the online application process or during the recruitment process, please contact and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes … with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or … breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary based on location, experience and other qualifications for the role and may be eligible for an More ❯
the online application process or during the recruitment process, please contact and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes … with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or … breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary based on location, experience and other qualifications for the role and may be eligible for an More ❯
Simple, Do The Right Thing, Own It, and Aim For Greatness. About the Role To support our growth, we are looking for SOC Analysts to join our growing cyber security function. This role will be supporting our 24/7 operational capabilities (On-call rota, not shift based). As a member of the Starling SOC team, you will … Incident Triage, Response, and Investigations based on Alerts received from multiple sources which include: Cloud Infrastructure/Security. Endpoint Detection and Response. Perimeter detection tooling. Investigating and responding to security alerts raised by Users. Enhancing and creating analytic triggers to enhance alert efficacy. Continuous development of incident handling and readiness processes. Proactive threat hunting based on threat intelligence. Documentation … care more about aptitude and attitude than specific experience or qualifications. Below is an overview: 3+ years experience in an in-house SOC role and team Understanding of AWS Security Solutions (or other Public Cloud Solutions) Analysis and Incident Response experience with Cloud systems such as AWS or GCP Experience working and supporting analytics/SIEM platforms. Experience working More ❯
office, 2 days remote Industry: The Global Trading firm Summary: Our client is seeking for a Risk & Control Data Analyst to lead compliance initiatives across their Technology and Cyber Security platforms. This critical role supports our highly regulated financial services environment and Critical National Infrastructure operations by delivering comprehensive risk and compliance management information. The ideal candidate will collaborate … mentor junior team members while contributing to broader IT strategic objectives Execute daily team operations while meeting established Service Level Agreements Qualifications and Requirements: Strong experience in Finance/Information Technology sector roles Extensive in analyze complex datasets to identify trends, compliance gaps, and data anomalies Proficiency in adjusting data visualization techniques for different audience requirements Strong prioritization skills … dashboards Agile Delivery : Experience working within Agile frameworks (Jira, Confluence, user stories, sprints, backlogs) KPI Development : Proven ability to develop metrics for IT and DevSecOps environments Desirable Knowledge Areas: Information Technology and InformationSecurity tooling platforms Exchange industry technologies and related systems Risk & Compliance Frameworks implementation RESTful APIs, network protocols, and configuration technologies To be considered, please More ❯
office, 2 days remote Industry: The Global Trading firm Summary: Our client is seeking for a Risk & Control Data Analyst to lead compliance initiatives across their Technology and Cyber Security platforms. This critical role supports our highly regulated financial services environment and Critical National Infrastructure operations by delivering comprehensive risk and compliance management information. The ideal candidate will collaborate … mentor junior team members while contributing to broader IT strategic objectives Execute daily team operations while meeting established Service Level Agreements Qualifications and Requirements: Strong experience in Finance/Information Technology sector roles Extensive in analyze complex datasets to identify trends, compliance gaps, and data anomalies Proficiency in adjusting data visualization techniques for different audience requirements Strong prioritization skills … dashboards Agile Delivery : Experience working within Agile frameworks (Jira, Confluence, user stories, sprints, backlogs) KPI Development : Proven ability to develop metrics for IT and DevSecOps environments Desirable Knowledge Areas: Information Technology and InformationSecurity tooling platforms Exchange industry technologies and related systems Risk & Compliance Frameworks implementation RESTful APIs, network protocols, and configuration technologies To be considered, please More ❯
Operations & System Health Design and test robust backup and disaster recovery strategies. Perform patching, upgrades, and maintenance to ensure availability and compliance. Monitor system health, capacity, and performance trends. Security & Governance Review and harden database security configurations. Manage access controls and support compliance with Cyber Essentials and data protection standards. Documentation & Collaboration Maintain clear documentation of system architecture … tuning, and T-SQL. Proven experience conducting architectural reviews and producing actionable improvement plans. Strong analytical and documentation skills. Experience with backup/recovery, capacity planning, and SQL Server security best practices. Excellent communication and stakeholder engagement skills. Desirable Skills Experience with business-critical platforms (e.g., CRM, ERP, Portals). Familiarity with MySQL or other RDBMS. Knowledge of SSIS … and welcome all applications. As a specialist in secure technology solutions, all successful candidates will be subject to pre-employment checks, so we can ensure compliance with our ISO27001 (InformationSecurity) and Cyber Essentials Plus certifications. We are committed to using any personal information you may give us in a secure and proper manner, for more informationMore ❯
