Delivery & Operations function. Our Service Delivery & Operations function operates in accordance with ITIL best practice and Group Global standards for Service Desk operation, Request Management, Change Management, Incident Management, Configuration Management, Problem management, Disaster Recovery, Site Management and Reporting. What will you be doing … the relationships between CIs and the services they support. Continuous improvement will also be required to document the existing process and identify improvements. Asset Management – Maintaining an accurate inventory of all IT Assets. Establish process documentation with defines the audit process to verify data accuracy. Working with disparate teams … to ensure compliance with existing IT Controls & Policies. Configuration Management –Defining the process for regularly auditing and maintaining the CMDB in its entirety. Support IT Service Management by providing accurate configuration data, which will supplement improvement actions. Lifecycle Management – Monitoring the lifecycle of IT Assets from acquisition More ❯
Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk - ideally from within the banking or … Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational … when required) and have a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust More ❯
first EU based Security Analyst to the team. Collaborating closely with the Security team in the US, you'll be responsible for incident response, vulnerabilitymanagement, risk analysis and detection, with a particular focus on Europe and APAC. This is a brand new hire for a mid-level … to incidents, breaches and suspicious activity Investigate incidents, discover root cause and implement measures to prevent them happening again Analyse, propose and implement risk, vulnerability and threat solutions Install Security measures and use Security software to protect the business' infrastructure, firewalls, systems and data encryption programmes Analyse and manage … Security Analyst? Rapid7 IDR (open to other SIEM tools) CrowdStrike Microsoft Defender Understanding of networking (Cisco Umbrella & Fortinet, IDS/IPS, etc) Experience with VulnerabilityManagement tools Experience with Password Management tools Experience with Security Awareness software tools Experience with Email Security tools Bachelor's in Computer More ❯
first EU based Security Analyst to the team. Collaborating closely with the Security team in the US, you'll be responsible for incident response, vulnerabilitymanagement, risk analysis and detection, with a particular focus on Europe and APAC. This is a brand new hire for a mid-level … to incidents, breaches and suspicious activity Investigate incidents, discover root cause and implement measures to prevent them happening again Analyse, propose and implement risk, vulnerability and threat solutions Install Security measures and use Security software to protect the business' infrastructure, firewalls, systems and data encryption programmes Analyse and manage … Security Analyst? Rapid7 IDR (open to other SIEM tools) CrowdStrike Microsoft Defender Understanding of networking (Cisco Umbrella & Fortinet, IDS/IPS, etc) Experience with VulnerabilityManagement tools Experience with Password Management tools Experience with Security Awareness software tools Experience with Email Security tools Bachelor's in Computer More ❯
london (city of london), south east england, United Kingdom
Crone Corkill
first EU based Security Analyst to the team. Collaborating closely with the Security team in the US, you'll be responsible for incident response, vulnerabilitymanagement, risk analysis and detection, with a particular focus on Europe and APAC. This is a brand new hire for a mid-level … to incidents, breaches and suspicious activity Investigate incidents, discover root cause and implement measures to prevent them happening again Analyse, propose and implement risk, vulnerability and threat solutions Install Security measures and use Security software to protect the business' infrastructure, firewalls, systems and data encryption programmes Analyse and manage … Security Analyst? Rapid7 IDR (open to other SIEM tools) CrowdStrike Microsoft Defender Understanding of networking (Cisco Umbrella & Fortinet, IDS/IPS, etc) Experience with VulnerabilityManagement tools Experience with Password Management tools Experience with Security Awareness software tools Experience with Email Security tools Bachelor's in Computer More ❯
as M.Inst.ISP, CISSP, CISM, CISA, or an MSc in cyber security or related disciplines. Practical experience across areas like cyber architecture, cyber GRC, threat management, vulnerabilitymanagement, and security reviews. Detail-oriented with strong problem-solving skills. Excellent oral and written communication skills, including concise status updates More ❯
colleagues across the organisation on a day-to-day basis. Working within Security Testing, you will play a leading role in delivering security testing, vulnerability assessment and continual security compliance capabilities in order to secure Home Office services and to ensure the best possible technical security risk-based advice … testing team to scope, conduct, or support security assessments, pen testing and other non-functional security testing, appropriately recording and sharing any findings. * Provide Vulnerabilitymanagement and continual security compliance expertise across on premise and cloud-based solutions. * Work collaboratively with project managers and programme leads to provide … defined baselines. * Communicate threat, vulnerabilities, and risk information to stakeholders in a clear and concise manner. * Research and assess new threats and security/vulnerability alerts, and recommend remedial actions. Essential Criteria * Proven understanding and experience of how technical security is applied in real life environments, technical security controls More ❯
City of London, Greater London, UK Hybrid / WFH Options
Sarafin Partners
their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in … accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities … Collating security incident and event data to produce monthly exception and management reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and, where appropriate, resolving or escalating reported security incidents Monitoring More ❯
