Bootcamp, tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethical hacking, incident response, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and … interactive sessions, guiding learners through complex security concepts, and helping them build practical, defensive, and offensive security skills. The ideal candidate will be confident teaching a range of cybersecurity topics, adaptable to different learner needs, and passionate about supporting underrepresented individuals in building successful careers in cybersecurity. The majority of course content will be provided, but you may … offering feedback for continuous improvement Areas of Knowledge We are looking for people who have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM More ❯
Bootcamp, tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethical hacking, incident response, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and … interactive sessions, guiding learners through complex security concepts, and helping them build practical, defensive, and offensive security skills. The ideal candidate will be confident teaching a range of cybersecurity topics, adaptable to different learner needs, and passionate about supporting underrepresented individuals in building successful careers in cybersecurity. The majority of course content will be provided, but you may … offering feedback for continuous improvement Areas of Knowledge We are looking for people who have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM More ❯
Bootcamp, tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethical hacking, incident response, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and … interactive sessions, guiding learners through complex security concepts, and helping them build practical, defensive, and offensive security skills. The ideal candidate will be confident teaching a range of cybersecurity topics, adaptable to different learner needs, and passionate about supporting underrepresented individuals in building successful careers in cybersecurity. The majority of course content will be provided, but you may … offering feedback for continuous improvement Areas of Knowledge We are looking for people who have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM More ❯
measures, and Ensuring that these mitigation measures are properly implemented, and validating them for any project involving critical assets Monitor the performance of cybersecurity suppliers and services, ensure Cyber Security Insurance is appropriate to meet UK requirements Participate in the management of major Cyber incidents and crisis concerning technology assets, monitor and implement associated action plans Raise awareness of … Cyber risks, particularly among Division/UK top management and Technology contacts (development security, applicationsecurity Deploy a Cyber Essentials Plus program to address all in scope services across the UK, Participate in the European NIS2 program as appropriate Create training material and other resources to influence user behaviour for adoption of security policy and process … What are the requirements? Extensive experience in leading IT Security activities in complex, multi-site environments that have operational technology elements. CISSP (Certified Information Systems Security Professional) Microsoft certifications and/or network qualifications ITIL Foundation Must have a sound knowledge of risk management, compliance frameworks, integrating security into projects, developing and monitoring indicators and executing action More ❯
support our growing team and meet client needs for dependable and up-to-date technical expertise in the dynamic software industry, we are hiring. We are seeking a Cyber Security Specialist with experience in Azure and M365 security and administration. Full training will be provided to fill any skill gaps. Ideal candidates will have experience with Azure administration … and security, M365 administration and security, Intune, and AWS. Our client maintains a flat organizational structure, fostering a culture that values great ideas from anyone and promotes a healthy work-life balance. Responsibilities: Building and managing Azure Security and M365 Security environments to improve efficiency. Setting up new development tools and infrastructure in Azure, including Virtual … Machine backup and recovery using Azure PowerShell and Portal. Applying security patches on Azure IaaS VMs and managing update policies. Designing compliance policies and generating reports for AD-joined and registered devices. Working with automation deployment via Azure ARM templates, managing Azure Storage accounts, blob storage, and other storage solutions. Ensuring platforms are secure, efficient, and highly available, including More ❯
a month to the office. Key Skills and Responsibilities: Design, deliver, and support secure and scalable AWS infrastructure using services like EC2, S3, ECS, and FARGATE Integrate SAST (Static ApplicationSecurity Testing) and DAST (Dynamic ApplicationSecurity Testing) tools into CI/CD pipelines to enforce secure development practices Automate infrastructure provisioning using CloudFormation, Terraform, or More ❯
a month to the office. Key Skills and Responsibilities: Design, deliver, and support secure and scalable AWS infrastructure using services like EC2, S3, ECS, and FARGATE Integrate SAST (Static ApplicationSecurity Testing) and DAST (Dynamic ApplicationSecurity Testing) tools into CI/CD pipelines to enforce secure development practices Automate infrastructure provisioning using CloudFormation, Terraform, or More ❯
