Senior Security Consultant - Security Architecture About Bridewell One of the most exciting prospects in the UK cybersecurity sector today, Bridewell is a leading cybersecurity services company specialising in protecting and transforming critical business functions for some of the world's most trusted organisations. We are the trusted partner for operators of essential … services and provide end-to-end cybersecurity capabilities that help our clients overcome their security challenges, allowing them to operate safely and securely. Bridewell holds the Gold level, Investors in People award which we feel solidifies and reflects on the outstanding calibre that makes us truly one team. Who are we looking for? A passionate technology … focused individual, with an honest and empathic approach to customer conversations. You will have hands on experience in Security Architecture and Cloud Security and can deliver comprehensive and robust security solutions to different audiences. You will have owned, led and developed end to end solution architectures for projects which have high security requirements. What you'll More ❯
Senior Information Security Manager page is loaded Senior Information Security Manager Apply locations Great Britain - London time type Full time posted on Posted Yesterday job requisition id R5807 Job Description: Senior Information Security Manager Position Overview: We are seeking aSenior CyberSecurityPosture and Exposure Managerto lead and enhance our organization's securityposture and manage cyber exposure risks. This role will oversee a small team of highly skilled Security Engineers and will be responsible for developing, implementing, and maintaining strategies to identify, assess, and mitigate security vulnerabilities across the enterprise. The ideal candidate will have a strong technical background, leadership experience, and a proactive approach to … managing cyber risks in a dynamic technology environment. What You'll Do: Leadership and Team Management: Lead, mentor, and manage a team of Security Engineers, fostering a culture of collaboration, innovation, and continuous improvement. Define team goals, assign responsibilities, and ensure the successful execution of security initiatives. Conduct regular performance reviews and provide professional development opportunities for More ❯
Daintta are a rapidly growing, values-driven team of specialists who work with public sector and government clients across Cyber, Telecommunications and Data. We are seeking a talented and motivated CyberSecurity Consultant to join our team and contribute to our mission of protecting the UK through data-driven insights and solutions. We are looking for a … Strategy, Engagement & Risk Consultant who intuitively understands clients' needs, considers both immediate and strategic goals, and can apply their experience creatively to meet new and complex challenges. Key Responsibilities Cyber Strategy Development: Supporting the development and roll out of cybersecurity strategies, capabilities, and operating models to meet our clients' goals. Stakeholder Management: Understanding our clients' needs … building strong relationships with key stakeholders as a trusted partner and 'critical friend'. Risk Management: Undertaking risk and maturity assessments, providing strategic guidance on how to improve cybersecurityposture using a risk-based approach with articulation of mitigations/controls and their respective impact on reducing risk. Communication: Utilising strong written and verbal communication skills to support More ❯
OT Security Maintenance Specialist leads initiatives across OT systems by utilizing his/her extensive knowledge of OT systems and environments. He/she works with cybersecurity and operational personnel in Digital Engineering Department to create and implement mitigation strategies in order to effectively protect against cyber threats and vulnerabilities within the OT landscape. He/she possess … in-depth expertise in security technologies such as firewall logs, IDS, endpoint security solutions, access control systems, and other related security technologies within the OT environment. He/she also works alongside the cybersecurity team to conduct research and develop or deploy new capabilities and solutions. Work Functions: Discover and manage organization's OT assets: Verify OT … against established baselines Establish, review or update configuration baselines for inventoried assets to support OT Security program Ideally understanding cybersecurity standards: ISO27001 and IEC62443 Improve and maintain cybersecurityposture of OT systems: Define patching and control needs of the organization's OT system and prioritize related activities Oversee implementation of controls or patches, ensuring minimal disruption within More ❯
We are looking for an OT Security Engineer who wants to work more in an advisory and compliance role within OT security. The OT Security Engineer is responsible for overseeing activities to establish a secure OT environment. He/she collaborates with cybersecurity teams, system owners, and operational personnel to implement secure system architectures, mitigate cyber threats … and vulnerabilities, and conduct routine reviews of OT systems related to security standards and regulations. Additionally, he/she maintains security documentation and procedures to support the setup of relevant security controls. He/she should be familiar with modern security technologies such as firewalls, log management (SIEM), IDS, endpoint protection, access control systems, and other … safeguard the OT environment Ensure our IT/OT setup follows our zoning model (based on the Purdue Model) Support and enable OT teams to improve and maintain cybersecurityposture: Collaborate with cybersecurity and operational teams to implement vulnerability mitigations, patches, or compensating controls on OT systems Identify potential operational, safety, or business risks Ensure OT operations are More ❯
HackerOne is a global leader in offensive security solutions. Our HackerOne Platform combines AI with the ingenuity of the largest community of security researchers to find and fix security, privacy, and AI vulnerabilities across the software development lifecycle. The platform offers bug bounty, vulnerability disclosure, pentesting, AI red teaming, and code security. We are trusted by industry … are not leading a project, you are a collaborative and effective software engineer and team member. You will interact with one of the world's most vibrant communities of security researchers and hackers and use this experience to build delightful features and products for them and the thousands of companies who trust HackerOne with their cybersecurity posture. As a More ❯
HackerOne is a global leader in offensive security solutions. Our HackerOne Platform combines AI with the ingenuity of the largest community of security researchers to find and fix security, privacy, and AI vulnerabilities across the software development lifecycle. The platform offers bug bounty, vulnerability disclosure, pentesting, AI red teaming, and code security. We are trusted by industry More ❯
maintaining automated systems that facilitate the transition to post-quantum cryptographic algorithms. You will play a critical role in streamlining cryptographic processes, ensuring scalability, and maintaining GSK’s cybersecurityposture in the post-quantum era. This position requires a strong technical background in cryptographic algorithms, automation frameworks, and software development. Key Responsibilities Test new PQC algorithms and document … with minimal disruption. Ensure that automated solutions are compatible with GSK’s software stack, databases, and network infrastructure. Develop automated testing pipelines for post-quantum cryptographic algorithms to ensure security, efficiency, and scalability. Conduct performance benchmarking and error analysis of automated cryptographic transitions. Implement monitoring solutions to track the performance and reliability of automated cryptographic systems. Proactively identify and … Bash). Proficiency in software development languages (e.g., Python, Java, C++, or Rust). Hands-on experience with testing frameworks and automated systems. Solid understanding of cybersecurity concepts, data security, and secure software development practices. Why GSK? Uniting science, technology and talent to get ahead of disease together. GSK is a global biopharma company with a special purpose – to More ❯