City Of London, England, United Kingdom Hybrid / WFH Options
Sarafin Partners
their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in … accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities … Collating security incident and event data to produce monthly exception and management reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and, where appropriate, resolving or escalating reported security incidents Monitoring More ❯
london (city of london), south east england, United Kingdom Hybrid / WFH Options
Sarafin Partners
their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in … accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities … Collating security incident and event data to produce monthly exception and management reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and, where appropriate, resolving or escalating reported security incidents Monitoring More ❯
City of London, Greater London, UK Hybrid / WFH Options
Net Talent
in-depth technical support for the identification, investigation, and resolution of security vulnerabilities and threats Work with internal support teams to advise and guide vulnerability remediation , improving organisational resilience Collaborate with the Group and the Information Security Leader to support key security processes and contribute to agreed security objectives … timely response, mitigation, and lessons learned 🧠 Skills & Experience Required Strong background in technical information security, with a focus on security controls, system hardening, and vulnerabilitymanagement Demonstrated experience managing and operating enterprise-grade security tools and platforms (e.g., SIEM, DLP, endpoint protection, identity & access management) Familiarity with More ❯
City of London, London, United Kingdom Hybrid / WFH Options
JobHeron
Design and manage security in the cloud, including AWS Control Tower, Azure, and MS O365. Conduct or coordinate regular security assessments, penetration tests, and vulnerability scans to identify and address potential vulnerabilities and weaknesses. Assist in investigating security breaches, incidents, and unauthorized access attempts, and develop and implement incident … and guide junior security engineers, sharing knowledge and best practices. Skills & Experience: 5+ years' experience in Security Engineering. Strong skills in PAM/IAM, vulnerabilitymanagement, and cloud security. Knowledge of system hardening and network security protocols. Leadership and mentoring experience. Nice to have: CISSP, CEH, or CISM More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
SCADA networks from evolving cyber threats. Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threat analysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerabilitymanagement initiatives and penetration … influence and collaborate across functions. Comfortable working autonomously and leading small projects. Desirable: Background in cyber investigations or law enforcement protocols. Familiarity with project management principles. Ability to deliver awareness campaigns and contribute to continuous improvement. This is a unique opportunity to make a tangible impact on the UK More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Ignite Digital Search Ltd
Conduct secure code reviews and threat modelling Improve security in AWS (Security Hub, Shield, IAM) Integrate AppSec practices into CI/CD pipelines Run vulnerabilitymanagement and bug bounty programs Build security dashboards, frameworks, and reusable libraries Promote secure coding and AppSec best practices across teams What You … Bring Deep knowledge of AWS security tools & IAM Experience with Okta , service mesh, observability tooling Hands-on with SAST/DAST , secure development and vulnerability testing Familiar with ISO 27001, NIST, CIS Benchmarks, OWASP Top 10 Comfortable with Python, JavaScript or similar scripting Strong communicator technical and non-technical More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sellick Partnership
You will be managing a team ensuring all security protocols and procedures are followed meticulously. You will provide strategic recommendation reports to senior management. VulnerabilityManagement: Manage and update a list of vulnerabilities across the estate, with a critical focus to safeguard data integrity and mitigate risks. Experience More ❯
london (city of london), south east england, United Kingdom
Barclay Simpson
This growing investment management firm is seeking to hire an IT Security Engineer to report directly to the Head of InfoSec. Working as part of a small team, this role will see you implementing and managing security tooling for the firm. This includes vulnerabilitymanagement tooling (Tenable More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Southern Housing
processes & processes exist for all operational security workstreams, prioritising incident response procedures including runbooks exist for specific threat types e.g. Ransomware, Malware etc Oversee vulnerabilitymanagement Manage IT security incidents, investigations, and reports Work on Projects to implement improved security and work to ensure that change implemented in More ❯
focus on Cloud, Infrastructure & Security, Security & Compliance as well as providing BAU Support to 200 users across the business. Key Responsibilities Include: Network Architecture & Management (Cisco Meraki) Lead network design and management across schools using Cisco Meraki. Optimize Meraki wireless, switching, and security appliances. Manage VLANs, segmentation, and … and maintain business continuity and disaster recovery strategies. Security Strategy & Compliance Regularly audit system configurations and permissions. Lead endpoint protection, external threat prevention, and vulnerability management. Ensure compliance with safeguarding, data protection, and regulatory requirements. BAU Support Provide IT support at the London head office. Oversee device setup, deployment … knowledge of security standards and compliance practices. Experience coordinating audits and penetration testing. Scripting/automation skills (e.g., PowerShell). Strong troubleshooting and project management capabilities. Excellent communication and stakeholder management skills. Experience working in multi-site or educational environments. What's on Offer This role is offering More ❯