CyberArk, OpenText, ServiceNow and Microsoft to enhance the relationship with Turnkey and deliver value to our clients When needed, work alongside our Sales, Marketing & Innovation team to provide materials / Pre-Sales support for sales activities Writing and reviewing reports and other client-facing deliverables, to a high standard The expectation will be that you have basic skill in … IAM vendors capabilities (e.g. Life Cycle Management, Application Onboarding, Workflows, Provisioning, Access Review, Reports, Roles, SoDs, etc.) Identity Governance and Administration (IGA) Identity Management (IDM) Ideally with good conceptual / practical knowledge of: Access Management (inc. Single Sign-On (SSO) / Multi-Factor Authentication (MFA) / Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) Required … an IAM solution across all aspects of the SDLC (Analyse, Design, Develop / Configure, Test, Deploy, Document) Understanding of regulatory frameworks, and their application to IAM, e.g. SOx, ISO27001, NIST, HIPAA, GDPR, PSD2, etc. Ideally, an education in Business, IT, IT security or related field Advantageous: Professional certifications such as CISSP, CISA, ITIL, etc. Product certifications from SailPoint, or More ❯
closely with development, operations, and executive teams to ensure security practices are understood and implemented across the organization. Compliance: Ensure security architectures comply with regulations such as GDPR, ISO27001, NIST, and other relevant standards. Requirements Education: Bachelor's degree in Computer Science, Information Security, or a related field; Master's degree preferred. Experience: At least More ❯
post-incident reviews and recommend improvements. Forensic Analysis Investigate incidents, perform root cause analysis, preserve digital evidence, and produce forensic reports. Security Tools Manage tools such as firewalls, IDS / IPS systems, and endpoint protection solutions; evaluate and recommend new technologies. Documentation Maintain detailed logs and reports of incidents, assessments, and analyses for internal stakeholders. Collaboration Partner with IT … What We re Looking For IT Expertise Strong knowledge of IT infrastructure, especially cloud platforms; AWS experience preferred. Security Tools Proficiency Hands-on experience with Palo Alto firewalls, IDS / IPS, and endpoint protection. Network Security Knowledge Deep understanding of VPNs, network protocols, and security architecture. Incident Management Proven ability to detect, analyse, and resolve security threats and malware. … both technical and non-technical stakeholders. Project Management Experience managing security projects and working with cross-functional teams. Certifications Relevant qualifications such as CEH, CCSP, CompTIA Security+, or AWS / Azure certs are highly desirable. This fantastic role come with a highly competitive salary which is reviewed annually, and comes with an excellent benefits package which includes a More ❯
post-incident reviews and recommend improvements. Forensic Analysis - Investigate incidents, perform root cause analysis, preserve digital evidence, and produce forensic reports. Security Tools - Manage tools such as firewalls, IDS / IPS systems, and endpoint protection solutions; evaluate and recommend new technologies. Documentation - Maintain detailed logs and reports of incidents, assessments, and analyses for internal stakeholders. Collaboration - Partner with IT … What We’re Looking For IT Expertise - Strong knowledge of IT infrastructure, especially cloud platforms; AWS experience preferred. Security Tools Proficiency - Hands-on experience with Palo Alto firewalls, IDS / IPS, and endpoint protection. Network Security Knowledge - Deep understanding of VPNs, network protocols, and security architecture. Incident Management - Proven ability to detect, analyse, and resolve security threats and malware. … both technical and non-technical stakeholders. Project Management - Experience managing security projects and working with cross-functional teams. Certifications - Relevant qualifications such as CEH, CCSP, CompTIA Security+, or AWS / Azure certs are highly desirable. This fantastic role come with a highly competitive salary which is reviewed annually, and comes with an excellent benefits package which includes a More ❯