At SERIS Security, we offer integrated surveillance and security where people and technology reinforce each other. Together, we provide high-quality support that meets the real needs of our customers. Our services include Security through professional on-site surveillance, Monitoring from our control rooms with 24/7 follow-up, and Technology with smart customised security solutions. At SERIS Academy , we train employees and ensure continuous development within the security sector. We also offer logistics support through our Logistics service. But we can't do that without our employees. Therefore, we are looking for people who want to build a safe future with us. SERIS Security is looking for a Quality Manager to … support its ambition for operational excellence, safety, compliance and continuous improvement. Reporting to the CEO, you will manage and optimize the Integrated Management System (IMS) across SERIS Academy, Logistics, Security, and Technology. Your mission As our Quality Manager , you ensure that our operations consistently meet the highest standards for quality, safety, environment, and informationsecurity . You More ❯
North West London, London, United Kingdom Hybrid / WFH Options
JobHeron
requires the ability to work in a busy and fast paced environment, and in a reactive business. With knowledge of different specialisms within IT and technical understanding of current security trends and solutions as well as planning, implementing, and monitoring changes in infrastructure configurations. You will manage a team responsible for the installation, configuration, and maintenance of software and … there is an expectation that staff be willing to “help out” with things that are not part of the formal job description. The position will also implement and manage informationsecurity for use of cloud services as well as security configuration management which pertains to infrastructure activities. This individual will set direction for Infrastructure ensuring members of … and network devices, keep up to date on new best practices and technical advances or techniques on a continuing basis. To perform the role in compliance with quality and security objectives as defined in policies and procedures. To ensure that staff under your supervision perform their duties in line with company policies and procedures. Duties & Responsibilities: Managing computers, servers More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Jobheron
requires the ability to work in a busy and fast paced environment, and in a reactive business. With knowledge of different specialisms within IT and technical understanding of current security trends and solutions as well as planning, implementing, and monitoring changes in infrastructure configurations. You will manage a team responsible for the installation, configuration, and maintenance of software and … there is an expectation that staff be willing to “help out” with things that are not part of the formal job description. The position will also implement and manage informationsecurity for use of cloud services as well as security configuration management which pertains to infrastructure activities. This individual will set direction for Infrastructure ensuring members of … and network devices, keep up to date on new best practices and technical advances or techniques on a continuing basis. To perform the role in compliance with quality and security objectives as defined in policies and procedures. To ensure that staff under your supervision perform their duties in line with company policies and procedures. Duties & Responsibilities: Managing computers, servers More ❯
A leading organisation in the offshore and renewables sector is seeking an experienced InformationSecurity Manager (ISM) to head its Cyber Security strategy and best practices. Operating in the booming renewables industry, they specialise in installation, construction, offshore renewables, decommissioning, and engineering. This permanent role offers the flexibility to be based in their offices in Aberdeen or … London. This is a strategic leadership role, bridging the gap between senior management's vision and the technical expertise of security teams. The ISM will play a crucial part in shaping and delivering security initiatives that protect critical infrastructure while ensuring alignment with business objectives. Key Responsibilities: As ISM, you will design and implement a robust cybersecurity strategy … proactively identifying and mitigating risks while ensuring compliance with industry standards. You will lead a team of security professionals, providing guidance and mentorship to drive operational excellence. Your role will involve overseeing security infrastructure, managing incident response, and working closely with vendors and internal teams to enhance the organisation's security posture. Additionally, you will champion securityMore ❯
Leeds, England, United Kingdom Hybrid / WFH Options
AppCheck Ltd