Oxford, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Robert Half
Working with a scaling business in Oxford to recruit a permanent Software Security Engineer to join the Information Security team. This is a newly created role working across software engineering, modelling and data science teams. This is a role to enable the business to improve their SDLC processes through creating robust and resilient security operations. This is … a permanent role with hybrid working, looking for someone to be in the office 3 days a week in Central Oxford. The Role Build secure products - ensure security is considered throughout the product and software development lifecycle Provide security best practice, build security design patterns, complete security architecture reviews Support on-going BAU software development processes … and champion vulnerability management Provide internal security consultancy and lead on audit engagements, risk activities Skills & Experience Understanding of securing micro-service architectures Working knowledge of modern secure SDLC practices - embedding security into CI/CD piplines Understanding of applicationsecurity principles (OWASP top 10, OWASP ASVS) AWS, GCP or Azure knowledge Previous experience in software More ❯
banbury, south east england, united kingdom Hybrid / WFH Options
Robert Half
Working with a scaling business in Oxford to recruit a permanent Software Security Engineer to join the Information Security team. This is a newly created role working across software engineering, modelling and data science teams. This is a role to enable the business to improve their SDLC processes through creating robust and resilient security operations. This is … a permanent role with hybrid working, looking for someone to be in the office 3 days a week in Central Oxford. The Role Build secure products - ensure security is considered throughout the product and software development lifecycle Provide security best practice, build security design patterns, complete security architecture reviews Support on-going BAU software development processes … and champion vulnerability management Provide internal security consultancy and lead on audit engagements, risk activities Skills & Experience Understanding of securing micro-service architectures Working knowledge of modern secure SDLC practices - embedding security into CI/CD piplines Understanding of applicationsecurity principles (OWASP top 10, OWASP ASVS) AWS, GCP or Azure knowledge Previous experience in software More ❯
colleagues. We've achieved big things already, but we're just getting started. This is where you come in... Job Description An opportunity has arisen for a Senior Cyber Security Analyst , to become part of the Radius Cyber Security Team. This is an excellent opportunity for a seasoned professional to contribute to a high-performing Cyber Team in … of Cyber and will be located at our Emperor Court office in Crewe . This role is crucial to strengthening the organisation’s cyber resilience. As a Senior Cyber Security Analyst, you will play a key role in protecting systems, networks, and data against cyber threats. You will lead threat detection and incident response efforts, support the development of … security policies and controls, and work closely with stakeholders to ensure compliance and security best practice across the business. You will also assist with maintaining and improving the company’s accredited Information Security Management System (ISMS), with a particular focus on ISO 27001 and Cyber Essentials Plus requirements. In addition, you will help mentor team members, providing More ❯
about healthcare, and we plan to be the largest digital primary healthcare platform for people across Europe. About the role We are seeking a motivated and detail-oriented Information Security Engineer to join our team here at ZAVA. In this role, the successful candidate will support the organisation's cybersecurity efforts by assisting with the implementation, monitoring, and maintenance … of security systems and processes. They will work closely with senior security team members to identify vulnerabilities, respond to incidents, and ensure compliance with security policies and frameworks. The role involves hands-on tasks such as configuring security tools, analysing alerts, and supporting investigations into potential threats, as well as contributing to the development ofa secure … IT environment. Additionally, the successful candidate will participate in security awareness initiatives, help document processes, and stay updated on emerging threats and technologies to enhance the organisation's security posture. Key Accountabilities You will be working from home, but you do have the opportunity to come to the office, if you wish. You will use our collaboration tools More ❯