post-incident reviews and recommend improvements. Forensic Analysis – Investigate incidents, perform root cause analysis, preserve digital evidence, and produce forensic reports. Security Tools – Manage tools such as firewalls, IDS / IPS systems, and endpoint protection solutions; evaluate and recommend new technologies. Documentation – Maintain detailed logs and reports of incidents, assessments, and analyses for internal stakeholders. Collaboration – Partner with IT … What We’re Looking For IT Expertise – Strong knowledge of IT infrastructure, especially cloud platforms; AWS experience preferred. Security Tools Proficiency – Hands-on experience with Palo Alto firewalls, IDS / IPS, and endpoint protection. Network Security Knowledge – Deep understanding of VPNs, network protocols, and security architecture. Incident Management – Proven ability to detect, analyse, and resolve security threats and malware. … both technical and non-technical stakeholders. Project Management – Experience managing security projects and working with cross-functional teams. Certifications – Relevant qualifications such as CEH, CCSP, CompTIA Security+, or AWS / Azure certs are highly desirable. This fantastic role come with a highly competitive salary which is reviewed annually, and comes with an excellent benefits package which includes a More ❯
Employment Type: Permanent
Salary: £60000 - £65000/annum + 10% Bonus and Excellent Benefits
information security, with a focus on network security and architecture. Strong knowledge of malicious lateral movement techniques and mitigation strategies. Experience with security frameworks and standards (e.g., NIST, ISO27001). Excellent communication and leadership skills. Relevant certifications such as CISSP, CISM, or TOGAF are highly desirable. Previous job roles that may indicate success include Information … practices. Understanding of protocol analysis techniques. Experience with Azure Log Analytics, KQL, and Azure Alerts. Python, Shell, and PowerShell scripting. Experience with security tools and technologies (e.g., SIEM, IDS / IPS, NG Firewall capabilities, vulnerability scanners). Knowledge of Active Directory and Azure AD. Knowledge of application delivery and the infrastructures that enable it. Familiarity with SQL Server, Oracle … clustering / High Availability technologies, and secure administrative practices. More ❯
designing, implementing, and maintaining highly scalable and resilient cloud infrastructure to support our trading operations. The ideal candidate will have a strong background in cloud computing, automation, and CI / CD pipelines, ensuring high availability and performance for mission-critical systems. Key Responsibilities Cloud Infrastructure Management: Design, deploy, and maintain scalable and resilient infrastructure on AWS using Infrastructure-as … Code (IaC). Kubernetes Administration: Manage and optimize Kubernetes clusters for containerized applications, ensuring high availability and security. Automation & CI / CD: Implement and manage CI / CD pipelines for efficient deployment, testing, and monitoring of applications. Observability & Monitoring: Develop comprehensive monitoring solutions using Prometheus, Grafana, ELK stack, or similar tools to improve system reliability. Security & Compliance: Apply … Familiarity with monitoring, logging, and observability tools (Prometheus, Grafana, Datadog, ELK, etc.). Strong understanding of networking concepts (VPC, Load Balancers, DNS, Firewalls). Experience with DevOps methodologies, CI / CD pipelines, and GitOps practices. Experience with high-performance and low-latency (sub millisecond) systems. Familiarity with serverless architectures and event-driven computing. Exposure to cloud cost optimization and More ❯
3rd Line Technician / Solutions Architect Tela is a fast-growing, staff-focused company. We are constantly evolving and are incredibly excited about the constant changes in technology. The way we bring these changes to market means with need a great team around us. This role is for a senior IT professional who resolves complex technical issues, supports IT … and monitoring of IT infrastructure Incident and Problem Management Analyse recurring incidents to identify underlying problems Implement solutions to prevent future occurrences and improve overall system reliability Provide training / development recommendations to the management team Support the service desk team, as requested Project Implementation and Support Assist in the planning, design, and implementation of IT projects for new … in the deployment of new systems, upgrades, and migrations Technical Documentation Create and maintain comprehensive documentation for systems, procedures, and project plans Document configurations, troubleshooting steps, and resolutions Cyber / Security Ensure IT systems and networks are secure from threats and vulnerabilities Implement and manage security measures, such as firewalls, antivirus software, and intrusion detection systems Conduct regular security More ❯
