will be responsible for technically leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a “people manager” as well as someone who can drive … for 2024 and the whole business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerabilitymanagement, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and Reporting. Responsibilities Own the evolution … Security+, CISM, CEH, Microsoft Security (SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerabilitymanagement tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials, Cyber Essentials Plus, and NIST More ❯
SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements , including due diligence, contract oversight … Audit & Assurance: Participate in internal/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerabilitymanagement , endpoint security (EDR/XDR) , and cloud compliance . Good understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged access management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: 5+ years More ❯
SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements, including due diligence, contract oversight … Audit & Assurance: Participate in internal/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register, prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerabilitymanagement, endpoint security (EDR/XDR), and cloud compliance. Good understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged access management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: Experience: 5+ years More ❯
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. VulnerabilityManagement Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerability assessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend support More ❯
contact for all matters relating to Cybersecurity and requires a broad understanding of security controls and their effective implementation within corporate environments. The role will also require good relationship management skills across the assigned region/sub-region to enable business adoption. As a Director within the Regional Security Office (RSO) service you will be accountable for service delivery … The role with need to have effective relationships with senior leadership to support the delivery of the regional/sub-regional business goals and operate an effective security risk management regime against an agreed security risk mitigation strategy. As the trusted security lead, the role will present to local leaders, regulators and clients as needed. Prior experience of regulatory … management is required. This is a highly visible role within Aon to be able to embed effective security controls at scale within the firm. We are looking for you to bring new ideas and a commitment toward continual learning. You will stay actively engaged with business leaders, IT executives and external clients. The role requires gravitas and an ability More ❯
integration, automation, and a mobile-first strategy across a global footprint. Key Responsibilities Platform Ownership & Strategy Act as the primary owner for the Azure cloud environment, including governance, cost management, architecture, and operations. Develop and maintain a scalable, secure, and resilient cloud platform aligned with the firm’s digital transformation goals. Drive and implement the roadmap for infrastructure upgrades … regardless of time of day is an essential. Lead by example, setting clear expectations and holding individuals and teams accountable for high performance and ethical conduct. Provide direct line management of individuals where appropriate, ensuring clear direction, regular development conversations, and alignment with team and business goals. Operational Management Take full ownership of day-to-day BAU operations … ensuring the cloud platform’s performance, reliability, security, and compliance. This includes patch management across all infrastructure services, as well as ensuring regular reporting is carried out for patch compliance and vulnerability management. Beyond operational stability, the role demands a continuous improvement mindset - proactively evaluating the platform and driving enhancements to optimise efficiency, resilience, and user experience. Manage More ❯
Remediation Engineer – Security & VulnerabilityManagement Middlesex, UK (4 days from office weekly) We are seeking a technically proficient Remediation Engineer – Security & VulnerabilityManagement to support our vulnerabilitymanagement and threat remediation efforts. The successful candidate will play a pivotal role in analysing security vulnerabilities, coordinating with cross-functional teams, and implementing timely, effective remediation … to reduce the organization’s risk exposure—including on-premise environments, AWS, and Azure—through effective vulnerability lifecycle management, stakeholder engagement, and comprehensive tracking and reporting. Technical Skills: Strong knowledge of vulnerabilitymanagement tools (e.g., AWS Inspector, Azure Security Center, Qualys, or similar). Solid understanding of operating systems (Windows, Linux) Hands-on experience with AWS … and Azure cloud security practices. Familiarity with patch management, endpoint protection, and configuration management tools. In-Depth Knowledge Of: Windows Server, Linux distributions (Ubuntu, RHEL/CentOS) Network and endpoint security principles Patch management and vulnerability lifecycle Vulnerability scanning and management tools (e.g., Tenable, Qualys, Rapid7) Scripting and automation (PowerShell, Bash, Python) Ticketing and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Next Ventures