with commercial leadership, customers and technical teams, while building the product roadmap and driving progress towards and beyond launch. If you have experience in SaaS, enterprise software or cyber security, we’d love to hear from you. About AppCheck: AppCheck develops informationsecurity software for its end-user clients and reseller network. Our cloud-based service provides … detection and reporting services for web applications and hosted infrastructure We provide unparalleled detection across APIs, SPAs, infrastructure & modern web applications, with the ability to identify 100,000+ known security flaws as well as zero-day vulnerabilities through the application of first principles thinking. Job Description Asset Management is a vital activity for our customers and is central to … construct a cohesive, commercially aligned product vision, strategy, and roadmap. Desirable Criteria Experience: Prior experience in the cybersecurity industry in either a technical or commercial capacity; experience with automated security testing technologies like DAST/SAST is an advantage. Experience of working with Large Enterprise customers in a B2B SaaS context. Experience of working with B2C SaaS/reseller More ❯
issues within the day-to-day role to management. *How You'll Do It* * Analyze, design, code, test, and deploy new user stories and product features with high quality (security, reliability, operations) to production. Understands the software development lifecycle and leverages critical thinking skills to properly evaluate features and functionality. * Guides early-career engineers by providing learning tasks as … other engineers, architects, product owners and data scientists. * Contributes to and leads technology communities of practice at Discover in areas of design-thinking, tools/technology, agile software development, security, architecture and/or data. * Creates and enforces IT standards within the system/application infrastructure and compatibility with the architecture of the platform. *Minium Qualifications* At a minimum … here's what we need from you: * Bachelors Computer Science, Engineering, Informatics, InformationSecurity, Information Technology or related * Experience in Information Technology, (Software) Engineering, or related * For roles requiring Dreyfus Rating – Internal applicants only: technical proficiency of competent on the Dreyfus engineering scale. *Physical and Cognitive Requirements* The physical requirements described here are representative of those More ❯
issues within the day-to-day role to management. *How You'll Do It* * Analyze, design, code, test, and deploy new user stories and product features with high quality (security, reliability, operations) to production. Understands the software development lifecycle and leverages critical thinking skills to properly evaluate features and functionality. * Guides early-career engineers by providing learning tasks as … other engineers, architects, product owners and data scientists. * Contributes to and leads technology communities of practice at Discover in areas of design-thinking, tools/technology, agile software development, security, architecture and/or data. * Creates and enforces IT standards within the system/application infrastructure and compatibility with the architecture of the platform. *Minium Qualifications* At a minimum … here's what we need from you: * Bachelors Computer Science, Engineering, Informatics, InformationSecurity, Information Technology or related * Experience in Information Technology, (Software) Engineering, or related * For roles requiring Dreyfus Rating – Internal applicants only: technical proficiency of competent on the Dreyfus engineering scale. *Physical and Cognitive Requirements* The physical requirements described here are representative of those More ❯
Coordinator to manage our internal systems and lead the implementation and maintenance of our Cyber Essentials certification. This is a key role for someone who is passionate about IT security and wants to contribute to the future of clean energy in a dynamic, fast-evolving sector. Key Responsibilities: Oversee day-to-day IT support across the business, ensuring secure … policies, processes, and end-user awareness training. Monitor access controls and ensure least-privilege principles are applied consistently. Essential Skills & Experience: Proven experience in IT support, systems administration, or information security. Strong working knowledge of the Cyber Essentials framework. Familiarity with the security and operational demands of the renewable energy or utilities sector. Proficiency with firewall configuration, antivirus … experience achieving Cyber Essentials or ISO 27001 certification in an energy-related organisation. Familiarity with NIS regulations, GDPR, or Ofgem compliance frameworks. Understanding of Azure cloud platforms, including relevant security controls. Experience of querying SQL Server databases using T-SQL for data validation, reporting, or audit support. Relevant industry certifications (e.g., CompTIA Security+, Microsoft Certified: Security Administrator, ITIL More ❯
IT service delivery or infrastructure projects in a managed services environment. Hands-on expertise with Microsoft 365, Intune, and Azure. Familiarity with ITSM platforms (e.g., Halo) and network/security practices. Strong understanding of ITIL, SLAs, and service desk operations. Commercial awareness with experience in ROI, business cases, and benefit realisation. Excellent communication and stakeholder engagement skills. Competencies and … and welcome all applications. As a specialist in secure technology solutions, all successful candidates will be subject to pre-employment checks, so we can ensure compliance with our ISO27001 (InformationSecurity) and Cyber Essentials Plus certifications. We are committed to using any personal information you may give us in a secure and proper manner, for more informationMore ❯