identify vulnerabilities, and suggest improvements. Stay updated on security trends, threats, and best practices. Skills & Qualifications: Mandatory: BSc Degree or equivalent experience Certifications such as CCNA, CCNP, CWNP, ISA /IEC 62443, GICSP (highly desirable) Experience in Control System Network Design Engineering Understanding of IEC62443 and IEC27001 / 2 standards Knowledge of automation and control engineering … disciplines Familiarity with industrial communication protocols (Modbus, DNP3, OPC) and security implications Experience in writing network specifications Experience with multiple system implementation projects and control platforms Experience in upgrades / replacements in automation / control projects Strong knowledge of engineering practices, standards, and procedures Knowledge of modern automation tools, methodologies, and security considerations in OT environments Organized, detail … oriented, inquisitive Desirable: Experience with Rockwell, Honeywell, Schneider PLC / SCADA systems Familiarity with telecom protocols, satellite communications, radio-link tech Experience with OT Intrusion Detection Systems With over 90 years of combined experience, NES Fircroft is a leading engineering staffing provider across multiple sectors worldwide, offering comprehensive support from visas to benefits and accommodation. More ❯
organisation who is experiencing a level of growth and are leaders in their industry. Responsible for managing externally appointed auditors and for the maintenance of a variety of ISO standards. Responsible for the adherence to and continued certification of the following standards: ISO 9001 Quality Management System ISO27001 Information Security Management … System PCI-DSS Payment Card Industry Data Security Standard ISO 22301 Business Continuity GDPR and Data Protection Laws Conduct regular internal audits in line with the requirements of the standards. Implement compliance initiatives, identify and assess corporate risk, investigate customer and corporate incidents, monitor continuous improvement, recommend effective controls and processes, and integrate specific compliance objectives within business … management in identifying compliance risks and provide appropriate commercial solutions. Monitor industry, regulatory and corporate developments in order to identify areas of vulnerability and risk. Develop and implement corrective / preventative action plans for the resolution of compliance issues and provide guidance and coaching on how to avoid future incidents. Communicate the compliance programme to all employees. Prepare and More ❯
in a Security Operations Centre (SOC) environment, managing high volumes of incidents. Deep technical expertise in Microsoft security tools and solutions, including but not limited to Microsoft Defender, E5 / A5, Sentinel, and Azure Security. Strong analytical and problem-solving skills, with the ability to make sound decisions under pressure. Demonstrated experience in incident detection, triage, containment, and remediation. … such as NIST, ISO27001, or similar. Excellent communication skills, with the ability to clearly convey technical details to diverse audiences. Previous experience in SIEM / SOAR within large-scale, complex environments. Familiarity with other security tools and technologies. Desirable Skills: Relevant certifications (e.g., CISSP, CEH, Microsoft Certified: Security, Compliance, and Identity Fundamentals) a plus. More ❯
processes and activities Support the Head of Security and Infrastructure across all functional areas within the security department Liaise with with our Privacy, Governance, Infrastructure, IT Operations, and Product / Engineering teams on all security matters Ensure tools are running correctly Ensure the integrity of our data Investigate Events of Interest (EoIs) Act upon alerts Continuous learning development Documentation … demonstrate knowledge and commitment to cybersecurity: CompTIA Security+ Certified Ethical Hacker (CEH) CompTIA Network+ ISO27001 Foundation or Practitioner AWS Certified Security Familiarity with TCP / IP, DNS, firewalls, VPNs, and VLANs. Basic experience with SIEMs and security logs Understanding of vulnerability management practices Understanding of penetration testing, Threat Hunting, Red Teaming methodologies Familiarity with More ❯
with business travel to the Middle East . Job Type: Full-Time, Permanent Location: London, UK (with travel to the Middle East) Sector: Energy & Utilities Experience Level: Senior Manager / Director Role Overview This role is pivotal to the growth of our Cyber Security Services, providing technical and advisory expertise to help clients securely design and deploy industrial control … PLC, EMS, and related technologies Familiarity with protocols like TCP / IP, Modbus, IEC 61850, OPC UA, PROFINET Knowledge of security standards such as NIST CSF, ISO27001, IEC 62443, and NIS regulations Ability to develop pragmatic solutions to address cyber risks in OT environments More ❯
