Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk - ideally from within the banking or … Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational … when required) and have a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust More ❯
first EU based Security Analyst to the team. Collaborating closely with the Security team in the US, you'll be responsible for incident response, vulnerabilitymanagement, risk analysis and detection, with a particular focus on Europe and APAC. This is a brand new hire for a mid-level … to incidents, breaches and suspicious activity Investigate incidents, discover root cause and implement measures to prevent them happening again Analyse, propose and implement risk, vulnerability and threat solutions Install Security measures and use Security software to protect the business' infrastructure, firewalls, systems and data encryption programmes Analyse and manage … Security Analyst? Rapid7 IDR (open to other SIEM tools) CrowdStrike Microsoft Defender Understanding of networking (Cisco Umbrella & Fortinet, IDS/IPS, etc) Experience with VulnerabilityManagement tools Experience with Password Management tools Experience with Security Awareness software tools Experience with Email Security tools Bachelor's in Computer More ❯
first EU based Security Analyst to the team. Collaborating closely with the Security team in the US, you'll be responsible for incident response, vulnerabilitymanagement, risk analysis and detection, with a particular focus on Europe and APAC. This is a brand new hire for a mid-level … to incidents, breaches and suspicious activity Investigate incidents, discover root cause and implement measures to prevent them happening again Analyse, propose and implement risk, vulnerability and threat solutions Install Security measures and use Security software to protect the business' infrastructure, firewalls, systems and data encryption programmes Analyse and manage … Security Analyst? Rapid7 IDR (open to other SIEM tools) CrowdStrike Microsoft Defender Understanding of networking (Cisco Umbrella & Fortinet, IDS/IPS, etc) Experience with VulnerabilityManagement tools Experience with Password Management tools Experience with Security Awareness software tools Experience with Email Security tools Bachelor's in Computer More ❯
london (city of london), south east england, United Kingdom
Crone Corkill
first EU based Security Analyst to the team. Collaborating closely with the Security team in the US, you'll be responsible for incident response, vulnerabilitymanagement, risk analysis and detection, with a particular focus on Europe and APAC. This is a brand new hire for a mid-level … to incidents, breaches and suspicious activity Investigate incidents, discover root cause and implement measures to prevent them happening again Analyse, propose and implement risk, vulnerability and threat solutions Install Security measures and use Security software to protect the business' infrastructure, firewalls, systems and data encryption programmes Analyse and manage … Security Analyst? Rapid7 IDR (open to other SIEM tools) CrowdStrike Microsoft Defender Understanding of networking (Cisco Umbrella & Fortinet, IDS/IPS, etc) Experience with VulnerabilityManagement tools Experience with Password Management tools Experience with Security Awareness software tools Experience with Email Security tools Bachelor's in Computer More ❯
as M.Inst.ISP, CISSP, CISM, CISA, or an MSc in cyber security or related disciplines. Practical experience across areas like cyber architecture, cyber GRC, threat management, vulnerabilitymanagement, and security reviews. Detail-oriented with strong problem-solving skills. Excellent oral and written communication skills, including concise status updates More ❯
colleagues across the organisation on a day-to-day basis. Working within Security Testing, you will play a leading role in delivering security testing, vulnerability assessment and continual security compliance capabilities in order to secure Home Office services and to ensure the best possible technical security risk-based advice … testing team to scope, conduct, or support security assessments, pen testing and other non-functional security testing, appropriately recording and sharing any findings. * Provide Vulnerabilitymanagement and continual security compliance expertise across on premise and cloud-based solutions. * Work collaboratively with project managers and programme leads to provide … defined baselines. * Communicate threat, vulnerabilities, and risk information to stakeholders in a clear and concise manner. * Research and assess new threats and security/vulnerability alerts, and recommend remedial actions. Essential Criteria * Proven understanding and experience of how technical security is applied in real life environments, technical security controls More ❯
City of London, Greater London, UK Hybrid / WFH Options
Sarafin Partners
their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in … accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities … Collating security incident and event data to produce monthly exception and management reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and, where appropriate, resolving or escalating reported security incidents Monitoring More ❯
City Of London, England, United Kingdom Hybrid / WFH Options
Sarafin Partners
their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in … accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities … Collating security incident and event data to produce monthly exception and management reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and, where appropriate, resolving or escalating reported security incidents Monitoring More ❯
london (city of london), south east england, United Kingdom Hybrid / WFH Options
Sarafin Partners
their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in … accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities … Collating security incident and event data to produce monthly exception and management reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and, where appropriate, resolving or escalating reported security incidents Monitoring More ❯