and aligned with key standards. Key Responsibilities: Detect and respond to threats using Microsoft Sentinel, Defender for Cloud, Defender for Endpoint, and Defender for Office 365 Manage and support vulnerability scanning and remediation activities via Tenable VulnerabilityManagement Deliver engaging cyber security awareness training to staff Required Skills and Experience: Strong, hands-on experience in cyber security … operations, particularly using the Microsoft security stack Familiarity with vulnerabilitymanagement tools Experience delivering cyber security training and awareness initiatives Demonstrated support of compliance/certification projects such as PSN, PCI DSS, or Cyber Essentials Plus Excellent communication and stakeholder engagement skills Apply Now More ❯
I am recruiting on behalf of a very prestigious hedge fund in London, looking to hire a Security Engineer with experience across IAM, device security, vulnerabilitymanagement and cloud platforms (Azure/AWS). Although IAM plays a big of the role, wider experience across the above security areas is required. The makeup of my client’s organisation … history of academic excellence, typically from a leading university or institution known for rigorous standards. Responsibilities will include: Architect and deploy IAM solutions (Entra ID, Conditional Access, PAM) Drive vulnerabilitymanagement strategy and tooling Apply Zero Trust and Secure by Default principles Monitor systems, respond to threats, and support incident response Communicate findings to both technical and non More ❯
col-wide Job Description: I am recruiting on behalf of a very prestigious hedge fund in London, looking to hire a Security Engineer with experience across IAM, device security, vulnerabilitymanagement and cloud platforms (Azure/AWS). Although IAM plays a big of the role, wider experience across the above security areas is required. The makeup of … history of academic excellence, typically from a leading university or institution known for rigorous standards. Responsibilities will include: Architect and deploy IAM solutions (Entra ID, Conditional Access, PAM) Drive vulnerabilitymanagement strategy and tooling Apply Zero Trust and Secure by Default principles Monitor systems, respond to threats, and support incident response Communicate findings to both technical and non More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
will be responsible for technically leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a “people manager” as well as someone who can drive … for 2024 and the whole business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerabilitymanagement, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and Reporting. Responsibilities Own the evolution … Security+, CISM, CEH, Microsoft Security (SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerabilitymanagement tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials, Cyber Essentials Plus, and NIST More ❯
training offered. This is an all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerabilitymanagement (tenable is tool used) and patching Security policy, compliance, and user More ❯
training offered. This is an all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerabilitymanagement (tenable is tool used) and patching Security policy, compliance, and user More ❯
write automations in Python, Java, or Typescript Ability to write secure-by-default Terraform for cloud deployments Solid understanding of cloud and application security principles Knowledge of network protocols, vulnerabilitymanagement, and creation of Incident Response programs Willingness to learn and adapt to new security challenges and technologies Relevant certifications such as AWS Certified Security, GIAC GC*, ISC2 More ❯
write automations in Python, Java, or Typescript Ability to write secure-by-default Terraform for cloud deployments Solid understanding of cloud and application security principles Knowledge of network protocols, vulnerabilitymanagement, and creation of Incident Response programs Willingness to learn and adapt to new security challenges and technologies Relevant certifications such as AWS Certified Security, GIAC GC*, ISC2 More ❯
of our growing team, you'll have the opportunity to shape our DevOps culture and practices. You'll collaborate with our engineering team to establish best practices for infrastructure management, security protocols, and deployment strategies. Your expertise in startup environments and medical technology will be crucial in building scalable, compliant solutions that support our rapid growth while maintaining the … maintain security controls and monitoring systems aligned with ISO27001 requirements Build and maintain CI/CD pipelines with integrated security testing and compliance checks Implement automated security scanning and vulnerabilitymanagement processes Develop and maintain disaster recovery and backup solutions for critical systems Configure and manage secure cloud environments in Azure, focusing on Web Apps and Functions Implement … of cloud security best practices and implementing Zero Trust architecture Experience with healthcare compliance requirements (ISO27001, ISO13485, HIPAA) and security controls Proven track record implementing automated security testing and vulnerabilitymanagement Strong knowledge of monitoring and observability tools (Azure Monitor, Application Insights) Experience implementing secure networking and identity management solutions in Azure Strong communication skills with ability More ❯
analysis and hands-on maintenance to solve the issues. Designing, implementing and maintaining SIEM dashboards and detection rules using Splunk. Monitor and investigate security alerts using the CrowdStrike Platform. Management of identity, MDM, or directory services via Jump cloud. Conducting regular vulnerability scans and risk assessments using Qualys. Play a key role within the SecOps team and collaboration … Experience of the Security Engineer: Proven experience as a Security Engineer. Strong experience with Splunk for log analysis and alerting. Proven hands-on experience with CrowdStrike. Deep understanding of vulnerabilitymanagement tools, Qualys preferred. Expertise with handling escalated security related tickets. Experience within the professional regulated services, preferably financial sector is desirable. The successful Security Engineer candidate will More ❯
