Cantor Fitzgerald’s Global Information Security team is seeking a Governance, Risk, and Compliance (GRC) Lead with expertise on managing cyber risk, ensuring compliance with regulatory requirements, and maintaining corporate controls. This role will be primarily responsible for leading efforts related to third-party risk management, client due diligence … awareness training, and regulatory compliance. The ideal candidate will have a strong grasp of cybersecurity threats and hands-on experience. Key Responsibilities Governance Risk and Compliance Advise project teams, application owners, infrastructure services, and other IT teams on information security controls, such as access management, incident handling, business continuity … system development lifecycle, threatandvulnerabilitymanagement, and data protection. Identify and manage risks and vulnerabilities, providing strategic mitigation recommendations. Continuously improve policies and procedures related to controls and operational processes. Develop and deliver precise and timely metrics and reports. Third-Party Risk Management: Conduct risk assessments More ❯
Cantor Fitzgerald’s Global Information Security team is seeking a Governance, Risk, and Compliance (GRC) Lead with expertise on managing cyber risk, ensuring compliance with regulatory requirements, and maintaining corporate controls. This role will be primarily responsible for leading efforts related to third-party risk management, client due diligence … awareness training, and regulatory compliance. The ideal candidate will have a strong grasp of cybersecurity threats and hands-on experience. Key Responsibilities Governance Risk and Compliance Advise project teams, application owners, infrastructure services, and other IT teams on information security controls, such as access management, incident handling, business continuity … system development lifecycle, threatandvulnerabilitymanagement, and data protection. Identify and manage risks and vulnerabilities, providing strategic mitigation recommendations. Continuously improve policies and procedures related to controls and operational processes. Develop and deliver precise and timely metrics and reports. Third-Party Risk Management: Conduct risk assessments More ❯
Inc. Hazeltree is a global leader in cloud-based treasury solutions, empowering investment firms with cutting-edge technology to optimize financial performance, enhance liquidity, and mitigate risk. As part of our commitment to security and innovation, we are expanding our Information Security Team and seeking a DevSecOps Engineer to drive … security automation and best practices across our cloud infrastructure and IT operations. Job Overview As a DevSecOps Engineer , you will play a pivotal role in integrating security practices into our DevOps pipeline and IT operations . Working at the intersection of operations, security, and development , you will collaborate closely with … internal teams to safeguard critical business operations by design and default. You will be responsible for security automation, CI/CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI/CD pipeline to enhance development More ❯
Inc. Hazeltree is a global leader in cloud-based treasury solutions, empowering investment firms with cutting-edge technology to optimize financial performance, enhance liquidity, and mitigate risk. As part of our commitment to security and innovation, we are expanding our Information Security Team and seeking a DevSecOps Engineer to drive … security automation and best practices across our cloud infrastructure and IT operations. Job Overview As a DevSecOps Engineer , you will play a pivotal role in integrating security practices into our DevOps pipeline and IT operations . Working at the intersection of operations, security, and development , you will collaborate closely with … internal teams to safeguard critical business operations by design and default. You will be responsible for security automation, CI/CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI/CD pipeline to enhance development More ❯
to be the source of truth in global supply chains. Our mission is to build a world-class business that will evolve for decades and help create a tangible difference in our world. Oritain is the global leader in scientifically verifying origin, notably in the cotton/textiles, food, and … pharmaceutical sectors. We exist to protect the reputations of our customers and US borders by identifying and mitigating well-known risks in global supply chains. Sustainability isn't just about tackling climate change; it represents a growing conscience around our actions and their impact on people, animals, and the planet. … The personal, professional, and governmental move to sustainable practice is driven by a desire to change our impact on the world. We can only do this by knowing the certainty of our actions. Take the Lead as Our Global Cybersecurity Expert! As a result of our continued growth, we're More ❯