Soho Place office opened in 2023 - in the heart of Central London and home to our Research Lab. The role Were looking for a seasoned and strategic Head of Security Engineering to shape the next phase of security at G-Research. This is a key leadership role, responsible for protecting sensitive data and maintaining a robust, forward-looking … security posture across our technology landscape. Based within the Technology department, the successful candidate will collaborate closely with the CTO, executive leadership and partner teams to ensure security engineering is tightly integrated with our broader objectives. Key responsibilities of the role include: Leadership and strategy Leading the Security Engineering function, including hiring, mentoring and performance management Defining … and delivering the security engineering roadmap aligned to technology strategy and enterprise risk appetite Developing talent in line with G-Research values, modelling leadership behaviours, coaching teams to their strengths and fostering a supportive environment Security architecture and engineering Driving secure design and implementation across on-premises and cloud environments Overseeing advanced security capabilities such as endpoint More ❯
demonstrates his unwavering dedication to knowledge sharing, community building, and technical innovation within the software development ecosystem. His contributions span multiple channels, from creating widely-adopted open-source security tools to producing educational content that reaches developers across the globe. Jamie's community impact is exemplified through The Modern .NET Show podcast , which serves as the premier resource for … stages. Technical excellence through open-source contribution forms another cornerstone of Jamie's recognition. His OwaspHeaders.Core library has achieved remarkable success with over 1.2 million downloads, providing essential web applicationsecurity features to developers across the .NET ecosystem. The library implements OWASP Secure Headers Project recommendations, enabling developers to enhance their applicationsecurity with minimal effort … 30+ career areas, providing them with valuable industry insights and practical guidance for their professional development. Jamie's involvement bridges the gap between academic learning and real-world professional application, helping to shape the next generation of software engineers. "The Microsoft MVP recognition continues to be both an honour and a responsibility," Jamie commented following the announcement. "It represents More ❯
65k - £78K + bonus, benefits) We are working with a globally renowned and industry leading UK brand who are going through an exciting phase of growth across their wider Security function, resulting in the need for a DevSecOps Engineer. As a DevSecOps Engineer, you will work within a newly established team in a role that sees you provide hands … on ApplicationSecurity and DevSecOps responsibilities, as well as being involved in various strategic activities. Your duties would include setting-up, securing and enhancing pipelines, scripting and automation, as well as looking at how things are done, what improvements can be made, supporting cyber change initiatives and driving security awareness/practices as necessary. This role will … continue to evolve with the wider Security function and business, with the opportunity for progression and development unavailable at most companies of a similar size, who also offer some of the best perks & benefits available! Key skills and experience required: DevSecOps experience ApplicationSecurity expertise across SAST, DAST & SCA Background and experience in Software Development/Scripting More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
As a Control Testing Lead , you will play a key role within the Information Security team, supporting the Control Test and Assurance Manager in the delivery of the Control Test and Assurance Programme. This role requires solid experience in control testing within Information Security, with a focus on evaluating control effectiveness and ensuring compliance with internal policies and … Manager, with whom you will work to deliver the goals of the company to have a stable and fit-for-purpose control testing environment that supports the organisation's security and compliance objectives. What you'll be doing as a Control Testing Lead Support the implementation of the Control Testing Framework. Execute control testing in line with defined procedures … role To thrive in this role, the essential criteria you'll need are: Proven experience in performing control assessments, including evaluating design and operational effectiveness. Strong understanding of information security principles, risk management, and control frameworks. Experience in IT, OT and Cloud environments. Clear and professional verbal and written communication, including the ability to explain technical issues to non More ❯
Peterborough, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
Noir
Software Development Manager - Enterprise Software - Peterborough/Hybrid (Key skills: Software Development Manager, Agile, Software Engineering Leadership, Product Delivery, ApplicationSecurity, Identity & Access Management, .NET 4.8 & 8, SQL Server, Microservices, Cloud (AWS/Azure), DevOps, CI/CD, Jenkins, Ansible, Stakeholder Engagement, Resilience Engineering, Full Stack Development) Are you an experienced and inspiring software leader who thrives on … hands-on leadership, technical strategy, and cross-functional collaboration. You will manage agile teams working on a mix of internal and client-facing applications, with a strong focus on applicationsecurity, identity and access management, and platform resiliency. Working closely with architecture, design, infrastructure, and product teams, you will ensure the successful delivery of new and enhanced software More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