IT service delivery or infrastructure projects in a managed services environment. Hands-on expertise with Microsoft 365, Intune, and Azure. Familiarity with ITSM platforms (e.g., Halo) and network/security practices. Strong understanding of ITIL, SLAs, and service desk operations. Commercial awareness with experience in ROI, business cases, and benefit realisation. Excellent communication and stakeholder engagement skills. Competencies and … and welcome all applications. As a specialist in secure technology solutions, all successful candidates will be subject to pre-employment checks, so we can ensure compliance with our ISO27001 (InformationSecurity) and Cyber Essentials Plus certifications. We are committed to using any personal information you may give us in a secure and proper manner, for more informationMore ❯
business, upholding our core values and behaviours with all internal and external customers, clients and third parties. Maintain business and client confidentiality, adhering to applicable Data Protection regulations and InformationSecurity Standards in line with company and group policies and procedures. Essential Skills and Experience Proven experience in a similar commercial or quantity surveying leadership role. Degree in … ERP systems (ideally Eque2), SharePoint, and Office 365. Accreditations and certifications relevant to the level of the role. Full UK driving licence and willingness to travel, as required. Additional Information Travel requirement - Flexibility required. To Apply To apply for this position, please send your CV and a cover letter . For further information, please contact HR on … data centre solutions, specialising in M&E and connectivity design, bespoke manufacturing, construction, and installation services. Supported by unmatched technical expertise, we offer consultancy, technical and critical cleaning, electronic security, and managed services to address every data centre need. More ❯
of cloud, use of Artificial Intelligence and Robotic Process Automation. Working on client engagements and attend client meetings to identify risks, test controls and provide an opinion on the security of the clients' IT environment. Analysing data and presenting your work with a clear focus on quality. Communicating with confidence, integrity and authenticity to build strong relationships. Assisting in …/finance including IT general controls (ITGC), IT automated controls audit. Knowledge of payments, front-to-back-office controls, change programmes, and Operational resilience. Third Party Risk Management and InformationSecurity auditing experience. Experience working for a professional services consultancy firm, major financial institution or blue-chip industry firm in IT external audit, IT internal audit, or IT … as soon as possible. The exceptional EY experience. Shape your future with confidence! Apply now. Please note: Prior to finalizing your application, you will be asked to provide personal information across several dimensions of diversity and inclusiveness. The information you provide is kept entirely confidential and will not be used to evaluate your candidacy. We collect this data More ❯
transactions across the country and internationally, with a view to transforming the way property is transacted. We have a successful existing product which helps real estate professionals extract key information & create reports from legal documents. We're evolving this product to add further value to our user base. With the recent release of many Large Language Models (LLMs), such … code quality and reuse to create a maintainable and scalable codebase. Play a pivotal role in architecture and code reviews, ensuring our applications meet the highest standards of quality, security, and scalability. Work on infrastructure as code and CI/CD pipelines, ensuring seamless integration and deployment of systems. Ensure compliance with security policies and ISO 27001 by … databases. Familiarity with LangChain, LangSmith, or similar agent orchestration and tracing tools. Experience managing and scaling applications in cloud environments, particularly with Azure. As part of our commitment to informationsecurity, all employees are expected to adhere to company security policies and procedures, participate in mandatory security awareness training, and ensure the secure handling of sensitive More ❯
transactions across the country and internationally, with a view to transforming the way property is transacted. We have a successful existing product which helps real estate professionals extract key information & create reports from legal documents. We're evolving this product to add further value to our user base. With the recent release of many Large Language Models (LLMs), such … code quality and reuse to create a maintainable and scalable codebase. Play a pivotal role in architecture and code reviews, ensuring our applications meet the highest standards of quality, security, and scalability. Work on infrastructure as code and CI/CD pipelines, ensuring seamless integration and deployment of systems. Ensure compliance with security policies and ISO 27001 by … databases. Familiarity with LangChain, LangSmith, or similar agent orchestration and tracing tools. Experience managing and scaling applications in cloud environments, particularly with Azure. As part of our commitment to informationsecurity, all employees are expected to adhere to company security policies and procedures, participate in mandatory security awareness training, and ensure the secure handling of sensitive More ❯
