the organisation's security. Key accountabilities: Assurance and Testing: Develop and improve security policies and guidance related to security assurance testing. Coordinate and manage vulnerability assessments, penetration testing, and other technical evaluations. Collaborate with technology teams to implement robust security controls and provide guidance on remediation. Perform third-party … vendor risk assessments and report findings to relevant stakeholders. Risk Management: Conduct regular risk assessments to identify vulnerabilities and associated risks. Develop and implement risk mitigation strategies. Define and report key risk metrics for security assurance. Maintain a comprehensive risk register. Attack Surface Management: Collaborate on assurance initiatives … to identify, monitor, and reduce exposed vulnerabilities. Monitor the external threat landscape and integrate attack surface management capabilities. Security Governance and Compliance: Develop and maintain information security policies, standards, and procedures. Ensure compliance with legal, regulatory, and contractual obligations. Act as the primary liaison for assurance audits and external More ❯
Peterborough, Cambridgeshire, United Kingdom Hybrid / WFH Options
AB Agri Ltd
systems and data across the business Advising on and reviewing the implementation of Information Security Policies, Standards and Controls across projects and operations Coordinating vulnerabilitymanagement activities across IT, OT, and cloud environments Providing guidance on security best practices, supporting compliance with internal policy and external regulations Supporting … the development and rollout of the third-party risk management framework Participating in internal forums and external security events, bringing fresh insights to shape future security initiatives Maintaining awareness of business systems, data flows, and architecture to inform security recommendations Collaborating with stakeholders to ensure secure design and implementation … and improvement Knowledge or experience of working within an Information Security, Risk or Compliance function Familiarity with cyber security principles, governance frameworks, and risk management practices Understanding of cloud environments, particularly Microsoft Azure, and their associated security considerations A relevant degree (e.g. Computer Science or similar) and/or More ❯
overview: This is an opportunity to lead global Security Operations focused on safeguarding Arm's digital environment through exemplary threat detection, incident response, and vulnerabilitymanagement capabilities. This senior role, reporting directly into the CISO, is accountable for driving the strategic direction of Arm's Detect & Response function … delivering outstanding performance and ensuring we are resilient against an evolving threat landscape! In addition to operations, you will lead cyber crisis management, C-Suite level stress testing, team development, and top-level cybersecurity thought leadership. Responsibilities: Own and deliver the strategic roadmap for cyber incident and vulnerability … how they can be used as a force multiplier for a technology business strategy, with the ability to influence at all levels. Extensive people management experience, fostering a culture focused on mentoring, wellbeing, and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant More ❯
Technical Skills: Solid grasp on Linux OS fundamentals, solve problems and performance tuning Good understanding of HPC infrastructure and applications Exposure to HPC workload management tools like IBM Spectrum LSF Strong scripting skills (Bash, Shell, Python, Perl, etc.) Experience with cloud technologies in AWS and/or Google Cloud … understanding and experience in infrastructure and application monitoring and alerting tools Good understanding about remote display and interactive technologies like ETX Solid skills with VulnerabilityManagement and security patching of constantly evolving environment Skills and attitude on automating common repetitive tasks Relevant experience in a distributed team Working More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
orchestration tools (e.g., SOAR platforms, scripting languages like Python, PowerShell) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Responsibilities: Build security automations, logging, and SIEM detections to improve the CDO's efficiency, scalability, and incident response capabilities. Design … implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with CDO analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to More ❯
tools (e.g., SOAR platforms, scripting languages like Python, PowerShell, KQL) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Key Skills and Experience Experience contributing to large-scale, sprint-based, security automation and detection engineering projects in a SOC … incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response … and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to leverage automation opportunities and ensure successful integrations. Desirable Skills More ❯
tools (e.g., SOAR platforms, scripting languages like Python, PowerShell, KQL) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Key Skills and Experience Experience contributing to large-scale, sprint-based, security automation and detection engineering projects in a SOC … incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response … and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to leverage automation opportunities and ensure successful integrations. Desirable Skills More ❯