ability to keep our clients data secure is a bedrock for our reputation as a trustworthy professional services partner to many of the worlds large and prestigious organisations. Information security is not an afterthought; it is core to all that we do, to protect not only our data but that of our clients, and has the unwavering support of … the Board. Led by our new CISO, the in-house Information Security team is a core part of our technology services structure with mature or evolving capability across all areas of digital security and cyber defence. We align our efforts to the NIST framework and other recognised certifications including ISO27001 and SOC2 and strive to keep pace with … you will do The Identity and Access Senior Architect will be part of the Digital Trust team, and will be responsible for maintaining the identity and access management (IAM) security of the firms assets. This role is critical in translating the organisations IAM vision into a workable, mature and optimized function and service. This role requires extensive experience across More ❯
Technologies: Docker SQL NoSQL AWS Lambda DynamoDB applicationsecurity HTML5 ES2018 React Redux Webpack NodeJS REST APIs Git Software Architecture Scalable Apps Optimisation The Benefits: Situated in the heart of London's Tech City with easy access to the mainline and tubes, the area is now a trendy area to live and work, with creative businesses and smart … campaigns Team mentoring and best practice guidance and code reviews Experience with running or contributing to hackathons Skillset - Expert Knowledge/Experience Docker SQL/NoSQL AWS Lambda DynamoDB ApplicationSecurity Skillset: Degree in Computer Science or related area Excellent communication skills in English, both written and verbal HTML5 ES2018 Webpack Node.js REST APIs Git/workflow models More ❯
leadership role will focus heavily on software engineering excellence across full-stack development, system design, architecture, and software delivery processes - while also overseeing our data engineering, cloud infrastructure, and security functions. You will be responsible for setting the technical direction, improving engineering velocity and quality, establishing modern practices across the SDLC, and growing a high-performing team capable of … enterprise-grade applications and services, with deep experience in both Legacy and modern technology stacks. Key Responsibilities Software Engineering Leadership Set and own the technical roadmap, ensuring architectural scalability, security, performance, and maintainability of all software systems. Oversee full life cycle software development - from requirements, technical design, development, testing, deployment, to post-release monitoring and maintenance. Establish, enforce, and … enable secure, efficient data movement between systems, including Real Time and batch processing pipelines. Support analytics and reporting needs through the engineering of clean, reliable data sources and APIs. Security Engineering & Governance Partner with security engineers to integrate security throughout the software life cycle (shift-left security, secure coding, threat modelling). Own the implementation of More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Addition
in the insurance sector. This is a pivotal role with real impact where your expertise will help protect critical systems, data, and services across multiple markets. Role Overview: Role: Security Architect. Location: Remote based with 1-2 days per month in Central London Package: £100,000- £130,000 per annum & Benefits Industry: Insurance What You’ll Be Doing: Designing … secure-by-default solutions across systems, apps and networks. Embedding robust security into enterprise and solution architecture from day one. Advising on risks, vulnerabilities and mitigation strategies across the tech estate. Shaping and maintaining internal security standards and governance frameworks. Ensuring compliance with ISO 27001, GDPR, SOC 2, PCI-DSS and similar regulations. Collaborating with IT, business stakeholders … to drive secure delivery. Supporting incident response and proactively planning for emerging threats. Translating complex risks into clear advice for technical and non-technical teams. Driving continuous improvement in security processes and tooling. Main Skills Needed: Minimum of 5 years of experience as a Security Architect. Strong background in security architecture and designing enterprise-level solutions. Deep More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
Role: Android Security EngineerSalary/Rate: £500-600 per day Location: hybrid London, mainly remoteContract Duration: until December 2025 A unique opportunity has arisen for a skilled professional with a strong background in mobile applicationsecurity to join a specialist team tackling complex technical challenges. The successful candidate will be responsible for conducting in-depth analysis of … Android applications, providing clear and actionable insights into potential security and privacy risks. You would be operating at the top tier, handling the most complex and technically demanding cases that require advanced expertise and critical thinking. The role is based mainly remotely, however candidates must be willing to work in central London as required. This will run until the … extend. Local candidates will be preferred. Skills/experience required: Demonstrable experience in analysing and deconstructing Android applications ( Java essential; native code experience advantageous) Strong understanding of Android OS security features and architecture Proficiency in vulnerability identification and penetration testing techniques Ability to work independently, with excellent attention to detail and analytical skills Comfortable navigating large, unfamiliar codebases Excellent More ❯