develop Alteryx workflows. Monitor and optimize solution performance and contribute to process improvements. Deploy new solutions or update existing ones in line with Change Management Framework. Ensure compliance with InformationSecurity and Data Governance standards. Promote best practices, provide training, share knowledge, and offer first-line support to users. Translate business requirements into prototypes. Manage the UAT environment … Strong ability to interpret business requirements and produce technical documentation. Excellent analytical, problem-solving, interpersonal, and communication skills. Experience in Financial Services or financial reporting is a plus. Additional information: We provide training and professional qualifications to support your growth. You should be quick to learn new systems and processes and excel in building relationships with colleagues and clients. More ❯
and progressive growth plans, we are seeking an exceptional Senior IT Operations Engineer to join our global business. Reporting directly to the IT Manager and working collaboratively with the Security and Compliance teams, you will be accountable for enabling our international workforce to do their jobs effectively through reliable IT infrastructure and support, ensuring compliance with company and security … and offboarding processes, including device setup and account management. Manage global laptop deployment and hardware provisioning for employees worldwide. Maintain network connectivity and infrastructure across multiple sites Assist with security investigations and incident response activities Resolve IT issues and provide technical support within office environments Collaborate closely with security, compliance, and other technical teams Coordinate with vendors and … Experience with Google Workspace administration and Slack management Experience in fast-growing technology companies Ability to code and use AI tools extensively for automation and efficiency Strong understanding of informationsecurity frameworks, particularly ISO27001 Experience with enterprise device management and deployment at scale Knowledge of networking fundamentals and troubleshooting Familiarity with security tools and incident response procedures More ❯
overview Given our exciting and progressive growth plans, we are looking for an exceptional IT Manager to come and join our global business. Reporting directly into the VP of Security, IT and Compliance, and working collaboratively with the Security and Compliance teams, you will be accountable for developing and executing IT strategy that enables our international workforce to … do their jobs effectively through proactive infrastructure planning, preventive maintenance, and strategic technology initiatives, ensuring compliance with company and security standards at Fresha. This is a great opportunity for someone looking to work in a fast-paced and changing environment, who likes to work autonomously, enjoys a challenge and wants to make an impact. To foster a collaborative environment … business needs and prevent operational disruptions Lead the design and maintenance of our ISO27001 certified environment, driving continuous improvement and compliance excellence Design scalable onboarding and offboarding processes, ensuring security and efficiency at global scale Strategically plan and oversee global technology deployments, optimizing procurement and logistics Architect and maintain resilient network infrastructure with proactive monitoring and redundancy planning Lead More ❯
methods and practices around assurance and risk, shaping activities, processes and systems. In this role you will work across team and department boundaries, engaging with IT, Internal Audit and InformationSecurity to ensure that controls are built and implemented, monitored and tested, and that these are auditable and documented within the process models. This role will be for … defence duties within an interactive and challenging role responsible for IT Assurance Assist with responses to client due diligence requests and other client questionnaires regarding IT Operations and IT Security Contribute to the design, implementation and monitoring of policy and quality standards, procedures and systems ensuring effective working and continuous improvement Act as a first point of contact for … and monitoring practices, and a good understanding of risk and compliance issues An aptitude for working in a regulated environment and building compliance by design A confidence in presenting information and acting as a source of knowledge and guidance You'll be able to be yourself; we'll recognise and value you for who you are and celebrate and More ❯
methods and practices around assurance and risk, shaping activities, processes and systems. In this role you will work across team and department boundaries, engaging with IT, Internal Audit and InformationSecurity to ensure that controls are built and implemented, monitored and tested, and that these are auditable and documented within the process models. This role will be for … defence duties within an interactive and challenging role responsible for IT Assurance Assist with responses to client due diligence requests and other client questionnaires regarding IT Operations and IT Security Contribute to the design, implementation and monitoring of policy and quality standards, procedures and systems ensuring effective working and continuous improvement Act as a first point of contact for … and monitoring practices, and a good understanding of risk and compliance issues An aptitude for working in a regulated environment and building compliance by design A confidence in presenting information and acting as a source of knowledge and guidance You'll be able to be yourself; we'll recognise and value you for who you are and celebrate and More ❯