Management (CIM) and Threat and Vulnerability Management (TVM) Governance Analyst responsible for a variety of functions within the Fusion & SecurityOperations (F&SO) Governance Program at State Street. This includes gathering, analyzing, and enriching data for utilization on scorecards and related governance reporting More ❯
for State Street seeks to recruit a Key, Certificate, and Encryption Management (KCEM) Governance Analyst responsible for a variety of functions within the Fusion & SecurityOperations (F&SO) Governance Program at State Street. This includes gathering, analyzing, and enriching data for utilization on scorecards and related governance reporting … related to KCEM within the State Street environment. This role requires an individual with deep knowledge of KCEM, including key and certificate lifecycle management, security governance and compliance, and cryptography/encryption within a corporate environment. What you will be responsible for As a KCEM Governance Analyst you will … tools for change management, tracking, and reporting demonstrated through work, military, or education Strong background in cybersecurity, KCEM, including key and certificate lifecycle management, security governance and compliance, and cryptography/encryption Why this role is important to us Our technology function, Global Technology Services (GTS), is vital to More ❯