o£75k + bonus + benefits. 3 days in office The ideal candidate will have deep expertise in integrating security practices into the Infrastructure and DevOps pipelines, with a strong focus on endpoint protection, secure networking practices, and infrastructure security. You will be working as part of the infrastructure team … to provide hands-on support to various teams across the company, including infrastructure platform, development, front office, and innovation teams, ensuring the secure operation of their services. Key Responsibilities: Implement and manage security tools and technologies: Deploy and manage security solutions such as Microsoft Sentinel for SIEM and Tanium for … ThreatandVulnerabilityManagement (TVM). Conduct security assessments andvulnerability scans: Regularly assess the security posture of applications and infrastructure, identifying and mitigating vulnerabilities. Monitor and respond to security incidents and alerts: Continuously monitor security systems for signs of breaches or anomalies and respond promptly to More ❯
o£75k + bonus + benefits. 3 days in office The ideal candidate will have deep expertise in integrating security practices into the Infrastructure and DevOps pipelines, with a strong focus on endpoint protection, secure networking practices, and infrastructure security. You will be working as part of the infrastructure team … to provide hands-on support to various teams across the company, including infrastructure platform, development, front office, and innovation teams, ensuring the secure operation of their services. Key Responsibilities: Implement and manage security tools and technologies: Deploy and manage security solutions such as Microsoft Sentinel for SIEM and Tanium for … ThreatandVulnerabilityManagement (TVM). Conduct security assessments andvulnerability scans: Regularly assess the security posture of applications and infrastructure, identifying and mitigating vulnerabilities. Monitor and respond to security incidents and alerts: Continuously monitor security systems for signs of breaches or anomalies and respond promptly to More ❯
Information Security Engineer - Development and Automation - UK, Remote Optum is a global organisation that delivers care, aided by technology to help millions of people live healthier lives. The work you do with our team will directly improve health outcomes by connecting people with the care, pharmacy benefits, data and resources … they need to feel their best. Here, you will find a culture guided by diversity and inclusion, talented peers, comprehensive benefits and career development opportunities. Come make an impact on the communities we serve as you help us advance health equity on a global scale. Join us to start Caring. … no limits here on the resources you'll have or the challenges you'll encounter. We have been supporting global healthcare systems from Ireland and the UK for more than 20 years, building a dynamic and diverse team of more than 2,100 talented individuals. With a continued record of More ❯
Manchester Business Line Date published: 02-Mar-2025 Connect to your Industry Cyber security is critical to every organisation. We are shaping cyber strategies and transforming the management of cyber risk and we need you to join us. You'll build strong relationships as one of the areas of … our cyber practice with over 450 extremely talented individuals in the UK alone, as part of a UK Technology and Transformation practice of 7500 people. Cyber security is a business problem, not just a technical problem, and we need people with a diverse array of backgrounds and skills sets to … help our clients solve the problems they face. Join us and you will help our clients solve the latest cyber security challenges, in a business with very significant growth ambitions, enjoying the kind of professional development that will set your potential free. Responsibilities Providing guidance and support to executives to More ❯
Overview: We’re seeking a proactive and detail-oriented Information Security Analyst to join a London based Banks growing security function. Reporting to the Cyber Security Manager , you will support the daily operational security activities across the business. This role is ideal for a professional with 2–3 years' experience … structured environment in a security analyst or security operations role. You'll focus on daily log analysis, vulnerabilitymanagement support, antivirus monitoring, and helping to close security-related incidents. Key Responsibilities: 🔍 Security Monitoring & Analysis Review, monitor, and analyze daily security logs using SIEM tools (e.g., Splunk, Sentinel, Defender … . Identify false positives, escalate true positives, and assist in incident investigations. Support service desk and IT teams with closing out security-related calls and incidents. 🛠️ Threat & VulnerabilityManagement Assist with running and analyzing vulnerability scans; help track remediation. Monitor and manage endpoint protection and antivirus alerts. More ❯