tailored security solutions to our clients, drawing on your extensive experience in the MSP/MSSP landscape. Key Responsibilities: Overseeing and leading remediation of security assessments, technical testing, and vulnerability analysis (Cyber Essentials, Cyber Essentials Plus, NIST CSF). Delivering and supporting security projects from inception to completion. Providing expert guidance and support to clients throughout the security lifecycle. … Demonstrating strong leadership in both team management and project delivery. Leveraging technical expertise in security technologies (Microsoft XDR stack, vulnerabilitymanagement tools, SIEMs including Sentinel). Contributing to incident response and driving operational improvements. Your Profile: Proven track record as a Cyber Security Consultant or vCISO within an MSP/MSSP environment. Strong client-facing skills, including More ❯
housing of our MSP-managed infrastructure in-house, resetting and rebuilding our Azure environment, embedding cyber security practices, and supporting business-as-usual (BAU) operations. Key Responsibilities: Leadership & People Management Lead and mentor the Helpdesk and Infrastructure teams through their respective leads. Ensure effective resource planning, performance management, and development across the teams. Foster a culture of accountability … collaboration, and continuous improvement. Operational Management Oversee daily IT operations, ensuring high availability, performance, and user satisfaction. Manage escalations and prioritisation of support issues. Monitor and report on key operational metrics (e.g. SLAs, uptime, incident response). Project Delivery Lead the transition of managed services infrastructure and service desk from MSP to in-house. Oversee the reset and rebuild … Embed cyber security practices into operational and project workflows. Collaborate with relevant stakeholders to ensure compliance with policies, standards, and regulations (e.g. ISO27001, Cyber Essentials). Manage risk assessments, vulnerabilitymanagement, and incident response processes. Stakeholder Engagement Act as a senior point of contact for internal stakeholders regarding IT operations and service delivery. Work closely with other business More ❯
City of London, London, United Kingdom Hybrid / WFH Options
JCW
Key Skills & Responsibilities: 5+ years with ForgeRock IAM stack : PingGateway, PingAM, PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetration testing , threat modeling, and vulnerabilitymanagement Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO, engineering, and product teams on More ❯
very hands on. Experience required Familiar with NIST, ISO 27001, ITIL Azure - 5 years experience Info Sec (Azure AD, Defender, Sentinel) PIM/PAM Audits and report writing Assessments VulnerabilityManagement and Pen Testing Zero Trust Architecture Automation (eg powershell, python More ❯
and availability • Leading disaster recovery, backup, and business continuity processes • Collaborating with internal teams and external vendors on system upgrades, maintenance, and incident resolution • Contributing to security posture improvements, vulnerabilitymanagement, and compliance efforts Experience • 5+ years’ experience in infrastructure or systems engineering, preferably within trading, hedge funds, or financial services • Deep expertise with Windows Server, Active Directory … VMware or Hyper-V) • Strong scripting and automation skills, particularly with PowerShell • Hands-on experience with cloud platforms (Azure or AWS) and hybrid IT environments • Solid understanding of endpoint management, system hardening, and patching • Familiarity with security best practices in regulated or high-trust environments • A proactive, self-starting attitude with the ability to work independently in a high More ❯
and availability • Leading disaster recovery, backup, and business continuity processes • Collaborating with internal teams and external vendors on system upgrades, maintenance, and incident resolution • Contributing to security posture improvements, vulnerabilitymanagement, and compliance efforts Experience • 5+ years’ experience in infrastructure or systems engineering, preferably within trading, hedge funds, or financial services • Deep expertise with Windows Server, Active Directory … VMware or Hyper-V) • Strong scripting and automation skills, particularly with PowerShell • Hands-on experience with cloud platforms (Azure or AWS) and hybrid IT environments • Solid understanding of endpoint management, system hardening, and patching • Familiarity with security best practices in regulated or high-trust environments • A proactive, self-starting attitude with the ability to work independently in a high More ❯
VulnerabilityManagement Architect 5 Month Contract Hybrid - travel to Bracknell and London, Pimlico as and when required Our Retail client is seeking a VulnerabilityManagement Architect to join their team on a 5-month contract basis. As a VulnerabilityManagement Architect, you will play a crucial role in modernising the company's vulnerabilitymanagement capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerabilitymanagement architecture Capture our vulnerabilitymanagement requirements and usage scenarios, captured as a set of patterns that a future solution will need to support Build out … evaluate the drivers and benefits for change Provide market assessment as appropriate, partnering with our procurement teams as needed Provide a validated and recommended strategy solution architecture for our vulnerabilitymanagement services (i.e. this is all about explaining how the elements of the solution will work together, vendor agnostic) Compile vendor solution options to address the above (with More ❯
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerability assessment, penetration testing, and vulnerabilitymanagement processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