meet ISO27001 & the Cyber Essentials+ certification. Administrative requirements of PAM tool. (CyberArk) Experience Experience administrating PAM solutions, such as CyberArk - MANDATORY Working understanding of security operations, threat detection, and incident response. Experience using SIEM and security tooling for triage and log analysis. Experience tracking and managing vulnerabilities using industry frameworks. Familiarity with enterprise systems including Microsoft 365 and Azure More ❯
and standards (e.g., ISO 27000, NIST SP800 series, CSF). Conduct risk assessments and vulnerability management activities. Maintain robust security controls across enterprise assets, software, networks, and applications. Support incidentresponse and recovery processes, including penetration testing and audit log management. Deliver training and awareness programs to enhance the organizations security posture. Collaborate with internal and external stakeholders … curious, and analytical mindset with strong problem-solving skills. Technical Skills: Comprehensive knowledge of security controls, including: Data Protection, Account Management, and Access Control Management. Continuous Vulnerability Management and Incident Response. Penetration Testing and Security Awareness Training. Secure Configuration and Network Monitoring. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Randstad Technologies Recruitment
and evolve Terraform modules for automated, consistent, and version-controlled deployments. Security & Access Management: Administer Conditional Access Policies, manage application registrations, and enforce secure identity and access practices. Monitoring & IncidentResponse: Configure and manage tools like Azure Monitor and Log Analytics to proactively detect and resolve issues. Compliance & Documentation: Maintain accurate technical documentation and ensure adherence to security More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Vanquish Technologies Limited
requirements, deliverables, and operational priorities. Deliver timely, high-quality threat briefings and risk assessments to operational stakeholders. Drive continuous improvement of threat intelligence processes, tooling, and automation. Participate in incidentresponse investigations, providing threat context and attribution support. Maintain awareness of global regulatory and compliance requirements related to threat intelligence and offensive security operations. Key Projects or Initiatives More ❯
mapping adversary behaviours and detection Develop and update threat profiles, attack surface assessments, and adversary emulation plans Present high-quality threat briefings, risk assessments, and operational recommendations Participate in incidentresponse, providing context, attributions, and support as required Required Skills & Experience: Extensive experience in threat intelligence, cybersecurity operations, or penetration testing Proven ability to work collaboratively with Red More ❯
into actionable engineering guidelines and reusable controls. Ensure AI systems avoid prohibited practices and meet obligations around: Transparency and user awareness Data minimisation and lawful processing Continuous monitoring and incidentresponse Cross-Functional Collaboration & Governance: Partner with legal, compliance, and architecture teams to align AI development with enterprise risk and governance frameworks. Contribute to internal working groups on More ❯
and implement automated security workflows across their infrastructure. After deciding against expanding their SOC to a full 24x7 model, the business is investing in automation to improve detection-to-response times and reduce manual intervention. The successful candidate will collaborate with SOC teams, developers, and infrastructure engineers to build automated remediation processes that can isolate or shut down affected … DevSecOps, Security Automation, or Infrastructure Engineering. Proficient in scripting languages (e.g. Python, PowerShell, Bash). Hands-on with IaC tools (Terraform, Ansible, CloudFormation). Solid understanding of SOC operations, incidentresponse, and security monitoring. Preferred Background in large-scale or regulated environments. Knowledge of CI/CD pipelines and secure DevOps practices. Personal Attributes Proactive, analytical, and automation More ❯
stories and acceptance tests that can be validated through automated pipelines. Embed privacy controls and assurance checks within CI/CD workflows, supporting continuous compliance and proactive risk detection. IncidentResponse & Coaching Act as the primary privacy SME for delivery and platform teams during privacy incidents or investigations. Provide technical insight during incident triage, root cause analysis More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Adecco
technical information to both technical and non-technical audiences. Analyse security incidents, develop remediation measures, and prepare detailed reports on security metrics and incidents for management review. Participate in incidentresponse activities, coordinating with external security teams when necessary. Provide training and awareness programs for staff on security best practices, helping to embed security principles across departments. Operational More ❯
Infrastructure as Code) Work with virtualisation (VMware/vSphere, etc.) Configure/manage SAN/storage, Fibre Channel, zoning, LUN provisioning Participate in vulnerability assessments, patches, security hardening, and incidentresponse Required Skills & Experience NPPV3 clearance, either current or active within the last 12 months (non-negotiable) Strong track record with Windows?11 deployment (imaging, upgrade, Autopilot, Intune More ❯