Overview: We’re seeking a proactive and detail-oriented Information Security Analyst to join a London based Banks growing security function. Reporting to the Cyber Security Manager , you will support the daily operational security activities across the business. This role is ideal for a professional with 2–3 years' experience … structured environment in a security analyst or security operations role. You'll focus on daily log analysis, vulnerabilitymanagement support, antivirus monitoring, and helping to close security-related incidents. Key Responsibilities: 🔍 Security Monitoring & Analysis Review, monitor, and analyze daily security logs using SIEM tools (e.g., Splunk, Sentinel, Defender … . Identify false positives, escalate true positives, and assist in incident investigations. Support service desk and IT teams with closing out security-related calls and incidents. 🛠️ Threat & VulnerabilityManagement Assist with running and analyzing vulnerability scans; help track remediation. Monitor and manage endpoint protection and antivirus alerts. More ❯
+ Bonus + Benefits Remote/London 1-2 days p/m AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security, Python, JavaScript, GoLang, Terraform, CloudFormation (AWS), and Azure Resource Manager (ARM) templates. Are you passionate about cloud security and eager to engineer robust security solutions within AWS … and Azure environments? We are seeking Senior Cloud & Application Security Engineers to help our client define and implement its cloud security strategy. If you're an experienced Security Engineering professional excited to work with cutting-edge technology and collaborate with diverse teams, we want to hear from you! Key Skills … Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency in programming languages such as Python, JavaScript, GoLang, Terraform, CloudFormation (AWS More ❯
as well as providing BAU Support to 200 users across the business. Key Responsibilities Include: Network Architecture & Management (Cisco Meraki) Lead network design andmanagement across schools using Cisco Meraki. Optimize Meraki wireless, switching, and security appliances. Manage VLANs, segmentation, and network performance. Collaborate with vendors and internal … teams on connectivity and ISP engagement. Infrastructure, Cloud & Security Administer Microsoft 365 and Google Workspace tenants (user provisioning, MFA, licensing, Conditional Access). Manage Azure cloud services, focusing on performance, identity, and cost control. Oversee IAM, including Azure AD, SSO, and policy enforcement. Maintain SSL certificates across infrastructure. Manage MDM … platforms (Intune, Jamf) across the organisation. Implement and maintain IT security policies aligned with global standards. Coordinate external security assessments, audits, and penetration testing. Develop and maintain business continuity and disaster recovery strategies. Security Strategy & Compliance Regularly audit system configurations and permissions. Lead endpoint protection, external threat prevention, andvulnerabilityMore ❯
The Role The Principal Security Consultant is a senior leader specialising in designing, implementing and managing advanced security solutions. With expertise in SOC engineering tools and one of either Cloud Security, Identity and Access Management (IAM) or Threat Modelling, this role focuses on enhancing the security posture of organisations. … The consultant will lead strategic security initiatives, collaborate with clients or stakeholders to solve complex challenges, and deliver solutions tailored to modern enterprise needs. Design and implement robust cloud security architectures across multi-cloud platforms (AWS, Azure, Google Cloud). Design and deploy IAM solutions to ensure robust authentication, authorisation … and access controls. Lead threat modelling exercises to identify, assess and mitigate risks in systems and applications. Lead the design, implementation and optimisation of SIEM solutions (e.g. Splunk, Sentinel). Integrate SIEM systems with other security tools like EDR, SOAR andthreat intelligence feeds. Skills Extensive experience in Cyber Security More ❯
london, south east england, united kingdom Hybrid / WFH Options
RiverSafe
The Role The Principal Security Consultant is a senior leader specialising in designing, implementing and managing advanced security solutions. With expertise in SOC engineering tools and one of either Cloud Security, Identity and Access Management (IAM) or Threat Modelling, this role focuses on enhancing the security posture of organisations. … The consultant will lead strategic security initiatives, collaborate with clients or stakeholders to solve complex challenges, and deliver solutions tailored to modern enterprise needs. Design and implement robust cloud security architectures across multi-cloud platforms (AWS, Azure, Google Cloud). Design and deploy IAM solutions to ensure robust authentication, authorisation … and access controls. Lead threat modelling exercises to identify, assess and mitigate risks in systems and applications. Lead the design, implementation and optimisation of SIEM solutions (e.g. Splunk, Sentinel). Integrate SIEM systems with other security tools like EDR, SOAR andthreat intelligence feeds. Skills Extensive experience in Cyber Security More ❯