technologies to strengthen the organisation's defenses. Essential functions of the job: SOC operations: perform incident triaging, threat detection, and response activities. SIEM & EDR management: advance and configure SIEM and EDR systems to optimise threat detection and response in Azure environments. Incident response: investigate and mitigate security incidents, applying … delivering innovative security solutions. Experience required: Relevant certifications in public cloud security and experience managing Azure cloud infrastructure. Proven expertise in security testing, IAM, vulnerabilitymanagement, and SIEM configuration. Strong grasp of networking fundamentals, including DNS, WAF, and ingress, paired with experience in CPSM. Familiarity with GIT/ More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Police Digital Services
cyber incident response for services in life Ensure alignment of security operations with the strategic cyber aims of national services linked to policing Implement vulnerabilitymanagement arrangements Develop and implement strategies for the timely remediation of identified vulnerabilities Lead the security working group for specified national capabilities Apply More ❯
City of London, London, United Kingdom Hybrid / WFH Options
JobHeron
Design and manage security in the cloud, including AWS Control Tower, Azure, and MS O365. Conduct or coordinate regular security assessments, penetration tests, and vulnerability scans to identify and address potential vulnerabilities and weaknesses. Assist in investigating security breaches, incidents, and unauthorized access attempts, and develop and implement incident … and guide junior security engineers, sharing knowledge and best practices. Skills & Experience: 5+ years' experience in Security Engineering. Strong skills in PAM/IAM, vulnerabilitymanagement, and cloud security. Knowledge of system hardening and network security protocols. Leadership and mentoring experience. Nice to have: CISSP, CEH, or CISM More ❯
diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency in … Experience with CI/CD tools and practices, ensuring secure and automated deployment processes. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Responsibilities Security Strategy: Define and execute cloud security strategy, partnering with platform and Site Reliability Engineering (SRE More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Ignite Digital Search Ltd
Conduct secure code reviews and threat modelling Improve security in AWS (Security Hub, Shield, IAM) Integrate AppSec practices into CI/CD pipelines Run vulnerabilitymanagement and bug bounty programs Build security dashboards, frameworks, and reusable libraries Promote secure coding and AppSec best practices across teams What You … Bring Deep knowledge of AWS security tools & IAM Experience with Okta , service mesh, observability tooling Hands-on with SAST/DAST , secure development and vulnerability testing Familiar with ISO 27001, NIST, CIS Benchmarks, OWASP Top 10 Comfortable with Python, JavaScript or similar scripting Strong communicator technical and non-technical More ❯
london (city of london), south east england, United Kingdom
Barclay Simpson
This growing investment management firm is seeking to hire an IT Security Engineer to report directly to the Head of InfoSec. Working as part of a small team, this role will see you implementing and managing security tooling for the firm. This includes vulnerabilitymanagement tooling (Tenable More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sellick Partnership
You will be managing a team ensuring all security protocols and procedures are followed meticulously. You will provide strategic recommendation reports to senior management. VulnerabilityManagement: Manage and update a list of vulnerabilities across the estate, with a critical focus to safeguard data integrity and mitigate risks. Experience More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Southern Housing
processes & processes exist for all operational security workstreams, prioritising incident response procedures including runbooks exist for specific threat types e.g. Ransomware, Malware etc Oversee vulnerabilitymanagement Manage IT security incidents, investigations, and reports Work on Projects to implement improved security and work to ensure that change implemented in More ❯
focus on Cloud, Infrastructure & Security, Security & Compliance as well as providing BAU Support to 200 users across the business. Key Responsibilities Include: Network Architecture & Management (Cisco Meraki) Lead network design and management across schools using Cisco Meraki. Optimize Meraki wireless, switching, and security appliances. Manage VLANs, segmentation, and … and maintain business continuity and disaster recovery strategies. Security Strategy & Compliance Regularly audit system configurations and permissions. Lead endpoint protection, external threat prevention, and vulnerability management. Ensure compliance with safeguarding, data protection, and regulatory requirements. BAU Support Provide IT support at the London head office. Oversee device setup, deployment … knowledge of security standards and compliance practices. Experience coordinating audits and penetration testing. Scripting/automation skills (e.g., PowerShell). Strong troubleshooting and project management capabilities. Excellent communication and stakeholder management skills. Experience working in multi-site or educational environments. What's on Offer This role is offering More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
SOC team to enhance Sentinel SIEM, runbooks, and threat detection. Lead investigations into security incidents and conduct proactive threat hunting. Manage endpoint security, patching, vulnerability scanning, and system hardening. Support audits and compliance with Cyber Essentials Plus , ISO 27001 , and other frameworks. Partner with DevOps, InfoSec, and platform teams … Participate in a 1-in-6 on-call rota after completing probation. Key Requirements: Hands-on knowledge of SIEM platforms (preferably Sentinel), EDR, and vulnerability management. Familiarity with frameworks like Cyber Essentials Plus and ISO 27001. Experience in securing hybrid cloud environments (Microsoft Azure desirable). Experience in DevOps More ❯