Role: Android Security Engineer Salary/Rate: £500-600 per day Location: hybrid London, mainly remote Contract Duration: until December 2025 A unique opportunity has arisen for a skilled professional with a strong background in mobile applicationsecurity to join a specialist team tackling complex technical challenges. The successful candidate will be responsible for conducting in-depth … analysis of Android applications, providing clear and actionable insights into potential security and privacy risks. You would be operating at the top tier, handling the most complex and technically demanding cases that require advanced expertise and critical thinking. The role is based mainly remotely, however candidates must be willing to work in central London as required. This will run … extend. Local candidates will be preferred. Skills/experience required: Demonstrable experience in analysing and deconstructing Android applications ( Java essential; native code experience advantageous) Strong understanding of Android OS security features and architecture Proficiency in vulnerability identification and penetration testing techniques Ability to work independently, with excellent attention to detail and analytical skills Comfortable navigating large, unfamiliar codebases Excellent More ❯
have the autonomy to shape the direction of the function, with the support of the Executive Director. Those with a background and deep expertise in any of the following: Security risk management, Security policies and governance, or Security controls testing will be the best fit for this position. To be considered for this role, you must have … lived experience or personal characteristics. We also invite applicants who meet most of the listed requirements, even if not all, to apply. If you require any adjustments to the application process, please let us know. Barclay Simpson acts as an Employment Agency for permanent positions and an Employment Business for temporary/contract engagements. Technical IAM Consultant required for … join an View job & apply SOC Manager Location: Fully Remote Job type: Contract Position Overview Rapidly growing FinTech company seeking an accomplished Cybersecurity Operation View job & apply Senior Cyber Security Analyst Location: London Job type: Permanent Financial Service firm seeks a Senior Cyber Security Analyst to join its Security team. This indi View job & apply Location: Fully More ❯
Months Initially (Extensions Likely) £625.00 p/d Remote Based (Adhoc London - Travel Expensed) ASAP Start The Role: In this role you will work closely with the clients Cyber Security team. In this role, you will ensure the security of products being released into production environments—across containers, hosts, and APIs. You will play a part in identifying … remediating, and mitigating risks and vulnerabilities, integrating security into every stage of the development lifecycle. Responsbilities Work directly with Cyber Security and DevOps teams to embed security best practices into the CI/CD pipeline. Proactively identify, assess, and remediate vulnerabilities in applications and infrastructure (containers, hosts, APIs). Implement and manage static and dynamic applicationsecurity testing (SAST/DAST) tools and workflows. Support secure cloud deployments within AWS, ensuring compliance with internal and standards. Skills & Experience Strong experience in a DevSecOps or security-focused DevOps role. In-depth knowledge and hands-on experience with SAST, DAST and API security testing Solid understanding of AWS and security configurations. Experience in More ❯
This is a key role for someone with the technical skills, automation mindset, and proactive attitude to take the capability to the next level. Reporting to the Head of Security Engineering within the Information Security function , the ideal candidate will have strong scripting and automation skills, experience in hybrid environments (on-prem and cloud), and the initiative to … configurations, and best practices, aligned to frameworks such as ISO 27001, NIST, and CIS. Integrate vulnerability scanning and remediation into CI/CD pipelines and development workflows to ensure security at speed. Automate data collection, triage, reporting, and ticketing processes using scripting languages such as Python, Bash, PowerShell, or Go. Collaborate with IT, DevOps, and engineering teams to remediate … and coordinate penetration testing activities; track remediation and risk acceptance outcomes. Monitor, measure, and report on vulnerability management performance, including KPIs, SLAs, and risk metrics. Develop and document information security processes and policies related to vulnerability detection, triage, remediation, and escalation. Coordinate and lead regular remediation meetings with engineering, DevOps, and infrastructure teams to track progress and unblock issues. More ❯