and functions; enabling organizations to more quickly and widely adopt emerging technologies while ensuring the integrity of their intellectual property; information flow during disaster response scenarios, and zero-trust / least-privilege environments for M&A, attorney-client privileged communications, etc. And we've only scratched the surface. At our core, we're driven by a shared mission and … and the ability to gracefully handle node failures. • Guarantee 99.9% uptime for the platform's control plane and deployment management. Design and implement a disaster recovery plan with active / passive deployments and seamless failover capabilities. • Architect and implement a highly available deployment setup for applications within the Acra platform. This will involve designing and building the infrastructure and … Bash, Python. •Deep experience with Kubernetes security: RBAC, PodSecurityPolicies (or their replacements), Admission Controllers and Kubernetes network policies. •Proficiency in secure networking practices, including TLS, mutual TLS (mTLS), ingress / egress controls and VPN tunneling configurations. •Proven experience operating and securing service mesh technologies (e.g. Istio, Linkerd, or Consul Connect). •Hands on experience with HashiCorp Vault in production More ❯
ll do Collaborate with the DevOps team to design, implement, and manage a robust DevSecOps framework for our software development pipeline, integrating security tools and processes into our CI / CD workflows to enhance the developer experience Champion a security-first mindset within the development team, promoting secure coding practices and providing guidance on secure development methodologies Create security … team Develop Key Risk Indicators (KRIs) to track security posture across business lines, measure progress and identify outliers Implement and manage security testing tools and processes within the CI / CD pipeline, including static application security testing (SAST), dynamic application security testing (DAST), software composition analysis (SCA), and open source security (OSS) Work together with the DevOps team to … improve our security posture What's required 7-10 years of experience in software development, DevOps, or security engineering, with a strong focus on DevSecOps practices Expertise in CI / CD tools such as GitHub, Jenkins, GitLab CI / CD, Azure DevOps, or similar Proficiency in infrastructure-as-code tools like Terraform or CloudFormation Strong scripting and automation More ❯
threat detection, malware prevention, and device compliance. Build and operate scalable data protection solutions, including data loss prevention (DLP), secrets management, encryption, and classification. Integrate security controls into CI / CD pipelines, cloud-native services, and on-prem platforms to enforce security-by-design principles. Deliver security capabilities that support modern work scenarios, remote access, zero-trust networking, and … AI / ML workloads. Leverage automation frameworks and IaC to improve scalability and reduce manual intervention. Operational Security, SRE & Assurance: Ensure security platforms are resilient, continuously monitored, and designed for 24x7 support and incident response readiness. Embed security telemetry and observability to enable proactive threat detection and automated response. Apply SRE principles to improve reliability, performance, and maintainability of … security controls, implementing zero-trust models, and supporting 24x7 security operations. Strong understanding of compliance frameworks and risk management strategies. Preferred Qualifications: Certifications such as CISSP, CCSP, CISM, AWS / Azure Security Specialty, or equivalent. Experience with tools like Okta, Azure AD, CrowdStrike, Tanium, Zscaler, Vault, and other modern security platforms. Familiarity with DevSecOps principles, Infrastructure as Code, and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Pontoon
Cyber Security Specialist ** Location: London / Hybrid (2 days in office) Rate: A highly competitive salary is available for suitable candidates Role Profile As a Cyber Security Specialist, you will be the go-to Subject Matter Expert (SME) for various projects, offering your insights and recommendations to enhance our security posture. With a strong technical background, you will work … and practises. Experience with security assessment and risk management methodologies. Proficiency in cloud security, particularly with Azure security tools and services. Familiarity with security standards and frameworks (e.g., ISO27001, NIST, CIS). Knowledge of security technologies such as firewalls and web proxies; experience with ZTNA, CTI, and threat modelling is beneficial. Excellent communication and interpersonal More ❯