Manager candidates based in London. This grade pays up to £120,000 basic salary plus bonuses, pension, broad benefits, professional membership costs, training & development and more. In addition, our client offers a clear and defined path for career progression where employees have complete control of their development. Key Responsibilities: Develop … and implement cyber security strategies and frameworks. Manage cyber risk and compliance with relevant standards and regulations. Work with large organisations to address cyber security challenges. Communicate effectively with stakeholders through reports and presentations. Required Skills and Experience: Strong skills in areas such as cyber strategy, cyber risk, cyber maturity … security architecture, cyber transformation and regulatory compliance for cyber. Experience of various recognised cyber security relevant standards and regulations, such as NIST CSF, CRI2.0, ISO27001, NCSC CAF, GDPR and NIS2. Experience working in a variety of environments or organisational contexts to develop cyber strategy and manage cyber risk. Desire to More ❯
A leading bank is seeking a skilled Security Operations Manager to strengthen its IT Security team. This role involves optimizing security controls, frameworks, and processes while supporting the integration of new technologies to enhance the bank's security posture. You will act as the right hand to the Head of … IT Security, ensuring robust security services across the organization. Key Responsibilities: Security Operations: Oversee and improve IT Security operations, ensuring efficient and compliant management of security services. Vendor Management: Manage outsourced security providers, ensuring performance meets established SLA standards. Incident Response: Lead and manage IT security incidents, including … forensics when necessary. Security Services: Drive the delivery of services including Threat & VulnerabilityManagement, Privileged Access Management, IAM, DLP, Network Security, and Penetration Testing. Project Leadership: Lead IT/Cybersecurity improvement projects as an SME. Risk & Compliance: Evaluate IT changes for security risks, ensuring compliance with security More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Context
act as a point of contact for security matters across a rapidly expanding enterprise. The business is undergoing a significant period of digital transformation and growth; genuine opportunity to have significant input and influence into the shape and future of the business by being a part of vital security initiatives. … This role is crucial in ensuring the security and integrity of the businesses IT infrastructure by working closely with an outsourced SOC and a small internal security team. Reporting to directly to the SecOps Manager, you'll play a key role in securing systems, remediating vulnerabilities and responding to security … incidents. Key Responsibilities * Collaborate with outsourced SOC to manage security incidents and alerts * Investigate and remediate issues identified in penetration tests * Work on Incident Response processes and plans to improve organisational security resilience * Maintain and optimise security tools, including QRadar, Sophos, Cisco Umbrella, and Qualys * Ensure network security and infrastructure More ❯
Manager candidates based in London. This grade pays up to £90,000 basic salary plus bonuses, pension, broad benefits, professional membership costs, training & development and more. In addition, our client offers a clear and defined path for career progression where employees have complete control of their development. Key Skills Required … Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory compliance for cyber. Experience of various recognised cyber security relevant standards and regulations, such as NIST CSF, CRI2.0, ISO27001, NCSC CAF, GDPR and NIS2. Experience working in a variety of environments or … organisational contexts to develop cyber strategy and manage cyber risk. Desire to work with large organisations trying to solve the latest cyber security problems. Relevant certifications, such as M.Inst.ISP, CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security More ❯