CyberArk, OpenText, ServiceNow and Microsoft to enhance the relationship with Turnkey and deliver value to our clients When needed, work alongside our Sales, Marketing & Innovation team to provide materials / Pre-Sales support for sales activities Writing and reviewing reports and other client-facing deliverables, to a high standard The expectation will be that you have basic skill in … IAM vendors capabilities (e.g. Life Cycle Management, Application Onboarding, Workflows, Provisioning, Access Review, Reports, Roles, SoDs, etc.) Identity Governance and Administration (IGA) Identity Management (IDM) Ideally with good conceptual / practical knowledge of: Access Management (inc. Single Sign-On (SSO) / Multi-Factor Authentication (MFA) / Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) Required … an IAM solution across all aspects of the SDLC (Analyse, Design, Develop / Configure, Test, Deploy, Document) Understanding of regulatory frameworks, and their application to IAM, e.g. SOx, ISO27001, NIST, HIPAA, GDPR, PSD2, etc. Ideally, an education in Business, IT, IT security or related field Advantageous: Professional certifications such as CISSP, CISA, ITIL, etc. Product certifications from SailPoint, or More ❯
CyberArk, OpenText, ServiceNow and Microsoft to enhance the relationship with Turnkey and deliver value to our clients When needed, work alongside our Sales, Marketing & Innovation team to provide materials / Pre-Sales support for sales activities Writing and reviewing reports and other client-facing deliverables, to a high standard The expectation will be that you have basic skill in … IAM vendors capabilities (e.g. Life Cycle Management, Application Onboarding, Workflows, Provisioning, Access Review, Reports, Roles, SoDs, etc.) Identity Governance and Administration (IGA) Identity Management (IDM) Ideally with good conceptual / practical knowledge of: Access Management (inc. Single Sign-On (SSO) / Multi-Factor Authentication (MFA) / Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) Required … an IAM solution across all aspects of the SDLC (Analyse, Design, Develop / Configure, Test, Deploy, Document) Understanding of regulatory frameworks, and their application to IAM, e.g. SOx, ISO27001, NIST, HIPAA, GDPR, PSD2, etc. Ideally, an education in Business, IT, IT security or related field Advantageous: Professional certifications such as CISSP, CISA, ITIL, etc. Product certifications from SailPoint, or More ❯
and evaluation of risk, as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO27001, SOC 2, NIST 800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving … to work every day. And you'll never stop growing, whatever your level . Discover more reasons to connect with us, our people and purpose-driven culture at deloitte.co.uk / careers More ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
and evaluation of risk, as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO27001, SOC 2, NIST 800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving … to work every day. And you'll never stop growing, whatever your level . Discover more reasons to connect with us, our people and purpose-driven culture at deloitte.co.uk / careers More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
and evaluation of risk, as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO27001, SOC 2, NIST 800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving … to work every day. And you'll never stop growing, whatever your level . Discover more reasons to connect with us, our people and purpose-driven culture at deloitte.co.uk / careers More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
and evaluation of risk, as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO27001, SOC 2, NIST 800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving … to work every day. And you'll never stop growing, whatever your level . Discover more reasons to connect with us, our people and purpose-driven culture at deloitte.co.uk / careers More ❯
management. Knowledge of Risk Management frameworks and their integration with threat intelligence. Hands-on experience with cloud security reviews (AWS, Azure, GCP) considering cloud-specific threats. Familiarity with ISO27001 audits and threat-informed compliance practices. Additional certifications such as CISM, CISSP, ECSA, CREST CCT are advantageous. Who we are: We're a global business empowering More ❯
security best practice across the business. You will also assist with maintaining and improving the company’s accredited Information Security Management System (ISMS), with a particular focus on ISO27001 and Cyber Essentials Plus requirements. In addition, you will work collaboratively with the wider Cyber Security team to define and mature Security Operations Centre (SOC) processes More ❯