consultant candidates based in London. This grade pays up to £60,000 basic salary plus bonuses, pension, broad benefits, professional membership costs, training & development and more. In addition, our client offers a clear and defined path career progression where employees have complete control of their development. Key Responsibilities: Candidates carrying … of the below skills would be particularly relevant: Strong skills in areas such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory compliance for cyber. Experience of various recognised cyber security relevant standards and regulations, such as NIST CSF, CRI2.0, ISO27001, NCSC CAF, GDPR and NIS2. … Experience working in a variety of environments or organisational contexts to develop cyber strategy and manage cyber risk. Desire to work with large organisations trying to solve the latest cyber security problems. Relevant certifications, such as M.Inst.ISP, CISSP, CISM, CISA or an MSc in cyber security or a related discipline. More ❯
Date: 21 April 2025 IR35 Status: PAYE A top-tier financial services organisation is seeking a Security Engineer with deep expertise in ForgeRock IAM and cloud security . You’ll be leading efforts to secure large-scale identity platforms, automate security workflows, and embed “security by design” into DevSecOps. Key … PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetration testing , threat modeling, andvulnerabilitymanagement Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO, engineering, and product teams on secure … based self-sovereign identity Hands-on coding in JavaScript, Java, or Python Apply now to join a critical security initiative protecting millions of customers and shaping IAM best practices at enterprise scale. More ❯
london, south east england, united kingdom Hybrid / WFH Options
JCW
Date: 21 April 2025 IR35 Status: PAYE A top-tier financial services organisation is seeking a Security Engineer with deep expertise in ForgeRock IAM and cloud security . You’ll be leading efforts to secure large-scale identity platforms, automate security workflows, and embed “security by design” into DevSecOps. Key … PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetration testing , threat modeling, andvulnerabilitymanagement Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO, engineering, and product teams on secure … based self-sovereign identity Hands-on coding in JavaScript, Java, or Python Apply now to join a critical security initiative protecting millions of customers and shaping IAM best practices at enterprise scale. More ❯
Lead Vulnerability Manager/Cyber Threats Hybrid: 3 days York or Staines office £60k-£65k Our client are looking for a Lead Vulnerability Manager to join their growing successful business. Responsibilities You will be responsible for overseeing end-to-end vulnerabilitymanagement programme, across multiple client … environments. · Requires strong expertise in vulnerability assessment · Prioritisation · Remediation strategies · Ensure the security of their clients is robust Who are you? · You will have experience of vulnerabilitymanagement, cyber security or in a related field · Tools with a strong experience level include MS Defender, Tenable, Qualys, Rapid7 · SIEM, EDR and security orchestration tools (MS Sentinel/defender, Splunk, Palo Alto XSOAR…) · Solid Security framework knowledge ie. NIST, CIS, ISO 27001 & MITRE ATT&CK · Strong leadership More ❯
Lead Vulnerability Manager/Cyber Threats Hybrid: 3 days York or Staines office £60k-£65k Our client are looking for a Lead Vulnerability Manager to join their growing successful business. Responsibilities You will be responsible for overseeing end-to-end vulnerabilitymanagement programme, across multiple client … environments. · Requires strong expertise in vulnerability assessment · Prioritisation · Remediation strategies · Ensure the security of their clients is robust Who are you? · You will have experience of vulnerabilitymanagement, cyber security or in a related field · Tools with a strong experience level include MS Defender, Tenable, Qualys, Rapid7 · SIEM, EDR and security orchestration tools (MS Sentinel/defender, Splunk, Palo Alto XSOAR…) · Solid Security framework knowledge ie. NIST, CIS, ISO 27001 & MITRE ATT&CK · Strong leadership More ❯
The IT Security Lead will report to the Senior IT Director to ensure secure and compliant IT Systems are implemented and maintained throughout the organisation. Client Details Our client is a large and global organisation within the healthcare industry, known for its commitment to innovation and excellence. They have a … significant presence in Newcastle Upon Tyne and a new office in Uxbridge. Description Develop and implement IT security strategies and infrastructure. Lead implementation of Security tools Lead threats and vulnerabilities assessment, analysis andmanagement Monitor and analyse the organisation's security posture on an ongoing basis. Lead and coordinate … IT security incident response efforts, continue improving the incident management process. Ensure compliance with all relevant information security and healthcare industry regulations. Conduct and facilitate IT security audits and risk assessments. Provide training and guidance on IT security best practices. Develop and maintain relationships with external IT security entities. More ❯